xref: /netbsd-src/external/gpl3/binutils.old/dist/bfd/elf32-sh.c (revision e992f068c547fd6e84b3f104dc2340adcc955732)
1 /* Renesas / SuperH SH specific support for 32-bit ELF
2    Copyright (C) 1996-2022 Free Software Foundation, Inc.
3    Contributed by Ian Lance Taylor, Cygnus Support.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20    MA 02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf-vxworks.h"
28 #include "elf/sh.h"
29 #include "dwarf2.h"
30 #include "libiberty.h"
31 #include "../opcodes/sh-opc.h"
32 
33 /* All users of this file have bfd_octets_per_byte (abfd, sec) == 1.  */
34 #define OCTETS_PER_BYTE(ABFD, SEC) 1
35 
36 static bfd_reloc_status_type sh_elf_reloc
37   (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
38 static bfd_reloc_status_type sh_elf_ignore_reloc
39   (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bool sh_elf_relax_delete_bytes
41   (bfd *, asection *, bfd_vma, int);
42 static bool sh_elf_align_loads
43   (bfd *, asection *, Elf_Internal_Rela *, bfd_byte *, bool *);
44 static bool sh_elf_swap_insns
45   (bfd *, asection *, void *, bfd_byte *, bfd_vma);
46 static int sh_elf_optimized_tls_reloc
47   (struct bfd_link_info *, int, int);
48 static bfd_vma dtpoff_base
49   (struct bfd_link_info *);
50 static bfd_vma tpoff
51   (struct bfd_link_info *, bfd_vma);
52 
53 /* The name of the dynamic interpreter.  This is put in the .interp
54    section.  */
55 
56 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
57 
58 /* FDPIC binaries have a default 128K stack.  */
59 #define DEFAULT_STACK_SIZE 0x20000
60 
61 #define MINUS_ONE ((bfd_vma) 0 - 1)
62 
63 /* Decide whether a reference to a symbol can be resolved locally or
64    not.  If the symbol is protected, we want the local address, but
65    its function descriptor must be assigned by the dynamic linker.  */
66 #define SYMBOL_FUNCDESC_LOCAL(INFO, H) \
67   (SYMBOL_REFERENCES_LOCAL (INFO, H) \
68    || ! elf_hash_table (INFO)->dynamic_sections_created)
69 
70 #define SH_PARTIAL32 true
71 #define SH_SRC_MASK32 0xffffffff
72 #define SH_ELF_RELOC sh_elf_reloc
73 static reloc_howto_type sh_elf_howto_table[] =
74 {
75 #include "elf32-sh-relocs.h"
76 };
77 
78 #define SH_PARTIAL32 false
79 #define SH_SRC_MASK32 0
80 #define SH_ELF_RELOC bfd_elf_generic_reloc
81 static reloc_howto_type sh_vxworks_howto_table[] =
82 {
83 #include "elf32-sh-relocs.h"
84 };
85 
86 /* Return true if OUTPUT_BFD is a VxWorks object.  */
87 
88 static bool
vxworks_object_p(bfd * abfd ATTRIBUTE_UNUSED)89 vxworks_object_p (bfd *abfd ATTRIBUTE_UNUSED)
90 {
91 #if !defined SH_TARGET_ALREADY_DEFINED
92   extern const bfd_target sh_elf32_vxworks_le_vec;
93   extern const bfd_target sh_elf32_vxworks_vec;
94 
95   return (abfd->xvec == &sh_elf32_vxworks_le_vec
96 	  || abfd->xvec == &sh_elf32_vxworks_vec);
97 #else
98   return false;
99 #endif
100 }
101 
102 /* Return true if OUTPUT_BFD is an FDPIC object.  */
103 
104 static bool
fdpic_object_p(bfd * abfd ATTRIBUTE_UNUSED)105 fdpic_object_p (bfd *abfd ATTRIBUTE_UNUSED)
106 {
107 #if !defined SH_TARGET_ALREADY_DEFINED
108   extern const bfd_target sh_elf32_fdpic_le_vec;
109   extern const bfd_target sh_elf32_fdpic_be_vec;
110 
111   return (abfd->xvec == &sh_elf32_fdpic_le_vec
112 	  || abfd->xvec == &sh_elf32_fdpic_be_vec);
113 #else
114   return false;
115 #endif
116 }
117 
118 /* Return the howto table for ABFD.  */
119 
120 static reloc_howto_type *
get_howto_table(bfd * abfd)121 get_howto_table (bfd *abfd)
122 {
123   if (vxworks_object_p (abfd))
124     return sh_vxworks_howto_table;
125   return sh_elf_howto_table;
126 }
127 
128 static bfd_reloc_status_type
sh_elf_reloc_loop(int r_type ATTRIBUTE_UNUSED,bfd * input_bfd,asection * input_section,bfd_byte * contents,bfd_vma addr,asection * symbol_section,bfd_vma start,bfd_vma end)129 sh_elf_reloc_loop (int r_type ATTRIBUTE_UNUSED, bfd *input_bfd,
130 		   asection *input_section, bfd_byte *contents,
131 		   bfd_vma addr, asection *symbol_section,
132 		   bfd_vma start, bfd_vma end)
133 {
134   static bfd_vma last_addr;
135   static asection *last_symbol_section;
136   bfd_byte *start_ptr, *ptr, *last_ptr;
137   int diff, cum_diff;
138   bfd_signed_vma x;
139   int insn;
140 
141   /* Sanity check the address.  */
142   if (addr > bfd_get_section_limit (input_bfd, input_section))
143     return bfd_reloc_outofrange;
144 
145   /* We require the start and end relocations to be processed consecutively -
146      although we allow then to be processed forwards or backwards.  */
147   if (! last_addr)
148     {
149       last_addr = addr;
150       last_symbol_section = symbol_section;
151       return bfd_reloc_ok;
152     }
153   if (last_addr != addr)
154     abort ();
155   last_addr = 0;
156 
157   if (! symbol_section || last_symbol_section != symbol_section || end < start)
158     return bfd_reloc_outofrange;
159 
160   /* Get the symbol_section contents.  */
161   if (symbol_section != input_section)
162     {
163       if (elf_section_data (symbol_section)->this_hdr.contents != NULL)
164 	contents = elf_section_data (symbol_section)->this_hdr.contents;
165       else
166 	{
167 	  if (!bfd_malloc_and_get_section (input_bfd, symbol_section,
168 					   &contents))
169 	    {
170 	      free (contents);
171 	      return bfd_reloc_outofrange;
172 	    }
173 	}
174     }
175 #define IS_PPI(PTR) ((bfd_get_16 (input_bfd, (PTR)) & 0xfc00) == 0xf800)
176   start_ptr = contents + start;
177   for (cum_diff = -6, ptr = contents + end; cum_diff < 0 && ptr > start_ptr;)
178     {
179       for (last_ptr = ptr, ptr -= 4; ptr >= start_ptr && IS_PPI (ptr);)
180 	ptr -= 2;
181       ptr += 2;
182       diff = (last_ptr - ptr) >> 1;
183       cum_diff += diff & 1;
184       cum_diff += diff;
185     }
186   /* Calculate the start / end values to load into rs / re minus four -
187      so that will cancel out the four we would otherwise have to add to
188      addr to get the value to subtract in order to get relative addressing.  */
189   if (cum_diff >= 0)
190     {
191       start -= 4;
192       end = (ptr + cum_diff * 2) - contents;
193     }
194   else
195     {
196       bfd_vma start0 = start - 4;
197 
198       while (start0 && IS_PPI (contents + start0))
199 	start0 -= 2;
200       start0 = start - 2 - ((start - start0) & 2);
201       start = start0 - cum_diff - 2;
202       end = start0;
203     }
204 
205   if (elf_section_data (symbol_section)->this_hdr.contents != contents)
206     free (contents);
207 
208   insn = bfd_get_16 (input_bfd, contents + addr);
209 
210   x = (insn & 0x200 ? end : start) - addr;
211   if (input_section != symbol_section)
212     x += ((symbol_section->output_section->vma + symbol_section->output_offset)
213 	  - (input_section->output_section->vma
214 	     + input_section->output_offset));
215   x >>= 1;
216   if (x < -128 || x > 127)
217     return bfd_reloc_overflow;
218 
219   x = (insn & ~0xff) | (x & 0xff);
220   bfd_put_16 (input_bfd, (bfd_vma) x, contents + addr);
221 
222   return bfd_reloc_ok;
223 }
224 
225 /* This function is used for normal relocs.  This used to be like the COFF
226    function, and is almost certainly incorrect for other ELF targets.  */
227 
228 static bfd_reloc_status_type
sh_elf_reloc(bfd * abfd,arelent * reloc_entry,asymbol * symbol_in,void * data,asection * input_section,bfd * output_bfd,char ** error_message ATTRIBUTE_UNUSED)229 sh_elf_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol_in,
230 	      void *data, asection *input_section, bfd *output_bfd,
231 	      char **error_message ATTRIBUTE_UNUSED)
232 {
233   bfd_vma insn;
234   bfd_vma sym_value;
235   enum elf_sh_reloc_type r_type;
236   bfd_vma addr = reloc_entry->address;
237   bfd_size_type octets = addr * OCTETS_PER_BYTE (abfd, input_section);
238   bfd_byte *hit_data = (bfd_byte *) data + octets;
239 
240   r_type = (enum elf_sh_reloc_type) reloc_entry->howto->type;
241 
242   if (output_bfd != NULL)
243     {
244       /* Partial linking--do nothing.  */
245       reloc_entry->address += input_section->output_offset;
246       return bfd_reloc_ok;
247     }
248 
249   /* Almost all relocs have to do with relaxing.  If any work must be
250      done for them, it has been done in sh_relax_section.  */
251   if (r_type == R_SH_IND12W && (symbol_in->flags & BSF_LOCAL) != 0)
252     return bfd_reloc_ok;
253 
254   if (symbol_in != NULL
255       && bfd_is_und_section (symbol_in->section))
256     return bfd_reloc_undefined;
257 
258   /* PR 17512: file: 9891ca98.  */
259   if (octets + bfd_get_reloc_size (reloc_entry->howto)
260       > bfd_get_section_limit_octets (abfd, input_section))
261     return bfd_reloc_outofrange;
262 
263   if (bfd_is_com_section (symbol_in->section))
264     sym_value = 0;
265   else
266     sym_value = (symbol_in->value +
267 		 symbol_in->section->output_section->vma +
268 		 symbol_in->section->output_offset);
269 
270   switch (r_type)
271     {
272     case R_SH_DIR32:
273       insn = bfd_get_32 (abfd, hit_data);
274       insn += sym_value + reloc_entry->addend;
275       bfd_put_32 (abfd, insn, hit_data);
276       break;
277     case R_SH_IND12W:
278       insn = bfd_get_16 (abfd, hit_data);
279       sym_value += reloc_entry->addend;
280       sym_value -= (input_section->output_section->vma
281 		    + input_section->output_offset
282 		    + addr
283 		    + 4);
284       sym_value += (((insn & 0xfff) ^ 0x800) - 0x800) << 1;
285       insn = (insn & 0xf000) | ((sym_value >> 1) & 0xfff);
286       bfd_put_16 (abfd, insn, hit_data);
287       if (sym_value + 0x1000 >= 0x2000 || (sym_value & 1) != 0)
288 	return bfd_reloc_overflow;
289       break;
290     default:
291       abort ();
292       break;
293     }
294 
295   return bfd_reloc_ok;
296 }
297 
298 /* This function is used for relocs which are only used for relaxing,
299    which the linker should otherwise ignore.  */
300 
301 static bfd_reloc_status_type
sh_elf_ignore_reloc(bfd * abfd ATTRIBUTE_UNUSED,arelent * reloc_entry,asymbol * symbol ATTRIBUTE_UNUSED,void * data ATTRIBUTE_UNUSED,asection * input_section,bfd * output_bfd,char ** error_message ATTRIBUTE_UNUSED)302 sh_elf_ignore_reloc (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc_entry,
303 		     asymbol *symbol ATTRIBUTE_UNUSED,
304 		     void *data ATTRIBUTE_UNUSED, asection *input_section,
305 		     bfd *output_bfd,
306 		     char **error_message ATTRIBUTE_UNUSED)
307 {
308   if (output_bfd != NULL)
309     reloc_entry->address += input_section->output_offset;
310   return bfd_reloc_ok;
311 }
312 
313 /* This structure is used to map BFD reloc codes to SH ELF relocs.  */
314 
315 struct elf_reloc_map
316 {
317   bfd_reloc_code_real_type bfd_reloc_val;
318   unsigned char elf_reloc_val;
319 };
320 
321 /* An array mapping BFD reloc codes to SH ELF relocs.  */
322 
323 static const struct elf_reloc_map sh_reloc_map[] =
324 {
325   { BFD_RELOC_NONE, R_SH_NONE },
326   { BFD_RELOC_32, R_SH_DIR32 },
327   { BFD_RELOC_16, R_SH_DIR16 },
328   { BFD_RELOC_8, R_SH_DIR8 },
329   { BFD_RELOC_CTOR, R_SH_DIR32 },
330   { BFD_RELOC_32_PCREL, R_SH_REL32 },
331   { BFD_RELOC_SH_PCDISP8BY2, R_SH_DIR8WPN },
332   { BFD_RELOC_SH_PCDISP12BY2, R_SH_IND12W },
333   { BFD_RELOC_SH_PCRELIMM8BY2, R_SH_DIR8WPZ },
334   { BFD_RELOC_SH_PCRELIMM8BY4, R_SH_DIR8WPL },
335   { BFD_RELOC_8_PCREL, R_SH_SWITCH8 },
336   { BFD_RELOC_SH_SWITCH16, R_SH_SWITCH16 },
337   { BFD_RELOC_SH_SWITCH32, R_SH_SWITCH32 },
338   { BFD_RELOC_SH_USES, R_SH_USES },
339   { BFD_RELOC_SH_COUNT, R_SH_COUNT },
340   { BFD_RELOC_SH_ALIGN, R_SH_ALIGN },
341   { BFD_RELOC_SH_CODE, R_SH_CODE },
342   { BFD_RELOC_SH_DATA, R_SH_DATA },
343   { BFD_RELOC_SH_LABEL, R_SH_LABEL },
344   { BFD_RELOC_VTABLE_INHERIT, R_SH_GNU_VTINHERIT },
345   { BFD_RELOC_VTABLE_ENTRY, R_SH_GNU_VTENTRY },
346   { BFD_RELOC_SH_LOOP_START, R_SH_LOOP_START },
347   { BFD_RELOC_SH_LOOP_END, R_SH_LOOP_END },
348   { BFD_RELOC_SH_TLS_GD_32, R_SH_TLS_GD_32 },
349   { BFD_RELOC_SH_TLS_LD_32, R_SH_TLS_LD_32 },
350   { BFD_RELOC_SH_TLS_LDO_32, R_SH_TLS_LDO_32 },
351   { BFD_RELOC_SH_TLS_IE_32, R_SH_TLS_IE_32 },
352   { BFD_RELOC_SH_TLS_LE_32, R_SH_TLS_LE_32 },
353   { BFD_RELOC_SH_TLS_DTPMOD32, R_SH_TLS_DTPMOD32 },
354   { BFD_RELOC_SH_TLS_DTPOFF32, R_SH_TLS_DTPOFF32 },
355   { BFD_RELOC_SH_TLS_TPOFF32, R_SH_TLS_TPOFF32 },
356   { BFD_RELOC_32_GOT_PCREL, R_SH_GOT32 },
357   { BFD_RELOC_32_PLT_PCREL, R_SH_PLT32 },
358   { BFD_RELOC_SH_COPY, R_SH_COPY },
359   { BFD_RELOC_SH_GLOB_DAT, R_SH_GLOB_DAT },
360   { BFD_RELOC_SH_JMP_SLOT, R_SH_JMP_SLOT },
361   { BFD_RELOC_SH_RELATIVE, R_SH_RELATIVE },
362   { BFD_RELOC_32_GOTOFF, R_SH_GOTOFF },
363   { BFD_RELOC_SH_GOTPC, R_SH_GOTPC },
364   { BFD_RELOC_SH_GOTPLT32, R_SH_GOTPLT32 },
365   { BFD_RELOC_SH_GOT20, R_SH_GOT20 },
366   { BFD_RELOC_SH_GOTOFF20, R_SH_GOTOFF20 },
367   { BFD_RELOC_SH_GOTFUNCDESC, R_SH_GOTFUNCDESC },
368   { BFD_RELOC_SH_GOTFUNCDESC20, R_SH_GOTFUNCDESC20 },
369   { BFD_RELOC_SH_GOTOFFFUNCDESC, R_SH_GOTOFFFUNCDESC },
370   { BFD_RELOC_SH_GOTOFFFUNCDESC20, R_SH_GOTOFFFUNCDESC20 },
371   { BFD_RELOC_SH_FUNCDESC, R_SH_FUNCDESC },
372 };
373 
374 /* Given a BFD reloc code, return the howto structure for the
375    corresponding SH ELF reloc.  */
376 
377 static reloc_howto_type *
sh_elf_reloc_type_lookup(bfd * abfd,bfd_reloc_code_real_type code)378 sh_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
379 {
380   unsigned int i;
381 
382   for (i = 0; i < sizeof (sh_reloc_map) / sizeof (struct elf_reloc_map); i++)
383     {
384       if (sh_reloc_map[i].bfd_reloc_val == code)
385 	return get_howto_table (abfd) + (int) sh_reloc_map[i].elf_reloc_val;
386     }
387 
388   return NULL;
389 }
390 
391 static reloc_howto_type *
sh_elf_reloc_name_lookup(bfd * abfd,const char * r_name)392 sh_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
393 {
394   unsigned int i;
395 
396   if (vxworks_object_p (abfd))
397     {
398       for (i = 0;
399 	   i < (sizeof (sh_vxworks_howto_table)
400 		/ sizeof (sh_vxworks_howto_table[0]));
401 	   i++)
402 	if (sh_vxworks_howto_table[i].name != NULL
403 	    && strcasecmp (sh_vxworks_howto_table[i].name, r_name) == 0)
404 	  return &sh_vxworks_howto_table[i];
405     }
406   else
407     {
408       for (i = 0;
409 	   i < (sizeof (sh_elf_howto_table)
410 		/ sizeof (sh_elf_howto_table[0]));
411 	   i++)
412 	if (sh_elf_howto_table[i].name != NULL
413 	    && strcasecmp (sh_elf_howto_table[i].name, r_name) == 0)
414 	  return &sh_elf_howto_table[i];
415     }
416 
417   return NULL;
418 }
419 
420 /* Given an ELF reloc, fill in the howto field of a relent.  */
421 
422 static bool
sh_elf_info_to_howto(bfd * abfd,arelent * cache_ptr,Elf_Internal_Rela * dst)423 sh_elf_info_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
424 {
425   unsigned int r;
426 
427   r = ELF32_R_TYPE (dst->r_info);
428 
429   if (r >= R_SH_FIRST_INVALID_RELOC_6
430       || (r >= R_SH_FIRST_INVALID_RELOC   && r <= R_SH_LAST_INVALID_RELOC)
431       || (r >= R_SH_FIRST_INVALID_RELOC_2 && r <= R_SH_LAST_INVALID_RELOC_2)
432       || (r >= R_SH_FIRST_INVALID_RELOC_3 && r <= R_SH_LAST_INVALID_RELOC_3)
433       || (r >= R_SH_FIRST_INVALID_RELOC_4 && r <= R_SH_LAST_INVALID_RELOC_4)
434       || (r >= R_SH_FIRST_INVALID_RELOC_5 && r <= R_SH_LAST_INVALID_RELOC_5))
435     {
436       /* xgettext:c-format */
437       _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
438 			  abfd, r);
439       bfd_set_error (bfd_error_bad_value);
440       return false;
441     }
442 
443   cache_ptr->howto = get_howto_table (abfd) + r;
444   return true;
445 }
446 
447 /* This function handles relaxing for SH ELF.  See the corresponding
448    function in coff-sh.c for a description of what this does.  FIXME:
449    There is a lot of duplication here between this code and the COFF
450    specific code.  The format of relocs and symbols is wound deeply
451    into this code, but it would still be better if the duplication
452    could be eliminated somehow.  Note in particular that although both
453    functions use symbols like R_SH_CODE, those symbols have different
454    values; in coff-sh.c they come from include/coff/sh.h, whereas here
455    they come from enum elf_sh_reloc_type in include/elf/sh.h.  */
456 
457 static bool
sh_elf_relax_section(bfd * abfd,asection * sec,struct bfd_link_info * link_info,bool * again)458 sh_elf_relax_section (bfd *abfd, asection *sec,
459 		      struct bfd_link_info *link_info, bool *again)
460 {
461   Elf_Internal_Shdr *symtab_hdr;
462   Elf_Internal_Rela *internal_relocs;
463   bool have_code;
464   Elf_Internal_Rela *irel, *irelend;
465   bfd_byte *contents = NULL;
466   Elf_Internal_Sym *isymbuf = NULL;
467 
468   *again = false;
469 
470   if (bfd_link_relocatable (link_info)
471       || (sec->flags & SEC_RELOC) == 0
472       || sec->reloc_count == 0)
473     return true;
474 
475   symtab_hdr = &elf_symtab_hdr (abfd);
476 
477   internal_relocs = (_bfd_elf_link_read_relocs
478 		     (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
479 		      link_info->keep_memory));
480   if (internal_relocs == NULL)
481     goto error_return;
482 
483   have_code = false;
484 
485   irelend = internal_relocs + sec->reloc_count;
486   for (irel = internal_relocs; irel < irelend; irel++)
487     {
488       bfd_vma laddr, paddr, symval;
489       unsigned short insn;
490       Elf_Internal_Rela *irelfn, *irelscan, *irelcount;
491       bfd_signed_vma foff;
492 
493       if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_CODE)
494 	have_code = true;
495 
496       if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_USES)
497 	continue;
498 
499       /* Get the section contents.  */
500       if (contents == NULL)
501 	{
502 	  if (elf_section_data (sec)->this_hdr.contents != NULL)
503 	    contents = elf_section_data (sec)->this_hdr.contents;
504 	  else
505 	    {
506 	      if (!bfd_malloc_and_get_section (abfd, sec, &contents))
507 		goto error_return;
508 	    }
509 	}
510 
511       /* The r_addend field of the R_SH_USES reloc will point us to
512 	 the register load.  The 4 is because the r_addend field is
513 	 computed as though it were a jump offset, which are based
514 	 from 4 bytes after the jump instruction.  */
515       laddr = irel->r_offset + 4 + irel->r_addend;
516       if (laddr >= sec->size)
517 	{
518 	  /* xgettext:c-format */
519 	  _bfd_error_handler
520 	    (_("%pB: %#" PRIx64 ": warning: bad R_SH_USES offset"),
521 	     abfd, (uint64_t) irel->r_offset);
522 	  continue;
523 	}
524       insn = bfd_get_16 (abfd, contents + laddr);
525 
526       /* If the instruction is not mov.l NN,rN, we don't know what to
527 	 do.  */
528       if ((insn & 0xf000) != 0xd000)
529 	{
530 	  _bfd_error_handler
531 	    /* xgettext:c-format */
532 	    (_("%pB: %#" PRIx64 ": warning: "
533 	       "R_SH_USES points to unrecognized insn 0x%x"),
534 	     abfd, (uint64_t) irel->r_offset, insn);
535 	  continue;
536 	}
537 
538       /* Get the address from which the register is being loaded.  The
539 	 displacement in the mov.l instruction is quadrupled.  It is a
540 	 displacement from four bytes after the movl instruction, but,
541 	 before adding in the PC address, two least significant bits
542 	 of the PC are cleared.  We assume that the section is aligned
543 	 on a four byte boundary.  */
544       paddr = insn & 0xff;
545       paddr *= 4;
546       paddr += (laddr + 4) &~ (bfd_vma) 3;
547       if (paddr >= sec->size)
548 	{
549 	  _bfd_error_handler
550 	    /* xgettext:c-format */
551 	    (_("%pB: %#" PRIx64 ": warning: bad R_SH_USES load offset"),
552 	     abfd, (uint64_t) irel->r_offset);
553 	  continue;
554 	}
555 
556       /* Get the reloc for the address from which the register is
557 	 being loaded.  This reloc will tell us which function is
558 	 actually being called.  */
559       for (irelfn = internal_relocs; irelfn < irelend; irelfn++)
560 	if (irelfn->r_offset == paddr
561 	    && ELF32_R_TYPE (irelfn->r_info) == (int) R_SH_DIR32)
562 	  break;
563       if (irelfn >= irelend)
564 	{
565 	  _bfd_error_handler
566 	    /* xgettext:c-format */
567 	    (_("%pB: %#" PRIx64 ": warning: could not find expected reloc"),
568 	     abfd, (uint64_t) paddr);
569 	  continue;
570 	}
571 
572       /* Read this BFD's symbols if we haven't done so already.  */
573       if (isymbuf == NULL && symtab_hdr->sh_info != 0)
574 	{
575 	  isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
576 	  if (isymbuf == NULL)
577 	    isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
578 					    symtab_hdr->sh_info, 0,
579 					    NULL, NULL, NULL);
580 	  if (isymbuf == NULL)
581 	    goto error_return;
582 	}
583 
584       /* Get the value of the symbol referred to by the reloc.  */
585       if (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
586 	{
587 	  /* A local symbol.  */
588 	  Elf_Internal_Sym *isym;
589 
590 	  isym = isymbuf + ELF32_R_SYM (irelfn->r_info);
591 	  if (isym->st_shndx
592 	      != (unsigned int) _bfd_elf_section_from_bfd_section (abfd, sec))
593 	    {
594 	      _bfd_error_handler
595 		/* xgettext:c-format */
596 		(_("%pB: %#" PRIx64 ": warning: symbol in unexpected section"),
597 		 abfd, (uint64_t) paddr);
598 	      continue;
599 	    }
600 
601 	  symval = (isym->st_value
602 		    + sec->output_section->vma
603 		    + sec->output_offset);
604 	}
605       else
606 	{
607 	  unsigned long indx;
608 	  struct elf_link_hash_entry *h;
609 
610 	  indx = ELF32_R_SYM (irelfn->r_info) - symtab_hdr->sh_info;
611 	  h = elf_sym_hashes (abfd)[indx];
612 	  BFD_ASSERT (h != NULL);
613 	  if (h->root.type != bfd_link_hash_defined
614 	      && h->root.type != bfd_link_hash_defweak)
615 	    {
616 	      /* This appears to be a reference to an undefined
617 		 symbol.  Just ignore it--it will be caught by the
618 		 regular reloc processing.  */
619 	      continue;
620 	    }
621 
622 	  symval = (h->root.u.def.value
623 		    + h->root.u.def.section->output_section->vma
624 		    + h->root.u.def.section->output_offset);
625 	}
626 
627       if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
628 	symval += bfd_get_32 (abfd, contents + paddr);
629       else
630 	symval += irelfn->r_addend;
631 
632       /* See if this function call can be shortened.  */
633       foff = (symval
634 	      - (irel->r_offset
635 		 + sec->output_section->vma
636 		 + sec->output_offset
637 		 + 4));
638       /* A branch to an address beyond ours might be increased by an
639 	 .align that doesn't move when bytes behind us are deleted.
640 	 So, we add some slop in this calculation to allow for
641 	 that.  */
642       if (foff < -0x1000 || foff >= 0x1000 - 8)
643 	{
644 	  /* After all that work, we can't shorten this function call.  */
645 	  continue;
646 	}
647 
648       /* Shorten the function call.  */
649 
650       /* For simplicity of coding, we are going to modify the section
651 	 contents, the section relocs, and the BFD symbol table.  We
652 	 must tell the rest of the code not to free up this
653 	 information.  It would be possible to instead create a table
654 	 of changes which have to be made, as is done in coff-mips.c;
655 	 that would be more work, but would require less memory when
656 	 the linker is run.  */
657 
658       elf_section_data (sec)->relocs = internal_relocs;
659       elf_section_data (sec)->this_hdr.contents = contents;
660       symtab_hdr->contents = (unsigned char *) isymbuf;
661 
662       /* Replace the jmp/jsr with a bra/bsr.  */
663 
664       /* Change the R_SH_USES reloc into an R_SH_IND12W reloc, and
665 	 replace the jmp/jsr with a bra/bsr.  */
666       irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irelfn->r_info), R_SH_IND12W);
667       /* We used to test (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
668 	 here, but that only checks if the symbol is an external symbol,
669 	 not if the symbol is in a different section.  Besides, we need
670 	 a consistent meaning for the relocation, so we just assume here that
671 	 the value of the symbol is not available.  */
672 
673       /* We can't fully resolve this yet, because the external
674 	 symbol value may be changed by future relaxing.  We let
675 	 the final link phase handle it.  */
676       if (bfd_get_16 (abfd, contents + irel->r_offset) & 0x0020)
677 	bfd_put_16 (abfd, (bfd_vma) 0xa000, contents + irel->r_offset);
678       else
679 	bfd_put_16 (abfd, (bfd_vma) 0xb000, contents + irel->r_offset);
680 
681       irel->r_addend = -4;
682 
683       /* When we calculated the symbol "value" we had an offset in the
684 	 DIR32's word in memory (we read and add it above).  However,
685 	 the jsr we create does NOT have this offset encoded, so we
686 	 have to add it to the addend to preserve it.  */
687       irel->r_addend += bfd_get_32 (abfd, contents + paddr);
688 
689       /* See if there is another R_SH_USES reloc referring to the same
690 	 register load.  */
691       for (irelscan = internal_relocs; irelscan < irelend; irelscan++)
692 	if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_USES
693 	    && laddr == irelscan->r_offset + 4 + irelscan->r_addend)
694 	  break;
695       if (irelscan < irelend)
696 	{
697 	  /* Some other function call depends upon this register load,
698 	     and we have not yet converted that function call.
