1 /* Renesas / SuperH SH specific support for 32-bit ELF
2    Copyright (C) 1996-2021 Free Software Foundation, Inc.
3    Contributed by Ian Lance Taylor, Cygnus Support.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20    MA 02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf-vxworks.h"
28 #include "elf/sh.h"
29 #include "dwarf2.h"
30 #include "libiberty.h"
31 #include "../opcodes/sh-opc.h"
32 
33 /* All users of this file have bfd_octets_per_byte (abfd, sec) == 1.  */
34 #define OCTETS_PER_BYTE(ABFD, SEC) 1
35 
36 static bfd_reloc_status_type sh_elf_reloc
37   (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
38 static bfd_reloc_status_type sh_elf_ignore_reloc
39   (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bool sh_elf_relax_delete_bytes
41   (bfd *, asection *, bfd_vma, int);
42 static bool sh_elf_align_loads
43   (bfd *, asection *, Elf_Internal_Rela *, bfd_byte *, bool *);
44 static bool sh_elf_swap_insns
45   (bfd *, asection *, void *, bfd_byte *, bfd_vma);
46 static int sh_elf_optimized_tls_reloc
47   (struct bfd_link_info *, int, int);
48 static bfd_vma dtpoff_base
49   (struct bfd_link_info *);
50 static bfd_vma tpoff
51   (struct bfd_link_info *, bfd_vma);
52 
53 /* The name of the dynamic interpreter.  This is put in the .interp
54    section.  */
55 
56 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
57 
58 /* FDPIC binaries have a default 128K stack.  */
59 #define DEFAULT_STACK_SIZE 0x20000
60 
61 #define MINUS_ONE ((bfd_vma) 0 - 1)
62 
63 /* Decide whether a reference to a symbol can be resolved locally or
64    not.  If the symbol is protected, we want the local address, but
65    its function descriptor must be assigned by the dynamic linker.  */
66 #define SYMBOL_FUNCDESC_LOCAL(INFO, H) \
67   (SYMBOL_REFERENCES_LOCAL (INFO, H) \
68    || ! elf_hash_table (INFO)->dynamic_sections_created)
69 
70 #define SH_PARTIAL32 true
71 #define SH_SRC_MASK32 0xffffffff
72 #define SH_ELF_RELOC sh_elf_reloc
73 static reloc_howto_type sh_elf_howto_table[] =
74 {
75 #include "elf32-sh-relocs.h"
76 };
77 
78 #define SH_PARTIAL32 false
79 #define SH_SRC_MASK32 0
80 #define SH_ELF_RELOC bfd_elf_generic_reloc
81 static reloc_howto_type sh_vxworks_howto_table[] =
82 {
83 #include "elf32-sh-relocs.h"
84 };
85 
86 /* Return true if OUTPUT_BFD is a VxWorks object.  */
87 
88 static bool
vxworks_object_p(bfd * abfd ATTRIBUTE_UNUSED)89 vxworks_object_p (bfd *abfd ATTRIBUTE_UNUSED)
90 {
91 #if !defined SH_TARGET_ALREADY_DEFINED
92   extern const bfd_target sh_elf32_vxworks_le_vec;
93   extern const bfd_target sh_elf32_vxworks_vec;
94 
95   return (abfd->xvec == &sh_elf32_vxworks_le_vec
96 	  || abfd->xvec == &sh_elf32_vxworks_vec);
97 #else
98   return false;
99 #endif
100 }
101 
102 /* Return true if OUTPUT_BFD is an FDPIC object.  */
103 
104 static bool
fdpic_object_p(bfd * abfd ATTRIBUTE_UNUSED)105 fdpic_object_p (bfd *abfd ATTRIBUTE_UNUSED)
106 {
107 #if !defined SH_TARGET_ALREADY_DEFINED
108   extern const bfd_target sh_elf32_fdpic_le_vec;
109   extern const bfd_target sh_elf32_fdpic_be_vec;
110 
111   return (abfd->xvec == &sh_elf32_fdpic_le_vec
112 	  || abfd->xvec == &sh_elf32_fdpic_be_vec);
113 #else
114   return false;
115 #endif
116 }
117 
118 /* Return the howto table for ABFD.  */
119 
120 static reloc_howto_type *
get_howto_table(bfd * abfd)121 get_howto_table (bfd *abfd)
122 {
123   if (vxworks_object_p (abfd))
124     return sh_vxworks_howto_table;
125   return sh_elf_howto_table;
126 }
127 
128 static bfd_reloc_status_type
sh_elf_reloc_loop(int r_type ATTRIBUTE_UNUSED,bfd * input_bfd,asection * input_section,bfd_byte * contents,bfd_vma addr,asection * symbol_section,bfd_vma start,bfd_vma end)129 sh_elf_reloc_loop (int r_type ATTRIBUTE_UNUSED, bfd *input_bfd,
130 		   asection *input_section, bfd_byte *contents,
131 		   bfd_vma addr, asection *symbol_section,
132 		   bfd_vma start, bfd_vma end)
133 {
134   static bfd_vma last_addr;
135   static asection *last_symbol_section;
136   bfd_byte *start_ptr, *ptr, *last_ptr;
137   int diff, cum_diff;
138   bfd_signed_vma x;
139   int insn;
140 
141   /* Sanity check the address.  */
142   if (addr > bfd_get_section_limit (input_bfd, input_section))
143     return bfd_reloc_outofrange;
144 
145   /* We require the start and end relocations to be processed consecutively -
146      although we allow then to be processed forwards or backwards.  */
147   if (! last_addr)
148     {
149       last_addr = addr;
150       last_symbol_section = symbol_section;
151       return bfd_reloc_ok;
152     }
153   if (last_addr != addr)
154     abort ();
155   last_addr = 0;
156 
157   if (! symbol_section || last_symbol_section != symbol_section || end < start)
158     return bfd_reloc_outofrange;
159 
160   /* Get the symbol_section contents.  */
161   if (symbol_section != input_section)
162     {
163       if (elf_section_data (symbol_section)->this_hdr.contents != NULL)
164 	contents = elf_section_data (symbol_section)->this_hdr.contents;
165       else
166 	{
167 	  if (!bfd_malloc_and_get_section (input_bfd, symbol_section,
168 					   &contents))
169 	    {
170 	      free (contents);
171 	      return bfd_reloc_outofrange;
172 	    }
173 	}
174     }
175 #define IS_PPI(PTR) ((bfd_get_16 (input_bfd, (PTR)) & 0xfc00) == 0xf800)
176   start_ptr = contents + start;
177   for (cum_diff = -6, ptr = contents + end; cum_diff < 0 && ptr > start_ptr;)
178     {
179       for (last_ptr = ptr, ptr -= 4; ptr >= start_ptr && IS_PPI (ptr);)
180 	ptr -= 2;
181       ptr += 2;
182       diff = (last_ptr - ptr) >> 1;
183       cum_diff += diff & 1;
184       cum_diff += diff;
185     }
186   /* Calculate the start / end values to load into rs / re minus four -
187      so that will cancel out the four we would otherwise have to add to
188      addr to get the value to subtract in order to get relative addressing.  */
189   if (cum_diff >= 0)
190     {
191       start -= 4;
192       end = (ptr + cum_diff * 2) - contents;
193     }
194   else
195     {
196       bfd_vma start0 = start - 4;
197 
198       while (start0 && IS_PPI (contents + start0))
199 	start0 -= 2;
200       start0 = start - 2 - ((start - start0) & 2);
201       start = start0 - cum_diff - 2;
202       end = start0;
203     }
204 
205   if (elf_section_data (symbol_section)->this_hdr.contents != contents)
206     free (contents);
207 
208   insn = bfd_get_16 (input_bfd, contents + addr);
209 
210   x = (insn & 0x200 ? end : start) - addr;
211   if (input_section != symbol_section)
212     x += ((symbol_section->output_section->vma + symbol_section->output_offset)
213 	  - (input_section->output_section->vma
214 	     + input_section->output_offset));
215   x >>= 1;
216   if (x < -128 || x > 127)
217     return bfd_reloc_overflow;
218 
219   x = (insn & ~0xff) | (x & 0xff);
220   bfd_put_16 (input_bfd, (bfd_vma) x, contents + addr);
221 
222   return bfd_reloc_ok;
223 }
224 
225 /* This function is used for normal relocs.  This used to be like the COFF
226    function, and is almost certainly incorrect for other ELF targets.  */
227 
228 static bfd_reloc_status_type
sh_elf_reloc(bfd * abfd,arelent * reloc_entry,asymbol * symbol_in,void * data,asection * input_section,bfd * output_bfd,char ** error_message ATTRIBUTE_UNUSED)229 sh_elf_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol_in,
230 	      void *data, asection *input_section, bfd *output_bfd,
231 	      char **error_message ATTRIBUTE_UNUSED)
232 {
233   bfd_vma insn;
234   bfd_vma sym_value;
235   enum elf_sh_reloc_type r_type;
236   bfd_vma addr = reloc_entry->address;
237   bfd_size_type octets = addr * OCTETS_PER_BYTE (abfd, input_section);
238   bfd_byte *hit_data = (bfd_byte *) data + octets;
239 
240   r_type = (enum elf_sh_reloc_type) reloc_entry->howto->type;
241 
242   if (output_bfd != NULL)
243     {
244       /* Partial linking--do nothing.  */
245       reloc_entry->address += input_section->output_offset;
246       return bfd_reloc_ok;
247     }
248 
249   /* Almost all relocs have to do with relaxing.  If any work must be
250      done for them, it has been done in sh_relax_section.  */
251   if (r_type == R_SH_IND12W && (symbol_in->flags & BSF_LOCAL) != 0)
252     return bfd_reloc_ok;
253 
254   if (symbol_in != NULL
255       && bfd_is_und_section (symbol_in->section))
256     return bfd_reloc_undefined;
257 
258   /* PR 17512: file: 9891ca98.  */
259   if (octets + bfd_get_reloc_size (reloc_entry->howto)
260       > bfd_get_section_limit_octets (abfd, input_section))
261     return bfd_reloc_outofrange;
262 
263   if (bfd_is_com_section (symbol_in->section))
264     sym_value = 0;
265   else
266     sym_value = (symbol_in->value +
267 		 symbol_in->section->output_section->vma +
268 		 symbol_in->section->output_offset);
269 
270   switch (r_type)
271     {
272     case R_SH_DIR32:
273       insn = bfd_get_32 (abfd, hit_data);
274       insn += sym_value + reloc_entry->addend;
275       bfd_put_32 (abfd, insn, hit_data);
276       break;
277     case R_SH_IND12W:
278       insn = bfd_get_16 (abfd, hit_data);
279       sym_value += reloc_entry->addend;
280       sym_value -= (input_section->output_section->vma
281 		    + input_section->output_offset
282 		    + addr
283 		    + 4);
284       sym_value += (((insn & 0xfff) ^ 0x800) - 0x800) << 1;
285       insn = (insn & 0xf000) | ((sym_value >> 1) & 0xfff);
286       bfd_put_16 (abfd, insn, hit_data);
287       if (sym_value + 0x1000 >= 0x2000 || (sym_value & 1) != 0)
288 	return bfd_reloc_overflow;
289       break;
290     default:
291       abort ();
292       break;
293     }
294 
295   return bfd_reloc_ok;
296 }
297 
298 /* This function is used for relocs which are only used for relaxing,
299    which the linker should otherwise ignore.  */
300 
301 static bfd_reloc_status_type
sh_elf_ignore_reloc(bfd * abfd ATTRIBUTE_UNUSED,arelent * reloc_entry,asymbol * symbol ATTRIBUTE_UNUSED,void * data ATTRIBUTE_UNUSED,asection * input_section,bfd * output_bfd,char ** error_message ATTRIBUTE_UNUSED)302 sh_elf_ignore_reloc (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc_entry,
303 		     asymbol *symbol ATTRIBUTE_UNUSED,
304 		     void *data ATTRIBUTE_UNUSED, asection *input_section,
305 		     bfd *output_bfd,
306 		     char **error_message ATTRIBUTE_UNUSED)
307 {
308   if (output_bfd != NULL)
309     reloc_entry->address += input_section->output_offset;
310   return bfd_reloc_ok;
311 }
312 
313 /* This structure is used to map BFD reloc codes to SH ELF relocs.  */
314 
315 struct elf_reloc_map
316 {
317   bfd_reloc_code_real_type bfd_reloc_val;
318   unsigned char elf_reloc_val;
319 };
320 
321 /* An array mapping BFD reloc codes to SH ELF relocs.  */
322 
323 static const struct elf_reloc_map sh_reloc_map[] =
324 {
325   { BFD_RELOC_NONE, R_SH_NONE },
326   { BFD_RELOC_32, R_SH_DIR32 },
327   { BFD_RELOC_16, R_SH_DIR16 },
328   { BFD_RELOC_8, R_SH_DIR8 },
329   { BFD_RELOC_CTOR, R_SH_DIR32 },
330   { BFD_RELOC_32_PCREL, R_SH_REL32 },
331   { BFD_RELOC_SH_PCDISP8BY2, R_SH_DIR8WPN },
332   { BFD_RELOC_SH_PCDISP12BY2, R_SH_IND12W },
333   { BFD_RELOC_SH_PCRELIMM8BY2, R_SH_DIR8WPZ },
334   { BFD_RELOC_SH_PCRELIMM8BY4, R_SH_DIR8WPL },
335   { BFD_RELOC_8_PCREL, R_SH_SWITCH8 },
336   { BFD_RELOC_SH_SWITCH16, R_SH_SWITCH16 },
337   { BFD_RELOC_SH_SWITCH32, R_SH_SWITCH32 },
338   { BFD_RELOC_SH_USES, R_SH_USES },
339   { BFD_RELOC_SH_COUNT, R_SH_COUNT },
340   { BFD_RELOC_SH_ALIGN, R_SH_ALIGN },
341   { BFD_RELOC_SH_CODE, R_SH_CODE },
342   { BFD_RELOC_SH_DATA, R_SH_DATA },
343   { BFD_RELOC_SH_LABEL, R_SH_LABEL },
344   { BFD_RELOC_VTABLE_INHERIT, R_SH_GNU_VTINHERIT },
345   { BFD_RELOC_VTABLE_ENTRY, R_SH_GNU_VTENTRY },
346   { BFD_RELOC_SH_LOOP_START, R_SH_LOOP_START },
347   { BFD_RELOC_SH_LOOP_END, R_SH_LOOP_END },
348   { BFD_RELOC_SH_TLS_GD_32, R_SH_TLS_GD_32 },
349   { BFD_RELOC_SH_TLS_LD_32, R_SH_TLS_LD_32 },
350   { BFD_RELOC_SH_TLS_LDO_32, R_SH_TLS_LDO_32 },
351   { BFD_RELOC_SH_TLS_IE_32, R_SH_TLS_IE_32 },
352   { BFD_RELOC_SH_TLS_LE_32, R_SH_TLS_LE_32 },
353   { BFD_RELOC_SH_TLS_DTPMOD32, R_SH_TLS_DTPMOD32 },
354   { BFD_RELOC_SH_TLS_DTPOFF32, R_SH_TLS_DTPOFF32 },
355   { BFD_RELOC_SH_TLS_TPOFF32, R_SH_TLS_TPOFF32 },
356   { BFD_RELOC_32_GOT_PCREL, R_SH_GOT32 },
357   { BFD_RELOC_32_PLT_PCREL, R_SH_PLT32 },
358   { BFD_RELOC_SH_COPY, R_SH_COPY },
359   { BFD_RELOC_SH_GLOB_DAT, R_SH_GLOB_DAT },
360   { BFD_RELOC_SH_JMP_SLOT, R_SH_JMP_SLOT },
361   { BFD_RELOC_SH_RELATIVE, R_SH_RELATIVE },
362   { BFD_RELOC_32_GOTOFF, R_SH_GOTOFF },
363   { BFD_RELOC_SH_GOTPC, R_SH_GOTPC },
364   { BFD_RELOC_SH_GOTPLT32, R_SH_GOTPLT32 },
365   { BFD_RELOC_SH_GOT20, R_SH_GOT20 },
366   { BFD_RELOC_SH_GOTOFF20, R_SH_GOTOFF20 },
367   { BFD_RELOC_SH_GOTFUNCDESC, R_SH_GOTFUNCDESC },
368   { BFD_RELOC_SH_GOTFUNCDESC20, R_SH_GOTFUNCDESC20 },
369   { BFD_RELOC_SH_GOTOFFFUNCDESC, R_SH_GOTOFFFUNCDESC },
370   { BFD_RELOC_SH_GOTOFFFUNCDESC20, R_SH_GOTOFFFUNCDESC20 },
371   { BFD_RELOC_SH_FUNCDESC, R_SH_FUNCDESC },
372 };
373 
374 /* Given a BFD reloc code, return the howto structure for the
375    corresponding SH ELF reloc.  */
376 
377 static reloc_howto_type *
sh_elf_reloc_type_lookup(bfd * abfd,bfd_reloc_code_real_type code)378 sh_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
379 {
380   unsigned int i;
381 
382   for (i = 0; i < sizeof (sh_reloc_map) / sizeof (struct elf_reloc_map); i++)
383     {
384       if (sh_reloc_map[i].bfd_reloc_val == code)
385 	return get_howto_table (abfd) + (int) sh_reloc_map[i].elf_reloc_val;
386     }
387 
388   return NULL;
389 }
390 
391 static reloc_howto_type *
sh_elf_reloc_name_lookup(bfd * abfd,const char * r_name)392 sh_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
393 {
394   unsigned int i;
395 
396   if (vxworks_object_p (abfd))
397     {
398       for (i = 0;
399 	   i < (sizeof (sh_vxworks_howto_table)
400 		/ sizeof (sh_vxworks_howto_table[0]));
401 	   i++)
402 	if (sh_vxworks_howto_table[i].name != NULL
403 	    && strcasecmp (sh_vxworks_howto_table[i].name, r_name) == 0)
404 	  return &sh_vxworks_howto_table[i];
405     }
406   else
407     {
408       for (i = 0;
409 	   i < (sizeof (sh_elf_howto_table)
410 		/ sizeof (sh_elf_howto_table[0]));
411 	   i++)
412 	if (sh_elf_howto_table[i].name != NULL
413 	    && strcasecmp (sh_elf_howto_table[i].name, r_name) == 0)
414 	  return &sh_elf_howto_table[i];
415     }
416 
417   return NULL;
418 }
419 
420 /* Given an ELF reloc, fill in the howto field of a relent.  */
421 
422 static bool
sh_elf_info_to_howto(bfd * abfd,arelent * cache_ptr,Elf_Internal_Rela * dst)423 sh_elf_info_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
424 {
425   unsigned int r;
426 
427   r = ELF32_R_TYPE (dst->r_info);
428 
429   if (r >= R_SH_FIRST_INVALID_RELOC_6
430       || (r >= R_SH_FIRST_INVALID_RELOC   && r <= R_SH_LAST_INVALID_RELOC)
431       || (r >= R_SH_FIRST_INVALID_RELOC_2 && r <= R_SH_LAST_INVALID_RELOC_2)
432       || (r >= R_SH_FIRST_INVALID_RELOC_3 && r <= R_SH_LAST_INVALID_RELOC_3)
433       || (r >= R_SH_FIRST_INVALID_RELOC_4 && r <= R_SH_LAST_INVALID_RELOC_4)
434       || (r >= R_SH_FIRST_INVALID_RELOC_5 && r <= R_SH_LAST_INVALID_RELOC_5))
435     {
436       /* xgettext:c-format */
437       _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
438 			  abfd, r);
439       bfd_set_error (bfd_error_bad_value);
440       return false;
441     }
442 
443   cache_ptr->howto = get_howto_table (abfd) + r;
444   return true;
445 }
446 
447 /* This function handles relaxing for SH ELF.  See the corresponding
448    function in coff-sh.c for a description of what this does.  FIXME:
449    There is a lot of duplication here between this code and the COFF
450    specific code.  The format of relocs and symbols is wound deeply
451    into this code, but it would still be better if the duplication
452    could be eliminated somehow.  Note in particular that although both
453    functions use symbols like R_SH_CODE, those symbols have different
454    values; in coff-sh.c they come from include/coff/sh.h, whereas here
455    they come from enum elf_sh_reloc_type in include/elf/sh.h.  */
456 
457 static bool
sh_elf_relax_section(bfd * abfd,asection * sec,struct bfd_link_info * link_info,bool * again)458 sh_elf_relax_section (bfd *abfd, asection *sec,
459 		      struct bfd_link_info *link_info, bool *again)
460 {
461   Elf_Internal_Shdr *symtab_hdr;
462   Elf_Internal_Rela *internal_relocs;
463   bool have_code;
464   Elf_Internal_Rela *irel, *irelend;
465   bfd_byte *contents = NULL;
466   Elf_Internal_Sym *isymbuf = NULL;
467 
468   *again = false;
469 
470   if (bfd_link_relocatable (link_info)
471       || (sec->flags & SEC_RELOC) == 0
472       || sec->reloc_count == 0)
473     return true;
474 
475   symtab_hdr = &elf_symtab_hdr (abfd);
476 
477   internal_relocs = (_bfd_elf_link_read_relocs
478 		     (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
479 		      link_info->keep_memory));
480   if (internal_relocs == NULL)
481     goto error_return;
482 
483   have_code = false;
484 
485   irelend = internal_relocs + sec->reloc_count;
486   for (irel = internal_relocs; irel < irelend; irel++)
487     {
488       bfd_vma laddr, paddr, symval;
489       unsigned short insn;
490       Elf_Internal_Rela *irelfn, *irelscan, *irelcount;
491       bfd_signed_vma foff;
492 
493       if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_CODE)
494 	have_code = true;
495 
496       if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_USES)
497 	continue;
498 
499       /* Get the section contents.  */
500       if (contents == NULL)
501 	{
502 	  if (elf_section_data (sec)->this_hdr.contents != NULL)
503 	    contents = elf_section_data (sec)->this_hdr.contents;
504 	  else
505 	    {
506 	      if (!bfd_malloc_and_get_section (abfd, sec, &contents))
507 		goto error_return;
508 	    }
509 	}
510 
511       /* The r_addend field of the R_SH_USES reloc will point us to
512 	 the register load.  The 4 is because the r_addend field is
513 	 computed as though it were a jump offset, which are based
514 	 from 4 bytes after the jump instruction.  */
515       laddr = irel->r_offset + 4 + irel->r_addend;
516       if (laddr >= sec->size)
517 	{
518 	  /* xgettext:c-format */
519 	  _bfd_error_handler
520 	    (_("%pB: %#" PRIx64 ": warning: bad R_SH_USES offset"),
521 	     abfd, (uint64_t) irel->r_offset);
522 	  continue;
523 	}
524       insn = bfd_get_16 (abfd, contents + laddr);
525 
526       /* If the instruction is not mov.l NN,rN, we don't know what to
527 	 do.  */
528       if ((insn & 0xf000) != 0xd000)
529 	{
530 	  _bfd_error_handler
531 	    /* xgettext:c-format */
532 	    (_("%pB: %#" PRIx64 ": warning: "
533 	       "R_SH_USES points to unrecognized insn 0x%x"),
534 	     abfd, (uint64_t) irel->r_offset, insn);
535 	  continue;
536 	}
537 
538       /* Get the address from which the register is being loaded.  The
539 	 displacement in the mov.l instruction is quadrupled.  It is a
540 	 displacement from four bytes after the movl instruction, but,
541 	 before adding in the PC address, two least significant bits
542 	 of the PC are cleared.  We assume that the section is aligned
543 	 on a four byte boundary.  */
544       paddr = insn & 0xff;
545       paddr *= 4;
546       paddr += (laddr + 4) &~ (bfd_vma) 3;
547       if (paddr >= sec->size)
548 	{
549 	  _bfd_error_handler
550 	    /* xgettext:c-format */
551 	    (_("%pB: %#" PRIx64 ": warning: bad R_SH_USES load offset"),
552 	     abfd, (uint64_t) irel->r_offset);
553 	  continue;
554 	}
555 
556       /* Get the reloc for the address from which the register is
557 	 being loaded.  This reloc will tell us which function is
558 	 actually being called.  */
559       for (irelfn = internal_relocs; irelfn < irelend; irelfn++)
560 	if (irelfn->r_offset == paddr
561 	    && ELF32_R_TYPE (irelfn->r_info) == (int) R_SH_DIR32)
562 	  break;
563       if (irelfn >= irelend)
564 	{
565 	  _bfd_error_handler
566 	    /* xgettext:c-format */
567 	    (_("%pB: %#" PRIx64 ": warning: could not find expected reloc"),
568 	     abfd, (uint64_t) paddr);
569 	  continue;
570 	}
571 
572       /* Read this BFD's symbols if we haven't done so already.  */
573       if (isymbuf == NULL && symtab_hdr->sh_info != 0)
574 	{
575 	  isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
576 	  if (isymbuf == NULL)
577 	    isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
578 					    symtab_hdr->sh_info, 0,
579 					    NULL, NULL, NULL);
580 	  if (isymbuf == NULL)
581 	    goto error_return;
582 	}
583 
584       /* Get the value of the symbol referred to by the reloc.  */
585       if (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
586 	{
587 	  /* A local symbol.  */
588 	  Elf_Internal_Sym *isym;
589 
590 	  isym = isymbuf + ELF32_R_SYM (irelfn->r_info);
591 	  if (isym->st_shndx
592 	      != (unsigned int) _bfd_elf_section_from_bfd_section (abfd, sec))
593 	    {
594 	      _bfd_error_handler
595 		/* xgettext:c-format */
596 		(_("%pB: %#" PRIx64 ": warning: symbol in unexpected section"),
597 		 abfd, (uint64_t) paddr);
598 	      continue;
599 	    }
600 
601 	  symval = (isym->st_value
602 		    + sec->output_section->vma
603 		    + sec->output_offset);
604 	}
605       else
606 	{
607 	  unsigned long indx;
608 	  struct elf_link_hash_entry *h;
609 
610 	  indx = ELF32_R_SYM (irelfn->r_info) - symtab_hdr->sh_info;
611 	  h = elf_sym_hashes (abfd)[indx];
612 	  BFD_ASSERT (h != NULL);
613 	  if (h->root.type != bfd_link_hash_defined
614 	      && h->root.type != bfd_link_hash_defweak)
615 	    {
616 	      /* This appears to be a reference to an undefined
617 		 symbol.  Just ignore it--it will be caught by the
618 		 regular reloc processing.  */
619 	      continue;
620 	    }
621 
622 	  symval = (h->root.u.def.value
623 		    + h->root.u.def.section->output_section->vma
624 		    + h->root.u.def.section->output_offset);
625 	}
626 
627       if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
628 	symval += bfd_get_32 (abfd, contents + paddr);
629       else
630 	symval += irelfn->r_addend;
631 
632       /* See if this function call can be shortened.  */
633       foff = (symval
634 	      - (irel->r_offset
635 		 + sec->output_section->vma
636 		 + sec->output_offset
637 		 + 4));
638       /* A branch to an address beyond ours might be increased by an
639 	 .align that doesn't move when bytes behind us are deleted.
640 	 So, we add some slop in this calculation to allow for
641 	 that.  */
642       if (foff < -0x1000 || foff >= 0x1000 - 8)
643 	{
644 	  /* After all that work, we can't shorten this function call.  */
645 	  continue;
646 	}
647 
648       /* Shorten the function call.  */
649 
650       /* For simplicity of coding, we are going to modify the section
651 	 contents, the section relocs, and the BFD symbol table.  We
652 	 must tell the rest of the code not to free up this
653 	 information.  It would be possible to instead create a table
654 	 of changes which have to be made, as is done in coff-mips.c;
655 	 that would be more work, but would require less memory when
656 	 the linker is run.  */
657 
658       elf_section_data (sec)->relocs = internal_relocs;
659       elf_section_data (sec)->this_hdr.contents = contents;
660       symtab_hdr->contents = (unsigned char *) isymbuf;
661 
662       /* Replace the jmp/jsr with a bra/bsr.  */
663 
664       /* Change the R_SH_USES reloc into an R_SH_IND12W reloc, and
665 	 replace the jmp/jsr with a bra/bsr.  */
666       irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irelfn->r_info), R_SH_IND12W);
667       /* We used to test (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
668 	 here, but that only checks if the symbol is an external symbol,
669 	 not if the symbol is in a different section.  Besides, we need
670 	 a consistent meaning for the relocation, so we just assume here that
671 	 the value of the symbol is not available.  */
672 
673       /* We can't fully resolve this yet, because the external
674 	 symbol value may be changed by future relaxing.  We let
675 	 the final link phase handle it.  */
676       if (bfd_get_16 (abfd, contents + irel->r_offset) & 0x0020)
677 	bfd_put_16 (abfd, (bfd_vma) 0xa000, contents + irel->r_offset);
678       else
679 	bfd_put_16 (abfd, (bfd_vma) 0xb000, contents + irel->r_offset);
680 
681       irel->r_addend = -4;
682 
683       /* When we calculated the symbol "value" we had an offset in the
684 	 DIR32's word in memory (we read and add it above).  However,
685 	 the jsr we create does NOT have this offset encoded, so we
686 	 have to add it to the addend to preserve it.  */
687       irel->r_addend += bfd_get_32 (abfd, contents + paddr);
688 
689       /* See if there is another R_SH_USES reloc referring to the same
690 	 register load.  */
691       for (irelscan = internal_relocs; irelscan < irelend; irelscan++)
692 	if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_USES
693 	    && laddr == irelscan->r_offset + 4 + irelscan->r_addend)
694 	  break;
695       if (irelscan < irelend)
696 	{
697 	  /* Some other function call depends upon this register load,
698 	     and we have not yet converted that function call.
