xref: /netbsd-src/external/gpl3/gdb.old/dist/bfd/elf32-frv.c (revision 4d342c046e3288fb5a1edcd33cfec48c41c80664)
1 /* FRV-specific support for 32-bit ELF.
2    Copyright (C) 2002-2019 Free Software Foundation, Inc.
3 
4    This file is part of BFD, the Binary File Descriptor library.
5 
6    This program is free software; you can redistribute it and/or modify
7    it under the terms of the GNU General Public License as published by
8    the Free Software Foundation; either version 3 of the License, or
9    (at your option) any later version.
10 
11    This program is distributed in the hope that it will be useful,
12    but WITHOUT ANY WARRANTY; without even the implied warranty of
13    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14    GNU General Public License for more details.
15 
16    You should have received a copy of the GNU General Public License
17    along with this program; if not, write to the Free Software
18    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19    MA 02110-1301, USA.  */
20 
21 #include "sysdep.h"
22 #include "bfd.h"
23 #include "libbfd.h"
24 #include "elf-bfd.h"
25 #include "elf/frv.h"
26 #include "dwarf2.h"
27 #include "hashtab.h"
28 #include "libiberty.h"
29 
30 /* Forward declarations.  */
31 
32 
33 static reloc_howto_type elf32_frv_howto_table [] =
34 {
35   /* This reloc does nothing.  */
36   HOWTO (R_FRV_NONE,		/* type */
37 	 0,			/* rightshift */
38 	 3,			/* size (0 = byte, 1 = short, 2 = long) */
39 	 0,			/* bitsize */
40 	 FALSE,			/* pc_relative */
41 	 0,			/* bitpos */
42 	 complain_overflow_dont, /* complain_on_overflow */
43 	 bfd_elf_generic_reloc,	/* special_function */
44 	 "R_FRV_NONE",		/* name */
45 	 FALSE,			/* partial_inplace */
46 	 0,			/* src_mask */
47 	 0,			/* dst_mask */
48 	 FALSE),		/* pcrel_offset */
49 
50   /* A 32 bit absolute relocation.  */
51   HOWTO (R_FRV_32,		/* type */
52 	 0,			/* rightshift */
53 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
54 	 32,			/* bitsize */
55 	 FALSE,			/* pc_relative */
56 	 0,			/* bitpos */
57 	 complain_overflow_bitfield, /* complain_on_overflow */
58 	 bfd_elf_generic_reloc,	/* special_function */
59 	 "R_FRV_32",		/* name */
60 	 FALSE,			/* partial_inplace */
61 	 0xffffffff,		/* src_mask */
62 	 0xffffffff,		/* dst_mask */
63 	 FALSE),		/* pcrel_offset */
64 
65   /* A 16 bit pc-relative relocation.  */
66   HOWTO (R_FRV_LABEL16,		/* type */
67 	 2,			/* rightshift */
68 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
69 	 16,			/* bitsize */
70 	 TRUE,			/* pc_relative */
71 	 0,			/* bitpos */
72 	 complain_overflow_signed, /* complain_on_overflow */
73 	 bfd_elf_generic_reloc,	/* special_function */
74 	 "R_FRV_LABEL16",	/* name */
75 	 FALSE,			/* partial_inplace */
76 	 0xffff,		/* src_mask */
77 	 0xffff,		/* dst_mask */
78 	 TRUE),			/* pcrel_offset */
79 
80   /* A 24-bit pc-relative relocation.  */
81   HOWTO (R_FRV_LABEL24,		/* type */
82 	 2,			/* rightshift */
83 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
84 	 26,			/* bitsize */
85 	 TRUE,			/* pc_relative */
86 	 0,			/* bitpos */
87 	 complain_overflow_bitfield, /* complain_on_overflow */
88 	 bfd_elf_generic_reloc,	/* special_function */
89 	 "R_FRV_LABEL24",	/* name */
90 	 FALSE,			/* partial_inplace */
91 	 0x7e03ffff,		/* src_mask */
92 	 0x7e03ffff,		/* dst_mask */
93 	 TRUE),			/* pcrel_offset */
94 
95   HOWTO (R_FRV_LO16,		/* type */
96 	 0,			/* rightshift */
97 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
98 	 16,			/* bitsize */
99 	 FALSE,			/* pc_relative */
100 	 0,			/* bitpos */
101 	 complain_overflow_dont, /* complain_on_overflow */
102 	 bfd_elf_generic_reloc,	/* special_function */
103 	 "R_FRV_LO16",		/* name */
104 	 FALSE,			/* partial_inplace */
105 	 0xffff,		/* src_mask */
106 	 0xffff,		/* dst_mask */
107 	 FALSE),		/* pcrel_offset */
108 
109   HOWTO (R_FRV_HI16,		/* type */
110 	 0,			/* rightshift */
111 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
112 	 16,			/* bitsize */
113 	 FALSE,			/* pc_relative */
114 	 0,			/* bitpos */
115 	 complain_overflow_dont, /* complain_on_overflow */
116 	 bfd_elf_generic_reloc,	/* special_function */
117 	 "R_FRV_HI16",		/* name */
118 	 FALSE,			/* partial_inplace */
119 	 0xffff,		/* src_mask */
120 	 0xffff,		/* dst_mask */
121 	 FALSE),		/* pcrel_offset */
122 
123   HOWTO (R_FRV_GPREL12,		/* type */
124 	 0,			/* rightshift */
125 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
126 	 12,			/* bitsize */
127 	 FALSE,			/* pc_relative */
128 	 0,			/* bitpos */
129 	 complain_overflow_dont, /* complain_on_overflow */
130 	 bfd_elf_generic_reloc,	/* special_function */
131 	 "R_FRV_GPREL12",	/* name */
132 	 FALSE,			/* partial_inplace */
133 	 0xfff,			/* src_mask */
134 	 0xfff,			/* dst_mask */
135 	 FALSE),		/* pcrel_offset */
136 
137   HOWTO (R_FRV_GPRELU12,	/* type */
138 	 0,			/* rightshift */
139 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
140 	 12,			/* bitsize */
141 	 FALSE,			/* pc_relative */
142 	 0,			/* bitpos */
143 	 complain_overflow_dont, /* complain_on_overflow */
144 	 bfd_elf_generic_reloc,	/* special_function */
145 	 "R_FRV_GPRELU12",	/* name */
146 	 FALSE,			/* partial_inplace */
147 	 0xfff,			/* src_mask */
148 	 0x3f03f,		/* dst_mask */
149 	 FALSE),		/* pcrel_offset */
150 
151   HOWTO (R_FRV_GPREL32,		/* type */
152 	 0,			/* rightshift */
153 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
154 	 32,			/* bitsize */
155 	 FALSE,			/* pc_relative */
156 	 0,			/* bitpos */
157 	 complain_overflow_dont, /* complain_on_overflow */
158 	 bfd_elf_generic_reloc,	/* special_function */
159 	 "R_FRV_GPREL32",	/* name */
160 	 FALSE,			/* partial_inplace */
161 	 0xffffffff,		/* src_mask */
162 	 0xffffffff,		/* dst_mask */
163 	 FALSE),		/* pcrel_offset */
164 
165   HOWTO (R_FRV_GPRELHI,		/* type */
166 	 0,			/* rightshift */
167 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
168 	 16,			/* bitsize */
169 	 FALSE,			/* pc_relative */
170 	 0,			/* bitpos */
171 	 complain_overflow_dont, /* complain_on_overflow */
172 	 bfd_elf_generic_reloc,	/* special_function */
173 	 "R_FRV_GPRELHI",	/* name */
174 	 FALSE,			/* partial_inplace */
175 	 0xffff,		/* src_mask */
176 	 0xffff,		/* dst_mask */
177 	 FALSE),		/* pcrel_offset */
178 
179   HOWTO (R_FRV_GPRELLO,		/* type */
180 	 0,			/* rightshift */
181 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
182 	 16,			/* bitsize */
183 	 FALSE,			/* pc_relative */
184 	 0,			/* bitpos */
185 	 complain_overflow_dont, /* complain_on_overflow */
186 	 bfd_elf_generic_reloc,	/* special_function */
187 	 "R_FRV_GPRELLO",	/* name */
188 	 FALSE,			/* partial_inplace */
189 	 0xffff,		/* src_mask */
190 	 0xffff,		/* dst_mask */
191 	 FALSE),		/* pcrel_offset */
192 
193   /* A 12-bit signed operand with the GOT offset for the address of
194      the symbol.  */
195   HOWTO (R_FRV_GOT12,		/* type */
196 	 0,			/* rightshift */
197 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
198 	 12,			/* bitsize */
199 	 FALSE,			/* pc_relative */
200 	 0,			/* bitpos */
201 	 complain_overflow_signed, /* complain_on_overflow */
202 	 bfd_elf_generic_reloc,	/* special_function */
203 	 "R_FRV_GOT12",		/* name */
204 	 FALSE,			/* partial_inplace */
205 	 0xfff,			/* src_mask */
206 	 0xfff,			/* dst_mask */
207 	 FALSE),		/* pcrel_offset */
208 
209   /* The upper 16 bits of the GOT offset for the address of the
210      symbol.  */
211   HOWTO (R_FRV_GOTHI,		/* type */
212 	 0,			/* rightshift */
213 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
214 	 16,			/* bitsize */
215 	 FALSE,			/* pc_relative */
216 	 0,			/* bitpos */
217 	 complain_overflow_dont, /* complain_on_overflow */
218 	 bfd_elf_generic_reloc,	/* special_function */
219 	 "R_FRV_GOTHI",		/* name */
220 	 FALSE,			/* partial_inplace */
221 	 0xffff,		/* src_mask */
222 	 0xffff,		/* dst_mask */
223 	 FALSE),		/* pcrel_offset */
224 
225   /* The lower 16 bits of the GOT offset for the address of the
226      symbol.  */
227   HOWTO (R_FRV_GOTLO,		/* type */
228 	 0,			/* rightshift */
229 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
230 	 16,			/* bitsize */
231 	 FALSE,			/* pc_relative */
232 	 0,			/* bitpos */
233 	 complain_overflow_dont, /* complain_on_overflow */
234 	 bfd_elf_generic_reloc,	/* special_function */
235 	 "R_FRV_GOTLO",		/* name */
236 	 FALSE,			/* partial_inplace */
237 	 0xffff,		/* src_mask */
238 	 0xffff,		/* dst_mask */
239 	 FALSE),		/* pcrel_offset */
240 
241   /* The 32-bit address of the canonical descriptor of a function.  */
242   HOWTO (R_FRV_FUNCDESC,	/* type */
243 	 0,			/* rightshift */
244 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
245 	 32,			/* bitsize */
246 	 FALSE,			/* pc_relative */
247 	 0,			/* bitpos */
248 	 complain_overflow_bitfield, /* complain_on_overflow */
249 	 bfd_elf_generic_reloc,	/* special_function */
250 	 "R_FRV_FUNCDESC",	/* name */
251 	 FALSE,			/* partial_inplace */
252 	 0xffffffff,		/* src_mask */
253 	 0xffffffff,		/* dst_mask */
254 	 FALSE),		/* pcrel_offset */
255 
256   /* A 12-bit signed operand with the GOT offset for the address of
257      canonical descriptor of a function.  */
258   HOWTO (R_FRV_FUNCDESC_GOT12,	/* type */
259 	 0,			/* rightshift */
260 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
261 	 12,			/* bitsize */
262 	 FALSE,			/* pc_relative */
263 	 0,			/* bitpos */
264 	 complain_overflow_signed, /* complain_on_overflow */
265 	 bfd_elf_generic_reloc,	/* special_function */
266 	 "R_FRV_FUNCDESC_GOT12", /* name */
267 	 FALSE,			/* partial_inplace */
268 	 0xfff,			/* src_mask */
269 	 0xfff,			/* dst_mask */
270 	 FALSE),		/* pcrel_offset */
271 
272   /* The upper 16 bits of the GOT offset for the address of the
273      canonical descriptor of a function.  */
274   HOWTO (R_FRV_FUNCDESC_GOTHI,	/* type */
275 	 0,			/* rightshift */
276 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
277 	 16,			/* bitsize */
278 	 FALSE,			/* pc_relative */
279 	 0,			/* bitpos */
280 	 complain_overflow_dont, /* complain_on_overflow */
281 	 bfd_elf_generic_reloc,	/* special_function */
282 	 "R_FRV_FUNCDESC_GOTHI", /* name */
283 	 FALSE,			/* partial_inplace */
284 	 0xffff,		/* src_mask */
285 	 0xffff,		/* dst_mask */
286 	 FALSE),		/* pcrel_offset */
287 
288   /* The lower 16 bits of the GOT offset for the address of the
289      canonical descriptor of a function.  */
290   HOWTO (R_FRV_FUNCDESC_GOTLO,	/* type */
291 	 0,			/* rightshift */
292 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
293 	 16,			/* bitsize */
294 	 FALSE,			/* pc_relative */
295 	 0,			/* bitpos */
296 	 complain_overflow_dont, /* complain_on_overflow */
297 	 bfd_elf_generic_reloc,	/* special_function */
298 	 "R_FRV_FUNCDESC_GOTLO", /* name */
299 	 FALSE,			/* partial_inplace */
300 	 0xffff,		/* src_mask */
301 	 0xffff,		/* dst_mask */
302 	 FALSE),		/* pcrel_offset */
303 
304   /* The 64-bit descriptor of a function.  */
305   HOWTO (R_FRV_FUNCDESC_VALUE,	/* type */
306 	 0,			/* rightshift */
307 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
308 	 64,			/* bitsize */
309 	 FALSE,			/* pc_relative */
310 	 0,			/* bitpos */
311 	 complain_overflow_bitfield, /* complain_on_overflow */
312 	 bfd_elf_generic_reloc,	/* special_function */
313 	 "R_FRV_FUNCDESC_VALUE", /* name */
314 	 FALSE,			/* partial_inplace */
315 	 0xffffffff,		/* src_mask */
316 	 0xffffffff,		/* dst_mask */
317 	 FALSE),		/* pcrel_offset */
318 
319   /* A 12-bit signed operand with the GOT offset for the address of
320      canonical descriptor of a function.  */
321   HOWTO (R_FRV_FUNCDESC_GOTOFF12, /* type */
322 	 0,			/* rightshift */
323 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
324 	 12,			/* bitsize */
325 	 FALSE,			/* pc_relative */
326 	 0,			/* bitpos */
327 	 complain_overflow_signed, /* complain_on_overflow */
328 	 bfd_elf_generic_reloc,	/* special_function */
329 	 "R_FRV_FUNCDESC_GOTOFF12", /* name */
330 	 FALSE,			/* partial_inplace */
331 	 0xfff,			/* src_mask */
332 	 0xfff,			/* dst_mask */
333 	 FALSE),		/* pcrel_offset */
334 
335   /* The upper 16 bits of the GOT offset for the address of the
336      canonical descriptor of a function.  */
337   HOWTO (R_FRV_FUNCDESC_GOTOFFHI, /* type */
338 	 0,			/* rightshift */
339 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
340 	 16,			/* bitsize */
341 	 FALSE,			/* pc_relative */
342 	 0,			/* bitpos */
343 	 complain_overflow_dont, /* complain_on_overflow */
344 	 bfd_elf_generic_reloc,	/* special_function */
345 	 "R_FRV_FUNCDESC_GOTOFFHI", /* name */
346 	 FALSE,			/* partial_inplace */
347 	 0xffff,		/* src_mask */
348 	 0xffff,		/* dst_mask */
349 	 FALSE),		/* pcrel_offset */
350 
351   /* The lower 16 bits of the GOT offset for the address of the
352      canonical descriptor of a function.  */
353   HOWTO (R_FRV_FUNCDESC_GOTOFFLO, /* type */
354 	 0,			/* rightshift */
355 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
356 	 16,			/* bitsize */
357 	 FALSE,			/* pc_relative */
358 	 0,			/* bitpos */
359 	 complain_overflow_dont, /* complain_on_overflow */
360 	 bfd_elf_generic_reloc,	/* special_function */
361 	 "R_FRV_FUNCDESC_GOTOFFLO", /* name */
362 	 FALSE,			/* partial_inplace */
363 	 0xffff,		/* src_mask */
364 	 0xffff,		/* dst_mask */
365 	 FALSE),		/* pcrel_offset */
366 
367   /* A 12-bit signed operand with the GOT offset for the address of
368      the symbol.  */
369   HOWTO (R_FRV_GOTOFF12,	/* type */
370 	 0,			/* rightshift */
371 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
372 	 12,			/* bitsize */
373 	 FALSE,			/* pc_relative */
374 	 0,			/* bitpos */
375 	 complain_overflow_signed, /* complain_on_overflow */
376 	 bfd_elf_generic_reloc,	/* special_function */
377 	 "R_FRV_GOTOFF12",	/* name */
378 	 FALSE,			/* partial_inplace */
379 	 0xfff,			/* src_mask */
380 	 0xfff,			/* dst_mask */
381 	 FALSE),		/* pcrel_offset */
382 
383   /* The upper 16 bits of the GOT offset for the address of the
384      symbol.  */
385   HOWTO (R_FRV_GOTOFFHI,	/* type */
386 	 0,			/* rightshift */
387 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
388 	 16,			/* bitsize */
389 	 FALSE,			/* pc_relative */
390 	 0,			/* bitpos */
391 	 complain_overflow_dont, /* complain_on_overflow */
392 	 bfd_elf_generic_reloc,	/* special_function */
393 	 "R_FRV_GOTOFFHI",	/* name */
394 	 FALSE,			/* partial_inplace */
395 	 0xffff,		/* src_mask */
396 	 0xffff,		/* dst_mask */
397 	 FALSE),		/* pcrel_offset */
398 
399   /* The lower 16 bits of the GOT offset for the address of the
400      symbol.  */
401   HOWTO (R_FRV_GOTOFFLO,	/* type */
402 	 0,			/* rightshift */
403 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
404 	 16,			/* bitsize */
405 	 FALSE,			/* pc_relative */
406 	 0,			/* bitpos */
407 	 complain_overflow_dont, /* complain_on_overflow */
408 	 bfd_elf_generic_reloc,	/* special_function */
409 	 "R_FRV_GOTOFFLO",	/* name */
410 	 FALSE,			/* partial_inplace */
411 	 0xffff,		/* src_mask */
412 	 0xffff,		/* dst_mask */
413 	 FALSE),		/* pcrel_offset */
414 
415   /* A 24-bit pc-relative relocation referencing the TLS PLT entry for
416      a thread-local symbol.  If the symbol number is 0, it refers to
417      the module.  */
418   HOWTO (R_FRV_GETTLSOFF,	/* type */
419 	 2,			/* rightshift */
420 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
421 	 26,			/* bitsize */
422 	 TRUE,			/* pc_relative */
423 	 0,			/* bitpos */
424 	 complain_overflow_bitfield, /* complain_on_overflow */
425 	 bfd_elf_generic_reloc,	/* special_function */
426 	 "R_FRV_GETTLSOFF",	/* name */
427 	 FALSE,			/* partial_inplace */
428 	 0x7e03ffff,		/* src_mask */
429 	 0x7e03ffff,		/* dst_mask */
430 	 TRUE),			/* pcrel_offset */
431 
432   /* A 64-bit TLS descriptor for a symbol.  This relocation is only
433      valid as a REL, dynamic relocation.  */
434   HOWTO (R_FRV_TLSDESC_VALUE,	/* type */
435 	 0,			/* rightshift */
436 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
437 	 64,			/* bitsize */
438 	 FALSE,			/* pc_relative */
439 	 0,			/* bitpos */
440 	 complain_overflow_bitfield, /* complain_on_overflow */
441 	 bfd_elf_generic_reloc,	/* special_function */
442 	 "R_FRV_TLSDESC_VALUE", /* name */
443 	 FALSE,			/* partial_inplace */
444 	 0xffffffff,		/* src_mask */
445 	 0xffffffff,		/* dst_mask */
446 	 FALSE),		/* pcrel_offset */
447 
448   /* A 12-bit signed operand with the GOT offset for the TLS
449      descriptor of the symbol.  */
450   HOWTO (R_FRV_GOTTLSDESC12,	/* type */
451 	 0,			/* rightshift */
452 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
453 	 12,			/* bitsize */
454 	 FALSE,			/* pc_relative */
455 	 0,			/* bitpos */
456 	 complain_overflow_signed, /* complain_on_overflow */
457 	 bfd_elf_generic_reloc,	/* special_function */
458 	 "R_FRV_GOTTLSDESC12",	/* name */
459 	 FALSE,			/* partial_inplace */
460 	 0xfff,			/* src_mask */
461 	 0xfff,			/* dst_mask */
462 	 FALSE),		/* pcrel_offset */
463 
464   /* The upper 16 bits of the GOT offset for the TLS descriptor of the
465      symbol.  */
466   HOWTO (R_FRV_GOTTLSDESCHI,	/* type */
467 	 0,			/* rightshift */
468 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
469 	 16,			/* bitsize */
470 	 FALSE,			/* pc_relative */
471 	 0,			/* bitpos */
472 	 complain_overflow_dont, /* complain_on_overflow */
473 	 bfd_elf_generic_reloc,	/* special_function */
474 	 "R_FRV_GOTTLSDESCHI",	/* name */
475 	 FALSE,			/* partial_inplace */
476 	 0xffff,		/* src_mask */
477 	 0xffff,		/* dst_mask */
478 	 FALSE),		/* pcrel_offset */
479 
480   /* The lower 16 bits of the GOT offset for the TLS descriptor of the
481      symbol.  */
482   HOWTO (R_FRV_GOTTLSDESCLO,	/* type */
483 	 0,			/* rightshift */
484 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
485 	 16,			/* bitsize */
486 	 FALSE,			/* pc_relative */
487 	 0,			/* bitpos */
488 	 complain_overflow_dont, /* complain_on_overflow */
489 	 bfd_elf_generic_reloc,	/* special_function */
490 	 "R_FRV_GOTTLSDESCLO",	/* name */
491 	 FALSE,			/* partial_inplace */
492 	 0xffff,		/* src_mask */
493 	 0xffff,		/* dst_mask */
494 	 FALSE),		/* pcrel_offset */
495 
496   /* A 12-bit signed operand with the offset from the module base
497      address to the thread-local symbol address.  */
498   HOWTO (R_FRV_TLSMOFF12,	 /* type */
499 	 0,			/* rightshift */
500 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
501 	 12,			/* bitsize */
502 	 FALSE,			/* pc_relative */
503 	 0,			/* bitpos */
504 	 complain_overflow_signed, /* complain_on_overflow */
505 	 bfd_elf_generic_reloc,	/* special_function */
506 	 "R_FRV_TLSMOFF12",	/* name */
507 	 FALSE,			/* partial_inplace */
508 	 0xfff,			/* src_mask */
509 	 0xfff,			/* dst_mask */
510 	 FALSE),		/* pcrel_offset */
511 
512   /* The upper 16 bits of the offset from the module base address to
513      the thread-local symbol address.  */
514   HOWTO (R_FRV_TLSMOFFHI,	/* type */
515 	 0,			/* rightshift */
516 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
517 	 16,			/* bitsize */
518 	 FALSE,			/* pc_relative */
519 	 0,			/* bitpos */
520 	 complain_overflow_dont, /* complain_on_overflow */
521 	 bfd_elf_generic_reloc,	/* special_function */
522 	 "R_FRV_TLSMOFFHI",	/* name */
523 	 FALSE,			/* partial_inplace */
524 	 0xffff,		/* src_mask */
525 	 0xffff,		/* dst_mask */
526 	 FALSE),		/* pcrel_offset */
527 
528   /* The lower 16 bits of the offset from the module base address to
529      the thread-local symbol address.  */
530   HOWTO (R_FRV_TLSMOFFLO,	/* type */
531 	 0,			/* rightshift */
532 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
533 	 16,			/* bitsize */
534 	 FALSE,			/* pc_relative */
535 	 0,			/* bitpos */
536 	 complain_overflow_dont, /* complain_on_overflow */
537 	 bfd_elf_generic_reloc,	/* special_function */
538 	 "R_FRV_TLSMOFFLO",	/* name */
539 	 FALSE,			/* partial_inplace */
540 	 0xffff,		/* src_mask */
541 	 0xffff,		/* dst_mask */
542 	 FALSE),		/* pcrel_offset */
543 
544   /* A 12-bit signed operand with the GOT offset for the TLSOFF entry
545      for a symbol.  */
546   HOWTO (R_FRV_GOTTLSOFF12,	/* type */
547 	 0,			/* rightshift */
548 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
549 	 12,			/* bitsize */
550 	 FALSE,			/* pc_relative */
551 	 0,			/* bitpos */
552 	 complain_overflow_signed, /* complain_on_overflow */
553 	 bfd_elf_generic_reloc,	/* special_function */
554 	 "R_FRV_GOTTLSOFF12",	/* name */
555 	 FALSE,			/* partial_inplace */
556 	 0xfff,			/* src_mask */
557 	 0xfff,			/* dst_mask */
558 	 FALSE),		/* pcrel_offset */
559 
560   /* The upper 16 bits of the GOT offset for the TLSOFF entry for a
561      symbol.  */
562   HOWTO (R_FRV_GOTTLSOFFHI,	/* type */
563 	 0,			/* rightshift */
564 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
565 	 16,			/* bitsize */
566 	 FALSE,			/* pc_relative */
567 	 0,			/* bitpos */
568 	 complain_overflow_dont, /* complain_on_overflow */
569 	 bfd_elf_generic_reloc,	/* special_function */
570 	 "R_FRV_GOTTLSOFFHI",	/* name */
571 	 FALSE,			/* partial_inplace */
572 	 0xffff,		/* src_mask */
573 	 0xffff,		/* dst_mask */
574 	 FALSE),		/* pcrel_offset */
575 
576   /* The lower 16 bits of the GOT offset for the TLSOFF entry for a
577      symbol.  */
578   HOWTO (R_FRV_GOTTLSOFFLO,	/* type */
579 	 0,			/* rightshift */
580 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
581 	 16,			/* bitsize */
582 	 FALSE,			/* pc_relative */
583 	 0,			/* bitpos */
584 	 complain_overflow_dont, /* complain_on_overflow */
585 	 bfd_elf_generic_reloc,	/* special_function */
586 	 "R_FRV_GOTTLSOFFLO",	/* name */
587 	 FALSE,			/* partial_inplace */
588 	 0xffff,		/* src_mask */
589 	 0xffff,		/* dst_mask */
590 	 FALSE),		/* pcrel_offset */
591 
592   /* The 32-bit offset from the thread pointer (not the module base
593      address) to a thread-local symbol.  */
594   HOWTO (R_FRV_TLSOFF,		/* type */
595 	 0,			/* rightshift */
596 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
597 	 32,			/* bitsize */
598 	 FALSE,			/* pc_relative */
599 	 0,			/* bitpos */
600 	 complain_overflow_dont, /* complain_on_overflow */
601 	 bfd_elf_generic_reloc,	/* special_function */
602 	 "R_FRV_TLSOFF",	/* name */
603 	 FALSE,			/* partial_inplace */
604 	 0xffffffff,		/* src_mask */
605 	 0xffffffff,		/* dst_mask */
606 	 FALSE),		/* pcrel_offset */
607 
608   /* An annotation for linker relaxation, that denotes the
609      symbol+addend whose TLS descriptor is referenced by the sum of
610      the two input registers of an ldd instruction.  */
611   HOWTO (R_FRV_TLSDESC_RELAX,	/* type */
612 	 0,			/* rightshift */
613 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
614 	 0,			/* bitsize */
615 	 FALSE,			/* pc_relative */
616 	 0,			/* bitpos */
617 	 complain_overflow_dont, /* complain_on_overflow */
618 	 bfd_elf_generic_reloc,	/* special_function */
619 	 "R_FRV_TLSDESC_RELAX",	/* name */
620 	 FALSE,			/* partial_inplace */
621 	 0,			/* src_mask */
622 	 0,			/* dst_mask */
623 	 FALSE),		/* pcrel_offset */
624 
625   /* An annotation for linker relaxation, that denotes the
626      symbol+addend whose TLS resolver entry point is given by the sum
627      of the two register operands of an calll instruction.  */
628   HOWTO (R_FRV_GETTLSOFF_RELAX,	/* type */
629 	 0,			/* rightshift */
630 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
631 	 0,			/* bitsize */
632 	 FALSE,			/* pc_relative */
633 	 0,			/* bitpos */
634 	 complain_overflow_dont, /* complain_on_overflow */
635 	 bfd_elf_generic_reloc,	/* special_function */
636 	 "R_FRV_GETTLSOFF_RELAX", /* name */
637 	 FALSE,			/* partial_inplace */
638 	 0,			/* src_mask */
639 	 0,			/* dst_mask */
640 	 FALSE),		/* pcrel_offset */
641 
642   /* An annotation for linker relaxation, that denotes the
643      symbol+addend whose TLS offset GOT entry is given by the sum of
644      the two input registers of an ld instruction.  */
645   HOWTO (R_FRV_TLSOFF_RELAX,	/* type */
646 	 0,			/* rightshift */
647 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
648 	 0,			/* bitsize */
649 	 FALSE,			/* pc_relative */
650 	 0,			/* bitpos */
651 	 complain_overflow_bitfield, /* complain_on_overflow */
652 	 bfd_elf_generic_reloc,	/* special_function */
653 	 "R_FRV_TLSOFF_RELAX",	/* name */
654 	 FALSE,			/* partial_inplace */
655 	 0,			/* src_mask */
656 	 0,			/* dst_mask */
657 	 FALSE),		/* pcrel_offset */
658 
659   /* A 32-bit offset from the module base address to
660      the thread-local symbol address.  */
661   HOWTO (R_FRV_TLSMOFF,		/* type */
662 	 0,			/* rightshift */
663 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
664 	 32,			/* bitsize */
665 	 FALSE,			/* pc_relative */
666 	 0,			/* bitpos */
667 	 complain_overflow_dont, /* complain_on_overflow */
668 	 bfd_elf_generic_reloc,	/* special_function */
669 	 "R_FRV_TLSMOFF",	/* name */
670 	 FALSE,			/* partial_inplace */
671 	 0xffffffff,		/* src_mask */
672 	 0xffffffff,		/* dst_mask */
673 	 FALSE),		/* pcrel_offset */
674 };
675 
676 /* GNU extension to record C++ vtable hierarchy.  */
677 static reloc_howto_type elf32_frv_vtinherit_howto =
678   HOWTO (R_FRV_GNU_VTINHERIT,	/* type */
679 	 0,			/* rightshift */
680 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
681 	 0,			/* bitsize */
682 	 FALSE,			/* pc_relative */
683 	 0,			/* bitpos */
684 	 complain_overflow_dont, /* complain_on_overflow */
685 	 NULL,			/* special_function */
686 	 "R_FRV_GNU_VTINHERIT", /* name */
687 	 FALSE,			/* partial_inplace */
688 	 0,			/* src_mask */
689 	 0,			/* dst_mask */
690 	 FALSE);		/* pcrel_offset */
691 
692   /* GNU extension to record C++ vtable member usage.  */
693 static reloc_howto_type elf32_frv_vtentry_howto =
694   HOWTO (R_FRV_GNU_VTENTRY,	/* type */
695 	 0,			/* rightshift */
696 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
697 	 0,			/* bitsize */
698 	 FALSE,			/* pc_relative */
699 	 0,			/* bitpos */
700 	 complain_overflow_dont, /* complain_on_overflow */
701 	 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
702 	 "R_FRV_GNU_VTENTRY",	/* name */
703 	 FALSE,			/* partial_inplace */
704 	 0,			/* src_mask */
705 	 0,			/* dst_mask */
706 	 FALSE);		/* pcrel_offset */
707 
708 /* The following 3 relocations are REL.  The only difference to the
709    entries in the table above are that partial_inplace is TRUE.  */
710 static reloc_howto_type elf32_frv_rel_32_howto =
711   HOWTO (R_FRV_32,		/* type */
712 	 0,			/* rightshift */
713 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
714 	 32,			/* bitsize */
715 	 FALSE,			/* pc_relative */
716 	 0,			/* bitpos */
717 	 complain_overflow_bitfield, /* complain_on_overflow */
718 	 bfd_elf_generic_reloc,	/* special_function */
719 	 "R_FRV_32",		/* name */
720 	 TRUE,			/* partial_inplace */
721 	 0xffffffff,		/* src_mask */
722 	 0xffffffff,		/* dst_mask */
723 	 FALSE);		/* pcrel_offset */
724 
725 static reloc_howto_type elf32_frv_rel_funcdesc_howto =
726   HOWTO (R_FRV_FUNCDESC,	/* type */
727 	 0,			/* rightshift */
728 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
729 	 32,			/* bitsize */
730 	 FALSE,			/* pc_relative */
731 	 0,			/* bitpos */
732 	 complain_overflow_bitfield, /* complain_on_overflow */
733 	 bfd_elf_generic_reloc,	/* special_function */
734 	 "R_FRV_FUNCDESC",	/* name */
735 	 TRUE,			/* partial_inplace */
736 	 0xffffffff,		/* src_mask */
737 	 0xffffffff,		/* dst_mask */
738 	 FALSE);		/* pcrel_offset */
739 
740 static reloc_howto_type elf32_frv_rel_funcdesc_value_howto =
741   HOWTO (R_FRV_FUNCDESC_VALUE,	/* type */
742 	 0,			/* rightshift */
743 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
744 	 64,			/* bitsize */
745 	 FALSE,			/* pc_relative */
746 	 0,			/* bitpos */
747 	 complain_overflow_bitfield, /* complain_on_overflow */
748 	 bfd_elf_generic_reloc,	/* special_function */
749 	 "R_FRV_FUNCDESC_VALUE", /* name */
750 	 TRUE,			/* partial_inplace */
751 	 0xffffffff,		/* src_mask */
752 	 0xffffffff,		/* dst_mask */
753 	 FALSE);		/* pcrel_offset */
754 
755 static reloc_howto_type elf32_frv_rel_tlsdesc_value_howto =
756   /* A 64-bit TLS descriptor for a symbol.  The first word resolves to
757      an entry point, and the second resolves to a special argument.