699 	     Indeed, we may never be able to convert it.  There is
700 	     nothing else we can do at this point.  */
701 	  continue;
702 	}
703 
704       /* Look for a R_SH_COUNT reloc on the location where the
705 	 function address is stored.  Do this before deleting any
706 	 bytes, to avoid confusion about the address.  */
707       for (irelcount = internal_relocs; irelcount < irelend; irelcount++)
708 	if (irelcount->r_offset == paddr
709 	    && ELF32_R_TYPE (irelcount->r_info) == (int) R_SH_COUNT)
710 	  break;
711 
712       /* Delete the register load.  */
713       if (! sh_elf_relax_delete_bytes (abfd, sec, laddr, 2))
714 	goto error_return;
715 
716       /* That will change things, so, just in case it permits some
717 	 other function call to come within range, we should relax
718 	 again.  Note that this is not required, and it may be slow.  */
719       *again = true;
720 
721       /* Now check whether we got a COUNT reloc.  */
722       if (irelcount >= irelend)
723 	{
724 	  _bfd_error_handler
725 	    /* xgettext:c-format */
726 	    (_("%pB: %#" PRIx64 ": warning: "
727 	       "could not find expected COUNT reloc"),
728 	     abfd, (uint64_t) paddr);
729 	  continue;
730 	}
731 
732       /* The number of uses is stored in the r_addend field.  We've
733 	 just deleted one.  */
734       if (irelcount->r_addend == 0)
735 	{
736 	  /* xgettext:c-format */
737 	  _bfd_error_handler (_("%pB: %#" PRIx64 ": warning: bad count"),
738 			      abfd, (uint64_t) paddr);
739 	  continue;
740 	}
741 
742       --irelcount->r_addend;
743 
744       /* If there are no more uses, we can delete the address.  Reload
745 	 the address from irelfn, in case it was changed by the
746 	 previous call to sh_elf_relax_delete_bytes.  */
747       if (irelcount->r_addend == 0)
748 	{
749 	  if (! sh_elf_relax_delete_bytes (abfd, sec, irelfn->r_offset, 4))
750 	    goto error_return;
751 	}
752 
753       /* We've done all we can with that function call.  */
754     }
755 
756   /* Look for load and store instructions that we can align on four
757      byte boundaries.  */
758   if ((elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK) != EF_SH4
759       && have_code)
760     {
761       bool swapped;
762 
763       /* Get the section contents.  */
764       if (contents == NULL)
765 	{
766 	  if (elf_section_data (sec)->this_hdr.contents != NULL)
767 	    contents = elf_section_data (sec)->this_hdr.contents;
768 	  else
769 	    {
770 	      if (!bfd_malloc_and_get_section (abfd, sec, &contents))
771 		goto error_return;
772 	    }
773 	}
774 
775       if (! sh_elf_align_loads (abfd, sec, internal_relocs, contents,
776 				&swapped))
777 	goto error_return;
778 
779       if (swapped)
780 	{
781 	  elf_section_data (sec)->relocs = internal_relocs;
782 	  elf_section_data (sec)->this_hdr.contents = contents;
783 	  symtab_hdr->contents = (unsigned char *) isymbuf;
784 	}
785     }
786 
787   if (isymbuf != NULL
788       && symtab_hdr->contents != (unsigned char *) isymbuf)
789     {
790       if (! link_info->keep_memory)
791 	free (isymbuf);
792       else
793 	{
794 	  /* Cache the symbols for elf_link_input_bfd.  */
795 	  symtab_hdr->contents = (unsigned char *) isymbuf;
796 	}
797     }
798 
799   if (contents != NULL
800       && elf_section_data (sec)->this_hdr.contents != contents)
801     {
802       if (! link_info->keep_memory)
803 	free (contents);
804       else
805 	{
806 	  /* Cache the section contents for elf_link_input_bfd.  */
807 	  elf_section_data (sec)->this_hdr.contents = contents;
808 	}
809     }
810 
811   if (elf_section_data (sec)->relocs != internal_relocs)
812     free (internal_relocs);
813 
814   return true;
815 
816  error_return:
817   if (symtab_hdr->contents != (unsigned char *) isymbuf)
818     free (isymbuf);
819   if (elf_section_data (sec)->this_hdr.contents != contents)
820     free (contents);
821   if (elf_section_data (sec)->relocs != internal_relocs)
822     free (internal_relocs);
823 
824   return false;
825 }
826 
827 /* Delete some bytes from a section while relaxing.  FIXME: There is a
828    lot of duplication between this function and sh_relax_delete_bytes
829    in coff-sh.c.  */
830 
831 static bool
sh_elf_relax_delete_bytes(bfd * abfd,asection * sec,bfd_vma addr,int count)832 sh_elf_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr,
833 			   int count)
834 {
835   Elf_Internal_Shdr *symtab_hdr;
836   unsigned int sec_shndx;
837   bfd_byte *contents;
838   Elf_Internal_Rela *irel, *irelend;
839   Elf_Internal_Rela *irelalign;
840   bfd_vma toaddr;
841   Elf_Internal_Sym *isymbuf, *isym, *isymend;
842   struct elf_link_hash_entry **sym_hashes;
843   struct elf_link_hash_entry **end_hashes;
844   unsigned int symcount;
845   asection *o;
846 
847   symtab_hdr = &elf_symtab_hdr (abfd);
848   isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
849 
850   sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
851 
852   contents = elf_section_data (sec)->this_hdr.contents;
853 
854   /* The deletion must stop at the next ALIGN reloc for an alignment
855      power larger than the number of bytes we are deleting.  */
856 
857   irelalign = NULL;
858   toaddr = sec->size;
859 
860   irel = elf_section_data (sec)->relocs;
861   irelend = irel + sec->reloc_count;
862   for (; irel < irelend; irel++)
863     {
864       if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
865 	  && irel->r_offset > addr
866 	  && count < (1 << irel->r_addend))
867 	{
868 	  irelalign = irel;
869 	  toaddr = irel->r_offset;
870 	  break;
871 	}
872     }
873 
874   /* Actually delete the bytes.  */
875   memmove (contents + addr, contents + addr + count,
876 	   (size_t) (toaddr - addr - count));
877   if (irelalign == NULL)
878     sec->size -= count;
879   else
880     {
881       int i;
882 
883 #define NOP_OPCODE (0x0009)
884 
885       BFD_ASSERT ((count & 1) == 0);
886       for (i = 0; i < count; i += 2)
887 	bfd_put_16 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
888     }
889 
890   /* Adjust all the relocs.  */
891   for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
892     {
893       bfd_vma nraddr, stop;
894       bfd_vma start = 0;
895       int insn = 0;
896       int off, adjust, oinsn;
897       bfd_signed_vma voff = 0;
898       bool overflow;
899 
900       /* Get the new reloc address.  */
901       nraddr = irel->r_offset;
902       if ((irel->r_offset > addr
903 	   && irel->r_offset < toaddr)
904 	  || (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
905 	      && irel->r_offset == toaddr))
906 	nraddr -= count;
907 
908       /* See if this reloc was for the bytes we have deleted, in which
909 	 case we no longer care about it.  Don't delete relocs which
910 	 represent addresses, though.  */
911       if (irel->r_offset >= addr
912 	  && irel->r_offset < addr + count
913 	  && ELF32_R_TYPE (irel->r_info) != (int) R_SH_ALIGN
914 	  && ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE
915 	  && ELF32_R_TYPE (irel->r_info) != (int) R_SH_DATA
916 	  && ELF32_R_TYPE (irel->r_info) != (int) R_SH_LABEL)
917 	irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
918 				     (int) R_SH_NONE);
919 
920       /* If this is a PC relative reloc, see if the range it covers
921 	 includes the bytes we have deleted.  */
922       switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
923 	{
924 	default:
925 	  break;
926 
927 	case R_SH_DIR8WPN:
928 	case R_SH_IND12W:
929 	case R_SH_DIR8WPZ:
930 	case R_SH_DIR8WPL:
931 	  start = irel->r_offset;
932 	  insn = bfd_get_16 (abfd, contents + nraddr);
933 	  break;
934 	}
935 
936       switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
937 	{
938 	default:
939 	  start = stop = addr;
940 	  break;
941 
942 	case R_SH_DIR32:
943 	  /* If this reloc is against a symbol defined in this
944 	     section, and the symbol will not be adjusted below, we
945 	     must check the addend to see it will put the value in
946 	     range to be adjusted, and hence must be changed.  */
947 	  if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
948 	    {
949 	      isym = isymbuf + ELF32_R_SYM (irel->r_info);
950 	      if (isym->st_shndx == sec_shndx
951 		  && (isym->st_value <= addr
952 		      || isym->st_value >= toaddr))
953 		{
954 		  bfd_vma val;
955 
956 		  if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
957 		    {
958 		      val = bfd_get_32 (abfd, contents + nraddr);
959 		      val += isym->st_value;
960 		      if (val > addr && val < toaddr)
961 			bfd_put_32 (abfd, val - count, contents + nraddr);
962 		    }
963 		  else
964 		    {
965 		      val = isym->st_value + irel->r_addend;
966 		      if (val > addr && val < toaddr)
967 			irel->r_addend -= count;
968 		    }
969 		}
970 	    }
971 	  start = stop = addr;
972 	  break;
973 
974 	case R_SH_DIR8WPN:
975 	  off = insn & 0xff;
976 	  if (off & 0x80)
977 	    off -= 0x100;
978 	  stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
979 	  break;
980 
981 	case R_SH_IND12W:
982 	  off = insn & 0xfff;
983 	  if (! off)
984 	    {
985 	      /* This has been made by previous relaxation.  Since the
986 		 relocation will be against an external symbol, the
987 		 final relocation will just do the right thing.  */
988 	      start = stop = addr;
989 	    }
990 	  else
991 	    {
992 	      if (off & 0x800)
993 		off -= 0x1000;
994 	      stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
995 
996 	      /* The addend will be against the section symbol, thus
997 		 for adjusting the addend, the relevant start is the
998 		 start of the section.
999 		 N.B. If we want to abandon in-place changes here and
1000 		 test directly using symbol + addend, we have to take into
1001 		 account that the addend has already been adjusted by -4.  */
1002 	      if (stop > addr && stop < toaddr)
1003 		irel->r_addend -= count;
1004 	    }
1005 	  break;
1006 
1007 	case R_SH_DIR8WPZ:
1008 	  off = insn & 0xff;
1009 	  stop = start + 4 + off * 2;
1010 	  break;
1011 
1012 	case R_SH_DIR8WPL:
1013 	  off = insn & 0xff;
1014 	  stop = (start & ~(bfd_vma) 3) + 4 + off * 4;
1015 	  break;
1016 
1017 	case R_SH_SWITCH8:
1018 	case R_SH_SWITCH16:
1019 	case R_SH_SWITCH32:
1020 	  /* These relocs types represent
1021 	       .word L2-L1
1022 	     The r_addend field holds the difference between the reloc
1023 	     address and L1.  That is the start of the reloc, and
1024 	     adding in the contents gives us the top.  We must adjust
1025 	     both the r_offset field and the section contents.
1026 	     N.B. in gas / coff bfd, the elf bfd r_addend is called r_offset,
1027 	     and the elf bfd r_offset is called r_vaddr.  */
1028 
1029 	  stop = irel->r_offset;
1030 	  start = (bfd_vma) ((bfd_signed_vma) stop - (long) irel->r_addend);
1031 
1032 	  if (start > addr
1033 	      && start < toaddr
1034 	      && (stop <= addr || stop >= toaddr))
1035 	    irel->r_addend += count;
1036 	  else if (stop > addr
1037 		   && stop < toaddr
1038 		   && (start <= addr || start >= toaddr))
1039 	    irel->r_addend -= count;
1040 
1041 	  if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH16)
1042 	    voff = bfd_get_signed_16 (abfd, contents + nraddr);
1043 	  else if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH8)
1044 	    voff = bfd_get_8 (abfd, contents + nraddr);
1045 	  else
1046 	    voff = bfd_get_signed_32 (abfd, contents + nraddr);
1047 	  stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1048 
1049 	  break;
1050 
1051 	case R_SH_USES:
1052 	  start = irel->r_offset;
1053 	  stop = (bfd_vma) ((bfd_signed_vma) start
1054 			    + (long) irel->r_addend
1055 			    + 4);
1056 	  break;
1057 	}
1058 
1059       if (start > addr
1060 	  && start < toaddr
1061 	  && (stop <= addr || stop >= toaddr))
1062 	adjust = count;
1063       else if (stop > addr
1064 	       && stop < toaddr
1065 	       && (start <= addr || start >= toaddr))
1066 	adjust = - count;
1067       else
1068 	adjust = 0;
1069 
1070       if (adjust != 0)
1071 	{
1072 	  oinsn = insn;
1073 	  overflow = false;
1074 	  switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
1075 	    {
1076 	    default:
1077 	      abort ();
1078 	      break;
1079 
1080 	    case R_SH_DIR8WPN:
1081 	    case R_SH_DIR8WPZ:
1082 	      insn += adjust / 2;
1083 	      if ((oinsn & 0xff00) != (insn & 0xff00))
1084 		overflow = true;
1085 	      bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
1086 	      break;
1087 
1088 	    case R_SH_IND12W:
1089 	      insn += adjust / 2;
1090 	      if ((oinsn & 0xf000) != (insn & 0xf000))
1091 		overflow = true;
1092 	      bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
1093 	      break;
1094 
1095 	    case R_SH_DIR8WPL:
1096 	      BFD_ASSERT (adjust == count || count >= 4);
1097 	      if (count >= 4)
1098 		insn += adjust / 4;
1099 	      else
1100 		{
1101 		  if ((irel->r_offset & 3) == 0)
1102 		    ++insn;
1103 		}
1104 	      if ((oinsn & 0xff00) != (insn & 0xff00))
1105 		overflow = true;
1106 	      bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
1107 	      break;
1108 
1109 	    case R_SH_SWITCH8:
1110 	      voff += adjust;
1111 	      if (voff < 0 || voff >= 0xff)
1112 		overflow = true;
1113 	      bfd_put_8 (abfd, voff, contents + nraddr);
1114 	      break;
1115 
1116 	    case R_SH_SWITCH16:
1117 	      voff += adjust;
1118 	      if (voff < - 0x8000 || voff >= 0x8000)
1119 		overflow = true;
1120 	      bfd_put_signed_16 (abfd, (bfd_vma) voff, contents + nraddr);
1121 	      break;
1122 
1123 	    case R_SH_SWITCH32:
1124 	      voff += adjust;
1125 	      bfd_put_signed_32 (abfd, (bfd_vma) voff, contents + nraddr);
1126 	      break;
1127 
1128 	    case R_SH_USES:
1129 	      irel->r_addend += adjust;
1130 	      break;
1131 	    }
1132 
1133 	  if (overflow)
1134 	    {
1135 	      _bfd_error_handler
1136 		/* xgettext:c-format */
1137 		(_("%pB: %#" PRIx64 ": fatal: reloc overflow while relaxing"),
1138 		 abfd, (uint64_t) irel->r_offset);
1139 	      bfd_set_error (bfd_error_bad_value);
1140 	      return false;
1141 	    }
1142 	}
1143 
1144       irel->r_offset = nraddr;
1145     }
1146 
1147   /* Look through all the other sections.  If there contain any IMM32
1148      relocs against internal symbols which we are not going to adjust
1149      below, we may need to adjust the addends.  */
1150   for (o = abfd->sections; o != NULL; o = o->next)
1151     {
1152       Elf_Internal_Rela *internal_relocs;
1153       Elf_Internal_Rela *irelscan, *irelscanend;
1154       bfd_byte *ocontents;
1155 
1156       if (o == sec
1157 	  || (o->flags & SEC_RELOC) == 0
1158 	  || o->reloc_count == 0)
1159 	continue;
1160 
1161       /* We always cache the relocs.  Perhaps, if info->keep_memory is
1162 	 FALSE, we should free them, if we are permitted to, when we
1163 	 leave sh_coff_relax_section.  */
1164       internal_relocs = (_bfd_elf_link_read_relocs
1165 			 (abfd, o, NULL, (Elf_Internal_Rela *) NULL, true));
1166       if (internal_relocs == NULL)
1167 	return false;
1168 
1169       ocontents = NULL;
1170       irelscanend = internal_relocs + o->reloc_count;
1171       for (irelscan = internal_relocs; irelscan < irelscanend; irelscan++)
1172 	{
1173 	  /* Dwarf line numbers use R_SH_SWITCH32 relocs.  */
1174 	  if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_SWITCH32)
1175 	    {
1176 	      bfd_vma start, stop;
1177 	      bfd_signed_vma voff;
1178 
1179 	      if (ocontents == NULL)
1180 		{
1181 		  if (elf_section_data (o)->this_hdr.contents != NULL)
1182 		    ocontents = elf_section_data (o)->this_hdr.contents;
1183 		  else
1184 		    {
1185 		      /* We always cache the section contents.
1186 			 Perhaps, if info->keep_memory is FALSE, we
1187 			 should free them, if we are permitted to,
1188 			 when we leave sh_coff_relax_section.  */
1189 		      if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1190 			{
1191 			  free (ocontents);
1192 			  return false;
1193 			}
1194 
1195 		      elf_section_data (o)->this_hdr.contents = ocontents;
1196 		    }
1197 		}
1198 
1199 	      stop = irelscan->r_offset;
1200 	      start
1201 		= (bfd_vma) ((bfd_signed_vma) stop - (long) irelscan->r_addend);
1202 
1203 	      /* STOP is in a different section, so it won't change.  */
1204 	      if (start > addr && start < toaddr)
1205 		irelscan->r_addend += count;
1206 
1207 	      voff = bfd_get_signed_32 (abfd, ocontents + irelscan->r_offset);
1208 	      stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1209 
1210 	      if (start > addr
1211 		  && start < toaddr
1212 		  && (stop <= addr || stop >= toaddr))
1213 		bfd_put_signed_32 (abfd, (bfd_vma) voff + count,
1214 				   ocontents + irelscan->r_offset);
1215 	      else if (stop > addr
1216 		       && stop < toaddr
1217 		       && (start <= addr || start >= toaddr))
1218 		bfd_put_signed_32 (abfd, (bfd_vma) voff - count,
1219 				   ocontents + irelscan->r_offset);
1220 	    }
1221 
1222 	  if (ELF32_R_TYPE (irelscan->r_info) != (int) R_SH_DIR32)
1223 	    continue;
1224 
1225 	  if (ELF32_R_SYM (irelscan->r_info) >= symtab_hdr->sh_info)
1226 	    continue;
1227 
1228 
1229 	  isym = isymbuf + ELF32_R_SYM (irelscan->r_info);
1230 	  if (isym->st_shndx == sec_shndx
1231 	      && (isym->st_value <= addr
1232 		  || isym->st_value >= toaddr))
1233 	    {
1234 	      bfd_vma val;
1235 
1236 	      if (ocontents == NULL)
1237 		{
1238 		  if (elf_section_data (o)->this_hdr.contents != NULL)
1239 		    ocontents = elf_section_data (o)->this_hdr.contents;
1240 		  else
1241 		    {
1242 		      /* We always cache the section contents.
1243 			 Perhaps, if info->keep_memory is FALSE, we
1244 			 should free them, if we are permitted to,
1245 			 when we leave sh_coff_relax_section.  */
1246 		      if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1247 			{
1248 			  free (ocontents);
1249 			  return false;
1250 			}
1251 
1252 		      elf_section_data (o)->this_hdr.contents = ocontents;
1253 		    }
1254 		}
1255 
1256 	      val = bfd_get_32 (abfd, ocontents + irelscan->r_offset);
1257 	      val += isym->st_value;
1258 	      if (val > addr && val < toaddr)
1259 		bfd_put_32 (abfd, val - count,
1260 			    ocontents + irelscan->r_offset);
1261 	    }
1262 	}
1263     }
1264 
1265   /* Adjust the local symbols defined in this section.  */
1266   isymend = isymbuf + symtab_hdr->sh_info;
1267   for (isym = isymbuf; isym < isymend; isym++)
1268     {
1269       if (isym->st_shndx == sec_shndx
1270 	  && isym->st_value > addr
1271 	  && isym->st_value < toaddr)
1272 	isym->st_value -= count;
1273     }
1274 
1275   /* Now adjust the global symbols defined in this section.  */
1276   symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
1277 	      - symtab_hdr->sh_info);
1278   sym_hashes = elf_sym_hashes (abfd);
1279   end_hashes = sym_hashes + symcount;
1280   for (; sym_hashes < end_hashes; sym_hashes++)
1281     {
1282       struct elf_link_hash_entry *sym_hash = *sym_hashes;
1283       if ((sym_hash->root.type == bfd_link_hash_defined
1284 	   || sym_hash->root.type == bfd_link_hash_defweak)
1285 	  && sym_hash->root.u.def.section == sec
1286 	  && sym_hash->root.u.def.value > addr
1287 	  && sym_hash->root.u.def.value < toaddr)
1288 	{
1289 	  sym_hash->root.u.def.value -= count;
1290 	}
1291     }
1292 
1293   /* See if we can move the ALIGN reloc forward.  We have adjusted
1294      r_offset for it already.  */
1295   if (irelalign != NULL)
1296     {
1297       bfd_vma alignto, alignaddr;
1298 
1299       alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
1300       alignaddr = BFD_ALIGN (irelalign->r_offset,
1301 			     1 << irelalign->r_addend);
1302       if (alignto != alignaddr)
1303 	{
1304 	  /* Tail recursion.  */
1305 	  return sh_elf_relax_delete_bytes (abfd, sec, alignaddr,
1306 					    (int) (alignto - alignaddr));
1307 	}
1308     }
1309 
1310   return true;
1311 }
1312 
1313 /* Look for loads and stores which we can align to four byte
1314    boundaries.  This is like sh_align_loads in coff-sh.c.  */
1315 
1316 static bool
sh_elf_align_loads(bfd * abfd ATTRIBUTE_UNUSED,asection * sec,Elf_Internal_Rela * internal_relocs,bfd_byte * contents ATTRIBUTE_UNUSED,bool * pswapped)1317 sh_elf_align_loads (bfd *abfd ATTRIBUTE_UNUSED, asection *sec,
1318 		    Elf_Internal_Rela *internal_relocs,
1319 		    bfd_byte *contents ATTRIBUTE_UNUSED,
1320 		    bool *pswapped)
1321 {
1322   Elf_Internal_Rela *irel, *irelend;
1323   bfd_vma *labels = NULL;
1324   bfd_vma *label, *label_end;
1325   bfd_size_type amt;
1326 
1327   *pswapped = false;
1328 
1329   irelend = internal_relocs + sec->reloc_count;
1330 
1331   /* Get all the addresses with labels on them.  */
1332   amt = sec->reloc_count;
1333   amt *= sizeof (bfd_vma);
1334   labels = (bfd_vma *) bfd_malloc (amt);
1335   if (labels == NULL)
1336     goto error_return;
1337   label_end = labels;
1338   for (irel = internal_relocs; irel < irelend; irel++)
1339     {
1340       if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_LABEL)
1341 	{
1342 	  *label_end = irel->r_offset;
1343 	  ++label_end;
1344 	}
1345     }
1346 
1347   /* Note that the assembler currently always outputs relocs in
1348      address order.  If that ever changes, this code will need to sort
1349      the label values and the relocs.  */
1350 
1351   label = labels;
1352 
1353   for (irel = internal_relocs; irel < irelend; irel++)
1354     {
1355       bfd_vma start, stop;
1356 
1357       if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE)
1358 	continue;
1359 
1360       start = irel->r_offset;
1361 
1362       for (irel++; irel < irelend; irel++)
1363 	if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_DATA)
1364 	  break;
1365       if (irel < irelend)
1366 	stop = irel->r_offset;
1367       else
1368 	stop = sec->size;
1369 
1370       if (! _bfd_sh_align_load_span (abfd, sec, contents, sh_elf_swap_insns,
1371 				     internal_relocs, &label,
1372 				     label_end, start, stop, pswapped))
1373 	goto error_return;
1374     }
1375 
1376   free (labels);
1377 
1378   return true;
1379 
1380  error_return:
1381   free (labels);
1382   return false;
1383 }
1384 
1385 /* Swap two SH instructions.  This is like sh_swap_insns in coff-sh.c.  */
1386 
1387 static bool
sh_elf_swap_insns(bfd * abfd,asection * sec,void * relocs,bfd_byte * contents,bfd_vma addr)1388 sh_elf_swap_insns (bfd *abfd, asection *sec, void *relocs,
1389 		   bfd_byte *contents, bfd_vma addr)
1390 {
1391   Elf_Internal_Rela *internal_relocs = (Elf_Internal_Rela *) relocs;
1392   unsigned short i1, i2;
1393   Elf_Internal_Rela *irel, *irelend;
1394 
1395   /* Swap the instructions themselves.  */
1396   i1 = bfd_get_16 (abfd, contents + addr);
1397   i2 = bfd_get_16 (abfd, contents + addr + 2);
1398   bfd_put_16 (abfd, (bfd_vma) i2, contents + addr);
1399   bfd_put_16 (abfd, (bfd_vma) i1, contents + addr + 2);
1400 
1401   /* Adjust all reloc addresses.  */
1402   irelend = internal_relocs + sec->reloc_count;
1403   for (irel = internal_relocs; irel < irelend; irel++)
1404     {
1405       enum elf_sh_reloc_type type;
1406       int add;
1407 
1408       /* There are a few special types of relocs that we don't want to
1409 	 adjust.  These relocs do not apply to the instruction itself,
1410 	 but are only associated with the address.  */
1411       type = (enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info);
1412       if (type == R_SH_ALIGN
1413 	  || type == R_SH_CODE
1414 	  || type == R_SH_DATA
1415 	  || type == R_SH_LABEL)
1416 	continue;
1417 
1418       /* If an R_SH_USES reloc points to one of the addresses being
1419 	 swapped, we must adjust it.  It would be incorrect to do this
1420 	 for a jump, though, since we want to execute both
1421 	 instructions after the jump.  (We have avoided swapping
1422 	 around a label, so the jump will not wind up executing an
1423 	 instruction it shouldn't).  */
1424       if (type == R_SH_USES)
1425 	{
1426 	  bfd_vma off;
1427 
1428 	  off = irel->r_offset + 4 + irel->r_addend;
1429 	  if (off == addr)
1430 	    irel->r_offset += 2;
1431 	  else if (off == addr + 2)
1432 	    irel->r_offset -= 2;
1433 	}
1434 
1435       if (irel->r_offset == addr)
1436 	{
1437 	  irel->r_offset += 2;
1438 	  add = -2;
1439 	}
1440       else if (irel->r_offset == addr + 2)
1441 	{
1442 	  irel->r_offset -= 2;
1443 	  add = 2;
1444 	}
1445       else
1446 	add = 0;
1447 
1448       if (add != 0)
1449 	{
1450 	  bfd_byte *loc;
1451 	  unsigned short insn, oinsn;
1452 	  bool overflow;
1453 
1454 	  loc = contents + irel->r_offset;
1455 	  overflow = false;
1456 	  switch (type)
1457 	    {
1458 	    default:
1459 	      break;
1460 
1461 	    case R_SH_DIR8WPN:
1462 	    case R_SH_DIR8WPZ:
1463 	      insn = bfd_get_16 (abfd, loc);
1464 	      oinsn = insn;
1465 	      insn += add / 2;
1466 	      if ((oinsn & 0xff00) != (insn & 0xff00))
1467 		overflow = true;
1468 	      bfd_put_16 (abfd, (bfd_vma) insn, loc);
1469 	      break;
1470 
1471 	    case R_SH_IND12W:
1472 	      insn = bfd_get_16 (abfd, loc);
1473 	      oinsn = insn;
1474 	      insn += add / 2;
1475 	      if ((oinsn & 0xf000) != (insn & 0xf000))
1476 		overflow = true;
1477 	      bfd_put_16 (abfd, (bfd_vma) insn, loc);
1478 	      break;
1479 
1480 	    case R_SH_DIR8WPL:
1481 	      /* This reloc ignores the least significant 3 bits of
1482 		 the program counter before adding in the offset.