699 	     Indeed, we may never be able to convert it.  There is
700 	     nothing else we can do at this point.  */
701 	  continue;
702 	}
703 
704       /* Look for a R_SH_COUNT reloc on the location where the
705 	 function address is stored.  Do this before deleting any
706 	 bytes, to avoid confusion about the address.  */
707       for (irelcount = internal_relocs; irelcount < irelend; irelcount++)
708 	if (irelcount->r_offset == paddr
709 	    && ELF32_R_TYPE (irelcount->r_info) == (int) R_SH_COUNT)
710 	  break;
711 
712       /* Delete the register load.  */
713       if (! sh_elf_relax_delete_bytes (abfd, sec, laddr, 2))
714 	goto error_return;
715 
716       /* That will change things, so, just in case it permits some
717 	 other function call to come within range, we should relax
718 	 again.  Note that this is not required, and it may be slow.  */
719       *again = true;
720 
721       /* Now check whether we got a COUNT reloc.  */
722       if (irelcount >= irelend)
723 	{
724 	  _bfd_error_handler
725 	    /* xgettext:c-format */
726 	    (_("%pB: %#" PRIx64 ": warning: "
727 	       "could not find expected COUNT reloc"),
728 	     abfd, (uint64_t) paddr);
729 	  continue;
730 	}
731 
732       /* The number of uses is stored in the r_addend field.  We've
733 	 just deleted one.  */
734       if (irelcount->r_addend == 0)
735 	{
736 	  /* xgettext:c-format */
737 	  _bfd_error_handler (_("%pB: %#" PRIx64 ": warning: bad count"),
738 			      abfd, (uint64_t) paddr);
739 	  continue;
740 	}
741 
742       --irelcount->r_addend;
743 
744       /* If there are no more uses, we can delete the address.  Reload
745 	 the address from irelfn, in case it was changed by the
746 	 previous call to sh_elf_relax_delete_bytes.  */
747       if (irelcount->r_addend == 0)
748 	{
749 	  if (! sh_elf_relax_delete_bytes (abfd, sec, irelfn->r_offset, 4))
750 	    goto error_return;
751 	}
752 
753       /* We've done all we can with that function call.  */
754     }
755 
756   /* Look for load and store instructions that we can align on four
757      byte boundaries.  */
758   if ((elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK) != EF_SH4
759       && have_code)
760     {
761       bool swapped;
762 
763       /* Get the section contents.  */
764       if (contents == NULL)
765 	{
766 	  if (elf_section_data (sec)->this_hdr.contents != NULL)
767 	    contents = elf_section_data (sec)->this_hdr.contents;
768 	  else
769 	    {
770 	      if (!bfd_malloc_and_get_section (abfd, sec, &contents))
771 		goto error_return;
772 	    }
773 	}
774 
775       if (! sh_elf_align_loads (abfd, sec, internal_relocs, contents,
776 				&swapped))
777 	goto error_return;
778 
779       if (swapped)
780 	{
781 	  elf_section_data (sec)->relocs = internal_relocs;
782 	  elf_section_data (sec)->this_hdr.contents = contents;
783 	  symtab_hdr->contents = (unsigned char *) isymbuf;
784 	}
785     }
786 
787   if (isymbuf != NULL
788       && symtab_hdr->contents != (unsigned char *) isymbuf)
789     {
790       if (! link_info->keep_memory)
791 	free (isymbuf);
792       else
793 	{
794 	  /* Cache the symbols for elf_link_input_bfd.  */
795 	  symtab_hdr->contents = (unsigned char *) isymbuf;
796 	}
797     }
798 
799   if (contents != NULL
800       && elf_section_data (sec)->this_hdr.contents != contents)
801     {
802       if (! link_info->keep_memory)
803 	free (contents);
804       else
805 	{
806 	  /* Cache the section contents for elf_link_input_bfd.  */
807 	  elf_section_data (sec)->this_hdr.contents = contents;
808 	}
809     }
810 
811   if (elf_section_data (sec)->relocs != internal_relocs)
812     free (internal_relocs);
813 
814   return true;
815 
816  error_return:
817   if (symtab_hdr->contents != (unsigned char *) isymbuf)
818     free (isymbuf);
819   if (elf_section_data (sec)->this_hdr.contents != contents)
820     free (contents);
821   if (elf_section_data (sec)->relocs != internal_relocs)
822     free (internal_relocs);
823 
824   return false;
825 }
826 
827 /* Delete some bytes from a section while relaxing.  FIXME: There is a
828    lot of duplication between this function and sh_relax_delete_bytes
829    in coff-sh.c.  */
830 
831 static bool
sh_elf_relax_delete_bytes(bfd * abfd,asection * sec,bfd_vma addr,int count)832 sh_elf_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr,
833 			   int count)
834 {
835   Elf_Internal_Shdr *symtab_hdr;
836   unsigned int sec_shndx;
837   bfd_byte *contents;
838   Elf_Internal_Rela *irel, *irelend;
839   Elf_Internal_Rela *irelalign;
840   bfd_vma toaddr;
841   Elf_Internal_Sym *isymbuf, *isym, *isymend;
842   struct elf_link_hash_entry **sym_hashes;
843   struct elf_link_hash_entry **end_hashes;
844   unsigned int symcount;
845   asection *o;
846 
847   symtab_hdr = &elf_symtab_hdr (abfd);
848   isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
849 
850   sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
851 
852   contents = elf_section_data (sec)->this_hdr.contents;
853 
854   /* The deletion must stop at the next ALIGN reloc for an alignment
855      power larger than the number of bytes we are deleting.  */
856 
857   irelalign = NULL;
858   toaddr = sec->size;
859 
860   irel = elf_section_data (sec)->relocs;
861   irelend = irel + sec->reloc_count;
862   for (; irel < irelend; irel++)
863     {
864       if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
865 	  && irel->r_offset > addr
866 	  && count < (1 << irel->r_addend))
867 	{
868 	  irelalign = irel;
869 	  toaddr = irel->r_offset;
870 	  break;
871 	}
872     }
873 
874   /* Actually delete the bytes.  */
875   memmove (contents + addr, contents + addr + count,
876 	   (size_t) (toaddr - addr - count));
877   if (irelalign == NULL)
878     sec->size -= count;
879   else
880     {
881       int i;
882 
883 #define NOP_OPCODE (0x0009)
884 
885       BFD_ASSERT ((count & 1) == 0);
886       for (i = 0; i < count; i += 2)
887 	bfd_put_16 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
888     }
889 
890   /* Adjust all the relocs.  */
891   for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
892     {
893       bfd_vma nraddr, stop;
894       bfd_vma start = 0;
895       int insn = 0;
896       int off, adjust, oinsn;
897       bfd_signed_vma voff = 0;
898       bool overflow;
899 
900       /* Get the new reloc address.  */
901       nraddr = irel->r_offset;
902       if ((irel->r_offset > addr
903 	   && irel->r_offset < toaddr)
904 	  || (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
905 	      && irel->r_offset == toaddr))
906 	nraddr -= count;
907 
908       /* See if this reloc was for the bytes we have deleted, in which
909 	 case we no longer care about it.  Don't delete relocs which
910 	 represent addresses, though.  */
911       if (irel->r_offset >= addr
912 	  && irel->r_offset < addr + count
913 	  && ELF32_R_TYPE (irel->r_info) != (int) R_SH_ALIGN
914 	  && ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE
915 	  && ELF32_R_TYPE (irel->r_info) != (int) R_SH_DATA
916 	  && ELF32_R_TYPE (irel->r_info) != (int) R_SH_LABEL)
917 	irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
918 				     (int) R_SH_NONE);
919 
920       /* If this is a PC relative reloc, see if the range it covers
921 	 includes the bytes we have deleted.  */
922       switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
923 	{
924 	default:
925 	  break;
926 
927 	case R_SH_DIR8WPN:
928 	case R_SH_IND12W:
929 	case R_SH_DIR8WPZ:
930 	case R_SH_DIR8WPL:
931 	  start = irel->r_offset;
932 	  insn = bfd_get_16 (abfd, contents + nraddr);
933 	  break;
934 	}
935 
936       switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
937 	{
938 	default:
939 	  start = stop = addr;
940 	  break;
941 
942 	case R_SH_DIR32:
943 	  /* If this reloc is against a symbol defined in this
944 	     section, and the symbol will not be adjusted below, we
945 	     must check the addend to see it will put the value in
946 	     range to be adjusted, and hence must be changed.  */
947 	  if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
948 	    {
949 	      isym = isymbuf + ELF32_R_SYM (irel->r_info);
950 	      if (isym->st_shndx == sec_shndx
951 		  && (isym->st_value <= addr
952 		      || isym->st_value >= toaddr))
953 		{
954 		  bfd_vma val;
955 
956 		  if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
957 		    {
958 		      val = bfd_get_32 (abfd, contents + nraddr);
959 		      val += isym->st_value;
960 		      if (val > addr && val < toaddr)
961 			bfd_put_32 (abfd, val - count, contents + nraddr);
962 		    }
963 		  else
964 		    {
965 		      val = isym->st_value + irel->r_addend;
966 		      if (val > addr && val < toaddr)
967 			irel->r_addend -= count;
968 		    }
969 		}
970 	    }
971 	  start = stop = addr;
972 	  break;
973 
974 	case R_SH_DIR8WPN:
975 	  off = insn & 0xff;
976 	  if (off & 0x80)
977 	    off -= 0x100;
978 	  stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
979 	  break;
980 
981 	case R_SH_IND12W:
982 	  off = insn & 0xfff;
983 	  if (! off)
984 	    {
985 	      /* This has been made by previous relaxation.  Since the
986 		 relocation will be against an external symbol, the
987 		 final relocation will just do the right thing.  */
988 	      start = stop = addr;
989 	    }
990 	  else
991 	    {
992 	      if (off & 0x800)
993 		off -= 0x1000;
994 	      stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
995 
996 	      /* The addend will be against the section symbol, thus
997 		 for adjusting the addend, the relevant start is the
998 		 start of the section.
999 		 N.B. If we want to abandon in-place changes here and
1000 		 test directly using symbol + addend, we have to take into
1001 		 account that the addend has already been adjusted by -4.  */
1002 	      if (stop > addr && stop < toaddr)
1003 		irel->r_addend -= count;
1004 	    }
1005 	  break;
1006 
1007 	case R_SH_DIR8WPZ:
1008 	  off = insn & 0xff;
1009 	  stop = start + 4 + off * 2;
1010 	  break;
1011 
1012 	case R_SH_DIR8WPL:
1013 	  off = insn & 0xff;
1014 	  stop = (start & ~(bfd_vma) 3) + 4 + off * 4;
1015 	  break;
1016 
1017 	case R_SH_SWITCH8:
1018 	case R_SH_SWITCH16:
1019 	case R_SH_SWITCH32:
1020 	  /* These relocs types represent
1021 	       .word L2-L1
1022 	     The r_addend field holds the difference between the reloc
1023 	     address and L1.  That is the start of the reloc, and
1024 	     adding in the contents gives us the top.  We must adjust
1025 	     both the r_offset field and the section contents.
1026 	     N.B. in gas / coff bfd, the elf bfd r_addend is called r_offset,
1027 	     and the elf bfd r_offset is called r_vaddr.  */
1028 
1029 	  stop = irel->r_offset;
1030 	  start = (bfd_vma) ((bfd_signed_vma) stop - (long) irel->r_addend);
1031 
1032 	  if (start > addr
1033 	      && start < toaddr
1034 	      && (stop <= addr || stop >= toaddr))
1035 	    irel->r_addend += count;
1036 	  else if (stop > addr
1037 		   && stop < toaddr
1038 		   && (start <= addr || start >= toaddr))
1039 	    irel->r_addend -= count;
1040 
1041 	  if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH16)
1042 	    voff = bfd_get_signed_16 (abfd, contents + nraddr);
1043 	  else if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH8)
1044 	    voff = bfd_get_8 (abfd, contents + nraddr);
1045 	  else
1046 	    voff = bfd_get_signed_32 (abfd, contents + nraddr);
1047 	  stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1048 
1049 	  break;
1050 
1051 	case R_SH_USES:
1052 	  start = irel->r_offset;
1053 	  stop = (bfd_vma) ((bfd_signed_vma) start
1054 			    + (long) irel->r_addend
1055 			    + 4);
1056 	  break;
1057 	}
1058 
1059       if (start > addr
1060 	  && start < toaddr
1061 	  && (stop <= addr || stop >= toaddr))
1062 	adjust = count;
1063       else if (stop > addr
1064 	       && stop < toaddr
1065 	       && (start <= addr || start >= toaddr))
1066 	adjust = - count;
1067       else
1068 	adjust = 0;
1069 
1070       if (adjust != 0)
1071 	{
1072 	  oinsn = insn;
1073 	  overflow = false;
1074 	  switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
1075 	    {
1076 	    default:
1077 	      abort ();
1078 	      break;
1079 
1080 	    case R_SH_DIR8WPN:
1081 	    case R_SH_DIR8WPZ:
1082 	      insn += adjust / 2;
1083 	      if ((oinsn & 0xff00) != (insn & 0xff00))
1084 		overflow = true;
1085 	      bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
1086 	      break;
1087 
1088 	    case R_SH_IND12W:
1089 	      insn += adjust / 2;
1090 	      if ((oinsn & 0xf000) != (insn & 0xf000))
1091 		overflow = true;
1092 	      bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
1093 	      break;
1094 
1095 	    case R_SH_DIR8WPL:
1096 	      BFD_ASSERT (adjust == count || count >= 4);
1097 	      if (count >= 4)
1098 		insn += adjust / 4;
1099 	      else
1100 		{
1101 		  if ((irel->r_offset & 3) == 0)
1102 		    ++insn;
1103 		}
1104 	      if ((oinsn & 0xff00) != (insn & 0xff00))
1105 		overflow = true;
1106 	      bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
1107 	      break;
1108 
1109 	    case R_SH_SWITCH8:
1110 	      voff += adjust;
1111 	      if (voff < 0 || voff >= 0xff)
1112 		overflow = true;
1113 	      bfd_put_8 (abfd, voff, contents + nraddr);
1114 	      break;
1115 
1116 	    case R_SH_SWITCH16:
1117 	      voff += adjust;
1118 	      if (voff < - 0x8000 || voff >= 0x8000)
1119 		overflow = true;
1120 	      bfd_put_signed_16 (abfd, (bfd_vma) voff, contents + nraddr);
1121 	      break;
1122 
1123 	    case R_SH_SWITCH32:
1124 	      voff += adjust;
1125 	      bfd_put_signed_32 (abfd, (bfd_vma) voff, contents + nraddr);
1126 	      break;
1127 
1128 	    case R_SH_USES:
1129 	      irel->r_addend += adjust;
1130 	      break;
1131 	    }
1132 
1133 	  if (overflow)
1134 	    {
1135 	      _bfd_error_handler
1136 		/* xgettext:c-format */
1137 		(_("%pB: %#" PRIx64 ": fatal: reloc overflow while relaxing"),
1138 		 abfd, (uint64_t) irel->r_offset);
1139 	      bfd_set_error (bfd_error_bad_value);
1140 	      return false;
1141 	    }
1142 	}
1143 
1144       irel->r_offset = nraddr;
1145     }
1146 
1147   /* Look through all the other sections.  If there contain any IMM32
1148      relocs against internal symbols which we are not going to adjust
1149      below, we may need to adjust the addends.  */
1150   for (o = abfd->sections; o != NULL; o = o->next)
1151     {
1152       Elf_Internal_Rela *internal_relocs;
1153       Elf_Internal_Rela *irelscan, *irelscanend;
1154       bfd_byte *ocontents;
1155 
1156       if (o == sec
1157 	  || (o->flags & SEC_RELOC) == 0
1158 	  || o->reloc_count == 0)
1159 	continue;
1160 
1161       /* We always cache the relocs.  Perhaps, if info->keep_memory is
1162 	 FALSE, we should free them, if we are permitted to, when we
1163 	 leave sh_coff_relax_section.  */
1164       internal_relocs = (_bfd_elf_link_read_relocs
1165 			 (abfd, o, NULL, (Elf_Internal_Rela *) NULL, true));
1166       if (internal_relocs == NULL)
1167 	return false;
1168 
1169       ocontents = NULL;
1170       irelscanend = internal_relocs + o->reloc_count;
1171       for (irelscan = internal_relocs; irelscan < irelscanend; irelscan++)
1172 	{
1173 	  /* Dwarf line numbers use R_SH_SWITCH32 relocs.  */
1174 	  if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_SWITCH32)
1175 	    {
1176 	      bfd_vma start, stop;
1177 	      bfd_signed_vma voff;
1178 
1179 	      if (ocontents == NULL)
1180 		{
1181 		  if (elf_section_data (o)->this_hdr.contents != NULL)
1182 		    ocontents = elf_section_data (o)->this_hdr.contents;
1183 		  else
1184 		    {
1185 		      /* We always cache the section contents.
1186 			 Perhaps, if info->keep_memory is FALSE, we
1187 			 should free them, if we are permitted to,
1188 			 when we leave sh_coff_relax_section.  */
1189 		      if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1190 			{
1191 			  free (ocontents);
1192 			  return false;
1193 			}
1194 
1195 		      elf_section_data (o)->this_hdr.contents = ocontents;
1196 		    }
1197 		}
1198 
1199 	      stop = irelscan->r_offset;
1200 	      start
1201 		= (bfd_vma) ((bfd_signed_vma) stop - (long) irelscan->r_addend);
1202 
1203 	      /* STOP is in a different section, so it won't change.  */
1204 	      if (start > addr && start < toaddr)
1205 		irelscan->r_addend += count;
1206 
1207 	      voff = bfd_get_signed_32 (abfd, ocontents + irelscan->r_offset);
1208 	      stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1209 
1210 	      if (start > addr
1211 		  && start < toaddr
1212 		  && (stop <= addr || stop >= toaddr))
1213 		bfd_put_signed_32 (abfd, (bfd_vma) voff + count,
1214 				   ocontents + irelscan->r_offset);
1215 	      else if (stop > addr
1216 		       && stop < toaddr
1217 		       && (start <= addr || start >= toaddr))
1218 		bfd_put_signed_32 (abfd, (bfd_vma) voff - count,
1219 				   ocontents + irelscan->r_offset);
1220 	    }
1221 
1222 	  if (ELF32_R_TYPE (irelscan->r_info) != (int) R_SH_DIR32)
1223 	    continue;
1224 
1225 	  if (ELF32_R_SYM (irelscan->r_info) >= symtab_hdr->sh_info)
1226 	    continue;
1227 
1228 
1229 	  isym = isymbuf + ELF32_R_SYM (irelscan->r_info);
1230 	  if (isym->st_shndx == sec_shndx
1231 	      && (isym->st_value <= addr
1232 		  || isym->st_value >= toaddr))
1233 	    {
1234 	      bfd_vma val;
1235 
1236 	      if (ocontents == NULL)
1237 		{
1238 		  if (elf_section_data (o)->this_hdr.contents != NULL)
1239 		    ocontents = elf_section_data (o)->this_hdr.contents;
1240 		  else
1241 		    {
1242 		      /* We always cache the section contents.
1243 			 Perhaps, if info->keep_memory is FALSE, we
1244 			 should free them, if we are permitted to,
1245 			 when we leave sh_coff_relax_section.  */
1246 		      if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1247 			{
1248 			  free (ocontents);
1249 			  return false;
1250 			}
1251 
1252 		      elf_section_data (o)->this_hdr.contents = ocontents;
1253 		    }
1254 		}
1255 
1256 	      val = bfd_get_32 (abfd, ocontents + irelscan->r_offset);
1257 	      val += isym->st_value;
1258 	      if (val > addr && val < toaddr)
1259 		bfd_put_32 (abfd, val - count,
1260 			    ocontents + irelscan->r_offset);
1261 	    }
1262 	}
1263     }
1264 
1265   /* Adjust the local symbols defined in this section.  */
1266   isymend = isymbuf + symtab_hdr->sh_info;
1267   for (isym = isymbuf; isym < isymend; isym++)
1268     {
1269       if (isym->st_shndx == sec_shndx
1270 	  && isym->st_value > addr
1271 	  && isym->st_value < toaddr)
1272 	isym->st_value -= count;
1273     }
1274 
1275   /* Now adjust the global symbols defined in this section.  */
1276   symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
1277 	      - symtab_hdr->sh_info);
1278   sym_hashes = elf_sym_hashes (abfd);
1279   end_hashes = sym_hashes + symcount;
1280   for (; sym_hashes < end_hashes; sym_hashes++)
1281     {
1282       struct elf_link_hash_entry *sym_hash = *sym_hashes;
1283       if ((sym_hash->root.type == bfd_link_hash_defined
1284 	   || sym_hash->root.type == bfd_link_hash_defweak)
1285 	  && sym_hash->root.u.def.section == sec
1286 	  && sym_hash->root.u.def.value > addr
1287 	  && sym_hash->root.u.def.value < toaddr)
1288 	{
1289 	  sym_hash->root.u.def.value -= count;
1290 	}
1291     }
1292 
1293   /* See if we can move the ALIGN reloc forward.  We have adjusted
1294      r_offset for it already.  */
1295   if (irelalign != NULL)
1296     {
1297       bfd_vma alignto, alignaddr;
1298 
1299       alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
1300       alignaddr = BFD_ALIGN (irelalign->r_offset,
1301 			     1 << irelalign->r_addend);
1302       if (alignto != alignaddr)
1303 	{
1304 	  /* Tail recursion.  */
1305 	  return sh_elf_relax_delete_bytes (abfd, sec, alignaddr,
1306 					    (int) (alignto - alignaddr));
1307 	}
1308     }
1309 
1310   return true;
1311 }
1312 
1313 /* Look for loads and stores which we can align to four byte
1314    boundaries.  This is like sh_align_loads in coff-sh.c.  */
1315 
1316 static bool
sh_elf_align_loads(bfd * abfd ATTRIBUTE_UNUSED,asection * sec,Elf_Internal_Rela * internal_relocs,bfd_byte * contents ATTRIBUTE_UNUSED,bool * pswapped)1317 sh_elf_align_loads (bfd *abfd ATTRIBUTE_UNUSED, asection *sec,
1318 		    Elf_Internal_Rela *internal_relocs,
1319 		    bfd_byte *contents ATTRIBUTE_UNUSED,
1320 		    bool *pswapped)
1321 {
1322   Elf_Internal_Rela *irel, *irelend;
1323   bfd_vma *labels = NULL;
1324   bfd_vma *label, *label_end;
1325   bfd_size_type amt;
1326 
1327   *pswapped = false;
1328 
1329   irelend = internal_relocs + sec->reloc_count;
1330 
1331   /* Get all the addresses with labels on them.  */
1332   amt = sec->reloc_count;
1333   amt *= sizeof (bfd_vma);
1334   labels = (bfd_vma *) bfd_malloc (amt);
1335   if (labels == NULL)
1336     goto error_return;
1337   label_end = labels;
1338   for (irel = internal_relocs; irel < irelend; irel++)
1339     {
1340       if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_LABEL)
1341 	{
1342 	  *label_end = irel->r_offset;
1343 	  ++label_end;
1344 	}
1345     }
1346 
1347   /* Note that the assembler currently always outputs relocs in
1348      address order.  If that ever changes, this code will need to sort
1349      the label values and the relocs.  */
1350 
1351   label = labels;
1352 
1353   for (irel = internal_relocs; irel < irelend; irel++)
1354     {
1355       bfd_vma start, stop;
1356 
1357       if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE)
1358 	continue;
1359 
1360       start = irel->r_offset;
1361 
1362       for (irel++; irel < irelend; irel++)
1363 	if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_DATA)
1364 	  break;
1365       if (irel < irelend)
1366 	stop = irel->r_offset;
1367       else
1368 	stop = sec->size;
1369 
1370       if (! _bfd_sh_align_load_span (abfd, sec, contents, sh_elf_swap_insns,
1371 				     internal_relocs, &label,
1372 				     label_end, start, stop, pswapped))
1373 	goto error_return;
1374     }
1375 
1376   free (labels);
1377 
1378   return true;
1379 
1380  error_return:
1381   free (labels);
1382   return false;
1383 }
1384 
1385 /* Swap two SH instructions.  This is like sh_swap_insns in coff-sh.c.  */
1386 
1387 static bool
sh_elf_swap_insns(bfd * abfd,asection * sec,void * relocs,bfd_byte * contents,bfd_vma addr)1388 sh_elf_swap_insns (bfd *abfd, asection *sec, void *relocs,
1389 		   bfd_byte *contents, bfd_vma addr)
1390 {
1391   Elf_Internal_Rela *internal_relocs = (Elf_Internal_Rela *) relocs;
1392   unsigned short i1, i2;
1393   Elf_Internal_Rela *irel, *irelend;
1394 
1395   /* Swap the instructions themselves.  */
1396   i1 = bfd_get_16 (abfd, contents + addr);
1397   i2 = bfd_get_16 (abfd, contents + addr + 2);
1398   bfd_put_16 (abfd, (bfd_vma) i2, contents + addr);
1399   bfd_put_16 (abfd, (bfd_vma) i1, contents + addr + 2);
1400 
1401   /* Adjust all reloc addresses.  */
1402   irelend = internal_relocs + sec->reloc_count;
1403   for (irel = internal_relocs; irel < irelend; irel++)
1404     {
1405       enum elf_sh_reloc_type type;
1406       int add;
1407 
1408       /* There are a few special types of relocs that we don't want to
1409 	 adjust.  These relocs do not apply to the instruction itself,
1410 	 but are only associated with the address.  */
1411       type = (enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info);
1412       if (type == R_SH_ALIGN
1413 	  || type == R_SH_CODE
1414 	  || type == R_SH_DATA
1415 	  || type == R_SH_LABEL)
1416 	continue;
1417 
1418       /* If an R_SH_USES reloc points to one of the addresses being
1419 	 swapped, we must adjust it.  It would be incorrect to do this
1420 	 for a jump, though, since we want to execute both
1421 	 instructions after the jump.  (We have avoided swapping
1422 	 around a label, so the jump will not wind up executing an
1423 	 instruction it shouldn't).  */
1424       if (type == R_SH_USES)
1425 	{
1426 	  bfd_vma off;
1427 
1428 	  off = irel->r_offset + 4 + irel->r_addend;
1429 	  if (off == addr)
1430 	    irel->r_offset += 2;
1431 	  else if (off == addr + 2)
1432 	    irel->r_offset -= 2;
1433 	}
1434 
1435       if (irel->r_offset == addr)
1436 	{
1437 	  irel->r_offset += 2;
1438 	  add = -2;
1439 	}
1440       else if (irel->r_offset == addr + 2)
1441 	{
1442 	  irel->r_offset -= 2;
1443 	  add = 2;
1444 	}
1445       else
1446 	add = 0;
1447 
1448       if (add != 0)
1449 	{
1450 	  bfd_byte *loc;
1451 	  unsigned short insn, oinsn;
1452 	  bool overflow;
1453 
1454 	  loc = contents + irel->r_offset;
1455 	  overflow = false;
1456 	  switch (type)
1457 	    {
1458 	    default:
1459 	      break;
1460 
1461 	    case R_SH_DIR8WPN:
1462 	    case R_SH_DIR8WPZ:
1463 	      insn = bfd_get_16 (abfd, loc);
1464 	      oinsn = insn;
1465 	      insn += add / 2;
1466 	      if ((oinsn & 0xff00) != (insn & 0xff00))
1467 		overflow = true;
1468 	      bfd_put_16 (abfd, (bfd_vma) insn, loc);
1469 	      break;
1470 
1471 	    case R_SH_IND12W:
1472 	      insn = bfd_get_16 (abfd, loc);
1473 	      oinsn = insn;
1474 	      insn += add / 2;
1475 	      if ((oinsn & 0xf000) != (insn & 0xf000))
1476 		overflow = true;
1477 	      bfd_put_16 (abfd, (bfd_vma) insn, loc);
1478 	      break;
1479 
1480 	    case R_SH_DIR8WPL:
1481 	      /* This reloc ignores the least significant 3 bits of
1482 		 the program counter before adding in the offset.
