| 1 |
/* SuperH SH64-specific support for 32-bit ELF |
| 2 |
Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 |
| 3 |
Free Software Foundation, Inc. |
| 4 |
|
| 5 |
This file is part of BFD, the Binary File Descriptor library. |
| 6 |
|
| 7 |
This program is free software; you can redistribute it and/or modify |
| 8 |
it under the terms of the GNU General Public License as published by |
| 9 |
the Free Software Foundation; either version 3 of the License, or |
| 10 |
(at your option) any later version. |
| 11 |
|
| 12 |
This program is distributed in the hope that it will be useful, |
| 13 |
but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 14 |
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 15 |
GNU General Public License for more details. |
| 16 |
|
| 17 |
You should have received a copy of the GNU General Public License |
| 18 |
along with this program; if not, write to the Free Software |
| 19 |
Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, |
| 20 |
MA 02110-1301, USA. */ |
| 21 |
|
| 22 |
#define SH64_ELF |
| 23 |
|
| 24 |
#include "sysdep.h" |
| 25 |
#include "bfd.h" |
| 26 |
#include "elf-bfd.h" |
| 27 |
#include "../opcodes/sh64-opc.h" |
| 28 |
#include "elf32-sh64.h" |
| 29 |
|
| 30 |
/* Add a suffix for datalabel indirection symbols. It must not match any |
| 31 |
other symbols; user symbols with or without version or other |
| 32 |
decoration. It must only be used internally and not emitted by any |
| 33 |
means. */ |
| 34 |
#define DATALABEL_SUFFIX " DL" |
| 35 |
|
| 36 |
/* Used to hold data for function called through bfd_map_over_sections. */ |
| 37 |
struct sh64_find_section_vma_data |
| 38 |
{ |
| 39 |
asection *section; |
| 40 |
bfd_vma addr; |
| 41 |
}; |
| 42 |
|
| 43 |
static bfd_boolean sh64_elf_new_section_hook |
| 44 |
(bfd *, asection *); |
| 45 |
static bfd_boolean sh64_elf_copy_private_data |
| 46 |
(bfd *, bfd *); |
| 47 |
static bfd_boolean sh64_elf_merge_private_data |
| 48 |
(bfd *, bfd *); |
| 49 |
static bfd_boolean sh64_elf_fake_sections |
| 50 |
(bfd *, Elf_Internal_Shdr *, asection *); |
| 51 |
static bfd_boolean sh64_elf_set_private_flags |
| 52 |
(bfd *, flagword); |
| 53 |
static bfd_boolean sh64_elf_set_mach_from_flags |
| 54 |
(bfd *); |
| 55 |
static bfd_boolean shmedia_prepare_reloc |
| 56 |
(struct bfd_link_info *, bfd *, asection *, bfd_byte *, |
| 57 |
const Elf_Internal_Rela *, bfd_vma *); |
| 58 |
static int sh64_elf_get_symbol_type |
| 59 |
(Elf_Internal_Sym *, int); |
| 60 |
static bfd_boolean sh64_elf_add_symbol_hook |
| 61 |
(bfd *, struct bfd_link_info *, Elf_Internal_Sym *, const char **, |
| 62 |
flagword *, asection **, bfd_vma *); |
| 63 |
static int sh64_elf_link_output_symbol_hook |
| 64 |
(struct bfd_link_info *, const char *, Elf_Internal_Sym *, asection *, |
| 65 |
struct elf_link_hash_entry *); |
| 66 |
static bfd_boolean sh64_backend_section_from_shdr |
| 67 |
(bfd *, Elf_Internal_Shdr *, const char *, int); |
| 68 |
static void sh64_elf_final_write_processing |
| 69 |
(bfd *, bfd_boolean); |
| 70 |
static bfd_boolean sh64_bfd_elf_copy_private_section_data |
| 71 |
(bfd *, asection *, bfd *, asection *); |
| 72 |
static void sh64_find_section_for_address |
| 73 |
(bfd *, asection *, void *); |
| 74 |
|
| 75 |
/* Let elf32-sh.c handle the "bfd_" definitions, so we only have to |
| 76 |
intrude with an #ifndef around the function definition. */ |
| 77 |
#define sh_elf_copy_private_data sh64_elf_copy_private_data |
| 78 |
#define sh_elf_merge_private_data sh64_elf_merge_private_data |
| 79 |
#define sh_elf_set_private_flags sh64_elf_set_private_flags |
| 80 |
/* Typo in elf32-sh.c (and unlinear name). */ |
| 81 |
#define bfd_elf32_bfd_set_private_flags sh64_elf_set_private_flags |
| 82 |
#define sh_elf_set_mach_from_flags sh64_elf_set_mach_from_flags |
| 83 |
|
| 84 |
#define elf_backend_sign_extend_vma 1 |
| 85 |
#define elf_backend_fake_sections sh64_elf_fake_sections |
| 86 |
#define elf_backend_get_symbol_type sh64_elf_get_symbol_type |