758      If the symbol turns out to be in static TLS, the entry point is a
759      return instruction, and the special argument is the TLS offset
760      for the symbol.  If it's in dynamic TLS, the entry point is a TLS
761      offset resolver, and the special argument is a pointer to a data
762      structure allocated by the dynamic loader, containing the GOT
763      address for the offset resolver, the module id, the offset within
764      the module, and anything else the TLS offset resolver might need
765      to determine the TLS offset for the symbol in the running
766      thread.  */
767   HOWTO (R_FRV_TLSDESC_VALUE,	/* type */
768 	 0,			/* rightshift */
769 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
770 	 64,			/* bitsize */
771 	 FALSE,			/* pc_relative */
772 	 0,			/* bitpos */
773 	 complain_overflow_bitfield, /* complain_on_overflow */
774 	 bfd_elf_generic_reloc,	/* special_function */
775 	 "R_FRV_TLSDESC_VALUE", /* name */
776 	 TRUE,			/* partial_inplace */
777 	 0xffffffff,		/* src_mask */
778 	 0xffffffff,		/* dst_mask */
779 	 FALSE);		/* pcrel_offset */
780 
781 static reloc_howto_type elf32_frv_rel_tlsoff_howto =
782   /* The 32-bit offset from the thread pointer (not the module base
783      address) to a thread-local symbol.  */
784   HOWTO (R_FRV_TLSOFF,		/* type */
785 	 0,			/* rightshift */
786 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
787 	 32,			/* bitsize */
788 	 FALSE,			/* pc_relative */
789 	 0,			/* bitpos */
790 	 complain_overflow_bitfield, /* complain_on_overflow */
791 	 bfd_elf_generic_reloc,	/* special_function */
792 	 "R_FRV_TLSOFF",	/* name */
793 	 TRUE,			/* partial_inplace */
794 	 0xffffffff,		/* src_mask */
795 	 0xffffffff,		/* dst_mask */
796 	 FALSE);		/* pcrel_offset */
797 
798 
799 
800 extern const bfd_target frv_elf32_fdpic_vec;
801 #define IS_FDPIC(bfd) ((bfd)->xvec == &frv_elf32_fdpic_vec)
802 
803 /* An extension of the elf hash table data structure, containing some
804    additional FRV-specific data.  */
805 struct frvfdpic_elf_link_hash_table
806 {
807   struct elf_link_hash_table elf;
808 
809   /* A pointer to the .rofixup section.  */
810   asection *sgotfixup;
811   /* GOT base offset.  */
812   bfd_vma got0;
813   /* Location of the first non-lazy PLT entry, i.e., the number of
814      bytes taken by lazy PLT entries.  If locally-bound TLS
815      descriptors require a ret instruction, it will be placed at this
816      offset.  */
817   bfd_vma plt0;
818   /* A hash table holding information about which symbols were
819      referenced with which PIC-related relocations.  */
820   struct htab *relocs_info;
821   /* Summary reloc information collected by
822      _frvfdpic_count_got_plt_entries.  */
823   struct _frvfdpic_dynamic_got_info *g;
824 };
825 
826 /* Get the FRV ELF linker hash table from a link_info structure.  */
827 
828 #define frvfdpic_hash_table(p) \
829   (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
830   == FRV_ELF_DATA ? ((struct frvfdpic_elf_link_hash_table *) ((p)->hash)) : NULL)
831 
832 #define frvfdpic_got_section(info) \
833   (frvfdpic_hash_table (info)->elf.sgot)
834 #define frvfdpic_gotrel_section(info) \
835   (frvfdpic_hash_table (info)->elf.srelgot)
836 #define frvfdpic_gotfixup_section(info) \
837   (frvfdpic_hash_table (info)->sgotfixup)
838 #define frvfdpic_plt_section(info) \
839   (frvfdpic_hash_table (info)->elf.splt)
840 #define frvfdpic_pltrel_section(info) \
841   (frvfdpic_hash_table (info)->elf.srelplt)
842 #define frvfdpic_relocs_info(info) \
843   (frvfdpic_hash_table (info)->relocs_info)
844 #define frvfdpic_got_initial_offset(info) \
845   (frvfdpic_hash_table (info)->got0)
846 #define frvfdpic_plt_initial_offset(info) \
847   (frvfdpic_hash_table (info)->plt0)
848 #define frvfdpic_dynamic_got_plt_info(info) \
849   (frvfdpic_hash_table (info)->g)
850 
851 /* Currently it's the same, but if some day we have a reason to change
852    it, we'd better be using a different macro.
853 
854    FIXME: if there's any TLS PLT entry that uses local-exec or
855    initial-exec models, we could use the ret at the end of any of them
856    instead of adding one more.  */
857 #define frvfdpic_plt_tls_ret_offset(info) \
858   (frvfdpic_plt_initial_offset (info))
859 
860 /* The name of the dynamic interpreter.  This is put in the .interp
861    section.  */
862 
863 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
864 
865 #define DEFAULT_STACK_SIZE 0x20000
866 
867 /* This structure is used to collect the number of entries present in
868    each addressable range of the got.  */
869 struct _frvfdpic_dynamic_got_info
870 {
871   /* Several bits of information about the current link.  */
872   struct bfd_link_info *info;
873   /* Total GOT size needed for GOT entries within the 12-, 16- or 32-bit
874      ranges.  */
875   bfd_vma got12, gotlos, gothilo;
876   /* Total GOT size needed for function descriptor entries within the 12-,
877      16- or 32-bit ranges.  */
878   bfd_vma fd12, fdlos, fdhilo;
879   /* Total GOT size needed by function descriptor entries referenced
880      in PLT entries, that would be profitable to place in offsets
881      close to the PIC register.  */
882   bfd_vma fdplt;
883   /* Total PLT size needed by lazy PLT entries.  */
884   bfd_vma lzplt;
885   /* Total GOT size needed for TLS descriptor entries within the 12-,
886      16- or 32-bit ranges.  */
887   bfd_vma tlsd12, tlsdlos, tlsdhilo;
888   /* Total GOT size needed by TLS descriptors referenced in PLT
889      entries, that would be profitable to place in offers close to the
890      PIC register.  */
891   bfd_vma tlsdplt;
892   /* Total PLT size needed by TLS lazy PLT entries.  */
893   bfd_vma tlslzplt;
894   /* Number of relocations carried over from input object files.  */
895   unsigned long relocs;
896   /* Number of fixups introduced by relocations in input object files.  */
897   unsigned long fixups;
898   /* The number of fixups that reference the ret instruction added to
899      the PLT for locally-resolved TLS descriptors.  */
900   unsigned long tls_ret_refs;
901 };
902 
903 /* This structure is used to assign offsets to got entries, function
904    descriptors, plt entries and lazy plt entries.  */
905 
906 struct _frvfdpic_dynamic_got_plt_info
907 {
908   /* Summary information collected with _frvfdpic_count_got_plt_entries.  */
909   struct _frvfdpic_dynamic_got_info g;
910 
911   /* For each addressable range, we record a MAX (positive) and MIN
912      (negative) value.  CUR is used to assign got entries, and it's
913      incremented from an initial positive value to MAX, then from MIN
914      to FDCUR (unless FDCUR wraps around first).  FDCUR is used to
915      assign function descriptors, and it's decreased from an initial
916      non-positive value to MIN, then from MAX down to CUR (unless CUR
917      wraps around first).  All of MIN, MAX, CUR and FDCUR always point
918      to even words.  ODD, if non-zero, indicates an odd word to be
919      used for the next got entry, otherwise CUR is used and
920      incremented by a pair of words, wrapping around when it reaches
921      MAX.  FDCUR is decremented (and wrapped) before the next function
922      descriptor is chosen.  FDPLT indicates the number of remaining
923      slots that can be used for function descriptors used only by PLT
924      entries.
925 
926      TMAX, TMIN and TCUR are used to assign TLS descriptors.  TCUR
927      starts as MAX, and grows up to TMAX, then wraps around to TMIN
928      and grows up to MIN.  TLSDPLT indicates the number of remaining
929      slots that can be used for TLS descriptors used only by TLS PLT
930      entries.  */
931   struct _frvfdpic_dynamic_got_alloc_data
932   {
933     bfd_signed_vma max, cur, odd, fdcur, min;
934     bfd_signed_vma tmax, tcur, tmin;
935     bfd_vma fdplt, tlsdplt;
936   } got12, gotlos, gothilo;
937 };
938 
939 /* Create an FRV ELF linker hash table.  */
940 
941 static struct bfd_link_hash_table *
942 frvfdpic_elf_link_hash_table_create (bfd *abfd)
943 {
944   struct frvfdpic_elf_link_hash_table *ret;
945   bfd_size_type amt = sizeof (struct frvfdpic_elf_link_hash_table);
946 
947   ret = bfd_zmalloc (amt);
948   if (ret == NULL)
949     return NULL;
950 
951   if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
952 				      _bfd_elf_link_hash_newfunc,
953 				      sizeof (struct elf_link_hash_entry),
954 				      FRV_ELF_DATA))
955     {
956       free (ret);
957       return NULL;
958     }
959 
960   return &ret->elf.root;
961 }
962 
963 /* Decide whether a reference to a symbol can be resolved locally or
964    not.  If the symbol is protected, we want the local address, but
965    its function descriptor must be assigned by the dynamic linker.  */
966 #define FRVFDPIC_SYM_LOCAL(INFO, H) \
967   (_bfd_elf_symbol_refs_local_p ((H), (INFO), 1) \
968    || ! elf_hash_table (INFO)->dynamic_sections_created)
969 #define FRVFDPIC_FUNCDESC_LOCAL(INFO, H) \
970   ((H)->dynindx == -1 || ! elf_hash_table (INFO)->dynamic_sections_created)
971 
972 /* This structure collects information on what kind of GOT, PLT or
973    function descriptors are required by relocations that reference a
974    certain symbol.  */
975 struct frvfdpic_relocs_info
976 {
977   /* The index of the symbol, as stored in the relocation r_info, if
978      we have a local symbol; -1 otherwise.  */
979   long symndx;
980   union
981   {
982     /* The input bfd in which the symbol is defined, if it's a local
983        symbol.  */
984     bfd *abfd;
985     /* If symndx == -1, the hash table entry corresponding to a global
986        symbol (even if it turns out to bind locally, in which case it
987        should ideally be replaced with section's symndx + addend).  */
988     struct elf_link_hash_entry *h;
989   } d;
990   /* The addend of the relocation that references the symbol.  */
991   bfd_vma addend;
992 
993   /* The fields above are used to identify an entry.  The fields below
994      contain information on how an entry is used and, later on, which
995      locations it was assigned.  */
996   /* The following 3 fields record whether the symbol+addend above was
997      ever referenced with a GOT relocation.  The 12 suffix indicates a
998      GOT12 relocation; los is used for GOTLO relocations that are not
999      matched by a GOTHI relocation; hilo is used for GOTLO/GOTHI
1000      pairs.  */
1001   unsigned got12:1;
1002   unsigned gotlos:1;
1003   unsigned gothilo:1;
1004   /* Whether a FUNCDESC relocation references symbol+addend.  */
1005   unsigned fd:1;
1006   /* Whether a FUNCDESC_GOT relocation references symbol+addend.  */
1007   unsigned fdgot12:1;
1008   unsigned fdgotlos:1;
1009   unsigned fdgothilo:1;
1010   /* Whether a FUNCDESC_GOTOFF relocation references symbol+addend.  */
1011   unsigned fdgoff12:1;
1012   unsigned fdgofflos:1;
1013   unsigned fdgoffhilo:1;
1014   /* Whether a GETTLSOFF relocation references symbol+addend.  */
1015   unsigned tlsplt:1;
1016   /* FIXME: we should probably add tlspltdesc, tlspltoff and
1017      tlspltimm, to tell what kind of TLS PLT entry we're generating.
1018      We might instead just pre-compute flags telling whether the
1019      object is suitable for local exec, initial exec or general
1020      dynamic addressing, and use that all over the place.  We could
1021      also try to do a better job of merging TLSOFF and TLSDESC entries
1022      in main executables, but perhaps we can get rid of TLSDESC
1023      entirely in them instead.  */
1024   /* Whether a GOTTLSDESC relocation references symbol+addend.  */
1025   unsigned tlsdesc12:1;
1026   unsigned tlsdesclos:1;
1027   unsigned tlsdeschilo:1;
1028   /* Whether a GOTTLSOFF relocation references symbol+addend.  */
1029   unsigned tlsoff12:1;
1030   unsigned tlsofflos:1;
1031   unsigned tlsoffhilo:1;
1032   /* Whether symbol+addend is referenced with GOTOFF12, GOTOFFLO or
1033      GOTOFFHI relocations.  The addend doesn't really matter, since we
1034      envision that this will only be used to check whether the symbol
1035      is mapped to the same segment as the got.  */
1036   unsigned gotoff:1;
1037   /* Whether symbol+addend is referenced by a LABEL24 relocation.  */
1038   unsigned call:1;
1039   /* Whether symbol+addend is referenced by a 32 or FUNCDESC_VALUE
1040      relocation.  */
1041   unsigned sym:1;
1042   /* Whether we need a PLT entry for a symbol.  Should be implied by
1043      something like:
1044      (call && symndx == -1 && ! FRVFDPIC_SYM_LOCAL (info, d.h))  */
1045   unsigned plt:1;
1046   /* Whether a function descriptor should be created in this link unit
1047      for symbol+addend.  Should be implied by something like:
1048      (plt || fdgotoff12 || fdgotofflos || fdgotofflohi
1049       || ((fd || fdgot12 || fdgotlos || fdgothilo)
1050 	  && (symndx != -1 || FRVFDPIC_FUNCDESC_LOCAL (info, d.h))))  */
1051   unsigned privfd:1;
1052   /* Whether a lazy PLT entry is needed for this symbol+addend.
1053      Should be implied by something like:
1054      (privfd && symndx == -1 && ! FRVFDPIC_SYM_LOCAL (info, d.h)
1055       && ! (info->flags & DF_BIND_NOW))  */
1056   unsigned lazyplt:1;
1057   /* Whether we've already emitted GOT relocations and PLT entries as
1058      needed for this symbol.  */
1059   unsigned done:1;
1060 
1061   /* The number of R_FRV_32, R_FRV_FUNCDESC, R_FRV_FUNCDESC_VALUE and
1062      R_FRV_TLSDESC_VALUE, R_FRV_TLSOFF relocations referencing
1063      symbol+addend.  */
1064   unsigned relocs32, relocsfd, relocsfdv, relocstlsd, relocstlsoff;
1065 
1066   /* The number of .rofixups entries and dynamic relocations allocated
1067      for this symbol, minus any that might have already been used.  */
1068   unsigned fixups, dynrelocs;
1069 
1070   /* The offsets of the GOT entries assigned to symbol+addend, to the
1071      function descriptor's address, and to a function descriptor,
1072      respectively.  Should be zero if unassigned.  The offsets are
1073      counted from the value that will be assigned to the PIC register,
1074      not from the beginning of the .got section.  */
1075   bfd_signed_vma got_entry, fdgot_entry, fd_entry;
1076   /* The offsets of the PLT entries assigned to symbol+addend,
1077      non-lazy and lazy, respectively.  If unassigned, should be
1078      (bfd_vma)-1.  */
1079   bfd_vma plt_entry, lzplt_entry;
1080   /* The offsets of the GOT entries for TLS offset and TLS descriptor.  */
1081   bfd_signed_vma tlsoff_entry, tlsdesc_entry;
1082   /* The offset of the TLS offset PLT entry.  */
1083   bfd_vma tlsplt_entry;
1084 };
1085 
1086 /* Compute a hash with the key fields of an frvfdpic_relocs_info entry.  */
1087 static hashval_t
1088 frvfdpic_relocs_info_hash (const void *entry_)
1089 {
1090   const struct frvfdpic_relocs_info *entry = entry_;
1091 
1092   return (entry->symndx == -1
1093 	  ? (long) entry->d.h->root.root.hash
1094 	  : entry->symndx + (long) entry->d.abfd->id * 257) + entry->addend;
1095 }
1096 
1097 /* Test whether the key fields of two frvfdpic_relocs_info entries are
1098    identical.  */
1099 static int
1100 frvfdpic_relocs_info_eq (const void *entry1, const void *entry2)
1101 {
1102   const struct frvfdpic_relocs_info *e1 = entry1;
1103   const struct frvfdpic_relocs_info *e2 = entry2;
1104 
1105   return e1->symndx == e2->symndx && e1->addend == e2->addend
1106     && (e1->symndx == -1 ? e1->d.h == e2->d.h : e1->d.abfd == e2->d.abfd);
1107 }
1108 
1109 /* Find or create an entry in a hash table HT that matches the key
1110    fields of the given ENTRY.  If it's not found, memory for a new
1111    entry is allocated in ABFD's obstack.  */
1112 static struct frvfdpic_relocs_info *
1113 frvfdpic_relocs_info_find (struct htab *ht,
1114 			   bfd *abfd,
1115 			   const struct frvfdpic_relocs_info *entry,
1116 			   enum insert_option insert)
1117 {
1118   struct frvfdpic_relocs_info **loc =
1119     (struct frvfdpic_relocs_info **) htab_find_slot (ht, entry, insert);
1120 
1121   if (! loc)
1122     return NULL;
1123 
1124   if (*loc)
1125     return *loc;
1126 
1127   *loc = bfd_zalloc (abfd, sizeof (**loc));
1128 
1129   if (! *loc)
1130     return *loc;
1131 
1132   (*loc)->symndx = entry->symndx;
1133   (*loc)->d = entry->d;
1134   (*loc)->addend = entry->addend;
1135   (*loc)->plt_entry = (bfd_vma)-1;
1136   (*loc)->lzplt_entry = (bfd_vma)-1;
1137   (*loc)->tlsplt_entry = (bfd_vma)-1;
1138 
1139   return *loc;
1140 }
1141 
1142 /* Obtain the address of the entry in HT associated with H's symbol +
1143    addend, creating a new entry if none existed.  ABFD is only used
1144    for memory allocation purposes.  */
1145 inline static struct frvfdpic_relocs_info *
1146 frvfdpic_relocs_info_for_global (struct htab *ht,
1147 				 bfd *abfd,
1148 				 struct elf_link_hash_entry *h,
1149 				 bfd_vma addend,
1150 				 enum insert_option insert)
1151 {
1152   struct frvfdpic_relocs_info entry;
1153 
1154   entry.symndx = -1;
1155   entry.d.h = h;
1156   entry.addend = addend;
1157 
1158   return frvfdpic_relocs_info_find (ht, abfd, &entry, insert);
1159 }
1160 
1161 /* Obtain the address of the entry in HT associated with the SYMNDXth
1162    local symbol of the input bfd ABFD, plus the addend, creating a new
1163    entry if none existed.  */
1164 inline static struct frvfdpic_relocs_info *
1165 frvfdpic_relocs_info_for_local (struct htab *ht,
1166 				bfd *abfd,
1167 				long symndx,
1168 				bfd_vma addend,
1169 				enum insert_option insert)
1170 {
1171   struct frvfdpic_relocs_info entry;
1172 
1173   entry.symndx = symndx;
1174   entry.d.abfd = abfd;
1175   entry.addend = addend;
1176 
1177   return frvfdpic_relocs_info_find (ht, abfd, &entry, insert);
1178 }
1179 
1180 /* Merge fields set by check_relocs() of two entries that end up being
1181    mapped to the same (presumably global) symbol.  */
1182 
1183 inline static void
1184 frvfdpic_pic_merge_early_relocs_info (struct frvfdpic_relocs_info *e2,
1185 				      struct frvfdpic_relocs_info const *e1)
1186 {
1187   e2->got12 |= e1->got12;
1188   e2->gotlos |= e1->gotlos;
1189   e2->gothilo |= e1->gothilo;
1190   e2->fd |= e1->fd;
1191   e2->fdgot12 |= e1->fdgot12;
1192   e2->fdgotlos |= e1->fdgotlos;
1193   e2->fdgothilo |= e1->fdgothilo;
1194   e2->fdgoff12 |= e1->fdgoff12;
1195   e2->fdgofflos |= e1->fdgofflos;
1196   e2->fdgoffhilo |= e1->fdgoffhilo;
1197   e2->tlsplt |= e1->tlsplt;
1198   e2->tlsdesc12 |= e1->tlsdesc12;
1199   e2->tlsdesclos |= e1->tlsdesclos;
1200   e2->tlsdeschilo |= e1->tlsdeschilo;
1201   e2->tlsoff12 |= e1->tlsoff12;
1202   e2->tlsofflos |= e1->tlsofflos;
1203   e2->tlsoffhilo |= e1->tlsoffhilo;
1204   e2->gotoff |= e1->gotoff;
1205   e2->call |= e1->call;
1206   e2->sym |= e1->sym;
1207 }
1208 
1209 /* Every block of 65535 lazy PLT entries shares a single call to the
1210    resolver, inserted in the 32768th lazy PLT entry (i.e., entry #
1211    32767, counting from 0).  All other lazy PLT entries branch to it
1212    in a single instruction.  */
1213 
1214 #define FRVFDPIC_LZPLT_BLOCK_SIZE ((bfd_vma) 8 * 65535 + 4)
1215 #define FRVFDPIC_LZPLT_RESOLV_LOC (8 * 32767)
1216 
1217 /* Add a dynamic relocation to the SRELOC section.  */
1218 
1219 inline static bfd_vma
1220 _frvfdpic_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
1221 			 int reloc_type, long dynindx, bfd_vma addend,
1222 			 struct frvfdpic_relocs_info *entry)
1223 {
1224   Elf_Internal_Rela outrel;
1225   bfd_vma reloc_offset;
1226 
1227   outrel.r_offset = offset;
1228   outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
1229   outrel.r_addend = addend;
1230 
1231   reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rel);
1232   BFD_ASSERT (reloc_offset < sreloc->size);
1233   bfd_elf32_swap_reloc_out (output_bfd, &outrel,
1234 			    sreloc->contents + reloc_offset);
1235   sreloc->reloc_count++;
1236 
1237   /* If the entry's index is zero, this relocation was probably to a
1238      linkonce section that got discarded.  We reserved a dynamic
1239      relocation, but it was for another entry than the one we got at
1240      the time of emitting the relocation.  Unfortunately there's no
1241      simple way for us to catch this situation, since the relocation
1242      is cleared right before calling relocate_section, at which point
1243      we no longer know what the relocation used to point to.  */
1244   if (entry->symndx)
1245     {
1246       BFD_ASSERT (entry->dynrelocs > 0);
1247       entry->dynrelocs--;
1248     }
1249 
1250   return reloc_offset;
1251 }
1252 
1253 /* Add a fixup to the ROFIXUP section.  */
1254 
1255 static bfd_vma
1256 _frvfdpic_add_rofixup (bfd *output_bfd, asection *rofixup, bfd_vma offset,
1257 		       struct frvfdpic_relocs_info *entry)
1258 {
1259   bfd_vma fixup_offset;
1260 
1261   if (rofixup->flags & SEC_EXCLUDE)
1262     return -1;
1263 
1264   fixup_offset = rofixup->reloc_count * 4;
1265   if (rofixup->contents)
1266     {
1267       BFD_ASSERT (fixup_offset < rofixup->size);
1268       bfd_put_32 (output_bfd, offset, rofixup->contents + fixup_offset);
1269     }
1270   rofixup->reloc_count++;
1271 
1272   if (entry && entry->symndx)
1273     {
1274       /* See discussion about symndx == 0 in _frvfdpic_add_dyn_reloc
1275 	 above.  */
1276       BFD_ASSERT (entry->fixups > 0);
1277       entry->fixups--;
1278     }
1279 
1280   return fixup_offset;
1281 }
1282 
1283 /* Find the segment number in which OSEC, and output section, is
1284    located.  */
1285 
1286 static unsigned
1287 _frvfdpic_osec_to_segment (bfd *output_bfd, asection *osec)
1288 {
1289   Elf_Internal_Phdr *p = _bfd_elf_find_segment_containing_section (output_bfd, osec);
1290 
1291   return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
1292 }
1293 
1294 inline static bfd_boolean
1295 _frvfdpic_osec_readonly_p (bfd *output_bfd, asection *osec)
1296 {
1297   unsigned seg = _frvfdpic_osec_to_segment (output_bfd, osec);
1298 
1299   return ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W);
1300 }
1301 
1302 #define FRVFDPIC_TLS_BIAS (2048 - 16)
1303 
1304 /* Return the base VMA address which should be subtracted from real addresses
1305    when resolving TLSMOFF relocation.
1306    This is PT_TLS segment p_vaddr, plus the 2048-16 bias.  */
1307 
1308 static bfd_vma
1309 tls_biased_base (struct bfd_link_info *info)
1310 {
1311   /* If tls_sec is NULL, we should have signalled an error already.  */
1312   if (elf_hash_table (info)->tls_sec == NULL)
1313     return FRVFDPIC_TLS_BIAS;
1314   return elf_hash_table (info)->tls_sec->vma + FRVFDPIC_TLS_BIAS;
1315 }
1316 
1317 /* Generate relocations for GOT entries, function descriptors, and
1318    code for PLT and lazy PLT entries.  */
1319 
1320 inline static bfd_boolean
1321 _frvfdpic_emit_got_relocs_plt_entries (struct frvfdpic_relocs_info *entry,
1322 				       bfd *output_bfd,
1323 				       struct bfd_link_info *info,
1324 				       asection *sec,
1325 				       Elf_Internal_Sym *sym,
1326 				       bfd_vma addend)
1327 
1328 {
1329   bfd_vma fd_lazy_rel_offset = (bfd_vma)-1;
1330   int dynindx = -1;
1331 
1332   if (entry->done)
1333     return TRUE;
1334   entry->done = 1;
1335 
1336   if (entry->got_entry || entry->fdgot_entry || entry->fd_entry
1337       || entry->tlsoff_entry || entry->tlsdesc_entry)
1338     {
1339       /* If the symbol is dynamic, consider it for dynamic
1340 	 relocations, otherwise decay to section + offset.  */
1341       if (entry->symndx == -1 && entry->d.h->dynindx != -1)
1342 	dynindx = entry->d.h->dynindx;
1343       else
1344 	{
1345 	  if (sec
1346 	      && sec->output_section
1347 	      && ! bfd_is_abs_section (sec->output_section)
1348 	      && ! bfd_is_und_section (sec->output_section))
1349 	    dynindx = elf_section_data (sec->output_section)->dynindx;
1350 	  else
1351 	    dynindx = 0;
1352 	}
1353     }
1354 
1355   /* Generate relocation for GOT entry pointing to the symbol.  */
1356   if (entry->got_entry)
1357     {
1358       int idx = dynindx;
1359       bfd_vma ad = addend;
1360 
1361       /* If the symbol is dynamic but binds locally, use
1362 	 section+offset.  */
1363       if (sec && (entry->symndx != -1
1364 		  || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1365 	{
1366 	  if (entry->symndx == -1)
1367 	    ad += entry->d.h->root.u.def.value;
1368 	  else
1369 	    ad += sym->st_value;
1370 	  ad += sec->output_offset;
1371 	  if (sec->output_section && elf_section_data (sec->output_section))
1372 	    idx = elf_section_data (sec->output_section)->dynindx;
1373 	  else
1374 	    idx = 0;
1375 	}
1376 
1377       /* If we're linking an executable at a fixed address, we can
1378 	 omit the dynamic relocation as long as the symbol is local to
1379 	 this module.  */
1380       if (bfd_link_pde (info)
1381 	  && (entry->symndx != -1
1382 	      || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1383 	{
1384 	  if (sec)
1385 	    ad += sec->output_section->vma;
1386 	  if (entry->symndx != -1
1387 	      || entry->d.h->root.type != bfd_link_hash_undefweak)
1388 	    _frvfdpic_add_rofixup (output_bfd,
1389 				   frvfdpic_gotfixup_section (info),
1390 				   frvfdpic_got_section (info)->output_section
1391 				   ->vma
1392 				   + frvfdpic_got_section (info)->output_offset
1393 				   + frvfdpic_got_initial_offset (info)
1394 				   + entry->got_entry, entry);
1395 	}
1396       else
1397 	_frvfdpic_add_dyn_reloc (output_bfd, frvfdpic_gotrel_section (info),
1398 				 _bfd_elf_section_offset
1399 				 (output_bfd, info,
1400 				  frvfdpic_got_section (info),
1401 				  frvfdpic_got_initial_offset (info)
1402 				  + entry->got_entry)
1403 				 + frvfdpic_got_section (info)
1404 				 ->output_section->vma
1405 				 + frvfdpic_got_section (info)->output_offset,
1406 				 R_FRV_32, idx, ad, entry);
1407 
1408       bfd_put_32 (output_bfd, ad,
1409 		  frvfdpic_got_section (info)->contents
1410 		  + frvfdpic_got_initial_offset (info)
1411 		  + entry->got_entry);
1412     }
1413 
1414   /* Generate relocation for GOT entry pointing to a canonical
1415      function descriptor.  */
1416   if (entry->fdgot_entry)
1417     {
1418       int reloc, idx;
1419       bfd_vma ad = 0;
1420 
1421       if (! (entry->symndx == -1
1422 	     && entry->d.h->root.type == bfd_link_hash_undefweak
1423 	     && FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1424 	{
1425 	  /* If the symbol is dynamic and there may be dynamic symbol
1426 	     resolution because we are, or are linked with, a shared
1427 	     library, emit a FUNCDESC relocation such that the dynamic
1428 	     linker will allocate the function descriptor.  If the
1429 	     symbol needs a non-local function descriptor but binds
1430 	     locally (e.g., its visibility is protected, emit a
1431 	     dynamic relocation decayed to section+offset.  */
1432 	  if (entry->symndx == -1
1433 	      && ! FRVFDPIC_FUNCDESC_LOCAL (info, entry->d.h)
1434 	      && FRVFDPIC_SYM_LOCAL (info, entry->d.h)
1435 	      && !bfd_link_pde (info))
1436 	    {
1437 	      reloc = R_FRV_FUNCDESC;
1438 	      idx = elf_section_data (entry->d.h->root.u.def.section
1439 				      ->output_section)->dynindx;
1440 	      ad = entry->d.h->root.u.def.section->output_offset
1441 		+ entry->d.h->root.u.def.value;
1442 	    }
1443 	  else if (entry->symndx == -1
1444 		   && ! FRVFDPIC_FUNCDESC_LOCAL (info, entry->d.h))
1445 	    {
1446 	      reloc = R_FRV_FUNCDESC;
1447 	      idx = dynindx;
1448 	      ad = addend;
1449 	      if (ad)
1450 		{
1451 		  (*info->callbacks->reloc_dangerous)
1452 		    (info, _("relocation requires zero addend"),
1453 		     elf_hash_table (info)->dynobj,
1454 		     frvfdpic_got_section (info),
1455 		     entry->fdgot_entry);
1456 		  return FALSE;
1457 		}
1458 	    }
1459 	  else
1460 	    {
1461 	      /* Otherwise, we know we have a private function descriptor,
1462 		 so reference it directly.  */
1463 	      if (elf_hash_table (info)->dynamic_sections_created)
1464 		BFD_ASSERT (entry->privfd);
1465 	      reloc = R_FRV_32;
1466 	      idx = elf_section_data (frvfdpic_got_section (info)
1467 				      ->output_section)->dynindx;
1468 	      ad = frvfdpic_got_section (info)->output_offset
1469 		+ frvfdpic_got_initial_offset (info) + entry->fd_entry;
1470 	    }
1471 
1472 	  /* If there is room for dynamic symbol resolution, emit the
1473 	     dynamic relocation.  However, if we're linking an
1474 	     executable at a fixed location, we won't have emitted a
1475 	     dynamic symbol entry for the got section, so idx will be
1476 	     zero, which means we can and should compute the address
1477 	     of the private descriptor ourselves.  */
1478 	  if (bfd_link_pde (info)
1479 	      && (entry->symndx != -1
1480 		  || FRVFDPIC_FUNCDESC_LOCAL (info, entry->d.h)))
1481 	    {
1482 	      ad += frvfdpic_got_section (info)->output_section->vma;
1483 	      _frvfdpic_add_rofixup (output_bfd,
1484 				     frvfdpic_gotfixup_section (info),
1485 				     frvfdpic_got_section (info)
1486 				     ->output_section->vma
1487 				     + frvfdpic_got_section (info)
1488 				     ->output_offset
1489 				     + frvfdpic_got_initial_offset (info)
1490 				     + entry->fdgot_entry, entry);
1491 	    }
1492 	  else
1493 	    _frvfdpic_add_dyn_reloc (output_bfd,
1494 				     frvfdpic_gotrel_section (info),
1495 				     _bfd_elf_section_offset
1496 				     (output_bfd, info,
1497 				      frvfdpic_got_section (info),
1498 				      frvfdpic_got_initial_offset (info)
1499 				      + entry->fdgot_entry)
1500 				     + frvfdpic_got_section (info)
1501 				     ->output_section->vma
1502 				     + frvfdpic_got_section (info)
1503 				     ->output_offset,
1504 				     reloc, idx, ad, entry);
1505 	}
1506 
1507       bfd_put_32 (output_bfd, ad,
1508 		  frvfdpic_got_section (info)->contents
1509 		  + frvfdpic_got_initial_offset (info)
1510 		  + entry->fdgot_entry);
1511     }
1512 
1513   /* Generate relocation to fill in a private function descriptor in
1514      the GOT.  */
1515   if (entry->fd_entry)
1516     {
1517       int idx = dynindx;
1518       bfd_vma ad = addend;
1519       bfd_vma ofst;
1520       long lowword, highword;
1521 
1522       /* If the symbol is dynamic but binds locally, use
1523 	 section+offset.  */
1524       if (sec && (entry->symndx != -1
1525 		  || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1526 	{
1527 	  if (entry->symndx == -1)
1528 	    ad += entry->d.h->root.u.def.value;
1529 	  else
1530 	    ad += sym->st_value;
1531 	  ad += sec->output_offset;
1532 	  if (sec->output_section && elf_section_data (sec->output_section))
1533 	    idx = elf_section_data (sec->output_section)->dynindx;
1534 	  else
1535 	    idx = 0;
1536 	}
1537 
1538       /* If we're linking an executable at a fixed address, we can
1539 	 omit the dynamic relocation as long as the symbol is local to
1540 	 this module.  */
1541       if (bfd_link_pde (info)
1542 	  && (entry->symndx != -1 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1543 	{
1544 	  if (sec)
1545 	    ad += sec->output_section->vma;
1546 	  ofst = 0;
1547 	  if (entry->symndx != -1
1548 	      || entry->d.h->root.type != bfd_link_hash_undefweak)
1549 	    {
1550 	      _frvfdpic_add_rofixup (output_bfd,
1551 				     frvfdpic_gotfixup_section (info),
1552 				     frvfdpic_got_section (info)
1553 				     ->output_section->vma
1554 				     + frvfdpic_got_section (info)
1555 				     ->output_offset
1556 				     + frvfdpic_got_initial_offset (info)
1557 				     + entry->fd_entry, entry);
1558 	      _frvfdpic_add_rofixup (output_bfd,
1559 				     frvfdpic_gotfixup_section (info),
1560 				     frvfdpic_got_section (info)
1561 				     ->output_section->vma
1562 				     + frvfdpic_got_section (info)
1563 				     ->output_offset
1564 				     + frvfdpic_got_initial_offset (info)
1565 				     + entry->fd_entry + 4, entry);
1566 	    }
1567 	}
1568       else
1569 	{
1570 	  ofst =
1571 	    _frvfdpic_add_dyn_reloc (output_bfd,
1572 				     entry->lazyplt
1573 				     ? frvfdpic_pltrel_section (info)
1574 				     : frvfdpic_gotrel_section (info),
1575 				     _bfd_elf_section_offset
1576 				     (output_bfd, info,
1577 				      frvfdpic_got_section (info),
1578 				      frvfdpic_got_initial_offset (info)
1579 				      + entry->fd_entry)
1580 				     + frvfdpic_got_section (info)
1581 				     ->output_section->vma
1582 				     + frvfdpic_got_section (info)
1583 				     ->output_offset,
1584 				     R_FRV_FUNCDESC_VALUE, idx, ad, entry);
1585 	}
1586 
1587       /* If we've omitted the dynamic relocation, just emit the fixed
1588 	 addresses of the symbol and of the local GOT base offset.  */
1589       if (bfd_link_pde (info)
1590 	  && sec
1591 	  && sec->output_section)
1592 	{
1593 	  lowword = ad;
1594 	  highword = frvfdpic_got_section (info)->output_section->vma
1595 	    + frvfdpic_got_section (info)->output_offset
1596 	    + frvfdpic_got_initial_offset (info);
1597 	}
1598       else if (entry->lazyplt)
1599 	{
1600 	  if (ad)
1601 	    {
1602 	      (*info->callbacks->reloc_dangerous)
1603 		(info, _("relocation requires zero addend"),
1604 		 elf_hash_table (info)->dynobj,
1605 		 frvfdpic_got_section (info),
1606 		 entry->fd_entry);
1607 	      return FALSE;
1608 	    }
1609 
1610 	  fd_lazy_rel_offset = ofst;
1611 
1612 	  /* A function descriptor used for lazy or local resolving is