1483 		 This means that if ADDR is at an even address, the
1484 		 swap will not affect the offset.  If ADDR is an at an
1485 		 odd address, then the instruction will be crossing a
1486 		 four byte boundary, and must be adjusted.  */
1487 	      if ((addr & 3) != 0)
1488 		{
1489 		  insn = bfd_get_16 (abfd, loc);
1490 		  oinsn = insn;
1491 		  insn += add / 2;
1492 		  if ((oinsn & 0xff00) != (insn & 0xff00))
1493 		    overflow = true;
1494 		  bfd_put_16 (abfd, (bfd_vma) insn, loc);
1495 		}
1496 
1497 	      break;
1498 	    }
1499 
1500 	  if (overflow)
1501 	    {
1502 	      _bfd_error_handler
1503 		/* xgettext:c-format */
1504 		(_("%pB: %#" PRIx64 ": fatal: reloc overflow while relaxing"),
1505 		 abfd, (uint64_t) irel->r_offset);
1506 	      bfd_set_error (bfd_error_bad_value);
1507 	      return false;
1508 	    }
1509 	}
1510     }
1511 
1512   return true;
1513 }
1514 
1515 /* Describes one of the various PLT styles.  */
1516 
1517 struct elf_sh_plt_info
1518 {
1519   /* The template for the first PLT entry, or NULL if there is no special
1520      first entry.  */
1521   const bfd_byte *plt0_entry;
1522 
1523   /* The size of PLT0_ENTRY in bytes, or 0 if PLT0_ENTRY is NULL.  */
1524   bfd_vma plt0_entry_size;
1525 
1526   /* Index I is the offset into PLT0_ENTRY of a pointer to
1527      _GLOBAL_OFFSET_TABLE_ + I * 4.  The value is MINUS_ONE
1528      if there is no such pointer.  */
1529   bfd_vma plt0_got_fields[3];
1530 
1531   /* The template for a symbol's PLT entry.  */
1532   const bfd_byte *symbol_entry;
1533 
1534   /* The size of SYMBOL_ENTRY in bytes.  */
1535   bfd_vma symbol_entry_size;
1536 
1537   /* Byte offsets of fields in SYMBOL_ENTRY.  Not all fields are used
1538      on all targets.  The comments by each member indicate the value
1539      that the field must hold.  */
1540   struct {
1541     bfd_vma got_entry; /* the address of the symbol's .got.plt entry */
1542     bfd_vma plt; /* .plt (or a branch to .plt on VxWorks) */
1543     bfd_vma reloc_offset; /* the offset of the symbol's JMP_SLOT reloc */
1544     bool got20; /* TRUE if got_entry points to a movi20 instruction
1545 		   (instead of a constant pool entry).  */
1546   } symbol_fields;
1547 
1548   /* The offset of the resolver stub from the start of SYMBOL_ENTRY.  */
1549   bfd_vma symbol_resolve_offset;
1550 
1551   /* A different PLT layout which can be used for the first
1552      MAX_SHORT_PLT entries.  It must share the same plt0.  NULL in
1553      other cases.  */
1554   const struct elf_sh_plt_info *short_plt;
1555 };
1556 
1557 /* The size in bytes of an entry in the procedure linkage table.  */
1558 
1559 #define ELF_PLT_ENTRY_SIZE 28
1560 
1561 /* First entry in an absolute procedure linkage table look like this.  */
1562 
1563 /* Note - this code has been "optimised" not to use r2.  r2 is used by
1564    GCC to return the address of large structures, so it should not be
1565    corrupted here.  This does mean however, that this PLT does not conform
1566    to the SH PIC ABI.  That spec says that r0 contains the type of the PLT
1567    and r2 contains the GOT id.  This version stores the GOT id in r0 and
1568    ignores the type.  Loaders can easily detect this difference however,
1569    since the type will always be 0 or 8, and the GOT ids will always be
1570    greater than or equal to 12.  */
1571 static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
1572 {
1573   0xd0, 0x05,	/* mov.l 2f,r0 */
1574   0x60, 0x02,	/* mov.l @r0,r0 */
1575   0x2f, 0x06,	/* mov.l r0,@-r15 */
1576   0xd0, 0x03,	/* mov.l 1f,r0 */
1577   0x60, 0x02,	/* mov.l @r0,r0 */
1578   0x40, 0x2b,	/* jmp @r0 */
1579   0x60, 0xf6,	/*  mov.l @r15+,r0 */
1580   0x00, 0x09,	/* nop */
1581   0x00, 0x09,	/* nop */
1582   0x00, 0x09,	/* nop */
1583   0, 0, 0, 0,	/* 1: replaced with address of .got.plt + 8.  */
1584   0, 0, 0, 0,	/* 2: replaced with address of .got.plt + 4.  */
1585 };
1586 
1587 static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
1588 {
1589   0x05, 0xd0,	/* mov.l 2f,r0 */
1590   0x02, 0x60,	/* mov.l @r0,r0 */
1591   0x06, 0x2f,	/* mov.l r0,@-r15 */
1592   0x03, 0xd0,	/* mov.l 1f,r0 */
1593   0x02, 0x60,	/* mov.l @r0,r0 */
1594   0x2b, 0x40,	/* jmp @r0 */
1595   0xf6, 0x60,	/*  mov.l @r15+,r0 */
1596   0x09, 0x00,	/* nop */
1597   0x09, 0x00,	/* nop */
1598   0x09, 0x00,	/* nop */
1599   0, 0, 0, 0,	/* 1: replaced with address of .got.plt + 8.  */
1600   0, 0, 0, 0,	/* 2: replaced with address of .got.plt + 4.  */
1601 };
1602 
1603 /* Sebsequent entries in an absolute procedure linkage table look like
1604    this.  */
1605 
1606 static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
1607 {
1608   0xd0, 0x04,	/* mov.l 1f,r0 */
1609   0x60, 0x02,	/* mov.l @(r0,r12),r0 */
1610   0xd1, 0x02,	/* mov.l 0f,r1 */
1611   0x40, 0x2b,   /* jmp @r0 */
1612   0x60, 0x13,	/*  mov r1,r0 */
1613   0xd1, 0x03,	/* mov.l 2f,r1 */
1614   0x40, 0x2b,	/* jmp @r0 */
1615   0x00, 0x09,	/* nop */
1616   0, 0, 0, 0,	/* 0: replaced with address of .PLT0.  */
1617   0, 0, 0, 0,	/* 1: replaced with address of this symbol in .got.  */
1618   0, 0, 0, 0,	/* 2: replaced with offset into relocation table.  */
1619 };
1620 
1621 static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
1622 {
1623   0x04, 0xd0,	/* mov.l 1f,r0 */
1624   0x02, 0x60,	/* mov.l @r0,r0 */
1625   0x02, 0xd1,	/* mov.l 0f,r1 */
1626   0x2b, 0x40,   /* jmp @r0 */
1627   0x13, 0x60,	/*  mov r1,r0 */
1628   0x03, 0xd1,	/* mov.l 2f,r1 */
1629   0x2b, 0x40,	/* jmp @r0 */
1630   0x09, 0x00,	/*  nop */
1631   0, 0, 0, 0,	/* 0: replaced with address of .PLT0.  */
1632   0, 0, 0, 0,	/* 1: replaced with address of this symbol in .got.  */
1633   0, 0, 0, 0,	/* 2: replaced with offset into relocation table.  */
1634 };
1635 
1636 /* Entries in a PIC procedure linkage table look like this.  */
1637 
1638 static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
1639 {
1640   0xd0, 0x04,	/* mov.l 1f,r0 */
1641   0x00, 0xce,	/* mov.l @(r0,r12),r0 */
1642   0x40, 0x2b,	/* jmp @r0 */
1643   0x00, 0x09,	/*  nop */
1644   0x50, 0xc2,	/* mov.l @(8,r12),r0 */
1645   0xd1, 0x03,	/* mov.l 2f,r1 */
1646   0x40, 0x2b,	/* jmp @r0 */
1647   0x50, 0xc1,	/*  mov.l @(4,r12),r0 */
1648   0x00, 0x09,	/* nop */
1649   0x00, 0x09,	/* nop */
1650   0, 0, 0, 0,	/* 1: replaced with address of this symbol in .got.  */
1651   0, 0, 0, 0    /* 2: replaced with offset into relocation table.  */
1652 };
1653 
1654 static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
1655 {
1656   0x04, 0xd0,	/* mov.l 1f,r0 */
1657   0xce, 0x00,	/* mov.l @(r0,r12),r0 */
1658   0x2b, 0x40,	/* jmp @r0 */
1659   0x09, 0x00,	/*  nop */
1660   0xc2, 0x50,	/* mov.l @(8,r12),r0 */
1661   0x03, 0xd1,	/* mov.l 2f,r1 */
1662   0x2b, 0x40,	/* jmp @r0 */
1663   0xc1, 0x50,	/*  mov.l @(4,r12),r0 */
1664   0x09, 0x00,	/*  nop */
1665   0x09, 0x00,	/* nop */
1666   0, 0, 0, 0,	/* 1: replaced with address of this symbol in .got.  */
1667   0, 0, 0, 0    /* 2: replaced with offset into relocation table.  */
1668 };
1669 
1670 static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1671   {
1672     {
1673       /* Big-endian non-PIC.  */
1674       elf_sh_plt0_entry_be,
1675       ELF_PLT_ENTRY_SIZE,
1676       { MINUS_ONE, 24, 20 },
1677       elf_sh_plt_entry_be,
1678       ELF_PLT_ENTRY_SIZE,
1679       { 20, 16, 24, false },
1680       8,
1681       NULL
1682     },
1683     {
1684       /* Little-endian non-PIC.  */
1685       elf_sh_plt0_entry_le,
1686       ELF_PLT_ENTRY_SIZE,
1687       { MINUS_ONE, 24, 20 },
1688       elf_sh_plt_entry_le,
1689       ELF_PLT_ENTRY_SIZE,
1690       { 20, 16, 24, false },
1691       8,
1692       NULL
1693     },
1694   },
1695   {
1696     {
1697       /* Big-endian PIC.  */
1698       elf_sh_plt0_entry_be,
1699       ELF_PLT_ENTRY_SIZE,
1700       { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1701       elf_sh_pic_plt_entry_be,
1702       ELF_PLT_ENTRY_SIZE,
1703       { 20, MINUS_ONE, 24, false },
1704       8,
1705       NULL
1706     },
1707     {
1708       /* Little-endian PIC.  */
1709       elf_sh_plt0_entry_le,
1710       ELF_PLT_ENTRY_SIZE,
1711       { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1712       elf_sh_pic_plt_entry_le,
1713       ELF_PLT_ENTRY_SIZE,
1714       { 20, MINUS_ONE, 24, false },
1715       8,
1716       NULL
1717     },
1718   }
1719 };
1720 
1721 #define VXWORKS_PLT_HEADER_SIZE 12
1722 #define VXWORKS_PLT_ENTRY_SIZE 24
1723 
1724 static const bfd_byte vxworks_sh_plt0_entry_be[VXWORKS_PLT_HEADER_SIZE] =
1725 {
1726   0xd1, 0x01,	/* mov.l @(8,pc),r1 */
1727   0x61, 0x12,	/* mov.l @r1,r1 */
1728   0x41, 0x2b,	/* jmp @r1 */
1729   0x00, 0x09,	/* nop */
1730   0, 0, 0, 0	/* 0: replaced with _GLOBAL_OFFSET_TABLE+8.  */
1731 };
1732 
1733 static const bfd_byte vxworks_sh_plt0_entry_le[VXWORKS_PLT_HEADER_SIZE] =
1734 {
1735   0x01, 0xd1,	/* mov.l @(8,pc),r1 */
1736   0x12, 0x61,	/* mov.l @r1,r1 */
1737   0x2b, 0x41,	/* jmp @r1 */
1738   0x09, 0x00,	/* nop */
1739   0, 0, 0, 0	/* 0: replaced with _GLOBAL_OFFSET_TABLE+8.  */
1740 };
1741 
1742 static const bfd_byte vxworks_sh_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
1743 {
1744   0xd0, 0x01,	/* mov.l @(8,pc),r0 */
1745   0x60, 0x02,	/* mov.l @r0,r0 */
1746   0x40, 0x2b,	/* jmp @r0 */
1747   0x00, 0x09,	/* nop */
1748   0, 0, 0, 0,	/* 0: replaced with address of this symbol in .got.  */
1749   0xd0, 0x01,	/* mov.l @(8,pc),r0 */
1750   0xa0, 0x00,	/* bra PLT (We need to fix the offset.)  */
1751   0x00, 0x09,	/* nop */
1752   0x00, 0x09,	/* nop */
1753   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1754 };
1755 
1756 static const bfd_byte vxworks_sh_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
1757 {
1758   0x01, 0xd0,	/* mov.l @(8,pc),r0 */
1759   0x02, 0x60,	/* mov.l @r0,r0 */
1760   0x2b, 0x40,	/* jmp @r0 */
1761   0x09, 0x00,	/* nop */
1762   0, 0, 0, 0,	/* 0: replaced with address of this symbol in .got.  */
1763   0x01, 0xd0,	/* mov.l @(8,pc),r0 */
1764   0x00, 0xa0,	/* bra PLT (We need to fix the offset.)  */
1765   0x09, 0x00,	/* nop */
1766   0x09, 0x00,	/* nop */
1767   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1768 };
1769 
1770 static const bfd_byte vxworks_sh_pic_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
1771 {
1772   0xd0, 0x01,	/* mov.l @(8,pc),r0 */
1773   0x00, 0xce,	/* mov.l @(r0,r12),r0 */
1774   0x40, 0x2b,	/* jmp @r0 */
1775   0x00, 0x09,	/* nop */
1776   0, 0, 0, 0,	/* 0: replaced with offset of this symbol in .got.  */
1777   0xd0, 0x01,	/* mov.l @(8,pc),r0 */
1778   0x51, 0xc2,	/* mov.l @(8,r12),r1 */
1779   0x41, 0x2b,	/* jmp @r1 */
1780   0x00, 0x09,	/* nop */
1781   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1782 };
1783 
1784 static const bfd_byte vxworks_sh_pic_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
1785 {
1786   0x01, 0xd0,	/* mov.l @(8,pc),r0 */
1787   0xce, 0x00,	/* mov.l @(r0,r12),r0 */
1788   0x2b, 0x40,	/* jmp @r0 */
1789   0x09, 0x00,	/* nop */
1790   0, 0, 0, 0,	/* 0: replaced with offset of this symbol in .got.  */
1791   0x01, 0xd0,	/* mov.l @(8,pc),r0 */
1792   0xc2, 0x51,	/* mov.l @(8,r12),r1 */
1793   0x2b, 0x41,	/* jmp @r1 */
1794   0x09, 0x00,	/* nop */
1795   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1796 };
1797 
1798 static const struct elf_sh_plt_info vxworks_sh_plts[2][2] = {
1799   {
1800     {
1801       /* Big-endian non-PIC.  */
1802       vxworks_sh_plt0_entry_be,
1803       VXWORKS_PLT_HEADER_SIZE,
1804       { MINUS_ONE, MINUS_ONE, 8 },
1805       vxworks_sh_plt_entry_be,
1806       VXWORKS_PLT_ENTRY_SIZE,
1807       { 8, 14, 20, false },
1808       12,
1809       NULL
1810     },
1811     {
1812       /* Little-endian non-PIC.  */
1813       vxworks_sh_plt0_entry_le,
1814       VXWORKS_PLT_HEADER_SIZE,
1815       { MINUS_ONE, MINUS_ONE, 8 },
1816       vxworks_sh_plt_entry_le,
1817       VXWORKS_PLT_ENTRY_SIZE,
1818       { 8, 14, 20, false },
1819       12,
1820       NULL
1821     },
1822   },
1823   {
1824     {
1825       /* Big-endian PIC.  */
1826       NULL,
1827       0,
1828       { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1829       vxworks_sh_pic_plt_entry_be,
1830       VXWORKS_PLT_ENTRY_SIZE,
1831       { 8, MINUS_ONE, 20, false },
1832       12,
1833       NULL
1834     },
1835     {
1836       /* Little-endian PIC.  */
1837       NULL,
1838       0,
1839       { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1840       vxworks_sh_pic_plt_entry_le,
1841       VXWORKS_PLT_ENTRY_SIZE,
1842       { 8, MINUS_ONE, 20, false },
1843       12,
1844       NULL
1845     },
1846   }
1847 };
1848 
1849 /* FDPIC PLT entries.  Two unimplemented optimizations for lazy
1850    binding are to omit the lazy binding stub when linking with -z now
1851    and to move lazy binding stubs into a separate region for better
1852    cache behavior.  */
1853 
1854 #define FDPIC_PLT_ENTRY_SIZE 28
1855 #define FDPIC_PLT_LAZY_OFFSET 20
1856 
1857 /* FIXME: The lazy binding stub requires a plt0 - which may need to be
1858    duplicated if it is out of range, or which can be inlined.  So
1859    right now it is always inlined, which wastes a word per stub.  It
1860    might be easier to handle the duplication if we put the lazy
1861    stubs separately.  */
1862 
1863 static const bfd_byte fdpic_sh_plt_entry_be[FDPIC_PLT_ENTRY_SIZE] =
1864 {
1865   0xd0, 0x02,	/* mov.l @(12,pc),r0 */
1866   0x01, 0xce,	/* mov.l @(r0,r12),r1 */
1867   0x70, 0x04,	/* add #4, r0 */
1868   0x41, 0x2b,	/* jmp @r1 */
1869   0x0c, 0xce,	/* mov.l @(r0,r12),r12 */
1870   0x00, 0x09,	/* nop */
1871   0, 0, 0, 0,	/* 0: replaced with offset of this symbol's funcdesc */
1872   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1873   0x60, 0xc2,	/* mov.l @r12,r0 */
1874   0x40, 0x2b,	/* jmp @r0 */
1875   0x53, 0xc1,	/*  mov.l @(4,r12),r3 */
1876   0x00, 0x09,	/* nop */
1877 };
1878 
1879 static const bfd_byte fdpic_sh_plt_entry_le[FDPIC_PLT_ENTRY_SIZE] =
1880 {
1881   0x02, 0xd0,	/* mov.l @(12,pc),r0 */
1882   0xce, 0x01,	/* mov.l @(r0,r12),r1 */
1883   0x04, 0x70,	/* add #4, r0 */
1884   0x2b, 0x41,	/* jmp @r1 */
1885   0xce, 0x0c,	/* mov.l @(r0,r12),r12 */
1886   0x09, 0x00,	/* nop */
1887   0, 0, 0, 0,	/* 0: replaced with offset of this symbol's funcdesc */
1888   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1889   0xc2, 0x60,	/* mov.l @r12,r0 */
1890   0x2b, 0x40,	/* jmp @r0 */
1891   0xc1, 0x53,	/*  mov.l @(4,r12),r3 */
1892   0x09, 0x00,	/* nop */
1893 };
1894 
1895 static const struct elf_sh_plt_info fdpic_sh_plts[2] = {
1896   {
1897     /* Big-endian PIC.  */
1898     NULL,
1899     0,
1900     { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1901     fdpic_sh_plt_entry_be,
1902     FDPIC_PLT_ENTRY_SIZE,
1903     { 12, MINUS_ONE, 16, false },
1904     FDPIC_PLT_LAZY_OFFSET,
1905     NULL
1906   },
1907   {
1908     /* Little-endian PIC.  */
1909     NULL,
1910     0,
1911     { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1912     fdpic_sh_plt_entry_le,
1913     FDPIC_PLT_ENTRY_SIZE,
1914     { 12, MINUS_ONE, 16, false },
1915     FDPIC_PLT_LAZY_OFFSET,
1916     NULL
1917   },
1918 };
1919 
1920 /* On SH2A, we can use the movi20 instruction to generate shorter PLT
1921    entries for the first 64K slots.  We use the normal FDPIC PLT entry
1922    past that point; we could also use movi20s, which might be faster,
1923    but would not be any smaller.  */
1924 
1925 #define FDPIC_SH2A_PLT_ENTRY_SIZE 24
1926 #define FDPIC_SH2A_PLT_LAZY_OFFSET 16
1927 
1928 static const bfd_byte fdpic_sh2a_plt_entry_be[FDPIC_SH2A_PLT_ENTRY_SIZE] =
1929 {
1930   0, 0, 0, 0,	/* movi20 #gotofffuncdesc,r0 */
1931   0x01, 0xce,	/* mov.l @(r0,r12),r1 */
1932   0x70, 0x04,	/* add #4, r0 */
1933   0x41, 0x2b,	/* jmp @r1 */
1934   0x0c, 0xce,	/* mov.l @(r0,r12),r12 */
1935   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1936   0x60, 0xc2,	/* mov.l @r12,r0 */
1937   0x40, 0x2b,	/* jmp @r0 */
1938   0x53, 0xc1,	/*  mov.l @(4,r12),r3 */
1939   0x00, 0x09,	/* nop */
1940 };
1941 
1942 static const bfd_byte fdpic_sh2a_plt_entry_le[FDPIC_SH2A_PLT_ENTRY_SIZE] =
1943 {
1944   0, 0, 0, 0,	/* movi20 #gotofffuncdesc,r0 */
1945   0xce, 0x01,	/* mov.l @(r0,r12),r1 */
1946   0x04, 0x70,	/* add #4, r0 */
1947   0x2b, 0x41,	/* jmp @r1 */
1948   0xce, 0x0c,	/* mov.l @(r0,r12),r12 */
1949   0, 0, 0, 0,	/* 1: replaced with offset into relocation table.  */
1950   0xc2, 0x60,	/* mov.l @r12,r0 */
1951   0x2b, 0x40,	/* jmp @r0 */
1952   0xc1, 0x53,	/*  mov.l @(4,r12),r3 */
1953   0x09, 0x00,	/* nop */
1954 };
1955 
1956 static const struct elf_sh_plt_info fdpic_sh2a_short_plt_be = {
1957   /* Big-endian FDPIC, max index 64K.  */
1958   NULL,
1959   0,
1960   { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1961   fdpic_sh2a_plt_entry_be,
1962   FDPIC_SH2A_PLT_ENTRY_SIZE,
1963   { 0, MINUS_ONE, 12, true },
1964   FDPIC_SH2A_PLT_LAZY_OFFSET,
1965   NULL
1966 };
1967 
1968 static const struct elf_sh_plt_info fdpic_sh2a_short_plt_le = {
1969   /* Little-endian FDPIC, max index 64K.  */
1970   NULL,
1971   0,
1972   { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1973   fdpic_sh2a_plt_entry_le,
1974   FDPIC_SH2A_PLT_ENTRY_SIZE,
1975   { 0, MINUS_ONE, 12, true },
1976   FDPIC_SH2A_PLT_LAZY_OFFSET,
1977   NULL
1978 };
1979 
1980 static const struct elf_sh_plt_info fdpic_sh2a_plts[2] = {
1981   {
1982     /* Big-endian PIC.  */
1983     NULL,
1984     0,
1985     { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1986     fdpic_sh_plt_entry_be,
1987     FDPIC_PLT_ENTRY_SIZE,
1988     { 12, MINUS_ONE, 16, false },
1989     FDPIC_PLT_LAZY_OFFSET,
1990     &fdpic_sh2a_short_plt_be
1991   },
1992   {
1993     /* Little-endian PIC.  */
1994     NULL,
1995     0,
1996     { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1997     fdpic_sh_plt_entry_le,
1998     FDPIC_PLT_ENTRY_SIZE,
1999     { 12, MINUS_ONE, 16, false },
2000     FDPIC_PLT_LAZY_OFFSET,
2001     &fdpic_sh2a_short_plt_le
2002   },
2003 };
2004 
2005 /* Return the type of PLT associated with ABFD.  PIC_P is true if
2006    the object is position-independent.  */
2007 
2008 static const struct elf_sh_plt_info *
get_plt_info(bfd * abfd,bool pic_p)2009 get_plt_info (bfd *abfd, bool pic_p)
2010 {
2011   if (fdpic_object_p (abfd))
2012     {
2013       /* If any input file requires SH2A we can use a shorter PLT
2014 	 sequence.  */
2015       if (sh_get_arch_from_bfd_mach (bfd_get_mach (abfd)) & arch_sh2a_base)
2016 	return &fdpic_sh2a_plts[!bfd_big_endian (abfd)];
2017       else
2018 	return &fdpic_sh_plts[!bfd_big_endian (abfd)];
2019     }
2020   if (vxworks_object_p (abfd))
2021     return &vxworks_sh_plts[pic_p][!bfd_big_endian (abfd)];
2022   return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
2023 }
2024 
2025 /* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
2026    VALUE is the field's value and CODE_P is true if VALUE refers to code,
2027    not data.  */
2028 
2029 inline static void
install_plt_field(bfd * output_bfd,bool code_p ATTRIBUTE_UNUSED,unsigned long value,bfd_byte * addr)2030 install_plt_field (bfd *output_bfd, bool code_p ATTRIBUTE_UNUSED,
2031 		   unsigned long value, bfd_byte *addr)
2032 {
2033   bfd_put_32 (output_bfd, value, addr);
2034 }
2035 
2036 /* The number of PLT entries which can use a shorter PLT, if any.
2037    Currently always 64K, since only SH-2A FDPIC uses this; a
2038    20-bit movi20 can address that many function descriptors below
2039    _GLOBAL_OFFSET_TABLE_.  */
2040 #define MAX_SHORT_PLT 65536
2041 
2042 /* Return the index of the PLT entry at byte offset OFFSET.  */
2043 
2044 static bfd_vma
get_plt_index(const struct elf_sh_plt_info * info,bfd_vma offset)2045 get_plt_index (const struct elf_sh_plt_info *info, bfd_vma offset)
2046 {
2047   bfd_vma plt_index = 0;
2048 
2049   offset -= info->plt0_entry_size;
2050   if (info->short_plt != NULL)
2051     {
2052       if (offset > MAX_SHORT_PLT * info->short_plt->symbol_entry_size)
2053 	{
2054 	  plt_index = MAX_SHORT_PLT;
2055 	  offset -= MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2056 	}
2057       else
2058 	info = info->short_plt;
2059     }
2060   return plt_index + offset / info->symbol_entry_size;
2061 }
2062 
2063 /* Do the inverse operation.  */
2064 
2065 static bfd_vma
get_plt_offset(const struct elf_sh_plt_info * info,bfd_vma plt_index)2066 get_plt_offset (const struct elf_sh_plt_info *info, bfd_vma plt_index)
2067 {
2068   bfd_vma offset = 0;
2069 
2070   if (info->short_plt != NULL)
2071     {
2072       if (plt_index > MAX_SHORT_PLT)
2073 	{
2074 	  offset = MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2075 	  plt_index -= MAX_SHORT_PLT;
2076 	}
2077       else
2078 	info = info->short_plt;
2079     }
2080   return (offset + info->plt0_entry_size
2081 	  + (plt_index * info->symbol_entry_size));
2082 }
2083 
2084 union gotref
2085 {
2086   bfd_signed_vma refcount;
2087   bfd_vma offset;
2088 };
2089 
2090 /* sh ELF linker hash entry.  */
2091 
2092 struct elf_sh_link_hash_entry
2093 {
2094   struct elf_link_hash_entry root;
2095 
2096   bfd_signed_vma gotplt_refcount;
2097 
2098   /* A local function descriptor, for FDPIC.  The refcount counts
2099      R_SH_FUNCDESC, R_SH_GOTOFFFUNCDESC, and R_SH_GOTOFFFUNCDESC20
2100      relocations; the PLT and GOT entry are accounted
2101      for separately.  After adjust_dynamic_symbol, the offset is
2102      MINUS_ONE if there is no local descriptor (dynamic linker
2103      managed and no PLT entry, or undefined weak non-dynamic).
2104      During check_relocs we do not yet know whether the local
2105      descriptor will be canonical.  */
2106   union gotref funcdesc;
2107 
2108   /* How many of the above refcounted relocations were R_SH_FUNCDESC,
2109      and thus require fixups or relocations.  */
2110   bfd_signed_vma abs_funcdesc_refcount;
2111 
2112   enum got_type {
2113     GOT_UNKNOWN = 0, GOT_NORMAL, GOT_TLS_GD, GOT_TLS_IE, GOT_FUNCDESC
2114   } got_type;
2115 };
2116 
2117 #define sh_elf_hash_entry(ent) ((struct elf_sh_link_hash_entry *)(ent))
2118 
2119 struct sh_elf_obj_tdata
2120 {
2121   struct elf_obj_tdata root;
2122 
2123   /* got_type for each local got entry.  */
2124   char *local_got_type;
2125 
2126   /* Function descriptor refcount and offset for each local symbol.  */
2127   union gotref *local_funcdesc;
2128 };
2129 
2130 #define sh_elf_tdata(abfd) \
2131   ((struct sh_elf_obj_tdata *) (abfd)->tdata.any)
2132 
2133 #define sh_elf_local_got_type(abfd) \
2134   (sh_elf_tdata (abfd)->local_got_type)
2135 
2136 #define sh_elf_local_funcdesc(abfd) \
2137   (sh_elf_tdata (abfd)->local_funcdesc)
2138 
2139 #define is_sh_elf(bfd) \
2140   (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2141    && elf_tdata (bfd) != NULL \
2142    && elf_object_id (bfd) == SH_ELF_DATA)
2143 
2144 /* Override the generic function because we need to store sh_elf_obj_tdata
2145    as the specific tdata.  */
2146 
2147 static bool
sh_elf_mkobject(bfd * abfd)2148 sh_elf_mkobject (bfd *abfd)
2149 {
2150   return bfd_elf_allocate_object (abfd, sizeof (struct sh_elf_obj_tdata),
2151 				  SH_ELF_DATA);
2152 }
2153 
2154 /* sh ELF linker hash table.  */
2155 
2156 struct elf_sh_link_hash_table
2157 {
2158   struct elf_link_hash_table root;
2159 
2160   /* Short-cuts to get to dynamic linker sections.  */
2161   asection *sfuncdesc;
2162   asection *srelfuncdesc;
2163   asection *srofixup;
2164 
2165   /* The (unloaded but important) VxWorks .rela.plt.unloaded section.  */
2166   asection *srelplt2;
2167 
2168   /* A counter or offset to track a TLS got entry.  */
2169   union
2170     {
2171       bfd_signed_vma refcount;
2172       bfd_vma offset;
2173     } tls_ldm_got;
2174 
2175   /* The type of PLT to use.  */
2176   const struct elf_sh_plt_info *plt_info;
2177 
2178   /* True if the target system uses FDPIC.  */
2179   bool fdpic_p;
2180 };
2181 
2182 /* Traverse an sh ELF linker hash table.  */
2183 
2184 #define sh_elf_link_hash_traverse(table, func, info)			\
2185   (elf_link_hash_traverse						\
2186    (&(table)->root,							\
2187     (bool (*) (struct elf_link_hash_entry *, void *)) (func),		\
2188     (info)))
2189 
2190 /* Get the sh ELF linker hash table from a link_info structure.  */
2191 
2192 #define sh_elf_hash_table(p) \
2193   ((is_elf_hash_table ((p)->hash)					\
2194     && elf_hash_table_id (elf_hash_table (p)) == SH_ELF_DATA)		\
2195    ? (struct elf_sh_link_hash_table *) (p)->hash : NULL)
2196 
2197 /* Create an entry in an sh ELF linker hash table.  */
2198 
2199 static struct bfd_hash_entry *
sh_elf_link_hash_newfunc(struct bfd_hash_entry * entry,struct bfd_hash_table * table,const char * string)2200 sh_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2201 			  struct bfd_hash_table *table,
2202 			  const char *string)
2203 {
2204   struct elf_sh_link_hash_entry *ret =
2205     (struct elf_sh_link_hash_entry *) entry;
2206 
2207   /* Allocate the structure if it has not already been allocated by a
2208      subclass.  */
2209   if (ret == (struct elf_sh_link_hash_entry *) NULL)
2210     ret = ((struct elf_sh_link_hash_entry *)
2211 	   bfd_hash_allocate (table,
2212 			      sizeof (struct elf_sh_link_hash_entry)));
2213   if (ret == (struct elf_sh_link_hash_entry *) NULL)
2214     return (struct bfd_hash_entry *) ret;
2215 
2216   /* Call the allocation method of the superclass.  */
2217   ret = ((struct elf_sh_link_hash_entry *)
2218 	 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
2219 				     table, string));
2220   if (ret != (struct elf_sh_link_hash_entry *) NULL)
2221     {
2222       ret->gotplt_refcount = 0;
2223       ret->funcdesc.refcount = 0;
2224       ret->abs_funcdesc_refcount = 0;
2225       ret->got_type = GOT_UNKNOWN;
2226     }
2227 
2228   return (struct bfd_hash_entry *) ret;
2229 }
2230 
2231 /* Create an sh ELF linker hash table.  */
2232 
2233 static struct bfd_link_hash_table *
sh_elf_link_hash_table_create(bfd * abfd)2234 sh_elf_link_hash_table_create (bfd *abfd)
2235 {
2236   struct elf_sh_link_hash_table *ret;
2237   size_t amt = sizeof (struct elf_sh_link_hash_table);
2238 
2239   ret = (struct elf_sh_link_hash_table *) bfd_zmalloc (amt);
2240   if (ret == (struct elf_sh_link_hash_table *) NULL)
2241     return NULL;
2242 
2243   if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
2244 				      sh_elf_link_hash_newfunc,
2245 				      sizeof (struct elf_sh_link_hash_entry),
2246 				      SH_ELF_DATA))
2247     {
2248       free (ret);
2249       return NULL;
2250     }
2251 
2252   if (fdpic_object_p (abfd))
2253     {
2254       ret->root.dt_pltgot_required = true;
2255       ret->fdpic_p = true;
2256     }
2257 
2258   return &ret->root.root;
2259 }
2260 
2261 static bool
sh_elf_omit_section_dynsym(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info,asection * p)2262 sh_elf_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
2263 			    struct bfd_link_info *info, asection *p)
2264 {
2265   struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
2266 
2267   /* Non-FDPIC binaries do not need dynamic symbols for sections.  */
2268   if (!htab->fdpic_p)
2269     return true;
2270 
2271   /* We need dynamic symbols for every section, since segments can
2272      relocate independently.  */
2273   switch (elf_section_data (p)->this_hdr.sh_type)
2274     {
2275     case SHT_PROGBITS:
2276     case SHT_NOBITS:
2277       /* If sh_type is yet undecided, assume it could be
2278 	 SHT_PROGBITS/SHT_NOBITS.  */
2279     case SHT_NULL:
2280       return false;
2281 
2282       /* There shouldn't be section relative relocations
2283 	 against any other section.  */
2284     default:
2285       return true;
2286     }
2287 }
2288 
2289 /* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
2290    shortcuts to them in our hash table.  */
2291 
2292 static bool
create_got_section(bfd * dynobj,struct bfd_link_info * info)2293 create_got_section (bfd *dynobj, struct bfd_link_info *info)
2294 {
2295   struct elf_sh_link_hash_table *htab;
2296 
2297   if (! _bfd_elf_create_got_section (dynobj, info))
2298     return false;
2299 
2300   htab = sh_elf_hash_table (info);
2301   if (htab == NULL)
2302     return false;
2303 
2304   htab->sfuncdesc = bfd_make_section_anyway_with_flags (dynobj, ".got.funcdesc",
2305 							(SEC_ALLOC | SEC_LOAD
2306 							 | SEC_HAS_CONTENTS
2307 							 | SEC_IN_MEMORY
2308 							 | SEC_LINKER_CREATED));
2309   if (htab->sfuncdesc == NULL
2310       || !bfd_set_section_alignment (htab->sfuncdesc, 2))
2311     return false;
2312 
2313   htab->srelfuncdesc = bfd_make_section_anyway_with_flags (dynobj,
2314 							   ".rela.got.funcdesc",
2315 							   (SEC_ALLOC | SEC_LOAD
2316 							    | SEC_HAS_CONTENTS
2317 							    | SEC_IN_MEMORY
2318 							    | SEC_LINKER_CREATED
2319 							    | SEC_READONLY));
2320   if (htab->srelfuncdesc == NULL
2321       || !bfd_set_section_alignment (htab->srelfuncdesc, 2))
2322     return false;
2323 
2324   /* Also create .rofixup.  */
2325   htab->srofixup = bfd_make_section_anyway_with_flags (dynobj, ".rofixup",
2326 						       (SEC_ALLOC | SEC_LOAD
2327 							| SEC_HAS_CONTENTS
2328 							| SEC_IN_MEMORY
2329 							| SEC_LINKER_CREATED
2330 							| SEC_READONLY));
2331   if (htab->srofixup == NULL
2332       || !bfd_set_section_alignment (htab->srofixup, 2))
2333     return false;
2334 
2335   return true;
2336 }
2337 
2338 /* Create dynamic sections when linking against a dynamic object.  */
2339 
2340 static bool
sh_elf_create_dynamic_sections(bfd * abfd,struct bfd_link_info * info)2341 sh_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2342 {
2343   struct elf_sh_link_hash_table *htab;
2344   flagword flags, pltflags;
2345   asection *s;
2346   const struct elf_backend_data *bed = get_elf_backend_data (abfd);
2347   int ptralign = 0;
2348 
2349   switch (bed->s->arch_size)
2350     {
2351     case 32:
2352       ptralign = 2;
2353       break;
2354 
2355     case 64:
2356       ptralign = 3;
2357       break;
2358 
2359     default:
2360       bfd_set_error (bfd_error_bad_value);
2361       return false;
2362     }
2363 
2364   htab = sh_elf_hash_table (info);
2365   if (htab == NULL)
2366     return false;
2367 
2368   if (htab->root.dynamic_sections_created)
2369     return true;
2370 
2371   /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
2372      .rel[a].bss sections.  */
2373 
2374   flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2375 	   | SEC_LINKER_CREATED);
2376 
2377   pltflags = flags;
2378   pltflags |= SEC_CODE;
2379   if (bed->plt_not_loaded)
2380     pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
2381   if (bed->plt_readonly)
2382     pltflags |= SEC_READONLY;
2383 
2384   s = bfd_make_section_anyway_with_flags (abfd, ".plt", pltflags);
2385   htab->root.splt = s;
2386   if (s == NULL
2387       || !bfd_set_section_alignment (s, bed->plt_alignment))
2388     return false;
2389 
2390   if (bed->want_plt_sym)
2391     {
2392       /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
2393 	 .plt section.  */
2394       struct elf_link_hash_entry *h;
2395       struct bfd_link_hash_entry *bh = NULL;
2396 
2397       if (! (_bfd_generic_link_add_one_symbol
2398 	     (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
2399 	      (bfd_vma) 0, (const char *) NULL, false,
2400 	      get_elf_backend_data (abfd)->collect, &bh)))
2401 	return false;
2402 
2403       h = (struct elf_link_hash_entry *) bh;
2404       h->def_regular = 1;
2405       h->type = STT_OBJECT;
2406       htab->root.hplt = h;
2407 
2408       if (bfd_link_pic (info)
2409 	  && ! bfd_elf_link_record_dynamic_symbol (info, h))
2410 	return false;
2411     }
2412 
2413   s = bfd_make_section_anyway_with_flags (abfd,
2414 					  bed->default_use_rela_p
2415 					  ? ".rela.plt" : ".rel.plt",
2416 					  flags | SEC_READONLY);
2417   htab->root.srelplt = s;
2418   if (s == NULL
2419       || !bfd_set_section_alignment (s, ptralign))
2420     return false;
2421 
2422   if (htab->root.sgot == NULL
2423       && !create_got_section (abfd, info))
2424     return false;
2425 
2426   if (bed->want_dynbss)
2427     {
2428       /* The .dynbss section is a place to put symbols which are defined
2429 	 by dynamic objects, are referenced by regular objects, and are
2430 	 not functions.  We must allocate space for them in the process
2431 	 image and use a R_*_COPY reloc to tell the dynamic linker to
2432 	 initialize them at run time.  The linker script puts the .dynbss
2433 	 section into the .bss section of the final image.  */
2434       s = bfd_make_section_anyway_with_flags (abfd, ".dynbss",
2435 					      SEC_ALLOC | SEC_LINKER_CREATED);
2436       htab->root.sdynbss = s;
2437       if (s == NULL)
2438 	return false;
2439 
2440       /* The .rel[a].bss section holds copy relocs.  This section is not
2441 	 normally needed.  We need to create it here, though, so that the
2442 	 linker will map it to an output section.  We can't just create it
2443 	 only if we need it, because we will not know whether we need it
2444 	 until we have seen all the input files, and the first time the
2445 	 main linker code calls BFD after examining all the input files
2446 	 (size_dynamic_sections) the input sections have already been
2447 	 mapped to the output sections.  If the section turns out not to
2448 	 be needed, we can discard it later.  We will never need this
2449 	 section when generating a shared object, since they do not use
2450 	 copy relocs.  */
2451       if (! bfd_link_pic (info))
2452 	{
2453 	  s = bfd_make_section_anyway_with_flags (abfd,
2454 						  (bed->default_use_rela_p
2455 						   ? ".rela.bss" : ".rel.bss"),
2456 						  flags | SEC_READONLY);
2457 	  htab->root.srelbss = s;
2458 	  if (s == NULL
2459 	      || !bfd_set_section_alignment (s, ptralign))
2460 	    return false;
2461 	}
2462     }
2463 
2464   if (htab->root.target_os == is_vxworks)
2465     {
2466       if (!elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2467 	return false;
2468     }
2469 
2470   return true;
2471 }
2472 
2473 /* Adjust a symbol defined by a dynamic object and referenced by a
2474    regular object.  The current definition is in some section of the
2475    dynamic object, but we're not including those sections.  We have to
2476    change the definition to something the rest of the link can
2477    understand.  */
2478 
2479 static bool
sh_elf_adjust_dynamic_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * h)2480 sh_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
2481 			      struct elf_link_hash_entry *h)
2482 {
2483   struct elf_sh_link_hash_table *htab;
2484   asection *s;
2485 
2486   htab = sh_elf_hash_table (info);
2487   if (htab == NULL)
2488     return false;
2489 
2490   /* Make sure we know what is going on here.  */
2491   BFD_ASSERT (htab->root.dynobj != NULL
2492 	      && (h->needs_plt
2493 		  || h->is_weakalias
2494 		  || (h->def_dynamic
2495 		      && h->ref_regular
2496 		      && !h->def_regular)));
2497 
2498   /* If this is a function, put it in the procedure linkage table.  We
2499      will fill in the contents of the procedure linkage table later,
2500      when we know the address of the .got section.  */
2501   if (h->type == STT_FUNC
2502       || h->needs_plt)
2503     {
2504       if (h->plt.refcount <= 0
2505 	  || SYMBOL_CALLS_LOCAL (info, h)
2506 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2507 	      && h->root.type == bfd_link_hash_undefweak))
2508 	{
2509 	  /* This case can occur if we saw a PLT reloc in an input
2510 	     file, but the symbol was never referred to by a dynamic
2511 	     object.  In such a case, we don't actually need to build
2512 	     a procedure linkage table, and we can just do a REL32
2513 	     reloc instead.  */
2514 	  h->plt.offset = (bfd_vma) -1;
2515 	  h->needs_plt = 0;
2516 	}
2517 
2518       return true;
2519     }
2520   else
2521     h->plt.offset = (bfd_vma) -1;
2522 
2523   /* If this is a weak symbol, and there is a real definition, the
2524      processor independent code will have arranged for us to see the
2525      real definition first, and we can just use the same value.  */
2526   if (h->is_weakalias)
2527     {
2528       struct elf_link_hash_entry *def = weakdef (h);
2529       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2530       h->root.u.def.section = def->root.u.def.section;
2531       h->root.u.def.value = def->root.u.def.value;
2532       if (info->nocopyreloc)
2533 	h->non_got_ref = def->non_got_ref;
2534       return true;
2535     }
2536 
2537   /* This is a reference to a symbol defined by a dynamic object which
2538      is not a function.  */
2539 
2540   /* If we are creating a shared library, we must presume that the
2541      only references to the symbol are via the global offset table.