1483 		 This means that if ADDR is at an even address, the
1484 		 swap will not affect the offset.  If ADDR is an at an
1485 		 odd address, then the instruction will be crossing a
1486 		 four byte boundary, and must be adjusted.  */
1487 	      if ((addr & 3) != 0)
1488 		{
1489 		  insn = bfd_get_16 (abfd, loc);
1490 		  oinsn = insn;
1491 		  insn += add / 2;
1492 		  if ((oinsn & 0xff00) != (insn & 0xff00))
1493 		    overflow = true;
1494 		  bfd_put_16 (abfd, (bfd_vma) insn, loc);
1495 		}
1496 
1497 	      break;
1498 	    }
1499 
1500 	  if (overflow)
1501 	    {
1502 	      _bfd_error_handler
1503 		/* xgettext:c-format */
1504 		(_("%pB: %#" PRIx64 ": fatal: reloc overflow while relaxing"),
1505 		 abfd, (uint64_t) irel->r_offset);
1506 	      bfd_set_error (bfd_error_bad_value);
1507 	      return false;
1508 	    }
1509 	}
1510     }
1511 
1512   return true;
1513 }
1514 
1515 /* Describes one of the various PLT styles.  */
1516 
1517 struct elf_sh_plt_info
1518 {
1519   /* The template for the first PLT entry, or NULL if there is no special
1520      first entry.  */
1521   const bfd_byte *plt0_entry;
1522 
1523   /* The size of PLT0_ENTRY in bytes, or 0 if PLT0_ENTRY is NULL.  */
1524   bfd_vma plt0_entry_size;
1525 
1526   /* Index I is the offset into PLT0_ENTRY of a pointer to
1527      _GLOBAL_OFFSET_TABLE_ + I * 4.  The value is MINUS_ONE
1528      if there is no such pointer.  */
1529   bfd_vma plt0_got_fields[3];
1530 
1531   /* The template for a symbol's PLT entry.  */
1532   const bfd_byte *symbol_entry;
1533 
1534   /* The size of SYMBOL_ENTRY in bytes.  */
1535   bfd_vma symbol_entry_size;
1536 
1537   /* Byte offsets of fields in SYMBOL_ENTRY.  Not all fields are used
1538      on all targets.  The comments by each member indicate the value
1539      that the field must hold.  */
1540   struct {
1541     bfd_vma got_entry; /* the address of the symbol's .got.plt entry */
1542     bfd_vma plt; /* .plt (or a branch to .plt on VxWorks) */
1543     bfd_vma reloc_offset; /* the offset of the symbol's JMP_SLOT reloc */
1544     bool got20; /* TRUE if got_entry points to a movi20 instruction
1545 		   (instead of a constant pool entry).  */
1546   } symbol_fields;
1547 
1548   /* The offset of the resolver stub from the start of SYMBOL_ENTRY.  */
1549   bfd_vma symbol_resolve_offset;
1550 
1551   /* A different PLT layout which can be used for the first
1552      MAX_SHORT_PLT entries.  It must share the same plt0.  NULL in
1553      other cases.  */
1554   const struct elf_sh_plt_info *short_plt;
1555 };
1556 
1557 /* The size in bytes of an entry in the procedure linkage table.  */
1558 
1559 #define ELF_PLT_ENTRY_SIZE 28
1560 
1561 /* First entry in an absolute procedure linkage table look like this.  */
1562 
1563 /* Note - this code has been "optimised" not to use r2.  r2 is used by
1564    GCC to return the address of large structures, so it should not be
1565    corrupted here.  This does mean however, that this PLT does not conform
1566    to the SH PIC ABI.  That spec says that r0 contains the type of the PLT
1567    and r2 contains the GOT id.  This version stores the GOT id in r0 and
1568    ignores the type.  Loaders can easily detect this difference however,
1569    since the type will always be 0 or 8, and the GOT ids will always be
1570    greater than or equal to 12.  */
1571 static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
1572 {
1573   0xd0, 0x05,	/* mov.l 2f,r0 */
1574   0x60, 0x02,	/* mov.l @r0,r0 */
1575   0x2f, 0x06,	/* mov.l r0,@-r15 */
1576   0xd0, 0x03,	/* mov.l 1f,r0 */
1577   0x60, 0x02,	/* mov.l @r0,r0 */
1578   0x40, 0x2b,	/* jmp @r0 */
1579   0x60, 0xf6,	/*  mov.l @r15+,r0 */
1580   0x00, 0x09,	/* nop */
1581   0x00, 0x09,	/* nop */
1582   0x00, 0x09,	/* nop */
1583   0, 0, 0, 0,	/* 1: replaced with address of .got.plt + 8.  */
1584   0, 0, 0, 0,	/* 2: replaced with address of .got.plt + 4.  */
1585 };
1586 
1587 static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
1588 {
1589   0x05, 0xd0,	/* mov.l 2f,r0 */
1590   0x02, 0x60,	/* mov.l @r0,r0 */
1591   0x06, 0x2f,	/* mov.l r0,@-r15 */
1592   0x03, 0xd0,	/* mov.l 1f,r0 */
1593   0x02, 0x60,	/* mov.l @r0,r0 */
1594   0x2b, 0x40,	/* jmp @r0 */
1595   0xf6, 0x60,	/*  mov.l @r15+,r0 */
1596   0x09, 0x00,	/* nop */
1597   0x09, 0x00,	/* nop */
1598   0x09, 0x00,	/* nop */
1599   0, 0, 0, 0,	/* 1: replaced with address of .got.plt + 8.  */
1600   0, 0, 0, 0,	/* 2: replaced with address of .got.plt + 4.  */
1601 };
1602 
1603 /* Sebsequent entries in an absolute procedure linkage table look like
1604    this.  */
1605 
1606 static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
1607 {
1608   0xd0, 0x04,	/* mov.l 1f,r0 */
1609   0x60, 0x02,	/* mov.l @(r0,r12),r0 */
1610   0xd1, 0x02,	/* mov.l 0f,r1 */
1611   0x40, 0x2b,   /* jmp @r0 */
1612   0x60, 0x13,	/*  mov r1,r0 */
1613   0xd1, 0x03,	/* mov.l 2f,r1 */
1614   0x40, 0x2b,	/* jmp @r0 */
1615   0x00, 0x09,	/* nop */
1616   0, 0, 0, 0,	/* 0: replaced with address of .PLT0.  */
1617   0, 0, 0, 0,	/* 1: replaced with address of this symbol in .got.  */
1618   0, 0, 0, 0,	/* 2: replaced with offset into relocation table.  */
1619 };
1620 
1621 static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
1622 {
1623   0x04, 0xd0,	/* mov.l 1f,r0 */
1624   0x02, 0x60,	/* mov.l @r0,r0 */
1625   0x02, 0xd1,	/* mov.l 0f,r1 */
1626   0x2b, 0x40,   /* jmp @r0 */
1627   0x13, 0x60,	/*  mov r1,r0 */
1628   0x03, 0xd1,	/* mov.l 2f,r1 */
1629   0x2b, 0x40,	/* jmp @r0 */
1630   0x09, 0x00,	/*  nop */
1631   0, 0, 0, 0,	/* 0: replaced with address of .PLT0.  */
1632   0, 0, 0, 0,	/* 1: replaced with address of this symbol in .got.  */
1633   0, 0, 0, 0,	/* 2: replaced with offset into relocation table.  */
1634 };
1635 
1636 /* Entries in a PIC procedure linkage table look like this.  */
1637 
1638 static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
1639 {
1640   0xd0, 0x04,	/* mov.l 1f,r0 */
1641   0x00, 0xce,	/* mov.l @(r0,r12),r0 */
1642   0x40, 0x2b,	/* jmp @r0 */
1643   0x00, 0x09,	/*  nop */
1644   0x50, 0xc2,	/* mov.l @(8,r12),r0 */
1645   0xd1, 0x03,	/* mov.l 2f,r1 */
1646   0x40, 0x2b,	/* jmp @r0 */
1647   0x50, 0xc1,	/*  mov.l @(4,r12),r0 */
1648   0x00, 0x09,	/* nop */
1649   0x00, 0x09,	/* nop */
1650   0, 0, 0, 0,	/* 1: replaced with address of this symbol in .got.  */
1651   0, 0, 0, 0    /* 2: replaced with offset into relocation table.  */
1652 };
1653 
1654 static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
1655 {
1656   0x04, 0xd0,	/* mov.l 1f,r0 */
1657   0xce, 0x00,	/* mov.l @(r0,r12),r0 */
1658   0x2b, 0x40,	/* jmp @r0 */
1659   0x09, 0x00,	/*  nop */
1660   0xc2, 0x50,	/* mov.l @(8,r12),r0 */
1661   0x03, 0xd1,	/* mov.l 2f,r1 */
1662   0x2b, 0x40,	/* jmp @r0 */
1663   0xc1, 0x50,	/*  mov.l @(4,r12),r0 */
1664   0x09, 0x00,	/*  nop */
1665   0x09, 0x00,	/* nop */
1666   0, 0, 0, 0,	/* 1: replaced with address of this symbol in .got.  */
1667   0, 0, 0, 0    /* 2: replaced with offset into relocation table.  */
1668 };
1669 
1670 static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1671   {
1672     {
1673       /* Big-endian non-PIC.  */
1674       elf_sh_plt0_entry_be,
1675       ELF_PLT_ENTRY_SIZE,
1676       { MINUS_ONE, 24, 20 },
1677       elf_sh_plt_entry_be,
1678       ELF_PLT_ENTRY_SIZE,
1679       { 20, 16, 24, false },
1680       8,
1681       NULL
1682     },
1683     {
1684       /* Little-endian non-PIC.  */
1685       elf_sh_plt0_entry_le,
1686       ELF_PLT_ENTRY_SIZE,
1687       { MINUS_ONE, 24, 20 },
1688       elf_sh_plt_entry_le,
1689       ELF_PLT_ENTRY_SIZE,
1690       { 20, 16, 24, false },
1691       8,
1692       NULL
1693     },
1694   },
1695   {
1696     {
1697       /* Big-endian PIC.  */
1698       elf_sh_plt0_entry_be,
1699       ELF_PLT_ENTRY_SIZE,
1700       { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1701       elf_sh_pic_plt_entry_be,
1702       ELF_PLT_ENTRY_SIZE,
1703       { 20, MINUS_ONE, 24, false },
1704       8,
1705       NULL
1706     },
1707     {
1708       /* Little-endian PIC.  */
1709       elf_sh_plt0_entry_le,
1710       ELF_PLT_ENTRY_SIZE,
1711       { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1712       elf_sh_pic_plt_entry_le,
1713       ELF_PLT_ENTRY_SIZE,
1714       { 20, MINUS_ONE, 24, false },
1715       8,
1716       NULL
1717     },
1718   }
1719 };
1720 
1721 #define VXWORKS_PLT_HEADER_SIZE 12
1722 #define VXWORKS_PLT_ENTRY_SIZE 24
1723 
1724 static const bfd_byte vxworks_sh_plt0_entry_be[VXWORKS_PLT_HEADER_SIZE] =
1725 {
1726   0xd1, 0x01,	/* mov.l @(8,pc),r1 */
1727   0x61, 0x12,	/* mov.l @r1,r1 */
1728   0x41, 0x2b,	/* jmp @r1 */
1729   0x00, 0x09,	/* nop */
1730   0, 0, 0, 0	/* 0: replaced with _GLOBAL_OFFSET_TABLE+8.  */
1731 };
1732 
1733 static const bfd_byte vxworks_sh_plt0_entry_le[VXWORKS_PLT_HEADER_SIZE] =
1734 {
1735   0x01, 0xd1,	/* mov.l @(8,pc),r1 */
1736   0x12, 0x61,	/* mov.l @r1,r1 */
1737   0x2b, 0x41,	/* jmp @r1 */
1738   0x09, 0x00,	/* nop */
1739   0, 0, 0, 0	/* 0: replaced with _GLOBAL_OFFSET_TABLE+8.  */
1740 };
1741 
1742 static const bfd_byte vxworks_sh_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
1743 {
1744   0xd0, 0x01,	/* mov.l @(8,pc),r0 */
1745   0x60, 0x02,	/* mov.l @r0,r0 */
1746   0x40, 0x2b,	/* jmp @r0 */
1747   0x00, 0x09,	/* nop */
1748   0, 0, 0, 0,	/* 0: replaced with address of this symbol in .got.  */
1749   0xd0, 0x01,	/* mov.l @(8,pc),r0 */
1750   0xa0, 0x00,	/* bra PLT (We need to fix the offset.)  */
1751   0x00, 0x09,	/* nop */
1752   0x00, 0x09,	/* nop */
1753   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1754 };
1755 
1756 static const bfd_byte vxworks_sh_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
1757 {
1758   0x01, 0xd0,	/* mov.l @(8,pc),r0 */
1759   0x02, 0x60,	/* mov.l @r0,r0 */
1760   0x2b, 0x40,	/* jmp @r0 */
1761   0x09, 0x00,	/* nop */
1762   0, 0, 0, 0,	/* 0: replaced with address of this symbol in .got.  */
1763   0x01, 0xd0,	/* mov.l @(8,pc),r0 */
1764   0x00, 0xa0,	/* bra PLT (We need to fix the offset.)  */
1765   0x09, 0x00,	/* nop */
1766   0x09, 0x00,	/* nop */
1767   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1768 };
1769 
1770 static const bfd_byte vxworks_sh_pic_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
1771 {
1772   0xd0, 0x01,	/* mov.l @(8,pc),r0 */
1773   0x00, 0xce,	/* mov.l @(r0,r12),r0 */
1774   0x40, 0x2b,	/* jmp @r0 */
1775   0x00, 0x09,	/* nop */
1776   0, 0, 0, 0,	/* 0: replaced with offset of this symbol in .got.  */
1777   0xd0, 0x01,	/* mov.l @(8,pc),r0 */
1778   0x51, 0xc2,	/* mov.l @(8,r12),r1 */
1779   0x41, 0x2b,	/* jmp @r1 */
1780   0x00, 0x09,	/* nop */
1781   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1782 };
1783 
1784 static const bfd_byte vxworks_sh_pic_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
1785 {
1786   0x01, 0xd0,	/* mov.l @(8,pc),r0 */
1787   0xce, 0x00,	/* mov.l @(r0,r12),r0 */
1788   0x2b, 0x40,	/* jmp @r0 */
1789   0x09, 0x00,	/* nop */
1790   0, 0, 0, 0,	/* 0: replaced with offset of this symbol in .got.  */
1791   0x01, 0xd0,	/* mov.l @(8,pc),r0 */
1792   0xc2, 0x51,	/* mov.l @(8,r12),r1 */
1793   0x2b, 0x41,	/* jmp @r1 */
1794   0x09, 0x00,	/* nop */
1795   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1796 };
1797 
1798 static const struct elf_sh_plt_info vxworks_sh_plts[2][2] = {
1799   {
1800     {
1801       /* Big-endian non-PIC.  */
1802       vxworks_sh_plt0_entry_be,
1803       VXWORKS_PLT_HEADER_SIZE,
1804       { MINUS_ONE, MINUS_ONE, 8 },
1805       vxworks_sh_plt_entry_be,
1806       VXWORKS_PLT_ENTRY_SIZE,
1807       { 8, 14, 20, false },
1808       12,
1809       NULL
1810     },
1811     {
1812       /* Little-endian non-PIC.  */
1813       vxworks_sh_plt0_entry_le,
1814       VXWORKS_PLT_HEADER_SIZE,
1815       { MINUS_ONE, MINUS_ONE, 8 },
1816       vxworks_sh_plt_entry_le,
1817       VXWORKS_PLT_ENTRY_SIZE,
1818       { 8, 14, 20, false },
1819       12,
1820       NULL
1821     },
1822   },
1823   {
1824     {
1825       /* Big-endian PIC.  */
1826       NULL,
1827       0,
1828       { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1829       vxworks_sh_pic_plt_entry_be,
1830       VXWORKS_PLT_ENTRY_SIZE,
1831       { 8, MINUS_ONE, 20, false },
1832       12,
1833       NULL
1834     },
1835     {
1836       /* Little-endian PIC.  */
1837       NULL,
1838       0,
1839       { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1840       vxworks_sh_pic_plt_entry_le,
1841       VXWORKS_PLT_ENTRY_SIZE,
1842       { 8, MINUS_ONE, 20, false },
1843       12,
1844       NULL
1845     },
1846   }
1847 };
1848 
1849 /* FDPIC PLT entries.  Two unimplemented optimizations for lazy
1850    binding are to omit the lazy binding stub when linking with -z now
1851    and to move lazy binding stubs into a separate region for better
1852    cache behavior.  */
1853 
1854 #define FDPIC_PLT_ENTRY_SIZE 28
1855 #define FDPIC_PLT_LAZY_OFFSET 20
1856 
1857 /* FIXME: The lazy binding stub requires a plt0 - which may need to be
1858    duplicated if it is out of range, or which can be inlined.  So
1859    right now it is always inlined, which wastes a word per stub.  It
1860    might be easier to handle the duplication if we put the lazy
1861    stubs separately.  */
1862 
1863 static const bfd_byte fdpic_sh_plt_entry_be[FDPIC_PLT_ENTRY_SIZE] =
1864 {
1865   0xd0, 0x02,	/* mov.l @(12,pc),r0 */
1866   0x01, 0xce,	/* mov.l @(r0,r12),r1 */
1867   0x70, 0x04,	/* add #4, r0 */
1868   0x41, 0x2b,	/* jmp @r1 */
1869   0x0c, 0xce,	/* mov.l @(r0,r12),r12 */
1870   0x00, 0x09,	/* nop */
1871   0, 0, 0, 0,	/* 0: replaced with offset of this symbol's funcdesc */
1872   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1873   0x60, 0xc2,	/* mov.l @r12,r0 */
1874   0x40, 0x2b,	/* jmp @r0 */
1875   0x53, 0xc1,	/*  mov.l @(4,r12),r3 */
1876   0x00, 0x09,	/* nop */
1877 };
1878 
1879 static const bfd_byte fdpic_sh_plt_entry_le[FDPIC_PLT_ENTRY_SIZE] =
1880 {
1881   0x02, 0xd0,	/* mov.l @(12,pc),r0 */
1882   0xce, 0x01,	/* mov.l @(r0,r12),r1 */
1883   0x04, 0x70,	/* add #4, r0 */
1884   0x2b, 0x41,	/* jmp @r1 */
1885   0xce, 0x0c,	/* mov.l @(r0,r12),r12 */
1886   0x09, 0x00,	/* nop */
1887   0, 0, 0, 0,	/* 0: replaced with offset of this symbol's funcdesc */
1888   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1889   0xc2, 0x60,	/* mov.l @r12,r0 */
1890   0x2b, 0x40,	/* jmp @r0 */
1891   0xc1, 0x53,	/*  mov.l @(4,r12),r3 */
1892   0x09, 0x00,	/* nop */
1893 };
1894 
1895 static const struct elf_sh_plt_info fdpic_sh_plts[2] = {
1896   {
1897     /* Big-endian PIC.  */
1898     NULL,
1899     0,
1900     { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1901     fdpic_sh_plt_entry_be,
1902     FDPIC_PLT_ENTRY_SIZE,
1903     { 12, MINUS_ONE, 16, false },
1904     FDPIC_PLT_LAZY_OFFSET,
1905     NULL
1906   },
1907   {
1908     /* Little-endian PIC.  */
1909     NULL,
1910     0,
1911     { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1912     fdpic_sh_plt_entry_le,
1913     FDPIC_PLT_ENTRY_SIZE,
1914     { 12, MINUS_ONE, 16, false },
1915     FDPIC_PLT_LAZY_OFFSET,
1916     NULL
1917   },
1918 };
1919 
1920 /* On SH2A, we can use the movi20 instruction to generate shorter PLT
1921    entries for the first 64K slots.  We use the normal FDPIC PLT entry
1922    past that point; we could also use movi20s, which might be faster,
1923    but would not be any smaller.  */
1924 
1925 #define FDPIC_SH2A_PLT_ENTRY_SIZE 24
1926 #define FDPIC_SH2A_PLT_LAZY_OFFSET 16
1927 
1928 static const bfd_byte fdpic_sh2a_plt_entry_be[FDPIC_SH2A_PLT_ENTRY_SIZE] =
1929 {
1930   0, 0, 0, 0,	/* movi20 #gotofffuncdesc,r0 */
1931   0x01, 0xce,	/* mov.l @(r0,r12),r1 */
1932   0x70, 0x04,	/* add #4, r0 */
1933   0x41, 0x2b,	/* jmp @r1 */
1934   0x0c, 0xce,	/* mov.l @(r0,r12),r12 */
1935   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1936   0x60, 0xc2,	/* mov.l @r12,r0 */
1937   0x40, 0x2b,	/* jmp @r0 */
1938   0x53, 0xc1,	/*  mov.l @(4,r12),r3 */
1939   0x00, 0x09,	/* nop */
1940 };
1941 
1942 static const bfd_byte fdpic_sh2a_plt_entry_le[FDPIC_SH2A_PLT_ENTRY_SIZE] =
1943 {
1944   0, 0, 0, 0,	/* movi20 #gotofffuncdesc,r0 */
1945   0xce, 0x01,	/* mov.l @(r0,r12),r1 */
1946   0x04, 0x70,	/* add #4, r0 */
1947   0x2b, 0x41,	/* jmp @r1 */
1948   0xce, 0x0c,	/* mov.l @(r0,r12),r12 */
1949   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1950   0xc2, 0x60,	/* mov.l @r12,r0 */
1951   0x2b, 0x40,	/* jmp @r0 */
1952   0xc1, 0x53,	/*  mov.l @(4,r12),r3 */
1953   0x09, 0x00,	/* nop */
1954 };
1955 
1956 static const struct elf_sh_plt_info fdpic_sh2a_short_plt_be = {
1957   /* Big-endian FDPIC, max index 64K.  */
1958   NULL,
1959   0,
1960   { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1961   fdpic_sh2a_plt_entry_be,
1962   FDPIC_SH2A_PLT_ENTRY_SIZE,
1963   { 0, MINUS_ONE, 12, true },
1964   FDPIC_SH2A_PLT_LAZY_OFFSET,
1965   NULL
1966 };
1967 
1968 static const struct elf_sh_plt_info fdpic_sh2a_short_plt_le = {
1969   /* Little-endian FDPIC, max index 64K.  */
1970   NULL,
1971   0,
1972   { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1973   fdpic_sh2a_plt_entry_le,
1974   FDPIC_SH2A_PLT_ENTRY_SIZE,
1975   { 0, MINUS_ONE, 12, true },
1976   FDPIC_SH2A_PLT_LAZY_OFFSET,
1977   NULL
1978 };
1979 
1980 static const struct elf_sh_plt_info fdpic_sh2a_plts[2] = {
1981   {
1982     /* Big-endian PIC.  */
1983     NULL,
1984     0,
1985     { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1986     fdpic_sh_plt_entry_be,
1987     FDPIC_PLT_ENTRY_SIZE,
1988     { 12, MINUS_ONE, 16, false },
1989     FDPIC_PLT_LAZY_OFFSET,
1990     &fdpic_sh2a_short_plt_be
1991   },
1992   {
1993     /* Little-endian PIC.  */
1994     NULL,
1995     0,
1996     { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1997     fdpic_sh_plt_entry_le,
1998     FDPIC_PLT_ENTRY_SIZE,
1999     { 12, MINUS_ONE, 16, false },
2000     FDPIC_PLT_LAZY_OFFSET,
2001     &fdpic_sh2a_short_plt_le
2002   },
2003 };
2004 
2005 /* Return the type of PLT associated with ABFD.  PIC_P is true if
2006    the object is position-independent.  */
2007 
2008 static const struct elf_sh_plt_info *
get_plt_info(bfd * abfd,bool pic_p)2009 get_plt_info (bfd *abfd, bool pic_p)
2010 {
2011   if (fdpic_object_p (abfd))
2012     {
2013       /* If any input file requires SH2A we can use a shorter PLT
2014 	 sequence.  */
2015       if (sh_get_arch_from_bfd_mach (bfd_get_mach (abfd)) & arch_sh2a_base)
2016 	return &fdpic_sh2a_plts[!bfd_big_endian (abfd)];
2017       else
2018 	return &fdpic_sh_plts[!bfd_big_endian (abfd)];
2019     }
2020   if (vxworks_object_p (abfd))
2021     return &vxworks_sh_plts[pic_p][!bfd_big_endian (abfd)];
2022   return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
2023 }
2024 
2025 /* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
2026    VALUE is the field's value and CODE_P is true if VALUE refers to code,
2027    not data.  */
2028 
2029 inline static void
install_plt_field(bfd * output_bfd,bool code_p ATTRIBUTE_UNUSED,unsigned long value,bfd_byte * addr)2030 install_plt_field (bfd *output_bfd, bool code_p ATTRIBUTE_UNUSED,
2031 		   unsigned long value, bfd_byte *addr)
2032 {
2033   bfd_put_32 (output_bfd, value, addr);
2034 }
2035 
2036 /* The number of PLT entries which can use a shorter PLT, if any.
2037    Currently always 64K, since only SH-2A FDPIC uses this; a
2038    20-bit movi20 can address that many function descriptors below
2039    _GLOBAL_OFFSET_TABLE_.  */
2040 #define MAX_SHORT_PLT 65536
2041 
2042 /* Return the index of the PLT entry at byte offset OFFSET.  */
2043 
2044 static bfd_vma
get_plt_index(const struct elf_sh_plt_info * info,bfd_vma offset)2045 get_plt_index (const struct elf_sh_plt_info *info, bfd_vma offset)
2046 {
2047   bfd_vma plt_index = 0;
2048 
2049   offset -= info->plt0_entry_size;
2050   if (info->short_plt != NULL)
2051     {
2052       if (offset > MAX_SHORT_PLT * info->short_plt->symbol_entry_size)
2053 	{
2054 	  plt_index = MAX_SHORT_PLT;
2055 	  offset -= MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2056 	}
2057       else
2058 	info = info->short_plt;
2059     }
2060   return plt_index + offset / info->symbol_entry_size;
2061 }
2062 
2063 /* Do the inverse operation.  */
2064 
2065 static bfd_vma
get_plt_offset(const struct elf_sh_plt_info * info,bfd_vma plt_index)2066 get_plt_offset (const struct elf_sh_plt_info *info, bfd_vma plt_index)
2067 {
2068   bfd_vma offset = 0;
2069 
2070   if (info->short_plt != NULL)
2071     {
2072       if (plt_index > MAX_SHORT_PLT)
2073 	{
2074 	  offset = MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2075 	  plt_index -= MAX_SHORT_PLT;
2076 	}
2077       else
2078 	info = info->short_plt;
2079     }
2080   return (offset + info->plt0_entry_size
2081 	  + (plt_index * info->symbol_entry_size));
2082 }
2083 
2084 union gotref
2085 {
2086   bfd_signed_vma refcount;
2087   bfd_vma offset;
2088 };
2089 
2090 /* sh ELF linker hash entry.  */
2091 
2092 struct elf_sh_link_hash_entry
2093 {
2094   struct elf_link_hash_entry root;
2095 
2096   bfd_signed_vma gotplt_refcount;
2097 
2098   /* A local function descriptor, for FDPIC.  The refcount counts
2099      R_SH_FUNCDESC, R_SH_GOTOFFFUNCDESC, and R_SH_GOTOFFFUNCDESC20
2100      relocations; the PLT and GOT entry are accounted
2101      for separately.  After adjust_dynamic_symbol, the offset is
2102      MINUS_ONE if there is no local descriptor (dynamic linker
2103      managed and no PLT entry, or undefined weak non-dynamic).
2104      During check_relocs we do not yet know whether the local
2105      descriptor will be canonical.  */
2106   union gotref funcdesc;
2107 
2108   /* How many of the above refcounted relocations were R_SH_FUNCDESC,
2109      and thus require fixups or relocations.  */
2110   bfd_signed_vma abs_funcdesc_refcount;
2111 
2112   enum got_type {
2113     GOT_UNKNOWN = 0, GOT_NORMAL, GOT_TLS_GD, GOT_TLS_IE, GOT_FUNCDESC
2114   } got_type;
2115 };
2116 
2117 #define sh_elf_hash_entry(ent) ((struct elf_sh_link_hash_entry *)(ent))
2118 
2119 struct sh_elf_obj_tdata
2120 {
2121   struct elf_obj_tdata root;
2122 
2123   /* got_type for each local got entry.  */
2124   char *local_got_type;
2125 
2126   /* Function descriptor refcount and offset for each local symbol.  */
2127   union gotref *local_funcdesc;
2128 };
2129 
2130 #define sh_elf_tdata(abfd) \
2131   ((struct sh_elf_obj_tdata *) (abfd)->tdata.any)
2132 
2133 #define sh_elf_local_got_type(abfd) \
2134   (sh_elf_tdata (abfd)->local_got_type)
2135 
2136 #define sh_elf_local_funcdesc(abfd) \
2137   (sh_elf_tdata (abfd)->local_funcdesc)
2138 
2139 #define is_sh_elf(bfd) \
2140   (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2141    && elf_tdata (bfd) != NULL \
2142    && elf_object_id (bfd) == SH_ELF_DATA)
2143 
2144 /* Override the generic function because we need to store sh_elf_obj_tdata
2145    as the specific tdata.  */
2146 
2147 static bool
sh_elf_mkobject(bfd * abfd)2148 sh_elf_mkobject (bfd *abfd)
2149 {
2150   return bfd_elf_allocate_object (abfd, sizeof (struct sh_elf_obj_tdata),
2151 				  SH_ELF_DATA);
2152 }
2153 
2154 /* sh ELF linker hash table.  */
2155 
2156 struct elf_sh_link_hash_table
2157 {
2158   struct elf_link_hash_table root;
2159 
2160   /* Short-cuts to get to dynamic linker sections.  */
2161   asection *sfuncdesc;
2162   asection *srelfuncdesc;
2163   asection *srofixup;
2164 
2165   /* The (unloaded but important) VxWorks .rela.plt.unloaded section.  */
2166   asection *srelplt2;
2167 
2168   /* A counter or offset to track a TLS got entry.  */
2169   union
2170     {
2171       bfd_signed_vma refcount;
2172       bfd_vma offset;
2173     } tls_ldm_got;
2174 
2175   /* The type of PLT to use.  */
2176   const struct elf_sh_plt_info *plt_info;
2177 
2178   /* True if the target system uses FDPIC.  */
2179   bool fdpic_p;
2180 };
2181 
2182 /* Traverse an sh ELF linker hash table.  */
2183 
2184 #define sh_elf_link_hash_traverse(table, func, info)			\
2185   (elf_link_hash_traverse						\
2186    (&(table)->root,							\
2187     (bool (*) (struct elf_link_hash_entry *, void *)) (func),		\
2188     (info)))
2189 
2190 /* Get the sh ELF linker hash table from a link_info structure.  */
2191 
2192 #define sh_elf_hash_table(p) \
2193   ((is_elf_hash_table ((p)->hash)					\
2194     && elf_hash_table_id (elf_hash_table (p)) == SH_ELF_DATA)		\
2195    ? (struct elf_sh_link_hash_table *) (p)->hash : NULL)
2196 
2197 /* Create an entry in an sh ELF linker hash table.  */
2198 
2199 static struct bfd_hash_entry *
sh_elf_link_hash_newfunc(struct bfd_hash_entry * entry,struct bfd_hash_table * table,const char * string)2200 sh_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2201 			  struct bfd_hash_table *table,
2202 			  const char *string)
2203 {
2204   struct elf_sh_link_hash_entry *ret =
2205     (struct elf_sh_link_hash_entry *) entry;
2206 
2207   /* Allocate the structure if it has not already been allocated by a
2208      subclass.  */
2209   if (ret == (struct elf_sh_link_hash_entry *) NULL)
2210     ret = ((struct elf_sh_link_hash_entry *)
2211 	   bfd_hash_allocate (table,
2212 			      sizeof (struct elf_sh_link_hash_entry)));
2213   if (ret == (struct elf_sh_link_hash_entry *) NULL)
2214     return (struct bfd_hash_entry *) ret;
2215 
2216   /* Call the allocation method of the superclass.  */
2217   ret = ((struct elf_sh_link_hash_entry *)
2218 	 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
2219 				     table, string));
2220   if (ret != (struct elf_sh_link_hash_entry *) NULL)
2221     {
2222       ret->gotplt_refcount = 0;
2223       ret->funcdesc.refcount = 0;
2224       ret->abs_funcdesc_refcount = 0;
2225       ret->got_type = GOT_UNKNOWN;
2226     }
2227 
2228   return (struct bfd_hash_entry *) ret;
2229 }
2230 
2231 /* Create an sh ELF linker hash table.  */
2232 
2233 static struct bfd_link_hash_table *
sh_elf_link_hash_table_create(bfd * abfd)2234 sh_elf_link_hash_table_create (bfd *abfd)
2235 {
2236   struct elf_sh_link_hash_table *ret;
2237   size_t amt = sizeof (struct elf_sh_link_hash_table);
2238 
2239   ret = (struct elf_sh_link_hash_table *) bfd_zmalloc (amt);
2240   if (ret == (struct elf_sh_link_hash_table *) NULL)
2241     return NULL;
2242 
2243   if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
2244 				      sh_elf_link_hash_newfunc,
2245 				      sizeof (struct elf_sh_link_hash_entry),
2246 				      SH_ELF_DATA))
2247     {
2248       free (ret);
2249       return NULL;
2250     }
2251 
2252   if (fdpic_object_p (abfd))
2253     {
2254       ret->root.dt_pltgot_required = true;
2255       ret->fdpic_p = true;
2256     }
2257 
2258   return &ret->root.root;
2259 }
2260 
2261 static bool
sh_elf_omit_section_dynsym(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info,asection * p)2262 sh_elf_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
2263 			    struct bfd_link_info *info, asection *p)
2264 {
2265   struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
2266 
2267   /* Non-FDPIC binaries do not need dynamic symbols for sections.  */
2268   if (!htab->fdpic_p)
2269     return true;
2270 
2271   /* We need dynamic symbols for every section, since segments can
2272      relocate independently.  */
2273   switch (elf_section_data (p)->this_hdr.sh_type)
2274     {
2275     case SHT_PROGBITS:
2276     case SHT_NOBITS:
2277       /* If sh_type is yet undecided, assume it could be
2278 	 SHT_PROGBITS/SHT_NOBITS.  */
2279     case SHT_NULL:
2280       return false;
2281 
2282       /* There shouldn't be section relative relocations
2283 	 against any other section.  */
2284     default:
2285       return true;
2286     }
2287 }
2288 
2289 /* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
2290    shortcuts to them in our hash table.  */
2291 
2292 static bool
create_got_section(bfd * dynobj,struct bfd_link_info * info)2293 create_got_section (bfd *dynobj, struct bfd_link_info *info)
2294 {
2295   struct elf_sh_link_hash_table *htab;
2296 
2297   if (! _bfd_elf_create_got_section (dynobj, info))
2298     return false;
2299 
2300   htab = sh_elf_hash_table (info);
2301   if (htab == NULL)
2302     return false;
2303 
2304   htab->sfuncdesc = bfd_make_section_anyway_with_flags (dynobj, ".got.funcdesc",
2305 							(SEC_ALLOC | SEC_LOAD
2306 							 | SEC_HAS_CONTENTS
2307 							 | SEC_IN_MEMORY
2308 							 | SEC_LINKER_CREATED));
2309   if (htab->sfuncdesc == NULL
2310       || !bfd_set_section_alignment (htab->sfuncdesc, 2))
2311     return false;
2312 
2313   htab->srelfuncdesc = bfd_make_section_anyway_with_flags (dynobj,
2314 							   ".rela.got.funcdesc",
2315 							   (SEC_ALLOC | SEC_LOAD
2316 							    | SEC_HAS_CONTENTS
2317 							    | SEC_IN_MEMORY
2318 							    | SEC_LINKER_CREATED
2319 							    | SEC_READONLY));
2320   if (htab->srelfuncdesc == NULL
2321       || !bfd_set_section_alignment (htab->srelfuncdesc, 2))
2322     return false;
2323 
2324   /* Also create .rofixup.  */
2325   htab->srofixup = bfd_make_section_anyway_with_flags (dynobj, ".rofixup",
2326 						       (SEC_ALLOC | SEC_LOAD
2327 							| SEC_HAS_CONTENTS
2328 							| SEC_IN_MEMORY
2329 							| SEC_LINKER_CREATED
2330 							| SEC_READONLY));
2331   if (htab->srofixup == NULL
2332       || !bfd_set_section_alignment (htab->srofixup, 2))
2333     return false;
2334 
2335   return true;
2336 }
2337 
2338 /* Create dynamic sections when linking against a dynamic object.  */
2339 
2340 static bool
sh_elf_create_dynamic_sections(bfd * abfd,struct bfd_link_info * info)2341 sh_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2342 {
2343   struct elf_sh_link_hash_table *htab;
2344   flagword flags, pltflags;
2345   asection *s;
2346   const struct elf_backend_data *bed = get_elf_backend_data (abfd);
2347   int ptralign = 0;
2348 
2349   switch (bed->s->arch_size)
2350     {
2351     case 32:
2352       ptralign = 2;
2353       break;
2354 
2355     case 64:
2356       ptralign = 3;
2357       break;
2358 
2359     default:
2360       bfd_set_error (bfd_error_bad_value);
2361       return false;
2362     }
2363 
2364   htab = sh_elf_hash_table (info);
2365   if (htab == NULL)
2366     return false;
2367 
2368   if (htab->root.dynamic_sections_created)
2369     return true;
2370 
2371   /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
2372      .rel[a].bss sections.  */
2373 
2374   flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2375 	   | SEC_LINKER_CREATED);
2376 
2377   pltflags = flags;
2378   pltflags |= SEC_CODE;
2379   if (bed->plt_not_loaded)
2380     pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
2381   if (bed->plt_readonly)
2382     pltflags |= SEC_READONLY;
2383 
2384   s = bfd_make_section_anyway_with_flags (abfd, ".plt", pltflags);
2385   htab->root.splt = s;
2386   if (s == NULL
2387       || !bfd_set_section_alignment (s, bed->plt_alignment))
2388     return false;
2389 
2390   if (bed->want_plt_sym)
2391     {
2392       /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
2393 	 .plt section.  */
2394       struct elf_link_hash_entry *h;
2395       struct bfd_link_hash_entry *bh = NULL;
2396 
2397       if (! (_bfd_generic_link_add_one_symbol
2398 	     (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
2399 	      (bfd_vma) 0, (const char *) NULL, false,
2400 	      get_elf_backend_data (abfd)->collect, &bh)))
2401 	return false;
2402 
2403       h = (struct elf_link_hash_entry *) bh;
2404       h->def_regular = 1;
2405       h->type = STT_OBJECT;
2406       htab->root.hplt = h;
2407 
2408       if (bfd_link_pic (info)
2409 	  && ! bfd_elf_link_record_dynamic_symbol (info, h))
2410 	return false;
2411     }
2412 
2413   s = bfd_make_section_anyway_with_flags (abfd,
2414 					  bed->default_use_rela_p
2415 					  ? ".rela.plt" : ".rel.plt",
2416 					  flags | SEC_READONLY);
2417   htab->root.srelplt = s;
2418   if (s == NULL
2419       || !bfd_set_section_alignment (s, ptralign))
2420     return false;
2421 
2422   if (htab->root.sgot == NULL
2423       && !create_got_section (abfd, info))
2424     return false;
2425 
2426   if (bed->want_dynbss)
2427     {
2428       /* The .dynbss section is a place to put symbols which are defined
2429 	 by dynamic objects, are referenced by regular objects, and are
2430 	 not functions.  We must allocate space for them in the process
2431 	 image and use a R_*_COPY reloc to tell the dynamic linker to
2432 	 initialize them at run time.  The linker script puts the .dynbss
2433 	 section into the .bss section of the final image.  */
2434       s = bfd_make_section_anyway_with_flags (abfd, ".dynbss",
2435 					      SEC_ALLOC | SEC_LINKER_CREATED);
2436       htab->root.sdynbss = s;
2437       if (s == NULL)
2438 	return false;
2439 
2440       /* The .rel[a].bss section holds copy relocs.  This section is not
2441 	 normally needed.  We need to create it here, though, so that the
2442 	 linker will map it to an output section.  We can't just create it
2443 	 only if we need it, because we will not know whether we need it
2444 	 until we have seen all the input files, and the first time the
2445 	 main linker code calls BFD after examining all the input files
2446 	 (size_dynamic_sections) the input sections have already been
2447 	 mapped to the output sections.  If the section turns out not to
2448 	 be needed, we can discard it later.  We will never need this
2449 	 section when generating a shared object, since they do not use
2450 	 copy relocs.  */
2451       if (! bfd_link_pic (info))
2452 	{
2453 	  s = bfd_make_section_anyway_with_flags (abfd,
2454 						  (bed->default_use_rela_p
2455 						   ? ".rela.bss" : ".rel.bss"),
2456 						  flags | SEC_READONLY);
2457 	  htab->root.srelbss = s;
2458 	  if (s == NULL
2459 	      || !bfd_set_section_alignment (s, ptralign))
2460 	    return false;
2461 	}
2462     }
2463 
2464   if (htab->root.target_os == is_vxworks)
2465     {
2466       if (!elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2467 	return false;
2468     }
2469 
2470   return true;
2471 }
2472 
2473 /* Adjust a symbol defined by a dynamic object and referenced by a
2474    regular object.  The current definition is in some section of the
2475    dynamic object, but we're not including those sections.  We have to
2476    change the definition to something the rest of the link can
2477    understand.  */
2478 
2479 static bool
sh_elf_adjust_dynamic_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * h)2480 sh_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
2481 			      struct elf_link_hash_entry *h)
2482 {
2483   struct elf_sh_link_hash_table *htab;
2484   asection *s;
2485 
2486   htab = sh_elf_hash_table (info);
2487   if (htab == NULL)
2488     return false;
2489 
2490   /* Make sure we know what is going on here.  */
2491   BFD_ASSERT (htab->root.dynobj != NULL
2492 	      && (h->needs_plt
2493 		  || h->type == STT_GNU_IFUNC
2494 		  || h->is_weakalias
2495 		  || (h->def_dynamic
2496 		      && h->ref_regular
2497 		      && !h->def_regular)));
2498 
2499   /* If this is a function, put it in the procedure linkage table.  We
2500      will fill in the contents of the procedure linkage table later,
2501      when we know the address of the .got section.  */
2502   if ((h->type == STT_FUNC || h->type == STT_GNU_IFUNC)
2503       || h->needs_plt)
2504     {
2505       if (h->plt.refcount <= 0
2506 	  || SYMBOL_CALLS_LOCAL (info, h)
2507 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2508 	      && h->root.type == bfd_link_hash_undefweak))
2509 	{
2510 	  /* This case can occur if we saw a PLT reloc in an input
2511 	     file, but the symbol was never referred to by a dynamic
2512 	     object.  In such a case, we don't actually need to build
2513 	     a procedure linkage table, and we can just do a REL32
2514 	     reloc instead.  */
2515 	  h->plt.offset = (bfd_vma) -1;
2516 	  h->needs_plt = 0;
2517 	}
2518 
2519       return true;
2520     }
2521   else
2522     h->plt.offset = (bfd_vma) -1;
2523 
2524   /* If this is a weak symbol, and there is a real definition, the
2525      processor independent code will have arranged for us to see the
2526      real definition first, and we can just use the same value.  */
2527   if (h->is_weakalias)
2528     {
2529       struct elf_link_hash_entry *def = weakdef (h);
2530       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2531       h->root.u.def.section = def->root.u.def.section;
2532       h->root.u.def.value = def->root.u.def.value;
2533       if (info->nocopyreloc)
2534 	h->non_got_ref = def->non_got_ref;
2535       return true;
2536     }
2537 
2538   /* This is a reference to a symbol defined by a dynamic object which
2539      is not a function.  */
2540 
2541   /* If we are creating a shared library, we must presume that the
2542      only references to the symbol are via the global offset table.