| 87 |
#define elf_backend_add_symbol_hook sh64_elf_add_symbol_hook |
| 88 |
#define elf_backend_link_output_symbol_hook \ |
| 89 |
sh64_elf_link_output_symbol_hook |
| 90 |
#define elf_backend_merge_symbol_attribute sh64_elf_merge_symbol_attribute |
| 91 |
#define elf_backend_final_write_processing sh64_elf_final_write_processing |
| 92 |
#define elf_backend_section_from_shdr sh64_backend_section_from_shdr |
| 93 |
#define elf_backend_special_sections sh64_elf_special_sections |
| 94 |
#define elf_backend_section_flags sh64_elf_section_flags |
| 95 |
|
| 96 |
#define bfd_elf32_new_section_hook sh64_elf_new_section_hook |
| 97 |
|
| 98 |
/* For objcopy, we need to set up sh64_elf_section_data (asection *) from |
| 99 |
incoming section flags. This is otherwise done in sh64elf.em when |
| 100 |
linking or tc-sh64.c when assembling. */ |
| 101 |
#define bfd_elf32_bfd_copy_private_section_data \ |
| 102 |
sh64_bfd_elf_copy_private_section_data |
| 103 |
|
| 104 |
/* This COFF-only function (only compiled with COFF support, making |
| 105 |
ELF-only chains problematic) returns TRUE early for SH4, so let's just |
| 106 |
define it TRUE here. */ |
| 107 |
#define _bfd_sh_align_load_span(a,b,c,d,e,f,g,h,i,j) TRUE |
| 108 |
|
| 109 |
#define GOT_BIAS (-((long)-32768)) |
| 110 |
#define INCLUDE_SHMEDIA |
| 111 |
#define SH_TARGET_ALREADY_DEFINED |
| 112 |
#include "elf32-sh.c" |
| 113 |
|
| 114 |
/* Tack some extra info on struct bfd_elf_section_data. */ |
| 115 |
|
| 116 |
static bfd_boolean |
| 117 |
sh64_elf_new_section_hook (bfd *abfd, asection *sec) |
| 118 |
{ |
| 119 |
if (!sec->used_by_bfd) |
| 120 |
{ |
| 121 |
struct _sh64_elf_section_data *sdata; |
| 122 |
bfd_size_type amt = sizeof (*sdata); |
| 123 |
|
| 124 |
sdata = bfd_zalloc (abfd, amt); |
| 125 |
if (sdata == NULL) |
| 126 |
return FALSE; |
| 127 |
sec->used_by_bfd = sdata; |
| 128 |
} |
| 129 |
|
| 130 |
return _bfd_elf_new_section_hook (abfd, sec); |
| 131 |
} |
| 132 |
|
| 133 |
/* Set the SHF_SH5_ISA32 flag for ISA SHmedia code sections, and pass |
| 134 |
through SHT_SH5_CR_SORTED on a sorted .cranges section. */ |
| 135 |
|
| 136 |
bfd_boolean |
| 137 |
sh64_elf_fake_sections (bfd *output_bfd ATTRIBUTE_UNUSED, |
| 138 |
Elf_Internal_Shdr *elf_section_hdr, |
| 139 |
asection *asect) |
| 140 |
{ |
| 141 |
if (sh64_elf_section_data (asect)->sh64_info != NULL) |
| 142 |
elf_section_hdr->sh_flags |
| 143 |
|= sh64_elf_section_data (asect)->sh64_info->contents_flags; |
| 144 |
|
| 145 |
/* If this section has the SEC_SORT_ENTRIES flag set, it is a sorted |
| 146 |
.cranges section passing through objcopy. */ |
| 147 |
if ((bfd_get_section_flags (output_bfd, asect) & SEC_SORT_ENTRIES) != 0 |
| 148 |
&& strcmp (bfd_get_section_name (output_bfd, asect), |
| 149 |
SH64_CRANGES_SECTION_NAME) == 0) |
| 150 |
elf_section_hdr->sh_type = SHT_SH5_CR_SORTED; |
| 151 |
|
| 152 |
return TRUE; |
| 153 |
} |
| 154 |
|
| 155 |
static bfd_boolean |
| 156 |
sh64_elf_set_mach_from_flags (bfd *abfd) |
| 157 |
{ |
| 158 |
flagword flags = elf_elfheader (abfd)->e_flags; |
| 159 |
|
| 160 |
switch (flags & EF_SH_MACH_MASK) |
| 161 |
{ |
| 162 |
case EF_SH5: |
| 163 |
/* These are fit to execute on SH5. Just one but keep the switch |
| 164 |
construct to make additions easy. */ |
| 165 |
bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh5); |
| 166 |
break; |
| 167 |
|
| 168 |
default: |
| 169 |
bfd_set_error (bfd_error_wrong_format); |
| 170 |
return FALSE; |
| 171 |
} |
| 172 |
|
| 173 |
return TRUE; |
| 174 |
} |
| 175 |
|
| 176 |
static bfd_boolean |
| 177 |
sh64_elf_section_flags (flagword *flags, |
| 178 |
const Elf_Internal_Shdr *hdr) |
| 179 |
{ |
| 180 |
if (hdr->bfd_section == NULL) |
| 181 |
return FALSE; |
| 182 |
|
| 183 |
if (strcmp (hdr->bfd_section->name, SH64_CRANGES_SECTION_NAME) == 0) |
| 184 |
*flags |= SEC_DEBUGGING; |
| 185 |
|
| 186 |
return TRUE; |
| 187 |
} |
| 188 |
|
| 189 |
static bfd_boolean |
| 190 |