2542      For such cases we need not do anything here; the relocations will
2543      be handled correctly by relocate_section.  */
2544   if (bfd_link_pic (info))
2545     return true;
2546 
2547   /* If there are no references to this symbol that do not use the
2548      GOT, we don't need to generate a copy reloc.  */
2549   if (!h->non_got_ref)
2550     return true;
2551 
2552   /* If -z nocopyreloc was given, we won't generate them either.  */
2553   if (0 && info->nocopyreloc)
2554     {
2555       h->non_got_ref = 0;
2556       return true;
2557     }
2558 
2559   /* If we don't find any dynamic relocs in read-only sections, then
2560      we'll be keeping the dynamic relocs and avoiding the copy reloc.  */
2561   if (0 && !_bfd_elf_readonly_dynrelocs (h))
2562     {
2563       h->non_got_ref = 0;
2564       return true;
2565     }
2566 
2567   /* We must allocate the symbol in our .dynbss section, which will
2568      become part of the .bss section of the executable.  There will be
2569      an entry for this symbol in the .dynsym section.  The dynamic
2570      object will contain position independent code, so all references
2571      from the dynamic object to this symbol will go through the global
2572      offset table.  The dynamic linker will use the .dynsym entry to
2573      determine the address it must put in the global offset table, so
2574      both the dynamic object and the regular object will refer to the
2575      same memory location for the variable.  */
2576 
2577   s = htab->root.sdynbss;
2578   BFD_ASSERT (s != NULL);
2579 
2580   /* We must generate a R_SH_COPY reloc to tell the dynamic linker to
2581      copy the initial value out of the dynamic object and into the
2582      runtime process image.  We need to remember the offset into the
2583      .rela.bss section we are going to use.  */
2584   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
2585     {
2586       asection *srel;
2587 
2588       srel = htab->root.srelbss;
2589       BFD_ASSERT (srel != NULL);
2590       srel->size += sizeof (Elf32_External_Rela);
2591       h->needs_copy = 1;
2592     }
2593 
2594   return _bfd_elf_adjust_dynamic_copy (info, h, s);
2595 }
2596 
2597 /* Allocate space in .plt, .got and associated reloc sections for
2598    dynamic relocs.  */
2599 
2600 static bool
allocate_dynrelocs(struct elf_link_hash_entry * h,void * inf)2601 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
2602 {
2603   struct bfd_link_info *info;
2604   struct elf_sh_link_hash_table *htab;
2605   struct elf_sh_link_hash_entry *eh;
2606   struct elf_dyn_relocs *p;
2607 
2608   if (h->root.type == bfd_link_hash_indirect)
2609     return true;
2610 
2611   info = (struct bfd_link_info *) inf;
2612   htab = sh_elf_hash_table (info);
2613   if (htab == NULL)
2614     return false;
2615 
2616   eh = (struct elf_sh_link_hash_entry *) h;
2617   if ((h->got.refcount > 0
2618        || h->forced_local)
2619       && eh->gotplt_refcount > 0)
2620     {
2621       /* The symbol has been forced local, or we have some direct got refs,
2622 	 so treat all the gotplt refs as got refs. */
2623       h->got.refcount += eh->gotplt_refcount;
2624       if (h->plt.refcount >= eh->gotplt_refcount)
2625 	h->plt.refcount -= eh->gotplt_refcount;
2626     }
2627 
2628   if (htab->root.dynamic_sections_created
2629       && h->plt.refcount > 0
2630       && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2631 	  || h->root.type != bfd_link_hash_undefweak))
2632     {
2633       /* Make sure this symbol is output as a dynamic symbol.
2634 	 Undefined weak syms won't yet be marked as dynamic.  */
2635       if (h->dynindx == -1
2636 	  && !h->forced_local)
2637 	{
2638 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
2639 	    return false;
2640 	}
2641 
2642       if (bfd_link_pic (info)
2643 	  || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
2644 	{
2645 	  asection *s = htab->root.splt;
2646 	  const struct elf_sh_plt_info *plt_info;
2647 
2648 	  /* If this is the first .plt entry, make room for the special
2649 	     first entry.  */
2650 	  if (s->size == 0)
2651 	    s->size += htab->plt_info->plt0_entry_size;
2652 
2653 	  h->plt.offset = s->size;
2654 
2655 	  /* If this symbol is not defined in a regular file, and we are
2656 	     not generating a shared library, then set the symbol to this
2657 	     location in the .plt.  This is required to make function
2658 	     pointers compare as equal between the normal executable and
2659 	     the shared library.  Skip this for FDPIC, since the
2660 	     function's address will be the address of the canonical
2661 	     function descriptor.  */
2662 	  if (!htab->fdpic_p && !bfd_link_pic (info) && !h->def_regular)
2663 	    {
2664 	      h->root.u.def.section = s;
2665 	      h->root.u.def.value = h->plt.offset;
2666 	    }
2667 
2668 	  /* Make room for this entry.  */
2669 	  plt_info = htab->plt_info;
2670 	  if (plt_info->short_plt != NULL
2671 	      && (get_plt_index (plt_info->short_plt, s->size) < MAX_SHORT_PLT))
2672 	    plt_info = plt_info->short_plt;
2673 	  s->size += plt_info->symbol_entry_size;
2674 
2675 	  /* We also need to make an entry in the .got.plt section, which
2676 	     will be placed in the .got section by the linker script.  */
2677 	  if (!htab->fdpic_p)
2678 	    htab->root.sgotplt->size += 4;
2679 	  else
2680 	    htab->root.sgotplt->size += 8;
2681 
2682 	  /* We also need to make an entry in the .rel.plt section.  */
2683 	  htab->root.srelplt->size += sizeof (Elf32_External_Rela);
2684 
2685 	  if (htab->root.target_os == is_vxworks && !bfd_link_pic (info))
2686 	    {
2687 	      /* VxWorks executables have a second set of relocations
2688 		 for each PLT entry.  They go in a separate relocation
2689 		 section, which is processed by the kernel loader.  */
2690 
2691 	      /* There is a relocation for the initial PLT entry:
2692 		 an R_SH_DIR32 relocation for _GLOBAL_OFFSET_TABLE_.  */
2693 	      if (h->plt.offset == htab->plt_info->plt0_entry_size)
2694 		htab->srelplt2->size += sizeof (Elf32_External_Rela);
2695 
2696 	      /* There are two extra relocations for each subsequent
2697 		 PLT entry: an R_SH_DIR32 relocation for the GOT entry,
2698 		 and an R_SH_DIR32 relocation for the PLT entry.  */
2699 	      htab->srelplt2->size += sizeof (Elf32_External_Rela) * 2;
2700 	    }
2701 	}
2702       else
2703 	{
2704 	  h->plt.offset = (bfd_vma) -1;
2705 	  h->needs_plt = 0;
2706 	}
2707     }
2708   else
2709     {
2710       h->plt.offset = (bfd_vma) -1;
2711       h->needs_plt = 0;
2712     }
2713 
2714   if (h->got.refcount > 0)
2715     {
2716       asection *s;
2717       bool dyn;
2718       enum got_type got_type = sh_elf_hash_entry (h)->got_type;
2719 
2720       /* Make sure this symbol is output as a dynamic symbol.
2721 	 Undefined weak syms won't yet be marked as dynamic.  */
2722       if (h->dynindx == -1
2723 	  && !h->forced_local)
2724 	{
2725 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
2726 	    return false;
2727 	}
2728 
2729       s = htab->root.sgot;
2730       h->got.offset = s->size;
2731       s->size += 4;
2732       /* R_SH_TLS_GD needs 2 consecutive GOT slots.  */
2733       if (got_type == GOT_TLS_GD)
2734 	s->size += 4;
2735       dyn = htab->root.dynamic_sections_created;
2736       if (!dyn)
2737 	{
2738 	  /* No dynamic relocations required.  */
2739 	  if (htab->fdpic_p && !bfd_link_pic (info)
2740 	      && h->root.type != bfd_link_hash_undefweak
2741 	      && (got_type == GOT_NORMAL || got_type == GOT_FUNCDESC))
2742 	    htab->srofixup->size += 4;
2743 	}
2744       /* No dynamic relocations required when IE->LE conversion happens.  */
2745       else if (got_type == GOT_TLS_IE
2746 	       && !h->def_dynamic
2747 	       && !bfd_link_pic (info))
2748 	;
2749       /* R_SH_TLS_IE_32 needs one dynamic relocation if dynamic,
2750 	 R_SH_TLS_GD needs one if local symbol and two if global.  */
2751       else if ((got_type == GOT_TLS_GD && h->dynindx == -1)
2752 	       || got_type == GOT_TLS_IE)
2753 	htab->root.srelgot->size += sizeof (Elf32_External_Rela);
2754       else if (got_type == GOT_TLS_GD)
2755 	htab->root.srelgot->size += 2 * sizeof (Elf32_External_Rela);
2756       else if (got_type == GOT_FUNCDESC)
2757 	{
2758 	  if (!bfd_link_pic (info) && SYMBOL_FUNCDESC_LOCAL (info, h))
2759 	    htab->srofixup->size += 4;
2760 	  else
2761 	    htab->root.srelgot->size += sizeof (Elf32_External_Rela);
2762 	}
2763       else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2764 		|| h->root.type != bfd_link_hash_undefweak)
2765 	       && (bfd_link_pic (info)
2766 		   || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
2767 	htab->root.srelgot->size += sizeof (Elf32_External_Rela);
2768       else if (htab->fdpic_p
2769 	       && !bfd_link_pic (info)
2770 	       && got_type == GOT_NORMAL
2771 	       && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2772 		   || h->root.type != bfd_link_hash_undefweak))
2773 	htab->srofixup->size += 4;
2774     }
2775   else
2776     h->got.offset = (bfd_vma) -1;
2777 
2778   /* Allocate space for any dynamic relocations to function
2779      descriptors, canonical or otherwise.  We need to relocate the
2780      reference unless it resolves to zero, which only happens for
2781      undefined weak symbols (either non-default visibility, or when
2782      static linking).  Any GOT slot is accounted for elsewhere.  */
2783   if (eh->abs_funcdesc_refcount > 0
2784       && (h->root.type != bfd_link_hash_undefweak
2785 	  || (htab->root.dynamic_sections_created
2786 	      && ! SYMBOL_CALLS_LOCAL (info, h))))
2787     {
2788       if (!bfd_link_pic (info) && SYMBOL_FUNCDESC_LOCAL (info, h))
2789 	htab->srofixup->size += eh->abs_funcdesc_refcount * 4;
2790       else
2791 	htab->root.srelgot->size
2792 	  += eh->abs_funcdesc_refcount * sizeof (Elf32_External_Rela);
2793     }
2794 
2795   /* We must allocate a function descriptor if there are references to
2796      a canonical descriptor (R_SH_GOTFUNCDESC or R_SH_FUNCDESC) and
2797      the dynamic linker isn't going to allocate it.  None of this
2798      applies if we already created one in .got.plt, but if the
2799      canonical function descriptor can be in this object, there
2800      won't be a PLT entry at all.  */
2801   if ((eh->funcdesc.refcount > 0
2802        || (h->got.offset != MINUS_ONE && eh->got_type == GOT_FUNCDESC))
2803       && h->root.type != bfd_link_hash_undefweak
2804       && SYMBOL_FUNCDESC_LOCAL (info, h))
2805     {
2806       /* Make room for this function descriptor.  */
2807       eh->funcdesc.offset = htab->sfuncdesc->size;
2808       htab->sfuncdesc->size += 8;
2809 
2810       /* We will need a relocation or two fixups to initialize the
2811 	 function descriptor, so allocate those too.  */
2812       if (!bfd_link_pic (info) && SYMBOL_CALLS_LOCAL (info, h))
2813 	htab->srofixup->size += 8;
2814       else
2815 	htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
2816     }
2817 
2818   if (h->dyn_relocs == NULL)
2819     return true;
2820 
2821   /* In the shared -Bsymbolic case, discard space allocated for
2822      dynamic pc-relative relocs against symbols which turn out to be
2823      defined in regular objects.  For the normal shared case, discard
2824      space for pc-relative relocs that have become local due to symbol
2825      visibility changes.  */
2826 
2827   if (bfd_link_pic (info))
2828     {
2829       if (SYMBOL_CALLS_LOCAL (info, h))
2830 	{
2831 	  struct elf_dyn_relocs **pp;
2832 
2833 	  for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
2834 	    {
2835 	      p->count -= p->pc_count;
2836 	      p->pc_count = 0;
2837 	      if (p->count == 0)
2838 		*pp = p->next;
2839 	      else
2840 		pp = &p->next;
2841 	    }
2842 	}
2843 
2844       if (htab->root.target_os == is_vxworks)
2845 	{
2846 	  struct elf_dyn_relocs **pp;
2847 
2848 	  for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
2849 	    {
2850 	      if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
2851 		*pp = p->next;
2852 	      else
2853 		pp = &p->next;
2854 	    }
2855 	}
2856 
2857       /* Also discard relocs on undefined weak syms with non-default
2858 	 visibility.  */
2859       if (h->dyn_relocs != NULL
2860 	  && h->root.type == bfd_link_hash_undefweak)
2861 	{
2862 	  if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2863 	      || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
2864 	    h->dyn_relocs = NULL;
2865 
2866 	  /* Make sure undefined weak symbols are output as a dynamic
2867 	     symbol in PIEs.  */
2868 	  else if (h->dynindx == -1
2869 		   && !h->forced_local)
2870 	    {
2871 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
2872 		return false;
2873 	    }
2874 	}
2875     }
2876   else
2877     {
2878       /* For the non-shared case, discard space for relocs against
2879 	 symbols which turn out to need copy relocs or are not
2880 	 dynamic.  */
2881 
2882       if (!h->non_got_ref
2883 	  && ((h->def_dynamic
2884 	       && !h->def_regular)
2885 	      || (htab->root.dynamic_sections_created
2886 		  && (h->root.type == bfd_link_hash_undefweak
2887 		      || h->root.type == bfd_link_hash_undefined))))
2888 	{
2889 	  /* Make sure this symbol is output as a dynamic symbol.
2890 	     Undefined weak syms won't yet be marked as dynamic.  */
2891 	  if (h->dynindx == -1
2892 	      && !h->forced_local)
2893 	    {
2894 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
2895 		return false;
2896 	    }
2897 
2898 	  /* If that succeeded, we know we'll be keeping all the
2899 	     relocs.  */
2900 	  if (h->dynindx != -1)
2901 	    goto keep;
2902 	}
2903 
2904       h->dyn_relocs = NULL;
2905 
2906     keep: ;
2907     }
2908 
2909   /* Finally, allocate space.  */
2910   for (p = h->dyn_relocs; p != NULL; p = p->next)
2911     {
2912       asection *sreloc = elf_section_data (p->sec)->sreloc;
2913       sreloc->size += p->count * sizeof (Elf32_External_Rela);
2914 
2915       /* If we need relocations, we do not need fixups.  */
2916       if (htab->fdpic_p && !bfd_link_pic (info))
2917 	htab->srofixup->size -= 4 * (p->count - p->pc_count);
2918     }
2919 
2920   return true;
2921 }
2922 
2923 /* This function is called after all the input files have been read,
2924    and the input sections have been assigned to output sections.
2925    It's a convenient place to determine the PLT style.  */
2926 
2927 static bool
sh_elf_always_size_sections(bfd * output_bfd,struct bfd_link_info * info)2928 sh_elf_always_size_sections (bfd *output_bfd, struct bfd_link_info *info)
2929 {
2930   sh_elf_hash_table (info)->plt_info = get_plt_info (output_bfd,
2931 						     bfd_link_pic (info));
2932 
2933   if (sh_elf_hash_table (info)->fdpic_p && !bfd_link_relocatable (info)
2934       && !bfd_elf_stack_segment_size (output_bfd, info,
2935 				      "__stacksize", DEFAULT_STACK_SIZE))
2936     return false;
2937   return true;
2938 }
2939 
2940 /* Set the sizes of the dynamic sections.  */
2941 
2942 static bool
sh_elf_size_dynamic_sections(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info)2943 sh_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2944 			      struct bfd_link_info *info)
2945 {
2946   struct elf_sh_link_hash_table *htab;
2947   bfd *dynobj;
2948   asection *s;
2949   bool relocs;
2950   bfd *ibfd;
2951 
2952   htab = sh_elf_hash_table (info);
2953   if (htab == NULL)
2954     return false;
2955 
2956   dynobj = htab->root.dynobj;
2957   BFD_ASSERT (dynobj != NULL);
2958 
2959   if (htab->root.dynamic_sections_created)
2960     {
2961       /* Set the contents of the .interp section to the interpreter.  */
2962       if (bfd_link_executable (info) && !info->nointerp)
2963 	{
2964 	  s = bfd_get_linker_section (dynobj, ".interp");
2965 	  BFD_ASSERT (s != NULL);
2966 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2967 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2968 	}
2969     }
2970 
2971   /* Set up .got offsets for local syms, and space for local dynamic
2972      relocs.  */
2973   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2974     {
2975       bfd_signed_vma *local_got;
2976       bfd_signed_vma *end_local_got;
2977       union gotref *local_funcdesc, *end_local_funcdesc;
2978       char *local_got_type;
2979       bfd_size_type locsymcount;
2980       Elf_Internal_Shdr *symtab_hdr;
2981       asection *srel;
2982 
2983       if (! is_sh_elf (ibfd))
2984 	continue;
2985 
2986       for (s = ibfd->sections; s != NULL; s = s->next)
2987 	{
2988 	  struct elf_dyn_relocs *p;
2989 
2990 	  for (p = ((struct elf_dyn_relocs *)
2991 		    elf_section_data (s)->local_dynrel);
2992 	       p != NULL;
2993 	       p = p->next)
2994 	    {
2995 	      if (! bfd_is_abs_section (p->sec)
2996 		  && bfd_is_abs_section (p->sec->output_section))
2997 		{
2998 		  /* Input section has been discarded, either because
2999 		     it is a copy of a linkonce section or due to
3000 		     linker script /DISCARD/, so we'll be discarding
3001 		     the relocs too.  */
3002 		}
3003 	      else if (htab->root.target_os == is_vxworks
3004 		       && strcmp (p->sec->output_section->name,
3005 				  ".tls_vars") == 0)
3006 		{
3007 		  /* Relocations in vxworks .tls_vars sections are
3008 		     handled specially by the loader.  */
3009 		}
3010 	      else if (p->count != 0)
3011 		{
3012 		  srel = elf_section_data (p->sec)->sreloc;
3013 		  srel->size += p->count * sizeof (Elf32_External_Rela);
3014 		  if ((p->sec->output_section->flags & SEC_READONLY) != 0)
3015 		    {
3016 		      info->flags |= DF_TEXTREL;
3017 		      info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
3018 					      p->sec->owner, p->sec);
3019 		    }
3020 
3021 		  /* If we need relocations, we do not need fixups.  */
3022 		  if (htab->fdpic_p && !bfd_link_pic (info))
3023 		    htab->srofixup->size -= 4 * (p->count - p->pc_count);
3024 		}
3025 	    }
3026 	}
3027 
3028       symtab_hdr = &elf_symtab_hdr (ibfd);
3029       locsymcount = symtab_hdr->sh_info;
3030       s = htab->root.sgot;
3031       srel = htab->root.srelgot;
3032 
3033       local_got = elf_local_got_refcounts (ibfd);
3034       if (local_got)
3035 	{
3036 	  end_local_got = local_got + locsymcount;
3037 	  local_got_type = sh_elf_local_got_type (ibfd);
3038 	  local_funcdesc = sh_elf_local_funcdesc (ibfd);
3039 	  for (; local_got < end_local_got; ++local_got)
3040 	    {
3041 	      if (*local_got > 0)
3042 		{
3043 		  *local_got = s->size;
3044 		  s->size += 4;
3045 		  if (*local_got_type == GOT_TLS_GD)
3046 		    s->size += 4;
3047 		  if (bfd_link_pic (info))
3048 		    srel->size += sizeof (Elf32_External_Rela);
3049 		  else
3050 		    htab->srofixup->size += 4;
3051 
3052 		  if (*local_got_type == GOT_FUNCDESC)
3053 		    {
3054 		      if (local_funcdesc == NULL)
3055 			{
3056 			  bfd_size_type size;
3057 
3058 			  size = locsymcount * sizeof (union gotref);
3059 			  local_funcdesc = (union gotref *) bfd_zalloc (ibfd,
3060 									size);
3061 			  if (local_funcdesc == NULL)
3062 			    return false;
3063 			  sh_elf_local_funcdesc (ibfd) = local_funcdesc;
3064 			  local_funcdesc += (local_got
3065 					     - elf_local_got_refcounts (ibfd));
3066 			}
3067 		      local_funcdesc->refcount++;
3068 		      ++local_funcdesc;
3069 		    }
3070 		}
3071 	      else
3072 		*local_got = (bfd_vma) -1;
3073 	      ++local_got_type;
3074 	    }
3075 	}
3076 
3077       local_funcdesc = sh_elf_local_funcdesc (ibfd);
3078       if (local_funcdesc)
3079 	{
3080 	  end_local_funcdesc = local_funcdesc + locsymcount;
3081 
3082 	  for (; local_funcdesc < end_local_funcdesc; ++local_funcdesc)
3083 	    {
3084 	      if (local_funcdesc->refcount > 0)
3085 		{
3086 		  local_funcdesc->offset = htab->sfuncdesc->size;
3087 		  htab->sfuncdesc->size += 8;
3088 		  if (!bfd_link_pic (info))
3089 		    htab->srofixup->size += 8;
3090 		  else
3091 		    htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3092 		}
3093 	      else
3094 		local_funcdesc->offset = MINUS_ONE;
3095 	    }
3096 	}
3097 
3098     }
3099 
3100   if (htab->tls_ldm_got.refcount > 0)
3101     {
3102       /* Allocate 2 got entries and 1 dynamic reloc for R_SH_TLS_LD_32
3103 	 relocs.  */
3104       htab->tls_ldm_got.offset = htab->root.sgot->size;
3105       htab->root.sgot->size += 8;
3106       htab->root.srelgot->size += sizeof (Elf32_External_Rela);
3107     }
3108   else
3109     htab->tls_ldm_got.offset = -1;
3110 
3111   /* Only the reserved entries should be present.  For FDPIC, they go at
3112      the end of .got.plt.  */
3113   if (htab->fdpic_p)
3114     {
3115       BFD_ASSERT (htab->root.sgotplt && htab->root.sgotplt->size == 12);
3116       htab->root.sgotplt->size = 0;
3117     }
3118 
3119   /* Allocate global sym .plt and .got entries, and space for global
3120      sym dynamic relocs.  */
3121   elf_link_hash_traverse (&htab->root, allocate_dynrelocs, info);
3122 
3123   /* Move the reserved entries and the _GLOBAL_OFFSET_TABLE_ symbol to the
3124      end of the FDPIC .got.plt.  */
3125   if (htab->fdpic_p)
3126     {
3127       htab->root.hgot->root.u.def.value = htab->root.sgotplt->size;
3128       htab->root.sgotplt->size += 12;
3129     }
3130 
3131   /* At the very end of the .rofixup section is a pointer to the GOT.  */
3132   if (htab->fdpic_p && htab->srofixup != NULL)
3133     htab->srofixup->size += 4;
3134 
3135   /* We now have determined the sizes of the various dynamic sections.
3136      Allocate memory for them.  */
3137   relocs = false;
3138   for (s = dynobj->sections; s != NULL; s = s->next)
3139     {
3140       if ((s->flags & SEC_LINKER_CREATED) == 0)
3141 	continue;
3142 
3143       if (s == htab->root.splt
3144 	  || s == htab->root.sgot
3145 	  || s == htab->root.sgotplt
3146 	  || s == htab->sfuncdesc
3147 	  || s == htab->srofixup
3148 	  || s == htab->root.sdynbss)
3149 	{
3150 	  /* Strip this section if we don't need it; see the
3151 	     comment below.  */
3152 	}
3153       else if (startswith (bfd_section_name (s), ".rela"))
3154 	{
3155 	  if (s->size != 0 && s != htab->root.srelplt && s != htab->srelplt2)
3156 	    relocs = true;
3157 
3158 	  /* We use the reloc_count field as a counter if we need
3159 	     to copy relocs into the output file.  */
3160 	  s->reloc_count = 0;
3161 	}
3162       else
3163 	{
3164 	  /* It's not one of our sections, so don't allocate space.  */
3165 	  continue;
3166 	}
3167 
3168       if (s->size == 0)
3169 	{
3170 	  /* If we don't need this section, strip it from the
3171 	     output file.  This is mostly to handle .rela.bss and
3172 	     .rela.plt.  We must create both sections in
3173 	     create_dynamic_sections, because they must be created
3174 	     before the linker maps input sections to output
3175 	     sections.  The linker does that before
3176 	     adjust_dynamic_symbol is called, and it is that
3177 	     function which decides whether anything needs to go
3178 	     into these sections.  */
3179 
3180 	  s->flags |= SEC_EXCLUDE;
3181 	  continue;
3182 	}
3183 
3184       if ((s->flags & SEC_HAS_CONTENTS) == 0)
3185 	continue;
3186 
3187       /* Allocate memory for the section contents.  We use bfd_zalloc
3188 	 here in case unused entries are not reclaimed before the
3189 	 section's contents are written out.  This should not happen,
3190 	 but this way if it does, we get a R_SH_NONE reloc instead
3191 	 of garbage.  */
3192       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
3193       if (s->contents == NULL)
3194 	return false;
3195     }
3196 
3197   return _bfd_elf_maybe_vxworks_add_dynamic_tags (output_bfd, info,
3198 						  relocs);
3199 }
3200 
3201 /* Add a dynamic relocation to the SRELOC section.  */
3202 
3203 inline static bfd_vma
sh_elf_add_dyn_reloc(bfd * output_bfd,asection * sreloc,bfd_vma offset,int reloc_type,long dynindx,bfd_vma addend)3204 sh_elf_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
3205 		      int reloc_type, long dynindx, bfd_vma addend)
3206 {
3207   Elf_Internal_Rela outrel;
3208   bfd_vma reloc_offset;
3209 
3210   outrel.r_offset = offset;
3211   outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
3212   outrel.r_addend = addend;
3213 
3214   reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rela);
3215   BFD_ASSERT (reloc_offset < sreloc->size);
3216   bfd_elf32_swap_reloca_out (output_bfd, &outrel,
3217 			     sreloc->contents + reloc_offset);
3218   sreloc->reloc_count++;
3219 
3220   return reloc_offset;
3221 }
3222 
3223 /* Add an FDPIC read-only fixup.  */
3224 
3225 inline static void
sh_elf_add_rofixup(bfd * output_bfd,asection * srofixup,bfd_vma offset)3226 sh_elf_add_rofixup (bfd *output_bfd, asection *srofixup, bfd_vma offset)
3227 {
3228   bfd_vma fixup_offset;
3229 
3230   fixup_offset = srofixup->reloc_count++ * 4;
3231   BFD_ASSERT (fixup_offset < srofixup->size);
3232   bfd_put_32 (output_bfd, offset, srofixup->contents + fixup_offset);
3233 }
3234 
3235 /* Return the offset of the generated .got section from the
3236    _GLOBAL_OFFSET_TABLE_ symbol.  */
3237 
3238 static bfd_signed_vma
sh_elf_got_offset(struct elf_sh_link_hash_table * htab)3239 sh_elf_got_offset (struct elf_sh_link_hash_table *htab)
3240 {
3241   return (htab->root.sgot->output_offset - htab->root.sgotplt->output_offset
3242 	  - htab->root.hgot->root.u.def.value);
3243 }
3244 
3245 /* Find the segment number in which OSEC, and output section, is
3246    located.  */
3247 
3248 static unsigned
sh_elf_osec_to_segment(bfd * output_bfd,asection * osec)3249 sh_elf_osec_to_segment (bfd *output_bfd, asection *osec)
3250 {
3251   Elf_Internal_Phdr *p = NULL;
3252 
3253   if (output_bfd->xvec->flavour == bfd_target_elf_flavour
3254       /* PR ld/17110: Do not look for output segments in an input bfd.  */
3255       && output_bfd->direction != read_direction)
3256     p = _bfd_elf_find_segment_containing_section (output_bfd, osec);
3257 
3258   /* FIXME: Nothing ever says what this index is relative to.  The kernel
3259      supplies data in terms of the number of load segments but this is
3260      a phdr index and the first phdr may not be a load segment.  */
3261   return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
3262 }
3263 
3264 static bool
sh_elf_osec_readonly_p(bfd * output_bfd,asection * osec)3265 sh_elf_osec_readonly_p (bfd *output_bfd, asection *osec)
3266 {
3267   unsigned seg = sh_elf_osec_to_segment (output_bfd, osec);
3268 
3269   return (seg != (unsigned) -1
3270 	  && ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W));
3271 }
3272 
3273 /* Generate the initial contents of a local function descriptor, along
3274    with any relocations or fixups required.  */
3275 static bool
sh_elf_initialize_funcdesc(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,bfd_vma offset,asection * section,bfd_vma value)3276 sh_elf_initialize_funcdesc (bfd *output_bfd,
3277 			    struct bfd_link_info *info,
3278 			    struct elf_link_hash_entry *h,
3279 			    bfd_vma offset,
3280 			    asection *section,
3281 			    bfd_vma value)
3282 {
3283   struct elf_sh_link_hash_table *htab;
3284   int dynindx;
3285   bfd_vma addr, seg;
3286 
3287   htab = sh_elf_hash_table (info);
3288 
3289   /* FIXME: The ABI says that the offset to the function goes in the
3290      descriptor, along with the segment index.  We're RELA, so it could
3291      go in the reloc instead... */
3292 
3293   if (h != NULL && SYMBOL_CALLS_LOCAL (info, h))
3294     {
3295       section = h->root.u.def.section;
3296       value = h->root.u.def.value;
3297     }
3298 
3299   if (h == NULL || SYMBOL_CALLS_LOCAL (info, h))
3300     {
3301       dynindx = elf_section_data (section->output_section)->dynindx;
3302       addr = value + section->output_offset;
3303       seg = sh_elf_osec_to_segment (output_bfd, section->output_section);
3304     }
3305   else
3306     {
3307       BFD_ASSERT (h->dynindx != -1);
3308       dynindx = h->dynindx;
3309       addr = seg = 0;
3310     }
3311 
3312   if (!bfd_link_pic (info) && SYMBOL_CALLS_LOCAL (info, h))
3313     {
3314       if (h == NULL || h->root.type != bfd_link_hash_undefweak)
3315 	{
3316 	  sh_elf_add_rofixup (output_bfd, htab->srofixup,
3317 			      offset
3318 			      + htab->sfuncdesc->output_section->vma
3319 			      + htab->sfuncdesc->output_offset);
3320 	  sh_elf_add_rofixup (output_bfd, htab->srofixup,
3321 			      offset + 4
3322 			      + htab->sfuncdesc->output_section->vma
3323 			      + htab->sfuncdesc->output_offset);
3324 	}
3325 
3326       /* There are no dynamic relocations so fill in the final
3327 	 address and gp value (barring fixups).  */
3328       addr += section->output_section->vma;
3329       seg = htab->root.hgot->root.u.def.value
3330 	+ htab->root.hgot->root.u.def.section->output_section->vma
3331 	+ htab->root.hgot->root.u.def.section->output_offset;
3332     }
3333   else
3334     sh_elf_add_dyn_reloc (output_bfd, htab->srelfuncdesc,
3335 			  offset
3336 			  + htab->sfuncdesc->output_section->vma
3337 			  + htab->sfuncdesc->output_offset,
3338 			  R_SH_FUNCDESC_VALUE, dynindx, 0);
3339 
3340   bfd_put_32 (output_bfd, addr, htab->sfuncdesc->contents + offset);
3341   bfd_put_32 (output_bfd, seg, htab->sfuncdesc->contents + offset + 4);
3342 
3343   return true;
3344 }
3345 
3346 /* Install a 20-bit movi20 field starting at ADDR, which occurs in OUTPUT_BFD.