2543      For such cases we need not do anything here; the relocations will
2544      be handled correctly by relocate_section.  */
2545   if (bfd_link_pic (info))
2546     return true;
2547 
2548   /* If there are no references to this symbol that do not use the
2549      GOT, we don't need to generate a copy reloc.  */
2550   if (!h->non_got_ref)
2551     return true;
2552 
2553   /* If -z nocopyreloc was given, we won't generate them either.  */
2554   if (0 && info->nocopyreloc)
2555     {
2556       h->non_got_ref = 0;
2557       return true;
2558     }
2559 
2560   /* If we don't find any dynamic relocs in read-only sections, then
2561      we'll be keeping the dynamic relocs and avoiding the copy reloc.  */
2562   if (0 && !_bfd_elf_readonly_dynrelocs (h))
2563     {
2564       h->non_got_ref = 0;
2565       return true;
2566     }
2567 
2568   /* We must allocate the symbol in our .dynbss section, which will
2569      become part of the .bss section of the executable.  There will be
2570      an entry for this symbol in the .dynsym section.  The dynamic
2571      object will contain position independent code, so all references
2572      from the dynamic object to this symbol will go through the global
2573      offset table.  The dynamic linker will use the .dynsym entry to
2574      determine the address it must put in the global offset table, so
2575      both the dynamic object and the regular object will refer to the
2576      same memory location for the variable.  */
2577 
2578   s = htab->root.sdynbss;
2579   BFD_ASSERT (s != NULL);
2580 
2581   /* We must generate a R_SH_COPY reloc to tell the dynamic linker to
2582      copy the initial value out of the dynamic object and into the
2583      runtime process image.  We need to remember the offset into the
2584      .rela.bss section we are going to use.  */
2585   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
2586     {
2587       asection *srel;
2588 
2589       srel = htab->root.srelbss;
2590       BFD_ASSERT (srel != NULL);
2591       srel->size += sizeof (Elf32_External_Rela);
2592       h->needs_copy = 1;
2593     }
2594 
2595   return _bfd_elf_adjust_dynamic_copy (info, h, s);
2596 }
2597 
2598 /* Allocate space in .plt, .got and associated reloc sections for
2599    dynamic relocs.  */
2600 
2601 static bool
allocate_dynrelocs(struct elf_link_hash_entry * h,void * inf)2602 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
2603 {
2604   struct bfd_link_info *info;
2605   struct elf_sh_link_hash_table *htab;
2606   struct elf_sh_link_hash_entry *eh;
2607   struct elf_dyn_relocs *p;
2608 
2609   if (h->root.type == bfd_link_hash_indirect)
2610     return true;
2611 
2612   info = (struct bfd_link_info *) inf;
2613   htab = sh_elf_hash_table (info);
2614   if (htab == NULL)
2615     return false;
2616 
2617   eh = (struct elf_sh_link_hash_entry *) h;
2618   if ((h->got.refcount > 0
2619        || h->forced_local)
2620       && eh->gotplt_refcount > 0)
2621     {
2622       /* The symbol has been forced local, or we have some direct got refs,
2623 	 so treat all the gotplt refs as got refs. */
2624       h->got.refcount += eh->gotplt_refcount;
2625       if (h->plt.refcount >= eh->gotplt_refcount)
2626 	h->plt.refcount -= eh->gotplt_refcount;
2627     }
2628 
2629   if (htab->root.dynamic_sections_created
2630       && h->plt.refcount > 0
2631       && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2632 	  || h->root.type != bfd_link_hash_undefweak))
2633     {
2634       /* Make sure this symbol is output as a dynamic symbol.
2635 	 Undefined weak syms won't yet be marked as dynamic.  */
2636       if (h->dynindx == -1
2637 	  && !h->forced_local)
2638 	{
2639 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
2640 	    return false;
2641 	}
2642 
2643       if (bfd_link_pic (info)
2644 	  || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
2645 	{
2646 	  asection *s = htab->root.splt;
2647 	  const struct elf_sh_plt_info *plt_info;
2648 
2649 	  /* If this is the first .plt entry, make room for the special
2650 	     first entry.  */
2651 	  if (s->size == 0)
2652 	    s->size += htab->plt_info->plt0_entry_size;
2653 
2654 	  h->plt.offset = s->size;
2655 
2656 	  /* If this symbol is not defined in a regular file, and we are
2657 	     not generating a shared library, then set the symbol to this
2658 	     location in the .plt.  This is required to make function
2659 	     pointers compare as equal between the normal executable and
2660 	     the shared library.  Skip this for FDPIC, since the
2661 	     function's address will be the address of the canonical
2662 	     function descriptor.  */
2663 	  if (!htab->fdpic_p && !bfd_link_pic (info) && !h->def_regular)
2664 	    {
2665 	      h->root.u.def.section = s;
2666 	      h->root.u.def.value = h->plt.offset;
2667 	    }
2668 
2669 	  /* Make room for this entry.  */
2670 	  plt_info = htab->plt_info;
2671 	  if (plt_info->short_plt != NULL
2672 	      && (get_plt_index (plt_info->short_plt, s->size) < MAX_SHORT_PLT))
2673 	    plt_info = plt_info->short_plt;
2674 	  s->size += plt_info->symbol_entry_size;
2675 
2676 	  /* We also need to make an entry in the .got.plt section, which
2677 	     will be placed in the .got section by the linker script.  */
2678 	  if (!htab->fdpic_p)
2679 	    htab->root.sgotplt->size += 4;
2680 	  else
2681 	    htab->root.sgotplt->size += 8;
2682 
2683 	  /* We also need to make an entry in the .rel.plt section.  */
2684 	  htab->root.srelplt->size += sizeof (Elf32_External_Rela);
2685 
2686 	  if (htab->root.target_os == is_vxworks && !bfd_link_pic (info))
2687 	    {
2688 	      /* VxWorks executables have a second set of relocations
2689 		 for each PLT entry.  They go in a separate relocation
2690 		 section, which is processed by the kernel loader.  */
2691 
2692 	      /* There is a relocation for the initial PLT entry:
2693 		 an R_SH_DIR32 relocation for _GLOBAL_OFFSET_TABLE_.  */
2694 	      if (h->plt.offset == htab->plt_info->plt0_entry_size)
2695 		htab->srelplt2->size += sizeof (Elf32_External_Rela);
2696 
2697 	      /* There are two extra relocations for each subsequent
2698 		 PLT entry: an R_SH_DIR32 relocation for the GOT entry,
2699 		 and an R_SH_DIR32 relocation for the PLT entry.  */
2700 	      htab->srelplt2->size += sizeof (Elf32_External_Rela) * 2;
2701 	    }
2702 	}
2703       else
2704 	{
2705 	  h->plt.offset = (bfd_vma) -1;
2706 	  h->needs_plt = 0;
2707 	}
2708     }
2709   else
2710     {
2711       h->plt.offset = (bfd_vma) -1;
2712       h->needs_plt = 0;
2713     }
2714 
2715   if (h->got.refcount > 0)
2716     {
2717       asection *s;
2718       bool dyn;
2719       enum got_type got_type = sh_elf_hash_entry (h)->got_type;
2720 
2721       /* Make sure this symbol is output as a dynamic symbol.
2722 	 Undefined weak syms won't yet be marked as dynamic.  */
2723       if (h->dynindx == -1
2724 	  && !h->forced_local)
2725 	{
2726 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
2727 	    return false;
2728 	}
2729 
2730       s = htab->root.sgot;
2731       h->got.offset = s->size;
2732       s->size += 4;
2733       /* R_SH_TLS_GD needs 2 consecutive GOT slots.  */
2734       if (got_type == GOT_TLS_GD)
2735 	s->size += 4;
2736       dyn = htab->root.dynamic_sections_created;
2737       if (!dyn)
2738 	{
2739 	  /* No dynamic relocations required.  */
2740 	  if (htab->fdpic_p && !bfd_link_pic (info)
2741 	      && h->root.type != bfd_link_hash_undefweak
2742 	      && (got_type == GOT_NORMAL || got_type == GOT_FUNCDESC))
2743 	    htab->srofixup->size += 4;
2744 	}
2745       /* No dynamic relocations required when IE->LE conversion happens.  */
2746       else if (got_type == GOT_TLS_IE
2747 	       && !h->def_dynamic
2748 	       && !bfd_link_pic (info))
2749 	;
2750       /* R_SH_TLS_IE_32 needs one dynamic relocation if dynamic,
2751 	 R_SH_TLS_GD needs one if local symbol and two if global.  */
2752       else if ((got_type == GOT_TLS_GD && h->dynindx == -1)
2753 	       || got_type == GOT_TLS_IE)
2754 	htab->root.srelgot->size += sizeof (Elf32_External_Rela);
2755       else if (got_type == GOT_TLS_GD)
2756 	htab->root.srelgot->size += 2 * sizeof (Elf32_External_Rela);
2757       else if (got_type == GOT_FUNCDESC)
2758 	{
2759 	  if (!bfd_link_pic (info) && SYMBOL_FUNCDESC_LOCAL (info, h))
2760 	    htab->srofixup->size += 4;
2761 	  else
2762 	    htab->root.srelgot->size += sizeof (Elf32_External_Rela);
2763 	}
2764       else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2765 		|| h->root.type != bfd_link_hash_undefweak)
2766 	       && (bfd_link_pic (info)
2767 		   || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
2768 	htab->root.srelgot->size += sizeof (Elf32_External_Rela);
2769       else if (htab->fdpic_p
2770 	       && !bfd_link_pic (info)
2771 	       && got_type == GOT_NORMAL
2772 	       && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2773 		   || h->root.type != bfd_link_hash_undefweak))
2774 	htab->srofixup->size += 4;
2775     }
2776   else
2777     h->got.offset = (bfd_vma) -1;
2778 
2779   /* Allocate space for any dynamic relocations to function
2780      descriptors, canonical or otherwise.  We need to relocate the
2781      reference unless it resolves to zero, which only happens for
2782      undefined weak symbols (either non-default visibility, or when
2783      static linking).  Any GOT slot is accounted for elsewhere.  */
2784   if (eh->abs_funcdesc_refcount > 0
2785       && (h->root.type != bfd_link_hash_undefweak
2786 	  || (htab->root.dynamic_sections_created
2787 	      && ! SYMBOL_CALLS_LOCAL (info, h))))
2788     {
2789       if (!bfd_link_pic (info) && SYMBOL_FUNCDESC_LOCAL (info, h))
2790 	htab->srofixup->size += eh->abs_funcdesc_refcount * 4;
2791       else
2792 	htab->root.srelgot->size
2793 	  += eh->abs_funcdesc_refcount * sizeof (Elf32_External_Rela);
2794     }
2795 
2796   /* We must allocate a function descriptor if there are references to
2797      a canonical descriptor (R_SH_GOTFUNCDESC or R_SH_FUNCDESC) and
2798      the dynamic linker isn't going to allocate it.  None of this
2799      applies if we already created one in .got.plt, but if the
2800      canonical function descriptor can be in this object, there
2801      won't be a PLT entry at all.  */
2802   if ((eh->funcdesc.refcount > 0
2803        || (h->got.offset != MINUS_ONE && eh->got_type == GOT_FUNCDESC))
2804       && h->root.type != bfd_link_hash_undefweak
2805       && SYMBOL_FUNCDESC_LOCAL (info, h))
2806     {
2807       /* Make room for this function descriptor.  */
2808       eh->funcdesc.offset = htab->sfuncdesc->size;
2809       htab->sfuncdesc->size += 8;
2810 
2811       /* We will need a relocation or two fixups to initialize the
2812 	 function descriptor, so allocate those too.  */
2813       if (!bfd_link_pic (info) && SYMBOL_CALLS_LOCAL (info, h))
2814 	htab->srofixup->size += 8;
2815       else
2816 	htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
2817     }
2818 
2819   if (h->dyn_relocs == NULL)
2820     return true;
2821 
2822   /* In the shared -Bsymbolic case, discard space allocated for
2823      dynamic pc-relative relocs against symbols which turn out to be
2824      defined in regular objects.  For the normal shared case, discard
2825      space for pc-relative relocs that have become local due to symbol
2826      visibility changes.  */
2827 
2828   if (bfd_link_pic (info))
2829     {
2830       if (SYMBOL_CALLS_LOCAL (info, h))
2831 	{
2832 	  struct elf_dyn_relocs **pp;
2833 
2834 	  for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
2835 	    {
2836 	      p->count -= p->pc_count;
2837 	      p->pc_count = 0;
2838 	      if (p->count == 0)
2839 		*pp = p->next;
2840 	      else
2841 		pp = &p->next;
2842 	    }
2843 	}
2844 
2845       if (htab->root.target_os == is_vxworks)
2846 	{
2847 	  struct elf_dyn_relocs **pp;
2848 
2849 	  for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
2850 	    {
2851 	      if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
2852 		*pp = p->next;
2853 	      else
2854 		pp = &p->next;
2855 	    }
2856 	}
2857 
2858       /* Also discard relocs on undefined weak syms with non-default
2859 	 visibility.  */
2860       if (h->dyn_relocs != NULL
2861 	  && h->root.type == bfd_link_hash_undefweak)
2862 	{
2863 	  if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2864 	      || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
2865 	    h->dyn_relocs = NULL;
2866 
2867 	  /* Make sure undefined weak symbols are output as a dynamic
2868 	     symbol in PIEs.  */
2869 	  else if (h->dynindx == -1
2870 		   && !h->forced_local)
2871 	    {
2872 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
2873 		return false;
2874 	    }
2875 	}
2876     }
2877   else
2878     {
2879       /* For the non-shared case, discard space for relocs against
2880 	 symbols which turn out to need copy relocs or are not
2881 	 dynamic.  */
2882 
2883       if (!h->non_got_ref
2884 	  && ((h->def_dynamic
2885 	       && !h->def_regular)
2886 	      || (htab->root.dynamic_sections_created
2887 		  && (h->root.type == bfd_link_hash_undefweak
2888 		      || h->root.type == bfd_link_hash_undefined))))
2889 	{
2890 	  /* Make sure this symbol is output as a dynamic symbol.
2891 	     Undefined weak syms won't yet be marked as dynamic.  */
2892 	  if (h->dynindx == -1
2893 	      && !h->forced_local)
2894 	    {
2895 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
2896 		return false;
2897 	    }
2898 
2899 	  /* If that succeeded, we know we'll be keeping all the
2900 	     relocs.  */
2901 	  if (h->dynindx != -1)
2902 	    goto keep;
2903 	}
2904 
2905       h->dyn_relocs = NULL;
2906 
2907     keep: ;
2908     }
2909 
2910   /* Finally, allocate space.  */
2911   for (p = h->dyn_relocs; p != NULL; p = p->next)
2912     {
2913       asection *sreloc = elf_section_data (p->sec)->sreloc;
2914       sreloc->size += p->count * sizeof (Elf32_External_Rela);
2915 
2916       /* If we need relocations, we do not need fixups.  */
2917       if (htab->fdpic_p && !bfd_link_pic (info))
2918 	htab->srofixup->size -= 4 * (p->count - p->pc_count);
2919     }
2920 
2921   return true;
2922 }
2923 
2924 /* This function is called after all the input files have been read,
2925    and the input sections have been assigned to output sections.
2926    It's a convenient place to determine the PLT style.  */
2927 
2928 static bool
sh_elf_always_size_sections(bfd * output_bfd,struct bfd_link_info * info)2929 sh_elf_always_size_sections (bfd *output_bfd, struct bfd_link_info *info)
2930 {
2931   sh_elf_hash_table (info)->plt_info = get_plt_info (output_bfd,
2932 						     bfd_link_pic (info));
2933 
2934   if (sh_elf_hash_table (info)->fdpic_p && !bfd_link_relocatable (info)
2935       && !bfd_elf_stack_segment_size (output_bfd, info,
2936 				      "__stacksize", DEFAULT_STACK_SIZE))
2937     return false;
2938   return true;
2939 }
2940 
2941 /* Set the sizes of the dynamic sections.  */
2942 
2943 static bool
sh_elf_size_dynamic_sections(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info)2944 sh_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2945 			      struct bfd_link_info *info)
2946 {
2947   struct elf_sh_link_hash_table *htab;
2948   bfd *dynobj;
2949   asection *s;
2950   bool relocs;
2951   bfd *ibfd;
2952 
2953   htab = sh_elf_hash_table (info);
2954   if (htab == NULL)
2955     return false;
2956 
2957   dynobj = htab->root.dynobj;
2958   BFD_ASSERT (dynobj != NULL);
2959 
2960   if (htab->root.dynamic_sections_created)
2961     {
2962       /* Set the contents of the .interp section to the interpreter.  */
2963       if (bfd_link_executable (info) && !info->nointerp)
2964 	{
2965 	  s = bfd_get_linker_section (dynobj, ".interp");
2966 	  BFD_ASSERT (s != NULL);
2967 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2968 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2969 	}
2970     }
2971 
2972   /* Set up .got offsets for local syms, and space for local dynamic
2973      relocs.  */
2974   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2975     {
2976       bfd_signed_vma *local_got;
2977       bfd_signed_vma *end_local_got;
2978       union gotref *local_funcdesc, *end_local_funcdesc;
2979       char *local_got_type;
2980       bfd_size_type locsymcount;
2981       Elf_Internal_Shdr *symtab_hdr;
2982       asection *srel;
2983 
2984       if (! is_sh_elf (ibfd))
2985 	continue;
2986 
2987       for (s = ibfd->sections; s != NULL; s = s->next)
2988 	{
2989 	  struct elf_dyn_relocs *p;
2990 
2991 	  for (p = ((struct elf_dyn_relocs *)
2992 		    elf_section_data (s)->local_dynrel);
2993 	       p != NULL;
2994 	       p = p->next)
2995 	    {
2996 	      if (! bfd_is_abs_section (p->sec)
2997 		  && bfd_is_abs_section (p->sec->output_section))
2998 		{
2999 		  /* Input section has been discarded, either because
3000 		     it is a copy of a linkonce section or due to
3001 		     linker script /DISCARD/, so we'll be discarding
3002 		     the relocs too.  */
3003 		}
3004 	      else if (htab->root.target_os == is_vxworks
3005 		       && strcmp (p->sec->output_section->name,
3006 				  ".tls_vars") == 0)
3007 		{
3008 		  /* Relocations in vxworks .tls_vars sections are
3009 		     handled specially by the loader.  */
3010 		}
3011 	      else if (p->count != 0)
3012 		{
3013 		  srel = elf_section_data (p->sec)->sreloc;
3014 		  srel->size += p->count * sizeof (Elf32_External_Rela);
3015 		  if ((p->sec->output_section->flags & SEC_READONLY) != 0)
3016 		    {
3017 		      info->flags |= DF_TEXTREL;
3018 		      info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
3019 					      p->sec->owner, p->sec);
3020 		    }
3021 
3022 		  /* If we need relocations, we do not need fixups.  */
3023 		  if (htab->fdpic_p && !bfd_link_pic (info))
3024 		    htab->srofixup->size -= 4 * (p->count - p->pc_count);
3025 		}
3026 	    }
3027 	}
3028 
3029       symtab_hdr = &elf_symtab_hdr (ibfd);
3030       locsymcount = symtab_hdr->sh_info;
3031       s = htab->root.sgot;
3032       srel = htab->root.srelgot;
3033 
3034       local_got = elf_local_got_refcounts (ibfd);
3035       if (local_got)
3036 	{
3037 	  end_local_got = local_got + locsymcount;
3038 	  local_got_type = sh_elf_local_got_type (ibfd);
3039 	  local_funcdesc = sh_elf_local_funcdesc (ibfd);
3040 	  for (; local_got < end_local_got; ++local_got)
3041 	    {
3042 	      if (*local_got > 0)
3043 		{
3044 		  *local_got = s->size;
3045 		  s->size += 4;
3046 		  if (*local_got_type == GOT_TLS_GD)
3047 		    s->size += 4;
3048 		  if (bfd_link_pic (info))
3049 		    srel->size += sizeof (Elf32_External_Rela);
3050 		  else
3051 		    htab->srofixup->size += 4;
3052 
3053 		  if (*local_got_type == GOT_FUNCDESC)
3054 		    {
3055 		      if (local_funcdesc == NULL)
3056 			{
3057 			  bfd_size_type size;
3058 
3059 			  size = locsymcount * sizeof (union gotref);
3060 			  local_funcdesc = (union gotref *) bfd_zalloc (ibfd,
3061 									size);
3062 			  if (local_funcdesc == NULL)
3063 			    return false;
3064 			  sh_elf_local_funcdesc (ibfd) = local_funcdesc;
3065 			  local_funcdesc += (local_got
3066 					     - elf_local_got_refcounts (ibfd));
3067 			}
3068 		      local_funcdesc->refcount++;
3069 		      ++local_funcdesc;
3070 		    }
3071 		}
3072 	      else
3073 		*local_got = (bfd_vma) -1;
3074 	      ++local_got_type;
3075 	    }
3076 	}
3077 
3078       local_funcdesc = sh_elf_local_funcdesc (ibfd);
3079       if (local_funcdesc)
3080 	{
3081 	  end_local_funcdesc = local_funcdesc + locsymcount;
3082 
3083 	  for (; local_funcdesc < end_local_funcdesc; ++local_funcdesc)
3084 	    {
3085 	      if (local_funcdesc->refcount > 0)
3086 		{
3087 		  local_funcdesc->offset = htab->sfuncdesc->size;
3088 		  htab->sfuncdesc->size += 8;
3089 		  if (!bfd_link_pic (info))
3090 		    htab->srofixup->size += 8;
3091 		  else
3092 		    htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3093 		}
3094 	      else
3095 		local_funcdesc->offset = MINUS_ONE;
3096 	    }
3097 	}
3098 
3099     }
3100 
3101   if (htab->tls_ldm_got.refcount > 0)
3102     {
3103       /* Allocate 2 got entries and 1 dynamic reloc for R_SH_TLS_LD_32
3104 	 relocs.  */
3105       htab->tls_ldm_got.offset = htab->root.sgot->size;
3106       htab->root.sgot->size += 8;
3107       htab->root.srelgot->size += sizeof (Elf32_External_Rela);
3108     }
3109   else
3110     htab->tls_ldm_got.offset = -1;
3111 
3112   /* Only the reserved entries should be present.  For FDPIC, they go at
3113      the end of .got.plt.  */
3114   if (htab->fdpic_p)
3115     {
3116       BFD_ASSERT (htab->root.sgotplt && htab->root.sgotplt->size == 12);
3117       htab->root.sgotplt->size = 0;
3118     }
3119 
3120   /* Allocate global sym .plt and .got entries, and space for global
3121      sym dynamic relocs.  */
3122   elf_link_hash_traverse (&htab->root, allocate_dynrelocs, info);
3123 
3124   /* Move the reserved entries and the _GLOBAL_OFFSET_TABLE_ symbol to the
3125      end of the FDPIC .got.plt.  */
3126   if (htab->fdpic_p)
3127     {
3128       htab->root.hgot->root.u.def.value = htab->root.sgotplt->size;
3129       htab->root.sgotplt->size += 12;
3130     }
3131 
3132   /* At the very end of the .rofixup section is a pointer to the GOT.  */
3133   if (htab->fdpic_p && htab->srofixup != NULL)
3134     htab->srofixup->size += 4;
3135 
3136   /* We now have determined the sizes of the various dynamic sections.
3137      Allocate memory for them.  */
3138   relocs = false;
3139   for (s = dynobj->sections; s != NULL; s = s->next)
3140     {
3141       if ((s->flags & SEC_LINKER_CREATED) == 0)
3142 	continue;
3143 
3144       if (s == htab->root.splt
3145 	  || s == htab->root.sgot
3146 	  || s == htab->root.sgotplt
3147 	  || s == htab->sfuncdesc
3148 	  || s == htab->srofixup
3149 	  || s == htab->root.sdynbss)
3150 	{
3151 	  /* Strip this section if we don't need it; see the
3152 	     comment below.  */
3153 	}
3154       else if (startswith (bfd_section_name (s), ".rela"))
3155 	{
3156 	  if (s->size != 0 && s != htab->root.srelplt && s != htab->srelplt2)
3157 	    relocs = true;
3158 
3159 	  /* We use the reloc_count field as a counter if we need
3160 	     to copy relocs into the output file.  */
3161 	  s->reloc_count = 0;
3162 	}
3163       else
3164 	{
3165 	  /* It's not one of our sections, so don't allocate space.  */
3166 	  continue;
3167 	}
3168 
3169       if (s->size == 0)
3170 	{
3171 	  /* If we don't need this section, strip it from the
3172 	     output file.  This is mostly to handle .rela.bss and
3173 	     .rela.plt.  We must create both sections in
3174 	     create_dynamic_sections, because they must be created
3175 	     before the linker maps input sections to output
3176 	     sections.  The linker does that before
3177 	     adjust_dynamic_symbol is called, and it is that
3178 	     function which decides whether anything needs to go
3179 	     into these sections.  */
3180 
3181 	  s->flags |= SEC_EXCLUDE;
3182 	  continue;
3183 	}
3184 
3185       if ((s->flags & SEC_HAS_CONTENTS) == 0)
3186 	continue;
3187 
3188       /* Allocate memory for the section contents.  We use bfd_zalloc
3189 	 here in case unused entries are not reclaimed before the
3190 	 section's contents are written out.  This should not happen,
3191 	 but this way if it does, we get a R_SH_NONE reloc instead
3192 	 of garbage.  */
3193       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
3194       if (s->contents == NULL)
3195 	return false;
3196     }
3197 
3198   return _bfd_elf_maybe_vxworks_add_dynamic_tags (output_bfd, info,
3199 						  relocs);
3200 }
3201 
3202 /* Add a dynamic relocation to the SRELOC section.  */
3203 
3204 inline static bfd_vma
sh_elf_add_dyn_reloc(bfd * output_bfd,asection * sreloc,bfd_vma offset,int reloc_type,long dynindx,bfd_vma addend)3205 sh_elf_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
3206 		      int reloc_type, long dynindx, bfd_vma addend)
3207 {
3208   Elf_Internal_Rela outrel;
3209   bfd_vma reloc_offset;
3210 
3211   outrel.r_offset = offset;
3212   outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
3213   outrel.r_addend = addend;
3214 
3215   reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rela);
3216   BFD_ASSERT (reloc_offset < sreloc->size);
3217   bfd_elf32_swap_reloca_out (output_bfd, &outrel,
3218 			     sreloc->contents + reloc_offset);
3219   sreloc->reloc_count++;
3220 
3221   return reloc_offset;
3222 }
3223 
3224 /* Add an FDPIC read-only fixup.  */
3225 
3226 inline static void
sh_elf_add_rofixup(bfd * output_bfd,asection * srofixup,bfd_vma offset)3227 sh_elf_add_rofixup (bfd *output_bfd, asection *srofixup, bfd_vma offset)
3228 {
3229   bfd_vma fixup_offset;
3230 
3231   fixup_offset = srofixup->reloc_count++ * 4;
3232   BFD_ASSERT (fixup_offset < srofixup->size);
3233   bfd_put_32 (output_bfd, offset, srofixup->contents + fixup_offset);
3234 }
3235 
3236 /* Return the offset of the generated .got section from the
3237    _GLOBAL_OFFSET_TABLE_ symbol.  */
3238 
3239 static bfd_signed_vma
sh_elf_got_offset(struct elf_sh_link_hash_table * htab)3240 sh_elf_got_offset (struct elf_sh_link_hash_table *htab)
3241 {
3242   return (htab->root.sgot->output_offset - htab->root.sgotplt->output_offset
3243 	  - htab->root.hgot->root.u.def.value);
3244 }
3245 
3246 /* Find the segment number in which OSEC, and output section, is
3247    located.  */
3248 
3249 static unsigned
sh_elf_osec_to_segment(bfd * output_bfd,asection * osec)3250 sh_elf_osec_to_segment (bfd *output_bfd, asection *osec)
3251 {
3252   Elf_Internal_Phdr *p = NULL;
3253 
3254   if (output_bfd->xvec->flavour == bfd_target_elf_flavour
3255       /* PR ld/17110: Do not look for output segments in an input bfd.  */
3256       && output_bfd->direction != read_direction)
3257     p = _bfd_elf_find_segment_containing_section (output_bfd, osec);
3258 
3259   /* FIXME: Nothing ever says what this index is relative to.  The kernel
3260      supplies data in terms of the number of load segments but this is
3261      a phdr index and the first phdr may not be a load segment.  */
3262   return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
3263 }
3264 
3265 static bool
sh_elf_osec_readonly_p(bfd * output_bfd,asection * osec)3266 sh_elf_osec_readonly_p (bfd *output_bfd, asection *osec)
3267 {
3268   unsigned seg = sh_elf_osec_to_segment (output_bfd, osec);
3269 
3270   return (seg != (unsigned) -1
3271 	  && ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W));
3272 }
3273 
3274 /* Generate the initial contents of a local function descriptor, along
3275    with any relocations or fixups required.  */
3276 static bool
sh_elf_initialize_funcdesc(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,bfd_vma offset,asection * section,bfd_vma value)3277 sh_elf_initialize_funcdesc (bfd *output_bfd,
3278 			    struct bfd_link_info *info,
3279 			    struct elf_link_hash_entry *h,
3280 			    bfd_vma offset,
3281 			    asection *section,
3282 			    bfd_vma value)
3283 {
3284   struct elf_sh_link_hash_table *htab;
3285   int dynindx;
3286   bfd_vma addr, seg;
3287 
3288   htab = sh_elf_hash_table (info);
3289 
3290   /* FIXME: The ABI says that the offset to the function goes in the
3291      descriptor, along with the segment index.  We're RELA, so it could
3292      go in the reloc instead... */
3293 
3294   if (h != NULL && SYMBOL_CALLS_LOCAL (info, h))
3295     {
3296       section = h->root.u.def.section;
3297       value = h->root.u.def.value;
3298     }
3299 
3300   if (h == NULL || SYMBOL_CALLS_LOCAL (info, h))
3301     {
3302       dynindx = elf_section_data (section->output_section)->dynindx;
3303       addr = value + section->output_offset;
3304       seg = sh_elf_osec_to_segment (output_bfd, section->output_section);
3305     }
3306   else
3307     {
3308       BFD_ASSERT (h->dynindx != -1);
3309       dynindx = h->dynindx;
3310       addr = seg = 0;
3311     }
3312 
3313   if (!bfd_link_pic (info) && SYMBOL_CALLS_LOCAL (info, h))
3314     {
3315       if (h == NULL || h->root.type != bfd_link_hash_undefweak)
3316 	{
3317 	  sh_elf_add_rofixup (output_bfd, htab->srofixup,
3318 			      offset
3319 			      + htab->sfuncdesc->output_section->vma
3320 			      + htab->sfuncdesc->output_offset);
3321 	  sh_elf_add_rofixup (output_bfd, htab->srofixup,
3322 			      offset + 4
3323 			      + htab->sfuncdesc->output_section->vma
3324 			      + htab->sfuncdesc->output_offset);
3325 	}
3326 
3327       /* There are no dynamic relocations so fill in the final
3328 	 address and gp value (barring fixups).  */
3329       addr += section->output_section->vma;
3330       seg = htab->root.hgot->root.u.def.value
3331 	+ htab->root.hgot->root.u.def.section->output_section->vma
3332 	+ htab->root.hgot->root.u.def.section->output_offset;
3333     }
3334   else
3335     sh_elf_add_dyn_reloc (output_bfd, htab->srelfuncdesc,
3336 			  offset
3337 			  + htab->sfuncdesc->output_section->vma
3338 			  + htab->sfuncdesc->output_offset,
3339 			  R_SH_FUNCDESC_VALUE, dynindx, 0);
3340 
3341   bfd_put_32 (output_bfd, addr, htab->sfuncdesc->contents + offset);
3342   bfd_put_32 (output_bfd, seg, htab->sfuncdesc->contents + offset + 4);
3343 
3344   return true;
3345 }
3346 
3347 /* Install a 20-bit movi20 field starting at ADDR, which occurs in OUTPUT_BFD.