sh64_elf_copy_private_data (bfd * ibfd, bfd * obfd) |
| 191 |
{ |
| 192 |
if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour |
| 193 |
|| bfd_get_flavour (obfd) != bfd_target_elf_flavour) |
| 194 |
return TRUE; |
| 195 |
|
| 196 |
BFD_ASSERT (!elf_flags_init (obfd) |
| 197 |
|| (elf_elfheader (obfd)->e_flags |
| 198 |
== elf_elfheader (ibfd)->e_flags)); |
| 199 |
|
| 200 |
elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags; |
| 201 |
return TRUE; |
| 202 |
} |
| 203 |
|
| 204 |
static bfd_boolean |
| 205 |
sh64_elf_merge_private_data (bfd *ibfd, bfd *obfd) |
| 206 |
{ |
| 207 |
flagword old_flags, new_flags; |
| 208 |
|
| 209 |
if (! _bfd_generic_verify_endian_match (ibfd, obfd)) |
| 210 |
return FALSE; |
| 211 |
|
| 212 |
if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour |
| 213 |
|| bfd_get_flavour (obfd) != bfd_target_elf_flavour) |
| 214 |
return TRUE; |
| 215 |
|
| 216 |
if (bfd_get_arch_size (ibfd) != bfd_get_arch_size (obfd)) |
| 217 |
{ |
| 218 |
const char *msg; |
| 219 |
|
| 220 |
if (bfd_get_arch_size (ibfd) == 32 |
| 221 |
&& bfd_get_arch_size (obfd) == 64) |
| 222 |
msg = _("%s: compiled as 32-bit object and %s is 64-bit"); |
| 223 |
else if (bfd_get_arch_size (ibfd) == 64 |
| 224 |
&& bfd_get_arch_size (obfd) == 32) |
| 225 |
msg = _("%s: compiled as 64-bit object and %s is 32-bit"); |
| 226 |
else |
| 227 |
msg = _("%s: object size does not match that of target %s"); |
| 228 |
|
| 229 |
(*_bfd_error_handler) (msg, bfd_get_filename (ibfd), |
| 230 |
bfd_get_filename (obfd)); |
| 231 |
bfd_set_error (bfd_error_wrong_format); |
| 232 |
return FALSE; |
| 233 |
} |
| 234 |
|
| 235 |
old_flags = elf_elfheader (obfd)->e_flags; |
| 236 |
new_flags = elf_elfheader (ibfd)->e_flags; |
| 237 |
if (! elf_flags_init (obfd)) |
| 238 |
{ |
| 239 |
/* This happens when ld starts out with a 'blank' output file. */ |
| 240 |
elf_flags_init (obfd) = TRUE; |
| 241 |
elf_elfheader (obfd)->e_flags = old_flags = new_flags; |
| 242 |
} |
| 243 |
/* We don't allow linking in non-SH64 code. */ |
| 244 |
else if ((new_flags & EF_SH_MACH_MASK) != EF_SH5) |
| 245 |
{ |
| 246 |
(*_bfd_error_handler) |
| 247 |
("%s: uses non-SH64 instructions while previous modules use SH64 instructions", |
| 248 |
bfd_get_filename (ibfd)); |
| 249 |
bfd_set_error (bfd_error_bad_value); |
| 250 |
return FALSE; |
| 251 |
} |
| 252 |
|
| 253 |
/* I can't think of anything sane other than old_flags being EF_SH5 and |
| 254 |
that we need to preserve that. */ |
| 255 |
elf_elfheader (obfd)->e_flags = old_flags; |
| 256 |
return sh64_elf_set_mach_from_flags (obfd); |
| 257 |
} |
| 258 |
|
| 259 |
/* Handle a SH64-specific section when reading an object file. This |
| 260 |
is called when bfd_section_from_shdr finds a section with an unknown |
| 261 |
type. |
| 262 |
|
| 263 |
We only recognize SHT_SH5_CR_SORTED, on the .cranges section. */ |
| 264 |
|
| 265 |
bfd_boolean |
| 266 |
sh64_backend_section_from_shdr (bfd *abfd, Elf_Internal_Shdr *hdr, |
| 267 |
const char *name, int shindex) |
| 268 |
{ |
| 269 |
flagword flags = 0; |
| 270 |
|
| 271 |
/* We do like MIPS with a bit switch for recognized types, and returning |
| 272 |
FALSE for a recognized section type with an unexpected name. Right |
| 273 |
now we only have one recognized type, but that might change. */ |
| 274 |
switch (hdr->sh_type) |
| 275 |
{ |
| 276 |
case SHT_SH5_CR_SORTED: |
| 277 |
if (strcmp (name, SH64_CRANGES_SECTION_NAME) != 0) |
| 278 |
return FALSE; |
| 279 |
|
| 280 |
/* We set the SEC_SORT_ENTRIES flag so it can be passed on to |
| 281 |
sh64_elf_fake_sections, keeping SHT_SH5_CR_SORTED if this object |
| 282 |
passes through objcopy. Perhaps it is brittle; the flag can |
| 283 |
suddenly be used by other BFD parts, but it seems not really used |
| 284 |
anywhere at the moment. */ |
| 285 |
flags = SEC_DEBUGGING | SEC_SORT_ENTRIES; |
| 286 |
break; |
| 287 |
|
| 288 |
default: |
| 289 |
return FALSE; |
| 290 |
} |
| 291 |
|
| 292 |
if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex)) |