1613 	     initialized such that its high word contains the output
1614 	     section index in which the PLT entries are located, and
1615 	     the low word contains the address of the lazy PLT entry
1616 	     entry point, that must be within the memory region
1617 	     assigned to that section.  */
1618 	  lowword = entry->lzplt_entry + 4
1619 	    + frvfdpic_plt_section (info)->output_offset
1620 	    + frvfdpic_plt_section (info)->output_section->vma;
1621 	  highword = _frvfdpic_osec_to_segment
1622 	    (output_bfd, frvfdpic_plt_section (info)->output_section);
1623 	}
1624       else
1625 	{
1626 	  /* A function descriptor for a local function gets the index
1627 	     of the section.  For a non-local function, it's
1628 	     disregarded.  */
1629 	  lowword = ad;
1630 	  if (sec == NULL
1631 	      || (entry->symndx == -1 && entry->d.h->dynindx != -1
1632 		  && entry->d.h->dynindx == idx))
1633 	    highword = 0;
1634 	  else
1635 	    highword = _frvfdpic_osec_to_segment
1636 	      (output_bfd, sec->output_section);
1637 	}
1638 
1639       bfd_put_32 (output_bfd, lowword,
1640 		  frvfdpic_got_section (info)->contents
1641 		  + frvfdpic_got_initial_offset (info)
1642 		  + entry->fd_entry);
1643       bfd_put_32 (output_bfd, highword,
1644 		  frvfdpic_got_section (info)->contents
1645 		  + frvfdpic_got_initial_offset (info)
1646 		  + entry->fd_entry + 4);
1647     }
1648 
1649   /* Generate code for the PLT entry.  */
1650   if (entry->plt_entry != (bfd_vma) -1)
1651     {
1652       bfd_byte *plt_code = frvfdpic_plt_section (info)->contents
1653 	+ entry->plt_entry;
1654 
1655       BFD_ASSERT (entry->fd_entry);
1656 
1657       /* Figure out what kind of PLT entry we need, depending on the
1658 	 location of the function descriptor within the GOT.  */
1659       if (entry->fd_entry >= -(1 << (12 - 1))
1660 	  && entry->fd_entry < (1 << (12 - 1)))
1661 	{
1662 	  /* lddi @(gr15, fd_entry), gr14 */
1663 	  bfd_put_32 (output_bfd,
1664 		      0x9cccf000 | (entry->fd_entry & ((1 << 12) - 1)),
1665 		      plt_code);
1666 	  plt_code += 4;
1667 	}
1668       else
1669 	{
1670 	  if (entry->fd_entry >= -(1 << (16 - 1))
1671 	      && entry->fd_entry < (1 << (16 - 1)))
1672 	    {
1673 	      /* setlos lo(fd_entry), gr14 */
1674 	      bfd_put_32 (output_bfd,
1675 			  0x9cfc0000
1676 			  | (entry->fd_entry & (((bfd_vma)1 << 16) - 1)),
1677 			  plt_code);
1678 	      plt_code += 4;
1679 	    }
1680 	  else
1681 	    {
1682 	      /* sethi.p hi(fd_entry), gr14
1683 		 setlo lo(fd_entry), gr14 */
1684 	      bfd_put_32 (output_bfd,
1685 			  0x1cf80000
1686 			  | ((entry->fd_entry >> 16)
1687 			     & (((bfd_vma)1 << 16) - 1)),
1688 			  plt_code);
1689 	      plt_code += 4;
1690 	      bfd_put_32 (output_bfd,
1691 			  0x9cf40000
1692 			  | (entry->fd_entry & (((bfd_vma)1 << 16) - 1)),
1693 			  plt_code);
1694 	      plt_code += 4;
1695 	    }
1696 	  /* ldd @(gr14,gr15),gr14 */
1697 	  bfd_put_32 (output_bfd, 0x9c08e14f, plt_code);
1698 	  plt_code += 4;
1699 	}
1700       /* jmpl @(gr14,gr0) */
1701       bfd_put_32 (output_bfd, 0x8030e000, plt_code);
1702     }
1703 
1704   /* Generate code for the lazy PLT entry.  */
1705   if (entry->lzplt_entry != (bfd_vma) -1)
1706     {
1707       bfd_byte *lzplt_code = frvfdpic_plt_section (info)->contents
1708 	+ entry->lzplt_entry;
1709       bfd_vma resolverStub_addr;
1710 
1711       bfd_put_32 (output_bfd, fd_lazy_rel_offset, lzplt_code);
1712       lzplt_code += 4;
1713 
1714       resolverStub_addr = entry->lzplt_entry / FRVFDPIC_LZPLT_BLOCK_SIZE
1715 	* FRVFDPIC_LZPLT_BLOCK_SIZE + FRVFDPIC_LZPLT_RESOLV_LOC;
1716       if (resolverStub_addr >= frvfdpic_plt_initial_offset (info))
1717 	resolverStub_addr = frvfdpic_plt_initial_offset (info) - 12;
1718 
1719       if (entry->lzplt_entry == resolverStub_addr)
1720 	{
1721 	  /* This is a lazy PLT entry that includes a resolver call.  */
1722 	  /* ldd @(gr15,gr0), gr4
1723 	     jmpl @(gr4,gr0)  */
1724 	  bfd_put_32 (output_bfd, 0x8808f140, lzplt_code);
1725 	  bfd_put_32 (output_bfd, 0x80304000, lzplt_code + 4);
1726 	}
1727       else
1728 	{
1729 	  /* bra  resolverStub */
1730 	  bfd_put_32 (output_bfd,
1731 		      0xc01a0000
1732 		      | (((resolverStub_addr - entry->lzplt_entry)
1733 			  / 4) & (((bfd_vma)1 << 16) - 1)),
1734 		      lzplt_code);
1735 	}
1736     }
1737 
1738   /* Generate relocation for GOT entry holding the TLS offset.  */
1739   if (entry->tlsoff_entry)
1740     {
1741       int idx = dynindx;
1742       bfd_vma ad = addend;
1743 
1744       if (entry->symndx != -1
1745 	  || FRVFDPIC_SYM_LOCAL (info, entry->d.h))
1746 	{
1747 	  /* If the symbol is dynamic but binds locally, use
1748 	     section+offset.  */
1749 	  if (sec)
1750 	    {
1751 	      if (entry->symndx == -1)
1752 		ad += entry->d.h->root.u.def.value;
1753 	      else
1754 		ad += sym->st_value;
1755 	      ad += sec->output_offset;
1756 	      if (sec->output_section
1757 		  && elf_section_data (sec->output_section))
1758 		idx = elf_section_data (sec->output_section)->dynindx;
1759 	      else
1760 		idx = 0;
1761 	    }
1762 	}
1763 
1764       /* *ABS*+addend is special for TLS relocations, use only the
1765 	 addend.  */
1766       if (bfd_link_executable (info)
1767 	  && idx == 0
1768 	  && (bfd_is_abs_section (sec)
1769 	      || bfd_is_und_section (sec)))
1770 	;
1771       /* If we're linking an executable, we can entirely omit the
1772 	 dynamic relocation if the symbol is local to this module.  */
1773       else if (bfd_link_executable (info)
1774 	       && (entry->symndx != -1
1775 		   || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1776 	{
1777 	  if (sec)
1778 	    ad += sec->output_section->vma - tls_biased_base (info);
1779 	}
1780       else
1781 	{
1782 	  if (idx == 0
1783 	      && (bfd_is_abs_section (sec)
1784 		  || bfd_is_und_section (sec)))
1785 	    {
1786 	      if (! elf_hash_table (info)->tls_sec)
1787 		{
1788 		  (*info->callbacks->undefined_symbol)
1789 		    (info, "TLS section", elf_hash_table (info)->dynobj,
1790 		     frvfdpic_got_section (info), entry->tlsoff_entry, TRUE);
1791 		  return FALSE;
1792 		}
1793 	      idx = elf_section_data (elf_hash_table (info)->tls_sec)->dynindx;
1794 	      ad += FRVFDPIC_TLS_BIAS;
1795 	    }
1796 	  _frvfdpic_add_dyn_reloc (output_bfd, frvfdpic_gotrel_section (info),
1797 				   _bfd_elf_section_offset
1798 				   (output_bfd, info,
1799 				    frvfdpic_got_section (info),
1800 				    frvfdpic_got_initial_offset (info)
1801 				    + entry->tlsoff_entry)
1802 				   + frvfdpic_got_section (info)
1803 				   ->output_section->vma
1804 				   + frvfdpic_got_section (info)
1805 				   ->output_offset,
1806 				   R_FRV_TLSOFF, idx, ad, entry);
1807 	}
1808 
1809       bfd_put_32 (output_bfd, ad,
1810 		  frvfdpic_got_section (info)->contents
1811 		  + frvfdpic_got_initial_offset (info)
1812 		  + entry->tlsoff_entry);
1813     }
1814 
1815   if (entry->tlsdesc_entry)
1816     {
1817       int idx = dynindx;
1818       bfd_vma ad = addend;
1819 
1820       /* If the symbol is dynamic but binds locally, use
1821 	 section+offset.  */
1822       if (sec && (entry->symndx != -1
1823 		  || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1824 	{
1825 	  if (entry->symndx == -1)
1826 	    ad += entry->d.h->root.u.def.value;
1827 	  else
1828 	    ad += sym->st_value;
1829 	  ad += sec->output_offset;
1830 	  if (sec->output_section && elf_section_data (sec->output_section))
1831 	    idx = elf_section_data (sec->output_section)->dynindx;
1832 	  else
1833 	    idx = 0;
1834 	}
1835 
1836       /* If we didn't set up a TLS offset entry, but we're linking an
1837 	 executable and the symbol binds locally, we can use the
1838 	 module offset in the TLS descriptor in relaxations.  */
1839       if (bfd_link_executable (info) && ! entry->tlsoff_entry)
1840 	entry->tlsoff_entry = entry->tlsdesc_entry + 4;
1841 
1842       if (bfd_link_pde (info)
1843 	  && ((idx == 0
1844 	       && (bfd_is_abs_section (sec)
1845 		   || bfd_is_und_section (sec)))
1846 	      || entry->symndx != -1
1847 	      || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1848 	{
1849 	  /* *ABS*+addend is special for TLS relocations, use only the
1850 	     addend for the TLS offset, and take the module id as
1851 	     0.  */
1852 	  if (idx == 0
1853 	      && (bfd_is_abs_section (sec)
1854 		  || bfd_is_und_section (sec)))
1855 	    ;
1856 	  /* For other TLS symbols that bind locally, add the section
1857 	     TLS offset to the addend.  */
1858 	  else if (sec)
1859 	    ad += sec->output_section->vma - tls_biased_base (info);
1860 
1861 	  bfd_put_32 (output_bfd,
1862 		      frvfdpic_plt_section (info)->output_section->vma
1863 		      + frvfdpic_plt_section (info)->output_offset
1864 		      + frvfdpic_plt_tls_ret_offset (info),
1865 		      frvfdpic_got_section (info)->contents
1866 		      + frvfdpic_got_initial_offset (info)
1867 		      + entry->tlsdesc_entry);
1868 
1869 	  _frvfdpic_add_rofixup (output_bfd,
1870 				 frvfdpic_gotfixup_section (info),
1871 				 frvfdpic_got_section (info)
1872 				 ->output_section->vma
1873 				 + frvfdpic_got_section (info)
1874 				 ->output_offset
1875 				 + frvfdpic_got_initial_offset (info)
1876 				 + entry->tlsdesc_entry, entry);
1877 
1878 	  BFD_ASSERT (frvfdpic_dynamic_got_plt_info (info)->tls_ret_refs);
1879 
1880 	  /* We've used one of the reserved fixups, so discount it so
1881 	     that we can check at the end that we've used them
1882 	     all.  */
1883 	  frvfdpic_dynamic_got_plt_info (info)->tls_ret_refs--;
1884 
1885 	  /* While at that, make sure the ret instruction makes to the
1886 	     right location in the PLT.  We could do it only when we
1887 	     got to 0, but since the check at the end will only print
1888 	     a warning, make sure we have the ret in place in case the
1889 	     warning is missed.  */
1890 	  bfd_put_32 (output_bfd, 0xc03a4000,
1891 		      frvfdpic_plt_section (info)->contents
1892 		      + frvfdpic_plt_tls_ret_offset (info));
1893 	}
1894       else
1895 	{
1896 	  if (idx == 0
1897 	      && (bfd_is_abs_section (sec)
1898 		  || bfd_is_und_section (sec)))
1899 	    {
1900 	      if (! elf_hash_table (info)->tls_sec)
1901 		{
1902 		  (*info->callbacks->undefined_symbol)
1903 		    (info, "TLS section", elf_hash_table (info)->dynobj,
1904 		     frvfdpic_got_section (info), entry->tlsdesc_entry, TRUE);
1905 		  return FALSE;
1906 		}
1907 	      idx = elf_section_data (elf_hash_table (info)->tls_sec)->dynindx;
1908 	      ad += FRVFDPIC_TLS_BIAS;
1909 	    }
1910 
1911 	  _frvfdpic_add_dyn_reloc (output_bfd, frvfdpic_gotrel_section (info),
1912 				   _bfd_elf_section_offset
1913 				   (output_bfd, info,
1914 				    frvfdpic_got_section (info),
1915 				    frvfdpic_got_initial_offset (info)
1916 				    + entry->tlsdesc_entry)
1917 				   + frvfdpic_got_section (info)
1918 				   ->output_section->vma
1919 				   + frvfdpic_got_section (info)
1920 				   ->output_offset,
1921 				   R_FRV_TLSDESC_VALUE, idx, ad, entry);
1922 
1923 	  bfd_put_32 (output_bfd, 0,
1924 		      frvfdpic_got_section (info)->contents
1925 		      + frvfdpic_got_initial_offset (info)
1926 		      + entry->tlsdesc_entry);
1927 	}
1928 
1929       bfd_put_32 (output_bfd, ad,
1930 		  frvfdpic_got_section (info)->contents
1931 		  + frvfdpic_got_initial_offset (info)
1932 		  + entry->tlsdesc_entry + 4);
1933     }
1934 
1935   /* Generate code for the get-TLS-offset PLT entry.  */
1936   if (entry->tlsplt_entry != (bfd_vma) -1)
1937     {
1938       bfd_byte *plt_code = frvfdpic_plt_section (info)->contents
1939 	+ entry->tlsplt_entry;
1940 
1941       if (bfd_link_executable (info)
1942 	  && (entry->symndx != -1
1943 	      || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1944 	{
1945 	  int idx = dynindx;
1946 	  bfd_vma ad = addend;
1947 
1948 	  /* sec may be NULL when referencing an undefweak symbol
1949 	     while linking a static executable.  */
1950 	  if (!sec)
1951 	    {
1952 	      BFD_ASSERT (entry->symndx == -1
1953 			  && entry->d.h->root.type == bfd_link_hash_undefweak);
1954 	    }
1955 	  else
1956 	    {
1957 	      if (entry->symndx == -1)
1958 		ad += entry->d.h->root.u.def.value;
1959 	      else
1960 		ad += sym->st_value;
1961 	      ad += sec->output_offset;
1962 	      if (sec->output_section
1963 		  && elf_section_data (sec->output_section))
1964 		idx = elf_section_data (sec->output_section)->dynindx;
1965 	      else
1966 		idx = 0;
1967 	    }
1968 
1969 	  /* *ABS*+addend is special for TLS relocations, use only the
1970 	     addend for the TLS offset, and take the module id as
1971 	     0.  */
1972 	  if (idx == 0
1973 	      && (bfd_is_abs_section (sec)
1974 		  || bfd_is_und_section (sec)))
1975 	    ;
1976 	  /* For other TLS symbols that bind locally, add the section
1977 	     TLS offset to the addend.  */
1978 	  else if (sec)
1979 	    ad += sec->output_section->vma - tls_biased_base (info);
1980 
1981 	  if ((bfd_signed_vma)ad >= -(1 << (16 - 1))
1982 	      && (bfd_signed_vma)ad < (1 << (16 - 1)))
1983 	    {
1984 	      /* setlos lo(ad), gr9 */
1985 	      bfd_put_32 (output_bfd,
1986 			  0x92fc0000
1987 			  | (ad
1988 			     & (((bfd_vma)1 << 16) - 1)),
1989 			  plt_code);
1990 	      plt_code += 4;
1991 	    }
1992 	  else
1993 	    {
1994 	      /* sethi.p hi(ad), gr9
1995 		 setlo lo(ad), gr9 */
1996 	      bfd_put_32 (output_bfd,
1997 			  0x12f80000
1998 			  | ((ad >> 16)
1999 			     & (((bfd_vma)1 << 16) - 1)),
2000 			  plt_code);
2001 	      plt_code += 4;
2002 	      bfd_put_32 (output_bfd,
2003 			  0x92f40000
2004 			  | (ad
2005 			     & (((bfd_vma)1 << 16) - 1)),
2006 			  plt_code);
2007 	      plt_code += 4;
2008 	    }
2009 	  /* ret */
2010 	  bfd_put_32 (output_bfd, 0xc03a4000, plt_code);
2011 	}
2012       else if (entry->tlsoff_entry)
2013 	{
2014 	  /* Figure out what kind of PLT entry we need, depending on the
2015 	     location of the TLS descriptor within the GOT.  */
2016 	  if (entry->tlsoff_entry >= -(1 << (12 - 1))
2017 	      && entry->tlsoff_entry < (1 << (12 - 1)))
2018 	    {
2019 	      /* ldi @(gr15, tlsoff_entry), gr9 */
2020 	      bfd_put_32 (output_bfd,
2021 			  0x92c8f000 | (entry->tlsoff_entry
2022 					& ((1 << 12) - 1)),
2023 			  plt_code);
2024 	      plt_code += 4;
2025 	    }
2026 	  else
2027 	    {
2028 	      if (entry->tlsoff_entry >= -(1 << (16 - 1))
2029 		  && entry->tlsoff_entry < (1 << (16 - 1)))
2030 		{
2031 		  /* setlos lo(tlsoff_entry), gr8 */
2032 		  bfd_put_32 (output_bfd,
2033 			      0x90fc0000
2034 			      | (entry->tlsoff_entry
2035 				 & (((bfd_vma)1 << 16) - 1)),
2036 			      plt_code);
2037 		  plt_code += 4;
2038 		}
2039 	      else
2040 		{
2041 		  /* sethi.p hi(tlsoff_entry), gr8
2042 		     setlo lo(tlsoff_entry), gr8 */
2043 		  bfd_put_32 (output_bfd,
2044 			      0x10f80000
2045 			      | ((entry->tlsoff_entry >> 16)
2046 				 & (((bfd_vma)1 << 16) - 1)),
2047 			      plt_code);
2048 		  plt_code += 4;
2049 		  bfd_put_32 (output_bfd,
2050 			      0x90f40000
2051 			      | (entry->tlsoff_entry
2052 				 & (((bfd_vma)1 << 16) - 1)),
2053 			      plt_code);
2054 		  plt_code += 4;
2055 		}
2056 	      /* ld @(gr15,gr8),gr9 */
2057 	      bfd_put_32 (output_bfd, 0x9008f108, plt_code);
2058 	      plt_code += 4;
2059 	    }
2060 	  /* ret */
2061 	  bfd_put_32 (output_bfd, 0xc03a4000, plt_code);
2062 	}
2063       else
2064 	{
2065 	  BFD_ASSERT (entry->tlsdesc_entry);
2066 
2067 	  /* Figure out what kind of PLT entry we need, depending on the
2068 	     location of the TLS descriptor within the GOT.  */
2069 	  if (entry->tlsdesc_entry >= -(1 << (12 - 1))
2070 	      && entry->tlsdesc_entry < (1 << (12 - 1)))
2071 	    {
2072 	      /* lddi @(gr15, tlsdesc_entry), gr8 */
2073 	      bfd_put_32 (output_bfd,
2074 			  0x90ccf000 | (entry->tlsdesc_entry
2075 					& ((1 << 12) - 1)),
2076 			  plt_code);
2077 	      plt_code += 4;
2078 	    }
2079 	  else
2080 	    {
2081 	      if (entry->tlsdesc_entry >= -(1 << (16 - 1))
2082 		  && entry->tlsdesc_entry < (1 << (16 - 1)))
2083 		{
2084 		  /* setlos lo(tlsdesc_entry), gr8 */
2085 		  bfd_put_32 (output_bfd,
2086 			      0x90fc0000
2087 			      | (entry->tlsdesc_entry
2088 				 & (((bfd_vma)1 << 16) - 1)),
2089 			      plt_code);
2090 		  plt_code += 4;
2091 		}
2092 	      else
2093 		{
2094 		  /* sethi.p hi(tlsdesc_entry), gr8
2095 		     setlo lo(tlsdesc_entry), gr8 */
2096 		  bfd_put_32 (output_bfd,
2097 			      0x10f80000
2098 			      | ((entry->tlsdesc_entry >> 16)
2099 				 & (((bfd_vma)1 << 16) - 1)),
2100 			      plt_code);
2101 		  plt_code += 4;
2102 		  bfd_put_32 (output_bfd,
2103 			      0x90f40000
2104 			      | (entry->tlsdesc_entry
2105 				 & (((bfd_vma)1 << 16) - 1)),
2106 			      plt_code);
2107 		  plt_code += 4;
2108 		}
2109 	      /* ldd @(gr15,gr8),gr8 */
2110 	      bfd_put_32 (output_bfd, 0x9008f148, plt_code);
2111 	      plt_code += 4;
2112 	    }
2113 	  /* jmpl @(gr8,gr0) */
2114 	  bfd_put_32 (output_bfd, 0x80308000, plt_code);
2115 	}
2116     }
2117 
2118   return TRUE;
2119 }
2120 
2121 /* Handle an FRV small data reloc.  */
2122 
2123 static bfd_reloc_status_type
2124 elf32_frv_relocate_gprel12 (struct bfd_link_info *info,
2125 			    bfd *input_bfd,
2126 			    asection *input_section,
2127 			    Elf_Internal_Rela *relocation,
2128 			    bfd_byte *contents,
2129 			    bfd_vma value)
2130 {
2131   bfd_vma insn;
2132   bfd_vma gp;
2133   struct bfd_link_hash_entry *h;
2134 
2135   h = bfd_link_hash_lookup (info->hash, "_gp", FALSE, FALSE, TRUE);
2136 
2137   gp = (h->u.def.value
2138 	+ h->u.def.section->output_section->vma
2139 	+ h->u.def.section->output_offset);
2140 
2141   value -= input_section->output_section->vma;
2142   value -= (gp - input_section->output_section->vma);
2143 
2144   insn = bfd_get_32 (input_bfd, contents + relocation->r_offset);
2145 
2146   value += relocation->r_addend;
2147 
2148   if ((long) value > 0x7ff || (long) value < -0x800)
2149     return bfd_reloc_overflow;
2150 
2151   bfd_put_32 (input_bfd,
2152 	      (insn & 0xfffff000) | (value & 0xfff),
2153 	      contents + relocation->r_offset);
2154 
2155   return bfd_reloc_ok;
2156 }
2157 
2158 /* Handle an FRV small data reloc. for the u12 field.  */
2159 
2160 static bfd_reloc_status_type
2161 elf32_frv_relocate_gprelu12 (struct bfd_link_info *info,
2162 			     bfd *input_bfd,
2163 			     asection *input_section,
2164 			     Elf_Internal_Rela *relocation,
2165 			     bfd_byte *contents,
2166 			     bfd_vma value)
2167 {
2168   bfd_vma insn;
2169   bfd_vma gp;
2170   struct bfd_link_hash_entry *h;
2171   bfd_vma mask;
2172 
2173   h = bfd_link_hash_lookup (info->hash, "_gp", FALSE, FALSE, TRUE);
2174 
2175   gp = (h->u.def.value
2176 	+ h->u.def.section->output_section->vma
2177 	+ h->u.def.section->output_offset);
2178 
2179   value -= input_section->output_section->vma;
2180   value -= (gp - input_section->output_section->vma);
2181 
2182   insn = bfd_get_32 (input_bfd, contents + relocation->r_offset);
2183 
2184   value += relocation->r_addend;
2185 
2186   if ((long) value > 0x7ff || (long) value < -0x800)
2187     return bfd_reloc_overflow;
2188 
2189   /* The high 6 bits go into bits 17-12. The low 6 bits go into bits 5-0.  */
2190   mask = 0x3f03f;
2191   insn = (insn & ~mask) | ((value & 0xfc0) << 12) | (value & 0x3f);
2192 
2193   bfd_put_32 (input_bfd, insn, contents + relocation->r_offset);
2194 
2195   return bfd_reloc_ok;
2196 }
2197 
2198 /* Handle an FRV ELF HI16 reloc.  */
2199 
2200 static bfd_reloc_status_type
2201 elf32_frv_relocate_hi16 (bfd *input_bfd,
2202 			 Elf_Internal_Rela *relhi,
2203 			 bfd_byte *contents,
2204 			 bfd_vma value)
2205 {
2206   bfd_vma insn;
2207 
2208   insn = bfd_get_32 (input_bfd, contents + relhi->r_offset);
2209 
2210   value += relhi->r_addend;
2211   value = ((value >> 16) & 0xffff);
2212 
2213   insn = (insn & 0xffff0000) | value;
2214 
2215   if ((long) value > 0xffff || (long) value < -0x10000)
2216     return bfd_reloc_overflow;
2217 
2218   bfd_put_32 (input_bfd, insn, contents + relhi->r_offset);
2219   return bfd_reloc_ok;
2220 
2221 }
2222 static bfd_reloc_status_type
2223 elf32_frv_relocate_lo16 (bfd *input_bfd,
2224 			 Elf_Internal_Rela *rello,
2225 			 bfd_byte *contents,
2226 			 bfd_vma value)
2227 {
2228   bfd_vma insn;
2229 
2230   insn = bfd_get_32 (input_bfd, contents + rello->r_offset);
2231 
2232   value += rello->r_addend;
2233   value = value & 0xffff;
2234 
2235   insn = (insn & 0xffff0000) | value;
2236 
2237   if ((long) value > 0xffff || (long) value < -0x10000)
2238     return bfd_reloc_overflow;
2239 
2240   bfd_put_32 (input_bfd, insn, contents + rello->r_offset);
2241   return bfd_reloc_ok;
2242 }
2243 
2244 /* Perform the relocation for the CALL label24 instruction.  */
2245 
2246 static bfd_reloc_status_type
2247 elf32_frv_relocate_label24 (bfd *input_bfd,
2248 			    asection *input_section,
2249 			    Elf_Internal_Rela *rello,
2250 			    bfd_byte *contents,
2251 			    bfd_vma value)
2252 {
2253   bfd_vma insn;
2254   bfd_vma label6;
2255   bfd_vma label18;
2256 
2257   /* The format for the call instruction is:
2258 
2259     0 000000 0001111 000000000000000000
2260       label6 opcode  label18
2261 
2262     The branch calculation is: pc + (4*label24)
2263     where label24 is the concatenation of label6 and label18.  */
2264 
2265   /* Grab the instruction.  */
2266   insn = bfd_get_32 (input_bfd, contents + rello->r_offset);
2267 
2268   value -= input_section->output_section->vma + input_section->output_offset;
2269   value -= rello->r_offset;
2270   value += rello->r_addend;
2271 
2272   value = value >> 2;
2273 
2274   label6  = value & 0xfc0000;
2275   label6  = label6 << 7;
2276 
2277   label18 = value & 0x3ffff;
2278 
2279   insn = insn & 0x803c0000;
2280   insn = insn | label6;
2281   insn = insn | label18;
2282 
2283   bfd_put_32 (input_bfd, insn, contents + rello->r_offset);
2284 
2285   return bfd_reloc_ok;
2286 }
2287 
2288 static bfd_reloc_status_type
2289 elf32_frv_relocate_gprelhi (struct bfd_link_info *info,
2290 			    bfd *input_bfd,
2291 			    asection *input_section,
2292 			    Elf_Internal_Rela *relocation,
2293 			    bfd_byte *contents,
2294 			    bfd_vma value)
2295 {
2296   bfd_vma insn;
2297   bfd_vma gp;
2298   struct bfd_link_hash_entry *h;
2299 
2300   h = bfd_link_hash_lookup (info->hash, "_gp", FALSE, FALSE, TRUE);
2301 
2302   gp = (h->u.def.value
2303 	+ h->u.def.section->output_section->vma
2304 	+ h->u.def.section->output_offset);
2305 
2306   value -= input_section->output_section->vma;
2307   value -= (gp - input_section->output_section->vma);
2308   value += relocation->r_addend;
2309   value = ((value >> 16) & 0xffff);
2310 
2311   if ((long) value > 0xffff || (long) value < -0x10000)
2312     return bfd_reloc_overflow;
2313 
2314   insn = bfd_get_32 (input_bfd, contents + relocation->r_offset);
2315   insn = (insn & 0xffff0000) | value;
2316 
2317   bfd_put_32 (input_bfd, insn, contents + relocation->r_offset);
2318   return bfd_reloc_ok;
2319 }
2320 
2321 static bfd_reloc_status_type
2322 elf32_frv_relocate_gprello (struct bfd_link_info *info,
2323 			    bfd *input_bfd,
2324 			    asection *input_section,
2325 			    Elf_Internal_Rela *relocation,
2326 			    bfd_byte *contents,
2327 			    bfd_vma value)
2328 {
2329   bfd_vma insn;
2330   bfd_vma gp;
2331   struct bfd_link_hash_entry *h;
2332 
2333   h = bfd_link_hash_lookup (info->hash, "_gp", FALSE, FALSE, TRUE);
2334 
2335   gp = (h->u.def.value
2336 	+ h->u.def.section->output_section->vma
2337 	+ h->u.def.section->output_offset);
2338 
2339   value -= input_section->output_section->vma;
2340   value -= (gp - input_section->output_section->vma);
2341   value += relocation->r_addend;
2342   value = value & 0xffff;
2343 
2344   if ((long) value > 0xffff || (long) value < -0x10000)
2345     return bfd_reloc_overflow;
2346 
2347   insn = bfd_get_32 (input_bfd, contents + relocation->r_offset);
2348   insn = (insn & 0xffff0000) | value;
2349 
2350   bfd_put_32 (input_bfd, insn, contents + relocation->r_offset);
2351 
2352  return bfd_reloc_ok;
2353 }
2354 
2355 static reloc_howto_type *
2356 frv_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2357 		       bfd_reloc_code_real_type code)
2358 {
2359   switch (code)
2360     {
2361     default:
2362       break;
2363 
2364     case BFD_RELOC_NONE:
2365       return &elf32_frv_howto_table[ (int) R_FRV_NONE];
2366 
2367     case BFD_RELOC_32:
2368       if (elf_elfheader (abfd)->e_type == ET_EXEC
2369 	  || elf_elfheader (abfd)->e_type == ET_DYN)
2370 	return &elf32_frv_rel_32_howto;
2371       /* Fall through.  */
2372     case BFD_RELOC_CTOR:
2373       return &elf32_frv_howto_table[ (int) R_FRV_32];
2374 
2375     case BFD_RELOC_FRV_LABEL16:
2376       return &elf32_frv_howto_table[ (int) R_FRV_LABEL16];
2377 
2378     case BFD_RELOC_FRV_LABEL24:
2379       return &elf32_frv_howto_table[ (int) R_FRV_LABEL24];
2380 
2381     case BFD_RELOC_FRV_LO16:
2382       return &elf32_frv_howto_table[ (int) R_FRV_LO16];
2383 
2384     case BFD_RELOC_FRV_HI16:
2385       return &elf32_frv_howto_table[ (int) R_FRV_HI16];
2386 
2387     case BFD_RELOC_FRV_GPREL12:
2388       return &elf32_frv_howto_table[ (int) R_FRV_GPREL12];
2389 
2390     case BFD_RELOC_FRV_GPRELU12:
2391       return &elf32_frv_howto_table[ (int) R_FRV_GPRELU12];
2392 
2393     case BFD_RELOC_FRV_GPREL32:
2394       return &elf32_frv_howto_table[ (int) R_FRV_GPREL32];
2395 
2396     case BFD_RELOC_FRV_GPRELHI:
2397       return &elf32_frv_howto_table[ (int) R_FRV_GPRELHI];
2398 
2399     case BFD_RELOC_FRV_GPRELLO:
2400       return &elf32_frv_howto_table[ (int) R_FRV_GPRELLO];
2401 
2402     case BFD_RELOC_FRV_GOT12:
2403       return &elf32_frv_howto_table[ (int) R_FRV_GOT12];
2404 
2405     case BFD_RELOC_FRV_GOTHI:
2406       return &elf32_frv_howto_table[ (int) R_FRV_GOTHI];
2407 
2408     case BFD_RELOC_FRV_GOTLO:
2409       return &elf32_frv_howto_table[ (int) R_FRV_GOTLO];
2410 
2411     case BFD_RELOC_FRV_FUNCDESC:
2412       if (elf_elfheader (abfd)->e_type == ET_EXEC
2413 	  || elf_elfheader (abfd)->e_type == ET_DYN)
2414 	return &elf32_frv_rel_funcdesc_howto;
2415       return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC];
2416 
2417     case BFD_RELOC_FRV_FUNCDESC_GOT12:
2418       return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOT12];
2419 
2420     case BFD_RELOC_FRV_FUNCDESC_GOTHI:
2421       return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTHI];
2422 
2423     case BFD_RELOC_FRV_FUNCDESC_GOTLO:
2424       return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTLO];
2425 
2426     case BFD_RELOC_FRV_FUNCDESC_VALUE:
2427       if (elf_elfheader (abfd)->e_type == ET_EXEC
2428 	  || elf_elfheader (abfd)->e_type == ET_DYN)
2429 	return &elf32_frv_rel_funcdesc_value_howto;
2430       return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_VALUE];
2431 
2432     case BFD_RELOC_FRV_FUNCDESC_GOTOFF12:
2433       return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTOFF12];
2434 
2435     case BFD_RELOC_FRV_FUNCDESC_GOTOFFHI:
2436       return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTOFFHI];
2437 
2438     case BFD_RELOC_FRV_FUNCDESC_GOTOFFLO:
2439       return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTOFFLO];
2440 
2441     case BFD_RELOC_FRV_GOTOFF12:
2442       return &elf32_frv_howto_table[ (int) R_FRV_GOTOFF12];
2443 
2444     case BFD_RELOC_FRV_GOTOFFHI:
2445       return &elf32_frv_howto_table[ (int) R_FRV_GOTOFFHI];
2446 
2447     case BFD_RELOC_FRV_GOTOFFLO:
2448       return &elf32_frv_howto_table[ (int) R_FRV_GOTOFFLO];
2449 
2450     case BFD_RELOC_FRV_GETTLSOFF:
2451       return &elf32_frv_howto_table[ (int) R_FRV_GETTLSOFF];
2452 
2453     case BFD_RELOC_FRV_TLSDESC_VALUE:
2454       if (elf_elfheader (abfd)->e_type == ET_EXEC
2455 	  || elf_elfheader (abfd)->e_type == ET_DYN)
2456 	return &elf32_frv_rel_tlsdesc_value_howto;
2457       return &elf32_frv_howto_table[ (int) R_FRV_TLSDESC_VALUE];
2458 
2459     case BFD_RELOC_FRV_GOTTLSDESC12:
2460       return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSDESC12];
2461 
2462     case BFD_RELOC_FRV_GOTTLSDESCHI:
2463       return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSDESCHI];
2464 
2465     case BFD_RELOC_FRV_GOTTLSDESCLO:
2466       return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSDESCLO];
2467 
2468     case BFD_RELOC_FRV_TLSMOFF12:
2469       return &elf32_frv_howto_table[ (int) R_FRV_TLSMOFF12];
2470 
2471     case BFD_RELOC_FRV_TLSMOFFHI:
2472       return &elf32_frv_howto_table[ (int) R_FRV_TLSMOFFHI];
2473 
2474     case BFD_RELOC_FRV_TLSMOFFLO:
2475       return &elf32_frv_howto_table[ (int) R_FRV_TLSMOFFLO];
2476 
2477     case BFD_RELOC_FRV_GOTTLSOFF12:
2478       return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSOFF12];
2479 
2480     case BFD_RELOC_FRV_GOTTLSOFFHI:
2481       return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSOFFHI];
2482 
2483     case BFD_RELOC_FRV_GOTTLSOFFLO:
2484       return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSOFFLO];
2485 
2486     case BFD_RELOC_FRV_TLSOFF:
2487       if (elf_elfheader (abfd)->e_type == ET_EXEC
2488 	  || elf_elfheader (abfd)->e_type == ET_DYN)
2489 	return &elf32_frv_rel_tlsoff_howto;
2490       return &elf32_frv_howto_table[ (int) R_FRV_TLSOFF];
2491 
2492     case BFD_RELOC_FRV_TLSDESC_RELAX:
2493       return &elf32_frv_howto_table[ (int) R_FRV_TLSDESC_RELAX];
2494 
2495     case BFD_RELOC_FRV_GETTLSOFF_RELAX:
2496       return &elf32_frv_howto_table[ (int) R_FRV_GETTLSOFF_RELAX];
2497 
2498     case BFD_RELOC_FRV_TLSOFF_RELAX:
2499       return &elf32_frv_howto_table[ (int) R_FRV_TLSOFF_RELAX];
2500 
2501     case BFD_RELOC_FRV_TLSMOFF:
2502       return &elf32_frv_howto_table[ (int) R_FRV_TLSMOFF];
2503 
2504     case BFD_RELOC_VTABLE_INHERIT:
2505       return &elf32_frv_vtinherit_howto;
2506 
2507     case BFD_RELOC_VTABLE_ENTRY:
2508       return &elf32_frv_vtentry_howto;
2509     }
2510 
2511   return NULL;
2512 }
2513 
2514 static reloc_howto_type *
2515 frv_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
2516 {
2517   unsigned int i;
2518 
2519   for (i = 0;
2520        i < sizeof (elf32_frv_howto_table) / sizeof (elf32_frv_howto_table[0]);
2521        i++)
2522     if (elf32_frv_howto_table[i].name != NULL
2523 	&& strcasecmp (elf32_frv_howto_table[i].name, r_name) == 0)
2524       return &elf32_frv_howto_table[i];
2525 
2526   if (strcasecmp (elf32_frv_vtinherit_howto.name, r_name) == 0)
2527     return &elf32_frv_vtinherit_howto;
2528   if (strcasecmp (elf32_frv_vtentry_howto.name, r_name) == 0)
2529     return &elf32_frv_vtentry_howto;
2530 
2531   return NULL;
2532 }
2533 
2534 /* Set the howto pointer for an FRV ELF reloc.  */
2535 
2536 static bfd_boolean
2537 frv_info_to_howto_rela (bfd *abfd ATTRIBUTE_UNUSED,
2538 			arelent *cache_ptr,
2539 			Elf_Internal_Rela *dst)
2540 {
2541   unsigned int r_type;
2542 
2543   r_type = ELF32_R_TYPE (dst->r_info);
2544   switch (r_type)
2545     {
2546     case R_FRV_GNU_VTINHERIT:
2547       cache_ptr->howto = &elf32_frv_vtinherit_howto;
2548       break;
2549 
2550     case R_FRV_GNU_VTENTRY:
2551       cache_ptr->howto = &elf32_frv_vtentry_howto;
2552       break;
2553 
2554     default:
2555       if (r_type >= ARRAY_SIZE (elf32_frv_howto_table))
2556 	{
2557 	  /* xgettext:c-format */
2558 	  _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2559 			      abfd, r_type);
2560 	  bfd_set_error (bfd_error_bad_value);
2561 	  return FALSE;
2562 	}
2563       cache_ptr->howto = & elf32_frv_howto_table [r_type];
2564       break;
2565     }
2566   return TRUE;
2567 }
2568 
2569 /* Set the howto pointer for an FRV ELF REL reloc.  */
2570 
2571 static bfd_boolean
2572 frvfdpic_info_to_howto_rel (bfd *abfd ATTRIBUTE_UNUSED,
2573 			    arelent *cache_ptr, Elf_Internal_Rela *dst)
2574 {
2575   unsigned int r_type;
2576 
2577   r_type = ELF32_R_TYPE (dst->r_info);
2578   switch (r_type)
2579     {
2580     case R_FRV_32:
2581       cache_ptr->howto = &elf32_frv_rel_32_howto;
2582       break;
2583 
2584     case R_FRV_FUNCDESC:
2585       cache_ptr->howto = &elf32_frv_rel_funcdesc_howto;
2586       break;
2587 
2588     case R_FRV_FUNCDESC_VALUE:
2589       cache_ptr->howto = &elf32_frv_rel_funcdesc_value_howto;
2590       break;
2591 
2592     case R_FRV_TLSDESC_VALUE:
2593       cache_ptr->howto = &elf32_frv_rel_tlsdesc_value_howto;
2594       break;
2595 
2596     case R_FRV_TLSOFF:
2597       cache_ptr->howto = &elf32_frv_rel_tlsoff_howto;
2598       break;
2599 
2600     default:
2601       cache_ptr->howto = NULL;
2602       return FALSE;
2603     }
2604   return TRUE;
2605 }
2606 
2607 /* Perform a single relocation.  By default we use the standard BFD
2608    routines, but a few relocs, we have to do them ourselves.  */
2609 
2610 static bfd_reloc_status_type
2611 frv_final_link_relocate (reloc_howto_type *howto,
2612 			 bfd *input_bfd,
2613 			 asection *input_section,
2614 			 bfd_byte *contents,
2615 			 Elf_Internal_Rela *rel,
2616 			 bfd_vma relocation)
2617 {
2618   return _bfd_final_link_relocate (howto, input_bfd, input_section,
2619 				   contents, rel->r_offset, relocation,
2620 				   rel->r_addend);
2621 }
2622 
2623 
2624 /* Relocate an FRV ELF section.