3348    VALUE is the field's value.  Return bfd_reloc_ok if successful or an error
3349    otherwise.  */
3350 
3351 static bfd_reloc_status_type
install_movi20_field(bfd * output_bfd,unsigned long relocation,bfd * input_bfd,asection * input_section,bfd_byte * contents,bfd_vma offset)3352 install_movi20_field (bfd *output_bfd, unsigned long relocation,
3353 		      bfd *input_bfd, asection *input_section,
3354 		      bfd_byte *contents, bfd_vma offset)
3355 {
3356   unsigned long cur_val;
3357   bfd_byte *addr;
3358   bfd_reloc_status_type r;
3359 
3360   if (offset > bfd_get_section_limit (input_bfd, input_section))
3361     return bfd_reloc_outofrange;
3362 
3363   r = bfd_check_overflow (complain_overflow_signed, 20, 0,
3364 			  bfd_arch_bits_per_address (input_bfd), relocation);
3365   if (r != bfd_reloc_ok)
3366     return r;
3367 
3368   addr = contents + offset;
3369   cur_val = bfd_get_16 (output_bfd, addr);
3370   bfd_put_16 (output_bfd, cur_val | ((relocation & 0xf0000) >> 12), addr);
3371   bfd_put_16 (output_bfd, relocation & 0xffff, addr + 2);
3372 
3373   return bfd_reloc_ok;
3374 }
3375 
3376 /* Relocate an SH ELF section.  */
3377 
3378 static int
sh_elf_relocate_section(bfd * output_bfd,struct bfd_link_info * info,bfd * input_bfd,asection * input_section,bfd_byte * contents,Elf_Internal_Rela * relocs,Elf_Internal_Sym * local_syms,asection ** local_sections)3379 sh_elf_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
3380 			 bfd *input_bfd, asection *input_section,
3381 			 bfd_byte *contents, Elf_Internal_Rela *relocs,
3382 			 Elf_Internal_Sym *local_syms,
3383 			 asection **local_sections)
3384 {
3385   struct elf_sh_link_hash_table *htab;
3386   Elf_Internal_Shdr *symtab_hdr;
3387   struct elf_link_hash_entry **sym_hashes;
3388   Elf_Internal_Rela *rel, *relend;
3389   bfd_vma *local_got_offsets;
3390   asection *sgot = NULL;
3391   asection *sgotplt = NULL;
3392   asection *splt = NULL;
3393   asection *sreloc = NULL;
3394   asection *srelgot = NULL;
3395   bool is_vxworks_tls;
3396   unsigned isec_segment, got_segment, plt_segment, check_segment[2];
3397   bool fdpic_p = false;
3398 
3399   if (!is_sh_elf (input_bfd))
3400     {
3401       bfd_set_error (bfd_error_wrong_format);
3402       return false;
3403     }
3404 
3405   htab = sh_elf_hash_table (info);
3406   if (htab != NULL)
3407     {
3408       sgot = htab->root.sgot;
3409       sgotplt = htab->root.sgotplt;
3410       srelgot = htab->root.srelgot;
3411       splt = htab->root.splt;
3412       fdpic_p = htab->fdpic_p;
3413     }
3414   symtab_hdr = &elf_symtab_hdr (input_bfd);
3415   sym_hashes = elf_sym_hashes (input_bfd);
3416   local_got_offsets = elf_local_got_offsets (input_bfd);
3417 
3418   isec_segment = sh_elf_osec_to_segment (output_bfd,
3419 					 input_section->output_section);
3420   if (fdpic_p && sgot)
3421     got_segment = sh_elf_osec_to_segment (output_bfd,
3422 					  sgot->output_section);
3423   else
3424     got_segment = -1;
3425   if (fdpic_p && splt)
3426     plt_segment = sh_elf_osec_to_segment (output_bfd,
3427 					  splt->output_section);
3428   else
3429     plt_segment = -1;
3430 
3431   /* We have to handle relocations in vxworks .tls_vars sections
3432      specially, because the dynamic loader is 'weird'.  */
3433   is_vxworks_tls = (htab && htab->root.target_os == is_vxworks && bfd_link_pic (info)
3434 		    && !strcmp (input_section->output_section->name,
3435 				".tls_vars"));
3436 
3437   rel = relocs;
3438   relend = relocs + input_section->reloc_count;
3439   for (; rel < relend; rel++)
3440     {
3441       int r_type;
3442       reloc_howto_type *howto;
3443       unsigned long r_symndx;
3444       Elf_Internal_Sym *sym;
3445       asection *sec;
3446       struct elf_link_hash_entry *h;
3447       bfd_vma relocation;
3448       bfd_vma addend = (bfd_vma) 0;
3449       bfd_reloc_status_type r;
3450       bfd_vma off;
3451       enum got_type got_type;
3452       const char *symname = NULL;
3453       bool resolved_to_zero;
3454 
3455       r_symndx = ELF32_R_SYM (rel->r_info);
3456 
3457       r_type = ELF32_R_TYPE (rel->r_info);
3458 
3459       /* Many of the relocs are only used for relaxing, and are
3460 	 handled entirely by the relaxation code.  */
3461       if (r_type >= (int) R_SH_GNU_VTINHERIT
3462 	  && r_type <= (int) R_SH_LABEL)
3463 	continue;
3464       if (r_type == (int) R_SH_NONE)
3465 	continue;
3466 
3467       if (r_type < 0
3468 	  || r_type >= R_SH_max
3469 	  || (r_type >= (int) R_SH_FIRST_INVALID_RELOC
3470 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC)
3471 	  || (r_type >= (int) R_SH_FIRST_INVALID_RELOC_2
3472 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_2)
3473 	  || (   r_type >= (int) R_SH_FIRST_INVALID_RELOC_3
3474 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_3)
3475 	  || (   r_type >= (int) R_SH_FIRST_INVALID_RELOC_4
3476 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_4)
3477 	  || (   r_type >= (int) R_SH_FIRST_INVALID_RELOC_5
3478 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_5)
3479 	  || (   r_type >= (int) R_SH_FIRST_INVALID_RELOC_6
3480 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_6))
3481 	{
3482 	  bfd_set_error (bfd_error_bad_value);
3483 	  return false;
3484 	}
3485 
3486       howto = get_howto_table (output_bfd) + r_type;
3487 
3488       /* For relocs that aren't partial_inplace, we get the addend from
3489 	 the relocation.  */
3490       if (! howto->partial_inplace)
3491 	addend = rel->r_addend;
3492 
3493       resolved_to_zero = false;
3494       h = NULL;
3495       sym = NULL;
3496       sec = NULL;
3497       check_segment[0] = -1;
3498       check_segment[1] = -1;
3499       if (r_symndx < symtab_hdr->sh_info)
3500 	{
3501 	  sym = local_syms + r_symndx;
3502 	  sec = local_sections[r_symndx];
3503 
3504 	  symname = bfd_elf_string_from_elf_section
3505 	    (input_bfd, symtab_hdr->sh_link, sym->st_name);
3506 	  if (symname == NULL || *symname == '\0')
3507 	    symname = bfd_section_name (sec);
3508 
3509 	  relocation = (sec->output_section->vma
3510 			+ sec->output_offset
3511 			+ sym->st_value);
3512 
3513 	  if (sec != NULL && discarded_section (sec))
3514 	    /* Handled below.  */
3515 	    ;
3516 	  else if (bfd_link_relocatable (info))
3517 	    {
3518 	      /* This is a relocatable link.  We don't have to change
3519 		 anything, unless the reloc is against a section symbol,
3520 		 in which case we have to adjust according to where the
3521 		 section symbol winds up in the output section.  */
3522 	      if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3523 		{
3524 		  if (! howto->partial_inplace)
3525 		    {
3526 		      /* For relocations with the addend in the
3527 			 relocation, we need just to update the addend.
3528 			 All real relocs are of type partial_inplace; this
3529 			 code is mostly for completeness.  */
3530 		      rel->r_addend += sec->output_offset;
3531 
3532 		      continue;
3533 		    }
3534 
3535 		  /* Relocs of type partial_inplace need to pick up the
3536 		     contents in the contents and add the offset resulting
3537 		     from the changed location of the section symbol.
3538 		     Using _bfd_final_link_relocate (e.g. goto
3539 		     final_link_relocate) here would be wrong, because
3540 		     relocations marked pc_relative would get the current
3541 		     location subtracted, and we must only do that at the
3542 		     final link.  */
3543 		  r = _bfd_relocate_contents (howto, input_bfd,
3544 					      sec->output_offset
3545 					      + sym->st_value,
3546 					      contents + rel->r_offset);
3547 		  goto relocation_done;
3548 		}
3549 
3550 	      continue;
3551 	    }
3552 	  else if (! howto->partial_inplace)
3553 	    {
3554 	      relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
3555 	      addend = rel->r_addend;
3556 	    }
3557 	  else if ((sec->flags & SEC_MERGE)
3558 		   && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3559 	    {
3560 	      asection *msec;
3561 
3562 	      if (howto->rightshift || howto->src_mask != 0xffffffff)
3563 		{
3564 		  _bfd_error_handler
3565 		    /* xgettext:c-format */
3566 		    (_("%pB(%pA+%#" PRIx64 "): "
3567 		       "%s relocation against SEC_MERGE section"),
3568 		     input_bfd, input_section,
3569 		     (uint64_t) rel->r_offset, howto->name);
3570 		  return false;
3571 		}
3572 
3573 	      addend = bfd_get_32 (input_bfd, contents + rel->r_offset);
3574 	      msec = sec;
3575 	      addend =
3576 		_bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
3577 		- relocation;
3578 	      addend += msec->output_section->vma + msec->output_offset;
3579 	      bfd_put_32 (input_bfd, addend, contents + rel->r_offset);
3580 	      addend = 0;
3581 	    }
3582 	}
3583       else
3584 	{
3585 	  /* FIXME: Ought to make use of the RELOC_FOR_GLOBAL_SYMBOL macro.  */
3586 
3587 	  relocation = 0;
3588 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3589 	  symname = h->root.root.string;
3590 	  while (h->root.type == bfd_link_hash_indirect
3591 		 || h->root.type == bfd_link_hash_warning)
3592 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
3593 	  if (h->root.type == bfd_link_hash_defined
3594 	      || h->root.type == bfd_link_hash_defweak)
3595 	    {
3596 	      bool dyn;
3597 
3598 	      dyn = htab ? htab->root.dynamic_sections_created : false;
3599 	      sec = h->root.u.def.section;
3600 	      /* In these cases, we don't need the relocation value.
3601 		 We check specially because in some obscure cases
3602 		 sec->output_section will be NULL.  */
3603 	      if (r_type == R_SH_GOTPC
3604 		  || r_type == R_SH_GOTPC_LOW16
3605 		  || r_type == R_SH_GOTPC_MEDLOW16
3606 		  || r_type == R_SH_GOTPC_MEDHI16
3607 		  || r_type == R_SH_GOTPC_HI16
3608 		  || ((r_type == R_SH_PLT32
3609 		       || r_type == R_SH_PLT_LOW16
3610 		       || r_type == R_SH_PLT_MEDLOW16
3611 		       || r_type == R_SH_PLT_MEDHI16
3612 		       || r_type == R_SH_PLT_HI16)
3613 		      && h->plt.offset != (bfd_vma) -1)
3614 		  || ((r_type == R_SH_GOT32
3615 		       || r_type == R_SH_GOT20
3616 		       || r_type == R_SH_GOTFUNCDESC
3617 		       || r_type == R_SH_GOTFUNCDESC20
3618 		       || r_type == R_SH_GOTOFFFUNCDESC
3619 		       || r_type == R_SH_GOTOFFFUNCDESC20
3620 		       || r_type == R_SH_FUNCDESC
3621 		       || r_type == R_SH_GOT_LOW16
3622 		       || r_type == R_SH_GOT_MEDLOW16
3623 		       || r_type == R_SH_GOT_MEDHI16
3624 		       || r_type == R_SH_GOT_HI16)
3625 		      && WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3626 							  bfd_link_pic (info),
3627 							  h)
3628 		      && (! bfd_link_pic (info)
3629 			  || (! info->symbolic && h->dynindx != -1)
3630 			  || !h->def_regular))
3631 		  /* The cases above are those in which relocation is
3632 		     overwritten in the switch block below.  The cases
3633 		     below are those in which we must defer relocation
3634 		     to run-time, because we can't resolve absolute
3635 		     addresses when creating a shared library.  */
3636 		  || (bfd_link_pic (info)
3637 		      && ((! info->symbolic && h->dynindx != -1)
3638 			  || !h->def_regular)
3639 		      && ((r_type == R_SH_DIR32
3640 			   && !h->forced_local)
3641 			  || (r_type == R_SH_REL32
3642 			      && !SYMBOL_CALLS_LOCAL (info, h)))
3643 		      && ((input_section->flags & SEC_ALLOC) != 0
3644 			  /* DWARF will emit R_SH_DIR32 relocations in its
3645 			     sections against symbols defined externally
3646 			     in shared libraries.  We can't do anything
3647 			     with them here.  */
3648 			  || ((input_section->flags & SEC_DEBUGGING) != 0
3649 			      && h->def_dynamic)))
3650 		  /* Dynamic relocs are not propagated for SEC_DEBUGGING
3651 		     sections because such sections are not SEC_ALLOC and
3652 		     thus ld.so will not process them.  */
3653 		  || (sec->output_section == NULL
3654 		      && ((input_section->flags & SEC_DEBUGGING) != 0
3655 			  && h->def_dynamic))
3656 		  || (sec->output_section == NULL
3657 		      && (sh_elf_hash_entry (h)->got_type == GOT_TLS_IE
3658 			  || sh_elf_hash_entry (h)->got_type == GOT_TLS_GD)))
3659 		;
3660 	      else if (sec->output_section != NULL)
3661 		relocation = (h->root.u.def.value
3662 			      + sec->output_section->vma
3663 			      + sec->output_offset);
3664 	      else if (!bfd_link_relocatable (info)
3665 		       && (_bfd_elf_section_offset (output_bfd, info,
3666 						    input_section,
3667 						    rel->r_offset)
3668 			   != (bfd_vma) -1))
3669 		{
3670 		  _bfd_error_handler
3671 		    /* xgettext:c-format */
3672 		    (_("%pB(%pA+%#" PRIx64 "): "
3673 		       "unresolvable %s relocation against symbol `%s'"),
3674 		     input_bfd,
3675 		     input_section,
3676 		     (uint64_t) rel->r_offset,
3677 		     howto->name,
3678 		     h->root.root.string);
3679 		  return false;
3680 		}
3681 	    }
3682 	  else if (h->root.type == bfd_link_hash_undefweak)
3683 	    resolved_to_zero = UNDEFWEAK_NO_DYNAMIC_RELOC (info, h);
3684 	  else if (info->unresolved_syms_in_objects == RM_IGNORE
3685 		   && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3686 	    ;
3687 	  else if (!bfd_link_relocatable (info))
3688             info->callbacks->undefined_symbol
3689 	      (info, h->root.root.string, input_bfd, input_section,
3690 	       rel->r_offset,
3691 	       (info->unresolved_syms_in_objects == RM_DIAGNOSE
3692 		&& !info->warn_unresolved_syms)
3693 	       || ELF_ST_VISIBILITY (h->other));
3694         }
3695 
3696       if (sec != NULL && discarded_section (sec))
3697 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
3698 					 rel, 1, relend, howto, 0, contents);
3699 
3700       if (bfd_link_relocatable (info))
3701 	continue;
3702 
3703       /* Check for inter-segment relocations in FDPIC files.  Most
3704 	 relocations connect the relocation site to the location of
3705 	 the target symbol, but there are some exceptions below.  */
3706       check_segment[0] = isec_segment;
3707       if (sec != NULL)
3708 	check_segment[1] = sh_elf_osec_to_segment (output_bfd,
3709 						   sec->output_section);
3710       else
3711 	check_segment[1] = -1;
3712 
3713       switch ((int) r_type)
3714 	{
3715 	final_link_relocate:
3716 	  /* COFF relocs don't use the addend. The addend is used for
3717 	     R_SH_DIR32 to be compatible with other compilers.  */
3718 	  r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3719 					contents, rel->r_offset,
3720 					relocation, addend);
3721 	  break;
3722 
3723 	case R_SH_IND12W:
3724 	  goto final_link_relocate;
3725 
3726 	case R_SH_DIR8WPN:
3727 	case R_SH_DIR8WPZ:
3728 	case R_SH_DIR8WPL:
3729 	  /* If the reloc is against the start of this section, then
3730 	     the assembler has already taken care of it and the reloc
3731 	     is here only to assist in relaxing.  If the reloc is not
3732 	     against the start of this section, then it's against an
3733 	     external symbol and we must deal with it ourselves.  */
3734 	  if (input_section->output_section->vma + input_section->output_offset
3735 	      != relocation)
3736 	    {
3737 	      int disp = (relocation
3738 			  - input_section->output_section->vma
3739 			  - input_section->output_offset
3740 			  - rel->r_offset);
3741 	      int mask = 0;
3742 	      switch (r_type)
3743 		{
3744 		case R_SH_DIR8WPN:
3745 		case R_SH_DIR8WPZ: mask = 1; break;
3746 		case R_SH_DIR8WPL: mask = 3; break;
3747 		default: mask = 0; break;
3748 		}
3749 	      if (disp & mask)
3750 		{
3751 		  _bfd_error_handler
3752 		    /* xgettext:c-format */
3753 		    (_("%pB: %#" PRIx64 ": fatal: "
3754 		       "unaligned branch target for relax-support relocation"),
3755 		     input_section->owner,
3756 		     (uint64_t) rel->r_offset);
3757 		  bfd_set_error (bfd_error_bad_value);
3758 		  return false;
3759 		}
3760 	      relocation -= 4;
3761 	      goto final_link_relocate;
3762 	    }
3763 	  r = bfd_reloc_ok;
3764 	  break;
3765 
3766 	default:
3767 	  bfd_set_error (bfd_error_bad_value);
3768 	  return false;
3769 
3770 	case R_SH_DIR16:
3771 	case R_SH_DIR8:
3772 	case R_SH_DIR8U:
3773 	case R_SH_DIR8S:
3774 	case R_SH_DIR4U:
3775 	  goto final_link_relocate;
3776 
3777 	case R_SH_DIR8UL:
3778 	case R_SH_DIR4UL:
3779 	  if (relocation & 3)
3780 	    {
3781 	      _bfd_error_handler
3782 		/* xgettext:c-format */
3783 		(_("%pB: %#" PRIx64 ": fatal: "
3784 		   "unaligned %s relocation %#" PRIx64),
3785 		 input_section->owner, (uint64_t) rel->r_offset,
3786 		 howto->name, (uint64_t) relocation);
3787 	      bfd_set_error (bfd_error_bad_value);
3788 	      return false;
3789 	    }
3790 	  goto final_link_relocate;
3791 
3792 	case R_SH_DIR8UW:
3793 	case R_SH_DIR8SW:
3794 	case R_SH_DIR4UW:
3795 	  if (relocation & 1)
3796 	    {
3797 	      _bfd_error_handler
3798 		/* xgettext:c-format */
3799 		(_("%pB: %#" PRIx64 ": fatal: "
3800 		   "unaligned %s relocation %#" PRIx64 ""),
3801 		 input_section->owner,
3802 		 (uint64_t) rel->r_offset, howto->name,
3803 		 (uint64_t) relocation);
3804 	      bfd_set_error (bfd_error_bad_value);
3805 	      return false;
3806 	    }
3807 	  goto final_link_relocate;
3808 
3809 	case R_SH_PSHA:
3810 	  if ((signed int)relocation < -32
3811 	      || (signed int)relocation > 32)
3812 	    {
3813 	      _bfd_error_handler
3814 		/* xgettext:c-format */
3815 		(_("%pB: %#" PRIx64 ": fatal: R_SH_PSHA relocation %" PRId64
3816 		   " not in range -32..32"),
3817 		 input_section->owner,
3818 		 (uint64_t) rel->r_offset,
3819 		 (int64_t) relocation);
3820 	      bfd_set_error (bfd_error_bad_value);
3821 	      return false;
3822 	    }
3823 	  goto final_link_relocate;
3824 
3825 	case R_SH_PSHL:
3826 	  if ((signed int)relocation < -16
3827 	      || (signed int)relocation > 16)
3828 	    {
3829 	      _bfd_error_handler
3830 		/* xgettext:c-format */
3831 		(_("%pB: %#" PRIx64 ": fatal: R_SH_PSHL relocation %" PRId64
3832 		   " not in range -32..32"),
3833 		 input_section->owner,
3834 		 (uint64_t) rel->r_offset,
3835 		 (int64_t) relocation);
3836 	      bfd_set_error (bfd_error_bad_value);
3837 	      return false;
3838 	    }
3839 	  goto final_link_relocate;
3840 
3841 	case R_SH_DIR32:
3842 	case R_SH_REL32:
3843 	  if (bfd_link_pic (info)
3844 	      && (h == NULL
3845 		  || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3846 		      && !resolved_to_zero)
3847 		  || h->root.type != bfd_link_hash_undefweak)
3848 	      && r_symndx != STN_UNDEF
3849 	      && (input_section->flags & SEC_ALLOC) != 0
3850 	      && !is_vxworks_tls
3851 	      && (r_type == R_SH_DIR32
3852 		  || !SYMBOL_CALLS_LOCAL (info, h)))
3853 	    {
3854 	      Elf_Internal_Rela outrel;
3855 	      bfd_byte *loc;
3856 	      bool skip, relocate;
3857 
3858 	      /* When generating a shared object, these relocations
3859 		 are copied into the output file to be resolved at run
3860 		 time.  */
3861 
3862 	      if (sreloc == NULL)
3863 		{
3864 		  sreloc = _bfd_elf_get_dynamic_reloc_section
3865 		    (input_bfd, input_section, /*rela?*/ true);
3866 		  if (sreloc == NULL)
3867 		    return false;
3868 		}
3869 
3870 	      skip = false;
3871 	      relocate = false;
3872 
3873 	      outrel.r_offset =
3874 		_bfd_elf_section_offset (output_bfd, info, input_section,
3875 					 rel->r_offset);
3876 	      if (outrel.r_offset == (bfd_vma) -1)
3877 		skip = true;
3878 	      else if (outrel.r_offset == (bfd_vma) -2)
3879 		skip = true, relocate = true;
3880 	      outrel.r_offset += (input_section->output_section->vma
3881 				  + input_section->output_offset);
3882 
3883 	      if (skip)
3884 		memset (&outrel, 0, sizeof outrel);
3885 	      else if (r_type == R_SH_REL32)
3886 		{
3887 		  BFD_ASSERT (h != NULL && h->dynindx != -1);
3888 		  outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_REL32);
3889 		  outrel.r_addend
3890 		    = (howto->partial_inplace
3891 		       ? bfd_get_32 (input_bfd, contents + rel->r_offset)
3892 		       : addend);
3893 		}
3894 	      else if (fdpic_p
3895 		       && (h == NULL
3896 			   || ((info->symbolic || h->dynindx == -1)
3897 			       && h->def_regular)))
3898 		{
3899 		  int dynindx;
3900 
3901 		  BFD_ASSERT (sec != NULL);
3902 		  BFD_ASSERT (sec->output_section != NULL);
3903 		  dynindx = elf_section_data (sec->output_section)->dynindx;
3904 		  outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
3905 		  outrel.r_addend = relocation;
3906 		  outrel.r_addend
3907 		    += (howto->partial_inplace
3908 			? bfd_get_32 (input_bfd, contents + rel->r_offset)
3909 			: addend);
3910 		  outrel.r_addend -= sec->output_section->vma;
3911 		}
3912 	      else
3913 		{
3914 		  /* h->dynindx may be -1 if this symbol was marked to
3915 		     become local.  */
3916 		  if (h == NULL
3917 		      || ((info->symbolic || h->dynindx == -1)
3918 			  && h->def_regular))
3919 		    {
3920 		      relocate = howto->partial_inplace;
3921 		      outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
3922 		    }
3923 		  else
3924 		    {
3925 		      BFD_ASSERT (h->dynindx != -1);
3926 		      outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_DIR32);
3927 		    }
3928 		  outrel.r_addend = relocation;
3929 		  outrel.r_addend
3930 		    += (howto->partial_inplace
3931 			? bfd_get_32 (input_bfd, contents + rel->r_offset)
3932 			: addend);
3933 		}
3934 
3935 	      loc = sreloc->contents;
3936 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3937 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3938 
3939 	      check_segment[0] = check_segment[1] = -1;
3940 
3941 	      /* If this reloc is against an external symbol, we do
3942 		 not want to fiddle with the addend.  Otherwise, we
3943 		 need to include the symbol value so that it becomes
3944 		 an addend for the dynamic reloc.  */
3945 	      if (! relocate)
3946 		continue;
3947 	    }
3948 	  else if (fdpic_p && !bfd_link_pic (info)
3949 		   && r_type == R_SH_DIR32
3950 		   && (input_section->flags & SEC_ALLOC) != 0)
3951 	    {
3952 	      bfd_vma offset;
3953 
3954 	      BFD_ASSERT (htab);
3955 
3956 		if (sh_elf_osec_readonly_p (output_bfd,
3957 					    input_section->output_section))
3958 		  {
3959 		    _bfd_error_handler
3960 		      /* xgettext:c-format */
3961 		      (_("%pB(%pA+%#" PRIx64 "): "
3962 			 "cannot emit fixup to `%s' in read-only section"),
3963 		       input_bfd,
3964 		       input_section,
3965 		       (uint64_t) rel->r_offset,
3966 		       symname);
3967 		    return false;
3968 		  }
3969 
3970 	      offset = _bfd_elf_section_offset (output_bfd, info,
3971 						input_section, rel->r_offset);
3972 	      if (offset != (bfd_vma)-1)
3973 		sh_elf_add_rofixup (output_bfd, htab->srofixup,
3974 				    input_section->output_section->vma
3975 				    + input_section->output_offset
3976 				    + rel->r_offset);
3977 
3978 	      check_segment[0] = check_segment[1] = -1;
3979 	    }
3980 	    /* We don't want warnings for non-NULL tests on undefined weak
3981 	       symbols.  */
3982 	    else if (r_type == R_SH_REL32
3983 		     && h
3984 		     && h->root.type == bfd_link_hash_undefweak)
3985 	      check_segment[0] = check_segment[1] = -1;
3986 	  goto final_link_relocate;
3987 
3988 	case R_SH_GOTPLT32:
3989 	  /* Relocation is to the entry for this symbol in the
3990 	     procedure linkage table.  */
3991 
3992 	  if (h == NULL
3993 	      || h->forced_local
3994 	      || ! bfd_link_pic (info)
3995 	      || info->symbolic
3996 	      || h->dynindx == -1
3997 	      || h->plt.offset == (bfd_vma) -1
3998 	      || h->got.offset != (bfd_vma) -1)
3999 	    goto force_got;
4000 
4001 	  /* Relocation is to the entry for this symbol in the global
4002 	     offset table extension for the procedure linkage table.  */
4003 
4004 	  BFD_ASSERT (htab);
4005 	  BFD_ASSERT (sgotplt != NULL);
4006 	  relocation = (sgotplt->output_offset
4007 			+ (get_plt_index (htab->plt_info, h->plt.offset)
4008 			   + 3) * 4);
4009 
4010 #ifdef GOT_BIAS
4011 	  relocation -= GOT_BIAS;
4012 #endif
4013 
4014 	  goto final_link_relocate;
4015 
4016 	force_got:
4017 	case R_SH_GOT32:
4018 	case R_SH_GOT20:
4019 	  /* Relocation is to the entry for this symbol in the global
4020 	     offset table.  */
4021 
4022 	  BFD_ASSERT (htab);
4023 	  BFD_ASSERT (sgot != NULL);
4024 	  check_segment[0] = check_segment[1] = -1;
4025 
4026 	  if (h != NULL)
4027 	    {
4028 	      bool dyn;
4029 
4030 	      off = h->got.offset;
4031 	      BFD_ASSERT (off != (bfd_vma) -1);
4032 
4033 	      dyn = htab->root.dynamic_sections_created;
4034 	      if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
4035 						     bfd_link_pic (info),
4036 						     h)
4037 		  || (bfd_link_pic (info)
4038 		      && SYMBOL_REFERENCES_LOCAL (info, h))
4039 		  || ((ELF_ST_VISIBILITY (h->other)
4040 		       || resolved_to_zero)
4041 		      && h->root.type == bfd_link_hash_undefweak))
4042 		{
4043 		  /* This is actually a static link, or it is a
4044 		     -Bsymbolic link and the symbol is defined
4045 		     locally, or the symbol was forced to be local
4046 		     because of a version file.  We must initialize
4047 		     this entry in the global offset table.  Since the
4048 		     offset must always be a multiple of 4, we use the
4049 		     least significant bit to record whether we have
4050 		     initialized it already.