| 293 |
return FALSE; |
| 294 |
|
| 295 |
if (flags |
| 296 |
&& ! bfd_set_section_flags (abfd, hdr->bfd_section, |
| 297 |
bfd_get_section_flags (abfd, |
| 298 |
hdr->bfd_section) |
| 299 |
| flags)) |
| 300 |
return FALSE; |
| 301 |
|
| 302 |
return TRUE; |
| 303 |
} |
| 304 |
|
| 305 |
/* In contrast to sh64_backend_section_from_shdr, this is called for all |
| 306 |
sections, but only when copying sections, not when linking or |
| 307 |
assembling. We need to set up the sh64_elf_section_data (asection *) |
| 308 |
structure for the SH64 ELF section flags to be copied correctly. */ |
| 309 |
|
| 310 |
bfd_boolean |
| 311 |
sh64_bfd_elf_copy_private_section_data (bfd *ibfd, asection *isec, |
| 312 |
bfd *obfd, asection *osec) |
| 313 |
{ |
| 314 |
struct sh64_section_data *sh64_sec_data; |
| 315 |
|
| 316 |
if (ibfd->xvec->flavour != bfd_target_elf_flavour |
| 317 |
|| obfd->xvec->flavour != bfd_target_elf_flavour) |
| 318 |
return TRUE; |
| 319 |
|
| 320 |
if (! _bfd_elf_copy_private_section_data (ibfd, isec, obfd, osec)) |
| 321 |
return FALSE; |
| 322 |
|
| 323 |
sh64_sec_data = sh64_elf_section_data (isec)->sh64_info; |
| 324 |
if (sh64_sec_data == NULL) |
| 325 |
{ |
| 326 |
sh64_sec_data = bfd_zmalloc (sizeof (struct sh64_section_data)); |
| 327 |
|
| 328 |
if (sh64_sec_data == NULL) |
| 329 |
return FALSE; |
| 330 |
|
| 331 |
sh64_sec_data->contents_flags |
| 332 |
= (elf_section_data (isec)->this_hdr.sh_flags |
| 333 |
& (SHF_SH5_ISA32 | SHF_SH5_ISA32_MIXED)); |
| 334 |
|
| 335 |
sh64_elf_section_data (osec)->sh64_info = sh64_sec_data; |
| 336 |
} |
| 337 |
|
| 338 |
return TRUE; |
| 339 |
} |
| 340 |
|
| 341 |
/* Function to keep SH64 specific file flags. */ |
| 342 |
|
| 343 |
static bfd_boolean |
| 344 |
sh64_elf_set_private_flags (bfd *abfd, flagword flags) |
| 345 |
{ |
| 346 |
BFD_ASSERT (! elf_flags_init (abfd) |
| 347 |
|| elf_elfheader (abfd)->e_flags == flags); |
| 348 |
|
| 349 |
elf_elfheader (abfd)->e_flags = flags; |
| 350 |
elf_flags_init (abfd) = TRUE; |
| 351 |
return sh64_elf_set_mach_from_flags (abfd); |
| 352 |
} |
| 353 |
|
| 354 |
/* Called when writing out an object file to decide the type of a symbol. */ |
| 355 |
|
| 356 |
static int |
| 357 |
sh64_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type) |
| 358 |
{ |
| 359 |
if (ELF_ST_TYPE (elf_sym->st_info) == STT_DATALABEL) |
| 360 |
return STT_DATALABEL; |
| 361 |
|
| 362 |
return type; |
| 363 |
} |
| 364 |
|
| 365 |
/* Hook called by the linker routine which adds symbols from an object |
| 366 |
file. We must make indirect symbols for undefined symbols marked with |
| 367 |
STT_DATALABEL, so relocations passing them will pick up that attribute |
| 368 |
and neutralize STO_SH5_ISA32 found on the symbol definition. |
| 369 |
|
| 370 |
There is a problem, though: We want to fill in the hash-table entry for |
| 371 |
this symbol and signal to the caller that no further processing is |
| 372 |
needed. But we don't have the index for this hash-table entry. We |
| 373 |
rely here on that the current entry is the first hash-entry with NULL, |
| 374 |
which seems brittle. Also, iterating over the hash-table to find that |
| 375 |
entry is a linear operation on the number of symbols in this input |
| 376 |
file, and this function should take constant time, so that's not good |
| 377 |
too. Only comfort is that DataLabel references should only be found in |
| 378 |
hand-written assembly code and thus be rare. FIXME: Talk maintainers |
| 379 |
into adding an option to elf_add_symbol_hook (preferably) for the index |
| 380 |
or the hash entry, alternatively adding the index to Elf_Internal_Sym |
| 381 |
(not so good). */ |
| 382 |
|
| 383 |
static bfd_boolean |
| 384 |
sh64_elf_add_symbol_hook (bfd *abfd, struct bfd_link_info *info, |
| 385 |
Elf_Internal_Sym *sym, const char **namep, |
| 386 |
flagword *flagsp ATTRIBUTE_UNUSED, |
| 387 |
asection **secp, bfd_vma *valp) |
| 388 |
{ |
| 389 |