2625 
2626    The RELOCATE_SECTION function is called by the new ELF backend linker
2627    to handle the relocations for a section.
2628 
2629    The relocs are always passed as Rela structures; if the section
2630    actually uses Rel structures, the r_addend field will always be
2631    zero.
2632 
2633    This function is responsible for adjusting the section contents as
2634    necessary, and (if using Rela relocs and generating a relocatable
2635    output file) adjusting the reloc addend as necessary.
2636 
2637    This function does not have to worry about setting the reloc
2638    address or the reloc symbol index.
2639 
2640    LOCAL_SYMS is a pointer to the swapped in local symbols.
2641 
2642    LOCAL_SECTIONS is an array giving the section in the input file
2643    corresponding to the st_shndx field of each local symbol.
2644 
2645    The global hash table entry for the global symbols can be found
2646    via elf_sym_hashes (input_bfd).
2647 
2648    When generating relocatable output, this function must handle
2649    STB_LOCAL/STT_SECTION symbols specially.  The output symbol is
2650    going to be the section symbol corresponding to the output
2651    section, which means that the addend must be adjusted
2652    accordingly.  */
2653 
2654 static bfd_boolean
2655 elf32_frv_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED,
2656 			    struct bfd_link_info *info,
2657 			    bfd *input_bfd,
2658 			    asection *input_section,
2659 			    bfd_byte *contents,
2660 			    Elf_Internal_Rela *relocs,
2661 			    Elf_Internal_Sym *local_syms,
2662 			    asection **local_sections)
2663 {
2664   Elf_Internal_Shdr *symtab_hdr;
2665   struct elf_link_hash_entry **sym_hashes;
2666   Elf_Internal_Rela *rel;
2667   Elf_Internal_Rela *relend;
2668   unsigned isec_segment, got_segment, plt_segment, gprel_segment, tls_segment,
2669     check_segment[2];
2670   int silence_segment_error = !bfd_link_pic (info);
2671   unsigned long insn;
2672 
2673   symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
2674   sym_hashes = elf_sym_hashes (input_bfd);
2675   relend     = relocs + input_section->reloc_count;
2676 
2677   isec_segment = _frvfdpic_osec_to_segment (output_bfd,
2678 					    input_section->output_section);
2679   if (IS_FDPIC (output_bfd) && frvfdpic_got_section (info))
2680     got_segment = _frvfdpic_osec_to_segment (output_bfd,
2681 					     frvfdpic_got_section (info)
2682 					     ->output_section);
2683   else
2684     got_segment = -1;
2685   if (IS_FDPIC (output_bfd) && frvfdpic_gotfixup_section (info))
2686     gprel_segment = _frvfdpic_osec_to_segment (output_bfd,
2687 					       frvfdpic_gotfixup_section (info)
2688 					       ->output_section);
2689   else
2690     gprel_segment = -1;
2691   if (IS_FDPIC (output_bfd) && frvfdpic_plt_section (info))
2692     plt_segment = _frvfdpic_osec_to_segment (output_bfd,
2693 					     frvfdpic_plt_section (info)
2694 					     ->output_section);
2695   else
2696     plt_segment = -1;
2697   if (elf_hash_table (info)->tls_sec)
2698     tls_segment = _frvfdpic_osec_to_segment (output_bfd,
2699 					     elf_hash_table (info)->tls_sec);
2700   else
2701     tls_segment = -1;
2702 
2703   for (rel = relocs; rel < relend; rel ++)
2704     {
2705       reloc_howto_type *howto;
2706       unsigned long r_symndx;
2707       Elf_Internal_Sym *sym;
2708       asection *sec;
2709       struct elf_link_hash_entry *h;
2710       bfd_vma relocation;
2711       bfd_reloc_status_type r;
2712       const char *name;
2713       int r_type;
2714       asection *osec;
2715       struct frvfdpic_relocs_info *picrel;
2716       bfd_vma orig_addend = rel->r_addend;
2717 
2718       r_type = ELF32_R_TYPE (rel->r_info);
2719 
2720       if (   r_type == R_FRV_GNU_VTINHERIT
2721 	  || r_type == R_FRV_GNU_VTENTRY)
2722 	continue;
2723 
2724       r_symndx = ELF32_R_SYM (rel->r_info);
2725       howto  = elf32_frv_howto_table + ELF32_R_TYPE (rel->r_info);
2726       h      = NULL;
2727       sym    = NULL;
2728       sec    = NULL;
2729 
2730       if (r_symndx < symtab_hdr->sh_info)
2731 	{
2732 	  sym = local_syms + r_symndx;
2733 	  osec = sec = local_sections [r_symndx];
2734 	  relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2735 
2736 	  name = bfd_elf_string_from_elf_section
2737 	    (input_bfd, symtab_hdr->sh_link, sym->st_name);
2738 	  if (name == NULL || name[0] == 0)
2739 	    name = bfd_section_name (input_bfd, sec);
2740 	}
2741       else
2742 	{
2743 	  bfd_boolean warned, ignored;
2744 	  bfd_boolean unresolved_reloc;
2745 
2746 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2747 				   r_symndx, symtab_hdr, sym_hashes,
2748 				   h, sec, relocation,
2749 				   unresolved_reloc, warned, ignored);
2750 	  osec = sec;
2751 	  name = h->root.root.string;
2752 	}
2753 
2754       if (sec != NULL && discarded_section (sec))
2755 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2756 					 rel, 1, relend, howto, 0, contents);
2757 
2758       if (bfd_link_relocatable (info))
2759 	continue;
2760 
2761       if (r_type != R_FRV_TLSMOFF
2762 	  && h != NULL
2763 	  && (h->root.type == bfd_link_hash_defined
2764 	      || h->root.type == bfd_link_hash_defweak)
2765 	  && !FRVFDPIC_SYM_LOCAL (info, h))
2766 	{
2767 	  osec = sec = NULL;
2768 	  relocation = 0;
2769 	}
2770 
2771       switch (r_type)
2772 	{
2773 	case R_FRV_LABEL24:
2774 	case R_FRV_32:
2775 	  if (! IS_FDPIC (output_bfd))
2776 	    goto non_fdpic;
2777 	  /* Fall through.  */
2778 
2779 	case R_FRV_GOT12:
2780 	case R_FRV_GOTHI:
2781 	case R_FRV_GOTLO:
2782 	case R_FRV_FUNCDESC_GOT12:
2783 	case R_FRV_FUNCDESC_GOTHI:
2784 	case R_FRV_FUNCDESC_GOTLO:
2785 	case R_FRV_GOTOFF12:
2786 	case R_FRV_GOTOFFHI:
2787 	case R_FRV_GOTOFFLO:
2788 	case R_FRV_FUNCDESC_GOTOFF12:
2789 	case R_FRV_FUNCDESC_GOTOFFHI:
2790 	case R_FRV_FUNCDESC_GOTOFFLO:
2791 	case R_FRV_FUNCDESC:
2792 	case R_FRV_FUNCDESC_VALUE:
2793 	case R_FRV_GETTLSOFF:
2794 	case R_FRV_TLSDESC_VALUE:
2795 	case R_FRV_GOTTLSDESC12:
2796 	case R_FRV_GOTTLSDESCHI:
2797 	case R_FRV_GOTTLSDESCLO:
2798 	case R_FRV_TLSMOFF12:
2799 	case R_FRV_TLSMOFFHI:
2800 	case R_FRV_TLSMOFFLO:
2801 	case R_FRV_GOTTLSOFF12:
2802 	case R_FRV_GOTTLSOFFHI:
2803 	case R_FRV_GOTTLSOFFLO:
2804 	case R_FRV_TLSOFF:
2805 	case R_FRV_TLSDESC_RELAX:
2806 	case R_FRV_GETTLSOFF_RELAX:
2807 	case R_FRV_TLSOFF_RELAX:
2808 	case R_FRV_TLSMOFF:
2809 	  if (h != NULL)
2810 	    picrel = frvfdpic_relocs_info_for_global (frvfdpic_relocs_info
2811 						      (info), input_bfd, h,
2812 						      orig_addend, INSERT);
2813 	  else
2814 	    /* In order to find the entry we created before, we must
2815 	       use the original addend, not the one that may have been
2816 	       modified by _bfd_elf_rela_local_sym().  */
2817 	    picrel = frvfdpic_relocs_info_for_local (frvfdpic_relocs_info
2818 						     (info), input_bfd, r_symndx,
2819 						     orig_addend, INSERT);
2820 	  if (! picrel)
2821 	    return FALSE;
2822 
2823 	  if (!_frvfdpic_emit_got_relocs_plt_entries (picrel, output_bfd, info,
2824 						      osec, sym,
2825 						      rel->r_addend))
2826 	    {
2827 	      info->callbacks->einfo
2828 		/* xgettext:c-format */
2829 		(_("%H: relocation to `%s+%v'"
2830 		   " may have caused the error above\n"),
2831 		 input_bfd, input_section, rel->r_offset, name, rel->r_addend);
2832 	      return FALSE;
2833 	    }
2834 
2835 	  break;
2836 
2837 	default:
2838 	non_fdpic:
2839 	  picrel = NULL;
2840 	  if (h
2841 	      && ! FRVFDPIC_SYM_LOCAL (info, h)
2842 	      && _bfd_elf_section_offset (output_bfd, info, input_section,
2843 					  rel->r_offset) != (bfd_vma) -1)
2844 	    {
2845 	      info->callbacks->einfo
2846 		(_("%H: relocation references symbol"
2847 		   " not defined in the module\n"),
2848 		 input_bfd, input_section, rel->r_offset);
2849 	      return FALSE;
2850 	    }
2851 	  break;
2852 	}
2853 
2854       switch (r_type)
2855 	{
2856 	case R_FRV_GETTLSOFF:
2857 	case R_FRV_TLSDESC_VALUE:
2858 	case R_FRV_GOTTLSDESC12:
2859 	case R_FRV_GOTTLSDESCHI:
2860 	case R_FRV_GOTTLSDESCLO:
2861 	case R_FRV_TLSMOFF12:
2862 	case R_FRV_TLSMOFFHI:
2863 	case R_FRV_TLSMOFFLO:
2864 	case R_FRV_GOTTLSOFF12:
2865 	case R_FRV_GOTTLSOFFHI:
2866 	case R_FRV_GOTTLSOFFLO:
2867 	case R_FRV_TLSOFF:
2868 	case R_FRV_TLSDESC_RELAX:
2869 	case R_FRV_GETTLSOFF_RELAX:
2870 	case R_FRV_TLSOFF_RELAX:
2871 	case R_FRV_TLSMOFF:
2872 	  if (sec && (bfd_is_abs_section (sec) || bfd_is_und_section (sec)))
2873 	    relocation += tls_biased_base (info);
2874 	  break;
2875 
2876 	default:
2877 	  break;
2878 	}
2879 
2880       /* Try to apply TLS relaxations.  */
2881       if (1)
2882 	switch (r_type)
2883 	  {
2884 
2885 #define LOCAL_EXEC_P(info, picrel) \
2886   (bfd_link_executable (info) \
2887    && (picrel->symndx != -1 || FRVFDPIC_SYM_LOCAL ((info), (picrel)->d.h)))
2888 #define INITIAL_EXEC_P(info, picrel) \
2889   ((bfd_link_executable (info)|| (info)->flags & DF_STATIC_TLS) \
2890    && (picrel)->tlsoff_entry)
2891 
2892 #define IN_RANGE_FOR_OFST12_P(value) \
2893   ((bfd_vma)((value) + 2048) < (bfd_vma)4096)
2894 #define IN_RANGE_FOR_SETLOS_P(value) \
2895   ((bfd_vma)((value) + 32768) < (bfd_vma)65536)
2896 #define TLSMOFF_IN_RANGE_FOR_SETLOS_P(value, info) \
2897   (IN_RANGE_FOR_SETLOS_P ((value) - tls_biased_base (info)))
2898 
2899 #define RELAX_GETTLSOFF_LOCAL_EXEC_P(info, picrel, value) \
2900   (LOCAL_EXEC_P ((info), (picrel)) \
2901    && TLSMOFF_IN_RANGE_FOR_SETLOS_P((value), (info)))
2902 #define RELAX_GETTLSOFF_INITIAL_EXEC_P(info, picrel) \
2903   (INITIAL_EXEC_P ((info), (picrel)) \
2904    && IN_RANGE_FOR_OFST12_P ((picrel)->tlsoff_entry))
2905 
2906 #define RELAX_TLSDESC_LOCAL_EXEC_P(info, picrel, value) \
2907   (LOCAL_EXEC_P ((info), (picrel)))
2908 #define RELAX_TLSDESC_INITIAL_EXEC_P(info, picrel) \
2909   (INITIAL_EXEC_P ((info), (picrel)))
2910 
2911 #define RELAX_GOTTLSOFF_LOCAL_EXEC_P(info, picrel, value) \
2912   (LOCAL_EXEC_P ((info), (picrel)) \
2913    && TLSMOFF_IN_RANGE_FOR_SETLOS_P((value), (info)))
2914 
2915 	  case R_FRV_GETTLSOFF:
2916 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2917 
2918 	    /* Is this a call instruction?  */
2919 	    if ((insn & (unsigned long)0x01fc0000) != 0x003c0000)
2920 	      {
2921 		info->callbacks->einfo
2922 		  (_("%H: R_FRV_GETTLSOFF not applied to a call instruction\n"),
2923 		   input_bfd, input_section, rel->r_offset);
2924 		return FALSE;
2925 	      }
2926 
2927 	    if (RELAX_GETTLSOFF_LOCAL_EXEC_P (info, picrel,
2928 					      relocation + rel->r_addend))
2929 	      {
2930 		/* Replace the call instruction (except the packing bit)
2931 		   with setlos #tlsmofflo(symbol+offset), gr9.  */
2932 		insn &= (unsigned long)0x80000000;
2933 		insn |= (unsigned long)0x12fc0000;
2934 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
2935 
2936 		r_type = R_FRV_TLSMOFFLO;
2937 		howto  = elf32_frv_howto_table + r_type;
2938 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
2939 	      }
2940 
2941 	    else if (RELAX_GETTLSOFF_INITIAL_EXEC_P (info, picrel))
2942 	      {
2943 		/* Replace the call instruction (except the packing bit)
2944 		   with ldi @(gr15, #gottlsoff12(symbol+addend)), gr9.  */
2945 		insn &= (unsigned long)0x80000000;
2946 		insn |= (unsigned long)0x12c8f000;
2947 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
2948 
2949 		r_type = R_FRV_GOTTLSOFF12;
2950 		howto  = elf32_frv_howto_table + r_type;
2951 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
2952 	      }
2953 
2954 	    break;
2955 
2956 	  case R_FRV_GOTTLSDESC12:
2957 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2958 
2959 	    /* Is this an lddi instruction?  */
2960 	    if ((insn & (unsigned long)0x01fc0000) != 0x00cc0000)
2961 	      {
2962 		info->callbacks->einfo
2963 		  (_("%H: R_FRV_GOTTLSDESC12"
2964 		     " not applied to an lddi instruction\n"),
2965 		   input_bfd, input_section, rel->r_offset);
2966 		return FALSE;
2967 	      }
2968 
2969 	    if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
2970 					    relocation + rel->r_addend)
2971 		&& TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
2972 						  info))
2973 	      {
2974 		/* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
2975 		   with setlos #tlsmofflo(symbol+offset), gr<C+1>.
2976 		   Preserve the packing bit.  */
2977 		insn = (insn & (unsigned long)0x80000000)
2978 		  | ((insn + (unsigned long)0x02000000)
2979 		     & (unsigned long)0x7e000000);
2980 		insn |= (unsigned long)0x00fc0000;
2981 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
2982 
2983 		r_type = R_FRV_TLSMOFFLO;
2984 		howto  = elf32_frv_howto_table + r_type;
2985 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
2986 	      }
2987 
2988 	    else if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
2989 						 relocation + rel->r_addend))
2990 	      {
2991 		/* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
2992 		   with sethi #tlsmoffhi(symbol+offset), gr<C+1>.
2993 		   Preserve the packing bit.  */
2994 		insn = (insn & (unsigned long)0x80000000)
2995 		  | ((insn + (unsigned long)0x02000000)
2996 		     & (unsigned long)0x7e000000);
2997 		insn |= (unsigned long)0x00f80000;
2998 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
2999 
3000 		r_type = R_FRV_TLSMOFFHI;
3001 		howto  = elf32_frv_howto_table + r_type;
3002 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3003 	      }
3004 
3005 	    else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3006 	      {
3007 		/* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
3008 		   with ldi @(grB, #gottlsoff12(symbol+offset),
3009 		   gr<C+1>.  Preserve the packing bit.  If gottlsoff12
3010 		   overflows, we'll error out, but that's sort-of ok,
3011 		   since we'd started with gottlsdesc12, that's actually
3012 		   more demanding.  Compiling with -fPIE instead of
3013 		   -fpie would fix it; linking with --relax should fix
3014 		   it as well.  */
3015 		insn = (insn & (unsigned long)0x80cbf000)
3016 		  | ((insn + (unsigned long)0x02000000)
3017 		     & (unsigned long)0x7e000000);
3018 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3019 
3020 		r_type = R_FRV_GOTTLSOFF12;
3021 		howto  = elf32_frv_howto_table + r_type;
3022 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3023 	      }
3024 
3025 	    break;
3026 
3027 	  case R_FRV_GOTTLSDESCHI:
3028 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3029 
3030 	    /* Is this a sethi instruction?  */
3031 	    if ((insn & (unsigned long)0x01ff0000) != 0x00f80000)
3032 	      {
3033 		info->callbacks->einfo
3034 		  (_("%H: R_FRV_GOTTLSDESCHI"
3035 		     " not applied to a sethi instruction\n"),
3036 		   input_bfd, input_section, rel->r_offset);
3037 		return FALSE;
3038 	      }
3039 
3040 	    if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3041 					    relocation + rel->r_addend)
3042 		|| (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3043 		    && IN_RANGE_FOR_SETLOS_P (picrel->tlsoff_entry)))
3044 	      {
3045 		/* Replace sethi with a nop.  Preserve the packing bit.  */
3046 		insn &= (unsigned long)0x80000000;
3047 		insn |= (unsigned long)0x00880000;
3048 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3049 
3050 		/* Nothing to relocate.  */
3051 		continue;
3052 	      }
3053 
3054 	    else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3055 	      {
3056 		/* Simply decay GOTTLSDESC to GOTTLSOFF.  */
3057 		r_type = R_FRV_GOTTLSOFFHI;
3058 		howto  = elf32_frv_howto_table + r_type;
3059 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3060 	      }
3061 
3062 	    break;
3063 
3064 	  case R_FRV_GOTTLSDESCLO:
3065 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3066 
3067 	    /* Is this a setlo or setlos instruction?  */
3068 	    if ((insn & (unsigned long)0x01f70000) != 0x00f40000)
3069 	      {
3070 		info->callbacks->einfo
3071 		  (_("%H: R_FRV_GOTTLSDESCLO"
3072 		     " not applied to a setlo or setlos instruction\n"),
3073 		   input_bfd, input_section, rel->r_offset);
3074 		return FALSE;
3075 	      }
3076 
3077 	    if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3078 					    relocation + rel->r_addend)
3079 		|| (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3080 		    && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry)))
3081 	      {
3082 		/* Replace setlo/setlos with a nop.  Preserve the
3083 		   packing bit.  */
3084 		insn &= (unsigned long)0x80000000;
3085 		insn |= (unsigned long)0x00880000;
3086 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3087 
3088 		/* Nothing to relocate.  */
3089 		continue;
3090 	      }
3091 
3092 	    else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3093 	      {
3094 		/* If the corresponding sethi (if it exists) decayed
3095 		   to a nop, make sure this becomes (or already is) a
3096 		   setlos, not setlo.  */
3097 		if (IN_RANGE_FOR_SETLOS_P (picrel->tlsoff_entry))
3098 		  {
3099 		    insn |= (unsigned long)0x00080000;
3100 		    bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3101 		  }
3102 
3103 		/* Simply decay GOTTLSDESC to GOTTLSOFF.  */
3104 		r_type = R_FRV_GOTTLSOFFLO;
3105 		howto  = elf32_frv_howto_table + r_type;
3106 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3107 	      }
3108 
3109 	    break;
3110 
3111 	  case R_FRV_TLSDESC_RELAX:
3112 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3113 
3114 	    /* Is this an ldd instruction?  */
3115 	    if ((insn & (unsigned long)0x01fc0fc0) != 0x00080140)
3116 	      {
3117 		info->callbacks->einfo
3118 		  (_("%H: R_FRV_TLSDESC_RELAX"
3119 		     " not applied to an ldd instruction\n"),
3120 		   input_bfd, input_section, rel->r_offset);
3121 		return FALSE;
3122 	      }
3123 
3124 	    if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3125 					    relocation + rel->r_addend)
3126 		&& TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3127 						  info))
3128 	      {
3129 		/* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3130 		   with setlos #tlsmofflo(symbol+offset), gr<C+1>.
3131 		   Preserve the packing bit.  */
3132 		insn = (insn & (unsigned long)0x80000000)
3133 		  | ((insn + (unsigned long)0x02000000)
3134 		     & (unsigned long)0x7e000000);
3135 		insn |= (unsigned long)0x00fc0000;
3136 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3137 
3138 		r_type = R_FRV_TLSMOFFLO;
3139 		howto  = elf32_frv_howto_table + r_type;
3140 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3141 	      }
3142 
3143 	    else if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3144 						 relocation + rel->r_addend))
3145 	      {
3146 		/* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3147 		   with sethi #tlsmoffhi(symbol+offset), gr<C+1>.
3148 		   Preserve the packing bit.  */
3149 		insn = (insn & (unsigned long)0x80000000)
3150 		  | ((insn + (unsigned long)0x02000000)
3151 		     & (unsigned long)0x7e000000);
3152 		insn |= (unsigned long)0x00f80000;
3153 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3154 
3155 		r_type = R_FRV_TLSMOFFHI;
3156 		howto  = elf32_frv_howto_table + r_type;
3157 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3158 	      }
3159 
3160 	    else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3161 		     && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry))
3162 	      {
3163 		/* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3164 		   with ldi @(grB, #gottlsoff12(symbol+offset), gr<C+1>.
3165 		   Preserve the packing bit.  */
3166 		insn = (insn & (unsigned long)0x8003f000)
3167 		  | (unsigned long)0x00c80000
3168 		  | ((insn + (unsigned long)0x02000000)
3169 		     & (unsigned long)0x7e000000);
3170 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3171 
3172 		r_type = R_FRV_GOTTLSOFF12;
3173 		howto  = elf32_frv_howto_table + r_type;
3174 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3175 	      }
3176 
3177 	    else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3178 	      {
3179 		/* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3180 		   with ld #tlsoff(symbol+offset)@(grB, grA), gr<C+1>.
3181 		   Preserve the packing bit.  */
3182 		insn = (insn & (unsigned long)0x81ffffbf)
3183 		  | ((insn + (unsigned long)0x02000000)
3184 		     & (unsigned long)0x7e000000);
3185 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3186 
3187 		/* #tlsoff(symbol+offset) is just a relaxation
3188 		    annotation, so there's nothing left to
3189 		    relocate.  */
3190 		continue;
3191 	      }
3192 
3193 	    break;
3194 
3195 	  case R_FRV_GETTLSOFF_RELAX:
3196 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3197 
3198 	    /* Is this a calll or callil instruction?  */
3199 	    if ((insn & (unsigned long)0x7ff80fc0) != 0x02300000)
3200 	      {
3201 		info->callbacks->einfo
3202 		  (_("%H: R_FRV_GETTLSOFF_RELAX"
3203 		     " not applied to a calll instruction\n"),
3204 		   input_bfd, input_section, rel->r_offset);
3205 		return FALSE;
3206 	      }
3207 
3208 	    if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3209 					    relocation + rel->r_addend)
3210 		&& TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3211 						  info))
3212 	      {
3213 		/* Replace calll with a nop.  Preserve the packing bit.  */
3214 		insn &= (unsigned long)0x80000000;
3215 		insn |= (unsigned long)0x00880000;
3216 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3217 
3218 		/* Nothing to relocate.  */
3219 		continue;
3220 	      }
3221 
3222 	    else if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3223 						 relocation + rel->r_addend))
3224 	      {
3225 		/* Replace calll with setlo #tlsmofflo(symbol+offset), gr9.
3226 		   Preserve the packing bit.  */
3227 		insn &= (unsigned long)0x80000000;
3228 		insn |= (unsigned long)0x12f40000;
3229 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3230 
3231 		r_type = R_FRV_TLSMOFFLO;
3232 		howto  = elf32_frv_howto_table + r_type;
3233 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3234 	      }
3235 
3236 	    else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3237 	      {
3238 		/* Replace calll with a nop.  Preserve the packing bit.  */
3239 		insn &= (unsigned long)0x80000000;
3240 		insn |= (unsigned long)0x00880000;
3241 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3242 
3243 		/* Nothing to relocate.  */
3244 		continue;
3245 	      }
3246 
3247 	    break;
3248 
3249 	  case R_FRV_GOTTLSOFF12:
3250 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3251 
3252 	    /* Is this an ldi instruction?  */
3253 	    if ((insn & (unsigned long)0x01fc0000) != 0x00c80000)
3254 	      {
3255 		info->callbacks->einfo
3256 		  (_("%H: R_FRV_GOTTLSOFF12"
3257 		     " not applied to an ldi instruction\n"),
3258 		   input_bfd, input_section, rel->r_offset);
3259 		return FALSE;
3260 	      }
3261 
3262 	    if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info, picrel,
3263 					      relocation + rel->r_addend))
3264 	      {
3265 		/* Replace ldi @(grB, #gottlsoff12(symbol+offset), grC
3266 		   with setlos #tlsmofflo(symbol+offset), grC.
3267 		   Preserve the packing bit.  */
3268 		insn &= (unsigned long)0xfe000000;
3269 		insn |= (unsigned long)0x00fc0000;
3270 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3271 
3272 		r_type = R_FRV_TLSMOFFLO;
3273 		howto  = elf32_frv_howto_table + r_type;
3274 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3275 	      }
3276 
3277 	    break;
3278 
3279 	  case R_FRV_GOTTLSOFFHI:
3280 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3281 
3282 	    /* Is this a sethi instruction?  */
3283 	    if ((insn & (unsigned long)0x01ff0000) != 0x00f80000)
3284 	      {
3285 		info->callbacks->einfo
3286 		  (_("%H: R_FRV_GOTTLSOFFHI"
3287 		     " not applied to a sethi instruction\n"),
3288 		   input_bfd, input_section, rel->r_offset);
3289 		return FALSE;
3290 	      }
3291 
3292 	    if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info, picrel,
3293 					      relocation + rel->r_addend)
3294 		|| (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3295 		    && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry)))
3296 	      {
3297 		/* Replace sethi with a nop.  Preserve the packing bit.  */
3298 		insn &= (unsigned long)0x80000000;
3299 		insn |= (unsigned long)0x00880000;
3300 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3301 
3302 		/* Nothing to relocate.  */
3303 		continue;
3304 	      }
3305 
3306 	    break;
3307 
3308 	  case R_FRV_GOTTLSOFFLO:
3309 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3310 
3311 	    /* Is this a setlo or setlos instruction?  */
3312 	    if ((insn & (unsigned long)0x01f70000) != 0x00f40000)
3313 	      {
3314 		info->callbacks->einfo
3315 		  (_("%H: R_FRV_GOTTLSOFFLO"
3316 		     " not applied to a setlo or setlos instruction\n"),
3317 		   input_bfd, input_section, rel->r_offset);
3318 		return FALSE;
3319 	      }
3320 
3321 	    if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info, picrel,
3322 					      relocation + rel->r_addend)
3323 		|| (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3324 		    && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry)))
3325 	      {
3326 		/* Replace setlo/setlos with a nop.  Preserve the
3327 		   packing bit.  */
3328 		insn &= (unsigned long)0x80000000;
3329 		insn |= (unsigned long)0x00880000;
3330 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3331 
3332 		/* Nothing to relocate.  */
3333 		continue;
3334 	      }
3335 
3336 	    break;
3337 
3338 	  case R_FRV_TLSOFF_RELAX:
3339 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3340 
3341 	    /* Is this an ld instruction?  */
3342 	    if ((insn & (unsigned long)0x01fc0fc0) != 0x00080100)
3343 	      {
3344 		info->callbacks->einfo
3345 		  (_("%H: R_FRV_TLSOFF_RELAX"
3346 		     " not applied to an ld instruction\n"),
3347 		   input_bfd, input_section, rel->r_offset);
3348 		return FALSE;
3349 	      }
3350 
3351 	    if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info, picrel,
3352 					      relocation + rel->r_addend))
3353 	      {
3354 		/* Replace ld #gottlsoff(symbol+offset)@(grB, grA), grC
3355 		   with setlos #tlsmofflo(symbol+offset), grC.
3356 		   Preserve the packing bit.  */
3357 		insn &= (unsigned long)0xfe000000;
3358 		insn |= (unsigned long)0x00fc0000;
3359 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3360 
3361 		r_type = R_FRV_TLSMOFFLO;
3362 		howto  = elf32_frv_howto_table + r_type;
3363 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3364 	      }
3365 
3366 	    else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3367 		     && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry))
3368 	      {
3369 		/* Replace ld #tlsoff(symbol+offset)@(grB, grA), grC
3370 		   with ldi @(grB, #gottlsoff12(symbol+offset), grC.