3347    VALUE is the field's value.  Return bfd_reloc_ok if successful or an error
3348    otherwise.  */
3349 
3350 static bfd_reloc_status_type
install_movi20_field(bfd * output_bfd,unsigned long relocation,bfd * input_bfd,asection * input_section,bfd_byte * contents,bfd_vma offset)3351 install_movi20_field (bfd *output_bfd, unsigned long relocation,
3352 		      bfd *input_bfd, asection *input_section,
3353 		      bfd_byte *contents, bfd_vma offset)
3354 {
3355   unsigned long cur_val;
3356   bfd_byte *addr;
3357   bfd_reloc_status_type r;
3358 
3359   if (offset > bfd_get_section_limit (input_bfd, input_section))
3360     return bfd_reloc_outofrange;
3361 
3362   r = bfd_check_overflow (complain_overflow_signed, 20, 0,
3363 			  bfd_arch_bits_per_address (input_bfd), relocation);
3364   if (r != bfd_reloc_ok)
3365     return r;
3366 
3367   addr = contents + offset;
3368   cur_val = bfd_get_16 (output_bfd, addr);
3369   bfd_put_16 (output_bfd, cur_val | ((relocation & 0xf0000) >> 12), addr);
3370   bfd_put_16 (output_bfd, relocation & 0xffff, addr + 2);
3371 
3372   return bfd_reloc_ok;
3373 }
3374 
3375 /* Relocate an SH ELF section.  */
3376 
3377 static int
sh_elf_relocate_section(bfd * output_bfd,struct bfd_link_info * info,bfd * input_bfd,asection * input_section,bfd_byte * contents,Elf_Internal_Rela * relocs,Elf_Internal_Sym * local_syms,asection ** local_sections)3378 sh_elf_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
3379 			 bfd *input_bfd, asection *input_section,
3380 			 bfd_byte *contents, Elf_Internal_Rela *relocs,
3381 			 Elf_Internal_Sym *local_syms,
3382 			 asection **local_sections)
3383 {
3384   struct elf_sh_link_hash_table *htab;
3385   Elf_Internal_Shdr *symtab_hdr;
3386   struct elf_link_hash_entry **sym_hashes;
3387   Elf_Internal_Rela *rel, *relend;
3388   bfd_vma *local_got_offsets;
3389   asection *sgot = NULL;
3390   asection *sgotplt = NULL;
3391   asection *splt = NULL;
3392   asection *sreloc = NULL;
3393   asection *srelgot = NULL;
3394   bool is_vxworks_tls;
3395   unsigned isec_segment, got_segment, plt_segment, check_segment[2];
3396   bool fdpic_p = false;
3397 
3398   if (!is_sh_elf (input_bfd))
3399     {
3400       bfd_set_error (bfd_error_wrong_format);
3401       return false;
3402     }
3403 
3404   htab = sh_elf_hash_table (info);
3405   if (htab != NULL)
3406     {
3407       sgot = htab->root.sgot;
3408       sgotplt = htab->root.sgotplt;
3409       srelgot = htab->root.srelgot;
3410       splt = htab->root.splt;
3411       fdpic_p = htab->fdpic_p;
3412     }
3413   symtab_hdr = &elf_symtab_hdr (input_bfd);
3414   sym_hashes = elf_sym_hashes (input_bfd);
3415   local_got_offsets = elf_local_got_offsets (input_bfd);
3416 
3417   isec_segment = sh_elf_osec_to_segment (output_bfd,
3418 					 input_section->output_section);
3419   if (fdpic_p && sgot)
3420     got_segment = sh_elf_osec_to_segment (output_bfd,
3421 					  sgot->output_section);
3422   else
3423     got_segment = -1;
3424   if (fdpic_p && splt)
3425     plt_segment = sh_elf_osec_to_segment (output_bfd,
3426 					  splt->output_section);
3427   else
3428     plt_segment = -1;
3429 
3430   /* We have to handle relocations in vxworks .tls_vars sections
3431      specially, because the dynamic loader is 'weird'.  */
3432   is_vxworks_tls = (htab && htab->root.target_os == is_vxworks && bfd_link_pic (info)
3433 		    && !strcmp (input_section->output_section->name,
3434 				".tls_vars"));
3435 
3436   rel = relocs;
3437   relend = relocs + input_section->reloc_count;
3438   for (; rel < relend; rel++)
3439     {
3440       int r_type;
3441       reloc_howto_type *howto;
3442       unsigned long r_symndx;
3443       Elf_Internal_Sym *sym;
3444       asection *sec;
3445       struct elf_link_hash_entry *h;
3446       bfd_vma relocation;
3447       bfd_vma addend = (bfd_vma) 0;
3448       bfd_reloc_status_type r;
3449       bfd_vma off;
3450       enum got_type got_type;
3451       const char *symname = NULL;
3452       bool resolved_to_zero;
3453 
3454       r_symndx = ELF32_R_SYM (rel->r_info);
3455 
3456       r_type = ELF32_R_TYPE (rel->r_info);
3457 
3458       /* Many of the relocs are only used for relaxing, and are
3459 	 handled entirely by the relaxation code.  */
3460       if (r_type >= (int) R_SH_GNU_VTINHERIT
3461 	  && r_type <= (int) R_SH_LABEL)
3462 	continue;
3463       if (r_type == (int) R_SH_NONE)
3464 	continue;
3465 
3466       if (r_type < 0
3467 	  || r_type >= R_SH_max
3468 	  || (r_type >= (int) R_SH_FIRST_INVALID_RELOC
3469 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC)
3470 	  || (r_type >= (int) R_SH_FIRST_INVALID_RELOC_2
3471 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_2)
3472 	  || (   r_type >= (int) R_SH_FIRST_INVALID_RELOC_3
3473 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_3)
3474 	  || (   r_type >= (int) R_SH_FIRST_INVALID_RELOC_4
3475 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_4)
3476 	  || (   r_type >= (int) R_SH_FIRST_INVALID_RELOC_5
3477 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_5)
3478 	  || (   r_type >= (int) R_SH_FIRST_INVALID_RELOC_6
3479 	      && r_type <= (int) R_SH_LAST_INVALID_RELOC_6))
3480 	{
3481 	  bfd_set_error (bfd_error_bad_value);
3482 	  return false;
3483 	}
3484 
3485       howto = get_howto_table (output_bfd) + r_type;
3486 
3487       /* For relocs that aren't partial_inplace, we get the addend from
3488 	 the relocation.  */
3489       if (! howto->partial_inplace)
3490 	addend = rel->r_addend;
3491 
3492       resolved_to_zero = false;
3493       h = NULL;
3494       sym = NULL;
3495       sec = NULL;
3496       check_segment[0] = -1;
3497       check_segment[1] = -1;
3498       if (r_symndx < symtab_hdr->sh_info)
3499 	{
3500 	  sym = local_syms + r_symndx;
3501 	  sec = local_sections[r_symndx];
3502 
3503 	  symname = bfd_elf_string_from_elf_section
3504 	    (input_bfd, symtab_hdr->sh_link, sym->st_name);
3505 	  if (symname == NULL || *symname == '\0')
3506 	    symname = bfd_section_name (sec);
3507 
3508 	  relocation = (sec->output_section->vma
3509 			+ sec->output_offset
3510 			+ sym->st_value);
3511 
3512 	  if (sec != NULL && discarded_section (sec))
3513 	    /* Handled below.  */
3514 	    ;
3515 	  else if (bfd_link_relocatable (info))
3516 	    {
3517 	      /* This is a relocatable link.  We don't have to change
3518 		 anything, unless the reloc is against a section symbol,
3519 		 in which case we have to adjust according to where the
3520 		 section symbol winds up in the output section.  */
3521 	      if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3522 		{
3523 		  if (! howto->partial_inplace)
3524 		    {
3525 		      /* For relocations with the addend in the
3526 			 relocation, we need just to update the addend.
3527 			 All real relocs are of type partial_inplace; this
3528 			 code is mostly for completeness.  */
3529 		      rel->r_addend += sec->output_offset;
3530 
3531 		      continue;
3532 		    }
3533 
3534 		  /* Relocs of type partial_inplace need to pick up the
3535 		     contents in the contents and add the offset resulting
3536 		     from the changed location of the section symbol.
3537 		     Using _bfd_final_link_relocate (e.g. goto
3538 		     final_link_relocate) here would be wrong, because
3539 		     relocations marked pc_relative would get the current
3540 		     location subtracted, and we must only do that at the
3541 		     final link.  */
3542 		  r = _bfd_relocate_contents (howto, input_bfd,
3543 					      sec->output_offset
3544 					      + sym->st_value,
3545 					      contents + rel->r_offset);
3546 		  goto relocation_done;
3547 		}
3548 
3549 	      continue;
3550 	    }
3551 	  else if (! howto->partial_inplace)
3552 	    {
3553 	      relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
3554 	      addend = rel->r_addend;
3555 	    }
3556 	  else if ((sec->flags & SEC_MERGE)
3557 		   && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3558 	    {
3559 	      asection *msec;
3560 
3561 	      if (howto->rightshift || howto->src_mask != 0xffffffff)
3562 		{
3563 		  _bfd_error_handler
3564 		    /* xgettext:c-format */
3565 		    (_("%pB(%pA+%#" PRIx64 "): "
3566 		       "%s relocation against SEC_MERGE section"),
3567 		     input_bfd, input_section,
3568 		     (uint64_t) rel->r_offset, howto->name);
3569 		  return false;
3570 		}
3571 
3572 	      addend = bfd_get_32 (input_bfd, contents + rel->r_offset);
3573 	      msec = sec;
3574 	      addend =
3575 		_bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
3576 		- relocation;
3577 	      addend += msec->output_section->vma + msec->output_offset;
3578 	      bfd_put_32 (input_bfd, addend, contents + rel->r_offset);
3579 	      addend = 0;
3580 	    }
3581 	}
3582       else
3583 	{
3584 	  /* FIXME: Ought to make use of the RELOC_FOR_GLOBAL_SYMBOL macro.  */
3585 
3586 	  relocation = 0;
3587 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3588 	  symname = h->root.root.string;
3589 	  while (h->root.type == bfd_link_hash_indirect
3590 		 || h->root.type == bfd_link_hash_warning)
3591 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
3592 	  if (h->root.type == bfd_link_hash_defined
3593 	      || h->root.type == bfd_link_hash_defweak)
3594 	    {
3595 	      bool dyn;
3596 
3597 	      dyn = htab ? htab->root.dynamic_sections_created : false;
3598 	      sec = h->root.u.def.section;
3599 	      /* In these cases, we don't need the relocation value.
3600 		 We check specially because in some obscure cases
3601 		 sec->output_section will be NULL.  */
3602 	      if (r_type == R_SH_GOTPC
3603 		  || r_type == R_SH_GOTPC_LOW16
3604 		  || r_type == R_SH_GOTPC_MEDLOW16
3605 		  || r_type == R_SH_GOTPC_MEDHI16
3606 		  || r_type == R_SH_GOTPC_HI16
3607 		  || ((r_type == R_SH_PLT32
3608 		       || r_type == R_SH_PLT_LOW16
3609 		       || r_type == R_SH_PLT_MEDLOW16
3610 		       || r_type == R_SH_PLT_MEDHI16
3611 		       || r_type == R_SH_PLT_HI16)
3612 		      && h->plt.offset != (bfd_vma) -1)
3613 		  || ((r_type == R_SH_GOT32
3614 		       || r_type == R_SH_GOT20
3615 		       || r_type == R_SH_GOTFUNCDESC
3616 		       || r_type == R_SH_GOTFUNCDESC20
3617 		       || r_type == R_SH_GOTOFFFUNCDESC
3618 		       || r_type == R_SH_GOTOFFFUNCDESC20
3619 		       || r_type == R_SH_FUNCDESC
3620 		       || r_type == R_SH_GOT_LOW16
3621 		       || r_type == R_SH_GOT_MEDLOW16
3622 		       || r_type == R_SH_GOT_MEDHI16
3623 		       || r_type == R_SH_GOT_HI16)
3624 		      && WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3625 							  bfd_link_pic (info),
3626 							  h)
3627 		      && (! bfd_link_pic (info)
3628 			  || (! info->symbolic && h->dynindx != -1)
3629 			  || !h->def_regular))
3630 		  /* The cases above are those in which relocation is
3631 		     overwritten in the switch block below.  The cases
3632 		     below are those in which we must defer relocation
3633 		     to run-time, because we can't resolve absolute
3634 		     addresses when creating a shared library.  */
3635 		  || (bfd_link_pic (info)
3636 		      && ((! info->symbolic && h->dynindx != -1)
3637 			  || !h->def_regular)
3638 		      && ((r_type == R_SH_DIR32
3639 			   && !h->forced_local)
3640 			  || (r_type == R_SH_REL32
3641 			      && !SYMBOL_CALLS_LOCAL (info, h)))
3642 		      && ((input_section->flags & SEC_ALLOC) != 0
3643 			  /* DWARF will emit R_SH_DIR32 relocations in its
3644 			     sections against symbols defined externally
3645 			     in shared libraries.  We can't do anything
3646 			     with them here.  */
3647 			  || ((input_section->flags & SEC_DEBUGGING) != 0
3648 			      && h->def_dynamic)))
3649 		  /* Dynamic relocs are not propagated for SEC_DEBUGGING
3650 		     sections because such sections are not SEC_ALLOC and
3651 		     thus ld.so will not process them.  */
3652 		  || (sec->output_section == NULL
3653 		      && ((input_section->flags & SEC_DEBUGGING) != 0
3654 			  && h->def_dynamic))
3655 		  || (sec->output_section == NULL
3656 		      && (sh_elf_hash_entry (h)->got_type == GOT_TLS_IE
3657 			  || sh_elf_hash_entry (h)->got_type == GOT_TLS_GD)))
3658 		;
3659 	      else if (sec->output_section != NULL)
3660 		relocation = (h->root.u.def.value
3661 			      + sec->output_section->vma
3662 			      + sec->output_offset);
3663 	      else if (!bfd_link_relocatable (info)
3664 		       && (_bfd_elf_section_offset (output_bfd, info,
3665 						    input_section,
3666 						    rel->r_offset)
3667 			   != (bfd_vma) -1))
3668 		{
3669 		  _bfd_error_handler
3670 		    /* xgettext:c-format */
3671 		    (_("%pB(%pA+%#" PRIx64 "): "
3672 		       "unresolvable %s relocation against symbol `%s'"),
3673 		     input_bfd,
3674 		     input_section,
3675 		     (uint64_t) rel->r_offset,
3676 		     howto->name,
3677 		     h->root.root.string);
3678 		  return false;
3679 		}
3680 	    }
3681 	  else if (h->root.type == bfd_link_hash_undefweak)
3682 	    resolved_to_zero = UNDEFWEAK_NO_DYNAMIC_RELOC (info, h);
3683 	  else if (info->unresolved_syms_in_objects == RM_IGNORE
3684 		   && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3685 	    ;
3686 	  else if (!bfd_link_relocatable (info))
3687             info->callbacks->undefined_symbol
3688 	      (info, h->root.root.string, input_bfd, input_section,
3689 	       rel->r_offset,
3690 	       (info->unresolved_syms_in_objects == RM_DIAGNOSE
3691 		&& !info->warn_unresolved_syms)
3692 	       || ELF_ST_VISIBILITY (h->other));
3693         }
3694 
3695       if (sec != NULL && discarded_section (sec))
3696 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
3697 					 rel, 1, relend, howto, 0, contents);
3698 
3699       if (bfd_link_relocatable (info))
3700 	continue;
3701 
3702       /* Check for inter-segment relocations in FDPIC files.  Most
3703 	 relocations connect the relocation site to the location of
3704 	 the target symbol, but there are some exceptions below.  */
3705       check_segment[0] = isec_segment;
3706       if (sec != NULL)
3707 	check_segment[1] = sh_elf_osec_to_segment (output_bfd,
3708 						   sec->output_section);
3709       else
3710 	check_segment[1] = -1;
3711 
3712       switch ((int) r_type)
3713 	{
3714 	final_link_relocate:
3715 	  /* COFF relocs don't use the addend. The addend is used for
3716 	     R_SH_DIR32 to be compatible with other compilers.  */
3717 	  r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3718 					contents, rel->r_offset,
3719 					relocation, addend);
3720 	  break;
3721 
3722 	case R_SH_IND12W:
3723 	  goto final_link_relocate;
3724 
3725 	case R_SH_DIR8WPN:
3726 	case R_SH_DIR8WPZ:
3727 	case R_SH_DIR8WPL:
3728 	  /* If the reloc is against the start of this section, then
3729 	     the assembler has already taken care of it and the reloc
3730 	     is here only to assist in relaxing.  If the reloc is not
3731 	     against the start of this section, then it's against an
3732 	     external symbol and we must deal with it ourselves.  */
3733 	  if (input_section->output_section->vma + input_section->output_offset
3734 	      != relocation)
3735 	    {
3736 	      int disp = (relocation
3737 			  - input_section->output_section->vma
3738 			  - input_section->output_offset
3739 			  - rel->r_offset);
3740 	      int mask = 0;
3741 	      switch (r_type)
3742 		{
3743 		case R_SH_DIR8WPN:
3744 		case R_SH_DIR8WPZ: mask = 1; break;
3745 		case R_SH_DIR8WPL: mask = 3; break;
3746 		default: mask = 0; break;
3747 		}
3748 	      if (disp & mask)
3749 		{
3750 		  _bfd_error_handler
3751 		    /* xgettext:c-format */
3752 		    (_("%pB: %#" PRIx64 ": fatal: "
3753 		       "unaligned branch target for relax-support relocation"),
3754 		     input_section->owner,
3755 		     (uint64_t) rel->r_offset);
3756 		  bfd_set_error (bfd_error_bad_value);
3757 		  return false;
3758 		}
3759 	      relocation -= 4;
3760 	      goto final_link_relocate;
3761 	    }
3762 	  r = bfd_reloc_ok;
3763 	  break;
3764 
3765 	default:
3766 	  bfd_set_error (bfd_error_bad_value);
3767 	  return false;
3768 
3769 	case R_SH_DIR16:
3770 	case R_SH_DIR8:
3771 	case R_SH_DIR8U:
3772 	case R_SH_DIR8S:
3773 	case R_SH_DIR4U:
3774 	  goto final_link_relocate;
3775 
3776 	case R_SH_DIR8UL:
3777 	case R_SH_DIR4UL:
3778 	  if (relocation & 3)
3779 	    {
3780 	      _bfd_error_handler
3781 		/* xgettext:c-format */
3782 		(_("%pB: %#" PRIx64 ": fatal: "
3783 		   "unaligned %s relocation %#" PRIx64),
3784 		 input_section->owner, (uint64_t) rel->r_offset,
3785 		 howto->name, (uint64_t) relocation);
3786 	      bfd_set_error (bfd_error_bad_value);
3787 	      return false;
3788 	    }
3789 	  goto final_link_relocate;
3790 
3791 	case R_SH_DIR8UW:
3792 	case R_SH_DIR8SW:
3793 	case R_SH_DIR4UW:
3794 	  if (relocation & 1)
3795 	    {
3796 	      _bfd_error_handler
3797 		/* xgettext:c-format */
3798 		(_("%pB: %#" PRIx64 ": fatal: "
3799 		   "unaligned %s relocation %#" PRIx64 ""),
3800 		 input_section->owner,
3801 		 (uint64_t) rel->r_offset, howto->name,
3802 		 (uint64_t) relocation);
3803 	      bfd_set_error (bfd_error_bad_value);
3804 	      return false;
3805 	    }
3806 	  goto final_link_relocate;
3807 
3808 	case R_SH_PSHA:
3809 	  if ((signed int)relocation < -32
3810 	      || (signed int)relocation > 32)
3811 	    {
3812 	      _bfd_error_handler
3813 		/* xgettext:c-format */
3814 		(_("%pB: %#" PRIx64 ": fatal: R_SH_PSHA relocation %" PRId64
3815 		   " not in range -32..32"),
3816 		 input_section->owner,
3817 		 (uint64_t) rel->r_offset,
3818 		 (int64_t) relocation);
3819 	      bfd_set_error (bfd_error_bad_value);
3820 	      return false;
3821 	    }
3822 	  goto final_link_relocate;
3823 
3824 	case R_SH_PSHL:
3825 	  if ((signed int)relocation < -16
3826 	      || (signed int)relocation > 16)
3827 	    {
3828 	      _bfd_error_handler
3829 		/* xgettext:c-format */
3830 		(_("%pB: %#" PRIx64 ": fatal: R_SH_PSHL relocation %" PRId64
3831 		   " not in range -32..32"),
3832 		 input_section->owner,
3833 		 (uint64_t) rel->r_offset,
3834 		 (int64_t) relocation);
3835 	      bfd_set_error (bfd_error_bad_value);
3836 	      return false;
3837 	    }
3838 	  goto final_link_relocate;
3839 
3840 	case R_SH_DIR32:
3841 	case R_SH_REL32:
3842 	  if (bfd_link_pic (info)
3843 	      && (h == NULL
3844 		  || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3845 		      && !resolved_to_zero)
3846 		  || h->root.type != bfd_link_hash_undefweak)
3847 	      && r_symndx != STN_UNDEF
3848 	      && (input_section->flags & SEC_ALLOC) != 0
3849 	      && !is_vxworks_tls
3850 	      && (r_type == R_SH_DIR32
3851 		  || !SYMBOL_CALLS_LOCAL (info, h)))
3852 	    {
3853 	      Elf_Internal_Rela outrel;
3854 	      bfd_byte *loc;
3855 	      bool skip, relocate;
3856 
3857 	      /* When generating a shared object, these relocations
3858 		 are copied into the output file to be resolved at run
3859 		 time.  */
3860 
3861 	      if (sreloc == NULL)
3862 		{
3863 		  sreloc = _bfd_elf_get_dynamic_reloc_section
3864 		    (input_bfd, input_section, /*rela?*/ true);
3865 		  if (sreloc == NULL)
3866 		    return false;
3867 		}
3868 
3869 	      skip = false;
3870 	      relocate = false;
3871 
3872 	      outrel.r_offset =
3873 		_bfd_elf_section_offset (output_bfd, info, input_section,
3874 					 rel->r_offset);
3875 	      if (outrel.r_offset == (bfd_vma) -1)
3876 		skip = true;
3877 	      else if (outrel.r_offset == (bfd_vma) -2)
3878 		skip = true, relocate = true;
3879 	      outrel.r_offset += (input_section->output_section->vma
3880 				  + input_section->output_offset);
3881 
3882 	      if (skip)
3883 		memset (&outrel, 0, sizeof outrel);
3884 	      else if (r_type == R_SH_REL32)
3885 		{
3886 		  BFD_ASSERT (h != NULL && h->dynindx != -1);
3887 		  outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_REL32);
3888 		  outrel.r_addend
3889 		    = (howto->partial_inplace
3890 		       ? bfd_get_32 (input_bfd, contents + rel->r_offset)
3891 		       : addend);
3892 		}
3893 	      else if (fdpic_p
3894 		       && (h == NULL
3895 			   || ((info->symbolic || h->dynindx == -1)
3896 			       && h->def_regular)))
3897 		{
3898 		  int dynindx;
3899 
3900 		  BFD_ASSERT (sec != NULL);
3901 		  BFD_ASSERT (sec->output_section != NULL);
3902 		  dynindx = elf_section_data (sec->output_section)->dynindx;
3903 		  outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
3904 		  outrel.r_addend = relocation;
3905 		  outrel.r_addend
3906 		    += (howto->partial_inplace
3907 			? bfd_get_32 (input_bfd, contents + rel->r_offset)
3908 			: addend);
3909 		  outrel.r_addend -= sec->output_section->vma;
3910 		}
3911 	      else
3912 		{
3913 		  /* h->dynindx may be -1 if this symbol was marked to
3914 		     become local.  */
3915 		  if (h == NULL
3916 		      || ((info->symbolic || h->dynindx == -1)
3917 			  && h->def_regular))
3918 		    {
3919 		      relocate = howto->partial_inplace;
3920 		      outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
3921 		    }
3922 		  else
3923 		    {
3924 		      BFD_ASSERT (h->dynindx != -1);
3925 		      outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_DIR32);
3926 		    }
3927 		  outrel.r_addend = relocation;
3928 		  outrel.r_addend
3929 		    += (howto->partial_inplace
3930 			? bfd_get_32 (input_bfd, contents + rel->r_offset)
3931 			: addend);
3932 		}
3933 
3934 	      loc = sreloc->contents;
3935 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3936 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3937 
3938 	      check_segment[0] = check_segment[1] = -1;
3939 
3940 	      /* If this reloc is against an external symbol, we do
3941 		 not want to fiddle with the addend.  Otherwise, we
3942 		 need to include the symbol value so that it becomes
3943 		 an addend for the dynamic reloc.  */
3944 	      if (! relocate)
3945 		continue;
3946 	    }
3947 	  else if (fdpic_p && !bfd_link_pic (info)
3948 		   && r_type == R_SH_DIR32
3949 		   && (input_section->flags & SEC_ALLOC) != 0)
3950 	    {
3951 	      bfd_vma offset;
3952 
3953 	      BFD_ASSERT (htab);
3954 
3955 		if (sh_elf_osec_readonly_p (output_bfd,
3956 					    input_section->output_section))
3957 		  {
3958 		    _bfd_error_handler
3959 		      /* xgettext:c-format */
3960 		      (_("%pB(%pA+%#" PRIx64 "): "
3961 			 "cannot emit fixup to `%s' in read-only section"),
3962 		       input_bfd,
3963 		       input_section,
3964 		       (uint64_t) rel->r_offset,
3965 		       symname);
3966 		    return false;
3967 		  }
3968 
3969 	      offset = _bfd_elf_section_offset (output_bfd, info,
3970 						input_section, rel->r_offset);
3971 	      if (offset != (bfd_vma)-1)
3972 		sh_elf_add_rofixup (output_bfd, htab->srofixup,
3973 				    input_section->output_section->vma
3974 				    + input_section->output_offset
3975 				    + rel->r_offset);
3976 
3977 	      check_segment[0] = check_segment[1] = -1;
3978 	    }
3979 	    /* We don't want warnings for non-NULL tests on undefined weak
3980 	       symbols.  */
3981 	    else if (r_type == R_SH_REL32
3982 		     && h
3983 		     && h->root.type == bfd_link_hash_undefweak)
3984 	      check_segment[0] = check_segment[1] = -1;
3985 	  goto final_link_relocate;
3986 
3987 	case R_SH_GOTPLT32:
3988 	  /* Relocation is to the entry for this symbol in the
3989 	     procedure linkage table.  */
3990 
3991 	  if (h == NULL
3992 	      || h->forced_local
3993 	      || ! bfd_link_pic (info)
3994 	      || info->symbolic
3995 	      || h->dynindx == -1
3996 	      || h->plt.offset == (bfd_vma) -1
3997 	      || h->got.offset != (bfd_vma) -1)
3998 	    goto force_got;
3999 
4000 	  /* Relocation is to the entry for this symbol in the global
4001 	     offset table extension for the procedure linkage table.  */
4002 
4003 	  BFD_ASSERT (htab);
4004 	  BFD_ASSERT (sgotplt != NULL);
4005 	  relocation = (sgotplt->output_offset
4006 			+ (get_plt_index (htab->plt_info, h->plt.offset)
4007 			   + 3) * 4);
4008 
4009 #ifdef GOT_BIAS
4010 	  relocation -= GOT_BIAS;
4011 #endif
4012 
4013 	  goto final_link_relocate;
4014 
4015 	force_got:
4016 	case R_SH_GOT32:
4017 	case R_SH_GOT20:
4018 	  /* Relocation is to the entry for this symbol in the global
4019 	     offset table.  */
4020 
4021 	  BFD_ASSERT (htab);
4022 	  BFD_ASSERT (sgot != NULL);
4023 	  check_segment[0] = check_segment[1] = -1;
4024 
4025 	  if (h != NULL)
4026 	    {
4027 	      bool dyn;
4028 
4029 	      off = h->got.offset;
4030 	      BFD_ASSERT (off != (bfd_vma) -1);
4031 
4032 	      dyn = htab->root.dynamic_sections_created;
4033 	      if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
4034 						     bfd_link_pic (info),
4035 						     h)
4036 		  || (bfd_link_pic (info)
4037 		      && SYMBOL_REFERENCES_LOCAL (info, h))
4038 		  || ((ELF_ST_VISIBILITY (h->other)
4039 		       || resolved_to_zero)
4040 		      && h->root.type == bfd_link_hash_undefweak))
4041 		{
4042 		  /* This is actually a static link, or it is a
4043 		     -Bsymbolic link and the symbol is defined
4044 		     locally, or the symbol was forced to be local
4045 		     because of a version file.  We must initialize
4046 		     this entry in the global offset table.  Since the
4047 		     offset must always be a multiple of 4, we use the
4048 		     least significant bit to record whether we have
4049 		     initialized it already.