4051 
4052 		     When doing a dynamic link, we create a .rela.got
4053 		     relocation entry to initialize the value.  This
4054 		     is done in the finish_dynamic_symbol routine.  */
4055 		  if ((off & 1) != 0)
4056 		    off &= ~1;
4057 		  else
4058 		    {
4059 		      bfd_put_32 (output_bfd, relocation,
4060 				  sgot->contents + off);
4061 		      h->got.offset |= 1;
4062 
4063 		      /* If we initialize the GOT entry here with a valid
4064 			 symbol address, also add a fixup.  */
4065 		      if (fdpic_p && !bfd_link_pic (info)
4066 			  && sh_elf_hash_entry (h)->got_type == GOT_NORMAL
4067 			  && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4068 			      || h->root.type != bfd_link_hash_undefweak))
4069 			sh_elf_add_rofixup (output_bfd, htab->srofixup,
4070 					    sgot->output_section->vma
4071 					    + sgot->output_offset
4072 					    + off);
4073 		    }
4074 		}
4075 
4076 	      relocation = sh_elf_got_offset (htab) + off;
4077 	    }
4078 	  else
4079 	    {
4080 	      BFD_ASSERT (local_got_offsets != NULL
4081 			  && local_got_offsets[r_symndx] != (bfd_vma) -1);
4082 
4083 	      off = local_got_offsets[r_symndx];
4084 
4085 	      /* The offset must always be a multiple of 4.  We use
4086 		 the least significant bit to record whether we have
4087 		 already generated the necessary reloc.  */
4088 	      if ((off & 1) != 0)
4089 		off &= ~1;
4090 	      else
4091 		{
4092 		  bfd_put_32 (output_bfd, relocation, sgot->contents + off);
4093 
4094 		  if (bfd_link_pic (info))
4095 		    {
4096 		      Elf_Internal_Rela outrel;
4097 		      bfd_byte *loc;
4098 
4099 		      outrel.r_offset = (sgot->output_section->vma
4100 					 + sgot->output_offset
4101 					 + off);
4102 		      if (fdpic_p)
4103 			{
4104 			  int dynindx
4105 			    = elf_section_data (sec->output_section)->dynindx;
4106 			  outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4107 			  outrel.r_addend = relocation;
4108 			  outrel.r_addend -= sec->output_section->vma;
4109 			}
4110 		      else
4111 			{
4112 			  outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
4113 			  outrel.r_addend = relocation;
4114 			}
4115 		      loc = srelgot->contents;
4116 		      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4117 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4118 		    }
4119 		  else if (fdpic_p
4120 			   && (sh_elf_local_got_type (input_bfd) [r_symndx]
4121 			       == GOT_NORMAL))
4122 		    sh_elf_add_rofixup (output_bfd, htab->srofixup,
4123 					sgot->output_section->vma
4124 					+ sgot->output_offset
4125 					+ off);
4126 
4127 		  local_got_offsets[r_symndx] |= 1;
4128 		}
4129 
4130 	      relocation = sh_elf_got_offset (htab) + off;
4131 	    }
4132 
4133 #ifdef GOT_BIAS
4134 	  relocation -= GOT_BIAS;
4135 #endif
4136 
4137 	  if (r_type == R_SH_GOT20)
4138 	    {
4139 	      r = install_movi20_field (output_bfd, relocation + addend,
4140 					input_bfd, input_section, contents,
4141 					rel->r_offset);
4142 	      break;
4143 	    }
4144 	  else
4145 	    goto final_link_relocate;
4146 
4147 	case R_SH_GOTOFF:
4148 	case R_SH_GOTOFF20:
4149 	  /* GOTOFF relocations are relative to _GLOBAL_OFFSET_TABLE_, which
4150 	     we place at the start of the .got.plt section.  This is the same
4151 	     as the start of the output .got section, unless there are function
4152 	     descriptors in front of it.  */
4153 	  BFD_ASSERT (htab);
4154 	  BFD_ASSERT (sgotplt != NULL);
4155 	  check_segment[0] = got_segment;
4156 	  relocation -= sgotplt->output_section->vma + sgotplt->output_offset
4157 	    + htab->root.hgot->root.u.def.value;
4158 
4159 #ifdef GOT_BIAS
4160 	  relocation -= GOT_BIAS;
4161 #endif
4162 
4163 	  addend = rel->r_addend;
4164 
4165 	  if (r_type == R_SH_GOTOFF20)
4166 	    {
4167 	      r = install_movi20_field (output_bfd, relocation + addend,
4168 					input_bfd, input_section, contents,
4169 					rel->r_offset);
4170 	      break;
4171 	    }
4172 	  else
4173 	    goto final_link_relocate;
4174 
4175 	case R_SH_GOTPC:
4176 	  /* Use global offset table as symbol value.  */
4177 
4178 	  BFD_ASSERT (sgotplt != NULL);
4179 	  relocation = sgotplt->output_section->vma + sgotplt->output_offset;
4180 
4181 #ifdef GOT_BIAS
4182 	  relocation += GOT_BIAS;
4183 #endif
4184 
4185 	  addend = rel->r_addend;
4186 
4187 	  goto final_link_relocate;
4188 
4189 	case R_SH_PLT32:
4190 	  /* Relocation is to the entry for this symbol in the
4191 	     procedure linkage table.  */
4192 
4193 	  /* Resolve a PLT reloc against a local symbol directly,
4194 	     without using the procedure linkage table.  */
4195 	  if (h == NULL)
4196 	    goto final_link_relocate;
4197 
4198 	  /* We don't want to warn on calls to undefined weak symbols,
4199 	     as calls to them must be protected by non-NULL tests
4200 	     anyway, and unprotected calls would invoke undefined
4201 	     behavior.  */
4202 	  if (h->root.type == bfd_link_hash_undefweak)
4203 	    check_segment[0] = check_segment[1] = -1;
4204 
4205 	  if (h->forced_local)
4206 	    goto final_link_relocate;
4207 
4208 	  if (h->plt.offset == (bfd_vma) -1)
4209 	    {
4210 	      /* We didn't make a PLT entry for this symbol.  This
4211 		 happens when statically linking PIC code, or when
4212 		 using -Bsymbolic.  */
4213 	      goto final_link_relocate;
4214 	    }
4215 
4216 	  BFD_ASSERT (splt != NULL);
4217 	  check_segment[1] = plt_segment;
4218 	  relocation = (splt->output_section->vma
4219 			+ splt->output_offset
4220 			+ h->plt.offset);
4221 
4222 	  addend = rel->r_addend;
4223 
4224 	  goto final_link_relocate;
4225 
4226 	/* Relocation is to the canonical function descriptor for this
4227 	   symbol, possibly via the GOT.  Initialize the GOT
4228 	   entry and function descriptor if necessary.  */
4229 	case R_SH_GOTFUNCDESC:
4230 	case R_SH_GOTFUNCDESC20:
4231 	case R_SH_FUNCDESC:
4232 	  {
4233 	    int dynindx = -1;
4234 	    asection *reloc_section;
4235 	    bfd_vma reloc_offset;
4236 	    int reloc_type = R_SH_FUNCDESC;
4237 
4238 	    BFD_ASSERT (htab);
4239 
4240 	    check_segment[0] = check_segment[1] = -1;
4241 
4242 	    /* FIXME: See what FRV does for global symbols in the
4243 	       executable, with --export-dynamic.  Do they need ld.so
4244 	       to allocate official descriptors?  See what this code
4245 	       does.  */
4246 
4247 	    relocation = 0;
4248 	    addend = 0;
4249 
4250 	    if (r_type == R_SH_FUNCDESC)
4251 	      {
4252 		reloc_section = input_section;
4253 		reloc_offset = rel->r_offset;
4254 	      }
4255 	    else
4256 	      {
4257 		reloc_section = sgot;
4258 
4259 		if (h != NULL)
4260 		  reloc_offset = h->got.offset;
4261 		else
4262 		  {
4263 		    BFD_ASSERT (local_got_offsets != NULL);
4264 		    reloc_offset = local_got_offsets[r_symndx];
4265 		  }
4266 		BFD_ASSERT (reloc_offset != MINUS_ONE);
4267 
4268 		if (reloc_offset & 1)
4269 		  {
4270 		    reloc_offset &= ~1;
4271 		    goto funcdesc_done_got;
4272 		  }
4273 	      }
4274 
4275 	    if (h && h->root.type == bfd_link_hash_undefweak
4276 		&& (SYMBOL_CALLS_LOCAL (info, h)
4277 		    || !htab->root.dynamic_sections_created))
4278 	      /* Undefined weak symbol which will not be dynamically
4279 		 resolved later; leave it at zero.  */
4280 	      goto funcdesc_leave_zero;
4281 	    else if (SYMBOL_CALLS_LOCAL (info, h)
4282 		     && ! SYMBOL_FUNCDESC_LOCAL (info, h))
4283 	      {
4284 		/* If the symbol needs a non-local function descriptor
4285 		   but binds locally (i.e., its visibility is
4286 		   protected), emit a dynamic relocation decayed to
4287 		   section+offset.  This is an optimization; the dynamic
4288 		   linker would resolve our function descriptor request
4289 		   to our copy of the function anyway.  */
4290 		dynindx = elf_section_data (h->root.u.def.section
4291 					    ->output_section)->dynindx;
4292 		relocation += h->root.u.def.section->output_offset
4293 		  + h->root.u.def.value;
4294 	      }
4295 	    else if (! SYMBOL_FUNCDESC_LOCAL (info, h))
4296 	      {
4297 		/* If the symbol is dynamic and there will be dynamic
4298 		   symbol resolution because we are or are linked with a
4299 		   shared library, emit a FUNCDESC relocation such that
4300 		   the dynamic linker will allocate the function
4301 		   descriptor.  */
4302 		BFD_ASSERT (h->dynindx != -1);
4303 		dynindx = h->dynindx;
4304 	      }
4305 	    else
4306 	      {
4307 		bfd_vma offset;
4308 
4309 		/* Otherwise, we know we have a private function
4310 		   descriptor, so reference it directly.  */
4311 		reloc_type = R_SH_DIR32;
4312 		dynindx = elf_section_data (htab->sfuncdesc
4313 					    ->output_section)->dynindx;
4314 
4315 		if (h)
4316 		  {
4317 		    offset = sh_elf_hash_entry (h)->funcdesc.offset;
4318 		    BFD_ASSERT (offset != MINUS_ONE);
4319 		    if ((offset & 1) == 0)
4320 		      {
4321 			if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
4322 							 offset, NULL, 0))
4323 			  return false;
4324 			sh_elf_hash_entry (h)->funcdesc.offset |= 1;
4325 		      }
4326 		  }
4327 		else
4328 		  {
4329 		    union gotref *local_funcdesc;
4330 
4331 		    local_funcdesc = sh_elf_local_funcdesc (input_bfd);
4332 		    offset = local_funcdesc[r_symndx].offset;
4333 		    BFD_ASSERT (offset != MINUS_ONE);
4334 		    if ((offset & 1) == 0)
4335 		      {
4336 			if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
4337 							 offset, sec,
4338 							 sym->st_value))
4339 			  return false;
4340 			local_funcdesc[r_symndx].offset |= 1;
4341 		      }
4342 		  }
4343 
4344 		relocation = htab->sfuncdesc->output_offset + (offset & ~1);
4345 	      }
4346 
4347 	    if (!bfd_link_pic (info) && SYMBOL_FUNCDESC_LOCAL (info, h))
4348 	      {
4349 		bfd_vma offset;
4350 
4351 		if (sh_elf_osec_readonly_p (output_bfd,
4352 					    reloc_section->output_section))
4353 		  {
4354 		    _bfd_error_handler
4355 		      /* xgettext:c-format */
4356 		      (_("%pB(%pA+%#" PRIx64 "): "
4357 			 "cannot emit fixup to `%s' in read-only section"),
4358 		       input_bfd,
4359 		       input_section,
4360 		       (uint64_t) rel->r_offset,
4361 		       symname);
4362 		    return false;
4363 		  }
4364 
4365 		offset = _bfd_elf_section_offset (output_bfd, info,
4366 						  reloc_section, reloc_offset);
4367 
4368 		if (offset != (bfd_vma)-1)
4369 		  sh_elf_add_rofixup (output_bfd, htab->srofixup,
4370 				      offset
4371 				      + reloc_section->output_section->vma
4372 				      + reloc_section->output_offset);
4373 	      }
4374 	    else if ((reloc_section->output_section->flags
4375 		      & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
4376 	      {
4377 		bfd_vma offset;
4378 
4379 		if (sh_elf_osec_readonly_p (output_bfd,
4380 					    reloc_section->output_section))
4381 		  {
4382 		    info->callbacks->warning
4383 		      (info,
4384 		       _("cannot emit dynamic relocations in read-only section"),
4385 		       symname, input_bfd, reloc_section, reloc_offset);
4386 		    return false;
4387 		  }
4388 
4389 		offset = _bfd_elf_section_offset (output_bfd, info,
4390 						  reloc_section, reloc_offset);
4391 
4392 		if (offset != (bfd_vma)-1)
4393 		  sh_elf_add_dyn_reloc (output_bfd, srelgot,
4394 					offset
4395 					+ reloc_section->output_section->vma
4396 					+ reloc_section->output_offset,
4397 					reloc_type, dynindx, relocation);
4398 
4399 		if (r_type == R_SH_FUNCDESC)
4400 		  {
4401 		    r = bfd_reloc_ok;
4402 		    break;
4403 		  }
4404 		else
4405 		  {
4406 		    relocation = 0;
4407 		    goto funcdesc_leave_zero;
4408 		  }
4409 	      }
4410 
4411 	    if (SYMBOL_FUNCDESC_LOCAL (info, h))
4412 	      relocation += htab->sfuncdesc->output_section->vma;
4413 	  funcdesc_leave_zero:
4414 	    if (r_type != R_SH_FUNCDESC)
4415 	      {
4416 		bfd_put_32 (output_bfd, relocation,
4417 			    reloc_section->contents + reloc_offset);
4418 		if (h != NULL)
4419 		  h->got.offset |= 1;
4420 		else
4421 		  local_got_offsets[r_symndx] |= 1;
4422 
4423 	      funcdesc_done_got:
4424 
4425 		relocation = sh_elf_got_offset (htab) + reloc_offset;
4426 #ifdef GOT_BIAS
4427 		relocation -= GOT_BIAS;
4428 #endif
4429 	      }
4430 	    if (r_type == R_SH_GOTFUNCDESC20)
4431 	      {
4432 		r = install_movi20_field (output_bfd, relocation + addend,
4433 					  input_bfd, input_section, contents,
4434 					  rel->r_offset);
4435 		break;
4436 	      }
4437 	    else
4438 	      goto final_link_relocate;
4439 	  }
4440 	  break;
4441 
4442 	case R_SH_GOTOFFFUNCDESC:
4443 	case R_SH_GOTOFFFUNCDESC20:
4444 	  /* FIXME: See R_SH_FUNCDESC comment about global symbols in the
4445 	     executable and --export-dynamic.  If such symbols get
4446 	     ld.so-allocated descriptors we can not use R_SH_GOTOFFFUNCDESC
4447 	     for them.  */
4448 	  BFD_ASSERT (htab);
4449 
4450 	  check_segment[0] = check_segment[1] = -1;
4451 	  relocation = 0;
4452 	  addend = rel->r_addend;
4453 
4454 	  if (h && (h->root.type == bfd_link_hash_undefweak
4455 		    || !SYMBOL_FUNCDESC_LOCAL (info, h)))
4456 	    {
4457 	      _bfd_error_handler
4458 		/* xgettext:c-format */
4459 		(_("%pB(%pA+%#" PRIx64 "): "
4460 		   "%s relocation against external symbol \"%s\""),
4461 		 input_bfd, input_section, (uint64_t) rel->r_offset,
4462 		 howto->name, h->root.root.string);
4463 	      return false;
4464 	    }
4465 	  else
4466 	    {
4467 	      bfd_vma offset;
4468 
4469 	      /* Otherwise, we know we have a private function
4470 		 descriptor, so reference it directly.  */
4471 	      if (h)
4472 		{
4473 		  offset = sh_elf_hash_entry (h)->funcdesc.offset;
4474 		  BFD_ASSERT (offset != MINUS_ONE);
4475 		  if ((offset & 1) == 0)
4476 		    {
4477 		      if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
4478 						       offset, NULL, 0))
4479 			return false;
4480 		      sh_elf_hash_entry (h)->funcdesc.offset |= 1;
4481 		    }
4482 		}
4483 	      else
4484 		{
4485 		  union gotref *local_funcdesc;
4486 
4487 		  local_funcdesc = sh_elf_local_funcdesc (input_bfd);
4488 		  offset = local_funcdesc[r_symndx].offset;
4489 		  BFD_ASSERT (offset != MINUS_ONE);
4490 		  if ((offset & 1) == 0)
4491 		    {
4492 		      if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
4493 						       offset, sec,
4494 						       sym->st_value))
4495 			return false;
4496 		      local_funcdesc[r_symndx].offset |= 1;
4497 		    }
4498 		}
4499 
4500 	      relocation = htab->sfuncdesc->output_offset + (offset & ~1);
4501 	    }
4502 
4503 	  relocation -= (htab->root.hgot->root.u.def.value
4504 			 + sgotplt->output_offset);
4505 #ifdef GOT_BIAS
4506 	  relocation -= GOT_BIAS;
4507 #endif
4508 
4509 	  if (r_type == R_SH_GOTOFFFUNCDESC20)
4510 	    {
4511 	      r = install_movi20_field (output_bfd, relocation + addend,
4512 					input_bfd, input_section, contents,
4513 					rel->r_offset);
4514 	      break;
4515 	    }
4516 	  else
4517 	    goto final_link_relocate;
4518 
4519 	case R_SH_LOOP_START:
4520 	  {
4521 	    static bfd_vma start, end;
4522 
4523 	    start = (relocation + rel->r_addend
4524 		     - (sec->output_section->vma + sec->output_offset));
4525 	    r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
4526 				   rel->r_offset, sec, start, end);
4527 	    break;
4528 
4529 	case R_SH_LOOP_END:
4530 	    end = (relocation + rel->r_addend
4531 		   - (sec->output_section->vma + sec->output_offset));
4532 	    r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
4533 				   rel->r_offset, sec, start, end);
4534 	    break;
4535 	  }
4536 
4537 	case R_SH_TLS_GD_32:
4538 	case R_SH_TLS_IE_32:
4539 	  BFD_ASSERT (htab);
4540 	  check_segment[0] = check_segment[1] = -1;
4541 	  r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
4542 	  got_type = GOT_UNKNOWN;
4543 	  if (h == NULL && local_got_offsets)
4544 	    got_type = sh_elf_local_got_type (input_bfd) [r_symndx];
4545 	  else if (h != NULL)
4546 	    {
4547 	      got_type = sh_elf_hash_entry (h)->got_type;
4548 	      if (! bfd_link_pic (info)
4549 		  && (h->dynindx == -1
4550 		      || h->def_regular))
4551 		r_type = R_SH_TLS_LE_32;
4552 	    }
4553 
4554 	  if (r_type == R_SH_TLS_GD_32 && got_type == GOT_TLS_IE)
4555 	    r_type = R_SH_TLS_IE_32;
4556 
4557 	  if (r_type == R_SH_TLS_LE_32)
4558 	    {
4559 	      bfd_vma offset;
4560 	      unsigned short insn;
4561 
4562 	      if (ELF32_R_TYPE (rel->r_info) == R_SH_TLS_GD_32)
4563 		{
4564 		  /* GD->LE transition:
4565 		       mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
4566 		       jsr @r1; add r12,r4; bra 3f; nop; .align 2;
4567 		       1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
4568 		     We change it into:
4569 		       mov.l 1f,r4; stc gbr,r0; add r4,r0; nop;
4570 		       nop; nop; ...
4571 		       1: .long x@TPOFF; 2: .long __tls_get_addr@PLT; 3:.  */
4572 
4573 		  offset = rel->r_offset;
4574 		  if (offset < 16)
4575 		    {
4576 		      _bfd_error_handler
4577 			/* xgettext:c-format */
4578 			(_("%pB(%pA): offset in relocation for GD->LE translation is too small: %#" PRIx64),
4579 			 input_bfd, input_section, (uint64_t) offset);
4580 		      return false;
4581 		    }
4582 
4583 		  /* Size of GD instructions is 16 or 18.  */
4584 		  offset -= 16;
4585 		  insn = bfd_get_16 (input_bfd, contents + offset + 0);
4586 		  if ((insn & 0xff00) == 0xc700)
4587 		    {
4588 		      BFD_ASSERT (offset >= 2);
4589 		      offset -= 2;
4590 		      insn = bfd_get_16 (input_bfd, contents + offset + 0);
4591 		    }
4592 
4593 		  if ((insn & 0xff00) != 0xd400)
4594 		    _bfd_error_handler
4595 		      /* xgettext:c-format */  /* The backslash is to prevent bogus trigraph detection.  */
4596 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0xd4?\?)"),
4597 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4598 
4599 		  insn = bfd_get_16 (input_bfd, contents + offset + 2);
4600 
4601 		  if ((insn & 0xff00) != 0xc700)
4602 		    _bfd_error_handler
4603 		      /* xgettext:c-format */
4604 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0xc7?\?)"),
4605 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4606 
4607 		  insn = bfd_get_16 (input_bfd, contents + offset + 4);
4608 		  if ((insn & 0xff00) != 0xd100)
4609 		    _bfd_error_handler
4610 		      /* xgettext:c-format */
4611 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0xd1?\?)"),
4612 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4613 
4614 		  insn = bfd_get_16 (input_bfd, contents + offset + 6);
4615 		  if (insn != 0x310c)
4616 		    _bfd_error_handler
4617 		      /* xgettext:c-format */
4618 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x310c)"),
4619 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4620 
4621 		  insn = bfd_get_16 (input_bfd, contents + offset + 8);
4622 		  if (insn != 0x410b)
4623 		    _bfd_error_handler
4624 		      /* xgettext:c-format */
4625 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x410b)"),
4626 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4627 
4628 		  insn = bfd_get_16 (input_bfd, contents + offset + 10);
4629 		  if (insn != 0x34cc)
4630 		    _bfd_error_handler
4631 		      /* xgettext:c-format */
4632 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x34cc)"),
4633 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4634 
4635 		  bfd_put_16 (output_bfd, 0x0012, contents + offset + 2);
4636 		  bfd_put_16 (output_bfd, 0x304c, contents + offset + 4);
4637 		  bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
4638 		  bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
4639 		  bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
4640 		}
4641 	      else
4642 		{
4643 		  int target;
4644 
4645 		  /* IE->LE transition:
4646 		         mov.l 1f,r0;
4647 		         stc gbr,rN;
4648 		         mov.l @(r0,r12),rM;
4649 		         bra 2f;
4650 		         add ...;
4651 		         .align 2;
4652 		       1: x@GOTTPOFF;
4653 		       2:
4654 		     We change it into:
4655 		         mov.l .Ln,rM;
4656 			 stc gbr,rN;
4657 			 nop;
4658 			 ...;
4659 		       1: x@TPOFF;
4660 		       2:.  */
4661 
4662 		  offset = rel->r_offset;
4663 		  if (offset < 16)
4664 		    {
4665 		      _bfd_error_handler
4666 			/* xgettext:c-format */
4667 			(_("%pB(%pA): offset in relocation for IE->LE translation is too small: %#" PRIx64),
4668 			 input_bfd, input_section, (uint64_t) offset);
4669 		      return false;
4670 		    }
4671 
4672 		  /* Size of IE instructions is 10 or 12.  */
4673 		  offset -= 10;
4674 		  insn = bfd_get_16 (input_bfd, contents + offset + 0);
4675 		  if ((insn & 0xf0ff) == 0x0012)
4676 		    {
4677 		      BFD_ASSERT (offset >= 2);
4678 		      offset -= 2;
4679 		      insn = bfd_get_16 (input_bfd, contents + offset + 0);
4680 		    }
4681 
4682 		  if ((insn & 0xff00) != 0xd000)
4683 		    _bfd_error_handler
4684 		      /* xgettext:c-format */
4685 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0xd0??: mov.l)"),
4686 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4687 
4688 		  target = insn & 0x00ff;
4689 
4690 		  insn = bfd_get_16 (input_bfd, contents + offset + 2);
4691 		  if ((insn & 0xf0ff) != 0x0012)
4692 		    _bfd_error_handler
4693 		      /* xgettext:c-format */
4694 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x0?12: stc)"),
4695 		       input_bfd, input_section, (uint64_t) (offset + 2), (int) insn);
4696 
4697 		  insn = bfd_get_16 (input_bfd, contents + offset + 4);
4698 		  if ((insn & 0xf0ff) != 0x00ce)
4699 		    _bfd_error_handler
4700 		      /* xgettext:c-format */
4701 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x0?ce: mov.l)"),
4702 		       input_bfd, input_section, (uint64_t) (offset + 4), (int) insn);
4703 
4704 		  insn = 0xd000 | (insn & 0x0f00) | target;
4705 		  bfd_put_16 (output_bfd, insn, contents + offset + 0);
4706 		  bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
4707 		}
4708 
4709 	      bfd_put_32 (output_bfd, tpoff (info, relocation),
4710 			  contents + rel->r_offset);
4711 	      continue;
4712 	    }
4713 
4714 	  if (sgot == NULL || sgotplt == NULL)
4715 	    abort ();
4716 
4717 	  if (h != NULL)
4718 	    off = h->got.offset;
4719 	  else
4720 	    {
4721 	      if (local_got_offsets == NULL)
4722 		abort ();
4723 
4724 	      off = local_got_offsets[r_symndx];
4725 	    }
4726 
4727 	  /* Relocate R_SH_TLS_IE_32 directly when statically linking.  */
4728 	  if (r_type == R_SH_TLS_IE_32
4729 	      && ! htab->root.dynamic_sections_created)
4730 	    {
4731 	      off &= ~1;
4732 	      bfd_put_32 (output_bfd, tpoff (info, relocation),
4733 			  sgot->contents + off);
4734 	      bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
4735 			  contents + rel->r_offset);
4736 	      continue;
4737 	    }
4738 
4739 	  if ((off & 1) != 0)
4740 	    off &= ~1;
4741 	  else
4742 	    {
4743 	      Elf_Internal_Rela outrel;
4744 	      bfd_byte *loc;
4745 	      int dr_type, indx;
4746 
4747 	      outrel.r_offset = (sgot->output_section->vma
4748 				 + sgot->output_offset + off);
4749 
4750 	      if (h == NULL || h->dynindx == -1)
4751 		indx = 0;
4752 	      else
4753 		indx = h->dynindx;
4754 
4755 	      dr_type = (r_type == R_SH_TLS_GD_32 ? R_SH_TLS_DTPMOD32 :
4756 			 R_SH_TLS_TPOFF32);
4757 	      if (dr_type == R_SH_TLS_TPOFF32 && indx == 0)
4758 		outrel.r_addend = relocation - dtpoff_base (info);
4759 	      else
4760 		outrel.r_addend = 0;
4761 	      outrel.r_info = ELF32_R_INFO (indx, dr_type);
4762 	      loc = srelgot->contents;
4763 	      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4764 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4765 
4766 	      if (r_type == R_SH_TLS_GD_32)
4767 		{
4768 		  if (indx == 0)
4769 		    {
4770 		      bfd_put_32 (output_bfd,
4771 				  relocation - dtpoff_base (info),
4772 				  sgot->contents + off + 4);
4773 		    }
4774 		  else
4775 		    {
4776 		      outrel.r_info = ELF32_R_INFO (indx,
4777 						    R_SH_TLS_DTPOFF32);
4778 		      outrel.r_offset += 4;
4779 		      outrel.r_addend = 0;
4780 		      srelgot->reloc_count++;
4781 		      loc += sizeof (Elf32_External_Rela);
4782 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4783 		    }
4784 		}
4785 
4786 	      if (h != NULL)
4787 		h->got.offset |= 1;
4788 	      else
4789 		local_got_offsets[r_symndx] |= 1;
4790 	    }
4791 
4792 	  if (off >= (bfd_vma) -2)
4793 	    abort ();
4794 
4795 	  if (r_type == (int) ELF32_R_TYPE (rel->r_info))
4796 	    relocation = sh_elf_got_offset (htab) + off;
4797 	  else
4798 	    {
4799 	      bfd_vma offset;
4800 	      unsigned short insn;
4801 
4802 	      /* GD->IE transition:
4803 		   mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
4804 		   jsr @r1; add r12,r4; bra 3f; nop; .align 2;
4805 		   1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
4806 		 We change it into:
4807 		   mov.l 1f,r0; stc gbr,r4; mov.l @(r0,r12),r0; add r4,r0;
4808 		   nop; nop; bra 3f; nop; .align 2;
4809 		   1: .long x@TPOFF; 2:...; 3:.  */
4810 
4811 	      offset = rel->r_offset;
4812 	      if (offset < 16)
4813 		{
4814 		  _bfd_error_handler
4815 		    /* xgettext:c-format */
4816 		    (_("%pB(%pA): offset in relocation for GD->IE translation is too small: %#" PRIx64),
4817 		     input_bfd, input_section, (uint64_t) offset);
4818 		  return false;
4819 		}
4820 
4821 	      /* Size of GD instructions is 16 or 18.  */
4822 	      offset -= 16;
4823 	      insn = bfd_get_16 (input_bfd, contents + offset + 0);
4824 	      if ((insn & 0xff00) == 0xc700)
4825 		{
4826 		  BFD_ASSERT (offset >= 2);
4827 		  offset -= 2;
4828 		  insn = bfd_get_16 (input_bfd, contents + offset + 0);
4829 		}
4830 
4831 	      BFD_ASSERT ((insn & 0xff00) == 0xd400);
4832 
4833 	      /* Replace mov.l 1f,R4 with mov.l 1f,r0.  */
4834 	      bfd_put_16 (output_bfd, insn & 0xf0ff, contents + offset);
4835 
4836 	      insn = bfd_get_16 (input_bfd, contents + offset + 2);
4837 	      BFD_ASSERT ((insn & 0xff00) == 0xc700);
4838 	      insn = bfd_get_16 (input_bfd, contents + offset + 4);
4839 	      BFD_ASSERT ((insn & 0xff00) == 0xd100);
4840 	      insn = bfd_get_16 (input_bfd, contents + offset + 6);
4841 	      BFD_ASSERT (insn == 0x310c);
4842 	      insn = bfd_get_16 (input_bfd, contents + offset + 8);
4843 	      BFD_ASSERT (insn == 0x410b);
4844 	      insn = bfd_get_16 (input_bfd, contents + offset + 10);
4845 	      BFD_ASSERT (insn == 0x34cc);
4846 
4847 	      bfd_put_16 (output_bfd, 0x0412, contents + offset + 2);
4848 	      bfd_put_16 (output_bfd, 0x00ce, contents + offset + 4);
4849 	      bfd_put_16 (output_bfd, 0x304c, contents + offset + 6);
4850 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
4851 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
4852 
4853 	      bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
4854 			  contents + rel->r_offset);
4855 
4856 	      continue;
4857 	  }
4858 
4859 	  addend = rel->r_addend;
4860 
4861 	  goto final_link_relocate;
4862 
4863 	case R_SH_TLS_LD_32:
4864 	  BFD_ASSERT (htab);
4865 	  check_segment[0] = check_segment[1] = -1;
4866 	  if (! bfd_link_pic (info))
4867 	    {
4868 	      bfd_vma offset;
4869 	      unsigned short insn;
4870 
4871 	      /* LD->LE transition:
4872 		   mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
4873 		   jsr @r1; add r12,r4; bra 3f; nop; .align 2;
4874 		   1: .long x$TLSLD; 2: .long __tls_get_addr@PLT; 3:
4875 		 We change it into:
4876 		   stc gbr,r0; nop; nop; nop;
4877 		   nop; nop; bra 3f; ...; 3:.  */
4878 
4879 	      offset = rel->r_offset;
4880 	      if (offset < 16)
4881 		{
4882 		  _bfd_error_handler
4883 		    /* xgettext:c-format */
4884 		    (_("%pB(%pA): offset in relocation for LD->LE translation is too small: %#" PRIx64),
4885 		     input_bfd, input_section, (uint64_t) offset);
4886 		  return false;
4887 		}
4888 
4889 	      /* Size of LD instructions is 16 or 18.  */
4890 	      offset -= 16;
4891 	      insn = bfd_get_16 (input_bfd, contents + offset + 0);
4892 	      if ((insn & 0xff00) == 0xc700)
4893 		{
4894 		  BFD_ASSERT (offset >= 2);
4895 		  offset -= 2;
4896 		  insn = bfd_get_16 (input_bfd, contents + offset + 0);
4897 		}
4898 
4899 	      BFD_ASSERT ((insn & 0xff00) == 0xd400);
4900 	      insn = bfd_get_16 (input_bfd, contents + offset + 2);
4901 	      BFD_ASSERT ((insn & 0xff00) == 0xc700);
4902 	      insn = bfd_get_16 (input_bfd, contents + offset + 4);
4903 	      BFD_ASSERT ((insn & 0xff00) == 0xd100);
4904 	      insn = bfd_get_16 (input_bfd, contents + offset + 6);
4905 	      BFD_ASSERT (insn == 0x310c);
4906 	      insn = bfd_get_16 (input_bfd, contents + offset + 8);
4907 	      BFD_ASSERT (insn == 0x410b);
4908 	      insn = bfd_get_16 (input_bfd, contents + offset + 10);
4909 	      BFD_ASSERT (insn == 0x34cc);
4910 
4911 	      bfd_put_16 (output_bfd, 0x0012, contents + offset + 0);
4912 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 2);
4913 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
4914 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
4915 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
4916 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
4917 
4918 	      continue;
4919 	    }
4920 
4921 	  if (sgot == NULL || sgotplt == NULL)
4922 	    abort ();
4923 
4924 	  off = htab->tls_ldm_got.offset;
4925 	  if (off & 1)
4926 	    off &= ~1;
4927 	  else
4928 	    {
4929 	      Elf_Internal_Rela outrel;
4930 	      bfd_byte *loc;
4931 
4932 	      outrel.r_offset = (sgot->output_section->vma
4933 				 + sgot->output_offset + off);
4934 	      outrel.r_addend = 0;
4935 	      outrel.r_info = ELF32_R_INFO (0, R_SH_TLS_DTPMOD32);
4936 	      loc = srelgot->contents;
4937 	      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4938 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4939 	      htab->tls_ldm_got.offset |= 1;
4940 	    }
4941 
4942 	  relocation = sh_elf_got_offset (htab) + off;
4943 	  addend = rel->r_addend;
4944 
4945 	  goto final_link_relocate;
4946 
4947 	case R_SH_TLS_LDO_32:
4948 	  check_segment[0] = check_segment[1] = -1;
4949 	  if (! bfd_link_pic (info))
4950 	    relocation = tpoff (info, relocation);
4951 	  else
4952 	    relocation -= dtpoff_base (info);
4953 
4954 	  addend = rel->r_addend;
4955 	  goto final_link_relocate;
4956 
4957 	case R_SH_TLS_LE_32:
4958 	  {
4959 	    int indx;
4960 	    Elf_Internal_Rela outrel;
4961 	    bfd_byte *loc;
4962 
4963 	    check_segment[0] = check_segment[1] = -1;
4964 
4965 	    if (!bfd_link_dll (info))
4966 	      {
4967 		relocation = tpoff (info, relocation);
4968 		addend = rel->r_addend;
4969 		goto final_link_relocate;
4970 	      }
4971 
4972 	    if (sreloc == NULL)
4973 	      {
4974 		sreloc = _bfd_elf_get_dynamic_reloc_section
4975 		  (input_bfd, input_section, /*rela?*/ true);
4976 		if (sreloc == NULL)
4977 		  return false;
4978 	      }
4979 
4980 	    if (h == NULL || h->dynindx == -1)
4981 	      indx = 0;
4982 	    else
4983 	      indx = h->dynindx;
4984 
4985 	    outrel.r_offset = (input_section->output_section->vma
4986 			       + input_section->output_offset
4987 			       + rel->r_offset);
4988 	    outrel.r_info = ELF32_R_INFO (indx, R_SH_TLS_TPOFF32);
4989 	    if (indx == 0)
4990 	      outrel.r_addend = relocation - dtpoff_base (info);
4991 	    else
4992 	      outrel.r_addend = 0;
4993 
4994 	    loc = sreloc->contents;
4995 	    loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
4996 	    bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4997 	    continue;
4998 	  }
4999 	}
5000 
5001     relocation_done:
5002       if (fdpic_p && check_segment[0] != (unsigned) -1
5003 	  && check_segment[0] != check_segment[1])
5004 	{
5005 	  /* We don't want duplicate errors for undefined symbols.  */
5006 	  if (!h || h->root.type != bfd_link_hash_undefined)
5007 	    {
5008 	      if (bfd_link_pic (info))
5009 		{
5010 		  info->callbacks->einfo
5011 		    /* xgettext:c-format */
5012 		    (_("%X%C: relocation to \"%s\" references a different segment\n"),
5013 		     input_bfd, input_section, rel->r_offset, symname);
5014 		  return false;
5015 		}
5016 	      else
5017 		info->callbacks->einfo
5018 		  /* xgettext:c-format */
5019 		  (_("%C: warning: relocation to \"%s\" references a different segment\n"),
5020 		   input_bfd, input_section, rel->r_offset, symname);
5021 	    }
5022 
5023 	  elf_elfheader (output_bfd)->e_flags |= EF_SH_PIC;
5024 	}
5025 
5026       if (r != bfd_reloc_ok)
5027 	{
5028 	  switch (r)
5029 	    {
5030 	    default:
5031 	    case bfd_reloc_outofrange:
5032 	      abort ();
5033 	    case bfd_reloc_overflow:
5034 	      {
5035 		const char *name;
5036 
5037 		if (h != NULL)
5038 		  name = NULL;
5039 		else
5040 		  {
5041 		    name = (bfd_elf_string_from_elf_section
5042 			    (input_bfd, symtab_hdr->sh_link, sym->st_name));
5043 		    if (name == NULL)
5044 		      return false;
5045 		    if (*name == '\0')
5046 		      name = bfd_section_name (sec);
5047 		  }
5048 		(*info->callbacks->reloc_overflow)
5049 		  (info, (h ? &h->root : NULL), name, howto->name,
5050 		   (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
5051 	      }
5052 	      break;
5053 	    }
5054 	}
5055     }
5056 
5057   return true;
5058 }
5059 
5060 /* This is a version of bfd_generic_get_relocated_section_contents
5061    which uses sh_elf_relocate_section.  */
5062 
5063 static bfd_byte *
sh_elf_get_relocated_section_contents(bfd * output_bfd,struct bfd_link_info * link_info,struct bfd_link_order * link_order,bfd_byte * data,bool relocatable,asymbol ** symbols)5064 sh_elf_get_relocated_section_contents (bfd *output_bfd,
5065 				       struct bfd_link_info *link_info,
5066 				       struct bfd_link_order *link_order,
5067 				       bfd_byte *data,
5068 				       bool relocatable,
5069 				       asymbol **symbols)
5070 {
5071   Elf_Internal_Shdr *symtab_hdr;
5072   asection *input_section = link_order->u.indirect.section;
5073   bfd *input_bfd = input_section->owner;
5074   asection **sections = NULL;
5075   Elf_Internal_Rela *internal_relocs = NULL;
5076   Elf_Internal_Sym *isymbuf = NULL;
5077 
5078   /* We only need to handle the case of relaxing, or of having a
5079      particular set of section contents, specially.  */
5080   if (relocatable
5081       || elf_section_data (input_section)->this_hdr.contents == NULL)
5082     return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
5083 						       link_order, data,
5084 						       relocatable,
5085 						       symbols);
5086 
5087   symtab_hdr = &elf_symtab_hdr (input_bfd);
5088 
5089   memcpy (data, elf_section_data (input_section)->this_hdr.contents,
5090 	  (size_t) input_section->size);
5091 
5092   if ((input_section->flags & SEC_RELOC) != 0
5093       && input_section->reloc_count > 0)
5094     {
5095       asection **secpp;
5096       Elf_Internal_Sym *isym, *isymend;
5097       bfd_size_type amt;
5098 
5099       internal_relocs = (_bfd_elf_link_read_relocs
5100 			 (input_bfd, input_section, NULL,
5101 			  (Elf_Internal_Rela *) NULL, false));
5102       if (internal_relocs == NULL)
5103 	goto error_return;
5104 
5105       if (symtab_hdr->sh_info != 0)
5106 	{
5107 	  isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5108 	  if (isymbuf == NULL)
5109 	    isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
5110 					    symtab_hdr->sh_info, 0,
5111 					    NULL, NULL, NULL);
5112 	  if (isymbuf == NULL)
5113 	    goto error_return;
5114 	}
5115 
5116       amt = symtab_hdr->sh_info;
5117       amt *= sizeof (asection *);
5118       sections = (asection **) bfd_malloc (amt);
5119       if (sections == NULL && amt != 0)
5120 	goto error_return;
5121 
5122       isymend = isymbuf + symtab_hdr->sh_info;
5123       for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
5124 	{
5125 	  asection *isec;
5126 
5127 	  if (isym->st_shndx == SHN_UNDEF)
5128 	    isec = bfd_und_section_ptr;
5129 	  else if (isym->st_shndx == SHN_ABS)
5130 	    isec = bfd_abs_section_ptr;
5131 	  else if (isym->st_shndx == SHN_COMMON)
5132 	    isec = bfd_com_section_ptr;
5133 	  else
5134 	    isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
5135 
5136 	  *secpp = isec;
5137 	}
5138 
5139       if (! sh_elf_relocate_section (output_bfd, link_info, input_bfd,
5140 				     input_section, data, internal_relocs,
5141 				     isymbuf, sections))
5142 	goto error_return;
5143 
5144       free (sections);
5145       if (symtab_hdr->contents != (unsigned char *) isymbuf)
5146 	free (isymbuf);
5147       if (elf_section_data (input_section)->relocs != internal_relocs)
5148 	free (internal_relocs);
5149     }
5150 
5151   return data;
5152 
5153  error_return:
5154   free (sections);
5155   if (symtab_hdr->contents != (unsigned char *) isymbuf)
5156     free (isymbuf);
5157   if (elf_section_data (input_section)->relocs != internal_relocs)
5158     free (internal_relocs);
5159   return NULL;
5160 }
5161 
5162 /* Return the base VMA address which should be subtracted from real addresses
5163    when resolving @dtpoff relocation.