3371 		   Preserve the packing bit.  */
3372 		insn = (insn & (unsigned long)0xfe03f000)
3373 		  | (unsigned long)0x00c80000;
3374 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3375 
3376 		r_type = R_FRV_GOTTLSOFF12;
3377 		howto  = elf32_frv_howto_table + r_type;
3378 		rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3379 	      }
3380 
3381 	    break;
3382 
3383 	  case R_FRV_TLSMOFFHI:
3384 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3385 
3386 	    /* Is this a sethi instruction?  */
3387 	    if ((insn & (unsigned long)0x01ff0000) != 0x00f80000)
3388 	      {
3389 		info->callbacks->einfo
3390 		  (_("%H: R_FRV_TLSMOFFHI"
3391 		     " not applied to a sethi instruction\n"),
3392 		   input_bfd, input_section, rel->r_offset);
3393 		return FALSE;
3394 	      }
3395 
3396 	    if (TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3397 					       info))
3398 	      {
3399 		/* Replace sethi with a nop.  Preserve the packing bit.  */
3400 		insn &= (unsigned long)0x80000000;
3401 		insn |= (unsigned long)0x00880000;
3402 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3403 
3404 		/* Nothing to relocate.  */
3405 		continue;
3406 	      }
3407 
3408 	    break;
3409 
3410 	  case R_FRV_TLSMOFFLO:
3411 	    insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3412 
3413 	    /* Is this a setlo or setlos instruction?  */
3414 	    if ((insn & (unsigned long)0x01f70000) != 0x00f40000)
3415 	      {
3416 		info->callbacks->einfo
3417 		  (_("R_FRV_TLSMOFFLO"
3418 		     " not applied to a setlo or setlos instruction\n"),
3419 		   input_bfd, input_section, rel->r_offset);
3420 		return FALSE;
3421 	      }
3422 
3423 	    if (TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3424 					       info))
3425 	      /* If the corresponding sethi (if it exists) decayed
3426 		 to a nop, make sure this becomes (or already is) a
3427 		 setlos, not setlo.  */
3428 	      {
3429 		insn |= (unsigned long)0x00080000;
3430 		bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3431 	      }
3432 
3433 	    break;
3434 
3435 	    /*
3436 	      There's nothing to relax in these:
3437 		R_FRV_TLSDESC_VALUE
3438 		R_FRV_TLSOFF
3439 		R_FRV_TLSMOFF12
3440 		R_FRV_TLSMOFFHI
3441 		R_FRV_TLSMOFFLO
3442 		R_FRV_TLSMOFF
3443 	    */
3444 
3445 	  default:
3446 	    break;
3447 	  }
3448 
3449       switch (r_type)
3450 	{
3451 	case R_FRV_LABEL24:
3452 	  check_segment[0] = isec_segment;
3453 	  if (! IS_FDPIC (output_bfd))
3454 	    check_segment[1] = isec_segment;
3455 	  else if (picrel->plt)
3456 	    {
3457 	      relocation = frvfdpic_plt_section (info)->output_section->vma
3458 		+ frvfdpic_plt_section (info)->output_offset
3459 		+ picrel->plt_entry;
3460 	      check_segment[1] = plt_segment;
3461 	    }
3462 	  /* We don't want to warn on calls to undefined weak symbols,
3463 	     as calls to them must be protected by non-NULL tests
3464 	     anyway, and unprotected calls would invoke undefined
3465 	     behavior.  */
3466 	  else if (picrel->symndx == -1
3467 		   && picrel->d.h->root.type == bfd_link_hash_undefweak)
3468 	    check_segment[1] = check_segment[0];
3469 	  else
3470 	    check_segment[1] = sec
3471 	      ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3472 	      : (unsigned)-1;
3473 	  break;
3474 
3475 	case R_FRV_GOT12:
3476 	case R_FRV_GOTHI:
3477 	case R_FRV_GOTLO:
3478 	  relocation = picrel->got_entry;
3479 	  check_segment[0] = check_segment[1] = got_segment;
3480 	  break;
3481 
3482 	case R_FRV_FUNCDESC_GOT12:
3483 	case R_FRV_FUNCDESC_GOTHI:
3484 	case R_FRV_FUNCDESC_GOTLO:
3485 	  relocation = picrel->fdgot_entry;
3486 	  check_segment[0] = check_segment[1] = got_segment;
3487 	  break;
3488 
3489 	case R_FRV_GOTOFFHI:
3490 	case R_FRV_GOTOFF12:
3491 	case R_FRV_GOTOFFLO:
3492 	  relocation -= frvfdpic_got_section (info)->output_section->vma
3493 	    + frvfdpic_got_section (info)->output_offset
3494 	    + frvfdpic_got_initial_offset (info);
3495 	  check_segment[0] = got_segment;
3496 	  check_segment[1] = sec
3497 	    ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3498 	    : (unsigned)-1;
3499 	  break;
3500 
3501 	case R_FRV_FUNCDESC_GOTOFF12:
3502 	case R_FRV_FUNCDESC_GOTOFFHI:
3503 	case R_FRV_FUNCDESC_GOTOFFLO:
3504 	  relocation = picrel->fd_entry;
3505 	  check_segment[0] = check_segment[1] = got_segment;
3506 	  break;
3507 
3508 	case R_FRV_FUNCDESC:
3509 	  {
3510 	    int dynindx;
3511 	    bfd_vma addend = rel->r_addend;
3512 
3513 	    if (! (h && h->root.type == bfd_link_hash_undefweak
3514 		   && FRVFDPIC_SYM_LOCAL (info, h)))
3515 	      {
3516 		/* If the symbol is dynamic and there may be dynamic
3517 		   symbol resolution because we are or are linked with a
3518 		   shared library, emit a FUNCDESC relocation such that
3519 		   the dynamic linker will allocate the function
3520 		   descriptor.  If the symbol needs a non-local function
3521 		   descriptor but binds locally (e.g., its visibility is
3522 		   protected, emit a dynamic relocation decayed to
3523 		   section+offset.  */
3524 		if (h && ! FRVFDPIC_FUNCDESC_LOCAL (info, h)
3525 		    && FRVFDPIC_SYM_LOCAL (info, h)
3526 		    && !bfd_link_pde (info))
3527 		  {
3528 		    dynindx = elf_section_data (h->root.u.def.section
3529 						->output_section)->dynindx;
3530 		    addend += h->root.u.def.section->output_offset
3531 		      + h->root.u.def.value;
3532 		  }
3533 		else if (h && ! FRVFDPIC_FUNCDESC_LOCAL (info, h))
3534 		  {
3535 		    if (addend)
3536 		      {
3537 			info->callbacks->einfo
3538 			  (_("%H: %s references dynamic symbol"
3539 			     " with nonzero addend\n"),
3540 			   input_bfd, input_section, rel->r_offset,
3541 			   "R_FRV_FUNCDESC");
3542 			return FALSE;
3543 		      }
3544 		    dynindx = h->dynindx;
3545 		  }
3546 		else
3547 		  {
3548 		    /* Otherwise, we know we have a private function
3549 		       descriptor, so reference it directly.  */
3550 		    BFD_ASSERT (picrel->privfd);
3551 		    r_type = R_FRV_32;
3552 		    dynindx = elf_section_data (frvfdpic_got_section (info)
3553 						->output_section)->dynindx;
3554 		    addend = frvfdpic_got_section (info)->output_offset
3555 		      + frvfdpic_got_initial_offset (info)
3556 		      + picrel->fd_entry;
3557 		  }
3558 
3559 		/* If there is room for dynamic symbol resolution, emit
3560 		   the dynamic relocation.  However, if we're linking an
3561 		   executable at a fixed location, we won't have emitted a
3562 		   dynamic symbol entry for the got section, so idx will
3563 		   be zero, which means we can and should compute the
3564 		   address of the private descriptor ourselves.  */
3565 		if (bfd_link_pde (info)
3566 		    && (!h || FRVFDPIC_FUNCDESC_LOCAL (info, h)))
3567 		  {
3568 		    addend += frvfdpic_got_section (info)->output_section->vma;
3569 		    if ((bfd_get_section_flags (output_bfd,
3570 						input_section->output_section)
3571 			 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3572 		      {
3573 			bfd_vma offset;
3574 
3575 			if (_frvfdpic_osec_readonly_p (output_bfd,
3576 						       input_section
3577 						       ->output_section))
3578 			  {
3579 			    info->callbacks->einfo
3580 			      (_("%H: cannot emit fixups"
3581 				 " in read-only section\n"),
3582 			       input_bfd, input_section, rel->r_offset);
3583 			    return FALSE;
3584 			  }
3585 
3586 			offset = _bfd_elf_section_offset
3587 			  (output_bfd, info,
3588 			   input_section, rel->r_offset);
3589 
3590 			if (offset != (bfd_vma)-1)
3591 			  _frvfdpic_add_rofixup (output_bfd,
3592 						 frvfdpic_gotfixup_section
3593 						 (info),
3594 						 offset + input_section
3595 						 ->output_section->vma
3596 						 + input_section->output_offset,
3597 						 picrel);
3598 		      }
3599 		  }
3600 		else if ((bfd_get_section_flags (output_bfd,
3601 						 input_section->output_section)
3602 			  & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3603 		  {
3604 		    bfd_vma offset;
3605 
3606 		    if (_frvfdpic_osec_readonly_p (output_bfd,
3607 						   input_section
3608 						   ->output_section))
3609 		      {
3610 			info->callbacks->einfo
3611 			  (_("%H: cannot emit dynamic relocations"
3612 			     " in read-only section\n"),
3613 			   input_bfd, input_section, rel->r_offset);
3614 			return FALSE;
3615 		      }
3616 
3617 		    offset = _bfd_elf_section_offset
3618 		      (output_bfd, info,
3619 		       input_section, rel->r_offset);
3620 
3621 		    if (offset != (bfd_vma)-1)
3622 		      _frvfdpic_add_dyn_reloc (output_bfd,
3623 					       frvfdpic_gotrel_section (info),
3624 					       offset + input_section
3625 					       ->output_section->vma
3626 					       + input_section->output_offset,
3627 					       r_type, dynindx, addend, picrel);
3628 		  }
3629 		else
3630 		  addend += frvfdpic_got_section (info)->output_section->vma;
3631 	      }
3632 
3633 	    /* We want the addend in-place because dynamic
3634 	       relocations are REL.  Setting relocation to it should
3635 	       arrange for it to be installed.  */
3636 	    relocation = addend - rel->r_addend;
3637 	  }
3638 	  check_segment[0] = check_segment[1] = got_segment;
3639 	  break;
3640 
3641 	case R_FRV_32:
3642 	  if (! IS_FDPIC (output_bfd))
3643 	    {
3644 	      check_segment[0] = check_segment[1] = -1;
3645 	      break;
3646 	    }
3647 	  /* Fall through.  */
3648 	case R_FRV_FUNCDESC_VALUE:
3649 	  {
3650 	    int dynindx;
3651 	    bfd_vma addend = rel->r_addend;
3652 
3653 	    /* If the symbol is dynamic but binds locally, use
3654 	       section+offset.  */
3655 	    if (h && ! FRVFDPIC_SYM_LOCAL (info, h))
3656 	      {
3657 		if (addend && r_type == R_FRV_FUNCDESC_VALUE)
3658 		  {
3659 		    info->callbacks->einfo
3660 		      (_("%H: %s references dynamic symbol"
3661 			 " with nonzero addend\n"),
3662 		       input_bfd, input_section, rel->r_offset,
3663 		       "R_FRV_FUNCDESC_VALUE");
3664 		    return FALSE;
3665 		  }
3666 		dynindx = h->dynindx;
3667 	      }
3668 	    else
3669 	      {
3670 		if (h)
3671 		  addend += h->root.u.def.value;
3672 		else
3673 		  addend += sym->st_value;
3674 		if (osec)
3675 		  addend += osec->output_offset;
3676 		if (osec && osec->output_section
3677 		    && ! bfd_is_abs_section (osec->output_section)
3678 		    && ! bfd_is_und_section (osec->output_section))
3679 		  dynindx = elf_section_data (osec->output_section)->dynindx;
3680 		else
3681 		  dynindx = 0;
3682 	      }
3683 
3684 	    /* If we're linking an executable at a fixed address, we
3685 	       can omit the dynamic relocation as long as the symbol
3686 	       is defined in the current link unit (which is implied
3687 	       by its output section not being NULL).  */
3688 	    if (bfd_link_pde (info)
3689 		&& (!h || FRVFDPIC_SYM_LOCAL (info, h)))
3690 	      {
3691 		if (osec)
3692 		  addend += osec->output_section->vma;
3693 		if (IS_FDPIC (input_bfd)
3694 		    && (bfd_get_section_flags (output_bfd,
3695 					       input_section->output_section)
3696 			& (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3697 		  {
3698 		    if (_frvfdpic_osec_readonly_p (output_bfd,
3699 						   input_section
3700 						   ->output_section))
3701 		      {
3702 			info->callbacks->einfo
3703 			  (_("%H: cannot emit fixups in read-only section\n"),
3704 			   input_bfd, input_section, rel->r_offset);
3705 			return FALSE;
3706 		      }
3707 		    if (!h || h->root.type != bfd_link_hash_undefweak)
3708 		      {
3709 			bfd_vma offset = _bfd_elf_section_offset
3710 			  (output_bfd, info,
3711 			   input_section, rel->r_offset);
3712 
3713 			if (offset != (bfd_vma)-1)
3714 			  {
3715 			    _frvfdpic_add_rofixup (output_bfd,
3716 						   frvfdpic_gotfixup_section
3717 						   (info),
3718 						   offset + input_section
3719 						   ->output_section->vma
3720 						   + input_section->output_offset,
3721 						   picrel);
3722 			    if (r_type == R_FRV_FUNCDESC_VALUE)
3723 			      _frvfdpic_add_rofixup
3724 				(output_bfd,
3725 				 frvfdpic_gotfixup_section (info),
3726 				 offset
3727 				 + input_section->output_section->vma
3728 				 + input_section->output_offset + 4, picrel);
3729 			  }
3730 		      }
3731 		  }
3732 	      }
3733 	    else
3734 	      {
3735 		if ((bfd_get_section_flags (output_bfd,
3736 					    input_section->output_section)
3737 		     & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3738 		  {
3739 		    bfd_vma offset;
3740 
3741 		    if (_frvfdpic_osec_readonly_p (output_bfd,
3742 						   input_section
3743 						   ->output_section))
3744 		      {
3745 			info->callbacks->einfo
3746 			  (_("%H: cannot emit dynamic relocations"
3747 			     " in read-only section\n"),
3748 			   input_bfd, input_section, rel->r_offset);
3749 			return FALSE;
3750 		      }
3751 
3752 		    offset = _bfd_elf_section_offset
3753 		      (output_bfd, info,
3754 		       input_section, rel->r_offset);
3755 
3756 		    if (offset != (bfd_vma)-1)
3757 		      _frvfdpic_add_dyn_reloc (output_bfd,
3758 					       frvfdpic_gotrel_section (info),
3759 					       offset + input_section
3760 					       ->output_section->vma
3761 					       + input_section->output_offset,
3762 					       r_type, dynindx, addend, picrel);
3763 		  }
3764 		else if (osec)
3765 		  addend += osec->output_section->vma;
3766 		/* We want the addend in-place because dynamic
3767 		   relocations are REL.  Setting relocation to it
3768 		   should arrange for it to be installed.  */
3769 		relocation = addend - rel->r_addend;
3770 	      }
3771 
3772 	    if (r_type == R_FRV_FUNCDESC_VALUE)
3773 	      {
3774 		/* If we've omitted the dynamic relocation, just emit
3775 		   the fixed addresses of the symbol and of the local
3776 		   GOT base offset.  */
3777 		if (bfd_link_pde (info)
3778 		    && (!h || FRVFDPIC_SYM_LOCAL (info, h)))
3779 		  bfd_put_32 (output_bfd,
3780 			      frvfdpic_got_section (info)->output_section->vma
3781 			      + frvfdpic_got_section (info)->output_offset
3782 			      + frvfdpic_got_initial_offset (info),
3783 			      contents + rel->r_offset + 4);
3784 		else
3785 		  /* A function descriptor used for lazy or local
3786 		     resolving is initialized such that its high word
3787 		     contains the output section index in which the
3788 		     PLT entries are located, and the low word
3789 		     contains the offset of the lazy PLT entry entry
3790 		     point into that section.  */
3791 		  bfd_put_32 (output_bfd,
3792 			      h && ! FRVFDPIC_SYM_LOCAL (info, h)
3793 			      ? 0
3794 			      : _frvfdpic_osec_to_segment (output_bfd,
3795 							   sec
3796 							   ->output_section),
3797 			      contents + rel->r_offset + 4);
3798 	      }
3799 	  }
3800 	  check_segment[0] = check_segment[1] = got_segment;
3801 	  break;
3802 
3803 	case R_FRV_GPREL12:
3804 	case R_FRV_GPRELU12:
3805 	case R_FRV_GPREL32:
3806 	case R_FRV_GPRELHI:
3807 	case R_FRV_GPRELLO:
3808 	  check_segment[0] = gprel_segment;
3809 	  check_segment[1] = sec
3810 	    ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3811 	    : (unsigned)-1;
3812 	  break;
3813 
3814 	case R_FRV_GETTLSOFF:
3815 	  relocation = frvfdpic_plt_section (info)->output_section->vma
3816 	    + frvfdpic_plt_section (info)->output_offset
3817 	    + picrel->tlsplt_entry;
3818 	  BFD_ASSERT (picrel->tlsplt_entry != (bfd_vma)-1
3819 		      && picrel->tlsdesc_entry);
3820 	  check_segment[0] = isec_segment;
3821 	  check_segment[1] = plt_segment;
3822 	  break;
3823 
3824 	case R_FRV_GOTTLSDESC12:
3825 	case R_FRV_GOTTLSDESCHI:
3826 	case R_FRV_GOTTLSDESCLO:
3827 	  BFD_ASSERT (picrel->tlsdesc_entry);
3828 	  relocation = picrel->tlsdesc_entry;
3829 	  check_segment[0] = tls_segment;
3830 	  check_segment[1] = sec
3831 	    && ! bfd_is_abs_section (sec)
3832 	    && ! bfd_is_und_section (sec)
3833 	    ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3834 	    : tls_segment;
3835 	  break;
3836 
3837 	case R_FRV_TLSMOFF12:
3838 	case R_FRV_TLSMOFFHI:
3839 	case R_FRV_TLSMOFFLO:
3840 	case R_FRV_TLSMOFF:
3841 	  check_segment[0] = tls_segment;
3842 	  if (! sec)
3843 	    check_segment[1] = -1;
3844 	  else if (bfd_is_abs_section (sec)
3845 		   || bfd_is_und_section (sec))
3846 	    {
3847 	      relocation = 0;
3848 	      check_segment[1] = tls_segment;
3849 	    }
3850 	  else if (sec->output_section)
3851 	    {
3852 	      relocation -= tls_biased_base (info);
3853 	      check_segment[1] =
3854 		_frvfdpic_osec_to_segment (output_bfd, sec->output_section);
3855 	    }
3856 	  else
3857 	    check_segment[1] = -1;
3858 	  break;
3859 
3860 	case R_FRV_GOTTLSOFF12:
3861 	case R_FRV_GOTTLSOFFHI:
3862 	case R_FRV_GOTTLSOFFLO:
3863 	  BFD_ASSERT (picrel->tlsoff_entry);
3864 	  relocation = picrel->tlsoff_entry;
3865 	  check_segment[0] = tls_segment;
3866 	  check_segment[1] = sec
3867 	    && ! bfd_is_abs_section (sec)
3868 	    && ! bfd_is_und_section (sec)
3869 	    ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3870 	    : tls_segment;
3871 	  break;
3872 
3873 	case R_FRV_TLSDESC_VALUE:
3874 	case R_FRV_TLSOFF:
3875 	  /* These shouldn't be present in input object files.  */
3876 	  check_segment[0] = check_segment[1] = isec_segment;
3877 	  break;
3878 
3879 	case R_FRV_TLSDESC_RELAX:
3880 	case R_FRV_GETTLSOFF_RELAX:
3881 	case R_FRV_TLSOFF_RELAX:
3882 	  /* These are just annotations for relaxation, nothing to do
3883 	     here.  */
3884 	  continue;
3885 
3886 	default:
3887 	  check_segment[0] = isec_segment;
3888 	  check_segment[1] = sec
3889 	    ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3890 	    : (unsigned)-1;
3891 	  break;
3892 	}
3893 
3894       if (check_segment[0] != check_segment[1] && IS_FDPIC (output_bfd))
3895 	{
3896 	  /* If you take this out, remove the #error from fdpic-static-6.d
3897 	     in the ld testsuite.  */
3898 	  /* This helps catch problems in GCC while we can't do more
3899 	     than static linking.  The idea is to test whether the
3900 	     input file basename is crt0.o only once.  */
3901 	  if (silence_segment_error == 1)
3902 	    silence_segment_error =
3903 	      (strlen (input_bfd->filename) == 6
3904 	       && filename_cmp (input_bfd->filename, "crt0.o") == 0)
3905 	      || (strlen (input_bfd->filename) > 6
3906 		  && filename_cmp (input_bfd->filename
3907 				   + strlen (input_bfd->filename) - 7,
3908 			     "/crt0.o") == 0)
3909 	      ? -1 : 0;
3910 	  if (!silence_segment_error
3911 	      /* We don't want duplicate errors for undefined
3912 		 symbols.  */
3913 	      && !(picrel && picrel->symndx == -1
3914 		   && picrel->d.h->root.type == bfd_link_hash_undefined))
3915 	    {
3916 	      info->callbacks->einfo
3917 		/* xgettext:c-format */
3918 		(_("%H: reloc against `%s' references a different segment\n"),
3919 		 input_bfd, input_section, rel->r_offset, name);
3920 	    }
3921 	  if (!silence_segment_error && bfd_link_pic (info))
3922 	    return FALSE;
3923 	  elf_elfheader (output_bfd)->e_flags |= EF_FRV_PIC;
3924 	}
3925 
3926       switch (r_type)
3927 	{
3928 	case R_FRV_GOTOFFHI:
3929 	case R_FRV_TLSMOFFHI:
3930 	  /* We need the addend to be applied before we shift the
3931 	     value right.  */
3932 	  relocation += rel->r_addend;
3933 	  /* Fall through.  */
3934 	case R_FRV_GOTHI:
3935 	case R_FRV_FUNCDESC_GOTHI:
3936 	case R_FRV_FUNCDESC_GOTOFFHI:
3937 	case R_FRV_GOTTLSOFFHI:
3938 	case R_FRV_GOTTLSDESCHI:
3939 	  relocation >>= 16;
3940 	  /* Fall through.  */
3941 
3942 	case R_FRV_GOTLO:
3943 	case R_FRV_FUNCDESC_GOTLO:
3944 	case R_FRV_GOTOFFLO:
3945 	case R_FRV_FUNCDESC_GOTOFFLO:
3946 	case R_FRV_GOTTLSOFFLO:
3947 	case R_FRV_GOTTLSDESCLO:
3948 	case R_FRV_TLSMOFFLO:
3949 	  relocation &= 0xffff;
3950 	  break;
3951 
3952 	default:
3953 	  break;
3954 	}
3955 
3956       switch (r_type)
3957 	{
3958 	case R_FRV_LABEL24:
3959 	  if (! IS_FDPIC (output_bfd) || ! picrel->plt)
3960 	    break;
3961 	  /* Fall through.  */
3962 
3963 	  /* When referencing a GOT entry, a function descriptor or a
3964 	     PLT, we don't want the addend to apply to the reference,
3965 	     but rather to the referenced symbol.  The actual entry
3966 	     will have already been created taking the addend into
3967 	     account, so cancel it out here.  */
3968 	case R_FRV_GOT12:
3969 	case R_FRV_GOTHI:
3970 	case R_FRV_GOTLO:
3971 	case R_FRV_FUNCDESC_GOT12:
3972 	case R_FRV_FUNCDESC_GOTHI:
3973 	case R_FRV_FUNCDESC_GOTLO:
3974 	case R_FRV_FUNCDESC_GOTOFF12:
3975 	case R_FRV_FUNCDESC_GOTOFFHI:
3976 	case R_FRV_FUNCDESC_GOTOFFLO:
3977 	case R_FRV_GETTLSOFF:
3978 	case R_FRV_GOTTLSDESC12:
3979 	case R_FRV_GOTTLSDESCHI:
3980 	case R_FRV_GOTTLSDESCLO:
3981 	case R_FRV_GOTTLSOFF12:
3982 	case R_FRV_GOTTLSOFFHI:
3983 	case R_FRV_GOTTLSOFFLO:
3984 	  /* Note that we only want GOTOFFHI, not GOTOFFLO or GOTOFF12
3985 	     here, since we do want to apply the addend to the others.
3986 	     Note that we've applied the addend to GOTOFFHI before we
3987 	     shifted it right.  */
3988 	case R_FRV_GOTOFFHI:
3989 	case R_FRV_TLSMOFFHI:
3990 	  relocation -= rel->r_addend;
3991 	  break;
3992 
3993 	default:
3994 	  break;
3995 	}
3996 
3997      if (r_type == R_FRV_HI16)
3998        r = elf32_frv_relocate_hi16 (input_bfd, rel, contents, relocation);
3999 
4000      else if (r_type == R_FRV_LO16)
4001        r = elf32_frv_relocate_lo16 (input_bfd, rel, contents, relocation);
4002 
4003      else if (r_type == R_FRV_LABEL24 || r_type == R_FRV_GETTLSOFF)
4004        r = elf32_frv_relocate_label24 (input_bfd, input_section, rel,
4005 				       contents, relocation);
4006 
4007      else if (r_type == R_FRV_GPREL12)
4008        r = elf32_frv_relocate_gprel12 (info, input_bfd, input_section, rel,
4009 				       contents, relocation);
4010 
4011      else if (r_type == R_FRV_GPRELU12)
4012        r = elf32_frv_relocate_gprelu12 (info, input_bfd, input_section, rel,
4013 					contents, relocation);
4014 
4015      else if (r_type == R_FRV_GPRELLO)
4016        r = elf32_frv_relocate_gprello (info, input_bfd, input_section, rel,
4017 				       contents, relocation);
4018 
4019      else if (r_type == R_FRV_GPRELHI)
4020        r = elf32_frv_relocate_gprelhi (info, input_bfd, input_section, rel,
4021 				       contents, relocation);
4022 
4023      else if (r_type == R_FRV_TLSOFF
4024 	      || r_type == R_FRV_TLSDESC_VALUE)
4025        r = bfd_reloc_notsupported;
4026 
4027      else
4028        r = frv_final_link_relocate (howto, input_bfd, input_section, contents,
4029 				    rel, relocation);
4030 
4031       if (r != bfd_reloc_ok)
4032 	{
4033 	  const char * msg = (const char *) NULL;
4034 
4035 	  switch (r)
4036 	    {
4037 	    case bfd_reloc_overflow:
4038 	      (*info->callbacks->reloc_overflow)
4039 		(info, (h ? &h->root : NULL), name, howto->name,
4040 		 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4041 	      break;
4042 
4043 	    case bfd_reloc_undefined:
4044 	      (*info->callbacks->undefined_symbol)
4045 		(info, name, input_bfd, input_section, rel->r_offset, TRUE);
4046 	      break;
4047 
4048 	    case bfd_reloc_outofrange:
4049 	      msg = _("internal error: out of range error");
4050 	      break;
4051 
4052 	    case bfd_reloc_notsupported:
4053 	      msg = _("internal error: unsupported relocation error");
4054 	      break;
4055 
4056 	    case bfd_reloc_dangerous:
4057 	      msg = _("internal error: dangerous relocation");
4058 	      break;
4059 
4060 	    default:
4061 	      msg = _("internal error: unknown error");
4062 	      break;
4063 	    }
4064 
4065 	  if (msg)
4066 	    {
4067 	      info->callbacks->einfo
4068 		/* xgettext:c-format */
4069 		(_("%H: reloc against `%s': %s\n"),
4070 		 input_bfd, input_section, rel->r_offset, name, msg);
4071 	      return FALSE;
4072 	    }
4073 	}
4074     }
4075 
4076   return TRUE;
4077 }
4078 
4079 /* Return the section that should be marked against GC for a given
4080    relocation.  */
4081 
4082 static asection *
4083 elf32_frv_gc_mark_hook (asection *sec,
4084 			struct bfd_link_info *info,
4085 			Elf_Internal_Rela *rel,
4086 			struct elf_link_hash_entry *h,
4087 			Elf_Internal_Sym *sym)
4088 {
4089   if (h != NULL)
4090     switch (ELF32_R_TYPE (rel->r_info))
4091       {
4092       case R_FRV_GNU_VTINHERIT:
4093       case R_FRV_GNU_VTENTRY:
4094 	return NULL;
4095       }
4096 
4097   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
4098 }
4099 
4100 /* Hook called by the linker routine which adds symbols from an object
4101    file.  We use it to put .comm items in .scomm, and not .comm.  */
4102 
4103 static bfd_boolean
4104 elf32_frv_add_symbol_hook (bfd *abfd,
4105 			   struct bfd_link_info *info,
4106 			   Elf_Internal_Sym *sym,
4107 			   const char **namep ATTRIBUTE_UNUSED,
4108 			   flagword *flagsp ATTRIBUTE_UNUSED,
4109 			   asection **secp,
4110 			   bfd_vma *valp)
4111 {
4112   if (sym->st_shndx == SHN_COMMON
4113       && !bfd_link_relocatable (info)
4114       && (int)sym->st_size <= (int)bfd_get_gp_size (abfd))
4115     {
4116       /* Common symbols less than or equal to -G nn bytes are
4117 	 automatically put into .sbss.  */
4118 
4119       asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
4120 
4121       if (scomm == NULL)
4122 	{
4123 	  scomm = bfd_make_section_with_flags (abfd, ".scommon",
4124 					       (SEC_ALLOC
4125 						| SEC_IS_COMMON
4126 						| SEC_LINKER_CREATED));
4127 	  if (scomm == NULL)
4128 	    return FALSE;
4129 	}
4130 
4131       *secp = scomm;
4132       *valp = sym->st_size;
4133     }
4134 
4135   return TRUE;
4136 }
4137 
4138 /* We need dynamic symbols for every section, since segments can
4139    relocate independently.  */
4140 static bfd_boolean
4141 _frvfdpic_link_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
4142 				    struct bfd_link_info *info
4143 				    ATTRIBUTE_UNUSED,
4144 				    asection *p ATTRIBUTE_UNUSED)
4145 {
4146   switch (elf_section_data (p)->this_hdr.sh_type)
4147     {
4148     case SHT_PROGBITS:
4149     case SHT_NOBITS:
4150       /* If sh_type is yet undecided, assume it could be
4151 	 SHT_PROGBITS/SHT_NOBITS.  */
4152     case SHT_NULL:
4153       return FALSE;
4154 
4155       /* There shouldn't be section relative relocations
4156 	 against any other section.  */
4157     default:
4158       return TRUE;
4159     }
4160 }
4161 
4162 /* Create  a .got section, as well as its additional info field.  This
4163    is almost entirely copied from
4164    elflink.c:_bfd_elf_create_got_section().  */
4165 
4166 static bfd_boolean
4167 _frv_create_got_section (bfd *abfd, struct bfd_link_info *info)
4168 {
4169   flagword flags, pltflags;
4170   asection *s;
4171   struct elf_link_hash_entry *h;
4172   struct bfd_link_hash_entry *bh;
4173   const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4174   int ptralign;
4175   int offset;
4176 
4177   /* This function may be called more than once.  */
4178   s = elf_hash_table (info)->sgot;
4179   if (s != NULL)
4180     return TRUE;
4181 
4182   /* Machine specific: although pointers are 32-bits wide, we want the
4183      GOT to be aligned to a 64-bit boundary, such that function
4184      descriptors in it can be accessed with 64-bit loads and
4185      stores.  */
4186   ptralign = 3;
4187 
4188   flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4189 	   | SEC_LINKER_CREATED);
4190   pltflags = flags;
4191 
4192   s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
4193   elf_hash_table (info)->sgot = s;
4194   if (s == NULL
4195       || !bfd_set_section_alignment (abfd, s, ptralign))
4196     return FALSE;
4197 
4198   if (bed->want_got_sym)