/* We want to do this for relocatable as well as final linking. */ |
| 390 |
if (ELF_ST_TYPE (sym->st_info) == STT_DATALABEL |
| 391 |
&& is_elf_hash_table (info->hash)) |
| 392 |
{ |
| 393 |
struct elf_link_hash_entry *h; |
| 394 |
|
| 395 |
/* For relocatable links, we register the DataLabel sym in its own |
| 396 |
right, and tweak the name when it's output. Otherwise, we make |
| 397 |
an indirect symbol of it. */ |
| 398 |
flagword flags |
| 399 |
= info->relocatable || info->emitrelocations |
| 400 |
? BSF_GLOBAL : BSF_GLOBAL | BSF_INDIRECT; |
| 401 |
|
| 402 |
char *dl_name |
| 403 |
= bfd_malloc (strlen (*namep) + sizeof (DATALABEL_SUFFIX)); |
| 404 |
struct elf_link_hash_entry ** sym_hash = elf_sym_hashes (abfd); |
| 405 |
|
| 406 |
BFD_ASSERT (sym_hash != NULL); |
| 407 |
|
| 408 |
/* Allocation may fail. */ |
| 409 |
if (dl_name == NULL) |
| 410 |
return FALSE; |
| 411 |
|
| 412 |
strcpy (dl_name, *namep); |
| 413 |
strcat (dl_name, DATALABEL_SUFFIX); |
| 414 |
|
| 415 |
h = (struct elf_link_hash_entry *) |
| 416 |
bfd_link_hash_lookup (info->hash, dl_name, FALSE, FALSE, FALSE); |
| 417 |
|
| 418 |
if (h == NULL) |
| 419 |
{ |
| 420 |
/* No previous datalabel symbol. Make one. */ |
| 421 |
struct bfd_link_hash_entry *bh = NULL; |
| 422 |
const struct elf_backend_data *bed = get_elf_backend_data (abfd); |
| 423 |
|
| 424 |
if (! _bfd_generic_link_add_one_symbol (info, abfd, dl_name, |
| 425 |
flags, *secp, *valp, |
| 426 |
*namep, FALSE, |
| 427 |
bed->collect, &bh)) |
| 428 |
{ |
| 429 |
free (dl_name); |
| 430 |
return FALSE; |
| 431 |
} |
| 432 |
|
| 433 |
h = (struct elf_link_hash_entry *) bh; |
| 434 |
h->non_elf = 0; |
| 435 |
h->type = STT_DATALABEL; |
| 436 |
} |
| 437 |
else |
| 438 |
/* If a new symbol was created, it holds the allocated name. |
| 439 |
Otherwise, we don't need it anymore and should deallocate it. */ |
| 440 |
free (dl_name); |
| 441 |
|
| 442 |
if (h->type != STT_DATALABEL |
| 443 |
|| ((info->relocatable || info->emitrelocations) |
| 444 |
&& h->root.type != bfd_link_hash_undefined) |
| 445 |
|| (! info->relocatable && !info->emitrelocations |
| 446 |
&& h->root.type != bfd_link_hash_indirect)) |
| 447 |
{ |
| 448 |
/* Make sure we don't get confused on invalid input. */ |
| 449 |
(*_bfd_error_handler) |
| 450 |
(_("%s: encountered datalabel symbol in input"), |
| 451 |
bfd_get_filename (abfd)); |
| 452 |
bfd_set_error (bfd_error_bad_value); |
| 453 |
return FALSE; |
| 454 |
} |
| 455 |
|
| 456 |
/* Now find the hash-table slot for this entry and fill it in. */ |
| 457 |
while (*sym_hash != NULL) |
| 458 |
sym_hash++; |
| 459 |
*sym_hash = h; |
| 460 |
|
| 461 |
/* Signal to caller to skip this symbol - we've handled it. */ |
| 462 |
*namep = NULL; |
| 463 |
} |
| 464 |
|
| 465 |
return TRUE; |
| 466 |
} |
| 467 |
|
| 468 |
/* This hook function is called before the linker writes out a global |
| 469 |
symbol. For relocatable links, DataLabel symbols will be present in |
| 470 |
linker output. We cut off the special suffix on those symbols, so the |
| 471 |
right name appears in the output. |
| 472 |
|
| 473 |
When linking and emitting relocations, there can appear global symbols |
| 474 |
that are not referenced by relocs, but rather only implicitly through |
| 475 |
DataLabel references, a relation that is not visible to the linker. |
| 476 |
Since no stripping of global symbols in done when doing such linking, |
| 477 |
we don't need to look up and make sure to emit the main symbol for each |
| 478 |
DataLabel symbol. */ |
| 479 |
|
| 480 |
static int |
| 481 |
sh64_elf_link_output_symbol_hook (struct bfd_link_info *info, |
| 482 |
const char *cname, |
| 483 |
Elf_Internal_Sym *sym, |
| 484 |
asection *input_sec ATTRIBUTE_UNUSED, |
| 485 |
struct elf_link_hash_entry *h ATTRIBUTE_UNUSED) |
| 486 |
{ |
| 487 |
char *name = (char *) cname; |
| 488 |
|
| 489 |
if (info->relocatable || info->emitrelocations) |
| 490 |
{ |
| 491 |
if (ELF_ST_TYPE (sym->st_info) == STT_DATALABEL) |
| 492 |