5164    This is PT_TLS segment p_vaddr.  */
5165 
5166 static bfd_vma
dtpoff_base(struct bfd_link_info * info)5167 dtpoff_base (struct bfd_link_info *info)
5168 {
5169   /* If tls_sec is NULL, we should have signalled an error already.  */
5170   if (elf_hash_table (info)->tls_sec == NULL)
5171     return 0;
5172   return elf_hash_table (info)->tls_sec->vma;
5173 }
5174 
5175 /* Return the relocation value for R_SH_TLS_TPOFF32..  */
5176 
5177 static bfd_vma
tpoff(struct bfd_link_info * info,bfd_vma address)5178 tpoff (struct bfd_link_info *info, bfd_vma address)
5179 {
5180   /* If tls_sec is NULL, we should have signalled an error already.  */
5181   if (elf_hash_table (info)->tls_sec == NULL)
5182     return 0;
5183   /* SH TLS ABI is variant I and static TLS block start just after tcbhead
5184      structure which has 2 pointer fields.  */
5185   return (address - elf_hash_table (info)->tls_sec->vma
5186 	  + align_power ((bfd_vma) 8,
5187 			 elf_hash_table (info)->tls_sec->alignment_power));
5188 }
5189 
5190 static asection *
sh_elf_gc_mark_hook(asection * sec,struct bfd_link_info * info,Elf_Internal_Rela * rel,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)5191 sh_elf_gc_mark_hook (asection *sec,
5192 		     struct bfd_link_info *info,
5193 		     Elf_Internal_Rela *rel,
5194 		     struct elf_link_hash_entry *h,
5195 		     Elf_Internal_Sym *sym)
5196 {
5197   if (h != NULL)
5198     switch (ELF32_R_TYPE (rel->r_info))
5199       {
5200       case R_SH_GNU_VTINHERIT:
5201       case R_SH_GNU_VTENTRY:
5202 	return NULL;
5203       }
5204 
5205   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5206 }
5207 
5208 /* Copy the extra info we tack onto an elf_link_hash_entry.  */
5209 
5210 static void
sh_elf_copy_indirect_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * dir,struct elf_link_hash_entry * ind)5211 sh_elf_copy_indirect_symbol (struct bfd_link_info *info,
5212 			     struct elf_link_hash_entry *dir,
5213 			     struct elf_link_hash_entry *ind)
5214 {
5215   struct elf_sh_link_hash_entry *edir, *eind;
5216 
5217   edir = (struct elf_sh_link_hash_entry *) dir;
5218   eind = (struct elf_sh_link_hash_entry *) ind;
5219 
5220   edir->gotplt_refcount = eind->gotplt_refcount;
5221   eind->gotplt_refcount = 0;
5222   edir->funcdesc.refcount += eind->funcdesc.refcount;
5223   eind->funcdesc.refcount = 0;
5224   edir->abs_funcdesc_refcount += eind->abs_funcdesc_refcount;
5225   eind->abs_funcdesc_refcount = 0;
5226 
5227   if (ind->root.type == bfd_link_hash_indirect
5228       && dir->got.refcount <= 0)
5229     {
5230       edir->got_type = eind->got_type;
5231       eind->got_type = GOT_UNKNOWN;
5232     }
5233 
5234   if (ind->root.type != bfd_link_hash_indirect
5235       && dir->dynamic_adjusted)
5236     {
5237       /* If called to transfer flags for a weakdef during processing
5238 	 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
5239 	 We clear it ourselves for ELIMINATE_COPY_RELOCS.  */
5240       if (dir->versioned != versioned_hidden)
5241 	dir->ref_dynamic |= ind->ref_dynamic;
5242       dir->ref_regular |= ind->ref_regular;
5243       dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
5244       dir->needs_plt |= ind->needs_plt;
5245     }
5246   else
5247     _bfd_elf_link_hash_copy_indirect (info, dir, ind);
5248 }
5249 
5250 static int
sh_elf_optimized_tls_reloc(struct bfd_link_info * info,int r_type,int is_local)5251 sh_elf_optimized_tls_reloc (struct bfd_link_info *info, int r_type,
5252 			    int is_local)
5253 {
5254   if (bfd_link_pic (info))
5255     return r_type;
5256 
5257   switch (r_type)
5258     {
5259     case R_SH_TLS_GD_32:
5260     case R_SH_TLS_IE_32:
5261       if (is_local)
5262 	return R_SH_TLS_LE_32;
5263       return R_SH_TLS_IE_32;
5264     case R_SH_TLS_LD_32:
5265       return R_SH_TLS_LE_32;
5266     }
5267 
5268   return r_type;
5269 }
5270 
5271 /* Look through the relocs for a section during the first phase.
5272    Since we don't do .gots or .plts, we just need to consider the
5273    virtual table relocs for gc.  */
5274 
5275 static bool
sh_elf_check_relocs(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)5276 sh_elf_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
5277 		     const Elf_Internal_Rela *relocs)
5278 {
5279   Elf_Internal_Shdr *symtab_hdr;
5280   struct elf_link_hash_entry **sym_hashes;
5281   struct elf_sh_link_hash_table *htab;
5282   const Elf_Internal_Rela *rel;
5283   const Elf_Internal_Rela *rel_end;
5284   asection *sreloc;
5285   unsigned int r_type;
5286   enum got_type got_type, old_got_type;
5287 
5288   sreloc = NULL;
5289 
5290   if (bfd_link_relocatable (info))
5291     return true;
5292 
5293   BFD_ASSERT (is_sh_elf (abfd));
5294 
5295   symtab_hdr = &elf_symtab_hdr (abfd);
5296   sym_hashes = elf_sym_hashes (abfd);
5297 
5298   htab = sh_elf_hash_table (info);
5299   if (htab == NULL)
5300     return false;
5301 
5302   rel_end = relocs + sec->reloc_count;
5303   for (rel = relocs; rel < rel_end; rel++)
5304     {
5305       struct elf_link_hash_entry *h;
5306       unsigned long r_symndx;
5307 
5308       r_symndx = ELF32_R_SYM (rel->r_info);
5309       r_type = ELF32_R_TYPE (rel->r_info);
5310 
5311       if (r_symndx < symtab_hdr->sh_info)
5312 	h = NULL;
5313       else
5314 	{
5315 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5316 	  while (h->root.type == bfd_link_hash_indirect
5317 		 || h->root.type == bfd_link_hash_warning)
5318 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
5319 	}
5320 
5321       r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
5322       if (! bfd_link_pic (info)
5323 	  && r_type == R_SH_TLS_IE_32
5324 	  && h != NULL
5325 	  && h->root.type != bfd_link_hash_undefined
5326 	  && h->root.type != bfd_link_hash_undefweak
5327 	  && (h->dynindx == -1
5328 	      || h->def_regular))
5329 	r_type = R_SH_TLS_LE_32;
5330 
5331       if (htab->fdpic_p)
5332 	switch (r_type)
5333 	  {
5334 	  case R_SH_GOTOFFFUNCDESC:
5335 	  case R_SH_GOTOFFFUNCDESC20:
5336 	  case R_SH_FUNCDESC:
5337 	  case R_SH_GOTFUNCDESC:
5338 	  case R_SH_GOTFUNCDESC20:
5339 	    if (h != NULL)
5340 	      {
5341 		if (h->dynindx == -1)
5342 		  switch (ELF_ST_VISIBILITY (h->other))
5343 		    {
5344 		    case STV_INTERNAL:
5345 		    case STV_HIDDEN:
5346 		      break;
5347 		    default:
5348 		      bfd_elf_link_record_dynamic_symbol (info, h);
5349 		      break;
5350 		    }
5351 	      }
5352 	    break;
5353 	  }
5354 
5355       /* Some relocs require a global offset table.  */
5356       if (htab->root.sgot == NULL)
5357 	{
5358 	  switch (r_type)
5359 	    {
5360 	    case R_SH_DIR32:
5361 	      /* This may require an rofixup.  */
5362 	      if (!htab->fdpic_p)
5363 		break;
5364 	      /* Fall through.  */
5365 	    case R_SH_GOTPLT32:
5366 	    case R_SH_GOT32:
5367 	    case R_SH_GOT20:
5368 	    case R_SH_GOTOFF:
5369 	    case R_SH_GOTOFF20:
5370 	    case R_SH_FUNCDESC:
5371 	    case R_SH_GOTFUNCDESC:
5372 	    case R_SH_GOTFUNCDESC20:
5373 	    case R_SH_GOTOFFFUNCDESC:
5374 	    case R_SH_GOTOFFFUNCDESC20:
5375 	    case R_SH_GOTPC:
5376 	    case R_SH_TLS_GD_32:
5377 	    case R_SH_TLS_LD_32:
5378 	    case R_SH_TLS_IE_32:
5379 	      if (htab->root.dynobj == NULL)
5380 		htab->root.dynobj = abfd;
5381 	      if (!create_got_section (htab->root.dynobj, info))
5382 		return false;
5383 	      break;
5384 
5385 	    default:
5386 	      break;
5387 	    }
5388 	}
5389 
5390       switch (r_type)
5391 	{
5392 	  /* This relocation describes the C++ object vtable hierarchy.
5393 	     Reconstruct it for later use during GC.  */
5394 	case R_SH_GNU_VTINHERIT:
5395 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
5396 	    return false;
5397 	  break;
5398 
5399 	  /* This relocation describes which C++ vtable entries are actually
5400 	     used.  Record for later use during GC.  */
5401 	case R_SH_GNU_VTENTRY:
5402 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
5403 	    return false;
5404 	  break;
5405 
5406 	case R_SH_TLS_IE_32:
5407 	  if (bfd_link_pic (info))
5408 	    info->flags |= DF_STATIC_TLS;
5409 
5410 	  /* FALLTHROUGH */
5411 	force_got:
5412 	case R_SH_TLS_GD_32:
5413 	case R_SH_GOT32:
5414 	case R_SH_GOT20:
5415 	case R_SH_GOTFUNCDESC:
5416 	case R_SH_GOTFUNCDESC20:
5417 	  switch (r_type)
5418 	    {
5419 	    default:
5420 	      got_type = GOT_NORMAL;
5421 	      break;
5422 	    case R_SH_TLS_GD_32:
5423 	      got_type = GOT_TLS_GD;
5424 	      break;
5425 	    case R_SH_TLS_IE_32:
5426 	      got_type = GOT_TLS_IE;
5427 	      break;
5428 	    case R_SH_GOTFUNCDESC:
5429 	    case R_SH_GOTFUNCDESC20:
5430 	      got_type = GOT_FUNCDESC;
5431 	      break;
5432 	    }
5433 
5434 	  if (h != NULL)
5435 	    {
5436 	      h->got.refcount += 1;
5437 	      old_got_type = sh_elf_hash_entry (h)->got_type;
5438 	    }
5439 	  else
5440 	    {
5441 	      bfd_signed_vma *local_got_refcounts;
5442 
5443 	      /* This is a global offset table entry for a local
5444 		 symbol.  */
5445 	      local_got_refcounts = elf_local_got_refcounts (abfd);
5446 	      if (local_got_refcounts == NULL)
5447 		{
5448 		  bfd_size_type size;
5449 
5450 		  size = symtab_hdr->sh_info;
5451 		  size *= sizeof (bfd_signed_vma);
5452 		  size += symtab_hdr->sh_info;
5453 		  local_got_refcounts = ((bfd_signed_vma *)
5454 					 bfd_zalloc (abfd, size));
5455 		  if (local_got_refcounts == NULL)
5456 		    return false;
5457 		  elf_local_got_refcounts (abfd) = local_got_refcounts;
5458 		  sh_elf_local_got_type (abfd)
5459 		    = (char *) (local_got_refcounts + symtab_hdr->sh_info);
5460 		}
5461 	      local_got_refcounts[r_symndx] += 1;
5462 	      old_got_type = sh_elf_local_got_type (abfd) [r_symndx];
5463 	    }
5464 
5465 	  /* If a TLS symbol is accessed using IE at least once,
5466 	     there is no point to use dynamic model for it.  */
5467 	  if (old_got_type != got_type && old_got_type != GOT_UNKNOWN
5468 	      && (old_got_type != GOT_TLS_GD || got_type != GOT_TLS_IE))
5469 	    {
5470 	      if (old_got_type == GOT_TLS_IE && got_type == GOT_TLS_GD)
5471 		got_type = GOT_TLS_IE;
5472 	      else
5473 		{
5474 		  if ((old_got_type == GOT_FUNCDESC || got_type == GOT_FUNCDESC)
5475 		      && (old_got_type == GOT_NORMAL || got_type == GOT_NORMAL))
5476 		    _bfd_error_handler
5477 		      /* xgettext:c-format */
5478 		      (_("%pB: `%s' accessed both as normal and FDPIC symbol"),
5479 		       abfd, h->root.root.string);
5480 		  else if (old_got_type == GOT_FUNCDESC
5481 			   || got_type == GOT_FUNCDESC)
5482 		    _bfd_error_handler
5483 		      /* xgettext:c-format */
5484 		      (_("%pB: `%s' accessed both as FDPIC and thread local symbol"),
5485 		       abfd, h->root.root.string);
5486 		  else
5487 		    _bfd_error_handler
5488 		      /* xgettext:c-format */
5489 		      (_("%pB: `%s' accessed both as normal and thread local symbol"),
5490 		       abfd, h->root.root.string);
5491 		  return false;
5492 		}
5493 	    }
5494 
5495 	  if (old_got_type != got_type)
5496 	    {
5497 	      if (h != NULL)
5498 		sh_elf_hash_entry (h)->got_type = got_type;
5499 	      else
5500 		sh_elf_local_got_type (abfd) [r_symndx] = got_type;
5501 	    }
5502 
5503 	  break;
5504 
5505 	case R_SH_TLS_LD_32:
5506 	  sh_elf_hash_table(info)->tls_ldm_got.refcount += 1;
5507 	  break;
5508 
5509 	case R_SH_FUNCDESC:
5510 	case R_SH_GOTOFFFUNCDESC:
5511 	case R_SH_GOTOFFFUNCDESC20:
5512 	  if (rel->r_addend)
5513 	    {
5514 	      _bfd_error_handler
5515 		(_("%pB: Function descriptor relocation with non-zero addend"),
5516 		 abfd);
5517 	      return false;
5518 	    }
5519 
5520 	  if (h == NULL)
5521 	    {
5522 	      union gotref *local_funcdesc;
5523 
5524 	      /* We need a function descriptor for a local symbol.  */
5525 	      local_funcdesc = sh_elf_local_funcdesc (abfd);
5526 	      if (local_funcdesc == NULL)
5527 		{
5528 		  bfd_size_type size;
5529 
5530 		  size = symtab_hdr->sh_info * sizeof (union gotref);
5531 		  local_funcdesc = (union gotref *) bfd_zalloc (abfd, size);
5532 		  if (local_funcdesc == NULL)
5533 		    return false;
5534 		  sh_elf_local_funcdesc (abfd) = local_funcdesc;
5535 		}
5536 	      local_funcdesc[r_symndx].refcount += 1;
5537 
5538 	      if (r_type == R_SH_FUNCDESC)
5539 		{
5540 		  if (!bfd_link_pic (info))
5541 		    htab->srofixup->size += 4;
5542 		  else
5543 		    htab->root.srelgot->size += sizeof (Elf32_External_Rela);
5544 		}
5545 	    }
5546 	  else
5547 	    {
5548 	      sh_elf_hash_entry (h)->funcdesc.refcount++;
5549 	      if (r_type == R_SH_FUNCDESC)
5550 		sh_elf_hash_entry (h)->abs_funcdesc_refcount++;
5551 
5552 	      /* If there is a function descriptor reference, then
5553 		 there should not be any non-FDPIC references.  */
5554 	      old_got_type = sh_elf_hash_entry (h)->got_type;
5555 	      if (old_got_type != GOT_FUNCDESC && old_got_type != GOT_UNKNOWN)
5556 		{
5557 		  if (old_got_type == GOT_NORMAL)
5558 		    _bfd_error_handler
5559 		      /* xgettext:c-format */
5560 		      (_("%pB: `%s' accessed both as normal and FDPIC symbol"),
5561 		       abfd, h->root.root.string);
5562 		  else
5563 		    _bfd_error_handler
5564 		      /* xgettext:c-format */
5565 		      (_("%pB: `%s' accessed both as FDPIC and thread local symbol"),
5566 		       abfd, h->root.root.string);
5567 		}
5568 	    }
5569 	  break;
5570 
5571 	case R_SH_GOTPLT32:
5572 	  /* If this is a local symbol, we resolve it directly without
5573 	     creating a procedure linkage table entry.  */
5574 
5575 	  if (h == NULL
5576 	      || h->forced_local
5577 	      || ! bfd_link_pic (info)
5578 	      || info->symbolic
5579 	      || h->dynindx == -1)
5580 	    goto force_got;
5581 
5582 	  h->needs_plt = 1;
5583 	  h->plt.refcount += 1;
5584 	  ((struct elf_sh_link_hash_entry *) h)->gotplt_refcount += 1;
5585 
5586 	  break;
5587 
5588 	case R_SH_PLT32:
5589 	  /* This symbol requires a procedure linkage table entry.  We
5590 	     actually build the entry in adjust_dynamic_symbol,
5591 	     because this might be a case of linking PIC code which is
5592 	     never referenced by a dynamic object, in which case we
5593 	     don't need to generate a procedure linkage table entry
5594 	     after all.  */
5595 
5596 	  /* If this is a local symbol, we resolve it directly without
5597 	     creating a procedure linkage table entry.  */
5598 	  if (h == NULL)
5599 	    continue;
5600 
5601 	  if (h->forced_local)
5602 	    break;
5603 
5604 	  h->needs_plt = 1;
5605 	  h->plt.refcount += 1;
5606 	  break;
5607 
5608 	case R_SH_DIR32:
5609 	case R_SH_REL32:
5610 	  if (h != NULL && ! bfd_link_pic (info))
5611 	    {
5612 	      h->non_got_ref = 1;
5613 	      h->plt.refcount += 1;
5614 	    }
5615 
5616 	  /* If we are creating a shared library, and this is a reloc
5617 	     against a global symbol, or a non PC relative reloc
5618 	     against a local symbol, then we need to copy the reloc
5619 	     into the shared library.  However, if we are linking with
5620 	     -Bsymbolic, we do not need to copy a reloc against a
5621 	     global symbol which is defined in an object we are
5622 	     including in the link (i.e., DEF_REGULAR is set).  At
5623 	     this point we have not seen all the input files, so it is
5624 	     possible that DEF_REGULAR is not set now but will be set
5625 	     later (it is never cleared).  We account for that
5626 	     possibility below by storing information in the
5627 	     dyn_relocs field of the hash table entry. A similar
5628 	     situation occurs when creating shared libraries and symbol
5629 	     visibility changes render the symbol local.
5630 
5631 	     If on the other hand, we are creating an executable, we
5632 	     may need to keep relocations for symbols satisfied by a
5633 	     dynamic library if we manage to avoid copy relocs for the
5634 	     symbol.  */
5635 	  if ((bfd_link_pic (info)
5636 	       && (sec->flags & SEC_ALLOC) != 0
5637 	       && (r_type != R_SH_REL32
5638 		   || (h != NULL
5639 		       && (! info->symbolic
5640 			   || h->root.type == bfd_link_hash_defweak
5641 			   || !h->def_regular))))
5642 	      || (! bfd_link_pic (info)
5643 		  && (sec->flags & SEC_ALLOC) != 0
5644 		  && h != NULL
5645 		  && (h->root.type == bfd_link_hash_defweak
5646 		      || !h->def_regular)))
5647 	    {
5648 	      struct elf_dyn_relocs *p;
5649 	      struct elf_dyn_relocs **head;
5650 
5651 	      if (htab->root.dynobj == NULL)
5652 		htab->root.dynobj = abfd;
5653 
5654 	      /* When creating a shared object, we must copy these
5655 		 reloc types into the output file.  We create a reloc
5656 		 section in dynobj and make room for this reloc.  */
5657 	      if (sreloc == NULL)
5658 		{
5659 		  sreloc = _bfd_elf_make_dynamic_reloc_section
5660 		    (sec, htab->root.dynobj, 2, abfd, /*rela?*/ true);
5661 
5662 		  if (sreloc == NULL)
5663 		    return false;
5664 		}
5665 
5666 	      /* If this is a global symbol, we count the number of
5667 		 relocations we need for this symbol.  */
5668 	      if (h != NULL)
5669 		head = &h->dyn_relocs;
5670 	      else
5671 		{
5672 		  /* Track dynamic relocs needed for local syms too.  */
5673 		  asection *s;
5674 		  void *vpp;
5675 		  Elf_Internal_Sym *isym;
5676 
5677 		  isym = bfd_sym_from_r_symndx (&htab->root.sym_cache,
5678 						abfd, r_symndx);
5679 		  if (isym == NULL)
5680 		    return false;
5681 
5682 		  s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5683 		  if (s == NULL)
5684 		    s = sec;
5685 
5686 		  vpp = &elf_section_data (s)->local_dynrel;
5687 		  head = (struct elf_dyn_relocs **) vpp;
5688 		}
5689 
5690 	      p = *head;
5691 	      if (p == NULL || p->sec != sec)
5692 		{
5693 		  size_t amt = sizeof (*p);
5694 		  p = bfd_alloc (htab->root.dynobj, amt);
5695 		  if (p == NULL)
5696 		    return false;
5697 		  p->next = *head;
5698 		  *head = p;
5699 		  p->sec = sec;
5700 		  p->count = 0;
5701 		  p->pc_count = 0;
5702 		}
5703 
5704 	      p->count += 1;
5705 	      if (r_type == R_SH_REL32)
5706 		p->pc_count += 1;
5707 	    }
5708 
5709 	  /* Allocate the fixup regardless of whether we need a relocation.
5710 	     If we end up generating the relocation, we'll unallocate the
5711 	     fixup.  */
5712 	  if (htab->fdpic_p && !bfd_link_pic (info)
5713 	      && r_type == R_SH_DIR32
5714 	      && (sec->flags & SEC_ALLOC) != 0)
5715 	    htab->srofixup->size += 4;
5716 	  break;
5717 
5718 	case R_SH_TLS_LE_32:
5719 	  if (bfd_link_dll (info))
5720 	    {
5721 	      _bfd_error_handler
5722 		(_("%pB: TLS local exec code cannot be linked into shared objects"),
5723 		 abfd);
5724 	      return false;
5725 	    }
5726 
5727 	  break;
5728 
5729 	case R_SH_TLS_LDO_32:
5730 	  /* Nothing to do.  */
5731 	  break;
5732 
5733 	default:
5734 	  break;
5735 	}
5736     }
5737 
5738   return true;
5739 }
5740 
5741 #ifndef sh_elf_set_mach_from_flags
5742 static unsigned int sh_ef_bfd_table[] = { EF_SH_BFD_TABLE };
5743 
5744 static bool
sh_elf_set_mach_from_flags(bfd * abfd)5745 sh_elf_set_mach_from_flags (bfd *abfd)
5746 {
5747   flagword flags = elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK;
5748 
5749   if (flags >= ARRAY_SIZE (sh_ef_bfd_table))
5750     return false;
5751 
5752   if (sh_ef_bfd_table[flags] == 0)
5753     return false;
5754 
5755   bfd_default_set_arch_mach (abfd, bfd_arch_sh, sh_ef_bfd_table[flags]);
5756 
5757   return true;
5758 }
5759 
5760 
5761 /* Reverse table lookup for sh_ef_bfd_table[].
5762    Given a bfd MACH value from archures.c
5763    return the equivalent ELF flags from the table.
5764    Return -1 if no match is found.  */
5765 
5766 int
sh_elf_get_flags_from_mach(unsigned long mach)5767 sh_elf_get_flags_from_mach (unsigned long mach)
5768 {
5769   int i = ARRAY_SIZE (sh_ef_bfd_table) - 1;
5770 
5771   for (; i>0; i--)
5772     if (sh_ef_bfd_table[i] == mach)
5773       return i;
5774 
5775   /* shouldn't get here */
5776   BFD_FAIL();
5777 
5778   return -1;
5779 }
5780 #endif /* not sh_elf_set_mach_from_flags */
5781 
5782 #ifndef sh_elf_copy_private_data
5783 /* Copy backend specific data from one object module to another */
5784 
5785 static bool
sh_elf_copy_private_data(bfd * ibfd,bfd * obfd)5786 sh_elf_copy_private_data (bfd * ibfd, bfd * obfd)
5787 {
5788   if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
5789     return true;
5790 
5791   if (! _bfd_elf_copy_private_bfd_data (ibfd, obfd))
5792     return false;
5793 
5794   return sh_elf_set_mach_from_flags (obfd);
5795 }
5796 #endif /* not sh_elf_copy_private_data */
5797 
5798 #ifndef sh_elf_merge_private_data
5799 
5800 /* This function returns the ELF architecture number that
5801    corresponds to the given arch_sh* flags.  */
5802 
5803 int
sh_find_elf_flags(unsigned int arch_set)5804 sh_find_elf_flags (unsigned int arch_set)
5805 {
5806   extern unsigned long sh_get_bfd_mach_from_arch_set (unsigned int);
5807   unsigned long bfd_mach = sh_get_bfd_mach_from_arch_set (arch_set);
5808 
5809   return sh_elf_get_flags_from_mach (bfd_mach);
5810 }
5811 
5812 /* Merge the architecture type of two BFD files, such that the
5813    resultant architecture supports all the features required
5814    by the two input BFDs.