4199     {
4200       /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
4201 	 (or .got.plt) section.  We don't do this in the linker script
4202 	 because we don't want to define the symbol if we are not creating
4203 	 a global offset table.  */
4204       h = _bfd_elf_define_linkage_sym (abfd, info, s, "_GLOBAL_OFFSET_TABLE_");
4205       elf_hash_table (info)->hgot = h;
4206       if (h == NULL)
4207 	return FALSE;
4208 
4209       /* Machine-specific: we want the symbol for executables as
4210 	 well.  */
4211       if (! bfd_elf_link_record_dynamic_symbol (info, h))
4212 	return FALSE;
4213     }
4214 
4215   /* The first bit of the global offset table is the header.  */
4216   s->size += bed->got_header_size;
4217 
4218   /* This is the machine-specific part.  Create and initialize section
4219      data for the got.  */
4220   if (IS_FDPIC (abfd))
4221     {
4222       frvfdpic_relocs_info (info) = htab_try_create (1,
4223 						     frvfdpic_relocs_info_hash,
4224 						     frvfdpic_relocs_info_eq,
4225 						     (htab_del) NULL);
4226       if (! frvfdpic_relocs_info (info))
4227 	return FALSE;
4228 
4229       s = bfd_make_section_anyway_with_flags (abfd, ".rel.got",
4230 					      (flags | SEC_READONLY));
4231       elf_hash_table (info)->srelgot = s;
4232       if (s == NULL
4233 	  || ! bfd_set_section_alignment (abfd, s, 2))
4234 	return FALSE;
4235 
4236       /* Machine-specific.  */
4237       s = bfd_make_section_anyway_with_flags (abfd, ".rofixup",
4238 					      (flags | SEC_READONLY));
4239       if (s == NULL
4240 	  || ! bfd_set_section_alignment (abfd, s, 2))
4241 	return FALSE;
4242 
4243       frvfdpic_gotfixup_section (info) = s;
4244       offset = -2048;
4245       flags = BSF_GLOBAL;
4246     }
4247   else
4248     {
4249       offset = 2048;
4250       flags = BSF_GLOBAL | BSF_WEAK;
4251     }
4252 
4253   /* Define _gp in .rofixup, for FDPIC, or .got otherwise.  If it
4254      turns out that we're linking with a different linker script, the
4255      linker script will override it.  */
4256   bh = NULL;
4257   if (!(_bfd_generic_link_add_one_symbol
4258 	(info, abfd, "_gp", flags, s, offset, (const char *) NULL, FALSE,
4259 	 bed->collect, &bh)))
4260     return FALSE;
4261   h = (struct elf_link_hash_entry *) bh;
4262   h->def_regular = 1;
4263   h->type = STT_OBJECT;
4264   /* h->other = STV_HIDDEN; */ /* Should we?  */
4265 
4266   /* Machine-specific: we want the symbol for executables as well.  */
4267   if (IS_FDPIC (abfd) && ! bfd_elf_link_record_dynamic_symbol (info, h))
4268     return FALSE;
4269 
4270   if (!IS_FDPIC (abfd))
4271     return TRUE;
4272 
4273   /* FDPIC supports Thread Local Storage, and this may require a
4274      procedure linkage table for TLS PLT entries.  */
4275 
4276   /* This is mostly copied from
4277      elflink.c:_bfd_elf_create_dynamic_sections().  */
4278 
4279   flags = pltflags;
4280   pltflags |= SEC_CODE;
4281   if (bed->plt_not_loaded)
4282     pltflags &= ~ (SEC_CODE | SEC_LOAD | SEC_HAS_CONTENTS);
4283   if (bed->plt_readonly)
4284     pltflags |= SEC_READONLY;
4285 
4286   s = bfd_make_section_anyway_with_flags (abfd, ".plt", pltflags);
4287   if (s == NULL
4288       || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
4289     return FALSE;
4290   /* FRV-specific: remember it.  */
4291   frvfdpic_plt_section (info) = s;
4292 
4293   /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
4294      .plt section.  */
4295   if (bed->want_plt_sym)
4296     {
4297       h = _bfd_elf_define_linkage_sym (abfd, info, s,
4298 				       "_PROCEDURE_LINKAGE_TABLE_");
4299       elf_hash_table (info)->hplt = h;
4300       if (h == NULL)
4301 	return FALSE;
4302     }
4303 
4304   /* FRV-specific: we want rel relocations for the plt.  */
4305   s = bfd_make_section_anyway_with_flags (abfd, ".rel.plt",
4306 					  flags | SEC_READONLY);
4307   if (s == NULL
4308       || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
4309     return FALSE;
4310   /* FRV-specific: remember it.  */
4311   frvfdpic_pltrel_section (info) = s;
4312 
4313   return TRUE;
4314 }
4315 
4316 /* Make sure the got and plt sections exist, and that our pointers in
4317    the link hash table point to them.  */
4318 
4319 static bfd_boolean
4320 elf32_frvfdpic_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
4321 {
4322   /* This is mostly copied from
4323      elflink.c:_bfd_elf_create_dynamic_sections().  */
4324   flagword flags;
4325   asection *s;
4326   const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4327 
4328   flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4329 	   | SEC_LINKER_CREATED);
4330 
4331   /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
4332      .rel[a].bss sections.  */
4333 
4334   /* FRV-specific: we want to create the GOT and the PLT in the FRV
4335      way.  */
4336   if (! _frv_create_got_section (abfd, info))
4337     return FALSE;
4338 
4339   /* FRV-specific: make sure we created everything we wanted.  */
4340   BFD_ASSERT (frvfdpic_got_section (info) && frvfdpic_gotrel_section (info)
4341 	      && frvfdpic_gotfixup_section (info)
4342 	      && frvfdpic_plt_section (info)
4343 	      && frvfdpic_pltrel_section (info));
4344 
4345   if (bed->want_dynbss)
4346     {
4347       /* The .dynbss section is a place to put symbols which are defined
4348 	 by dynamic objects, are referenced by regular objects, and are
4349 	 not functions.  We must allocate space for them in the process
4350 	 image and use a R_*_COPY reloc to tell the dynamic linker to
4351 	 initialize them at run time.  The linker script puts the .dynbss
4352 	 section into the .bss section of the final image.  */
4353       s = bfd_make_section_anyway_with_flags (abfd, ".dynbss",
4354 					      SEC_ALLOC | SEC_LINKER_CREATED);
4355       if (s == NULL)
4356 	return FALSE;
4357 
4358       /* The .rel[a].bss section holds copy relocs.  This section is not
4359      normally needed.  We need to create it here, though, so that the
4360      linker will map it to an output section.  We can't just create it
4361      only if we need it, because we will not know whether we need it
4362      until we have seen all the input files, and the first time the
4363      main linker code calls BFD after examining all the input files
4364      (size_dynamic_sections) the input sections have already been
4365      mapped to the output sections.  If the section turns out not to
4366      be needed, we can discard it later.  We will never need this
4367      section when generating a shared object, since they do not use
4368      copy relocs.  */
4369       if (! bfd_link_pic (info))
4370 	{
4371 	  s = bfd_make_section_anyway_with_flags (abfd,
4372 						  (bed->default_use_rela_p
4373 						   ? ".rela.bss" : ".rel.bss"),
4374 						  flags | SEC_READONLY);
4375 	  if (s == NULL
4376 	      || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
4377 	    return FALSE;
4378 	}
4379     }
4380 
4381   return TRUE;
4382 }
4383 
4384 /* Compute the total GOT and PLT size required by each symbol in each
4385    range.  Symbols may require up to 4 words in the GOT: an entry
4386    pointing to the symbol, an entry pointing to its function
4387    descriptor, and a private function descriptors taking two
4388    words.  */
4389 
4390 static void
4391 _frvfdpic_count_nontls_entries (struct frvfdpic_relocs_info *entry,
4392 				struct _frvfdpic_dynamic_got_info *dinfo)
4393 {
4394   /* Allocate space for a GOT entry pointing to the symbol.  */
4395   if (entry->got12)
4396     dinfo->got12 += 4;
4397   else if (entry->gotlos)
4398     dinfo->gotlos += 4;
4399   else if (entry->gothilo)
4400     dinfo->gothilo += 4;
4401   else
4402     entry->relocs32--;
4403   entry->relocs32++;
4404 
4405   /* Allocate space for a GOT entry pointing to the function
4406      descriptor.  */
4407   if (entry->fdgot12)
4408     dinfo->got12 += 4;
4409   else if (entry->fdgotlos)
4410     dinfo->gotlos += 4;
4411   else if (entry->fdgothilo)
4412     dinfo->gothilo += 4;
4413   else
4414     entry->relocsfd--;
4415   entry->relocsfd++;
4416 
4417   /* Decide whether we need a PLT entry, a function descriptor in the
4418      GOT, and a lazy PLT entry for this symbol.  */
4419   entry->plt = entry->call
4420     && entry->symndx == -1 && ! FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
4421     && elf_hash_table (dinfo->info)->dynamic_sections_created;
4422   entry->privfd = entry->plt
4423     || entry->fdgoff12 || entry->fdgofflos || entry->fdgoffhilo
4424     || ((entry->fd || entry->fdgot12 || entry->fdgotlos || entry->fdgothilo)
4425 	&& (entry->symndx != -1
4426 	    || FRVFDPIC_FUNCDESC_LOCAL (dinfo->info, entry->d.h)));
4427   entry->lazyplt = entry->privfd
4428     && entry->symndx == -1 && ! FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
4429     && ! (dinfo->info->flags & DF_BIND_NOW)
4430     && elf_hash_table (dinfo->info)->dynamic_sections_created;
4431 
4432   /* Allocate space for a function descriptor.  */
4433   if (entry->fdgoff12)
4434     dinfo->fd12 += 8;
4435   else if (entry->fdgofflos)
4436     dinfo->fdlos += 8;
4437   else if (entry->privfd && entry->plt)
4438     dinfo->fdplt += 8;
4439   else if (entry->privfd)
4440     dinfo->fdhilo += 8;
4441   else
4442     entry->relocsfdv--;
4443   entry->relocsfdv++;
4444 
4445   if (entry->lazyplt)
4446     dinfo->lzplt += 8;
4447 }
4448 
4449 /* Compute the total GOT size required by each TLS symbol in each
4450    range.  Symbols may require up to 5 words in the GOT: an entry
4451    holding the TLS offset for the symbol, and an entry with a full TLS
4452    descriptor taking 4 words.  */
4453 
4454 static void
4455 _frvfdpic_count_tls_entries (struct frvfdpic_relocs_info *entry,
4456 			     struct _frvfdpic_dynamic_got_info *dinfo,
4457 			     bfd_boolean subtract)
4458 {
4459   const int l = subtract ? -1 : 1;
4460 
4461   /* Allocate space for a GOT entry with the TLS offset of the
4462      symbol.  */
4463   if (entry->tlsoff12)
4464     dinfo->got12 += 4 * l;
4465   else if (entry->tlsofflos)
4466     dinfo->gotlos += 4 * l;
4467   else if (entry->tlsoffhilo)
4468     dinfo->gothilo += 4 * l;
4469   else
4470     entry->relocstlsoff -= l;
4471   entry->relocstlsoff += l;
4472 
4473   /* If there's any TLSOFF relocation, mark the output file as not
4474      suitable for dlopening.  This mark will remain even if we relax
4475      all such relocations, but this is not a problem, since we'll only
4476      do so for executables, and we definitely don't want anyone
4477      dlopening executables.  */
4478   if (entry->relocstlsoff)
4479     dinfo->info->flags |= DF_STATIC_TLS;
4480 
4481   /* Allocate space for a TLS descriptor.  */
4482   if (entry->tlsdesc12)
4483     dinfo->tlsd12 += 8 * l;
4484   else if (entry->tlsdesclos)
4485     dinfo->tlsdlos += 8 * l;
4486   else if (entry->tlsplt)
4487     dinfo->tlsdplt += 8 * l;
4488   else if (entry->tlsdeschilo)
4489     dinfo->tlsdhilo += 8 * l;
4490   else
4491     entry->relocstlsd -= l;
4492   entry->relocstlsd += l;
4493 }
4494 
4495 /* Compute the number of dynamic relocations and fixups that a symbol
4496    requires, and add (or subtract) from the grand and per-symbol
4497    totals.  */
4498 
4499 static void
4500 _frvfdpic_count_relocs_fixups (struct frvfdpic_relocs_info *entry,
4501 			       struct _frvfdpic_dynamic_got_info *dinfo,
4502 			       bfd_boolean subtract)
4503 {
4504   bfd_vma relocs = 0, fixups = 0, tlsrets = 0;
4505 
4506   if (!bfd_link_pde (dinfo->info))
4507     {
4508       relocs = entry->relocs32 + entry->relocsfd + entry->relocsfdv
4509 	+ entry->relocstlsd;
4510 
4511       /* In the executable, TLS relocations to symbols that bind
4512 	 locally (including those that resolve to global TLS offsets)
4513 	 are resolved immediately, without any need for fixups or
4514 	 dynamic relocations.  In shared libraries, however, we must
4515 	 emit dynamic relocations even for local symbols, because we
4516 	 don't know the module id the library is going to get at
4517 	 run-time, nor its TLS base offset.  */
4518       if (!bfd_link_executable (dinfo->info)
4519 	  || (entry->symndx == -1
4520 	      && ! FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)))
4521 	relocs += entry->relocstlsoff;
4522     }
4523   else
4524     {
4525       if (entry->symndx != -1 || FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h))
4526 	{
4527 	  if (entry->symndx != -1
4528 	      || entry->d.h->root.type != bfd_link_hash_undefweak)
4529 	    fixups += entry->relocs32 + 2 * entry->relocsfdv;
4530 	  fixups += entry->relocstlsd;
4531 	  tlsrets += entry->relocstlsd;
4532 	}
4533       else
4534 	{
4535 	  relocs += entry->relocs32 + entry->relocsfdv
4536 	    + entry->relocstlsoff + entry->relocstlsd;
4537 	}
4538 
4539       if (entry->symndx != -1
4540 	  || FRVFDPIC_FUNCDESC_LOCAL (dinfo->info, entry->d.h))
4541 	{
4542 	  if (entry->symndx != -1
4543 	      || entry->d.h->root.type != bfd_link_hash_undefweak)
4544 	    fixups += entry->relocsfd;
4545 	}
4546       else
4547 	relocs += entry->relocsfd;
4548     }
4549 
4550   if (subtract)
4551     {
4552       relocs = - relocs;
4553       fixups = - fixups;
4554       tlsrets = - tlsrets;
4555     }
4556 
4557   entry->dynrelocs += relocs;
4558   entry->fixups += fixups;
4559   dinfo->relocs += relocs;
4560   dinfo->fixups += fixups;
4561   dinfo->tls_ret_refs += tlsrets;
4562 }
4563 
4564 /* Look for opportunities to relax TLS relocations.  We can assume
4565    we're linking the main executable or a static-tls library, since
4566    otherwise we wouldn't have got here.  When relaxing, we have to
4567    first undo any previous accounting of TLS uses of fixups, dynamic
4568    relocations, GOT and PLT entries.  */
4569 
4570 static void
4571 _frvfdpic_relax_tls_entries (struct frvfdpic_relocs_info *entry,
4572 			     struct _frvfdpic_dynamic_got_info *dinfo,
4573 			     bfd_boolean relaxing)
4574 {
4575   bfd_boolean changed = ! relaxing;
4576 
4577   BFD_ASSERT (bfd_link_executable (dinfo->info)
4578 	      || (dinfo->info->flags & DF_STATIC_TLS));
4579 
4580   if (entry->tlsdesc12 || entry->tlsdesclos || entry->tlsdeschilo)
4581     {
4582       if (! changed)
4583 	{
4584 	  _frvfdpic_count_relocs_fixups (entry, dinfo, TRUE);
4585 	  _frvfdpic_count_tls_entries (entry, dinfo, TRUE);
4586 	  changed = TRUE;
4587 	}
4588 
4589       /* When linking an executable, we can always decay GOTTLSDESC to
4590 	 TLSMOFF, if the symbol is local, or GOTTLSOFF, otherwise.
4591 	 When linking a static-tls shared library, using TLSMOFF is
4592 	 not an option, but we can still use GOTTLSOFF.  When decaying
4593 	 to GOTTLSOFF, we must keep the GOT entry in range.  We know
4594 	 it has to fit because we'll be trading the 4 words of hte TLS
4595 	 descriptor for a single word in the same range.  */
4596       if (! bfd_link_executable (dinfo->info)
4597 	  || (entry->symndx == -1
4598 	      && ! FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)))
4599 	{
4600 	  entry->tlsoff12 |= entry->tlsdesc12;
4601 	  entry->tlsofflos |= entry->tlsdesclos;
4602 	  entry->tlsoffhilo |= entry->tlsdeschilo;
4603 	}
4604 
4605       entry->tlsdesc12 = entry->tlsdesclos = entry->tlsdeschilo = 0;
4606     }
4607 
4608   /* We can only decay TLSOFFs or call #gettlsoff to TLSMOFF in the
4609      main executable.  We have to check whether the symbol's TLSOFF is
4610      in range for a setlos.  For symbols with a hash entry, we can
4611      determine exactly what to do; for others locals, we don't have
4612      addresses handy, so we use the size of the TLS section as an
4613      approximation.  If we get it wrong, we'll retain a GOT entry
4614      holding the TLS offset (without dynamic relocations or fixups),
4615      but we'll still optimize away the loads from it.  Since TLS sizes
4616      are generally very small, it's probably not worth attempting to
4617      do better than this.  */
4618   if ((entry->tlsplt
4619        || entry->tlsoff12 || entry->tlsofflos || entry->tlsoffhilo)
4620       && bfd_link_executable (dinfo->info) && relaxing
4621       && ((entry->symndx == -1
4622 	   && FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
4623 	   /* The above may hold for an undefweak TLS symbol, so make
4624 	      sure we don't have this case before accessing def.value
4625 	      and def.section.  */
4626 	   && (entry->d.h->root.type == bfd_link_hash_undefweak
4627 	       || (bfd_vma)(entry->d.h->root.u.def.value
4628 			    + (entry->d.h->root.u.def.section
4629 			       ->output_section->vma)
4630 			    + entry->d.h->root.u.def.section->output_offset
4631 			    + entry->addend
4632 			    - tls_biased_base (dinfo->info)
4633 			    + 32768) < (bfd_vma)65536))
4634 	  || (entry->symndx != -1
4635 	      && (elf_hash_table (dinfo->info)->tls_sec->size
4636 		  + entry->addend < 32768 + FRVFDPIC_TLS_BIAS))))
4637     {
4638       if (! changed)
4639 	{
4640 	  _frvfdpic_count_relocs_fixups (entry, dinfo, TRUE);
4641 	  _frvfdpic_count_tls_entries (entry, dinfo, TRUE);
4642 	  changed = TRUE;
4643 	}
4644 
4645       entry->tlsplt =
4646 	entry->tlsoff12 = entry->tlsofflos = entry->tlsoffhilo = 0;
4647     }
4648 
4649   /* We can decay `call #gettlsoff' to a ldi #tlsoff if we already
4650      have a #gottlsoff12 relocation for this entry, or if we can fit
4651      one more in the 12-bit (and 16-bit) ranges.  */
4652   if (entry->tlsplt
4653       && (entry->tlsoff12
4654 	  || (relaxing
4655 	      && dinfo->got12 + dinfo->fd12 + dinfo->tlsd12 <= 4096 - 12 - 4
4656 	      && (dinfo->got12 + dinfo->fd12 + dinfo->tlsd12
4657 		  + dinfo->gotlos + dinfo->fdlos + dinfo->tlsdlos
4658 		  <= 65536 - 12 - 4))))
4659     {
4660       if (! changed)
4661 	{
4662 	  _frvfdpic_count_relocs_fixups (entry, dinfo, TRUE);
4663 	  _frvfdpic_count_tls_entries (entry, dinfo, TRUE);
4664 	  changed = TRUE;
4665 	}
4666 
4667       entry->tlsoff12 = 1;
4668       entry->tlsplt = 0;
4669     }
4670 
4671   if (changed)
4672     {
4673       _frvfdpic_count_tls_entries (entry, dinfo, FALSE);
4674       _frvfdpic_count_relocs_fixups (entry, dinfo, FALSE);
4675     }
4676 
4677   return;
4678 }
4679 
4680 /* Compute the total GOT and PLT size required by each symbol in each range. *
4681    Symbols may require up to 4 words in the GOT: an entry pointing to
4682    the symbol, an entry pointing to its function descriptor, and a
4683    private function descriptors taking two words.  */
4684 
4685 static int
4686 _frvfdpic_count_got_plt_entries (void **entryp, void *dinfo_)
4687 {
4688   struct frvfdpic_relocs_info *entry = *entryp;
4689   struct _frvfdpic_dynamic_got_info *dinfo = dinfo_;
4690 
4691   _frvfdpic_count_nontls_entries (entry, dinfo);
4692 
4693   if (bfd_link_executable (dinfo->info)
4694       || (dinfo->info->flags & DF_STATIC_TLS))
4695     _frvfdpic_relax_tls_entries (entry, dinfo, FALSE);
4696   else
4697     {
4698       _frvfdpic_count_tls_entries (entry, dinfo, FALSE);
4699       _frvfdpic_count_relocs_fixups (entry, dinfo, FALSE);
4700     }
4701 
4702   return 1;
4703 }
4704 
4705 /* Determine the positive and negative ranges to be used by each
4706    offset range in the GOT.  FDCUR and CUR, that must be aligned to a
4707    double-word boundary, are the minimum (negative) and maximum
4708    (positive) GOT offsets already used by previous ranges, except for
4709    an ODD entry that may have been left behind.  GOT and FD indicate
4710    the size of GOT entries and function descriptors that must be
4711    placed within the range from -WRAP to WRAP.  If there's room left,
4712    up to FDPLT bytes should be reserved for additional function
4713    descriptors.  */
4714 
4715 inline static bfd_signed_vma
4716 _frvfdpic_compute_got_alloc_data (struct _frvfdpic_dynamic_got_alloc_data *gad,
4717 				  bfd_signed_vma fdcur,
4718 				  bfd_signed_vma odd,
4719 				  bfd_signed_vma cur,
4720 				  bfd_vma got,
4721 				  bfd_vma fd,
4722 				  bfd_vma fdplt,
4723 				  bfd_vma tlsd,
4724 				  bfd_vma tlsdplt,
4725 				  bfd_vma wrap)
4726 {
4727   bfd_signed_vma wrapmin = -wrap;
4728   const bfd_vma tdescsz = 8;
4729 
4730   /* Start at the given initial points.  */
4731   gad->fdcur = fdcur;
4732   gad->cur = cur;
4733 
4734   /* If we had an incoming odd word and we have any got entries that
4735      are going to use it, consume it, otherwise leave gad->odd at
4736      zero.  We might force gad->odd to zero and return the incoming
4737      odd such that it is used by the next range, but then GOT entries
4738      might appear to be out of order and we wouldn't be able to
4739      shorten the GOT by one word if it turns out to end with an
4740      unpaired GOT entry.  */
4741   if (odd && got)
4742     {
4743       gad->odd = odd;
4744       got -= 4;
4745       odd = 0;
4746     }
4747   else
4748     gad->odd = 0;
4749 
4750   /* If we're left with an unpaired GOT entry, compute its location
4751      such that we can return it.  Otherwise, if got doesn't require an
4752      odd number of words here, either odd was already zero in the
4753      block above, or it was set to zero because got was non-zero, or
4754      got was already zero.  In the latter case, we want the value of
4755      odd to carry over to the return statement, so we don't want to
4756      reset odd unless the condition below is true.  */
4757   if (got & 4)
4758     {
4759       odd = cur + got;
4760       got += 4;
4761     }
4762 
4763   /* Compute the tentative boundaries of this range.  */
4764   gad->max = cur + got;
4765   gad->min = fdcur - fd;
4766   gad->fdplt = 0;
4767 
4768   /* If function descriptors took too much space, wrap some of them
4769      around.  */
4770   if (gad->min < wrapmin)
4771     {
4772       gad->max += wrapmin - gad->min;
4773       gad->tmin = gad->min = wrapmin;
4774     }
4775 
4776   /* If GOT entries took too much space, wrap some of them around.
4777      This may well cause gad->min to become lower than wrapmin.  This
4778      will cause a relocation overflow later on, so we don't have to
4779      report it here . */
4780   if ((bfd_vma) gad->max > wrap)
4781     {
4782       gad->min -= gad->max - wrap;
4783       gad->max = wrap;
4784     }
4785 
4786   /* Add TLS descriptors.  */
4787   gad->tmax = gad->max + tlsd;
4788   gad->tmin = gad->min;
4789   gad->tlsdplt = 0;
4790 
4791   /* If TLS descriptors took too much space, wrap an integral number
4792      of them around.  */
4793   if ((bfd_vma) gad->tmax > wrap)
4794     {
4795       bfd_vma wrapsize = gad->tmax - wrap;
4796 
4797       wrapsize += tdescsz / 2;
4798       wrapsize &= ~ tdescsz / 2;
4799 
4800       gad->tmin -= wrapsize;
4801       gad->tmax -= wrapsize;
4802     }
4803 
4804   /* If there is space left and we have function descriptors
4805      referenced in PLT entries that could take advantage of shorter
4806      offsets, place them now.  */
4807   if (fdplt && gad->tmin > wrapmin)
4808     {
4809       bfd_vma fds;
4810 
4811       if ((bfd_vma) (gad->tmin - wrapmin) < fdplt)
4812 	fds = gad->tmin - wrapmin;
4813       else
4814 	fds = fdplt;
4815 
4816       fdplt -= fds;
4817       gad->min -= fds;
4818       gad->tmin -= fds;
4819       gad->fdplt += fds;
4820     }
4821 
4822   /* If there is more space left, try to place some more function
4823      descriptors for PLT entries.  */
4824   if (fdplt && (bfd_vma) gad->tmax < wrap)
4825     {
4826       bfd_vma fds;
4827 
4828       if ((bfd_vma) (wrap - gad->tmax) < fdplt)
4829 	fds = wrap - gad->tmax;
4830       else
4831 	fds = fdplt;
4832 
4833       fdplt -= fds;
4834       gad->max += fds;
4835       gad->tmax += fds;
4836       gad->fdplt += fds;
4837     }
4838 
4839   /* If there is space left and we have TLS descriptors referenced in
4840      PLT entries that could take advantage of shorter offsets, place
4841      them now.  */
4842   if (tlsdplt && gad->tmin > wrapmin)
4843     {
4844       bfd_vma tlsds;
4845 
4846       if ((bfd_vma) (gad->tmin - wrapmin) < tlsdplt)
4847 	tlsds = (gad->tmin - wrapmin) & ~ (tdescsz / 2);
4848       else
4849 	tlsds = tlsdplt;
4850 
4851       tlsdplt -= tlsds;
4852       gad->tmin -= tlsds;
4853       gad->tlsdplt += tlsds;
4854     }
4855 
4856   /* If there is more space left, try to place some more TLS
4857      descriptors for PLT entries.  Although we could try to fit an
4858      additional TLS descriptor with half of it just before before the
4859      wrap point and another right past the wrap point, this might
4860      cause us to run out of space for the next region, so don't do
4861      it.  */
4862   if (tlsdplt && (bfd_vma) gad->tmax < wrap - tdescsz / 2)
4863     {
4864       bfd_vma tlsds;
4865 
4866       if ((bfd_vma) (wrap - gad->tmax) < tlsdplt)
4867 	tlsds = (wrap - gad->tmax) & ~ (tdescsz / 2);
4868       else
4869 	tlsds = tlsdplt;
4870 
4871       tlsdplt -= tlsds;
4872       gad->tmax += tlsds;
4873       gad->tlsdplt += tlsds;
4874     }
4875 
4876   /* If odd was initially computed as an offset past the wrap point,
4877      wrap it around.  */
4878   if (odd > gad->max)
4879     odd = gad->min + odd - gad->max;
4880 
4881   /* _frvfdpic_get_got_entry() below will always wrap gad->cur if needed
4882      before returning, so do it here too.  This guarantees that,
4883      should cur and fdcur meet at the wrap point, they'll both be
4884      equal to min.  */
4885   if (gad->cur == gad->max)
4886     gad->cur = gad->min;
4887 
4888   /* Ditto for _frvfdpic_get_tlsdesc_entry().  */
4889   gad->tcur = gad->max;
4890   if (gad->tcur == gad->tmax)
4891     gad->tcur = gad->tmin;
4892 
4893   return odd;
4894 }
4895 
4896 /* Compute the location of the next GOT entry, given the allocation
4897    data for a range.  */
4898 
4899 inline static bfd_signed_vma
4900 _frvfdpic_get_got_entry (struct _frvfdpic_dynamic_got_alloc_data *gad)
4901 {
4902   bfd_signed_vma ret;
4903 
4904   if (gad->odd)
4905     {
4906       /* If there was an odd word left behind, use it.  */
4907       ret = gad->odd;
4908       gad->odd = 0;
4909     }
4910   else
4911     {
4912       /* Otherwise, use the word pointed to by cur, reserve the next
4913 	 as an odd word, and skip to the next pair of words, possibly
4914 	 wrapping around.  */
4915       ret = gad->cur;
4916       gad->odd = gad->cur + 4;
4917       gad->cur += 8;
4918       if (gad->cur == gad->max)
4919 	gad->cur = gad->min;
4920     }
4921 
4922   return ret;
4923 }
4924 
4925 /* Compute the location of the next function descriptor entry in the
4926    GOT, given the allocation data for a range.  */
4927 
4928 inline static bfd_signed_vma
4929 _frvfdpic_get_fd_entry (struct _frvfdpic_dynamic_got_alloc_data *gad)
4930 {
4931   /* If we're at the bottom, wrap around, and only then allocate the
4932      next pair of words.  */
4933   if (gad->fdcur == gad->min)
4934     gad->fdcur = gad->max;
4935   return gad->fdcur -= 8;
4936 }
4937 
4938 /* Compute the location of the next TLS descriptor entry in the GOT,
4939    given the allocation data for a range.  */
4940 inline static bfd_signed_vma
4941 _frvfdpic_get_tlsdesc_entry (struct _frvfdpic_dynamic_got_alloc_data *gad)
4942 {
4943   bfd_signed_vma ret;
4944 
4945   ret = gad->tcur;
4946 
4947   gad->tcur += 8;
4948 
4949   /* If we're at the top of the region, wrap around to the bottom.  */
4950   if (gad->tcur == gad->tmax)
4951     gad->tcur = gad->tmin;
4952 
4953   return ret;
4954 }
4955 
4956 /* Assign GOT offsets for every GOT entry and function descriptor.