4050 
4051 		     When doing a dynamic link, we create a .rela.got
4052 		     relocation entry to initialize the value.  This
4053 		     is done in the finish_dynamic_symbol routine.  */
4054 		  if ((off & 1) != 0)
4055 		    off &= ~1;
4056 		  else
4057 		    {
4058 		      bfd_put_32 (output_bfd, relocation,
4059 				  sgot->contents + off);
4060 		      h->got.offset |= 1;
4061 
4062 		      /* If we initialize the GOT entry here with a valid
4063 			 symbol address, also add a fixup.  */
4064 		      if (fdpic_p && !bfd_link_pic (info)
4065 			  && sh_elf_hash_entry (h)->got_type == GOT_NORMAL
4066 			  && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4067 			      || h->root.type != bfd_link_hash_undefweak))
4068 			sh_elf_add_rofixup (output_bfd, htab->srofixup,
4069 					    sgot->output_section->vma
4070 					    + sgot->output_offset
4071 					    + off);
4072 		    }
4073 		}
4074 
4075 	      relocation = sh_elf_got_offset (htab) + off;
4076 	    }
4077 	  else
4078 	    {
4079 	      BFD_ASSERT (local_got_offsets != NULL
4080 			  && local_got_offsets[r_symndx] != (bfd_vma) -1);
4081 
4082 	      off = local_got_offsets[r_symndx];
4083 
4084 	      /* The offset must always be a multiple of 4.  We use
4085 		 the least significant bit to record whether we have
4086 		 already generated the necessary reloc.  */
4087 	      if ((off & 1) != 0)
4088 		off &= ~1;
4089 	      else
4090 		{
4091 		  bfd_put_32 (output_bfd, relocation, sgot->contents + off);
4092 
4093 		  if (bfd_link_pic (info))
4094 		    {
4095 		      Elf_Internal_Rela outrel;
4096 		      bfd_byte *loc;
4097 
4098 		      outrel.r_offset = (sgot->output_section->vma
4099 					 + sgot->output_offset
4100 					 + off);
4101 		      if (fdpic_p)
4102 			{
4103 			  int dynindx
4104 			    = elf_section_data (sec->output_section)->dynindx;
4105 			  outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4106 			  outrel.r_addend = relocation;
4107 			  outrel.r_addend -= sec->output_section->vma;
4108 			}
4109 		      else
4110 			{
4111 			  outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
4112 			  outrel.r_addend = relocation;
4113 			}
4114 		      loc = srelgot->contents;
4115 		      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4116 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4117 		    }
4118 		  else if (fdpic_p
4119 			   && (sh_elf_local_got_type (input_bfd) [r_symndx]
4120 			       == GOT_NORMAL))
4121 		    sh_elf_add_rofixup (output_bfd, htab->srofixup,
4122 					sgot->output_section->vma
4123 					+ sgot->output_offset
4124 					+ off);
4125 
4126 		  local_got_offsets[r_symndx] |= 1;
4127 		}
4128 
4129 	      relocation = sh_elf_got_offset (htab) + off;
4130 	    }
4131 
4132 #ifdef GOT_BIAS
4133 	  relocation -= GOT_BIAS;
4134 #endif
4135 
4136 	  if (r_type == R_SH_GOT20)
4137 	    {
4138 	      r = install_movi20_field (output_bfd, relocation + addend,
4139 					input_bfd, input_section, contents,
4140 					rel->r_offset);
4141 	      break;
4142 	    }
4143 	  else
4144 	    goto final_link_relocate;
4145 
4146 	case R_SH_GOTOFF:
4147 	case R_SH_GOTOFF20:
4148 	  /* GOTOFF relocations are relative to _GLOBAL_OFFSET_TABLE_, which
4149 	     we place at the start of the .got.plt section.  This is the same
4150 	     as the start of the output .got section, unless there are function
4151 	     descriptors in front of it.  */
4152 	  BFD_ASSERT (htab);
4153 	  BFD_ASSERT (sgotplt != NULL);
4154 	  check_segment[0] = got_segment;
4155 	  relocation -= sgotplt->output_section->vma + sgotplt->output_offset
4156 	    + htab->root.hgot->root.u.def.value;
4157 
4158 #ifdef GOT_BIAS
4159 	  relocation -= GOT_BIAS;
4160 #endif
4161 
4162 	  addend = rel->r_addend;
4163 
4164 	  if (r_type == R_SH_GOTOFF20)
4165 	    {
4166 	      r = install_movi20_field (output_bfd, relocation + addend,
4167 					input_bfd, input_section, contents,
4168 					rel->r_offset);
4169 	      break;
4170 	    }
4171 	  else
4172 	    goto final_link_relocate;
4173 
4174 	case R_SH_GOTPC:
4175 	  /* Use global offset table as symbol value.  */
4176 
4177 	  BFD_ASSERT (sgotplt != NULL);
4178 	  relocation = sgotplt->output_section->vma + sgotplt->output_offset;
4179 
4180 #ifdef GOT_BIAS
4181 	  relocation += GOT_BIAS;
4182 #endif
4183 
4184 	  addend = rel->r_addend;
4185 
4186 	  goto final_link_relocate;
4187 
4188 	case R_SH_PLT32:
4189 	  /* Relocation is to the entry for this symbol in the
4190 	     procedure linkage table.  */
4191 
4192 	  /* Resolve a PLT reloc against a local symbol directly,
4193 	     without using the procedure linkage table.  */
4194 	  if (h == NULL)
4195 	    goto final_link_relocate;
4196 
4197 	  /* We don't want to warn on calls to undefined weak symbols,
4198 	     as calls to them must be protected by non-NULL tests
4199 	     anyway, and unprotected calls would invoke undefined
4200 	     behavior.  */
4201 	  if (h->root.type == bfd_link_hash_undefweak)
4202 	    check_segment[0] = check_segment[1] = -1;
4203 
4204 	  if (h->forced_local)
4205 	    goto final_link_relocate;
4206 
4207 	  if (h->plt.offset == (bfd_vma) -1)
4208 	    {
4209 	      /* We didn't make a PLT entry for this symbol.  This
4210 		 happens when statically linking PIC code, or when
4211 		 using -Bsymbolic.  */
4212 	      goto final_link_relocate;
4213 	    }
4214 
4215 	  BFD_ASSERT (splt != NULL);
4216 	  check_segment[1] = plt_segment;
4217 	  relocation = (splt->output_section->vma
4218 			+ splt->output_offset
4219 			+ h->plt.offset);
4220 
4221 	  addend = rel->r_addend;
4222 
4223 	  goto final_link_relocate;
4224 
4225 	/* Relocation is to the canonical function descriptor for this
4226 	   symbol, possibly via the GOT.  Initialize the GOT
4227 	   entry and function descriptor if necessary.  */
4228 	case R_SH_GOTFUNCDESC:
4229 	case R_SH_GOTFUNCDESC20:
4230 	case R_SH_FUNCDESC:
4231 	  {
4232 	    int dynindx = -1;
4233 	    asection *reloc_section;
4234 	    bfd_vma reloc_offset;
4235 	    int reloc_type = R_SH_FUNCDESC;
4236 
4237 	    BFD_ASSERT (htab);
4238 
4239 	    check_segment[0] = check_segment[1] = -1;
4240 
4241 	    /* FIXME: See what FRV does for global symbols in the
4242 	       executable, with --export-dynamic.  Do they need ld.so
4243 	       to allocate official descriptors?  See what this code
4244 	       does.  */
4245 
4246 	    relocation = 0;
4247 	    addend = 0;
4248 
4249 	    if (r_type == R_SH_FUNCDESC)
4250 	      {
4251 		reloc_section = input_section;
4252 		reloc_offset = rel->r_offset;
4253 	      }
4254 	    else
4255 	      {
4256 		reloc_section = sgot;
4257 
4258 		if (h != NULL)
4259 		  reloc_offset = h->got.offset;
4260 		else
4261 		  {
4262 		    BFD_ASSERT (local_got_offsets != NULL);
4263 		    reloc_offset = local_got_offsets[r_symndx];
4264 		  }
4265 		BFD_ASSERT (reloc_offset != MINUS_ONE);
4266 
4267 		if (reloc_offset & 1)
4268 		  {
4269 		    reloc_offset &= ~1;
4270 		    goto funcdesc_done_got;
4271 		  }
4272 	      }
4273 
4274 	    if (h && h->root.type == bfd_link_hash_undefweak
4275 		&& (SYMBOL_CALLS_LOCAL (info, h)
4276 		    || !htab->root.dynamic_sections_created))
4277 	      /* Undefined weak symbol which will not be dynamically
4278 		 resolved later; leave it at zero.  */
4279 	      goto funcdesc_leave_zero;
4280 	    else if (SYMBOL_CALLS_LOCAL (info, h)
4281 		     && ! SYMBOL_FUNCDESC_LOCAL (info, h))
4282 	      {
4283 		/* If the symbol needs a non-local function descriptor
4284 		   but binds locally (i.e., its visibility is
4285 		   protected), emit a dynamic relocation decayed to
4286 		   section+offset.  This is an optimization; the dynamic
4287 		   linker would resolve our function descriptor request
4288 		   to our copy of the function anyway.  */
4289 		dynindx = elf_section_data (h->root.u.def.section
4290 					    ->output_section)->dynindx;
4291 		relocation += h->root.u.def.section->output_offset
4292 		  + h->root.u.def.value;
4293 	      }
4294 	    else if (! SYMBOL_FUNCDESC_LOCAL (info, h))
4295 	      {
4296 		/* If the symbol is dynamic and there will be dynamic
4297 		   symbol resolution because we are or are linked with a
4298 		   shared library, emit a FUNCDESC relocation such that
4299 		   the dynamic linker will allocate the function
4300 		   descriptor.  */
4301 		BFD_ASSERT (h->dynindx != -1);
4302 		dynindx = h->dynindx;
4303 	      }
4304 	    else
4305 	      {
4306 		bfd_vma offset;
4307 
4308 		/* Otherwise, we know we have a private function
4309 		   descriptor, so reference it directly.  */
4310 		reloc_type = R_SH_DIR32;
4311 		dynindx = elf_section_data (htab->sfuncdesc
4312 					    ->output_section)->dynindx;
4313 
4314 		if (h)
4315 		  {
4316 		    offset = sh_elf_hash_entry (h)->funcdesc.offset;
4317 		    BFD_ASSERT (offset != MINUS_ONE);
4318 		    if ((offset & 1) == 0)
4319 		      {
4320 			if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
4321 							 offset, NULL, 0))
4322 			  return false;
4323 			sh_elf_hash_entry (h)->funcdesc.offset |= 1;
4324 		      }
4325 		  }
4326 		else
4327 		  {
4328 		    union gotref *local_funcdesc;
4329 
4330 		    local_funcdesc = sh_elf_local_funcdesc (input_bfd);
4331 		    offset = local_funcdesc[r_symndx].offset;
4332 		    BFD_ASSERT (offset != MINUS_ONE);
4333 		    if ((offset & 1) == 0)
4334 		      {
4335 			if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
4336 							 offset, sec,
4337 							 sym->st_value))
4338 			  return false;
4339 			local_funcdesc[r_symndx].offset |= 1;
4340 		      }
4341 		  }
4342 
4343 		relocation = htab->sfuncdesc->output_offset + (offset & ~1);
4344 	      }
4345 
4346 	    if (!bfd_link_pic (info) && SYMBOL_FUNCDESC_LOCAL (info, h))
4347 	      {
4348 		bfd_vma offset;
4349 
4350 		if (sh_elf_osec_readonly_p (output_bfd,
4351 					    reloc_section->output_section))
4352 		  {
4353 		    _bfd_error_handler
4354 		      /* xgettext:c-format */
4355 		      (_("%pB(%pA+%#" PRIx64 "): "
4356 			 "cannot emit fixup to `%s' in read-only section"),
4357 		       input_bfd,
4358 		       input_section,
4359 		       (uint64_t) rel->r_offset,
4360 		       symname);
4361 		    return false;
4362 		  }
4363 
4364 		offset = _bfd_elf_section_offset (output_bfd, info,
4365 						  reloc_section, reloc_offset);
4366 
4367 		if (offset != (bfd_vma)-1)
4368 		  sh_elf_add_rofixup (output_bfd, htab->srofixup,
4369 				      offset
4370 				      + reloc_section->output_section->vma
4371 				      + reloc_section->output_offset);
4372 	      }
4373 	    else if ((reloc_section->output_section->flags
4374 		      & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
4375 	      {
4376 		bfd_vma offset;
4377 
4378 		if (sh_elf_osec_readonly_p (output_bfd,
4379 					    reloc_section->output_section))
4380 		  {
4381 		    info->callbacks->warning
4382 		      (info,
4383 		       _("cannot emit dynamic relocations in read-only section"),
4384 		       symname, input_bfd, reloc_section, reloc_offset);
4385 		    return false;
4386 		  }
4387 
4388 		offset = _bfd_elf_section_offset (output_bfd, info,
4389 						  reloc_section, reloc_offset);
4390 
4391 		if (offset != (bfd_vma)-1)
4392 		  sh_elf_add_dyn_reloc (output_bfd, srelgot,
4393 					offset
4394 					+ reloc_section->output_section->vma
4395 					+ reloc_section->output_offset,
4396 					reloc_type, dynindx, relocation);
4397 
4398 		if (r_type == R_SH_FUNCDESC)
4399 		  {
4400 		    r = bfd_reloc_ok;
4401 		    break;
4402 		  }
4403 		else
4404 		  {
4405 		    relocation = 0;
4406 		    goto funcdesc_leave_zero;
4407 		  }
4408 	      }
4409 
4410 	    if (SYMBOL_FUNCDESC_LOCAL (info, h))
4411 	      relocation += htab->sfuncdesc->output_section->vma;
4412 	  funcdesc_leave_zero:
4413 	    if (r_type != R_SH_FUNCDESC)
4414 	      {
4415 		bfd_put_32 (output_bfd, relocation,
4416 			    reloc_section->contents + reloc_offset);
4417 		if (h != NULL)
4418 		  h->got.offset |= 1;
4419 		else
4420 		  local_got_offsets[r_symndx] |= 1;
4421 
4422 	      funcdesc_done_got:
4423 
4424 		relocation = sh_elf_got_offset (htab) + reloc_offset;
4425 #ifdef GOT_BIAS
4426 		relocation -= GOT_BIAS;
4427 #endif
4428 	      }
4429 	    if (r_type == R_SH_GOTFUNCDESC20)
4430 	      {
4431 		r = install_movi20_field (output_bfd, relocation + addend,
4432 					  input_bfd, input_section, contents,
4433 					  rel->r_offset);
4434 		break;
4435 	      }
4436 	    else
4437 	      goto final_link_relocate;
4438 	  }
4439 	  break;
4440 
4441 	case R_SH_GOTOFFFUNCDESC:
4442 	case R_SH_GOTOFFFUNCDESC20:
4443 	  /* FIXME: See R_SH_FUNCDESC comment about global symbols in the
4444 	     executable and --export-dynamic.  If such symbols get
4445 	     ld.so-allocated descriptors we can not use R_SH_GOTOFFFUNCDESC
4446 	     for them.  */
4447 	  BFD_ASSERT (htab);
4448 
4449 	  check_segment[0] = check_segment[1] = -1;
4450 	  relocation = 0;
4451 	  addend = rel->r_addend;
4452 
4453 	  if (h && (h->root.type == bfd_link_hash_undefweak
4454 		    || !SYMBOL_FUNCDESC_LOCAL (info, h)))
4455 	    {
4456 	      _bfd_error_handler
4457 		/* xgettext:c-format */
4458 		(_("%pB(%pA+%#" PRIx64 "): "
4459 		   "%s relocation against external symbol \"%s\""),
4460 		 input_bfd, input_section, (uint64_t) rel->r_offset,
4461 		 howto->name, h->root.root.string);
4462 	      return false;
4463 	    }
4464 	  else
4465 	    {
4466 	      bfd_vma offset;
4467 
4468 	      /* Otherwise, we know we have a private function
4469 		 descriptor, so reference it directly.  */
4470 	      if (h)
4471 		{
4472 		  offset = sh_elf_hash_entry (h)->funcdesc.offset;
4473 		  BFD_ASSERT (offset != MINUS_ONE);
4474 		  if ((offset & 1) == 0)
4475 		    {
4476 		      if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
4477 						       offset, NULL, 0))
4478 			return false;
4479 		      sh_elf_hash_entry (h)->funcdesc.offset |= 1;
4480 		    }
4481 		}
4482 	      else
4483 		{
4484 		  union gotref *local_funcdesc;
4485 
4486 		  local_funcdesc = sh_elf_local_funcdesc (input_bfd);
4487 		  offset = local_funcdesc[r_symndx].offset;
4488 		  BFD_ASSERT (offset != MINUS_ONE);
4489 		  if ((offset & 1) == 0)
4490 		    {
4491 		      if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
4492 						       offset, sec,
4493 						       sym->st_value))
4494 			return false;
4495 		      local_funcdesc[r_symndx].offset |= 1;
4496 		    }
4497 		}
4498 
4499 	      relocation = htab->sfuncdesc->output_offset + (offset & ~1);
4500 	    }
4501 
4502 	  relocation -= (htab->root.hgot->root.u.def.value
4503 			 + sgotplt->output_offset);
4504 #ifdef GOT_BIAS
4505 	  relocation -= GOT_BIAS;
4506 #endif
4507 
4508 	  if (r_type == R_SH_GOTOFFFUNCDESC20)
4509 	    {
4510 	      r = install_movi20_field (output_bfd, relocation + addend,
4511 					input_bfd, input_section, contents,
4512 					rel->r_offset);
4513 	      break;
4514 	    }
4515 	  else
4516 	    goto final_link_relocate;
4517 
4518 	case R_SH_LOOP_START:
4519 	  {
4520 	    static bfd_vma start, end;
4521 
4522 	    start = (relocation + rel->r_addend
4523 		     - (sec->output_section->vma + sec->output_offset));
4524 	    r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
4525 				   rel->r_offset, sec, start, end);
4526 	    break;
4527 
4528 	case R_SH_LOOP_END:
4529 	    end = (relocation + rel->r_addend
4530 		   - (sec->output_section->vma + sec->output_offset));
4531 	    r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
4532 				   rel->r_offset, sec, start, end);
4533 	    break;
4534 	  }
4535 
4536 	case R_SH_TLS_GD_32:
4537 	case R_SH_TLS_IE_32:
4538 	  BFD_ASSERT (htab);
4539 	  check_segment[0] = check_segment[1] = -1;
4540 	  r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
4541 	  got_type = GOT_UNKNOWN;
4542 	  if (h == NULL && local_got_offsets)
4543 	    got_type = sh_elf_local_got_type (input_bfd) [r_symndx];
4544 	  else if (h != NULL)
4545 	    {
4546 	      got_type = sh_elf_hash_entry (h)->got_type;
4547 	      if (! bfd_link_pic (info)
4548 		  && (h->dynindx == -1
4549 		      || h->def_regular))
4550 		r_type = R_SH_TLS_LE_32;
4551 	    }
4552 
4553 	  if (r_type == R_SH_TLS_GD_32 && got_type == GOT_TLS_IE)
4554 	    r_type = R_SH_TLS_IE_32;
4555 
4556 	  if (r_type == R_SH_TLS_LE_32)
4557 	    {
4558 	      bfd_vma offset;
4559 	      unsigned short insn;
4560 
4561 	      if (ELF32_R_TYPE (rel->r_info) == R_SH_TLS_GD_32)
4562 		{
4563 		  /* GD->LE transition:
4564 		       mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
4565 		       jsr @r1; add r12,r4; bra 3f; nop; .align 2;
4566 		       1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
4567 		     We change it into:
4568 		       mov.l 1f,r4; stc gbr,r0; add r4,r0; nop;
4569 		       nop; nop; ...
4570 		       1: .long x@TPOFF; 2: .long __tls_get_addr@PLT; 3:.  */
4571 
4572 		  offset = rel->r_offset;
4573 		  if (offset < 16)
4574 		    {
4575 		      _bfd_error_handler
4576 			/* xgettext:c-format */
4577 			(_("%pB(%pA): offset in relocation for GD->LE translation is too small: %#" PRIx64),
4578 			 input_bfd, input_section, (uint64_t) offset);
4579 		      return false;
4580 		    }
4581 
4582 		  /* Size of GD instructions is 16 or 18.  */
4583 		  offset -= 16;
4584 		  insn = bfd_get_16 (input_bfd, contents + offset + 0);
4585 		  if ((insn & 0xff00) == 0xc700)
4586 		    {
4587 		      BFD_ASSERT (offset >= 2);
4588 		      offset -= 2;
4589 		      insn = bfd_get_16 (input_bfd, contents + offset + 0);
4590 		    }
4591 
4592 		  if ((insn & 0xff00) != 0xd400)
4593 		    _bfd_error_handler
4594 		      /* xgettext:c-format */  /* The backslash is to prevent bogus trigraph detection.  */
4595 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0xd4?\?)"),
4596 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4597 
4598 		  insn = bfd_get_16 (input_bfd, contents + offset + 2);
4599 
4600 		  if ((insn & 0xff00) != 0xc700)
4601 		    _bfd_error_handler
4602 		      /* xgettext:c-format */
4603 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0xc7?\?)"),
4604 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4605 
4606 		  insn = bfd_get_16 (input_bfd, contents + offset + 4);
4607 		  if ((insn & 0xff00) != 0xd100)
4608 		    _bfd_error_handler
4609 		      /* xgettext:c-format */
4610 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0xd1?\?)"),
4611 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4612 
4613 		  insn = bfd_get_16 (input_bfd, contents + offset + 6);
4614 		  if (insn != 0x310c)
4615 		    _bfd_error_handler
4616 		      /* xgettext:c-format */
4617 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x310c)"),
4618 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4619 
4620 		  insn = bfd_get_16 (input_bfd, contents + offset + 8);
4621 		  if (insn != 0x410b)
4622 		    _bfd_error_handler
4623 		      /* xgettext:c-format */
4624 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x410b)"),
4625 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4626 
4627 		  insn = bfd_get_16 (input_bfd, contents + offset + 10);
4628 		  if (insn != 0x34cc)
4629 		    _bfd_error_handler
4630 		      /* xgettext:c-format */
4631 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x34cc)"),
4632 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4633 
4634 		  bfd_put_16 (output_bfd, 0x0012, contents + offset + 2);
4635 		  bfd_put_16 (output_bfd, 0x304c, contents + offset + 4);
4636 		  bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
4637 		  bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
4638 		  bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
4639 		}
4640 	      else
4641 		{
4642 		  int target;
4643 
4644 		  /* IE->LE transition:
4645 		         mov.l 1f,r0;
4646 		         stc gbr,rN;
4647 		         mov.l @(r0,r12),rM;
4648 		         bra 2f;
4649 		         add ...;
4650 		         .align 2;
4651 		       1: x@GOTTPOFF;
4652 		       2:
4653 		     We change it into:
4654 		         mov.l .Ln,rM;
4655 			 stc gbr,rN;
4656 			 nop;
4657 			 ...;
4658 		       1: x@TPOFF;
4659 		       2:.  */
4660 
4661 		  offset = rel->r_offset;
4662 		  if (offset < 16)
4663 		    {
4664 		      _bfd_error_handler
4665 			/* xgettext:c-format */
4666 			(_("%pB(%pA): offset in relocation for IE->LE translation is too small: %#" PRIx64),
4667 			 input_bfd, input_section, (uint64_t) offset);
4668 		      return false;
4669 		    }
4670 
4671 		  /* Size of IE instructions is 10 or 12.  */
4672 		  offset -= 10;
4673 		  insn = bfd_get_16 (input_bfd, contents + offset + 0);
4674 		  if ((insn & 0xf0ff) == 0x0012)
4675 		    {
4676 		      BFD_ASSERT (offset >= 2);
4677 		      offset -= 2;
4678 		      insn = bfd_get_16 (input_bfd, contents + offset + 0);
4679 		    }
4680 
4681 		  if ((insn & 0xff00) != 0xd000)
4682 		    _bfd_error_handler
4683 		      /* xgettext:c-format */
4684 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0xd0??: mov.l)"),
4685 		       input_bfd, input_section, (uint64_t) offset, (int) insn);
4686 
4687 		  target = insn & 0x00ff;
4688 
4689 		  insn = bfd_get_16 (input_bfd, contents + offset + 2);
4690 		  if ((insn & 0xf0ff) != 0x0012)
4691 		    _bfd_error_handler
4692 		      /* xgettext:c-format */
4693 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x0?12: stc)"),
4694 		       input_bfd, input_section, (uint64_t) (offset + 2), (int) insn);
4695 
4696 		  insn = bfd_get_16 (input_bfd, contents + offset + 4);
4697 		  if ((insn & 0xf0ff) != 0x00ce)
4698 		    _bfd_error_handler
4699 		      /* xgettext:c-format */
4700 		      (_("%pB(%pA+%#" PRIx64 "): unexpected instruction %#04X (expected 0x0?ce: mov.l)"),
4701 		       input_bfd, input_section, (uint64_t) (offset + 4), (int) insn);
4702 
4703 		  insn = 0xd000 | (insn & 0x0f00) | target;
4704 		  bfd_put_16 (output_bfd, insn, contents + offset + 0);
4705 		  bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
4706 		}
4707 
4708 	      bfd_put_32 (output_bfd, tpoff (info, relocation),
4709 			  contents + rel->r_offset);
4710 	      continue;
4711 	    }
4712 
4713 	  if (sgot == NULL || sgotplt == NULL)
4714 	    abort ();
4715 
4716 	  if (h != NULL)
4717 	    off = h->got.offset;
4718 	  else
4719 	    {
4720 	      if (local_got_offsets == NULL)
4721 		abort ();
4722 
4723 	      off = local_got_offsets[r_symndx];
4724 	    }
4725 
4726 	  /* Relocate R_SH_TLS_IE_32 directly when statically linking.  */
4727 	  if (r_type == R_SH_TLS_IE_32
4728 	      && ! htab->root.dynamic_sections_created)
4729 	    {
4730 	      off &= ~1;
4731 	      bfd_put_32 (output_bfd, tpoff (info, relocation),
4732 			  sgot->contents + off);
4733 	      bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
4734 			  contents + rel->r_offset);
4735 	      continue;
4736 	    }
4737 
4738 	  if ((off & 1) != 0)
4739 	    off &= ~1;
4740 	  else
4741 	    {
4742 	      Elf_Internal_Rela outrel;
4743 	      bfd_byte *loc;
4744 	      int dr_type, indx;
4745 
4746 	      outrel.r_offset = (sgot->output_section->vma
4747 				 + sgot->output_offset + off);
4748 
4749 	      if (h == NULL || h->dynindx == -1)
4750 		indx = 0;
4751 	      else
4752 		indx = h->dynindx;
4753 
4754 	      dr_type = (r_type == R_SH_TLS_GD_32 ? R_SH_TLS_DTPMOD32 :
4755 			 R_SH_TLS_TPOFF32);
4756 	      if (dr_type == R_SH_TLS_TPOFF32 && indx == 0)
4757 		outrel.r_addend = relocation - dtpoff_base (info);
4758 	      else
4759 		outrel.r_addend = 0;
4760 	      outrel.r_info = ELF32_R_INFO (indx, dr_type);
4761 	      loc = srelgot->contents;
4762 	      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4763 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4764 
4765 	      if (r_type == R_SH_TLS_GD_32)
4766 		{
4767 		  if (indx == 0)
4768 		    {
4769 		      bfd_put_32 (output_bfd,
4770 				  relocation - dtpoff_base (info),
4771 				  sgot->contents + off + 4);
4772 		    }
4773 		  else
4774 		    {
4775 		      outrel.r_info = ELF32_R_INFO (indx,
4776 						    R_SH_TLS_DTPOFF32);
4777 		      outrel.r_offset += 4;
4778 		      outrel.r_addend = 0;
4779 		      srelgot->reloc_count++;
4780 		      loc += sizeof (Elf32_External_Rela);
4781 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4782 		    }
4783 		}
4784 
4785 	      if (h != NULL)
4786 		h->got.offset |= 1;
4787 	      else
4788 		local_got_offsets[r_symndx] |= 1;
4789 	    }
4790 
4791 	  if (off >= (bfd_vma) -2)
4792 	    abort ();
4793 
4794 	  if (r_type == (int) ELF32_R_TYPE (rel->r_info))
4795 	    relocation = sh_elf_got_offset (htab) + off;
4796 	  else
4797 	    {
4798 	      bfd_vma offset;
4799 	      unsigned short insn;
4800 
4801 	      /* GD->IE transition:
4802 		   mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
4803 		   jsr @r1; add r12,r4; bra 3f; nop; .align 2;
4804 		   1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
4805 		 We change it into:
4806 		   mov.l 1f,r0; stc gbr,r4; mov.l @(r0,r12),r0; add r4,r0;
4807 		   nop; nop; bra 3f; nop; .align 2;
4808 		   1: .long x@TPOFF; 2:...; 3:.  */
4809 
4810 	      offset = rel->r_offset;
4811 	      if (offset < 16)
4812 		{
4813 		  _bfd_error_handler
4814 		    /* xgettext:c-format */
4815 		    (_("%pB(%pA): offset in relocation for GD->IE translation is too small: %#" PRIx64),
4816 		     input_bfd, input_section, (uint64_t) offset);
4817 		  return false;
4818 		}
4819 
4820 	      /* Size of GD instructions is 16 or 18.  */
4821 	      offset -= 16;
4822 	      insn = bfd_get_16 (input_bfd, contents + offset + 0);
4823 	      if ((insn & 0xff00) == 0xc700)
4824 		{
4825 		  BFD_ASSERT (offset >= 2);
4826 		  offset -= 2;
4827 		  insn = bfd_get_16 (input_bfd, contents + offset + 0);
4828 		}
4829 
4830 	      BFD_ASSERT ((insn & 0xff00) == 0xd400);
4831 
4832 	      /* Replace mov.l 1f,R4 with mov.l 1f,r0.  */
4833 	      bfd_put_16 (output_bfd, insn & 0xf0ff, contents + offset);
4834 
4835 	      insn = bfd_get_16 (input_bfd, contents + offset + 2);
4836 	      BFD_ASSERT ((insn & 0xff00) == 0xc700);
4837 	      insn = bfd_get_16 (input_bfd, contents + offset + 4);
4838 	      BFD_ASSERT ((insn & 0xff00) == 0xd100);
4839 	      insn = bfd_get_16 (input_bfd, contents + offset + 6);
4840 	      BFD_ASSERT (insn == 0x310c);
4841 	      insn = bfd_get_16 (input_bfd, contents + offset + 8);
4842 	      BFD_ASSERT (insn == 0x410b);
4843 	      insn = bfd_get_16 (input_bfd, contents + offset + 10);
4844 	      BFD_ASSERT (insn == 0x34cc);
4845 
4846 	      bfd_put_16 (output_bfd, 0x0412, contents + offset + 2);
4847 	      bfd_put_16 (output_bfd, 0x00ce, contents + offset + 4);
4848 	      bfd_put_16 (output_bfd, 0x304c, contents + offset + 6);
4849 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
4850 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
4851 
4852 	      bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
4853 			  contents + rel->r_offset);
4854 
4855 	      continue;
4856 	  }
4857 
4858 	  addend = rel->r_addend;
4859 
4860 	  goto final_link_relocate;
4861 
4862 	case R_SH_TLS_LD_32:
4863 	  BFD_ASSERT (htab);
4864 	  check_segment[0] = check_segment[1] = -1;
4865 	  if (! bfd_link_pic (info))
4866 	    {
4867 	      bfd_vma offset;
4868 	      unsigned short insn;
4869 
4870 	      /* LD->LE transition:
4871 		   mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
4872 		   jsr @r1; add r12,r4; bra 3f; nop; .align 2;
4873 		   1: .long x$TLSLD; 2: .long __tls_get_addr@PLT; 3:
4874 		 We change it into:
4875 		   stc gbr,r0; nop; nop; nop;
4876 		   nop; nop; bra 3f; ...; 3:.  */
4877 
4878 	      offset = rel->r_offset;
4879 	      if (offset < 16)
4880 		{
4881 		  _bfd_error_handler
4882 		    /* xgettext:c-format */
4883 		    (_("%pB(%pA): offset in relocation for LD->LE translation is too small: %#" PRIx64),
4884 		     input_bfd, input_section, (uint64_t) offset);
4885 		  return false;
4886 		}
4887 
4888 	      /* Size of LD instructions is 16 or 18.  */
4889 	      offset -= 16;
4890 	      insn = bfd_get_16 (input_bfd, contents + offset + 0);
4891 	      if ((insn & 0xff00) == 0xc700)
4892 		{
4893 		  BFD_ASSERT (offset >= 2);
4894 		  offset -= 2;
4895 		  insn = bfd_get_16 (input_bfd, contents + offset + 0);
4896 		}
4897 
4898 	      BFD_ASSERT ((insn & 0xff00) == 0xd400);
4899 	      insn = bfd_get_16 (input_bfd, contents + offset + 2);
4900 	      BFD_ASSERT ((insn & 0xff00) == 0xc700);
4901 	      insn = bfd_get_16 (input_bfd, contents + offset + 4);
4902 	      BFD_ASSERT ((insn & 0xff00) == 0xd100);
4903 	      insn = bfd_get_16 (input_bfd, contents + offset + 6);
4904 	      BFD_ASSERT (insn == 0x310c);
4905 	      insn = bfd_get_16 (input_bfd, contents + offset + 8);
4906 	      BFD_ASSERT (insn == 0x410b);
4907 	      insn = bfd_get_16 (input_bfd, contents + offset + 10);
4908 	      BFD_ASSERT (insn == 0x34cc);
4909 
4910 	      bfd_put_16 (output_bfd, 0x0012, contents + offset + 0);
4911 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 2);
4912 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
4913 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
4914 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
4915 	      bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
4916 
4917 	      continue;
4918 	    }
4919 
4920 	  if (sgot == NULL || sgotplt == NULL)
4921 	    abort ();
4922 
4923 	  off = htab->tls_ldm_got.offset;
4924 	  if (off & 1)
4925 	    off &= ~1;
4926 	  else
4927 	    {
4928 	      Elf_Internal_Rela outrel;
4929 	      bfd_byte *loc;
4930 
4931 	      outrel.r_offset = (sgot->output_section->vma
4932 				 + sgot->output_offset + off);
4933 	      outrel.r_addend = 0;
4934 	      outrel.r_info = ELF32_R_INFO (0, R_SH_TLS_DTPMOD32);
4935 	      loc = srelgot->contents;
4936 	      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4937 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4938 	      htab->tls_ldm_got.offset |= 1;
4939 	    }
4940 
4941 	  relocation = sh_elf_got_offset (htab) + off;
4942 	  addend = rel->r_addend;
4943 
4944 	  goto final_link_relocate;
4945 
4946 	case R_SH_TLS_LDO_32:
4947 	  check_segment[0] = check_segment[1] = -1;
4948 	  if (! bfd_link_pic (info))
4949 	    relocation = tpoff (info, relocation);
4950 	  else
4951 	    relocation -= dtpoff_base (info);
4952 
4953 	  addend = rel->r_addend;
4954 	  goto final_link_relocate;
4955 
4956 	case R_SH_TLS_LE_32:
4957 	  {
4958 	    int indx;
4959 	    Elf_Internal_Rela outrel;
4960 	    bfd_byte *loc;
4961 
4962 	    check_segment[0] = check_segment[1] = -1;
4963 
4964 	    if (!bfd_link_dll (info))
4965 	      {
4966 		relocation = tpoff (info, relocation);
4967 		addend = rel->r_addend;
4968 		goto final_link_relocate;
4969 	      }
4970 
4971 	    if (sreloc == NULL)
4972 	      {
4973 		sreloc = _bfd_elf_get_dynamic_reloc_section
4974 		  (input_bfd, input_section, /*rela?*/ true);
4975 		if (sreloc == NULL)
4976 		  return false;
4977 	      }
4978 
4979 	    if (h == NULL || h->dynindx == -1)
4980 	      indx = 0;
4981 	    else
4982 	      indx = h->dynindx;
4983 
4984 	    outrel.r_offset = (input_section->output_section->vma
4985 			       + input_section->output_offset
4986 			       + rel->r_offset);
4987 	    outrel.r_info = ELF32_R_INFO (indx, R_SH_TLS_TPOFF32);
4988 	    if (indx == 0)
4989 	      outrel.r_addend = relocation - dtpoff_base (info);
4990 	    else
4991 	      outrel.r_addend = 0;
4992 
4993 	    loc = sreloc->contents;
4994 	    loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
4995 	    bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4996 	    continue;
4997 	  }
4998 	}
4999 
5000     relocation_done:
5001       if (fdpic_p && check_segment[0] != (unsigned) -1
5002 	  && check_segment[0] != check_segment[1])
5003 	{
5004 	  /* We don't want duplicate errors for undefined symbols.  */
5005 	  if (!h || h->root.type != bfd_link_hash_undefined)
5006 	    {
5007 	      if (bfd_link_pic (info))
5008 		{
5009 		  info->callbacks->einfo
5010 		    /* xgettext:c-format */
5011 		    (_("%X%C: relocation to \"%s\" references a different segment\n"),
5012 		     input_bfd, input_section, rel->r_offset, symname);
5013 		  return false;
5014 		}
5015 	      else
5016 		info->callbacks->einfo
5017 		  /* xgettext:c-format */
5018 		  (_("%C: warning: relocation to \"%s\" references a different segment\n"),
5019 		   input_bfd, input_section, rel->r_offset, symname);
5020 	    }
5021 
5022 	  elf_elfheader (output_bfd)->e_flags |= EF_SH_PIC;
5023 	}
5024 
5025       if (r != bfd_reloc_ok)
5026 	{
5027 	  switch (r)
5028 	    {
5029 	    default:
5030 	    case bfd_reloc_outofrange:
5031 	      abort ();
5032 	    case bfd_reloc_overflow:
5033 	      {
5034 		const char *name;
5035 
5036 		if (h != NULL)
5037 		  name = NULL;
5038 		else
5039 		  {
5040 		    name = (bfd_elf_string_from_elf_section
5041 			    (input_bfd, symtab_hdr->sh_link, sym->st_name));
5042 		    if (name == NULL)
5043 		      return false;
5044 		    if (*name == '\0')
5045 		      name = bfd_section_name (sec);
5046 		  }
5047 		(*info->callbacks->reloc_overflow)
5048 		  (info, (h ? &h->root : NULL), name, howto->name,
5049 		   (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
5050 	      }
5051 	      break;
5052 	    }
5053 	}
5054     }
5055 
5056   return true;
5057 }
5058 
5059 /* This is a version of bfd_generic_get_relocated_section_contents
5060    which uses sh_elf_relocate_section.  */
5061 
5062 static bfd_byte *
sh_elf_get_relocated_section_contents(bfd * output_bfd,struct bfd_link_info * link_info,struct bfd_link_order * link_order,bfd_byte * data,bool relocatable,asymbol ** symbols)5063 sh_elf_get_relocated_section_contents (bfd *output_bfd,
5064 				       struct bfd_link_info *link_info,
5065 				       struct bfd_link_order *link_order,
5066 				       bfd_byte *data,
5067 				       bool relocatable,
5068 				       asymbol **symbols)
5069 {
5070   Elf_Internal_Shdr *symtab_hdr;
5071   asection *input_section = link_order->u.indirect.section;
5072   bfd *input_bfd = input_section->owner;
5073   asection **sections = NULL;
5074   Elf_Internal_Rela *internal_relocs = NULL;
5075   Elf_Internal_Sym *isymbuf = NULL;
5076 
5077   /* We only need to handle the case of relaxing, or of having a
5078      particular set of section contents, specially.  */
5079   if (relocatable
5080       || elf_section_data (input_section)->this_hdr.contents == NULL)
5081     return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
5082 						       link_order, data,
5083 						       relocatable,
5084 						       symbols);
5085 
5086   symtab_hdr = &elf_symtab_hdr (input_bfd);
5087 
5088   memcpy (data, elf_section_data (input_section)->this_hdr.contents,
5089 	  (size_t) input_section->size);
5090 
5091   if ((input_section->flags & SEC_RELOC) != 0
5092       && input_section->reloc_count > 0)
5093     {
5094       asection **secpp;
5095       Elf_Internal_Sym *isym, *isymend;
5096       bfd_size_type amt;
5097 
5098       internal_relocs = (_bfd_elf_link_read_relocs
5099 			 (input_bfd, input_section, NULL,
5100 			  (Elf_Internal_Rela *) NULL, false));
5101       if (internal_relocs == NULL)
5102 	goto error_return;
5103 
5104       if (symtab_hdr->sh_info != 0)
5105 	{
5106 	  isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5107 	  if (isymbuf == NULL)
5108 	    isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
5109 					    symtab_hdr->sh_info, 0,
5110 					    NULL, NULL, NULL);
5111 	  if (isymbuf == NULL)
5112 	    goto error_return;
5113 	}
5114 
5115       amt = symtab_hdr->sh_info;
5116       amt *= sizeof (asection *);
5117       sections = (asection **) bfd_malloc (amt);
5118       if (sections == NULL && amt != 0)
5119 	goto error_return;
5120 
5121       isymend = isymbuf + symtab_hdr->sh_info;
5122       for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
5123 	{
5124 	  asection *isec;
5125 
5126 	  if (isym->st_shndx == SHN_UNDEF)
5127 	    isec = bfd_und_section_ptr;
5128 	  else if (isym->st_shndx == SHN_ABS)
5129 	    isec = bfd_abs_section_ptr;
5130 	  else if (isym->st_shndx == SHN_COMMON)
5131 	    isec = bfd_com_section_ptr;
5132 	  else
5133 	    isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
5134 
5135 	  *secpp = isec;
5136 	}
5137 
5138       if (! sh_elf_relocate_section (output_bfd, link_info, input_bfd,
5139 				     input_section, data, internal_relocs,
5140 				     isymbuf, sections))
5141 	goto error_return;
5142 
5143       free (sections);
5144       if (symtab_hdr->contents != (unsigned char *) isymbuf)
5145 	free (isymbuf);
5146       if (elf_section_data (input_section)->relocs != internal_relocs)
5147 	free (internal_relocs);
5148     }
5149 
5150   return data;
5151 
5152  error_return:
5153   free (sections);
5154   if (symtab_hdr->contents != (unsigned char *) isymbuf)
5155     free (isymbuf);
5156   if (elf_section_data (input_section)->relocs != internal_relocs)
5157     free (internal_relocs);
5158   return NULL;
5159 }
5160 
5161 /* Return the base VMA address which should be subtracted from real addresses
5162    when resolving @dtpoff relocation.