5815    If the input BFDs are multually incompatible - i.e. one uses
5816    DSP while the other uses FPU - or there is no known architecture
5817    that fits the requirements then an error is emitted.  */
5818 
5819 static bool
sh_merge_bfd_arch(bfd * ibfd,struct bfd_link_info * info)5820 sh_merge_bfd_arch (bfd *ibfd, struct bfd_link_info *info)
5821 {
5822   bfd *obfd = info->output_bfd;
5823   unsigned int old_arch, new_arch, merged_arch;
5824 
5825   if (! _bfd_generic_verify_endian_match (ibfd, info))
5826     return false;
5827 
5828   old_arch = sh_get_arch_up_from_bfd_mach (bfd_get_mach (obfd));
5829   new_arch = sh_get_arch_up_from_bfd_mach (bfd_get_mach (ibfd));
5830 
5831   merged_arch = SH_MERGE_ARCH_SET (old_arch, new_arch);
5832 
5833   if (!SH_VALID_CO_ARCH_SET (merged_arch))
5834     {
5835       _bfd_error_handler
5836 	/* xgettext:c-format */
5837 	(_("%pB: uses %s instructions while previous modules "
5838 	   "use %s instructions"),
5839 	 ibfd,
5840 	 SH_ARCH_SET_HAS_DSP (new_arch) ? "dsp" : "floating point",
5841 	 SH_ARCH_SET_HAS_DSP (new_arch) ? "floating point" : "dsp");
5842       bfd_set_error (bfd_error_bad_value);
5843       return false;
5844     }
5845   else if (!SH_VALID_ARCH_SET (merged_arch))
5846     {
5847       _bfd_error_handler
5848 	/* xgettext:c-format */
5849 	(_("internal error: merge of architecture '%s' with "
5850 	   "architecture '%s' produced unknown architecture"),
5851 	 bfd_printable_name (obfd),
5852 	 bfd_printable_name (ibfd));
5853       bfd_set_error (bfd_error_bad_value);
5854       return false;
5855     }
5856 
5857   bfd_default_set_arch_mach (obfd, bfd_arch_sh,
5858 			     sh_get_bfd_mach_from_arch_set (merged_arch));
5859 
5860   return true;
5861 }
5862 
5863 /* This routine initialises the elf flags when required and
5864    calls sh_merge_bfd_arch() to check dsp/fpu compatibility.  */
5865 
5866 static bool
sh_elf_merge_private_data(bfd * ibfd,struct bfd_link_info * info)5867 sh_elf_merge_private_data (bfd *ibfd, struct bfd_link_info *info)
5868 {
5869   bfd *obfd = info->output_bfd;
5870 
5871   /* FIXME: What should be checked when linking shared libraries?  */
5872   if ((ibfd->flags & DYNAMIC) != 0)
5873     return true;
5874 
5875   if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
5876     return true;
5877 
5878   if (! elf_flags_init (obfd))
5879     {
5880       /* This happens when ld starts out with a 'blank' output file.  */
5881       elf_flags_init (obfd) = true;
5882       elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
5883       sh_elf_set_mach_from_flags (obfd);
5884       if (elf_elfheader (obfd)->e_flags & EF_SH_FDPIC)
5885 	elf_elfheader (obfd)->e_flags &= ~EF_SH_PIC;
5886     }
5887 
5888   if (! sh_merge_bfd_arch (ibfd, info))
5889     {
5890       _bfd_error_handler (_("%pB: uses instructions which are incompatible "
5891 			    "with instructions used in previous modules"),
5892 			  ibfd);
5893       bfd_set_error (bfd_error_bad_value);
5894       return false;
5895     }
5896 
5897   elf_elfheader (obfd)->e_flags &= ~EF_SH_MACH_MASK;
5898   elf_elfheader (obfd)->e_flags |=
5899     sh_elf_get_flags_from_mach (bfd_get_mach (obfd));
5900 
5901   if (fdpic_object_p (ibfd) != fdpic_object_p (obfd))
5902     {
5903       _bfd_error_handler (_("%pB: attempt to mix FDPIC and non-FDPIC objects"),
5904 			  ibfd);
5905       bfd_set_error (bfd_error_bad_value);
5906       return false;
5907     }
5908 
5909   return true;
5910 }
5911 #endif /* not sh_elf_merge_private_data */
5912 
5913 /* Override the generic function because we need to store sh_elf_obj_tdata
5914    as the specific tdata.  We set also the machine architecture from flags
5915    here.  */
5916 
5917 static bool
sh_elf_object_p(bfd * abfd)5918 sh_elf_object_p (bfd *abfd)
5919 {
5920   if (! sh_elf_set_mach_from_flags (abfd))
5921     return false;
5922 
5923   return (((elf_elfheader (abfd)->e_flags & EF_SH_FDPIC) != 0)
5924 	  == fdpic_object_p (abfd));
5925 }
5926 
5927 /* Finish up dynamic symbol handling.  We set the contents of various
5928    dynamic sections here.  */
5929 
5930 static bool
sh_elf_finish_dynamic_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)5931 sh_elf_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
5932 			      struct elf_link_hash_entry *h,
5933 			      Elf_Internal_Sym *sym)
5934 {
5935   struct elf_sh_link_hash_table *htab;
5936 
5937   htab = sh_elf_hash_table (info);
5938   if (htab == NULL)
5939     return false;
5940 
5941   if (h->plt.offset != (bfd_vma) -1)
5942     {
5943       asection *splt;
5944       asection *sgotplt;
5945       asection *srelplt;
5946 
5947       bfd_vma plt_index;
5948       bfd_vma got_offset;
5949       Elf_Internal_Rela rel;
5950       bfd_byte *loc;
5951       const struct elf_sh_plt_info *plt_info;
5952 
5953       /* This symbol has an entry in the procedure linkage table.  Set
5954 	 it up.  */
5955 
5956       BFD_ASSERT (h->dynindx != -1);
5957 
5958       splt = htab->root.splt;
5959       sgotplt = htab->root.sgotplt;
5960       srelplt = htab->root.srelplt;
5961       BFD_ASSERT (splt != NULL && sgotplt != NULL && srelplt != NULL);
5962 
5963       /* Get the index in the procedure linkage table which
5964 	 corresponds to this symbol.  This is the index of this symbol
5965 	 in all the symbols for which we are making plt entries.  The
5966 	 first entry in the procedure linkage table is reserved.  */
5967       plt_index = get_plt_index (htab->plt_info, h->plt.offset);
5968 
5969       plt_info = htab->plt_info;
5970       if (plt_info->short_plt != NULL && plt_index <= MAX_SHORT_PLT)
5971 	plt_info = plt_info->short_plt;
5972 
5973       /* Get the offset into the .got table of the entry that
5974 	 corresponds to this function.  */
5975       if (htab->fdpic_p)
5976 	/* The offset must be relative to the GOT symbol, twelve bytes
5977 	   before the end of .got.plt.  Each descriptor is eight
5978 	   bytes.  */
5979 	got_offset = plt_index * 8 + 12 - sgotplt->size;
5980       else
5981 	/* Each .got entry is 4 bytes.  The first three are
5982 	   reserved.  */
5983 	got_offset = (plt_index + 3) * 4;
5984 
5985 #ifdef GOT_BIAS
5986       if (bfd_link_pic (info))
5987 	got_offset -= GOT_BIAS;
5988 #endif
5989 
5990       /* Fill in the entry in the procedure linkage table.  */
5991       memcpy (splt->contents + h->plt.offset,
5992 	      plt_info->symbol_entry,
5993 	      plt_info->symbol_entry_size);
5994 
5995       if (bfd_link_pic (info) || htab->fdpic_p)
5996 	{
5997 	  if (plt_info->symbol_fields.got20)
5998 	    {
5999 	      bfd_reloc_status_type r;
6000 	      r = install_movi20_field (output_bfd, got_offset,
6001 					splt->owner, splt, splt->contents,
6002 					h->plt.offset
6003 					+ plt_info->symbol_fields.got_entry);
6004 	      BFD_ASSERT (r == bfd_reloc_ok);
6005 	    }
6006 	  else
6007 	    install_plt_field (output_bfd, false, got_offset,
6008 			       (splt->contents
6009 				+ h->plt.offset
6010 				+ plt_info->symbol_fields.got_entry));
6011 	}
6012       else
6013 	{
6014 	  BFD_ASSERT (!plt_info->symbol_fields.got20);
6015 
6016 	  install_plt_field (output_bfd, false,
6017 			     (sgotplt->output_section->vma
6018 			      + sgotplt->output_offset
6019 			      + got_offset),
6020 			     (splt->contents
6021 			      + h->plt.offset
6022 			      + plt_info->symbol_fields.got_entry));
6023 	  if (htab->root.target_os == is_vxworks)
6024 	    {
6025 	      unsigned int reachable_plts, plts_per_4k;
6026 	      int distance;
6027 
6028 	      /* Divide the PLT into groups.  The first group contains
6029 		 REACHABLE_PLTS entries and the other groups contain
6030 		 PLTS_PER_4K entries.  Entries in the first group can
6031 		 branch directly to .plt; those in later groups branch
6032 		 to the last element of the previous group.  */
6033 	      /* ??? It would be better to create multiple copies of
6034 		 the common resolver stub.  */
6035 	      reachable_plts = ((4096
6036 				 - plt_info->plt0_entry_size
6037 				 - (plt_info->symbol_fields.plt + 4))
6038 				/ plt_info->symbol_entry_size) + 1;
6039 	      plts_per_4k = (4096 / plt_info->symbol_entry_size);
6040 	      if (plt_index < reachable_plts)
6041 		distance = -(h->plt.offset
6042 			     + plt_info->symbol_fields.plt);
6043 	      else
6044 		distance = -(((plt_index - reachable_plts) % plts_per_4k + 1)
6045 			     * plt_info->symbol_entry_size);
6046 
6047 	      /* Install the 'bra' with this offset.  */
6048 	      bfd_put_16 (output_bfd,
6049 			  0xa000 | (0x0fff & ((distance - 4) / 2)),
6050 			  (splt->contents
6051 			   + h->plt.offset
6052 			   + plt_info->symbol_fields.plt));
6053 	    }
6054 	  else
6055 	    install_plt_field (output_bfd, true,
6056 			       splt->output_section->vma + splt->output_offset,
6057 			       (splt->contents
6058 				+ h->plt.offset
6059 				+ plt_info->symbol_fields.plt));
6060 	}
6061 
6062       /* Make got_offset relative to the start of .got.plt.  */
6063 #ifdef GOT_BIAS
6064       if (bfd_link_pic (info))
6065 	got_offset += GOT_BIAS;
6066 #endif
6067       if (htab->fdpic_p)
6068 	got_offset = plt_index * 8;
6069 
6070       if (plt_info->symbol_fields.reloc_offset != MINUS_ONE)
6071 	install_plt_field (output_bfd, false,
6072 			   plt_index * sizeof (Elf32_External_Rela),
6073 			   (splt->contents
6074 			    + h->plt.offset
6075 			    + plt_info->symbol_fields.reloc_offset));
6076 
6077       /* Fill in the entry in the global offset table.  */
6078       bfd_put_32 (output_bfd,
6079 		  (splt->output_section->vma
6080 		   + splt->output_offset
6081 		   + h->plt.offset
6082 		   + plt_info->symbol_resolve_offset),
6083 		  sgotplt->contents + got_offset);
6084       if (htab->fdpic_p)
6085 	bfd_put_32 (output_bfd,
6086 		    sh_elf_osec_to_segment (output_bfd, splt->output_section),
6087 		    sgotplt->contents + got_offset + 4);
6088 
6089       /* Fill in the entry in the .rela.plt section.  */
6090       rel.r_offset = (sgotplt->output_section->vma
6091 		      + sgotplt->output_offset
6092 		      + got_offset);
6093       if (htab->fdpic_p)
6094 	rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_FUNCDESC_VALUE);
6095       else
6096 	rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_JMP_SLOT);
6097       rel.r_addend = 0;
6098 #ifdef GOT_BIAS
6099       rel.r_addend = GOT_BIAS;
6100 #endif
6101       loc = srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
6102       bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6103 
6104       if (htab->root.target_os == is_vxworks && !bfd_link_pic (info))
6105 	{
6106 	  /* Create the .rela.plt.unloaded relocations for this PLT entry.
6107 	     Begin by pointing LOC to the first such relocation.  */
6108 	  loc = (htab->srelplt2->contents
6109 		 + (plt_index * 2 + 1) * sizeof (Elf32_External_Rela));
6110 
6111 	  /* Create a .rela.plt.unloaded R_SH_DIR32 relocation
6112 	     for the PLT entry's pointer to the .got.plt entry.  */
6113 	  rel.r_offset = (splt->output_section->vma
6114 			  + splt->output_offset
6115 			  + h->plt.offset
6116 			  + plt_info->symbol_fields.got_entry);
6117 	  rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
6118 	  rel.r_addend = got_offset;
6119 	  bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6120 	  loc += sizeof (Elf32_External_Rela);
6121 
6122 	  /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for
6123 	     the .got.plt entry, which initially points to .plt.  */
6124 	  rel.r_offset = (sgotplt->output_section->vma
6125 			  + sgotplt->output_offset
6126 			  + got_offset);
6127 	  rel.r_info = ELF32_R_INFO (htab->root.hplt->indx, R_SH_DIR32);
6128 	  rel.r_addend = 0;
6129 	  bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
6130 	}
6131 
6132       if (!h->def_regular)
6133 	{
6134 	  /* Mark the symbol as undefined, rather than as defined in
6135 	     the .plt section.  Leave the value alone.  */
6136 	  sym->st_shndx = SHN_UNDEF;
6137 	}
6138     }
6139 
6140   if (h->got.offset != (bfd_vma) -1
6141       && sh_elf_hash_entry (h)->got_type != GOT_TLS_GD
6142       && sh_elf_hash_entry (h)->got_type != GOT_TLS_IE
6143       && sh_elf_hash_entry (h)->got_type != GOT_FUNCDESC)
6144     {
6145       asection *sgot;
6146       asection *srelgot;
6147       Elf_Internal_Rela rel;
6148       bfd_byte *loc;
6149 
6150       /* This symbol has an entry in the global offset table.  Set it
6151 	 up.  */
6152 
6153       sgot = htab->root.sgot;
6154       srelgot = htab->root.srelgot;
6155       BFD_ASSERT (sgot != NULL && srelgot != NULL);
6156 
6157       rel.r_offset = (sgot->output_section->vma
6158 		      + sgot->output_offset
6159 		      + (h->got.offset &~ (bfd_vma) 1));
6160 
6161       /* If this is a static link, or it is a -Bsymbolic link and the
6162 	 symbol is defined locally or was forced to be local because
6163 	 of a version file, we just want to emit a RELATIVE reloc.
6164 	 The entry in the global offset table will already have been
6165 	 initialized in the relocate_section function.  */
6166       if (bfd_link_pic (info)
6167 	  && SYMBOL_REFERENCES_LOCAL (info, h))
6168 	{
6169 	  if (htab->fdpic_p)
6170 	    {
6171 	      asection *sec = h->root.u.def.section;
6172 	      int dynindx
6173 		= elf_section_data (sec->output_section)->dynindx;
6174 
6175 	      rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
6176 	      rel.r_addend = (h->root.u.def.value
6177 			      + h->root.u.def.section->output_offset);
6178 	    }
6179 	  else
6180 	    {
6181 	      rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
6182 	      rel.r_addend = (h->root.u.def.value
6183 			      + h->root.u.def.section->output_section->vma
6184 			      + h->root.u.def.section->output_offset);
6185 	    }
6186 	}
6187       else
6188 	{
6189 	  bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
6190 	  rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
6191 	  rel.r_addend = 0;
6192 	}
6193 
6194       loc = srelgot->contents;
6195       loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
6196       bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6197     }
6198 
6199   if (h->needs_copy)
6200     {
6201       asection *s;
6202       Elf_Internal_Rela rel;
6203       bfd_byte *loc;
6204 
6205       /* This symbol needs a copy reloc.  Set it up.  */
6206 
6207       BFD_ASSERT (h->dynindx != -1
6208 		  && (h->root.type == bfd_link_hash_defined
6209 		      || h->root.type == bfd_link_hash_defweak));
6210 
6211       s = bfd_get_linker_section (htab->root.dynobj, ".rela.bss");
6212       BFD_ASSERT (s != NULL);
6213 
6214       rel.r_offset = (h->root.u.def.value
6215 		      + h->root.u.def.section->output_section->vma
6216 		      + h->root.u.def.section->output_offset);
6217       rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_COPY);
6218       rel.r_addend = 0;
6219       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
6220       bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6221     }
6222 
6223   /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  On VxWorks,
6224      _GLOBAL_OFFSET_TABLE_ is not absolute: it is relative to the
6225      ".got" section.  */
6226   if (h == htab->root.hdynamic
6227       || (htab->root.target_os != is_vxworks && h == htab->root.hgot))
6228     sym->st_shndx = SHN_ABS;
6229 
6230   return true;
6231 }
6232 
6233 /* Finish up the dynamic sections.  */
6234 
6235 static bool
sh_elf_finish_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)6236 sh_elf_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
6237 {
6238   struct elf_sh_link_hash_table *htab;
6239   asection *sgotplt;
6240   asection *sdyn;
6241 
6242   htab = sh_elf_hash_table (info);
6243   if (htab == NULL)
6244     return false;
6245 
6246   sgotplt = htab->root.sgotplt;
6247   sdyn = bfd_get_linker_section (htab->root.dynobj, ".dynamic");
6248 
6249   if (htab->root.dynamic_sections_created)
6250     {
6251       asection *splt;
6252       Elf32_External_Dyn *dyncon, *dynconend;
6253 
6254       BFD_ASSERT (sgotplt != NULL && sdyn != NULL);
6255 
6256       dyncon = (Elf32_External_Dyn *) sdyn->contents;
6257       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
6258       for (; dyncon < dynconend; dyncon++)
6259 	{
6260 	  Elf_Internal_Dyn dyn;
6261 	  asection *s;
6262 
6263 	  bfd_elf32_swap_dyn_in (htab->root.dynobj, dyncon, &dyn);
6264 
6265 	  switch (dyn.d_tag)
6266 	    {
6267 	    default:
6268 	      if (htab->root.target_os == is_vxworks
6269 		  && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
6270 		bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
6271 	      break;
6272 
6273 	    case DT_PLTGOT:
6274 	      BFD_ASSERT (htab->root.hgot != NULL);
6275 	      s = htab->root.hgot->root.u.def.section;
6276 	      dyn.d_un.d_ptr = htab->root.hgot->root.u.def.value
6277 		+ s->output_section->vma + s->output_offset;
6278 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
6279 	      break;
6280 
6281 	    case DT_JMPREL:
6282 	      s = htab->root.srelplt->output_section;
6283 	      BFD_ASSERT (s != NULL);
6284 	      dyn.d_un.d_ptr = s->vma;
6285 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
6286 	      break;
6287 
6288 	    case DT_PLTRELSZ:
6289 	      s = htab->root.srelplt->output_section;
6290 	      BFD_ASSERT (s != NULL);
6291 	      dyn.d_un.d_val = s->size;
6292 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
6293 	      break;
6294 	    }
6295 	}
6296 
6297       /* Fill in the first entry in the procedure linkage table.  */
6298       splt = htab->root.splt;
6299       if (splt && splt->size > 0 && htab->plt_info->plt0_entry)
6300 	{
6301 	  unsigned int i;
6302 
6303 	  memcpy (splt->contents,
6304 		  htab->plt_info->plt0_entry,
6305 		  htab->plt_info->plt0_entry_size);
6306 	  for (i = 0; i < ARRAY_SIZE (htab->plt_info->plt0_got_fields); i++)
6307 	    if (htab->plt_info->plt0_got_fields[i] != MINUS_ONE)
6308 	      install_plt_field (output_bfd, false,
6309 				 (sgotplt->output_section->vma
6310 				  + sgotplt->output_offset
6311 				  + (i * 4)),
6312 				 (splt->contents
6313 				  + htab->plt_info->plt0_got_fields[i]));
6314 
6315 	  if (htab->root.target_os == is_vxworks)
6316 	    {
6317 	      /* Finalize the .rela.plt.unloaded contents.  */
6318 	      Elf_Internal_Rela rel;
6319 	      bfd_byte *loc;
6320 
6321 	      /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for the
6322 		 first PLT entry's pointer to _GLOBAL_OFFSET_TABLE_ + 8.  */
6323 	      loc = htab->srelplt2->contents;
6324 	      rel.r_offset = (splt->output_section->vma
6325 			      + splt->output_offset
6326 			      + htab->plt_info->plt0_got_fields[2]);
6327 	      rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
6328 	      rel.r_addend = 8;
6329 	      bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6330 	      loc += sizeof (Elf32_External_Rela);
6331 
6332 	      /* Fix up the remaining .rela.plt.unloaded relocations.
6333 		 They may have the wrong symbol index for _G_O_T_ or
6334 		 _P_L_T_ depending on the order in which symbols were
6335 		 output.  */
6336 	      while (loc < htab->srelplt2->contents + htab->srelplt2->size)
6337 		{
6338 		  /* The PLT entry's pointer to the .got.plt slot.  */
6339 		  bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
6340 		  rel.r_info = ELF32_R_INFO (htab->root.hgot->indx,
6341 					     R_SH_DIR32);
6342 		  bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
6343 		  loc += sizeof (Elf32_External_Rela);
6344 
6345 		  /* The .got.plt slot's pointer to .plt.  */
6346 		  bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
6347 		  rel.r_info = ELF32_R_INFO (htab->root.hplt->indx,
6348 					     R_SH_DIR32);
6349 		  bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
6350 		  loc += sizeof (Elf32_External_Rela);
6351 		}
6352 	    }
6353 
6354 	  /* UnixWare sets the entsize of .plt to 4, although that doesn't
6355 	     really seem like the right value.  */
6356 	  elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
6357 	}
6358     }
6359 
6360   /* Fill in the first three entries in the global offset table.  */
6361   if (sgotplt && sgotplt->size > 0 && !htab->fdpic_p)
6362     {
6363       if (sdyn == NULL)
6364 	bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents);
6365       else
6366 	bfd_put_32 (output_bfd,
6367 		    sdyn->output_section->vma + sdyn->output_offset,
6368 		    sgotplt->contents);
6369       bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 4);
6370       bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 8);
6371     }
6372 
6373   if (sgotplt && sgotplt->size > 0)
6374     elf_section_data (sgotplt->output_section)->this_hdr.sh_entsize = 4;
6375 
6376   /* At the very end of the .rofixup section is a pointer to the GOT.  */
6377   if (htab->fdpic_p && htab->srofixup != NULL)
6378     {
6379       struct elf_link_hash_entry *hgot = htab->root.hgot;
6380       bfd_vma got_value = hgot->root.u.def.value
6381 	+ hgot->root.u.def.section->output_section->vma
6382 	+ hgot->root.u.def.section->output_offset;
6383 
6384       sh_elf_add_rofixup (output_bfd, htab->srofixup, got_value);
6385 
6386       /* Make sure we allocated and generated the same number of fixups.  */
6387       BFD_ASSERT (htab->srofixup->reloc_count * 4 == htab->srofixup->size);
6388     }
6389 
6390   if (htab->srelfuncdesc)
6391     BFD_ASSERT (htab->srelfuncdesc->reloc_count * sizeof (Elf32_External_Rela)
6392 		== htab->srelfuncdesc->size);
6393 
6394   if (htab->root.srelgot)
6395     BFD_ASSERT (htab->root.srelgot->reloc_count * sizeof (Elf32_External_Rela)
6396 		== htab->root.srelgot->size);
6397 
6398   return true;
6399 }
6400 
6401 static enum elf_reloc_type_class
sh_elf_reloc_type_class(const struct bfd_link_info * info ATTRIBUTE_UNUSED,const asection * rel_sec ATTRIBUTE_UNUSED,const Elf_Internal_Rela * rela)6402 sh_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
6403 			 const asection *rel_sec ATTRIBUTE_UNUSED,
6404 			 const Elf_Internal_Rela *rela)
6405 {
6406   switch ((int) ELF32_R_TYPE (rela->r_info))
6407     {
6408     case R_SH_RELATIVE:
6409       return reloc_class_relative;
6410     case R_SH_JMP_SLOT:
6411       return reloc_class_plt;
6412     case R_SH_COPY:
6413       return reloc_class_copy;
6414     default:
6415       return reloc_class_normal;
6416     }
6417 }
6418 
6419 #if !defined SH_TARGET_ALREADY_DEFINED
6420 /* Support for Linux core dump NOTE sections.  */
6421 
6422 static bool
elf32_shlin_grok_prstatus(bfd * abfd,Elf_Internal_Note * note)6423 elf32_shlin_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
6424 {
6425   int offset;
6426   unsigned int size;
6427 
6428   switch (note->descsz)
6429     {
6430       default:
6431 	return false;
6432 
6433       case 168:		/* Linux/SH */
6434 	/* pr_cursig */
6435 	elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
6436 
6437 	/* pr_pid */
6438 	elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
6439 
6440 	/* pr_reg */
6441 	offset = 72;
6442 	size = 92;
6443 
6444 	break;
6445     }
6446 
6447   /* Make a ".reg/999" section.  */
6448   return _bfd_elfcore_make_pseudosection (abfd, ".reg",
6449 					  size, note->descpos + offset);
6450 }
6451 
6452 static bool
elf32_shlin_grok_psinfo(bfd * abfd,Elf_Internal_Note * note)6453 elf32_shlin_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
6454 {
6455   switch (note->descsz)
6456     {
6457       default:
6458 	return false;
6459 
6460       case 124:		/* Linux/SH elf_prpsinfo */
6461 	elf_tdata (abfd)->core->program
6462 	 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
6463 	elf_tdata (abfd)->core->command
6464 	 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
6465     }
6466 
6467   /* Note that for some reason, a spurious space is tacked
6468      onto the end of the args in some (at least one anyway)
6469      implementations, so strip it off if it exists.  */
6470 
6471   {
6472     char *command = elf_tdata (abfd)->core->command;
6473     int n = strlen (command);
6474 
6475     if (0 < n && command[n - 1] == ' ')
6476       command[n - 1] = '\0';
6477   }
6478 
6479   return true;
6480 }
6481 #endif /* not SH_TARGET_ALREADY_DEFINED */
6482 
6483 
6484 /* Return address for Ith PLT stub in section PLT, for relocation REL
6485    or (bfd_vma) -1 if it should not be included.  */
6486 
6487 static bfd_vma
sh_elf_plt_sym_val(bfd_vma i,const asection * plt,const arelent * rel ATTRIBUTE_UNUSED)6488 sh_elf_plt_sym_val (bfd_vma i, const asection *plt,
6489 		    const arelent *rel ATTRIBUTE_UNUSED)
6490 {
6491   const struct elf_sh_plt_info *plt_info;
6492 
6493   plt_info = get_plt_info (plt->owner, (plt->owner->flags & DYNAMIC) != 0);
6494   return plt->vma + get_plt_offset (plt_info, i);
6495 }
6496 
6497 /* Decide whether to attempt to turn absptr or lsda encodings in
6498    shared libraries into pcrel within the given input section.  */
6499 
6500 static bool
sh_elf_use_relative_eh_frame(bfd * input_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info,asection * eh_frame_section ATTRIBUTE_UNUSED)6501 sh_elf_use_relative_eh_frame (bfd *input_bfd ATTRIBUTE_UNUSED,
6502 			      struct bfd_link_info *info,
6503 			      asection *eh_frame_section ATTRIBUTE_UNUSED)
6504 {
6505   struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
6506 
6507   /* We can't use PC-relative encodings in FDPIC binaries, in general.  */
6508   if (htab->fdpic_p)
6509     return false;
6510 
6511   return true;
6512 }
6513 
6514 /* Adjust the contents of an eh_frame_hdr section before they're output.  */
6515 
6516 static bfd_byte
sh_elf_encode_eh_address(bfd * abfd,struct bfd_link_info * info,asection * osec,bfd_vma offset,asection * loc_sec,bfd_vma loc_offset,bfd_vma * encoded)6517 sh_elf_encode_eh_address (bfd *abfd,
6518 			  struct bfd_link_info *info,
6519 			  asection *osec, bfd_vma offset,
6520 			  asection *loc_sec, bfd_vma loc_offset,
6521 			  bfd_vma *encoded)
6522 {
6523   struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
6524   struct elf_link_hash_entry *h;
6525 
6526   if (!htab->fdpic_p)
6527     return _bfd_elf_encode_eh_address (abfd, info, osec, offset, loc_sec,
6528 				       loc_offset, encoded);
6529 
6530   h = htab->root.hgot;
6531   BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
6532 
6533   if (! h || (sh_elf_osec_to_segment (abfd, osec)
6534 	      == sh_elf_osec_to_segment (abfd, loc_sec->output_section)))
6535     return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
6536 				       loc_sec, loc_offset, encoded);
6537 
6538   BFD_ASSERT (sh_elf_osec_to_segment (abfd, osec)
6539 	      == (sh_elf_osec_to_segment
6540 		  (abfd, h->root.u.def.section->output_section)));
6541 
6542   *encoded = osec->vma + offset
6543     - (h->root.u.def.value
6544        + h->root.u.def.section->output_section->vma
6545        + h->root.u.def.section->output_offset);
6546 
6547   return DW_EH_PE_datarel | DW_EH_PE_sdata4;
6548 }
6549 
6550 #if !defined SH_TARGET_ALREADY_DEFINED
6551 #define TARGET_BIG_SYM		sh_elf32_vec
6552 #define TARGET_BIG_NAME		"elf32-sh"
6553 #define TARGET_LITTLE_SYM	sh_elf32_le_vec
6554 #define TARGET_LITTLE_NAME	"elf32-shl"
6555 #endif
6556 
6557 #define ELF_ARCH		bfd_arch_sh
6558 #define ELF_TARGET_ID		SH_ELF_DATA
6559 #define ELF_MACHINE_CODE	EM_SH
6560 #ifdef __QNXTARGET__
6561 #define ELF_MAXPAGESIZE		0x1000
6562 #else
6563 #define ELF_MAXPAGESIZE		0x80
6564 #endif
6565 
6566 #define elf_symbol_leading_char '_'
6567 
6568 #define bfd_elf32_bfd_reloc_type_lookup	sh_elf_reloc_type_lookup
6569 #define bfd_elf32_bfd_reloc_name_lookup \
6570 					sh_elf_reloc_name_lookup
6571 #define elf_info_to_howto		sh_elf_info_to_howto
6572 #define bfd_elf32_bfd_relax_section	sh_elf_relax_section
6573 #define elf_backend_relocate_section	sh_elf_relocate_section
6574 #define bfd_elf32_bfd_get_relocated_section_contents \
6575 					sh_elf_get_relocated_section_contents
6576 #define bfd_elf32_mkobject		sh_elf_mkobject
6577 #define elf_backend_object_p		sh_elf_object_p
6578 #define bfd_elf32_bfd_copy_private_bfd_data \
6579 					sh_elf_copy_private_data
6580 #define bfd_elf32_bfd_merge_private_bfd_data \
6581 					sh_elf_merge_private_data
6582 
6583 #define elf_backend_gc_mark_hook	sh_elf_gc_mark_hook
6584 #define elf_backend_check_relocs	sh_elf_check_relocs
6585 #define elf_backend_copy_indirect_symbol \
6586 					sh_elf_copy_indirect_symbol
6587 #define elf_backend_create_dynamic_sections \
6588 					sh_elf_create_dynamic_sections
6589 #define bfd_elf32_bfd_link_hash_table_create \
6590 					sh_elf_link_hash_table_create
6591 #define elf_backend_adjust_dynamic_symbol \
6592 					sh_elf_adjust_dynamic_symbol
6593 #define elf_backend_always_size_sections \
6594 					sh_elf_always_size_sections
6595 #define elf_backend_size_dynamic_sections \
6596 					sh_elf_size_dynamic_sections
6597 #define elf_backend_omit_section_dynsym	sh_elf_omit_section_dynsym
6598 #define elf_backend_finish_dynamic_symbol \
6599 					sh_elf_finish_dynamic_symbol
6600 #define elf_backend_finish_dynamic_sections \
6601 					sh_elf_finish_dynamic_sections
6602 #define elf_backend_reloc_type_class	sh_elf_reloc_type_class
6603 #define elf_backend_plt_sym_val		sh_elf_plt_sym_val
6604 #define elf_backend_can_make_relative_eh_frame \
6605 					sh_elf_use_relative_eh_frame
6606 #define elf_backend_can_make_lsda_relative_eh_frame \
6607 					sh_elf_use_relative_eh_frame
6608 #define elf_backend_encode_eh_address \
6609 					sh_elf_encode_eh_address
6610 
6611 #define elf_backend_stack_align		8
6612 #define elf_backend_can_gc_sections	1
6613 #define elf_backend_can_refcount	1
6614 #define elf_backend_want_got_plt	1
6615 #define elf_backend_plt_readonly	1
6616 #define elf_backend_want_plt_sym	0
6617 #define elf_backend_got_header_size	12
6618 #define elf_backend_dtrel_excludes_plt	1
6619 
6620 #define elf_backend_linux_prpsinfo32_ugid16	true
6621 
6622 #if !defined SH_TARGET_ALREADY_DEFINED
6623 
6624 #include "elf32-target.h"
6625 
6626 /* NetBSD support.  */
6627 #undef	TARGET_BIG_SYM
6628 #define	TARGET_BIG_SYM			sh_elf32_nbsd_vec
6629 #undef	TARGET_BIG_NAME
6630 #define	TARGET_BIG_NAME			"elf32-sh-nbsd"
6631 #undef	TARGET_LITTLE_SYM
6632 #define	TARGET_LITTLE_SYM		sh_elf32_nbsd_le_vec
6633 #undef	TARGET_LITTLE_NAME
6634 #define	TARGET_LITTLE_NAME		"elf32-shl-nbsd"
6635 #undef	ELF_MAXPAGESIZE
6636 #define	ELF_MAXPAGESIZE			0x10000
6637 #undef	ELF_COMMONPAGESIZE
6638 #undef	elf_symbol_leading_char
6639 #define	elf_symbol_leading_char		0
6640 #undef	elf32_bed
6641 #define	elf32_bed			elf32_sh_nbsd_bed
6642 
6643 #include "elf32-target.h"
6644 
6645 
6646 /* Linux support.  */
6647 #undef	TARGET_BIG_SYM
6648 #define	TARGET_BIG_SYM			sh_elf32_linux_be_vec
6649 #undef	TARGET_BIG_NAME
6650 #define	TARGET_BIG_NAME			"elf32-shbig-linux"
6651 #undef	TARGET_LITTLE_SYM
6652 #define	TARGET_LITTLE_SYM		sh_elf32_linux_vec
6653 #undef	TARGET_LITTLE_NAME
6654 #define	TARGET_LITTLE_NAME		"elf32-sh-linux"
6655 #undef	ELF_COMMONPAGESIZE
6656 #define	ELF_COMMONPAGESIZE		0x1000
6657 
6658 #undef	elf_backend_grok_prstatus
6659 #define	elf_backend_grok_prstatus	elf32_shlin_grok_prstatus
6660 #undef	elf_backend_grok_psinfo
6661 #define	elf_backend_grok_psinfo		elf32_shlin_grok_psinfo
6662 #undef	elf32_bed
6663 #define	elf32_bed			elf32_sh_lin_bed
6664 
6665 #include "elf32-target.h"
6666 
6667 
6668 /* FDPIC support.  */
6669 #undef	TARGET_BIG_SYM
6670 #define	TARGET_BIG_SYM			sh_elf32_fdpic_be_vec
6671 #undef	TARGET_BIG_NAME
6672 #define	TARGET_BIG_NAME			"elf32-shbig-fdpic"
6673 #undef	TARGET_LITTLE_SYM
6674 #define	TARGET_LITTLE_SYM		sh_elf32_fdpic_le_vec
6675 #undef	TARGET_LITTLE_NAME
6676 #define	TARGET_LITTLE_NAME		"elf32-sh-fdpic"
6677 
6678 #undef	elf32_bed
6679 #define	elf32_bed			elf32_sh_fd_bed
6680 
6681 #include "elf32-target.h"
6682 
6683 /* VxWorks support.  */
6684 #undef	TARGET_BIG_SYM
6685 #define	TARGET_BIG_SYM			sh_elf32_vxworks_vec
6686 #undef	TARGET_BIG_NAME
6687 #define	TARGET_BIG_NAME			"elf32-sh-vxworks"
6688 #undef	TARGET_LITTLE_SYM
6689 #define	TARGET_LITTLE_SYM		sh_elf32_vxworks_le_vec
6690 #undef	TARGET_LITTLE_NAME
6691 #define	TARGET_LITTLE_NAME		"elf32-shl-vxworks"
6692 #undef	elf32_bed
6693 #define	elf32_bed			elf32_sh_vxworks_bed
6694 
6695 #undef	elf_backend_want_plt_sym
6696 #define	elf_backend_want_plt_sym	1
6697 #undef	elf_symbol_leading_char
6698 #define	elf_symbol_leading_char		'_'
6699 #define	elf_backend_want_got_underscore 1
6700 #undef	elf_backend_grok_prstatus
6701 #undef	elf_backend_grok_psinfo
6702 #undef	elf_backend_add_symbol_hook
6703 #define	elf_backend_add_symbol_hook	elf_vxworks_add_symbol_hook
6704 #undef	elf_backend_link_output_symbol_hook
6705 #define	elf_backend_link_output_symbol_hook \
6706 					elf_vxworks_link_output_symbol_hook
6707 #undef	elf_backend_emit_relocs
6708 #define	elf_backend_emit_relocs		elf_vxworks_emit_relocs
6709 #undef	elf_backend_final_write_processing
6710 #define	elf_backend_final_write_processing \
6711 					elf_vxworks_final_write_processing
6712 #undef	ELF_MAXPAGESIZE
6713 #define	ELF_MAXPAGESIZE			0x1000
6714 #undef	ELF_COMMONPAGESIZE
6715 
6716 #undef	ELF_TARGET_OS
6717 #define	ELF_TARGET_OS			is_vxworks
6718 
6719 #include "elf32-target.h"
6720 
6721 #endif /* not SH_TARGET_ALREADY_DEFINED */
6722