4957    Doing everything in a single pass is tricky.  */
4958 
4959 static int
4960 _frvfdpic_assign_got_entries (void **entryp, void *info_)
4961 {
4962   struct frvfdpic_relocs_info *entry = *entryp;
4963   struct _frvfdpic_dynamic_got_plt_info *dinfo = info_;
4964 
4965   if (entry->got12)
4966     entry->got_entry = _frvfdpic_get_got_entry (&dinfo->got12);
4967   else if (entry->gotlos)
4968     entry->got_entry = _frvfdpic_get_got_entry (&dinfo->gotlos);
4969   else if (entry->gothilo)
4970     entry->got_entry = _frvfdpic_get_got_entry (&dinfo->gothilo);
4971 
4972   if (entry->fdgot12)
4973     entry->fdgot_entry = _frvfdpic_get_got_entry (&dinfo->got12);
4974   else if (entry->fdgotlos)
4975     entry->fdgot_entry = _frvfdpic_get_got_entry (&dinfo->gotlos);
4976   else if (entry->fdgothilo)
4977     entry->fdgot_entry = _frvfdpic_get_got_entry (&dinfo->gothilo);
4978 
4979   if (entry->fdgoff12)
4980     entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->got12);
4981   else if (entry->plt && dinfo->got12.fdplt)
4982     {
4983       dinfo->got12.fdplt -= 8;
4984       entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->got12);
4985     }
4986   else if (entry->fdgofflos)
4987     entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->gotlos);
4988   else if (entry->plt && dinfo->gotlos.fdplt)
4989     {
4990       dinfo->gotlos.fdplt -= 8;
4991       entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->gotlos);
4992     }
4993   else if (entry->plt)
4994     {
4995       dinfo->gothilo.fdplt -= 8;
4996       entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->gothilo);
4997     }
4998   else if (entry->privfd)
4999     entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->gothilo);
5000 
5001   if (entry->tlsoff12)
5002     entry->tlsoff_entry = _frvfdpic_get_got_entry (&dinfo->got12);
5003   else if (entry->tlsofflos)
5004     entry->tlsoff_entry = _frvfdpic_get_got_entry (&dinfo->gotlos);
5005   else if (entry->tlsoffhilo)
5006     entry->tlsoff_entry = _frvfdpic_get_got_entry (&dinfo->gothilo);
5007 
5008   if (entry->tlsdesc12)
5009     entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->got12);
5010   else if (entry->tlsplt && dinfo->got12.tlsdplt)
5011     {
5012       dinfo->got12.tlsdplt -= 8;
5013       entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->got12);
5014     }
5015   else if (entry->tlsdesclos)
5016     entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->gotlos);
5017   else if (entry->tlsplt && dinfo->gotlos.tlsdplt)
5018     {
5019       dinfo->gotlos.tlsdplt -= 8;
5020       entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->gotlos);
5021     }
5022   else if (entry->tlsplt)
5023     {
5024       dinfo->gothilo.tlsdplt -= 8;
5025       entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->gothilo);
5026     }
5027   else if (entry->tlsdeschilo)
5028     entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->gothilo);
5029 
5030   return 1;
5031 }
5032 
5033 /* Assign GOT offsets to private function descriptors used by PLT
5034    entries (or referenced by 32-bit offsets), as well as PLT entries
5035    and lazy PLT entries.  */
5036 
5037 static int
5038 _frvfdpic_assign_plt_entries (void **entryp, void *info_)
5039 {
5040   struct frvfdpic_relocs_info *entry = *entryp;
5041   struct _frvfdpic_dynamic_got_plt_info *dinfo = info_;
5042 
5043   if (entry->privfd)
5044     BFD_ASSERT (entry->fd_entry);
5045 
5046   if (entry->plt)
5047     {
5048       int size;
5049 
5050       /* We use the section's raw size to mark the location of the
5051 	 next PLT entry.  */
5052       entry->plt_entry = frvfdpic_plt_section (dinfo->g.info)->size;
5053 
5054       /* Figure out the length of this PLT entry based on the
5055 	 addressing mode we need to reach the function descriptor.  */
5056       BFD_ASSERT (entry->fd_entry);
5057       if (entry->fd_entry >= -(1 << (12 - 1))
5058 	  && entry->fd_entry < (1 << (12 - 1)))
5059 	size = 8;
5060       else if (entry->fd_entry >= -(1 << (16 - 1))
5061 	       && entry->fd_entry < (1 << (16 - 1)))
5062 	size = 12;
5063       else
5064 	size = 16;
5065 
5066       frvfdpic_plt_section (dinfo->g.info)->size += size;
5067     }
5068 
5069   if (entry->lazyplt)
5070     {
5071       entry->lzplt_entry = dinfo->g.lzplt;
5072       dinfo->g.lzplt += 8;
5073       /* If this entry is the one that gets the resolver stub, account
5074 	 for the additional instruction.  */
5075       if (entry->lzplt_entry % FRVFDPIC_LZPLT_BLOCK_SIZE
5076 	  == FRVFDPIC_LZPLT_RESOLV_LOC)
5077 	dinfo->g.lzplt += 4;
5078     }
5079 
5080   if (entry->tlsplt)
5081     {
5082       int size;
5083 
5084       entry->tlsplt_entry
5085 	= frvfdpic_plt_section (dinfo->g.info)->size;
5086 
5087       if (bfd_link_executable (dinfo->g.info)
5088 	  && (entry->symndx != -1
5089 	      || FRVFDPIC_SYM_LOCAL (dinfo->g.info, entry->d.h)))
5090 	{
5091 	  if ((bfd_signed_vma)entry->addend >= -(1 << (16 - 1))
5092 	      /* FIXME: here we use the size of the TLS section
5093 		 as an upper bound for the value of the TLS
5094 		 symbol, because we may not know the exact value
5095 		 yet.  If we get it wrong, we'll just waste a
5096 		 word in the PLT, and we should never get even
5097 		 close to 32 KiB of TLS anyway.  */
5098 	      && elf_hash_table (dinfo->g.info)->tls_sec
5099 	      && (elf_hash_table (dinfo->g.info)->tls_sec->size
5100 		  + (bfd_signed_vma)(entry->addend) <= (1 << (16 - 1))))
5101 	    size = 8;
5102 	  else
5103 	    size = 12;
5104 	}
5105       else if (entry->tlsoff_entry)
5106 	{
5107 	  if (entry->tlsoff_entry >= -(1 << (12 - 1))
5108 	      && entry->tlsoff_entry < (1 << (12 - 1)))
5109 	    size = 8;
5110 	  else if (entry->tlsoff_entry >= -(1 << (16 - 1))
5111 		   && entry->tlsoff_entry < (1 << (16 - 1)))
5112 	    size = 12;
5113 	  else
5114 	    size = 16;
5115 	}
5116       else
5117 	{
5118 	  BFD_ASSERT (entry->tlsdesc_entry);
5119 
5120 	  if (entry->tlsdesc_entry >= -(1 << (12 - 1))
5121 	      && entry->tlsdesc_entry < (1 << (12 - 1)))
5122 	    size = 8;
5123 	  else if (entry->tlsdesc_entry >= -(1 << (16 - 1))
5124 		   && entry->tlsdesc_entry < (1 << (16 - 1)))
5125 	    size = 12;
5126 	  else
5127 	    size = 16;
5128 	}
5129 
5130       frvfdpic_plt_section (dinfo->g.info)->size += size;
5131     }
5132 
5133   return 1;
5134 }
5135 
5136 /* Cancel out any effects of calling _frvfdpic_assign_got_entries and
5137    _frvfdpic_assign_plt_entries.  */
5138 
5139 static int
5140 _frvfdpic_reset_got_plt_entries (void **entryp, void *ignore ATTRIBUTE_UNUSED)
5141 {
5142   struct frvfdpic_relocs_info *entry = *entryp;
5143 
5144   entry->got_entry = 0;
5145   entry->fdgot_entry = 0;
5146   entry->fd_entry = 0;
5147   entry->plt_entry = (bfd_vma)-1;
5148   entry->lzplt_entry = (bfd_vma)-1;
5149   entry->tlsoff_entry = 0;
5150   entry->tlsdesc_entry = 0;
5151   entry->tlsplt_entry = (bfd_vma)-1;
5152 
5153   return 1;
5154 }
5155 
5156 /* Follow indirect and warning hash entries so that each got entry
5157    points to the final symbol definition.  P must point to a pointer
5158    to the hash table we're traversing.  Since this traversal may
5159    modify the hash table, we set this pointer to NULL to indicate
5160    we've made a potentially-destructive change to the hash table, so
5161    the traversal must be restarted.  */
5162 static int
5163 _frvfdpic_resolve_final_relocs_info (void **entryp, void *p)
5164 {
5165   struct frvfdpic_relocs_info *entry = *entryp;
5166   htab_t *htab = p;
5167 
5168   if (entry->symndx == -1)
5169     {
5170       struct elf_link_hash_entry *h = entry->d.h;
5171       struct frvfdpic_relocs_info *oentry;
5172 
5173       while (h->root.type == bfd_link_hash_indirect
5174 	     || h->root.type == bfd_link_hash_warning)
5175 	h = (struct elf_link_hash_entry *)h->root.u.i.link;
5176 
5177       if (entry->d.h == h)
5178 	return 1;
5179 
5180       oentry = frvfdpic_relocs_info_for_global (*htab, 0, h, entry->addend,
5181 						NO_INSERT);
5182 
5183       if (oentry)
5184 	{
5185 	  /* Merge the two entries.  */
5186 	  frvfdpic_pic_merge_early_relocs_info (oentry, entry);
5187 	  htab_clear_slot (*htab, entryp);
5188 	  return 1;
5189 	}
5190 
5191       entry->d.h = h;
5192 
5193       /* If we can't find this entry with the new bfd hash, re-insert
5194 	 it, and get the traversal restarted.  */
5195       if (! htab_find (*htab, entry))
5196 	{
5197 	  htab_clear_slot (*htab, entryp);
5198 	  entryp = htab_find_slot (*htab, entry, INSERT);
5199 	  if (! *entryp)
5200 	    *entryp = entry;
5201 	  /* Abort the traversal, since the whole table may have
5202 	     moved, and leave it up to the parent to restart the
5203 	     process.  */
5204 	  *(htab_t *)p = NULL;
5205 	  return 0;
5206 	}
5207     }
5208 
5209   return 1;
5210 }
5211 
5212 /* Compute the total size of the GOT, the PLT, the dynamic relocations
5213    section and the rofixup section.  Assign locations for GOT and PLT
5214    entries.  */
5215 
5216 static bfd_boolean
5217 _frvfdpic_size_got_plt (bfd *output_bfd,
5218 			struct _frvfdpic_dynamic_got_plt_info *gpinfop)
5219 {
5220   bfd_signed_vma odd;
5221   bfd_vma limit, tlslimit;
5222   struct bfd_link_info *info = gpinfop->g.info;
5223   bfd *dynobj = elf_hash_table (info)->dynobj;
5224 
5225   memcpy (frvfdpic_dynamic_got_plt_info (info), &gpinfop->g,
5226 	  sizeof (gpinfop->g));
5227 
5228   odd = 12;
5229   /* Compute the total size taken by entries in the 12-bit and 16-bit
5230      ranges, to tell how many PLT function descriptors we can bring
5231      into the 12-bit range without causing the 16-bit range to
5232      overflow.  */
5233   limit = odd + gpinfop->g.got12 + gpinfop->g.gotlos
5234     + gpinfop->g.fd12 + gpinfop->g.fdlos
5235     + gpinfop->g.tlsd12 + gpinfop->g.tlsdlos;
5236   if (limit < (bfd_vma)1 << 16)
5237     limit = ((bfd_vma)1 << 16) - limit;
5238   else
5239     limit = 0;
5240   if (gpinfop->g.fdplt < limit)
5241     {
5242       tlslimit = (limit - gpinfop->g.fdplt) & ~ (bfd_vma) 8;
5243       limit = gpinfop->g.fdplt;
5244     }
5245   else
5246     tlslimit = 0;
5247   if (gpinfop->g.tlsdplt < tlslimit)
5248     tlslimit = gpinfop->g.tlsdplt;
5249 
5250   /* Determine the ranges of GOT offsets that we can use for each
5251      range of addressing modes.  */
5252   odd = _frvfdpic_compute_got_alloc_data (&gpinfop->got12,
5253 					  0,
5254 					  odd,
5255 					  16,
5256 					  gpinfop->g.got12,
5257 					  gpinfop->g.fd12,
5258 					  limit,
5259 					  gpinfop->g.tlsd12,
5260 					  tlslimit,
5261 					  (bfd_vma)1 << (12-1));
5262   odd = _frvfdpic_compute_got_alloc_data (&gpinfop->gotlos,
5263 					  gpinfop->got12.tmin,
5264 					  odd,
5265 					  gpinfop->got12.tmax,
5266 					  gpinfop->g.gotlos,
5267 					  gpinfop->g.fdlos,
5268 					  gpinfop->g.fdplt
5269 					  - gpinfop->got12.fdplt,
5270 					  gpinfop->g.tlsdlos,
5271 					  gpinfop->g.tlsdplt
5272 					  - gpinfop->got12.tlsdplt,
5273 					  (bfd_vma)1 << (16-1));
5274   odd = _frvfdpic_compute_got_alloc_data (&gpinfop->gothilo,
5275 					  gpinfop->gotlos.tmin,
5276 					  odd,
5277 					  gpinfop->gotlos.tmax,
5278 					  gpinfop->g.gothilo,
5279 					  gpinfop->g.fdhilo,
5280 					  gpinfop->g.fdplt
5281 					  - gpinfop->got12.fdplt
5282 					  - gpinfop->gotlos.fdplt,
5283 					  gpinfop->g.tlsdhilo,
5284 					  gpinfop->g.tlsdplt
5285 					  - gpinfop->got12.tlsdplt
5286 					  - gpinfop->gotlos.tlsdplt,
5287 					  (bfd_vma)1 << (32-1));
5288 
5289   /* Now assign (most) GOT offsets.  */
5290   htab_traverse (frvfdpic_relocs_info (info), _frvfdpic_assign_got_entries,
5291 		 gpinfop);
5292 
5293   frvfdpic_got_section (info)->size = gpinfop->gothilo.tmax
5294     - gpinfop->gothilo.tmin
5295     /* If an odd word is the last word of the GOT, we don't need this
5296        word to be part of the GOT.  */
5297     - (odd + 4 == gpinfop->gothilo.tmax ? 4 : 0);
5298   if (frvfdpic_got_section (info)->size == 0)
5299     frvfdpic_got_section (info)->flags |= SEC_EXCLUDE;
5300   else if (frvfdpic_got_section (info)->size == 12
5301 	   && ! elf_hash_table (info)->dynamic_sections_created)
5302     {
5303       frvfdpic_got_section (info)->flags |= SEC_EXCLUDE;
5304       frvfdpic_got_section (info)->size = 0;
5305     }
5306   /* This will be non-NULL during relaxation.  The assumption is that
5307      the size of one of these sections will never grow, only shrink,
5308      so we can use the larger buffer we allocated before.  */
5309   else if (frvfdpic_got_section (info)->contents == NULL)
5310     {
5311       frvfdpic_got_section (info)->contents =
5312 	(bfd_byte *) bfd_zalloc (dynobj,
5313 				 frvfdpic_got_section (info)->size);
5314       if (frvfdpic_got_section (info)->contents == NULL)
5315 	return FALSE;
5316     }
5317 
5318   if (frvfdpic_gotrel_section (info))
5319     /* Subtract the number of lzplt entries, since those will generate
5320        relocations in the pltrel section.  */
5321     frvfdpic_gotrel_section (info)->size =
5322       (gpinfop->g.relocs - gpinfop->g.lzplt / 8)
5323       * get_elf_backend_data (output_bfd)->s->sizeof_rel;
5324   else
5325     BFD_ASSERT (gpinfop->g.relocs == 0);
5326   if (frvfdpic_gotrel_section (info)->size == 0)
5327     frvfdpic_gotrel_section (info)->flags |= SEC_EXCLUDE;
5328   else if (frvfdpic_gotrel_section (info)->contents == NULL)
5329     {
5330       frvfdpic_gotrel_section (info)->contents =
5331 	(bfd_byte *) bfd_zalloc (dynobj,
5332 				 frvfdpic_gotrel_section (info)->size);
5333       if (frvfdpic_gotrel_section (info)->contents == NULL)
5334 	return FALSE;
5335     }
5336 
5337   frvfdpic_gotfixup_section (info)->size = (gpinfop->g.fixups + 1) * 4;
5338   if (frvfdpic_gotfixup_section (info)->size == 0)
5339     frvfdpic_gotfixup_section (info)->flags |= SEC_EXCLUDE;
5340   else if (frvfdpic_gotfixup_section (info)->contents == NULL)
5341     {
5342       frvfdpic_gotfixup_section (info)->contents =
5343 	(bfd_byte *) bfd_zalloc (dynobj,
5344 				 frvfdpic_gotfixup_section (info)->size);
5345       if (frvfdpic_gotfixup_section (info)->contents == NULL)
5346 	return FALSE;
5347     }
5348 
5349   if (frvfdpic_pltrel_section (info))
5350     {
5351       frvfdpic_pltrel_section (info)->size =
5352 	gpinfop->g.lzplt / 8
5353 	* get_elf_backend_data (output_bfd)->s->sizeof_rel;
5354       if (frvfdpic_pltrel_section (info)->size == 0)
5355 	frvfdpic_pltrel_section (info)->flags |= SEC_EXCLUDE;
5356       else if (frvfdpic_pltrel_section (info)->contents == NULL)
5357 	{
5358 	  frvfdpic_pltrel_section (info)->contents =
5359 	    (bfd_byte *) bfd_zalloc (dynobj,
5360 				     frvfdpic_pltrel_section (info)->size);
5361 	  if (frvfdpic_pltrel_section (info)->contents == NULL)
5362 	    return FALSE;
5363 	}
5364     }
5365 
5366   /* Add 4 bytes for every block of at most 65535 lazy PLT entries,
5367      such that there's room for the additional instruction needed to
5368      call the resolver.  Since _frvfdpic_assign_got_entries didn't
5369      account for them, our block size is 4 bytes smaller than the real
5370      block size.  */
5371   if (frvfdpic_plt_section (info))
5372     {
5373       frvfdpic_plt_section (info)->size = gpinfop->g.lzplt
5374 	+ ((gpinfop->g.lzplt + (FRVFDPIC_LZPLT_BLOCK_SIZE - 4) - 8)
5375 	   / (FRVFDPIC_LZPLT_BLOCK_SIZE - 4) * 4);
5376     }
5377 
5378   /* Reset it, such that _frvfdpic_assign_plt_entries() can use it to
5379      actually assign lazy PLT entries addresses.  */
5380   gpinfop->g.lzplt = 0;
5381 
5382   /* Save information that we're going to need to generate GOT and PLT
5383      entries.  */
5384   frvfdpic_got_initial_offset (info) = -gpinfop->gothilo.tmin;
5385 
5386   if (get_elf_backend_data (output_bfd)->want_got_sym)
5387     elf_hash_table (info)->hgot->root.u.def.value
5388       = frvfdpic_got_initial_offset (info);
5389 
5390   if (frvfdpic_plt_section (info))
5391     frvfdpic_plt_initial_offset (info) =
5392       frvfdpic_plt_section (info)->size;
5393 
5394   /* Allocate a ret statement at plt_initial_offset, to be used by
5395      locally-resolved TLS descriptors.  */
5396   if (gpinfop->g.tls_ret_refs)
5397     frvfdpic_plt_section (info)->size += 4;
5398 
5399   htab_traverse (frvfdpic_relocs_info (info), _frvfdpic_assign_plt_entries,
5400 		 gpinfop);
5401 
5402   /* Allocate the PLT section contents only after
5403      _frvfdpic_assign_plt_entries has a chance to add the size of the
5404      non-lazy PLT entries.  */
5405   if (frvfdpic_plt_section (info))
5406     {
5407       if (frvfdpic_plt_section (info)->size == 0)
5408 	frvfdpic_plt_section (info)->flags |= SEC_EXCLUDE;
5409       else if (frvfdpic_plt_section (info)->contents == NULL)
5410 	{
5411 	  frvfdpic_plt_section (info)->contents =
5412 	    (bfd_byte *) bfd_zalloc (dynobj,
5413 				     frvfdpic_plt_section (info)->size);
5414 	  if (frvfdpic_plt_section (info)->contents == NULL)
5415 	    return FALSE;
5416 	}
5417     }
5418 
5419   return TRUE;
5420 }
5421 
5422 /* Set the sizes of the dynamic sections.  */
5423 
5424 static bfd_boolean
5425 elf32_frvfdpic_size_dynamic_sections (bfd *output_bfd,
5426 				      struct bfd_link_info *info)
5427 {
5428   bfd *dynobj;
5429   asection *s;
5430   struct _frvfdpic_dynamic_got_plt_info gpinfo;
5431 
5432   dynobj = elf_hash_table (info)->dynobj;
5433   BFD_ASSERT (dynobj != NULL);
5434 
5435   if (elf_hash_table (info)->dynamic_sections_created)
5436     {
5437       /* Set the contents of the .interp section to the interpreter.  */
5438       if (bfd_link_executable (info) && !info->nointerp)
5439 	{
5440 	  s = bfd_get_linker_section (dynobj, ".interp");
5441 	  BFD_ASSERT (s != NULL);
5442 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5443 	  s->contents = (bfd_byte *) ELF_DYNAMIC_INTERPRETER;
5444 	}
5445     }
5446 
5447   memset (&gpinfo, 0, sizeof (gpinfo));
5448   gpinfo.g.info = info;
5449 
5450   for (;;)
5451     {
5452       htab_t relocs = frvfdpic_relocs_info (info);
5453 
5454       htab_traverse (relocs, _frvfdpic_resolve_final_relocs_info, &relocs);
5455 
5456       if (relocs == frvfdpic_relocs_info (info))
5457 	break;
5458     }
5459 
5460   htab_traverse (frvfdpic_relocs_info (info), _frvfdpic_count_got_plt_entries,
5461 		 &gpinfo.g);
5462 
5463   /* Allocate space to save the summary information, we're going to
5464      use it if we're doing relaxations.  */
5465   frvfdpic_dynamic_got_plt_info (info) = bfd_alloc (dynobj, sizeof (gpinfo.g));
5466 
5467   if (!_frvfdpic_size_got_plt (output_bfd, &gpinfo))
5468     return FALSE;
5469 
5470   if (elf_hash_table (info)->dynamic_sections_created)
5471     {
5472       if (frvfdpic_got_section (info)->size)
5473 	if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0))
5474 	  return FALSE;
5475 
5476       if (frvfdpic_pltrel_section (info)->size)
5477 	if (!_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
5478 	    || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_REL)
5479 	    || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
5480 	  return FALSE;
5481 
5482       if (frvfdpic_gotrel_section (info)->size)
5483 	if (!_bfd_elf_add_dynamic_entry (info, DT_REL, 0)
5484 	    || !_bfd_elf_add_dynamic_entry (info, DT_RELSZ, 0)
5485 	    || !_bfd_elf_add_dynamic_entry (info, DT_RELENT,
5486 					    sizeof (Elf32_External_Rel)))
5487 	  return FALSE;
5488     }
5489 
5490   return TRUE;
5491 }
5492 
5493 static bfd_boolean
5494 elf32_frvfdpic_always_size_sections (bfd *output_bfd,
5495 				     struct bfd_link_info *info)
5496 {
5497   if (!bfd_link_relocatable (info)
5498       && !bfd_elf_stack_segment_size (output_bfd, info,
5499 				      "__stacksize", DEFAULT_STACK_SIZE))
5500     return FALSE;
5501 
5502   return TRUE;
5503 }
5504 
5505 /* Check whether any of the relocations was optimized away, and
5506    subtract it from the relocation or fixup count.  */
5507 static bfd_boolean
5508 _frvfdpic_check_discarded_relocs (bfd *abfd, asection *sec,
5509 				  struct bfd_link_info *info,
5510 
5511 				  bfd_boolean *changed)
5512 {
5513   Elf_Internal_Shdr *symtab_hdr;
5514   struct elf_link_hash_entry **sym_hashes;
5515   Elf_Internal_Rela *rel, *erel;
5516 
5517   if ((sec->flags & SEC_RELOC) == 0
5518       || sec->reloc_count == 0)
5519     return TRUE;
5520 
5521   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5522   sym_hashes = elf_sym_hashes (abfd);
5523 
5524   rel = elf_section_data (sec)->relocs;
5525 
5526   /* Now examine each relocation.  */
5527   for (erel = rel + sec->reloc_count; rel < erel; rel++)
5528     {
5529       struct elf_link_hash_entry *h;
5530       unsigned long r_symndx;
5531       struct frvfdpic_relocs_info *picrel;
5532       struct _frvfdpic_dynamic_got_info *dinfo;
5533 
5534       if (ELF32_R_TYPE (rel->r_info) != R_FRV_32
5535 	  && ELF32_R_TYPE (rel->r_info) != R_FRV_FUNCDESC)
5536 	continue;
5537 
5538       if (_bfd_elf_section_offset (sec->output_section->owner,
5539 				   info, sec, rel->r_offset)
5540 	  != (bfd_vma)-1)
5541 	continue;
5542 
5543       r_symndx = ELF32_R_SYM (rel->r_info);
5544       if (r_symndx < symtab_hdr->sh_info)
5545 	h = NULL;
5546       else
5547 	{
5548 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5549 	  while (h->root.type == bfd_link_hash_indirect
5550 		 || h->root.type == bfd_link_hash_warning)
5551 	    h = (struct elf_link_hash_entry *)h->root.u.i.link;
5552 	}
5553 
5554       if (h != NULL)
5555 	picrel = frvfdpic_relocs_info_for_global (frvfdpic_relocs_info (info),
5556 						  abfd, h,
5557 						  rel->r_addend, NO_INSERT);
5558       else
5559 	picrel = frvfdpic_relocs_info_for_local (frvfdpic_relocs_info (info),
5560 						 abfd, r_symndx,
5561 						 rel->r_addend, NO_INSERT);
5562 
5563       if (! picrel)
5564 	return FALSE;
5565 
5566       *changed = TRUE;
5567       dinfo = frvfdpic_dynamic_got_plt_info (info);
5568 
5569       _frvfdpic_count_relocs_fixups (picrel, dinfo, TRUE);
5570       if (ELF32_R_TYPE (rel->r_info) == R_FRV_32)
5571 	picrel->relocs32--;
5572       else /* we know (ELF32_R_TYPE (rel->r_info) == R_FRV_FUNCDESC) */
5573 	picrel->relocsfd--;
5574       _frvfdpic_count_relocs_fixups (picrel, dinfo, FALSE);
5575     }
5576 
5577   return TRUE;
5578 }
5579 
5580 static bfd_boolean
5581 frvfdpic_elf_discard_info (bfd *ibfd,
5582 			   struct elf_reloc_cookie *cookie ATTRIBUTE_UNUSED,
5583 			   struct bfd_link_info *info)
5584 {
5585   bfd_boolean changed = FALSE;
5586   asection *s;
5587   bfd *obfd = NULL;
5588 
5589   /* Account for relaxation of .eh_frame section.  */
5590   for (s = ibfd->sections; s; s = s->next)
5591     if (s->sec_info_type == SEC_INFO_TYPE_EH_FRAME)
5592       {
5593 	if (!_frvfdpic_check_discarded_relocs (ibfd, s, info, &changed))
5594 	  return FALSE;
5595 	obfd = s->output_section->owner;
5596       }
5597 
5598   if (changed)
5599     {
5600       struct _frvfdpic_dynamic_got_plt_info gpinfo;
5601 
5602       memset (&gpinfo, 0, sizeof (gpinfo));
5603       memcpy (&gpinfo.g, frvfdpic_dynamic_got_plt_info (info),
5604 	      sizeof (gpinfo.g));
5605 
5606       /* Clear GOT and PLT assignments.  */
5607       htab_traverse (frvfdpic_relocs_info (info),
5608 		     _frvfdpic_reset_got_plt_entries,
5609 		     NULL);
5610 
5611       if (!_frvfdpic_size_got_plt (obfd, &gpinfo))
5612 	return FALSE;
5613     }
5614 
5615   return TRUE;
5616 }
5617 
5618 /* Look for opportunities to relax TLS relocations.  We can assume
5619    we're linking the main executable or a static-tls library, since
5620    otherwise we wouldn't have got here.  */
5621 
5622 static int
5623 _frvfdpic_relax_got_plt_entries (void **entryp, void *dinfo_)
5624 {
5625   struct frvfdpic_relocs_info *entry = *entryp;
5626   struct _frvfdpic_dynamic_got_info *dinfo = dinfo_;
5627 
5628   _frvfdpic_relax_tls_entries (entry, dinfo, TRUE);
5629 
5630   return 1;
5631 }
5632 
5633 static bfd_boolean
5634 elf32_frvfdpic_relax_section (bfd *abfd ATTRIBUTE_UNUSED, asection *sec,
5635 			      struct bfd_link_info *info, bfd_boolean *again)
5636 {
5637   struct _frvfdpic_dynamic_got_plt_info gpinfo;
5638 
5639   if (bfd_link_relocatable (info))
5640     (*info->callbacks->einfo)
5641       (_("%P%F: --relax and -r may not be used together\n"));
5642 
5643   /* If we return early, we didn't change anything.  */
5644   *again = FALSE;
5645 
5646   /* We'll do our thing when requested to relax the GOT section.  */
5647   if (sec != frvfdpic_got_section (info))
5648     return TRUE;
5649 
5650   /* We can only relax when linking the main executable or a library
5651      that can't be dlopened.  */
5652   if (! bfd_link_executable (info) && ! (info->flags & DF_STATIC_TLS))
5653     return TRUE;
5654 
5655   /* If there isn't a TLS section for this binary, we can't do
5656      anything about its TLS relocations (it probably doesn't have
5657      any.  */
5658   if (elf_hash_table (info)->tls_sec == NULL)
5659     return TRUE;
5660 
5661   memset (&gpinfo, 0, sizeof (gpinfo));
5662   memcpy (&gpinfo.g, frvfdpic_dynamic_got_plt_info (info), sizeof (gpinfo.g));
5663 
5664   /* Now look for opportunities to relax, adjusting the GOT usage
5665      as needed.  */
5666   htab_traverse (frvfdpic_relocs_info (info),
5667 		 _frvfdpic_relax_got_plt_entries,
5668 		 &gpinfo.g);
5669 
5670   /* If we changed anything, reset and re-assign GOT and PLT entries.  */
5671   if (memcmp (frvfdpic_dynamic_got_plt_info (info),
5672 	      &gpinfo.g, sizeof (gpinfo.g)) != 0)
5673     {
5674       /* Clear GOT and PLT assignments.  */
5675       htab_traverse (frvfdpic_relocs_info (info),
5676 		     _frvfdpic_reset_got_plt_entries,
5677 		     NULL);
5678 
5679       /* The owner of the TLS section is the output bfd.  There should
5680 	 be a better way to get to it.  */
5681       if (!_frvfdpic_size_got_plt (elf_hash_table (info)->tls_sec->owner,
5682 				   &gpinfo))
5683 	return FALSE;
5684 
5685       /* Repeat until we don't make any further changes.  We could fail to
5686 	 introduce changes in a round if, for example, the 12-bit range is
5687 	 full, but we later release some space by getting rid of TLS
5688 	 descriptors in it.  We have to repeat the whole process because
5689 	 we might have changed the size of a section processed before this
5690 	 one.  */
5691       *again = TRUE;
5692     }
5693 
5694   return TRUE;
5695 }
5696 
5697 /* Fill in code and data in dynamic sections.  */
5698 
5699 static bfd_boolean
5700 elf32_frv_finish_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
5701 				   struct bfd_link_info *info ATTRIBUTE_UNUSED)
5702 {
5703   /* Nothing to be done for non-FDPIC.  */
5704   return TRUE;
5705 }
5706 
5707 static bfd_boolean
5708 elf32_frvfdpic_finish_dynamic_sections (bfd *output_bfd,
5709 					struct bfd_link_info *info)
5710 {
5711   bfd *dynobj;
5712   asection *sdyn;
5713 
5714   dynobj = elf_hash_table (info)->dynobj;
5715 
5716   if (frvfdpic_dynamic_got_plt_info (info))
5717     {
5718       BFD_ASSERT (frvfdpic_dynamic_got_plt_info (info)->tls_ret_refs == 0);
5719     }
5720   if (frvfdpic_got_section (info))
5721     {
5722       BFD_ASSERT (frvfdpic_gotrel_section (info)->size
5723 		  == (frvfdpic_gotrel_section (info)->reloc_count
5724 		      * sizeof (Elf32_External_Rel)));
5725 
5726       if (frvfdpic_gotfixup_section (info))
5727 	{
5728 	  struct elf_link_hash_entry *hgot = elf_hash_table (info)->hgot;
5729 	  bfd_vma got_value = hgot->root.u.def.value
5730 	    + hgot->root.u.def.section->output_section->vma
5731 	    + hgot->root.u.def.section->output_offset;
5732 	  struct bfd_link_hash_entry *hend;
5733 
5734 	  _frvfdpic_add_rofixup (output_bfd, frvfdpic_gotfixup_section (info),
5735 				 got_value, 0);
5736 
5737 	  if (frvfdpic_gotfixup_section (info)->size
5738 	      != (frvfdpic_gotfixup_section (info)->reloc_count * 4))
5739 	    {
5740 	    error:
5741 	      info->callbacks->einfo
5742 		("LINKER BUG: .rofixup section size mismatch\n");
5743 	      return FALSE;
5744 	    }
5745 
5746 	  hend = bfd_link_hash_lookup (info->hash, "__ROFIXUP_END__",
5747 				       FALSE, FALSE, TRUE);
5748 	  if (hend
5749 	      && (hend->type == bfd_link_hash_defined
5750 		  || hend->type == bfd_link_hash_defweak)
5751 	      && hend->u.def.section->output_section != NULL)
5752 	    {
5753 	      bfd_vma value =
5754 		frvfdpic_gotfixup_section (info)->output_section->vma
5755 		+ frvfdpic_gotfixup_section (info)->output_offset
5756 		+ frvfdpic_gotfixup_section (info)->size
5757 		- hend->u.def.section->output_section->vma
5758 		- hend->u.def.section->output_offset;
5759 	      BFD_ASSERT (hend->u.def.value == value);
5760 	      if (hend->u.def.value != value)
5761 		goto error;
5762 	    }
5763 	}
5764     }
5765   if (frvfdpic_pltrel_section (info))
5766     {
5767       BFD_ASSERT (frvfdpic_pltrel_section (info)->size
5768 		  == (frvfdpic_pltrel_section (info)->reloc_count
5769 		      * sizeof (Elf32_External_Rel)));
5770     }
5771 
5772 
5773   if (elf_hash_table (info)->dynamic_sections_created)
5774     {
5775       Elf32_External_Dyn * dyncon;
5776       Elf32_External_Dyn * dynconend;
5777 
5778       sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5779 
5780       BFD_ASSERT (sdyn != NULL);
5781 
5782       dyncon = (Elf32_External_Dyn *) sdyn->contents;
5783       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
5784 
5785       for (; dyncon < dynconend; dyncon++)
5786 	{
5787 	  Elf_Internal_Dyn dyn;
5788 
5789 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5790 
5791 	  switch (dyn.d_tag)
5792 	    {
5793 	    default:
5794 	      break;
5795 
5796 	    case DT_PLTGOT:
5797 	      dyn.d_un.d_ptr = frvfdpic_got_section (info)->output_section->vma
5798 		+ frvfdpic_got_section (info)->output_offset
5799 		+ frvfdpic_got_initial_offset (info);
5800 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5801 	      break;
5802 
5803 	    case DT_JMPREL:
5804 	      dyn.d_un.d_ptr = frvfdpic_pltrel_section (info)
5805 		->output_section->vma
5806 		+ frvfdpic_pltrel_section (info)->output_offset;
5807 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5808 	      break;
5809 
5810 	    case DT_PLTRELSZ:
5811 	      dyn.d_un.d_val = frvfdpic_pltrel_section (info)->size;
5812 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5813 	      break;
5814 	    }
5815 	}
5816     }
5817 
5818   return TRUE;
5819 }
5820 
5821 /* Adjust a symbol defined by a dynamic object and referenced by a
5822    regular object.  */
5823 
5824 static bfd_boolean
5825 elf32_frvfdpic_adjust_dynamic_symbol
5826 (struct bfd_link_info *info ATTRIBUTE_UNUSED,
5827  struct elf_link_hash_entry *h ATTRIBUTE_UNUSED)
5828 {
5829   bfd * dynobj;
5830 
5831   dynobj = elf_hash_table (info)->dynobj;
5832 
5833   /* Make sure we know what is going on here.  */
5834   BFD_ASSERT (dynobj != NULL
5835 	      && (h->is_weakalias
5836 		  || (h->def_dynamic
5837 		      && h->ref_regular
5838 		      && !h->def_regular)));
5839 
5840   /* If this is a weak symbol, and there is a real definition, the
5841      processor independent code will have arranged for us to see the
5842      real definition first, and we can just use the same value.  */
5843   if (h->is_weakalias)
5844     {
5845       struct elf_link_hash_entry *def = weakdef (h);
5846       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
5847       h->root.u.def.section = def->root.u.def.section;
5848       h->root.u.def.value = def->root.u.def.value;
5849       return TRUE;
5850     }
5851 
5852   return TRUE;
5853 }
5854 
5855 /* Perform any actions needed for dynamic symbols.  */
5856 
5857 static bfd_boolean
5858 elf32_frvfdpic_finish_dynamic_symbol
5859 (bfd *output_bfd ATTRIBUTE_UNUSED,
5860  struct bfd_link_info *info ATTRIBUTE_UNUSED,
5861  struct elf_link_hash_entry *h ATTRIBUTE_UNUSED,
5862  Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
5863 {
5864   return TRUE;
5865 }
5866 
5867 /* Decide whether to attempt to turn absptr or lsda encodings in
5868    shared libraries into pcrel within the given input section.  */
5869 
5870 static bfd_boolean
5871 frvfdpic_elf_use_relative_eh_frame
5872 (bfd *input_bfd ATTRIBUTE_UNUSED,
5873  struct bfd_link_info *info ATTRIBUTE_UNUSED,
5874  asection *eh_frame_section ATTRIBUTE_UNUSED)
5875 {
5876   /* We can't use PC-relative encodings in FDPIC binaries, in general.  */
5877   return FALSE;
5878 }
5879 
5880 /* Adjust the contents of an eh_frame_hdr section before they're output.  */
5881 
5882 static bfd_byte
5883 frvfdpic_elf_encode_eh_address (bfd *abfd,
5884 				struct bfd_link_info *info,
5885 				asection *osec, bfd_vma offset,
5886 				asection *loc_sec, bfd_vma loc_offset,
5887 				bfd_vma *encoded)
5888 {
5889   struct elf_link_hash_entry *h;
5890 
5891   h = elf_hash_table (info)->hgot;
5892   BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
5893 
5894   if (! h || (_frvfdpic_osec_to_segment (abfd, osec)
5895 	      == _frvfdpic_osec_to_segment (abfd, loc_sec->output_section)))
5896     return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
5897 				       loc_sec, loc_offset, encoded);
5898 
5899   BFD_ASSERT (_frvfdpic_osec_to_segment (abfd, osec)
5900 	      == (_frvfdpic_osec_to_segment
5901 		  (abfd, h->root.u.def.section->output_section)));
5902 
5903   *encoded = osec->vma + offset
5904     - (h->root.u.def.value
5905        + h->root.u.def.section->output_section->vma
5906        + h->root.u.def.section->output_offset);
5907 
5908   return DW_EH_PE_datarel | DW_EH_PE_sdata4;
5909 }
5910 
5911 /* Look through the relocs for a section during the first phase.
5912 
5913    Besides handling virtual table relocs for gc, we have to deal with
5914    all sorts of PIC-related relocations.  We describe below the
5915    general plan on how to handle such relocations, even though we only
5916    collect information at this point, storing them in hash tables for
5917    perusal of later passes.
5918 
5919    32 relocations are propagated to the linker output when creating
5920    position-independent output.  LO16 and HI16 relocations are not
5921    supposed to be encountered in this case.
5922 
5923    LABEL16 should always be resolvable by the linker, since it's only
5924    used by branches.
5925 
5926    LABEL24, on the other hand, is used by calls.  If it turns out that
5927    the target of a call is a dynamic symbol, a PLT entry must be
5928    created for it, which triggers the creation of a private function
5929    descriptor and, unless lazy binding is disabled, a lazy PLT entry.
5930 
5931    GPREL relocations require the referenced symbol to be in the same
5932    segment as _gp, but this can only be checked later.
5933 
5934    All GOT, GOTOFF and FUNCDESC relocations require a .got section to
5935    exist.  LABEL24 might as well, since it may require a PLT entry,
5936    that will require a got.
5937 
5938    Non-FUNCDESC GOT relocations require a GOT entry to be created
5939    regardless of whether the symbol is dynamic.  However, since a
5940    global symbol that turns out to not be exported may have the same
5941    address of a non-dynamic symbol, we don't assign GOT entries at
5942    this point, such that we can share them in this case.  A relocation
5943    for the GOT entry always has to be created, be it to offset a
5944    private symbol by the section load address, be it to get the symbol
5945    resolved dynamically.
5946 
5947    FUNCDESC GOT relocations require a GOT entry to be created, and
5948    handled as if a FUNCDESC relocation was applied to the GOT entry in
5949    an object file.
5950 
5951    FUNCDESC relocations referencing a symbol that turns out to NOT be
5952    dynamic cause a private function descriptor to be created.  The
5953    FUNCDESC relocation then decays to a 32 relocation that points at
5954    the private descriptor.  If the symbol is dynamic, the FUNCDESC
5955    relocation is propagated to the linker output, such that the
5956    dynamic linker creates the canonical descriptor, pointing to the
5957    dynamically-resolved definition of the function.
5958 
5959    Non-FUNCDESC GOTOFF relocations must always refer to non-dynamic
5960    symbols that are assigned to the same segment as the GOT, but we
5961    can only check this later, after we know the complete set of
5962    symbols defined and/or exported.
5963 
5964    FUNCDESC GOTOFF relocations require a function descriptor to be
5965    created and, unless lazy binding is disabled or the symbol is not
5966    dynamic, a lazy PLT entry.  Since we can't tell at this point
5967    whether a symbol is going to be dynamic, we have to decide later
5968    whether to create a lazy PLT entry or bind the descriptor directly
5969    to the private function.
5970 
5971    FUNCDESC_VALUE relocations are not supposed to be present in object
5972    files, but they may very well be simply propagated to the linker
5973    output, since they have no side effect.
5974 
5975 
5976    A function descriptor always requires a FUNCDESC_VALUE relocation.
5977    Whether it's in .plt.rel or not depends on whether lazy binding is
5978    enabled and on whether the referenced symbol is dynamic.
5979 
5980    The existence of a lazy PLT requires the resolverStub lazy PLT
5981    entry to be present.
5982 
5983 
5984    As for assignment of GOT, PLT and lazy PLT entries, and private
5985    descriptors, we might do them all sequentially, but we can do
5986    better than that.  For example, we can place GOT entries and
5987    private function descriptors referenced using 12-bit operands
5988    closer to the PIC register value, such that these relocations don't
5989    overflow.  Those that are only referenced with LO16 relocations
5990    could come next, but we may as well place PLT-required function
5991    descriptors in the 12-bit range to make them shorter.  Symbols
5992    referenced with LO16/HI16 may come next, but we may place
5993    additional function descriptors in the 16-bit range if we can
5994    reliably tell that we've already placed entries that are ever
5995    referenced with only LO16.  PLT entries are therefore generated as
5996    small as possible, while not introducing relocation overflows in
5997    GOT or FUNCDESC_GOTOFF relocations.  Lazy PLT entries could be
5998    generated before or after PLT entries, but not intermingled with
5999    them, such that we can have more lazy PLT entries in range for a
6000    branch to the resolverStub.  The resolverStub should be emitted at
6001    the most distant location from the first lazy PLT entry such that
6002    it's still in range for a branch, or closer, if there isn't a need
6003    for so many lazy PLT entries.  Additional lazy PLT entries may be
6004    emitted after the resolverStub, as long as branches are still in
6005    range.  If the branch goes out of range, longer lazy PLT entries
6006    are emitted.