name[strlen (name) - strlen (DATALABEL_SUFFIX)] = 0; |
| 493 |
} |
| 494 |
|
| 495 |
return 1; |
| 496 |
} |
| 497 |
|
| 498 |
/* Check a SH64-specific reloc and put the value to relocate to into |
| 499 |
RELOCATION, ready to pass to _bfd_final_link_relocate. Return FALSE if |
| 500 |
bad value, TRUE if ok. */ |
| 501 |
|
| 502 |
static bfd_boolean |
| 503 |
shmedia_prepare_reloc (struct bfd_link_info *info, bfd *abfd, |
| 504 |
asection *input_section, bfd_byte *contents, |
| 505 |
const Elf_Internal_Rela *rel, bfd_vma *relocation) |
| 506 |
{ |
| 507 |
bfd_vma disp, dropped; |
| 508 |
|
| 509 |
switch (ELF32_R_TYPE (rel->r_info)) |
| 510 |
{ |
| 511 |
case R_SH_PT_16: |
| 512 |
/* Check the lowest bit of the destination field. If it is 1, we |
| 513 |
check the ISA type of the destination (i.e. the low bit of the |
| 514 |
"relocation" value, and emit an error if the instruction does not |
| 515 |
match). If it is 0, we change a PTA to PTB. There should never |
| 516 |
be a PTB that should change to a PTA; that indicates a toolchain |
| 517 |
error; a mismatch with GAS. */ |
| 518 |
{ |
| 519 |
char *msg = NULL; |
| 520 |
bfd_vma insn = bfd_get_32 (abfd, contents + rel->r_offset); |
| 521 |
|
| 522 |
if (insn & (1 << 10)) |
| 523 |
{ |
| 524 |
/* Check matching insn and ISA (address of target). */ |
| 525 |
if ((insn & SHMEDIA_PTB_BIT) != 0 |
| 526 |
&& ((*relocation + rel->r_addend) & 1) != 0) |
| 527 |
msg = _("PTB mismatch: a SHmedia address (bit 0 == 1)"); |
| 528 |
else if ((insn & SHMEDIA_PTB_BIT) == 0 |
| 529 |
&& ((*relocation + rel->r_addend) & 1) == 0) |
| 530 |
msg = _("PTA mismatch: a SHcompact address (bit 0 == 0)"); |
| 531 |
|
| 532 |
if (msg != NULL |
| 533 |
&& ! ((*info->callbacks->reloc_dangerous) |
| 534 |
(info, msg, abfd, input_section, |
| 535 |
rel->r_offset))) |
| 536 |
return FALSE; |
| 537 |
} |
| 538 |
else |
| 539 |
{ |
| 540 |
/* We shouldn't get here with a PTB insn and a R_SH_PT_16. It |
| 541 |
means GAS output does not match expectations; a PTA or PTB |
| 542 |
expressed as such (or a PT found at assembly to be PTB) |
| 543 |
would match the test above, and PT expansion with an |
| 544 |
unknown destination (or when relaxing) will get us here. */ |
| 545 |
if ((insn & SHMEDIA_PTB_BIT) != 0) |
| 546 |
{ |
| 547 |
(*_bfd_error_handler) |
| 548 |
(_("%s: GAS error: unexpected PTB insn with R_SH_PT_16"), |
| 549 |
bfd_get_filename (input_section->owner)); |
| 550 |
return FALSE; |
| 551 |
} |
| 552 |
|
| 553 |
/* Change the PTA to a PTB, if destination indicates so. */ |
| 554 |
if (((*relocation + rel->r_addend) & 1) == 0) |
| 555 |
bfd_put_32 (abfd, insn | SHMEDIA_PTB_BIT, |
| 556 |
contents + rel->r_offset); |
| 557 |
} |
| 558 |
} |
| 559 |
|
| 560 |
case R_SH_SHMEDIA_CODE: |
| 561 |
case R_SH_DIR5U: |
| 562 |
case R_SH_DIR6S: |
| 563 |
case R_SH_DIR6U: |
| 564 |
case R_SH_DIR10S: |
| 565 |
case R_SH_DIR10SW: |
| 566 |
case R_SH_DIR10SL: |
| 567 |
case R_SH_DIR10SQ: |
| 568 |
case R_SH_IMMS16: |
| 569 |
case R_SH_IMMU16: |
| 570 |
case R_SH_IMM_LOW16: |
| 571 |
case R_SH_IMM_LOW16_PCREL: |
| 572 |
case R_SH_IMM_MEDLOW16: |
| 573 |
case R_SH_IMM_MEDLOW16_PCREL: |
| 574 |
case R_SH_IMM_MEDHI16: |
| 575 |
case R_SH_IMM_MEDHI16_PCREL: |
| 576 |
case R_SH_IMM_HI16: |
| 577 |
case R_SH_IMM_HI16_PCREL: |
| 578 |
case R_SH_64: |
| 579 |
case R_SH_64_PCREL: |
| 580 |
break; |
| 581 |
|
| 582 |
default: |
| 583 |
return FALSE; |
| 584 |
} |
| 585 |
|
| 586 |
disp = (*relocation & 0xf); |
| 587 |
dropped = 0; |
| 588 |
switch (ELF32_R_TYPE (rel->r_info)) |
| 589 |
{ |
| 590 |
case R_SH_DIR10SW: dropped = disp & 1; break; |
| 591 |
case R_SH_DIR10SL: dropped = disp & 3; break; |
| 592 |
case R_SH_DIR10SQ: dropped = disp & 7; break; |
| 593 |
} |
| 594 |
if (dropped != 0) |
| 595 |
{ |
| 596 |
(*_bfd_error_handler) |
| 597 |
(_("%B: error: unaligned relocation type %d at %08x reloc %p\n"), |
| 598 |
input_section->owner, ELF32_R_TYPE (rel->r_info), |
| 599 |
(unsigned) rel->r_offset, relocation); |