5163    This is PT_TLS segment p_vaddr.  */
5164 
5165 static bfd_vma
dtpoff_base(struct bfd_link_info * info)5166 dtpoff_base (struct bfd_link_info *info)
5167 {
5168   /* If tls_sec is NULL, we should have signalled an error already.  */
5169   if (elf_hash_table (info)->tls_sec == NULL)
5170     return 0;
5171   return elf_hash_table (info)->tls_sec->vma;
5172 }
5173 
5174 /* Return the relocation value for R_SH_TLS_TPOFF32..  */
5175 
5176 static bfd_vma
tpoff(struct bfd_link_info * info,bfd_vma address)5177 tpoff (struct bfd_link_info *info, bfd_vma address)
5178 {
5179   /* If tls_sec is NULL, we should have signalled an error already.  */
5180   if (elf_hash_table (info)->tls_sec == NULL)
5181     return 0;
5182   /* SH TLS ABI is variant I and static TLS block start just after tcbhead
5183      structure which has 2 pointer fields.  */
5184   return (address - elf_hash_table (info)->tls_sec->vma
5185 	  + align_power ((bfd_vma) 8,
5186 			 elf_hash_table (info)->tls_sec->alignment_power));
5187 }
5188 
5189 static asection *
sh_elf_gc_mark_hook(asection * sec,struct bfd_link_info * info,Elf_Internal_Rela * rel,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)5190 sh_elf_gc_mark_hook (asection *sec,
5191 		     struct bfd_link_info *info,
5192 		     Elf_Internal_Rela *rel,
5193 		     struct elf_link_hash_entry *h,
5194 		     Elf_Internal_Sym *sym)
5195 {
5196   if (h != NULL)
5197     switch (ELF32_R_TYPE (rel->r_info))
5198       {
5199       case R_SH_GNU_VTINHERIT:
5200       case R_SH_GNU_VTENTRY:
5201 	return NULL;
5202       }
5203 
5204   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5205 }
5206 
5207 /* Copy the extra info we tack onto an elf_link_hash_entry.  */
5208 
5209 static void
sh_elf_copy_indirect_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * dir,struct elf_link_hash_entry * ind)5210 sh_elf_copy_indirect_symbol (struct bfd_link_info *info,
5211 			     struct elf_link_hash_entry *dir,
5212 			     struct elf_link_hash_entry *ind)
5213 {
5214   struct elf_sh_link_hash_entry *edir, *eind;
5215 
5216   edir = (struct elf_sh_link_hash_entry *) dir;
5217   eind = (struct elf_sh_link_hash_entry *) ind;
5218 
5219   edir->gotplt_refcount = eind->gotplt_refcount;
5220   eind->gotplt_refcount = 0;
5221   edir->funcdesc.refcount += eind->funcdesc.refcount;
5222   eind->funcdesc.refcount = 0;
5223   edir->abs_funcdesc_refcount += eind->abs_funcdesc_refcount;
5224   eind->abs_funcdesc_refcount = 0;
5225 
5226   if (ind->root.type == bfd_link_hash_indirect
5227       && dir->got.refcount <= 0)
5228     {
5229       edir->got_type = eind->got_type;
5230       eind->got_type = GOT_UNKNOWN;
5231     }
5232 
5233   if (ind->root.type != bfd_link_hash_indirect
5234       && dir->dynamic_adjusted)
5235     {
5236       /* If called to transfer flags for a weakdef during processing
5237 	 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
5238 	 We clear it ourselves for ELIMINATE_COPY_RELOCS.  */
5239       if (dir->versioned != versioned_hidden)
5240 	dir->ref_dynamic |= ind->ref_dynamic;
5241       dir->ref_regular |= ind->ref_regular;
5242       dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
5243       dir->needs_plt |= ind->needs_plt;
5244     }
5245   else
5246     _bfd_elf_link_hash_copy_indirect (info, dir, ind);
5247 }
5248 
5249 static int
sh_elf_optimized_tls_reloc(struct bfd_link_info * info,int r_type,int is_local)5250 sh_elf_optimized_tls_reloc (struct bfd_link_info *info, int r_type,
5251 			    int is_local)
5252 {
5253   if (bfd_link_pic (info))
5254     return r_type;
5255 
5256   switch (r_type)
5257     {
5258     case R_SH_TLS_GD_32:
5259     case R_SH_TLS_IE_32:
5260       if (is_local)
5261 	return R_SH_TLS_LE_32;
5262       return R_SH_TLS_IE_32;
5263     case R_SH_TLS_LD_32:
5264       return R_SH_TLS_LE_32;
5265     }
5266 
5267   return r_type;
5268 }
5269 
5270 /* Look through the relocs for a section during the first phase.
5271    Since we don't do .gots or .plts, we just need to consider the
5272    virtual table relocs for gc.  */
5273 
5274 static bool
sh_elf_check_relocs(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)5275 sh_elf_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
5276 		     const Elf_Internal_Rela *relocs)
5277 {
5278   Elf_Internal_Shdr *symtab_hdr;
5279   struct elf_link_hash_entry **sym_hashes;
5280   struct elf_sh_link_hash_table *htab;
5281   const Elf_Internal_Rela *rel;
5282   const Elf_Internal_Rela *rel_end;
5283   asection *sreloc;
5284   unsigned int r_type;
5285   enum got_type got_type, old_got_type;
5286 
5287   sreloc = NULL;
5288 
5289   if (bfd_link_relocatable (info))
5290     return true;
5291 
5292   BFD_ASSERT (is_sh_elf (abfd));
5293 
5294   symtab_hdr = &elf_symtab_hdr (abfd);
5295   sym_hashes = elf_sym_hashes (abfd);
5296 
5297   htab = sh_elf_hash_table (info);
5298   if (htab == NULL)
5299     return false;
5300 
5301   rel_end = relocs + sec->reloc_count;
5302   for (rel = relocs; rel < rel_end; rel++)
5303     {
5304       struct elf_link_hash_entry *h;
5305       unsigned long r_symndx;
5306 
5307       r_symndx = ELF32_R_SYM (rel->r_info);
5308       r_type = ELF32_R_TYPE (rel->r_info);
5309 
5310       if (r_symndx < symtab_hdr->sh_info)
5311 	h = NULL;
5312       else
5313 	{
5314 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5315 	  while (h->root.type == bfd_link_hash_indirect
5316 		 || h->root.type == bfd_link_hash_warning)
5317 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
5318 	}
5319 
5320       r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
5321       if (! bfd_link_pic (info)
5322 	  && r_type == R_SH_TLS_IE_32
5323 	  && h != NULL
5324 	  && h->root.type != bfd_link_hash_undefined
5325 	  && h->root.type != bfd_link_hash_undefweak
5326 	  && (h->dynindx == -1
5327 	      || h->def_regular))
5328 	r_type = R_SH_TLS_LE_32;
5329 
5330       if (htab->fdpic_p)
5331 	switch (r_type)
5332 	  {
5333 	  case R_SH_GOTOFFFUNCDESC:
5334 	  case R_SH_GOTOFFFUNCDESC20:
5335 	  case R_SH_FUNCDESC:
5336 	  case R_SH_GOTFUNCDESC:
5337 	  case R_SH_GOTFUNCDESC20:
5338 	    if (h != NULL)
5339 	      {
5340 		if (h->dynindx == -1)
5341 		  switch (ELF_ST_VISIBILITY (h->other))
5342 		    {
5343 		    case STV_INTERNAL:
5344 		    case STV_HIDDEN:
5345 		      break;
5346 		    default:
5347 		      bfd_elf_link_record_dynamic_symbol (info, h);
5348 		      break;
5349 		    }
5350 	      }
5351 	    break;
5352 	  }
5353 
5354       /* Some relocs require a global offset table.  */
5355       if (htab->root.sgot == NULL)
5356 	{
5357 	  switch (r_type)
5358 	    {
5359 	    case R_SH_DIR32:
5360 	      /* This may require an rofixup.  */
5361 	      if (!htab->fdpic_p)
5362 		break;
5363 	      /* Fall through.  */
5364 	    case R_SH_GOTPLT32:
5365 	    case R_SH_GOT32:
5366 	    case R_SH_GOT20:
5367 	    case R_SH_GOTOFF:
5368 	    case R_SH_GOTOFF20:
5369 	    case R_SH_FUNCDESC:
5370 	    case R_SH_GOTFUNCDESC:
5371 	    case R_SH_GOTFUNCDESC20:
5372 	    case R_SH_GOTOFFFUNCDESC:
5373 	    case R_SH_GOTOFFFUNCDESC20:
5374 	    case R_SH_GOTPC:
5375 	    case R_SH_TLS_GD_32:
5376 	    case R_SH_TLS_LD_32:
5377 	    case R_SH_TLS_IE_32:
5378 	      if (htab->root.dynobj == NULL)
5379 		htab->root.dynobj = abfd;
5380 	      if (!create_got_section (htab->root.dynobj, info))
5381 		return false;
5382 	      break;
5383 
5384 	    default:
5385 	      break;
5386 	    }
5387 	}
5388 
5389       switch (r_type)
5390 	{
5391 	  /* This relocation describes the C++ object vtable hierarchy.
5392 	     Reconstruct it for later use during GC.  */
5393 	case R_SH_GNU_VTINHERIT:
5394 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
5395 	    return false;
5396 	  break;
5397 
5398 	  /* This relocation describes which C++ vtable entries are actually
5399 	     used.  Record for later use during GC.  */
5400 	case R_SH_GNU_VTENTRY:
5401 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
5402 	    return false;
5403 	  break;
5404 
5405 	case R_SH_TLS_IE_32:
5406 	  if (bfd_link_pic (info))
5407 	    info->flags |= DF_STATIC_TLS;
5408 
5409 	  /* FALLTHROUGH */
5410 	force_got:
5411 	case R_SH_TLS_GD_32:
5412 	case R_SH_GOT32:
5413 	case R_SH_GOT20:
5414 	case R_SH_GOTFUNCDESC:
5415 	case R_SH_GOTFUNCDESC20:
5416 	  switch (r_type)
5417 	    {
5418 	    default:
5419 	      got_type = GOT_NORMAL;
5420 	      break;
5421 	    case R_SH_TLS_GD_32:
5422 	      got_type = GOT_TLS_GD;
5423 	      break;
5424 	    case R_SH_TLS_IE_32:
5425 	      got_type = GOT_TLS_IE;
5426 	      break;
5427 	    case R_SH_GOTFUNCDESC:
5428 	    case R_SH_GOTFUNCDESC20:
5429 	      got_type = GOT_FUNCDESC;
5430 	      break;
5431 	    }
5432 
5433 	  if (h != NULL)
5434 	    {
5435 	      h->got.refcount += 1;
5436 	      old_got_type = sh_elf_hash_entry (h)->got_type;
5437 	    }
5438 	  else
5439 	    {
5440 	      bfd_signed_vma *local_got_refcounts;
5441 
5442 	      /* This is a global offset table entry for a local
5443 		 symbol.  */
5444 	      local_got_refcounts = elf_local_got_refcounts (abfd);
5445 	      if (local_got_refcounts == NULL)
5446 		{
5447 		  bfd_size_type size;
5448 
5449 		  size = symtab_hdr->sh_info;
5450 		  size *= sizeof (bfd_signed_vma);
5451 		  size += symtab_hdr->sh_info;
5452 		  local_got_refcounts = ((bfd_signed_vma *)
5453 					 bfd_zalloc (abfd, size));
5454 		  if (local_got_refcounts == NULL)
5455 		    return false;
5456 		  elf_local_got_refcounts (abfd) = local_got_refcounts;
5457 		  sh_elf_local_got_type (abfd)
5458 		    = (char *) (local_got_refcounts + symtab_hdr->sh_info);
5459 		}
5460 	      local_got_refcounts[r_symndx] += 1;
5461 	      old_got_type = sh_elf_local_got_type (abfd) [r_symndx];
5462 	    }
5463 
5464 	  /* If a TLS symbol is accessed using IE at least once,
5465 	     there is no point to use dynamic model for it.  */
5466 	  if (old_got_type != got_type && old_got_type != GOT_UNKNOWN
5467 	      && (old_got_type != GOT_TLS_GD || got_type != GOT_TLS_IE))
5468 	    {
5469 	      if (old_got_type == GOT_TLS_IE && got_type == GOT_TLS_GD)
5470 		got_type = GOT_TLS_IE;
5471 	      else
5472 		{
5473 		  if ((old_got_type == GOT_FUNCDESC || got_type == GOT_FUNCDESC)
5474 		      && (old_got_type == GOT_NORMAL || got_type == GOT_NORMAL))
5475 		    _bfd_error_handler
5476 		      /* xgettext:c-format */
5477 		      (_("%pB: `%s' accessed both as normal and FDPIC symbol"),
5478 		       abfd, h->root.root.string);
5479 		  else if (old_got_type == GOT_FUNCDESC
5480 			   || got_type == GOT_FUNCDESC)
5481 		    _bfd_error_handler
5482 		      /* xgettext:c-format */
5483 		      (_("%pB: `%s' accessed both as FDPIC and thread local symbol"),
5484 		       abfd, h->root.root.string);
5485 		  else
5486 		    _bfd_error_handler
5487 		      /* xgettext:c-format */
5488 		      (_("%pB: `%s' accessed both as normal and thread local symbol"),
5489 		       abfd, h->root.root.string);
5490 		  return false;
5491 		}
5492 	    }
5493 
5494 	  if (old_got_type != got_type)
5495 	    {
5496 	      if (h != NULL)
5497 		sh_elf_hash_entry (h)->got_type = got_type;
5498 	      else
5499 		sh_elf_local_got_type (abfd) [r_symndx] = got_type;
5500 	    }
5501 
5502 	  break;
5503 
5504 	case R_SH_TLS_LD_32:
5505 	  sh_elf_hash_table(info)->tls_ldm_got.refcount += 1;
5506 	  break;
5507 
5508 	case R_SH_FUNCDESC:
5509 	case R_SH_GOTOFFFUNCDESC:
5510 	case R_SH_GOTOFFFUNCDESC20:
5511 	  if (rel->r_addend)
5512 	    {
5513 	      _bfd_error_handler
5514 		(_("%pB: Function descriptor relocation with non-zero addend"),
5515 		 abfd);
5516 	      return false;
5517 	    }
5518 
5519 	  if (h == NULL)
5520 	    {
5521 	      union gotref *local_funcdesc;
5522 
5523 	      /* We need a function descriptor for a local symbol.  */
5524 	      local_funcdesc = sh_elf_local_funcdesc (abfd);
5525 	      if (local_funcdesc == NULL)
5526 		{
5527 		  bfd_size_type size;
5528 
5529 		  size = symtab_hdr->sh_info * sizeof (union gotref);
5530 		  local_funcdesc = (union gotref *) bfd_zalloc (abfd, size);
5531 		  if (local_funcdesc == NULL)
5532 		    return false;
5533 		  sh_elf_local_funcdesc (abfd) = local_funcdesc;
5534 		}
5535 	      local_funcdesc[r_symndx].refcount += 1;
5536 
5537 	      if (r_type == R_SH_FUNCDESC)
5538 		{
5539 		  if (!bfd_link_pic (info))
5540 		    htab->srofixup->size += 4;
5541 		  else
5542 		    htab->root.srelgot->size += sizeof (Elf32_External_Rela);
5543 		}
5544 	    }
5545 	  else
5546 	    {
5547 	      sh_elf_hash_entry (h)->funcdesc.refcount++;
5548 	      if (r_type == R_SH_FUNCDESC)
5549 		sh_elf_hash_entry (h)->abs_funcdesc_refcount++;
5550 
5551 	      /* If there is a function descriptor reference, then
5552 		 there should not be any non-FDPIC references.  */
5553 	      old_got_type = sh_elf_hash_entry (h)->got_type;
5554 	      if (old_got_type != GOT_FUNCDESC && old_got_type != GOT_UNKNOWN)
5555 		{
5556 		  if (old_got_type == GOT_NORMAL)
5557 		    _bfd_error_handler
5558 		      /* xgettext:c-format */
5559 		      (_("%pB: `%s' accessed both as normal and FDPIC symbol"),
5560 		       abfd, h->root.root.string);
5561 		  else
5562 		    _bfd_error_handler
5563 		      /* xgettext:c-format */
5564 		      (_("%pB: `%s' accessed both as FDPIC and thread local symbol"),
5565 		       abfd, h->root.root.string);
5566 		}
5567 	    }
5568 	  break;
5569 
5570 	case R_SH_GOTPLT32:
5571 	  /* If this is a local symbol, we resolve it directly without
5572 	     creating a procedure linkage table entry.  */
5573 
5574 	  if (h == NULL
5575 	      || h->forced_local
5576 	      || ! bfd_link_pic (info)
5577 	      || info->symbolic
5578 	      || h->dynindx == -1)
5579 	    goto force_got;
5580 
5581 	  h->needs_plt = 1;
5582 	  h->plt.refcount += 1;
5583 	  ((struct elf_sh_link_hash_entry *) h)->gotplt_refcount += 1;
5584 
5585 	  break;
5586 
5587 	case R_SH_PLT32:
5588 	  /* This symbol requires a procedure linkage table entry.  We
5589 	     actually build the entry in adjust_dynamic_symbol,
5590 	     because this might be a case of linking PIC code which is
5591 	     never referenced by a dynamic object, in which case we
5592 	     don't need to generate a procedure linkage table entry
5593 	     after all.  */
5594 
5595 	  /* If this is a local symbol, we resolve it directly without
5596 	     creating a procedure linkage table entry.  */
5597 	  if (h == NULL)
5598 	    continue;
5599 
5600 	  if (h->forced_local)
5601 	    break;
5602 
5603 	  h->needs_plt = 1;
5604 	  h->plt.refcount += 1;
5605 	  break;
5606 
5607 	case R_SH_DIR32:
5608 	case R_SH_REL32:
5609 	  if (h != NULL && ! bfd_link_pic (info))
5610 	    {
5611 	      h->non_got_ref = 1;
5612 	      h->plt.refcount += 1;
5613 	    }
5614 
5615 	  /* If we are creating a shared library, and this is a reloc
5616 	     against a global symbol, or a non PC relative reloc
5617 	     against a local symbol, then we need to copy the reloc
5618 	     into the shared library.  However, if we are linking with
5619 	     -Bsymbolic, we do not need to copy a reloc against a
5620 	     global symbol which is defined in an object we are
5621 	     including in the link (i.e., DEF_REGULAR is set).  At
5622 	     this point we have not seen all the input files, so it is
5623 	     possible that DEF_REGULAR is not set now but will be set
5624 	     later (it is never cleared).  We account for that
5625 	     possibility below by storing information in the
5626 	     dyn_relocs field of the hash table entry. A similar
5627 	     situation occurs when creating shared libraries and symbol
5628 	     visibility changes render the symbol local.
5629 
5630 	     If on the other hand, we are creating an executable, we
5631 	     may need to keep relocations for symbols satisfied by a
5632 	     dynamic library if we manage to avoid copy relocs for the
5633 	     symbol.  */
5634 	  if ((bfd_link_pic (info)
5635 	       && (sec->flags & SEC_ALLOC) != 0
5636 	       && (r_type != R_SH_REL32
5637 		   || (h != NULL
5638 		       && (! info->symbolic
5639 			   || h->root.type == bfd_link_hash_defweak
5640 			   || !h->def_regular))))
5641 	      || (! bfd_link_pic (info)
5642 		  && (sec->flags & SEC_ALLOC) != 0
5643 		  && h != NULL
5644 		  && (h->root.type == bfd_link_hash_defweak
5645 		      || !h->def_regular)))
5646 	    {
5647 	      struct elf_dyn_relocs *p;
5648 	      struct elf_dyn_relocs **head;
5649 
5650 	      if (htab->root.dynobj == NULL)
5651 		htab->root.dynobj = abfd;
5652 
5653 	      /* When creating a shared object, we must copy these
5654 		 reloc types into the output file.  We create a reloc
5655 		 section in dynobj and make room for this reloc.  */
5656 	      if (sreloc == NULL)
5657 		{
5658 		  sreloc = _bfd_elf_make_dynamic_reloc_section
5659 		    (sec, htab->root.dynobj, 2, abfd, /*rela?*/ true);
5660 
5661 		  if (sreloc == NULL)
5662 		    return false;
5663 		}
5664 
5665 	      /* If this is a global symbol, we count the number of
5666 		 relocations we need for this symbol.  */
5667 	      if (h != NULL)
5668 		head = &h->dyn_relocs;
5669 	      else
5670 		{
5671 		  /* Track dynamic relocs needed for local syms too.  */
5672 		  asection *s;
5673 		  void *vpp;
5674 		  Elf_Internal_Sym *isym;
5675 
5676 		  isym = bfd_sym_from_r_symndx (&htab->root.sym_cache,
5677 						abfd, r_symndx);
5678 		  if (isym == NULL)
5679 		    return false;
5680 
5681 		  s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5682 		  if (s == NULL)
5683 		    s = sec;
5684 
5685 		  vpp = &elf_section_data (s)->local_dynrel;
5686 		  head = (struct elf_dyn_relocs **) vpp;
5687 		}
5688 
5689 	      p = *head;
5690 	      if (p == NULL || p->sec != sec)
5691 		{
5692 		  size_t amt = sizeof (*p);
5693 		  p = bfd_alloc (htab->root.dynobj, amt);
5694 		  if (p == NULL)
5695 		    return false;
5696 		  p->next = *head;
5697 		  *head = p;
5698 		  p->sec = sec;
5699 		  p->count = 0;
5700 		  p->pc_count = 0;
5701 		}
5702 
5703 	      p->count += 1;
5704 	      if (r_type == R_SH_REL32)
5705 		p->pc_count += 1;
5706 	    }
5707 
5708 	  /* Allocate the fixup regardless of whether we need a relocation.
5709 	     If we end up generating the relocation, we'll unallocate the
5710 	     fixup.  */
5711 	  if (htab->fdpic_p && !bfd_link_pic (info)
5712 	      && r_type == R_SH_DIR32
5713 	      && (sec->flags & SEC_ALLOC) != 0)
5714 	    htab->srofixup->size += 4;
5715 	  break;
5716 
5717 	case R_SH_TLS_LE_32:
5718 	  if (bfd_link_dll (info))
5719 	    {
5720 	      _bfd_error_handler
5721 		(_("%pB: TLS local exec code cannot be linked into shared objects"),
5722 		 abfd);
5723 	      return false;
5724 	    }
5725 
5726 	  break;
5727 
5728 	case R_SH_TLS_LDO_32:
5729 	  /* Nothing to do.  */
5730 	  break;
5731 
5732 	default:
5733 	  break;
5734 	}
5735     }
5736 
5737   return true;
5738 }
5739 
5740 #ifndef sh_elf_set_mach_from_flags
5741 static unsigned int sh_ef_bfd_table[] = { EF_SH_BFD_TABLE };
5742 
5743 static bool
sh_elf_set_mach_from_flags(bfd * abfd)5744 sh_elf_set_mach_from_flags (bfd *abfd)
5745 {
5746   flagword flags = elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK;
5747 
5748   if (flags >= ARRAY_SIZE (sh_ef_bfd_table))
5749     return false;
5750 
5751   if (sh_ef_bfd_table[flags] == 0)
5752     return false;
5753 
5754   bfd_default_set_arch_mach (abfd, bfd_arch_sh, sh_ef_bfd_table[flags]);
5755 
5756   return true;
5757 }
5758 
5759 
5760 /* Reverse table lookup for sh_ef_bfd_table[].
5761    Given a bfd MACH value from archures.c
5762    return the equivalent ELF flags from the table.
5763    Return -1 if no match is found.  */
5764 
5765 int
sh_elf_get_flags_from_mach(unsigned long mach)5766 sh_elf_get_flags_from_mach (unsigned long mach)
5767 {
5768   int i = ARRAY_SIZE (sh_ef_bfd_table) - 1;
5769 
5770   for (; i>0; i--)
5771     if (sh_ef_bfd_table[i] == mach)
5772       return i;
5773 
5774   /* shouldn't get here */
5775   BFD_FAIL();
5776 
5777   return -1;
5778 }
5779 #endif /* not sh_elf_set_mach_from_flags */
5780 
5781 #ifndef sh_elf_copy_private_data
5782 /* Copy backend specific data from one object module to another */
5783 
5784 static bool
sh_elf_copy_private_data(bfd * ibfd,bfd * obfd)5785 sh_elf_copy_private_data (bfd * ibfd, bfd * obfd)
5786 {
5787   if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
5788     return true;
5789 
5790   if (! _bfd_elf_copy_private_bfd_data (ibfd, obfd))
5791     return false;
5792 
5793   return sh_elf_set_mach_from_flags (obfd);
5794 }
5795 #endif /* not sh_elf_copy_private_data */
5796 
5797 #ifndef sh_elf_merge_private_data
5798 
5799 /* This function returns the ELF architecture number that
5800    corresponds to the given arch_sh* flags.  */
5801 
5802 int
sh_find_elf_flags(unsigned int arch_set)5803 sh_find_elf_flags (unsigned int arch_set)
5804 {
5805   extern unsigned long sh_get_bfd_mach_from_arch_set (unsigned int);
5806   unsigned long bfd_mach = sh_get_bfd_mach_from_arch_set (arch_set);
5807 
5808   return sh_elf_get_flags_from_mach (bfd_mach);
5809 }
5810 
5811 /* Merge the architecture type of two BFD files, such that the
5812    resultant architecture supports all the features required
5813    by the two input BFDs.