6007 
6008    We could further optimize PLT and lazy PLT entries by giving them
6009    priority in assignment to closer-to-gr17 locations depending on the
6010    number of occurrences of references to them (assuming a function
6011    that's called more often is more important for performance, so its
6012    PLT entry should be faster), or taking hints from the compiler.
6013    Given infinite time and money... :-)  */
6014 
6015 static bfd_boolean
6016 elf32_frv_check_relocs (bfd *abfd,
6017 			struct bfd_link_info *info,
6018 			asection *sec,
6019 			const Elf_Internal_Rela *relocs)
6020 {
6021   Elf_Internal_Shdr *symtab_hdr;
6022   struct elf_link_hash_entry **sym_hashes;
6023   const Elf_Internal_Rela *rel;
6024   const Elf_Internal_Rela *rel_end;
6025   bfd *dynobj;
6026   struct frvfdpic_relocs_info *picrel;
6027 
6028   if (bfd_link_relocatable (info))
6029     return TRUE;
6030 
6031   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6032   sym_hashes = elf_sym_hashes (abfd);
6033 
6034   dynobj = elf_hash_table (info)->dynobj;
6035   rel_end = relocs + sec->reloc_count;
6036   for (rel = relocs; rel < rel_end; rel++)
6037     {
6038       struct elf_link_hash_entry *h;
6039       unsigned long r_symndx;
6040 
6041       r_symndx = ELF32_R_SYM (rel->r_info);
6042       if (r_symndx < symtab_hdr->sh_info)
6043 	h = NULL;
6044       else
6045 	{
6046 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6047 	  while (h->root.type == bfd_link_hash_indirect
6048 		 || h->root.type == bfd_link_hash_warning)
6049 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
6050 	}
6051 
6052       switch (ELF32_R_TYPE (rel->r_info))
6053 	{
6054 	case R_FRV_GETTLSOFF:
6055 	case R_FRV_TLSDESC_VALUE:
6056 	case R_FRV_GOTTLSDESC12:
6057 	case R_FRV_GOTTLSDESCHI:
6058 	case R_FRV_GOTTLSDESCLO:
6059 	case R_FRV_GOTTLSOFF12:
6060 	case R_FRV_GOTTLSOFFHI:
6061 	case R_FRV_GOTTLSOFFLO:
6062 	case R_FRV_TLSOFF:
6063 	case R_FRV_GOT12:
6064 	case R_FRV_GOTHI:
6065 	case R_FRV_GOTLO:
6066 	case R_FRV_FUNCDESC_GOT12:
6067 	case R_FRV_FUNCDESC_GOTHI:
6068 	case R_FRV_FUNCDESC_GOTLO:
6069 	case R_FRV_GOTOFF12:
6070 	case R_FRV_GOTOFFHI:
6071 	case R_FRV_GOTOFFLO:
6072 	case R_FRV_FUNCDESC_GOTOFF12:
6073 	case R_FRV_FUNCDESC_GOTOFFHI:
6074 	case R_FRV_FUNCDESC_GOTOFFLO:
6075 	case R_FRV_FUNCDESC:
6076 	case R_FRV_FUNCDESC_VALUE:
6077 	case R_FRV_TLSMOFF12:
6078 	case R_FRV_TLSMOFFHI:
6079 	case R_FRV_TLSMOFFLO:
6080 	case R_FRV_TLSMOFF:
6081 	  if (! IS_FDPIC (abfd))
6082 	    goto bad_reloc;
6083 	  /* Fall through.  */
6084 	case R_FRV_GPREL12:
6085 	case R_FRV_GPRELU12:
6086 	case R_FRV_GPRELHI:
6087 	case R_FRV_GPRELLO:
6088 	case R_FRV_LABEL24:
6089 	case R_FRV_32:
6090 	  if (! dynobj)
6091 	    {
6092 	      elf_hash_table (info)->dynobj = dynobj = abfd;
6093 	      if (! _frv_create_got_section (abfd, info))
6094 		return FALSE;
6095 	    }
6096 	  if (! IS_FDPIC (abfd))
6097 	    {
6098 	      picrel = NULL;
6099 	      break;
6100 	    }
6101 	  if (h != NULL)
6102 	    {
6103 	      if (h->dynindx == -1)
6104 		switch (ELF_ST_VISIBILITY (h->other))
6105 		  {
6106 		  case STV_INTERNAL:
6107 		  case STV_HIDDEN:
6108 		    break;
6109 		  default:
6110 		    bfd_elf_link_record_dynamic_symbol (info, h);
6111 		    break;
6112 		  }
6113 	      picrel
6114 		= frvfdpic_relocs_info_for_global (frvfdpic_relocs_info (info),
6115 						   abfd, h,
6116 						   rel->r_addend, INSERT);
6117 	    }
6118 	  else
6119 	    picrel = frvfdpic_relocs_info_for_local (frvfdpic_relocs_info
6120 						     (info), abfd, r_symndx,
6121 						     rel->r_addend, INSERT);
6122 	  if (! picrel)
6123 	    return FALSE;
6124 	  break;
6125 
6126 	default:
6127 	  picrel = NULL;
6128 	  break;
6129 	}
6130 
6131       switch (ELF32_R_TYPE (rel->r_info))
6132 	{
6133 	case R_FRV_LABEL24:
6134 	  if (IS_FDPIC (abfd))
6135 	    picrel->call = 1;
6136 	  break;
6137 
6138 	case R_FRV_FUNCDESC_VALUE:
6139 	  picrel->relocsfdv++;
6140 	  if (bfd_get_section_flags (abfd, sec) & SEC_ALLOC)
6141 	    picrel->relocs32--;
6142 	  /* Fall through.  */
6143 
6144 	case R_FRV_32:
6145 	  if (! IS_FDPIC (abfd))
6146 	    break;
6147 
6148 	  picrel->sym = 1;
6149 	  if (bfd_get_section_flags (abfd, sec) & SEC_ALLOC)
6150 	    picrel->relocs32++;
6151 	  break;
6152 
6153 	case R_FRV_GOT12:
6154 	  picrel->got12 = 1;
6155 	  break;
6156 
6157 	case R_FRV_GOTHI:
6158 	case R_FRV_GOTLO:
6159 	  picrel->gothilo = 1;
6160 	  break;
6161 
6162 	case R_FRV_FUNCDESC_GOT12:
6163 	  picrel->fdgot12 = 1;
6164 	  break;
6165 
6166 	case R_FRV_FUNCDESC_GOTHI:
6167 	case R_FRV_FUNCDESC_GOTLO:
6168 	  picrel->fdgothilo = 1;
6169 	  break;
6170 
6171 	case R_FRV_GOTOFF12:
6172 	case R_FRV_GOTOFFHI:
6173 	case R_FRV_GOTOFFLO:
6174 	  picrel->gotoff = 1;
6175 	  break;
6176 
6177 	case R_FRV_FUNCDESC_GOTOFF12:
6178 	  picrel->fdgoff12 = 1;
6179 	  break;
6180 
6181 	case R_FRV_FUNCDESC_GOTOFFHI:
6182 	case R_FRV_FUNCDESC_GOTOFFLO:
6183 	  picrel->fdgoffhilo = 1;
6184 	  break;
6185 
6186 	case R_FRV_FUNCDESC:
6187 	  picrel->fd = 1;
6188 	  picrel->relocsfd++;
6189 	  break;
6190 
6191 	case R_FRV_GETTLSOFF:
6192 	  picrel->tlsplt = 1;
6193 	  break;
6194 
6195 	case R_FRV_TLSDESC_VALUE:
6196 	  picrel->relocstlsd++;
6197 	  goto bad_reloc;
6198 
6199 	case R_FRV_GOTTLSDESC12:
6200 	  picrel->tlsdesc12 = 1;
6201 	  break;
6202 
6203 	case R_FRV_GOTTLSDESCHI:
6204 	case R_FRV_GOTTLSDESCLO:
6205 	  picrel->tlsdeschilo = 1;
6206 	  break;
6207 
6208 	case R_FRV_TLSMOFF12:
6209 	case R_FRV_TLSMOFFHI:
6210 	case R_FRV_TLSMOFFLO:
6211 	case R_FRV_TLSMOFF:
6212 	  break;
6213 
6214 	case R_FRV_GOTTLSOFF12:
6215 	  picrel->tlsoff12 = 1;
6216 	  info->flags |= DF_STATIC_TLS;
6217 	  break;
6218 
6219 	case R_FRV_GOTTLSOFFHI:
6220 	case R_FRV_GOTTLSOFFLO:
6221 	  picrel->tlsoffhilo = 1;
6222 	  info->flags |= DF_STATIC_TLS;
6223 	  break;
6224 
6225 	case R_FRV_TLSOFF:
6226 	  picrel->relocstlsoff++;
6227 	  info->flags |= DF_STATIC_TLS;
6228 	  goto bad_reloc;
6229 
6230 	/* This relocation describes the C++ object vtable hierarchy.
6231 	   Reconstruct it for later use during GC.  */
6232 	case R_FRV_GNU_VTINHERIT:
6233 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
6234 	    return FALSE;
6235 	  break;
6236 
6237 	/* This relocation describes which C++ vtable entries are actually
6238 	   used.  Record for later use during GC.  */
6239 	case R_FRV_GNU_VTENTRY:
6240 	  BFD_ASSERT (h != NULL);
6241 	  if (h != NULL
6242 	      && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
6243 	    return FALSE;
6244 	  break;
6245 
6246 	case R_FRV_LABEL16:
6247 	case R_FRV_LO16:
6248 	case R_FRV_HI16:
6249 	case R_FRV_GPREL12:
6250 	case R_FRV_GPRELU12:
6251 	case R_FRV_GPREL32:
6252 	case R_FRV_GPRELHI:
6253 	case R_FRV_GPRELLO:
6254 	case R_FRV_TLSDESC_RELAX:
6255 	case R_FRV_GETTLSOFF_RELAX:
6256 	case R_FRV_TLSOFF_RELAX:
6257 	  break;
6258 
6259 	default:
6260 	bad_reloc:
6261 	  /* xgettext:c-format */
6262 	  _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
6263 			      abfd, (unsigned int) ELF32_R_TYPE (rel->r_info));
6264 	  return FALSE;
6265 	}
6266     }
6267 
6268   return TRUE;
6269 }
6270 
6271 
6272 /* Return the machine subcode from the ELF e_flags header.  */
6273 
6274 static int
6275 elf32_frv_machine (bfd *abfd)
6276 {
6277   switch (elf_elfheader (abfd)->e_flags & EF_FRV_CPU_MASK)
6278     {
6279     default:		    break;
6280     case EF_FRV_CPU_FR550:  return bfd_mach_fr550;
6281     case EF_FRV_CPU_FR500:  return bfd_mach_fr500;
6282     case EF_FRV_CPU_FR450:  return bfd_mach_fr450;
6283     case EF_FRV_CPU_FR405:  return bfd_mach_fr400;
6284     case EF_FRV_CPU_FR400:  return bfd_mach_fr400;
6285     case EF_FRV_CPU_FR300:  return bfd_mach_fr300;
6286     case EF_FRV_CPU_SIMPLE: return bfd_mach_frvsimple;
6287     case EF_FRV_CPU_TOMCAT: return bfd_mach_frvtomcat;
6288     }
6289 
6290   return bfd_mach_frv;
6291 }
6292 
6293 /* Set the right machine number for a FRV ELF file.  */
6294 
6295 static bfd_boolean
6296 elf32_frv_object_p (bfd *abfd)
6297 {
6298   bfd_default_set_arch_mach (abfd, bfd_arch_frv, elf32_frv_machine (abfd));
6299   return (((elf_elfheader (abfd)->e_flags & EF_FRV_FDPIC) != 0)
6300 	  == (IS_FDPIC (abfd)));
6301 }
6302 
6303 /* Function to set the ELF flag bits.  */
6304 
6305 static bfd_boolean
6306 frv_elf_set_private_flags (bfd *abfd, flagword flags)
6307 {
6308   elf_elfheader (abfd)->e_flags = flags;
6309   elf_flags_init (abfd) = TRUE;
6310   return TRUE;
6311 }
6312 
6313 /* Return true if the architecture described by elf header flag
6314    EXTENSION is an extension of the architecture described by BASE.  */
6315 
6316 static bfd_boolean
6317 frv_elf_arch_extension_p (flagword base, flagword extension)
6318 {
6319   if (base == extension)
6320     return TRUE;
6321 
6322   /* CPU_GENERIC code can be merged with code for a specific
6323      architecture, in which case the result is marked as being
6324      for the specific architecture.  Everything is therefore
6325      an extension of CPU_GENERIC.  */
6326   if (base == EF_FRV_CPU_GENERIC)
6327     return TRUE;
6328 
6329   if (extension == EF_FRV_CPU_FR450)
6330     if (base == EF_FRV_CPU_FR400 || base == EF_FRV_CPU_FR405)
6331       return TRUE;
6332 
6333   if (extension == EF_FRV_CPU_FR405)
6334     if (base == EF_FRV_CPU_FR400)
6335       return TRUE;
6336 
6337   return FALSE;
6338 }
6339 
6340 /* Merge backend specific data from an object file to the output
6341    object file when linking.  */
6342 
6343 static bfd_boolean
6344 frv_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
6345 {
6346   bfd *obfd = info->output_bfd;
6347   flagword old_flags, old_partial;
6348   flagword new_flags, new_partial;
6349   bfd_boolean error = FALSE;
6350   char new_opt[80];
6351   char old_opt[80];
6352 
6353   new_opt[0] = old_opt[0] = '\0';
6354   new_flags = elf_elfheader (ibfd)->e_flags;
6355   old_flags = elf_elfheader (obfd)->e_flags;
6356 
6357   if (new_flags & EF_FRV_FDPIC)
6358     new_flags &= ~EF_FRV_PIC;
6359 
6360 #ifdef DEBUG
6361   _bfd_error_handler
6362     ("old_flags = 0x%.8x, new_flags = 0x%.8x, init = %s, filename = %s",
6363      old_flags, new_flags, elf_flags_init (obfd) ? "yes" : "no",
6364      bfd_get_filename (ibfd));
6365 #endif
6366 
6367   if (!elf_flags_init (obfd))			/* First call, no flags set.  */
6368     {
6369       elf_flags_init (obfd) = TRUE;
6370       old_flags = new_flags;
6371     }
6372 
6373   else if (new_flags == old_flags)		/* Compatible flags are ok.  */
6374     ;
6375 
6376   else						/* Possibly incompatible flags.  */
6377     {
6378       /* Warn if different # of gprs are used.  Note, 0 means nothing is
6379 	 said about the size of gprs.  */
6380       new_partial = (new_flags & EF_FRV_GPR_MASK);
6381       old_partial = (old_flags & EF_FRV_GPR_MASK);
6382       if (new_partial == old_partial)
6383 	;
6384 
6385       else if (new_partial == 0)
6386 	;
6387 
6388       else if (old_partial == 0)
6389 	old_flags |= new_partial;
6390 
6391       else
6392 	{
6393 	  switch (new_partial)
6394 	    {
6395 	    default:		strcat (new_opt, " -mgpr-??"); break;
6396 	    case EF_FRV_GPR_32: strcat (new_opt, " -mgpr-32"); break;
6397 	    case EF_FRV_GPR_64: strcat (new_opt, " -mgpr-64"); break;
6398 	    }
6399 
6400 	  switch (old_partial)
6401 	    {
6402 	    default:		strcat (old_opt, " -mgpr-??"); break;
6403 	    case EF_FRV_GPR_32: strcat (old_opt, " -mgpr-32"); break;
6404 	    case EF_FRV_GPR_64: strcat (old_opt, " -mgpr-64"); break;
6405 	    }
6406 	}
6407 
6408       /* Warn if different # of fprs are used.  Note, 0 means nothing is
6409 	 said about the size of fprs.  */
6410       new_partial = (new_flags & EF_FRV_FPR_MASK);
6411       old_partial = (old_flags & EF_FRV_FPR_MASK);
6412       if (new_partial == old_partial)
6413 	;
6414 
6415       else if (new_partial == 0)
6416 	;
6417 
6418       else if (old_partial == 0)
6419 	old_flags |= new_partial;
6420 
6421       else
6422 	{
6423 	  switch (new_partial)
6424 	    {
6425 	    default:		  strcat (new_opt, " -mfpr-?");      break;
6426 	    case EF_FRV_FPR_32:   strcat (new_opt, " -mfpr-32");     break;
6427 	    case EF_FRV_FPR_64:   strcat (new_opt, " -mfpr-64");     break;
6428 	    case EF_FRV_FPR_NONE: strcat (new_opt, " -msoft-float"); break;
6429 	    }
6430 
6431 	  switch (old_partial)
6432 	    {
6433 	    default:		  strcat (old_opt, " -mfpr-?");      break;
6434 	    case EF_FRV_FPR_32:   strcat (old_opt, " -mfpr-32");     break;
6435 	    case EF_FRV_FPR_64:   strcat (old_opt, " -mfpr-64");     break;
6436 	    case EF_FRV_FPR_NONE: strcat (old_opt, " -msoft-float"); break;
6437 	    }
6438 	}
6439 
6440       /* Warn if different dword support was used.  Note, 0 means nothing is
6441 	 said about the dword support.  */
6442       new_partial = (new_flags & EF_FRV_DWORD_MASK);
6443       old_partial = (old_flags & EF_FRV_DWORD_MASK);
6444       if (new_partial == old_partial)
6445 	;
6446 
6447       else if (new_partial == 0)
6448 	;
6449 
6450       else if (old_partial == 0)
6451 	old_flags |= new_partial;
6452 
6453       else
6454 	{
6455 	  switch (new_partial)
6456 	    {
6457 	    default:		   strcat (new_opt, " -mdword-?");  break;
6458 	    case EF_FRV_DWORD_YES: strcat (new_opt, " -mdword");    break;
6459 	    case EF_FRV_DWORD_NO:  strcat (new_opt, " -mno-dword"); break;
6460 	    }
6461 
6462 	  switch (old_partial)
6463 	    {
6464 	    default:		   strcat (old_opt, " -mdword-?");  break;
6465 	    case EF_FRV_DWORD_YES: strcat (old_opt, " -mdword");    break;
6466 	    case EF_FRV_DWORD_NO:  strcat (old_opt, " -mno-dword"); break;
6467 	    }
6468 	}
6469 
6470       /* Or in flags that accumulate (ie, if one module uses it, mark that the
6471 	 feature is used.  */
6472       old_flags |= new_flags & (EF_FRV_DOUBLE
6473 				| EF_FRV_MEDIA
6474 				| EF_FRV_MULADD
6475 				| EF_FRV_NON_PIC_RELOCS);
6476 
6477       /* If any module was compiled without -G0, clear the G0 bit.  */
6478       old_flags = ((old_flags & ~ EF_FRV_G0)
6479 		   | (old_flags & new_flags & EF_FRV_G0));
6480 
6481       /* If any module was compiled without -mnopack, clear the mnopack bit.  */
6482       old_flags = ((old_flags & ~ EF_FRV_NOPACK)
6483 		   | (old_flags & new_flags & EF_FRV_NOPACK));
6484 
6485       /* We don't have to do anything if the pic flags are the same, or the new
6486 	 module(s) were compiled with -mlibrary-pic.  */
6487       new_partial = (new_flags & EF_FRV_PIC_FLAGS);
6488       old_partial = (old_flags & EF_FRV_PIC_FLAGS);
6489       if ((new_partial == old_partial) || ((new_partial & EF_FRV_LIBPIC) != 0))
6490 	;
6491 
6492       /* If the old module(s) were compiled with -mlibrary-pic, copy in the pic
6493 	 flags if any from the new module.  */
6494       else if ((old_partial & EF_FRV_LIBPIC) != 0)
6495 	old_flags = (old_flags & ~ EF_FRV_PIC_FLAGS) | new_partial;
6496 
6497       /* If we have mixtures of -fpic and -fPIC, or in both bits.  */
6498       else if (new_partial != 0 && old_partial != 0)
6499 	old_flags |= new_partial;
6500 
6501       /* One module was compiled for pic and the other was not, see if we have
6502 	 had any relocations that are not pic-safe.  */
6503       else
6504 	{
6505 	  if ((old_flags & EF_FRV_NON_PIC_RELOCS) == 0)
6506 	    old_flags |= new_partial;
6507 	  else
6508 	    {
6509 	      old_flags &= ~ EF_FRV_PIC_FLAGS;
6510 #ifndef FRV_NO_PIC_ERROR
6511 	      error = TRUE;
6512 	      _bfd_error_handler
6513 		/* xgettext:c-format */
6514 		(_("%pB: compiled with %s and linked with modules"
6515 		   " that use non-pic relocations"),
6516 		 ibfd, (new_flags & EF_FRV_BIGPIC) ? "-fPIC" : "-fpic");
6517 #endif
6518 	    }
6519 	}
6520 
6521       /* Warn if different cpu is used (allow a specific cpu to override
6522 	 the generic cpu).  */
6523       new_partial = (new_flags & EF_FRV_CPU_MASK);
6524       old_partial = (old_flags & EF_FRV_CPU_MASK);
6525       if (frv_elf_arch_extension_p (new_partial, old_partial))
6526 	;
6527 
6528       else if (frv_elf_arch_extension_p (old_partial, new_partial))
6529 	old_flags = (old_flags & ~EF_FRV_CPU_MASK) | new_partial;
6530 
6531       else
6532 	{
6533 	  switch (new_partial)
6534 	    {
6535 	    default:		     strcat (new_opt, " -mcpu=?");      break;
6536 	    case EF_FRV_CPU_GENERIC: strcat (new_opt, " -mcpu=frv");    break;
6537 	    case EF_FRV_CPU_SIMPLE:  strcat (new_opt, " -mcpu=simple"); break;
6538 	    case EF_FRV_CPU_FR550:   strcat (new_opt, " -mcpu=fr550");  break;
6539 	    case EF_FRV_CPU_FR500:   strcat (new_opt, " -mcpu=fr500");  break;
6540 	    case EF_FRV_CPU_FR450:   strcat (new_opt, " -mcpu=fr450");  break;
6541 	    case EF_FRV_CPU_FR405:   strcat (new_opt, " -mcpu=fr405");  break;
6542 	    case EF_FRV_CPU_FR400:   strcat (new_opt, " -mcpu=fr400");  break;
6543 	    case EF_FRV_CPU_FR300:   strcat (new_opt, " -mcpu=fr300");  break;
6544 	    case EF_FRV_CPU_TOMCAT:  strcat (new_opt, " -mcpu=tomcat"); break;
6545 	    }
6546 
6547 	  switch (old_partial)
6548 	    {
6549 	    default:		     strcat (old_opt, " -mcpu=?");      break;
6550 	    case EF_FRV_CPU_GENERIC: strcat (old_opt, " -mcpu=frv");    break;
6551 	    case EF_FRV_CPU_SIMPLE:  strcat (old_opt, " -mcpu=simple"); break;
6552 	    case EF_FRV_CPU_FR550:   strcat (old_opt, " -mcpu=fr550");  break;
6553 	    case EF_FRV_CPU_FR500:   strcat (old_opt, " -mcpu=fr500");  break;
6554 	    case EF_FRV_CPU_FR450:   strcat (old_opt, " -mcpu=fr450");  break;
6555 	    case EF_FRV_CPU_FR405:   strcat (old_opt, " -mcpu=fr405");  break;
6556 	    case EF_FRV_CPU_FR400:   strcat (old_opt, " -mcpu=fr400");  break;
6557 	    case EF_FRV_CPU_FR300:   strcat (old_opt, " -mcpu=fr300");  break;
6558 	    case EF_FRV_CPU_TOMCAT:  strcat (old_opt, " -mcpu=tomcat"); break;
6559 	    }
6560 	}
6561 
6562       /* Print out any mismatches from above.  */
6563       if (new_opt[0])
6564 	{
6565 	  error = TRUE;
6566 	  _bfd_error_handler
6567 	    /* xgettext:c-format */
6568 	    (_("%pB: compiled with %s and linked with modules compiled with %s"),
6569 	     ibfd, new_opt, old_opt);
6570 	}
6571 
6572       /* Warn about any other mismatches */
6573       new_partial = (new_flags & ~ EF_FRV_ALL_FLAGS);
6574       old_partial = (old_flags & ~ EF_FRV_ALL_FLAGS);
6575       if (new_partial != old_partial)
6576 	{
6577 	  old_flags |= new_partial;
6578 	  error = TRUE;
6579 	  _bfd_error_handler
6580 	    /* xgettext:c-format */
6581 	    (_("%pB: uses different unknown e_flags (%#x) fields"
6582 	       " than previous modules (%#x)"),
6583 	     ibfd, new_partial, old_partial);
6584 	}
6585     }
6586 
6587   /* If the cpu is -mcpu=simple, then set the -mnopack bit.  */
6588   if ((old_flags & EF_FRV_CPU_MASK) == EF_FRV_CPU_SIMPLE)
6589     old_flags |= EF_FRV_NOPACK;
6590 
6591   /* Update the old flags now with changes made above.  */
6592   old_partial = elf_elfheader (obfd)->e_flags & EF_FRV_CPU_MASK;
6593   elf_elfheader (obfd)->e_flags = old_flags;
6594   if (old_partial != (old_flags & EF_FRV_CPU_MASK))
6595     bfd_default_set_arch_mach (obfd, bfd_arch_frv, elf32_frv_machine (obfd));
6596 
6597   if (((new_flags & EF_FRV_FDPIC) == 0)
6598       != (! IS_FDPIC (ibfd)))
6599     {
6600       error = TRUE;
6601       if (IS_FDPIC (obfd))
6602 	_bfd_error_handler
6603 	  (_("%pB: cannot link non-fdpic object file into fdpic executable"),
6604 	   ibfd);
6605       else
6606 	_bfd_error_handler
6607 	  (_("%pB: cannot link fdpic object file into non-fdpic executable"),
6608 	   ibfd);
6609     }
6610 
6611   if (error)
6612     bfd_set_error (bfd_error_bad_value);
6613 
6614   return !error;
6615 }
6616 
6617 
6618 static bfd_boolean
6619 frv_elf_print_private_bfd_data (bfd *abfd, void * ptr)
6620 {
6621   FILE *file = (FILE *) ptr;
6622   flagword flags;
6623 
6624   BFD_ASSERT (abfd != NULL && ptr != NULL);
6625 
6626   /* Print normal ELF private data.  */
6627   _bfd_elf_print_private_bfd_data (abfd, ptr);
6628 
6629   flags = elf_elfheader (abfd)->e_flags;
6630   fprintf (file, _("private flags = 0x%lx:"), (unsigned long) flags);
6631 
6632   switch (flags & EF_FRV_CPU_MASK)
6633     {
6634     default:							break;
6635     case EF_FRV_CPU_SIMPLE: fprintf (file, " -mcpu=simple");	break;
6636     case EF_FRV_CPU_FR550:  fprintf (file, " -mcpu=fr550");	break;
6637     case EF_FRV_CPU_FR500:  fprintf (file, " -mcpu=fr500");	break;
6638     case EF_FRV_CPU_FR450:  fprintf (file, " -mcpu=fr450");	break;
6639     case EF_FRV_CPU_FR405:  fprintf (file, " -mcpu=fr405");	break;
6640     case EF_FRV_CPU_FR400:  fprintf (file, " -mcpu=fr400");	break;
6641     case EF_FRV_CPU_FR300:  fprintf (file, " -mcpu=fr300");	break;
6642     case EF_FRV_CPU_TOMCAT: fprintf (file, " -mcpu=tomcat");	break;
6643     }
6644 
6645   switch (flags & EF_FRV_GPR_MASK)
6646     {
6647     default:							break;
6648     case EF_FRV_GPR_32: fprintf (file, " -mgpr-32");		break;
6649     case EF_FRV_GPR_64: fprintf (file, " -mgpr-64");		break;
6650     }
6651 
6652   switch (flags & EF_FRV_FPR_MASK)
6653     {
6654     default:							break;
6655     case EF_FRV_FPR_32:   fprintf (file, " -mfpr-32");		break;
6656     case EF_FRV_FPR_64:   fprintf (file, " -mfpr-64");		break;
6657     case EF_FRV_FPR_NONE: fprintf (file, " -msoft-float");	break;
6658     }
6659 
6660   switch (flags & EF_FRV_DWORD_MASK)
6661     {
6662     default:							break;
6663     case EF_FRV_DWORD_YES: fprintf (file, " -mdword");		break;
6664     case EF_FRV_DWORD_NO:  fprintf (file, " -mno-dword");	break;
6665     }
6666 
6667   if (flags & EF_FRV_DOUBLE)
6668     fprintf (file, " -mdouble");
6669 
6670   if (flags & EF_FRV_MEDIA)
6671     fprintf (file, " -mmedia");
6672 
6673   if (flags & EF_FRV_MULADD)
6674     fprintf (file, " -mmuladd");
6675 
6676   if (flags & EF_FRV_PIC)
6677     fprintf (file, " -fpic");
6678 
6679   if (flags & EF_FRV_BIGPIC)
6680     fprintf (file, " -fPIC");
6681 
6682   if (flags & EF_FRV_LIBPIC)
6683     fprintf (file, " -mlibrary-pic");
6684 
6685   if (flags & EF_FRV_FDPIC)
6686     fprintf (file, " -mfdpic");
6687 
6688   if (flags & EF_FRV_NON_PIC_RELOCS)
6689     fprintf (file, " non-pic relocations");
6690 
6691   if (flags & EF_FRV_G0)
6692     fprintf (file, " -G0");
6693 
6694   fputc ('\n', file);
6695   return TRUE;
6696 }
6697 
6698 
6699 /* Support for core dump NOTE sections.  */
6700 
6701 static bfd_boolean
6702 elf32_frv_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
6703 {
6704   int offset;
6705   unsigned int raw_size;
6706 
6707   switch (note->descsz)
6708     {
6709       default:
6710 	return FALSE;
6711 
6712       /* The Linux/FRV elf_prstatus struct is 268 bytes long.  The other
6713 	 hardcoded offsets and sizes listed below (and contained within
6714 	 this lexical block) refer to fields in the target's elf_prstatus
6715 	 struct.  */
6716       case 268:
6717 	/* `pr_cursig' is at offset 12.  */
6718 	elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
6719 
6720 	/* `pr_pid' is at offset 24.  */
6721 	elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
6722 
6723 	/* `pr_reg' is at offset 72.  */
6724 	offset = 72;
6725 
6726 	/* Most grok_prstatus implementations set `raw_size' to the size
6727 	   of the pr_reg field.  For Linux/FRV, we set `raw_size' to be
6728 	   the size of `pr_reg' plus the size of `pr_exec_fdpic_loadmap'
6729 	   and `pr_interp_fdpic_loadmap', both of which (by design)
6730 	   immediately follow `pr_reg'.  This will allow these fields to
6731 	   be viewed by GDB as registers.
6732 
6733 	   `pr_reg' is 184 bytes long.  `pr_exec_fdpic_loadmap' and
6734 	   `pr_interp_fdpic_loadmap' are 4 bytes each.  */
6735 	raw_size = 184 + 4 + 4;
6736 
6737 	break;
6738     }
6739 
6740   /* Make a ".reg/999" section.  */
6741   return _bfd_elfcore_make_pseudosection (abfd, ".reg", raw_size,
6742 					  note->descpos + offset);
6743 }
6744 
6745 static bfd_boolean
6746 elf32_frv_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
6747 {
6748   switch (note->descsz)
6749     {
6750       default:
6751 	return FALSE;
6752 
6753       /* The Linux/FRV elf_prpsinfo struct is 124 bytes long.  */
6754       case 124:
6755 
6756 	/* `pr_fname' is found at offset 28 and is 16 bytes long.  */
6757 	elf_tdata (abfd)->core->program
6758 	  = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
6759 
6760 	/* `pr_psargs' is found at offset 44 and is 80 bytes long.  */
6761 	elf_tdata (abfd)->core->command
6762 	  = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
6763     }
6764 
6765   /* Note that for some reason, a spurious space is tacked
6766      onto the end of the args in some (at least one anyway)
6767      implementations, so strip it off if it exists.  */
6768 
6769   {
6770     char *command = elf_tdata (abfd)->core->command;
6771     int n = strlen (command);
6772 
6773     if (0 < n && command[n - 1] == ' ')
6774       command[n - 1] = '\0';
6775   }
6776 
6777   return TRUE;
6778 }
6779 #define ELF_ARCH		bfd_arch_frv
6780 #define ELF_MACHINE_CODE	EM_CYGNUS_FRV
6781 #define ELF_MAXPAGESIZE		0x1000
6782 
6783 #define TARGET_BIG_SYM		frv_elf32_vec
6784 #define TARGET_BIG_NAME		"elf32-frv"
6785 
6786 #define elf_info_to_howto			frv_info_to_howto_rela
6787 #define elf_backend_relocate_section		elf32_frv_relocate_section
6788 #define elf_backend_gc_mark_hook		elf32_frv_gc_mark_hook
6789 #define elf_backend_check_relocs		elf32_frv_check_relocs
6790 #define elf_backend_object_p			elf32_frv_object_p
6791 #define elf_backend_add_symbol_hook		elf32_frv_add_symbol_hook
6792 
6793 #define elf_backend_stack_align			8
6794 #define elf_backend_can_gc_sections		1
6795 #define elf_backend_rela_normal			1
6796 
6797 #define bfd_elf32_bfd_reloc_type_lookup		frv_reloc_type_lookup
6798 #define bfd_elf32_bfd_reloc_name_lookup	frv_reloc_name_lookup
6799 #define bfd_elf32_bfd_set_private_flags		frv_elf_set_private_flags
6800 #define bfd_elf32_bfd_merge_private_bfd_data	frv_elf_merge_private_bfd_data
6801 #define bfd_elf32_bfd_print_private_bfd_data	frv_elf_print_private_bfd_data
6802 
6803 #define elf_backend_want_got_sym	1
6804 #define elf_backend_got_header_size	0
6805 #define elf_backend_want_got_plt	0
6806 #define elf_backend_plt_readonly	1
6807 #define elf_backend_want_plt_sym	0
6808 #define elf_backend_plt_header_size	0
6809 
6810 #define elf_backend_finish_dynamic_sections \
6811 		elf32_frv_finish_dynamic_sections
6812 
6813 #define elf_backend_grok_prstatus	elf32_frv_grok_prstatus
6814 #define elf_backend_grok_psinfo		elf32_frv_grok_psinfo
6815 
6816 #define elf_backend_linux_prpsinfo32_ugid16	TRUE
6817 
6818 #include "elf32-target.h"
6819 
6820 #undef ELF_TARGET_ID
6821 #define ELF_TARGET_ID		FRV_ELF_DATA
6822 #undef ELF_MAXPAGESIZE
6823 #define ELF_MAXPAGESIZE		0x4000
6824 
6825 #undef TARGET_BIG_SYM
6826 #define TARGET_BIG_SYM		frv_elf32_fdpic_vec
6827 #undef TARGET_BIG_NAME
6828 #define TARGET_BIG_NAME		"elf32-frvfdpic"
6829 #undef	elf32_bed
6830 #define	elf32_bed		elf32_frvfdpic_bed
6831 
6832 #undef elf_info_to_howto_rel
6833 #define elf_info_to_howto_rel	frvfdpic_info_to_howto_rel
6834 
6835 #undef bfd_elf32_bfd_link_hash_table_create
6836 #define bfd_elf32_bfd_link_hash_table_create \
6837 		frvfdpic_elf_link_hash_table_create
6838 #undef elf_backend_always_size_sections
6839 #define elf_backend_always_size_sections \
6840 		elf32_frvfdpic_always_size_sections
6841 
6842 #undef elf_backend_create_dynamic_sections
6843 #define elf_backend_create_dynamic_sections \
6844 		elf32_frvfdpic_create_dynamic_sections
6845 #undef elf_backend_adjust_dynamic_symbol
6846 #define elf_backend_adjust_dynamic_symbol \
6847 		elf32_frvfdpic_adjust_dynamic_symbol
6848 #undef elf_backend_size_dynamic_sections
6849 #define elf_backend_size_dynamic_sections \
6850 		elf32_frvfdpic_size_dynamic_sections
6851 #undef bfd_elf32_bfd_relax_section
6852 #define bfd_elf32_bfd_relax_section \
6853   elf32_frvfdpic_relax_section
6854 #undef elf_backend_finish_dynamic_symbol
6855 #define elf_backend_finish_dynamic_symbol \
6856 		elf32_frvfdpic_finish_dynamic_symbol
6857 #undef elf_backend_finish_dynamic_sections
6858 #define elf_backend_finish_dynamic_sections \
6859 		elf32_frvfdpic_finish_dynamic_sections
6860 
6861 #undef elf_backend_discard_info
6862 #define elf_backend_discard_info \
6863 		frvfdpic_elf_discard_info
6864 #undef elf_backend_can_make_relative_eh_frame
6865 #define elf_backend_can_make_relative_eh_frame \
6866 		frvfdpic_elf_use_relative_eh_frame
6867 #undef elf_backend_can_make_lsda_relative_eh_frame
6868 #define elf_backend_can_make_lsda_relative_eh_frame \
6869 		frvfdpic_elf_use_relative_eh_frame
6870 #undef elf_backend_encode_eh_address
6871 #define elf_backend_encode_eh_address \
6872 		frvfdpic_elf_encode_eh_address
6873 
6874 #undef elf_backend_may_use_rel_p
6875 #define elf_backend_may_use_rel_p	1
6876 #undef elf_backend_may_use_rela_p
6877 #define elf_backend_may_use_rela_p	1
6878 /* We use REL for dynamic relocations only.  */
6879 #undef elf_backend_default_use_rela_p
6880 #define elf_backend_default_use_rela_p	1
6881 
6882 #undef elf_backend_omit_section_dynsym
6883 #define elf_backend_omit_section_dynsym _frvfdpic_link_omit_section_dynsym
6884 
6885 #include "elf32-target.h"
6886