| 600 |
return FALSE; |
| 601 |
} |
| 602 |
|
| 603 |
return TRUE; |
| 604 |
} |
| 605 |
|
| 606 |
/* Helper function to locate the section holding a certain address. This |
| 607 |
is called via bfd_map_over_sections. */ |
| 608 |
|
| 609 |
static void |
| 610 |
sh64_find_section_for_address (bfd *abfd ATTRIBUTE_UNUSED, |
| 611 |
asection *section, void *data) |
| 612 |
{ |
| 613 |
bfd_vma vma; |
| 614 |
bfd_size_type size; |
| 615 |
|
| 616 |
struct sh64_find_section_vma_data *fsec_datap |
| 617 |
= (struct sh64_find_section_vma_data *) data; |
| 618 |
|
| 619 |
/* Return if already found. */ |
| 620 |
if (fsec_datap->section) |
| 621 |
return; |
| 622 |
|
| 623 |
/* If this section isn't part of the addressable contents, skip it. */ |
| 624 |
if ((bfd_get_section_flags (abfd, section) & SEC_ALLOC) == 0) |
| 625 |
return; |
| 626 |
|
| 627 |
vma = bfd_get_section_vma (abfd, section); |
| 628 |
if (fsec_datap->addr < vma) |
| 629 |
return; |
| 630 |
|
| 631 |
size = section->size; |
| 632 |
if (fsec_datap->addr >= vma + size) |
| 633 |
return; |
| 634 |
|
| 635 |
fsec_datap->section = section; |
| 636 |
} |
| 637 |
|
| 638 |
/* Make sure to write out the generated entries in the .cranges section |
| 639 |
when doing partial linking, and set bit 0 on the entry address if it |
| 640 |
points to SHmedia code and write sorted .cranges entries when writing |
| 641 |
executables (final linking and objcopy). */ |
| 642 |
|
| 643 |
static void |
| 644 |
sh64_elf_final_write_processing (bfd *abfd, |
| 645 |
bfd_boolean linker ATTRIBUTE_UNUSED) |
| 646 |
{ |
| 647 |
bfd_vma ld_generated_cranges_size; |
| 648 |
asection *cranges |
| 649 |
= bfd_get_section_by_name (abfd, SH64_CRANGES_SECTION_NAME); |
| 650 |
|
| 651 |
/* If no new .cranges were added, the generic ELF linker parts will |
| 652 |
write it all out. If not, we need to write them out when doing |
| 653 |
partial linking. For a final link, we will sort them and write them |
| 654 |
all out further below. */ |
| 655 |
if (linker |
| 656 |
&& cranges != NULL |
| 657 |
&& elf_elfheader (abfd)->e_type != ET_EXEC |
| 658 |
&& (ld_generated_cranges_size |
| 659 |
= sh64_elf_section_data (cranges)->sh64_info->cranges_growth) != 0) |
| 660 |
{ |
| 661 |
bfd_vma incoming_cranges_size |
| 662 |
= cranges->size - ld_generated_cranges_size; |
| 663 |
|
| 664 |
if (! bfd_set_section_contents (abfd, cranges, |
| 665 |
cranges->contents |
| 666 |
+ incoming_cranges_size, |
| 667 |
cranges->output_offset |
| 668 |
+ incoming_cranges_size, |
| 669 |
ld_generated_cranges_size)) |
| 670 |
{ |
| 671 |
bfd_set_error (bfd_error_file_truncated); |
| 672 |
(*_bfd_error_handler) |
| 673 |
(_("%s: could not write out added .cranges entries"), |
| 674 |
bfd_get_filename (abfd)); |
| 675 |
} |
| 676 |
} |
| 677 |
|
| 678 |
/* Only set entry address bit 0 and sort .cranges when linking to an |
| 679 |
executable; never with objcopy or strip. */ |
| 680 |
if (linker && elf_elfheader (abfd)->e_type == ET_EXEC) |
| 681 |
{ |
| 682 |
struct sh64_find_section_vma_data fsec_data; |
| 683 |
sh64_elf_crange dummy; |
| 684 |
|
| 685 |
/* For a final link, set the low bit of the entry address to |
| 686 |
reflect whether or not it is a SHmedia address. |
| 687 |
FIXME: Perhaps we shouldn't do this if the entry address was |
| 688 |
supplied numerically, but we currently lack the infrastructure to |
| 689 |
recognize that: The entry symbol, and info whether it is numeric |
| 690 |
or a symbol name is kept private in the linker. */ |
| 691 |
fsec_data.addr = elf_elfheader (abfd)->e_entry; |
| 692 |
fsec_data.section = NULL; |
| 693 |
|
| 694 |
bfd_map_over_sections (abfd, sh64_find_section_for_address, |
| 695 |
&fsec_data); |
| 696 |
if (fsec_data.section |
| 697 |
&& (sh64_get_contents_type (fsec_data.section, |
| 698 |
elf_elfheader (abfd)->e_entry, |
| 699 |
&dummy) == CRT_SH5_ISA32)) |
| 700 |
elf_elfheader (abfd)->e_entry |= 1; |
| 701 |
|
| 702 |
/* If we have a .cranges section, sort the entries. */ |