5814    If the input BFDs are multually incompatible - i.e. one uses
5815    DSP while the other uses FPU - or there is no known architecture
5816    that fits the requirements then an error is emitted.  */
5817 
5818 static bool
sh_merge_bfd_arch(bfd * ibfd,struct bfd_link_info * info)5819 sh_merge_bfd_arch (bfd *ibfd, struct bfd_link_info *info)
5820 {
5821   bfd *obfd = info->output_bfd;
5822   unsigned int old_arch, new_arch, merged_arch;
5823 
5824   if (! _bfd_generic_verify_endian_match (ibfd, info))
5825     return false;
5826 
5827   old_arch = sh_get_arch_up_from_bfd_mach (bfd_get_mach (obfd));
5828   new_arch = sh_get_arch_up_from_bfd_mach (bfd_get_mach (ibfd));
5829 
5830   merged_arch = SH_MERGE_ARCH_SET (old_arch, new_arch);
5831 
5832   if (!SH_VALID_CO_ARCH_SET (merged_arch))
5833     {
5834       _bfd_error_handler
5835 	/* xgettext:c-format */
5836 	(_("%pB: uses %s instructions while previous modules "
5837 	   "use %s instructions"),
5838 	 ibfd,
5839 	 SH_ARCH_SET_HAS_DSP (new_arch) ? "dsp" : "floating point",
5840 	 SH_ARCH_SET_HAS_DSP (new_arch) ? "floating point" : "dsp");
5841       bfd_set_error (bfd_error_bad_value);
5842       return false;
5843     }
5844   else if (!SH_VALID_ARCH_SET (merged_arch))
5845     {
5846       _bfd_error_handler
5847 	/* xgettext:c-format */
5848 	(_("internal error: merge of architecture '%s' with "
5849 	   "architecture '%s' produced unknown architecture"),
5850 	 bfd_printable_name (obfd),
5851 	 bfd_printable_name (ibfd));
5852       bfd_set_error (bfd_error_bad_value);
5853       return false;
5854     }
5855 
5856   bfd_default_set_arch_mach (obfd, bfd_arch_sh,
5857 			     sh_get_bfd_mach_from_arch_set (merged_arch));
5858 
5859   return true;
5860 }
5861 
5862 /* This routine initialises the elf flags when required and
5863    calls sh_merge_bfd_arch() to check dsp/fpu compatibility.  */
5864 
5865 static bool
sh_elf_merge_private_data(bfd * ibfd,struct bfd_link_info * info)5866 sh_elf_merge_private_data (bfd *ibfd, struct bfd_link_info *info)
5867 {
5868   bfd *obfd = info->output_bfd;
5869 
5870   /* FIXME: What should be checked when linking shared libraries?  */
5871   if ((ibfd->flags & DYNAMIC) != 0)
5872     return true;
5873 
5874   if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
5875     return true;
5876 
5877   if (! elf_flags_init (obfd))
5878     {
5879       /* This happens when ld starts out with a 'blank' output file.  */
5880       elf_flags_init (obfd) = true;
5881       elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
5882       sh_elf_set_mach_from_flags (obfd);
5883       if (elf_elfheader (obfd)->e_flags & EF_SH_FDPIC)
5884 	elf_elfheader (obfd)->e_flags &= ~EF_SH_PIC;
5885     }
5886 
5887   if (! sh_merge_bfd_arch (ibfd, info))
5888     {
5889       _bfd_error_handler (_("%pB: uses instructions which are incompatible "
5890 			    "with instructions used in previous modules"),
5891 			  ibfd);
5892       bfd_set_error (bfd_error_bad_value);
5893       return false;
5894     }
5895 
5896   elf_elfheader (obfd)->e_flags &= ~EF_SH_MACH_MASK;
5897   elf_elfheader (obfd)->e_flags |=
5898     sh_elf_get_flags_from_mach (bfd_get_mach (obfd));
5899 
5900   if (fdpic_object_p (ibfd) != fdpic_object_p (obfd))
5901     {
5902       _bfd_error_handler (_("%pB: attempt to mix FDPIC and non-FDPIC objects"),
5903 			  ibfd);
5904       bfd_set_error (bfd_error_bad_value);
5905       return false;
5906     }
5907 
5908   return true;
5909 }
5910 #endif /* not sh_elf_merge_private_data */
5911 
5912 /* Override the generic function because we need to store sh_elf_obj_tdata
5913    as the specific tdata.  We set also the machine architecture from flags
5914    here.  */
5915 
5916 static bool
sh_elf_object_p(bfd * abfd)5917 sh_elf_object_p (bfd *abfd)
5918 {
5919   if (! sh_elf_set_mach_from_flags (abfd))
5920     return false;
5921 
5922   return (((elf_elfheader (abfd)->e_flags & EF_SH_FDPIC) != 0)
5923 	  == fdpic_object_p (abfd));
5924 }
5925 
5926 /* Finish up dynamic symbol handling.  We set the contents of various
5927    dynamic sections here.  */
5928 
5929 static bool
sh_elf_finish_dynamic_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)5930 sh_elf_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
5931 			      struct elf_link_hash_entry *h,
5932 			      Elf_Internal_Sym *sym)
5933 {
5934   struct elf_sh_link_hash_table *htab;
5935 
5936   htab = sh_elf_hash_table (info);
5937   if (htab == NULL)
5938     return false;
5939 
5940   if (h->plt.offset != (bfd_vma) -1)
5941     {
5942       asection *splt;
5943       asection *sgotplt;
5944       asection *srelplt;
5945 
5946       bfd_vma plt_index;
5947       bfd_vma got_offset;
5948       Elf_Internal_Rela rel;
5949       bfd_byte *loc;
5950       const struct elf_sh_plt_info *plt_info;
5951 
5952       /* This symbol has an entry in the procedure linkage table.  Set
5953 	 it up.  */
5954 
5955       BFD_ASSERT (h->dynindx != -1);
5956 
5957       splt = htab->root.splt;
5958       sgotplt = htab->root.sgotplt;
5959       srelplt = htab->root.srelplt;
5960       BFD_ASSERT (splt != NULL && sgotplt != NULL && srelplt != NULL);
5961 
5962       /* Get the index in the procedure linkage table which
5963 	 corresponds to this symbol.  This is the index of this symbol
5964 	 in all the symbols for which we are making plt entries.  The
5965 	 first entry in the procedure linkage table is reserved.  */
5966       plt_index = get_plt_index (htab->plt_info, h->plt.offset);
5967 
5968       plt_info = htab->plt_info;
5969       if (plt_info->short_plt != NULL && plt_index <= MAX_SHORT_PLT)
5970 	plt_info = plt_info->short_plt;
5971 
5972       /* Get the offset into the .got table of the entry that
5973 	 corresponds to this function.  */
5974       if (htab->fdpic_p)
5975 	/* The offset must be relative to the GOT symbol, twelve bytes
5976 	   before the end of .got.plt.  Each descriptor is eight
5977 	   bytes.  */
5978 	got_offset = plt_index * 8 + 12 - sgotplt->size;
5979       else
5980 	/* Each .got entry is 4 bytes.  The first three are
5981 	   reserved.  */
5982 	got_offset = (plt_index + 3) * 4;
5983 
5984 #ifdef GOT_BIAS
5985       if (bfd_link_pic (info))
5986 	got_offset -= GOT_BIAS;
5987 #endif
5988 
5989       /* Fill in the entry in the procedure linkage table.  */
5990       memcpy (splt->contents + h->plt.offset,
5991 	      plt_info->symbol_entry,
5992 	      plt_info->symbol_entry_size);
5993 
5994       if (bfd_link_pic (info) || htab->fdpic_p)
5995 	{
5996 	  if (plt_info->symbol_fields.got20)
5997 	    {
5998 	      bfd_reloc_status_type r;
5999 	      r = install_movi20_field (output_bfd, got_offset,
6000 					splt->owner, splt, splt->contents,
6001 					h->plt.offset
6002 					+ plt_info->symbol_fields.got_entry);
6003 	      BFD_ASSERT (r == bfd_reloc_ok);
6004 	    }
6005 	  else
6006 	    install_plt_field (output_bfd, false, got_offset,
6007 			       (splt->contents
6008 				+ h->plt.offset
6009 				+ plt_info->symbol_fields.got_entry));
6010 	}
6011       else
6012 	{
6013 	  BFD_ASSERT (!plt_info->symbol_fields.got20);
6014 
6015 	  install_plt_field (output_bfd, false,
6016 			     (sgotplt->output_section->vma
6017 			      + sgotplt->output_offset
6018 			      + got_offset),
6019 			     (splt->contents
6020 			      + h->plt.offset
6021 			      + plt_info->symbol_fields.got_entry));
6022 	  if (htab->root.target_os == is_vxworks)
6023 	    {
6024 	      unsigned int reachable_plts, plts_per_4k;
6025 	      int distance;
6026 
6027 	      /* Divide the PLT into groups.  The first group contains
6028 		 REACHABLE_PLTS entries and the other groups contain
6029 		 PLTS_PER_4K entries.  Entries in the first group can
6030 		 branch directly to .plt; those in later groups branch
6031 		 to the last element of the previous group.  */
6032 	      /* ??? It would be better to create multiple copies of
6033 		 the common resolver stub.  */
6034 	      reachable_plts = ((4096
6035 				 - plt_info->plt0_entry_size
6036 				 - (plt_info->symbol_fields.plt + 4))
6037 				/ plt_info->symbol_entry_size) + 1;
6038 	      plts_per_4k = (4096 / plt_info->symbol_entry_size);
6039 	      if (plt_index < reachable_plts)
6040 		distance = -(h->plt.offset
6041 			     + plt_info->symbol_fields.plt);
6042 	      else
6043 		distance = -(((plt_index - reachable_plts) % plts_per_4k + 1)
6044 			     * plt_info->symbol_entry_size);
6045 
6046 	      /* Install the 'bra' with this offset.  */
6047 	      bfd_put_16 (output_bfd,
6048 			  0xa000 | (0x0fff & ((distance - 4) / 2)),
6049 			  (splt->contents
6050 			   + h->plt.offset
6051 			   + plt_info->symbol_fields.plt));
6052 	    }
6053 	  else
6054 	    install_plt_field (output_bfd, true,
6055 			       splt->output_section->vma + splt->output_offset,
6056 			       (splt->contents
6057 				+ h->plt.offset
6058 				+ plt_info->symbol_fields.plt));
6059 	}
6060 
6061       /* Make got_offset relative to the start of .got.plt.  */
6062 #ifdef GOT_BIAS
6063       if (bfd_link_pic (info))
6064 	got_offset += GOT_BIAS;
6065 #endif
6066       if (htab->fdpic_p)
6067 	got_offset = plt_index * 8;
6068 
6069       if (plt_info->symbol_fields.reloc_offset != MINUS_ONE)
6070 	install_plt_field (output_bfd, false,
6071 			   plt_index * sizeof (Elf32_External_Rela),
6072 			   (splt->contents
6073 			    + h->plt.offset
6074 			    + plt_info->symbol_fields.reloc_offset));
6075 
6076       /* Fill in the entry in the global offset table.  */
6077       bfd_put_32 (output_bfd,
6078 		  (splt->output_section->vma
6079 		   + splt->output_offset
6080 		   + h->plt.offset
6081 		   + plt_info->symbol_resolve_offset),
6082 		  sgotplt->contents + got_offset);
6083       if (htab->fdpic_p)
6084 	bfd_put_32 (output_bfd,
6085 		    sh_elf_osec_to_segment (output_bfd, splt->output_section),
6086 		    sgotplt->contents + got_offset + 4);
6087 
6088       /* Fill in the entry in the .rela.plt section.  */
6089       rel.r_offset = (sgotplt->output_section->vma
6090 		      + sgotplt->output_offset
6091 		      + got_offset);
6092       if (htab->fdpic_p)
6093 	rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_FUNCDESC_VALUE);
6094       else
6095 	rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_JMP_SLOT);
6096       rel.r_addend = 0;
6097 #ifdef GOT_BIAS
6098       rel.r_addend = GOT_BIAS;
6099 #endif
6100       loc = srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
6101       bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6102 
6103       if (htab->root.target_os == is_vxworks && !bfd_link_pic (info))
6104 	{
6105 	  /* Create the .rela.plt.unloaded relocations for this PLT entry.
6106 	     Begin by pointing LOC to the first such relocation.  */
6107 	  loc = (htab->srelplt2->contents
6108 		 + (plt_index * 2 + 1) * sizeof (Elf32_External_Rela));
6109 
6110 	  /* Create a .rela.plt.unloaded R_SH_DIR32 relocation
6111 	     for the PLT entry's pointer to the .got.plt entry.  */
6112 	  rel.r_offset = (splt->output_section->vma
6113 			  + splt->output_offset
6114 			  + h->plt.offset
6115 			  + plt_info->symbol_fields.got_entry);
6116 	  rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
6117 	  rel.r_addend = got_offset;
6118 	  bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6119 	  loc += sizeof (Elf32_External_Rela);
6120 
6121 	  /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for
6122 	     the .got.plt entry, which initially points to .plt.  */
6123 	  rel.r_offset = (sgotplt->output_section->vma
6124 			  + sgotplt->output_offset
6125 			  + got_offset);
6126 	  rel.r_info = ELF32_R_INFO (htab->root.hplt->indx, R_SH_DIR32);
6127 	  rel.r_addend = 0;
6128 	  bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
6129 	}
6130 
6131       if (!h->def_regular)
6132 	{
6133 	  /* Mark the symbol as undefined, rather than as defined in
6134 	     the .plt section.  Leave the value alone.  */
6135 	  sym->st_shndx = SHN_UNDEF;
6136 	}
6137     }
6138 
6139   if (h->got.offset != (bfd_vma) -1
6140       && sh_elf_hash_entry (h)->got_type != GOT_TLS_GD
6141       && sh_elf_hash_entry (h)->got_type != GOT_TLS_IE
6142       && sh_elf_hash_entry (h)->got_type != GOT_FUNCDESC)
6143     {
6144       asection *sgot;
6145       asection *srelgot;
6146       Elf_Internal_Rela rel;
6147       bfd_byte *loc;
6148 
6149       /* This symbol has an entry in the global offset table.  Set it
6150 	 up.  */
6151 
6152       sgot = htab->root.sgot;
6153       srelgot = htab->root.srelgot;
6154       BFD_ASSERT (sgot != NULL && srelgot != NULL);
6155 
6156       rel.r_offset = (sgot->output_section->vma
6157 		      + sgot->output_offset
6158 		      + (h->got.offset &~ (bfd_vma) 1));
6159 
6160       /* If this is a static link, or it is a -Bsymbolic link and the
6161 	 symbol is defined locally or was forced to be local because
6162 	 of a version file, we just want to emit a RELATIVE reloc.
6163 	 The entry in the global offset table will already have been
6164 	 initialized in the relocate_section function.  */
6165       if (bfd_link_pic (info)
6166 	  && SYMBOL_REFERENCES_LOCAL (info, h))
6167 	{
6168 	  if (htab->fdpic_p)
6169 	    {
6170 	      asection *sec = h->root.u.def.section;
6171 	      int dynindx
6172 		= elf_section_data (sec->output_section)->dynindx;
6173 
6174 	      rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
6175 	      rel.r_addend = (h->root.u.def.value
6176 			      + h->root.u.def.section->output_offset);
6177 	    }
6178 	  else
6179 	    {
6180 	      rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
6181 	      rel.r_addend = (h->root.u.def.value
6182 			      + h->root.u.def.section->output_section->vma
6183 			      + h->root.u.def.section->output_offset);
6184 	    }
6185 	}
6186       else
6187 	{
6188 	  bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
6189 	  rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
6190 	  rel.r_addend = 0;
6191 	}
6192 
6193       loc = srelgot->contents;
6194       loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
6195       bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6196     }
6197 
6198   if (h->needs_copy)
6199     {
6200       asection *s;
6201       Elf_Internal_Rela rel;
6202       bfd_byte *loc;
6203 
6204       /* This symbol needs a copy reloc.  Set it up.  */
6205 
6206       BFD_ASSERT (h->dynindx != -1
6207 		  && (h->root.type == bfd_link_hash_defined
6208 		      || h->root.type == bfd_link_hash_defweak));
6209 
6210       s = bfd_get_linker_section (htab->root.dynobj, ".rela.bss");
6211       BFD_ASSERT (s != NULL);
6212 
6213       rel.r_offset = (h->root.u.def.value
6214 		      + h->root.u.def.section->output_section->vma
6215 		      + h->root.u.def.section->output_offset);
6216       rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_COPY);
6217       rel.r_addend = 0;
6218       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
6219       bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6220     }
6221 
6222   /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  On VxWorks,
6223      _GLOBAL_OFFSET_TABLE_ is not absolute: it is relative to the
6224      ".got" section.  */
6225   if (h == htab->root.hdynamic
6226       || (htab->root.target_os != is_vxworks && h == htab->root.hgot))
6227     sym->st_shndx = SHN_ABS;
6228 
6229   return true;
6230 }
6231 
6232 /* Finish up the dynamic sections.  */
6233 
6234 static bool
sh_elf_finish_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)6235 sh_elf_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
6236 {
6237   struct elf_sh_link_hash_table *htab;
6238   asection *sgotplt;
6239   asection *sdyn;
6240 
6241   htab = sh_elf_hash_table (info);
6242   if (htab == NULL)
6243     return false;
6244 
6245   sgotplt = htab->root.sgotplt;
6246   sdyn = bfd_get_linker_section (htab->root.dynobj, ".dynamic");
6247 
6248   if (htab->root.dynamic_sections_created)
6249     {
6250       asection *splt;
6251       Elf32_External_Dyn *dyncon, *dynconend;
6252 
6253       BFD_ASSERT (sgotplt != NULL && sdyn != NULL);
6254 
6255       dyncon = (Elf32_External_Dyn *) sdyn->contents;
6256       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
6257       for (; dyncon < dynconend; dyncon++)
6258 	{
6259 	  Elf_Internal_Dyn dyn;
6260 	  asection *s;
6261 
6262 	  bfd_elf32_swap_dyn_in (htab->root.dynobj, dyncon, &dyn);
6263 
6264 	  switch (dyn.d_tag)
6265 	    {
6266 	    default:
6267 	      if (htab->root.target_os == is_vxworks
6268 		  && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
6269 		bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
6270 	      break;
6271 
6272 	    case DT_PLTGOT:
6273 	      BFD_ASSERT (htab->root.hgot != NULL);
6274 	      s = htab->root.hgot->root.u.def.section;
6275 	      dyn.d_un.d_ptr = htab->root.hgot->root.u.def.value
6276 		+ s->output_section->vma + s->output_offset;
6277 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
6278 	      break;
6279 
6280 	    case DT_JMPREL:
6281 	      s = htab->root.srelplt->output_section;
6282 	      BFD_ASSERT (s != NULL);
6283 	      dyn.d_un.d_ptr = s->vma;
6284 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
6285 	      break;
6286 
6287 	    case DT_PLTRELSZ:
6288 	      s = htab->root.srelplt->output_section;
6289 	      BFD_ASSERT (s != NULL);
6290 	      dyn.d_un.d_val = s->size;
6291 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
6292 	      break;
6293 	    }
6294 	}
6295 
6296       /* Fill in the first entry in the procedure linkage table.  */
6297       splt = htab->root.splt;
6298       if (splt && splt->size > 0 && htab->plt_info->plt0_entry)
6299 	{
6300 	  unsigned int i;
6301 
6302 	  memcpy (splt->contents,
6303 		  htab->plt_info->plt0_entry,
6304 		  htab->plt_info->plt0_entry_size);
6305 	  for (i = 0; i < ARRAY_SIZE (htab->plt_info->plt0_got_fields); i++)
6306 	    if (htab->plt_info->plt0_got_fields[i] != MINUS_ONE)
6307 	      install_plt_field (output_bfd, false,
6308 				 (sgotplt->output_section->vma
6309 				  + sgotplt->output_offset
6310 				  + (i * 4)),
6311 				 (splt->contents
6312 				  + htab->plt_info->plt0_got_fields[i]));
6313 
6314 	  if (htab->root.target_os == is_vxworks)
6315 	    {
6316 	      /* Finalize the .rela.plt.unloaded contents.  */
6317 	      Elf_Internal_Rela rel;
6318 	      bfd_byte *loc;
6319 
6320 	      /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for the
6321 		 first PLT entry's pointer to _GLOBAL_OFFSET_TABLE_ + 8.  */
6322 	      loc = htab->srelplt2->contents;
6323 	      rel.r_offset = (splt->output_section->vma
6324 			      + splt->output_offset
6325 			      + htab->plt_info->plt0_got_fields[2]);
6326 	      rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
6327 	      rel.r_addend = 8;
6328 	      bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6329 	      loc += sizeof (Elf32_External_Rela);
6330 
6331 	      /* Fix up the remaining .rela.plt.unloaded relocations.
6332 		 They may have the wrong symbol index for _G_O_T_ or
6333 		 _P_L_T_ depending on the order in which symbols were
6334 		 output.  */
6335 	      while (loc < htab->srelplt2->contents + htab->srelplt2->size)
6336 		{
6337 		  /* The PLT entry's pointer to the .got.plt slot.  */
6338 		  bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
6339 		  rel.r_info = ELF32_R_INFO (htab->root.hgot->indx,
6340 					     R_SH_DIR32);
6341 		  bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
6342 		  loc += sizeof (Elf32_External_Rela);
6343 
6344 		  /* The .got.plt slot's pointer to .plt.  */
6345 		  bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
6346 		  rel.r_info = ELF32_R_INFO (htab->root.hplt->indx,
6347 					     R_SH_DIR32);
6348 		  bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
6349 		  loc += sizeof (Elf32_External_Rela);
6350 		}
6351 	    }
6352 
6353 	  /* UnixWare sets the entsize of .plt to 4, although that doesn't
6354 	     really seem like the right value.  */
6355 	  elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
6356 	}
6357     }
6358 
6359   /* Fill in the first three entries in the global offset table.  */
6360   if (sgotplt && sgotplt->size > 0 && !htab->fdpic_p)
6361     {
6362       if (sdyn == NULL)
6363 	bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents);
6364       else
6365 	bfd_put_32 (output_bfd,
6366 		    sdyn->output_section->vma + sdyn->output_offset,
6367 		    sgotplt->contents);
6368       bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 4);
6369       bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 8);
6370     }
6371 
6372   if (sgotplt && sgotplt->size > 0)
6373     elf_section_data (sgotplt->output_section)->this_hdr.sh_entsize = 4;
6374 
6375   /* At the very end of the .rofixup section is a pointer to the GOT.  */
6376   if (htab->fdpic_p && htab->srofixup != NULL)
6377     {
6378       struct elf_link_hash_entry *hgot = htab->root.hgot;
6379       bfd_vma got_value = hgot->root.u.def.value
6380 	+ hgot->root.u.def.section->output_section->vma
6381 	+ hgot->root.u.def.section->output_offset;
6382 
6383       sh_elf_add_rofixup (output_bfd, htab->srofixup, got_value);
6384 
6385       /* Make sure we allocated and generated the same number of fixups.  */
6386       BFD_ASSERT (htab->srofixup->reloc_count * 4 == htab->srofixup->size);
6387     }
6388 
6389   if (htab->srelfuncdesc)
6390     BFD_ASSERT (htab->srelfuncdesc->reloc_count * sizeof (Elf32_External_Rela)
6391 		== htab->srelfuncdesc->size);
6392 
6393   if (htab->root.srelgot)
6394     BFD_ASSERT (htab->root.srelgot->reloc_count * sizeof (Elf32_External_Rela)
6395 		== htab->root.srelgot->size);
6396 
6397   return true;
6398 }
6399 
6400 static enum elf_reloc_type_class
sh_elf_reloc_type_class(const struct bfd_link_info * info ATTRIBUTE_UNUSED,const asection * rel_sec ATTRIBUTE_UNUSED,const Elf_Internal_Rela * rela)6401 sh_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
6402 			 const asection *rel_sec ATTRIBUTE_UNUSED,
6403 			 const Elf_Internal_Rela *rela)
6404 {
6405   switch ((int) ELF32_R_TYPE (rela->r_info))
6406     {
6407     case R_SH_RELATIVE:
6408       return reloc_class_relative;
6409     case R_SH_JMP_SLOT:
6410       return reloc_class_plt;
6411     case R_SH_COPY:
6412       return reloc_class_copy;
6413     default:
6414       return reloc_class_normal;
6415     }
6416 }
6417 
6418 #if !defined SH_TARGET_ALREADY_DEFINED
6419 /* Support for Linux core dump NOTE sections.  */
6420 
6421 static bool
elf32_shlin_grok_prstatus(bfd * abfd,Elf_Internal_Note * note)6422 elf32_shlin_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
6423 {
6424   int offset;
6425   unsigned int size;
6426 
6427   switch (note->descsz)
6428     {
6429       default:
6430 	return false;
6431 
6432       case 168:		/* Linux/SH */
6433 	/* pr_cursig */
6434 	elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
6435 
6436 	/* pr_pid */
6437 	elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
6438 
6439 	/* pr_reg */
6440 	offset = 72;
6441 	size = 92;
6442 
6443 	break;
6444     }
6445 
6446   /* Make a ".reg/999" section.  */
6447   return _bfd_elfcore_make_pseudosection (abfd, ".reg",
6448 					  size, note->descpos + offset);
6449 }
6450 
6451 static bool
elf32_shlin_grok_psinfo(bfd * abfd,Elf_Internal_Note * note)6452 elf32_shlin_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
6453 {
6454   switch (note->descsz)
6455     {
6456       default:
6457 	return false;
6458 
6459       case 124:		/* Linux/SH elf_prpsinfo */
6460 	elf_tdata (abfd)->core->program
6461 	 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
6462 	elf_tdata (abfd)->core->command
6463 	 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
6464     }
6465 
6466   /* Note that for some reason, a spurious space is tacked
6467      onto the end of the args in some (at least one anyway)
6468      implementations, so strip it off if it exists.  */
6469 
6470   {
6471     char *command = elf_tdata (abfd)->core->command;
6472     int n = strlen (command);
6473 
6474     if (0 < n && command[n - 1] == ' ')
6475       command[n - 1] = '\0';
6476   }
6477 
6478   return true;
6479 }
6480 #endif /* not SH_TARGET_ALREADY_DEFINED */
6481 
6482 
6483 /* Return address for Ith PLT stub in section PLT, for relocation REL
6484    or (bfd_vma) -1 if it should not be included.  */
6485 
6486 static bfd_vma
sh_elf_plt_sym_val(bfd_vma i,const asection * plt,const arelent * rel ATTRIBUTE_UNUSED)6487 sh_elf_plt_sym_val (bfd_vma i, const asection *plt,
6488 		    const arelent *rel ATTRIBUTE_UNUSED)
6489 {
6490   const struct elf_sh_plt_info *plt_info;
6491 
6492   plt_info = get_plt_info (plt->owner, (plt->owner->flags & DYNAMIC) != 0);
6493   return plt->vma + get_plt_offset (plt_info, i);
6494 }
6495 
6496 /* Decide whether to attempt to turn absptr or lsda encodings in
6497    shared libraries into pcrel within the given input section.  */
6498 
6499 static bool
sh_elf_use_relative_eh_frame(bfd * input_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info,asection * eh_frame_section ATTRIBUTE_UNUSED)6500 sh_elf_use_relative_eh_frame (bfd *input_bfd ATTRIBUTE_UNUSED,
6501 			      struct bfd_link_info *info,
6502 			      asection *eh_frame_section ATTRIBUTE_UNUSED)
6503 {
6504   struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
6505 
6506   /* We can't use PC-relative encodings in FDPIC binaries, in general.  */
6507   if (htab->fdpic_p)
6508     return false;
6509 
6510   return true;
6511 }
6512 
6513 /* Adjust the contents of an eh_frame_hdr section before they're output.  */
6514 
6515 static bfd_byte
sh_elf_encode_eh_address(bfd * abfd,struct bfd_link_info * info,asection * osec,bfd_vma offset,asection * loc_sec,bfd_vma loc_offset,bfd_vma * encoded)6516 sh_elf_encode_eh_address (bfd *abfd,
6517 			  struct bfd_link_info *info,
6518 			  asection *osec, bfd_vma offset,
6519 			  asection *loc_sec, bfd_vma loc_offset,
6520 			  bfd_vma *encoded)
6521 {
6522   struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
6523   struct elf_link_hash_entry *h;
6524 
6525   if (!htab->fdpic_p)
6526     return _bfd_elf_encode_eh_address (abfd, info, osec, offset, loc_sec,
6527 				       loc_offset, encoded);
6528 
6529   h = htab->root.hgot;
6530   BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
6531 
6532   if (! h || (sh_elf_osec_to_segment (abfd, osec)
6533 	      == sh_elf_osec_to_segment (abfd, loc_sec->output_section)))
6534     return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
6535 				       loc_sec, loc_offset, encoded);
6536 
6537   BFD_ASSERT (sh_elf_osec_to_segment (abfd, osec)
6538 	      == (sh_elf_osec_to_segment
6539 		  (abfd, h->root.u.def.section->output_section)));
6540 
6541   *encoded = osec->vma + offset
6542     - (h->root.u.def.value
6543        + h->root.u.def.section->output_section->vma
6544        + h->root.u.def.section->output_offset);
6545 
6546   return DW_EH_PE_datarel | DW_EH_PE_sdata4;
6547 }
6548 
6549 #if !defined SH_TARGET_ALREADY_DEFINED
6550 #define TARGET_BIG_SYM		sh_elf32_vec
6551 #define TARGET_BIG_NAME		"elf32-sh"
6552 #define TARGET_LITTLE_SYM	sh_elf32_le_vec
6553 #define TARGET_LITTLE_NAME	"elf32-shl"
6554 #endif
6555 
6556 #define ELF_ARCH		bfd_arch_sh
6557 #define ELF_TARGET_ID		SH_ELF_DATA
6558 #define ELF_MACHINE_CODE	EM_SH
6559 #ifdef __QNXTARGET__
6560 #define ELF_MAXPAGESIZE		0x1000
6561 #else
6562 #define ELF_MAXPAGESIZE		0x80
6563 #endif
6564 
6565 #define elf_symbol_leading_char '_'
6566 
6567 #define bfd_elf32_bfd_reloc_type_lookup	sh_elf_reloc_type_lookup
6568 #define bfd_elf32_bfd_reloc_name_lookup \
6569 					sh_elf_reloc_name_lookup
6570 #define elf_info_to_howto		sh_elf_info_to_howto
6571 #define bfd_elf32_bfd_relax_section	sh_elf_relax_section
6572 #define elf_backend_relocate_section	sh_elf_relocate_section
6573 #define bfd_elf32_bfd_get_relocated_section_contents \
6574 					sh_elf_get_relocated_section_contents
6575 #define bfd_elf32_mkobject		sh_elf_mkobject
6576 #define elf_backend_object_p		sh_elf_object_p
6577 #define bfd_elf32_bfd_copy_private_bfd_data \
6578 					sh_elf_copy_private_data
6579 #define bfd_elf32_bfd_merge_private_bfd_data \
6580 					sh_elf_merge_private_data
6581 
6582 #define elf_backend_gc_mark_hook	sh_elf_gc_mark_hook
6583 #define elf_backend_check_relocs	sh_elf_check_relocs
6584 #define elf_backend_copy_indirect_symbol \
6585 					sh_elf_copy_indirect_symbol
6586 #define elf_backend_create_dynamic_sections \
6587 					sh_elf_create_dynamic_sections
6588 #define bfd_elf32_bfd_link_hash_table_create \
6589 					sh_elf_link_hash_table_create
6590 #define elf_backend_adjust_dynamic_symbol \
6591 					sh_elf_adjust_dynamic_symbol
6592 #define elf_backend_always_size_sections \
6593 					sh_elf_always_size_sections
6594 #define elf_backend_size_dynamic_sections \
6595 					sh_elf_size_dynamic_sections
6596 #define elf_backend_omit_section_dynsym	sh_elf_omit_section_dynsym
6597 #define elf_backend_finish_dynamic_symbol \
6598 					sh_elf_finish_dynamic_symbol
6599 #define elf_backend_finish_dynamic_sections \
6600 					sh_elf_finish_dynamic_sections
6601 #define elf_backend_reloc_type_class	sh_elf_reloc_type_class
6602 #define elf_backend_plt_sym_val		sh_elf_plt_sym_val
6603 #define elf_backend_can_make_relative_eh_frame \
6604 					sh_elf_use_relative_eh_frame
6605 #define elf_backend_can_make_lsda_relative_eh_frame \
6606 					sh_elf_use_relative_eh_frame
6607 #define elf_backend_encode_eh_address \
6608 					sh_elf_encode_eh_address
6609 
6610 #define elf_backend_stack_align		8
6611 #define elf_backend_can_gc_sections	1
6612 #define elf_backend_can_refcount	1
6613 #define elf_backend_want_got_plt	1
6614 #define elf_backend_plt_readonly	1
6615 #define elf_backend_want_plt_sym	0
6616 #define elf_backend_got_header_size	12
6617 #define elf_backend_dtrel_excludes_plt	1
6618 
6619 #define elf_backend_linux_prpsinfo32_ugid16	true
6620 
6621 #if !defined SH_TARGET_ALREADY_DEFINED
6622 
6623 #include "elf32-target.h"
6624 
6625 /* NetBSD support.  */
6626 #undef	TARGET_BIG_SYM
6627 #define	TARGET_BIG_SYM			sh_elf32_nbsd_vec
6628 #undef	TARGET_BIG_NAME
6629 #define	TARGET_BIG_NAME			"elf32-sh-nbsd"
6630 #undef	TARGET_LITTLE_SYM
6631 #define	TARGET_LITTLE_SYM		sh_elf32_nbsd_le_vec
6632 #undef	TARGET_LITTLE_NAME
6633 #define	TARGET_LITTLE_NAME		"elf32-shl-nbsd"
6634 #undef	ELF_MAXPAGESIZE
6635 #define	ELF_MAXPAGESIZE			0x10000
6636 #undef	ELF_COMMONPAGESIZE
6637 #undef	elf_symbol_leading_char
6638 #define	elf_symbol_leading_char		0
6639 #undef	elf32_bed
6640 #define	elf32_bed			elf32_sh_nbsd_bed
6641 
6642 #include "elf32-target.h"
6643 
6644 
6645 /* Linux support.  */
6646 #undef	TARGET_BIG_SYM
6647 #define	TARGET_BIG_SYM			sh_elf32_linux_be_vec
6648 #undef	TARGET_BIG_NAME
6649 #define	TARGET_BIG_NAME			"elf32-shbig-linux"
6650 #undef	TARGET_LITTLE_SYM
6651 #define	TARGET_LITTLE_SYM		sh_elf32_linux_vec
6652 #undef	TARGET_LITTLE_NAME
6653 #define	TARGET_LITTLE_NAME		"elf32-sh-linux"
6654 #undef	ELF_COMMONPAGESIZE
6655 #define	ELF_COMMONPAGESIZE		0x1000
6656 
6657 #undef	elf_backend_grok_prstatus
6658 #define	elf_backend_grok_prstatus	elf32_shlin_grok_prstatus
6659 #undef	elf_backend_grok_psinfo
6660 #define	elf_backend_grok_psinfo		elf32_shlin_grok_psinfo
6661 #undef	elf32_bed
6662 #define	elf32_bed			elf32_sh_lin_bed
6663 
6664 #include "elf32-target.h"
6665 
6666 
6667 /* FDPIC support.  */
6668 #undef	TARGET_BIG_SYM
6669 #define	TARGET_BIG_SYM			sh_elf32_fdpic_be_vec
6670 #undef	TARGET_BIG_NAME
6671 #define	TARGET_BIG_NAME			"elf32-shbig-fdpic"
6672 #undef	TARGET_LITTLE_SYM
6673 #define	TARGET_LITTLE_SYM		sh_elf32_fdpic_le_vec
6674 #undef	TARGET_LITTLE_NAME
6675 #define	TARGET_LITTLE_NAME		"elf32-sh-fdpic"
6676 
6677 #undef	elf32_bed
6678 #define	elf32_bed			elf32_sh_fd_bed
6679 
6680 #include "elf32-target.h"
6681 
6682 /* VxWorks support.  */
6683 #undef	TARGET_BIG_SYM
6684 #define	TARGET_BIG_SYM			sh_elf32_vxworks_vec
6685 #undef	TARGET_BIG_NAME
6686 #define	TARGET_BIG_NAME			"elf32-sh-vxworks"
6687 #undef	TARGET_LITTLE_SYM
6688 #define	TARGET_LITTLE_SYM		sh_elf32_vxworks_le_vec
6689 #undef	TARGET_LITTLE_NAME
6690 #define	TARGET_LITTLE_NAME		"elf32-shl-vxworks"
6691 #undef	elf32_bed
6692 #define	elf32_bed			elf32_sh_vxworks_bed
6693 
6694 #undef	elf_backend_want_plt_sym
6695 #define	elf_backend_want_plt_sym	1
6696 #undef	elf_symbol_leading_char
6697 #define	elf_symbol_leading_char		'_'
6698 #define	elf_backend_want_got_underscore 1
6699 #undef	elf_backend_grok_prstatus
6700 #undef	elf_backend_grok_psinfo
6701 #undef	elf_backend_add_symbol_hook
6702 #define	elf_backend_add_symbol_hook	elf_vxworks_add_symbol_hook
6703 #undef	elf_backend_link_output_symbol_hook
6704 #define	elf_backend_link_output_symbol_hook \
6705 					elf_vxworks_link_output_symbol_hook
6706 #undef	elf_backend_emit_relocs
6707 #define	elf_backend_emit_relocs		elf_vxworks_emit_relocs
6708 #undef	elf_backend_final_write_processing
6709 #define	elf_backend_final_write_processing \
6710 					elf_vxworks_final_write_processing
6711 #undef	ELF_MAXPAGESIZE
6712 #define	ELF_MAXPAGESIZE			0x1000
6713 #undef	ELF_COMMONPAGESIZE
6714 
6715 #undef	ELF_TARGET_OS
6716 #define	ELF_TARGET_OS			is_vxworks
6717 
6718 #include "elf32-target.h"
6719 
6720 #endif /* not SH_TARGET_ALREADY_DEFINED */
6721