| 703 |
if (cranges != NULL) |
| 704 |
{ |
| 705 |
bfd_size_type cranges_size = cranges->size; |
| 706 |
|
| 707 |
/* We know we always have these in memory at this time. */ |
| 708 |
BFD_ASSERT (cranges->contents != NULL); |
| 709 |
|
| 710 |
/* The .cranges may already have been sorted in the process of |
| 711 |
finding out the ISA-type of the entry address. If not, we do |
| 712 |
it here. */ |
| 713 |
if (elf_section_data (cranges)->this_hdr.sh_type |
| 714 |
!= SHT_SH5_CR_SORTED) |
| 715 |
{ |
| 716 |
qsort (cranges->contents, cranges_size / SH64_CRANGE_SIZE, |
| 717 |
SH64_CRANGE_SIZE, |
| 718 |
bfd_big_endian (cranges->owner) |
| 719 |
? _bfd_sh64_crange_qsort_cmpb |
| 720 |
: _bfd_sh64_crange_qsort_cmpl); |
| 721 |
elf_section_data (cranges)->this_hdr.sh_type |
| 722 |
= SHT_SH5_CR_SORTED; |
| 723 |
} |
| 724 |
|
| 725 |
/* We need to write it out in whole as sorted. */ |
| 726 |
if (! bfd_set_section_contents (abfd, cranges, |
| 727 |
cranges->contents, |
| 728 |
cranges->output_offset, |
| 729 |
cranges_size)) |
| 730 |
{ |
| 731 |
bfd_set_error (bfd_error_file_truncated); |
| 732 |
(*_bfd_error_handler) |
| 733 |
(_("%s: could not write out sorted .cranges entries"), |
| 734 |
bfd_get_filename (abfd)); |
| 735 |
} |
| 736 |
} |
| 737 |
} |
| 738 |
} |
| 739 |
|
| 740 |
/* Merge non visibility st_other attribute when the symbol comes from |
| 741 |
a dynamic object. */ |
| 742 |
static void |
| 743 |
sh64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h, |
| 744 |
const Elf_Internal_Sym *isym, |
| 745 |
bfd_boolean definition, |
| 746 |
bfd_boolean dynamic ATTRIBUTE_UNUSED) |
| 747 |
{ |
| 748 |
if ((isym->st_other & ~ELF_ST_VISIBILITY (-1)) != 0) |
| 749 |
{ |
| 750 |
unsigned char other; |
| 751 |
|
| 752 |
/* Take the balance of OTHER from the definition. */ |
| 753 |
other = (definition ? isym->st_other : h->other); |
| 754 |
other &= ~ ELF_ST_VISIBILITY (-1); |
| 755 |
h->other = other | ELF_ST_VISIBILITY (h->other); |
| 756 |
} |
| 757 |
|
| 758 |
return; |
| 759 |
} |
| 760 |
|
| 761 |
static const struct bfd_elf_special_section sh64_elf_special_sections[] = |
| 762 |
{ |
| 763 |
{ STRING_COMMA_LEN (".cranges"), 0, SHT_PROGBITS, 0 }, |
| 764 |
{ NULL, 0, 0, 0, 0 } |
| 765 |
}; |
| 766 |
|
| 767 |
#undef TARGET_BIG_SYM |
| 768 |
#define TARGET_BIG_SYM bfd_elf32_sh64_vec |
| 769 |
#undef TARGET_BIG_NAME |
| 770 |
#define TARGET_BIG_NAME "elf32-sh64" |
| 771 |
#undef TARGET_LITTLE_SYM |
| 772 |
#define TARGET_LITTLE_SYM bfd_elf32_sh64l_vec |
| 773 |
#undef TARGET_LITTLE_NAME |
| 774 |
#define TARGET_LITTLE_NAME "elf32-sh64l" |
| 775 |
|
| 776 |
#include "elf32-target.h" |
| 777 |
|
| 778 |
/* NetBSD support. */ |
| 779 |
#undef TARGET_BIG_SYM |
| 780 |
#define TARGET_BIG_SYM bfd_elf32_sh64nbsd_vec |
| 781 |
#undef TARGET_BIG_NAME |
| 782 |
#define TARGET_BIG_NAME "elf32-sh64-nbsd" |
| 783 |
#undef TARGET_LITTLE_SYM |
| 784 |
#define TARGET_LITTLE_SYM bfd_elf32_sh64lnbsd_vec |
| 785 |
#undef TARGET_LITTLE_NAME |
| 786 |
#define TARGET_LITTLE_NAME "elf32-sh64l-nbsd" |
| 787 |
#undef ELF_MAXPAGESIZE |
| 788 |
#define ELF_MAXPAGESIZE 0x10000 |
| 789 |
#undef ELF_COMMONPAGESIZE |
| 790 |
#undef elf_symbol_leading_char |
| 791 |
#define elf_symbol_leading_char 0 |
| 792 |
#undef elf32_bed |
| 793 |
#define elf32_bed elf32_sh64_nbsd_bed |
| 794 |
|
| 795 |
#include "elf32-target.h" |
| 796 |
|
| 797 |
/* Linux support. */ |
| 798 |
#undef TARGET_BIG_SYM |
| 799 |
#define TARGET_BIG_SYM bfd_elf32_sh64blin_vec |
| 800 |
#undef TARGET_BIG_NAME |
| 801 |
#define TARGET_BIG_NAME "elf32-sh64big-linux" |
| 802 |
#undef TARGET_LITTLE_SYM |
| 803 |
#define TARGET_LITTLE_SYM bfd_elf32_sh64lin_vec |
| 804 |
#undef TARGET_LITTLE_NAME |
| 805 |
#define TARGET_LITTLE_NAME "elf32-sh64-linux" |
| 806 |
#undef elf32_bed |
| 807 |
#define elf32_bed elf32_sh64_lin_bed |
| 808 |
#undef ELF_COMMONPAGESIZE |
| 809 |
#define ELF_COMMONPAGESIZE 0x1000 |
| 810 |
|
| 811 |
#include "elf32-target.h" |
| 812 |
|