46e993b970
* elf32-sh.c (sh_elf_relocate_section): Handle R_SH_IMM_*_PCREL relocations. (sh_elf_check_relocs): Likewise. * elf32-sh64.c (elf_backend_merge_symbol_attribute): Define. (sh64_elf_merge_symbol_attribute): New. * elf64-sh64.c (elf_backend_merge_symbol_attribute): Define. (sh64_elf64_merge_symbol_attribute): New. [ld/testsuite] * ld-sh/sh64/rd-sh64.exp: If the test matches *-dso.d, copy the output of linker to the file tmpdir/*-dso.so. * ld-sh/sh64/stobin-0-dso.d: New. * ld-sh/sh64/stobin-1.d: New. * ld-sh/sh64/stobin.s: New. * ld-sh/sh64/stolib.s: New.
809 lines
26 KiB
C
809 lines
26 KiB
C
/* SuperH SH64-specific support for 32-bit ELF
|
|
Copyright 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
|
|
|
|
This file is part of BFD, the Binary File Descriptor library.
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
|
|
|
|
#define SH64_ELF
|
|
|
|
#include "bfd.h"
|
|
#include "sysdep.h"
|
|
#include "elf-bfd.h"
|
|
#include "../opcodes/sh64-opc.h"
|
|
#include "elf32-sh64.h"
|
|
|
|
/* Add a suffix for datalabel indirection symbols. It must not match any
|
|
other symbols; user symbols with or without version or other
|
|
decoration. It must only be used internally and not emitted by any
|
|
means. */
|
|
#define DATALABEL_SUFFIX " DL"
|
|
|
|
/* Used to hold data for function called through bfd_map_over_sections. */
|
|
struct sh64_find_section_vma_data
|
|
{
|
|
asection *section;
|
|
bfd_vma addr;
|
|
};
|
|
|
|
static bfd_boolean sh64_elf_new_section_hook
|
|
(bfd *, asection *);
|
|
static bfd_boolean sh64_elf_copy_private_data
|
|
(bfd *, bfd *);
|
|
static bfd_boolean sh64_elf_merge_private_data
|
|
(bfd *, bfd *);
|
|
static bfd_boolean sh64_elf_fake_sections
|
|
(bfd *, Elf_Internal_Shdr *, asection *);
|
|
static bfd_boolean sh64_elf_set_private_flags
|
|
(bfd *, flagword);
|
|
static bfd_boolean sh64_elf_set_mach_from_flags
|
|
(bfd *);
|
|
static bfd_boolean shmedia_prepare_reloc
|
|
(struct bfd_link_info *, bfd *, asection *, bfd_byte *,
|
|
const Elf_Internal_Rela *, bfd_vma *);
|
|
static int sh64_elf_get_symbol_type
|
|
(Elf_Internal_Sym *, int);
|
|
static bfd_boolean sh64_elf_add_symbol_hook
|
|
(bfd *, struct bfd_link_info *, const Elf_Internal_Sym *, const char **,
|
|
flagword *, asection **, bfd_vma *);
|
|
static bfd_boolean sh64_elf_link_output_symbol_hook
|
|
(bfd *, struct bfd_link_info *, const char *, Elf_Internal_Sym *,
|
|
asection *);
|
|
static bfd_boolean sh64_backend_section_from_shdr
|
|
(bfd *, Elf_Internal_Shdr *, const char *);
|
|
static void sh64_elf_final_write_processing
|
|
(bfd *, bfd_boolean);
|
|
static bfd_boolean sh64_bfd_elf_copy_private_section_data
|
|
(bfd *, asection *, bfd *, asection *);
|
|
static void sh64_find_section_for_address
|
|
(bfd *, asection *, void *);
|
|
|
|
/* Let elf32-sh.c handle the "bfd_" definitions, so we only have to
|
|
intrude with an #ifndef around the function definition. */
|
|
#define sh_elf_copy_private_data sh64_elf_copy_private_data
|
|
#define sh_elf_merge_private_data sh64_elf_merge_private_data
|
|
#define sh_elf_set_private_flags sh64_elf_set_private_flags
|
|
/* Typo in elf32-sh.c (and unlinear name). */
|
|
#define bfd_elf32_bfd_set_private_flags sh64_elf_set_private_flags
|
|
#define sh_elf_set_mach_from_flags sh64_elf_set_mach_from_flags
|
|
|
|
#define elf_backend_sign_extend_vma 1
|
|
#define elf_backend_fake_sections sh64_elf_fake_sections
|
|
#define elf_backend_get_symbol_type sh64_elf_get_symbol_type
|
|
#define elf_backend_add_symbol_hook sh64_elf_add_symbol_hook
|
|
#define elf_backend_link_output_symbol_hook \
|
|
sh64_elf_link_output_symbol_hook
|
|
#define elf_backend_merge_symbol_attribute sh64_elf_merge_symbol_attribute
|
|
#define elf_backend_final_write_processing sh64_elf_final_write_processing
|
|
#define elf_backend_section_from_shdr sh64_backend_section_from_shdr
|
|
#define elf_backend_special_sections sh64_elf_special_sections
|
|
|
|
#define bfd_elf32_new_section_hook sh64_elf_new_section_hook
|
|
|
|
/* For objcopy, we need to set up sh64_elf_section_data (asection *) from
|
|
incoming section flags. This is otherwise done in sh64elf.em when
|
|
linking or tc-sh64.c when assembling. */
|
|
#define bfd_elf32_bfd_copy_private_section_data \
|
|
sh64_bfd_elf_copy_private_section_data
|
|
|
|
/* This COFF-only function (only compiled with COFF support, making
|
|
ELF-only chains problematic) returns TRUE early for SH4, so let's just
|
|
define it TRUE here. */
|
|
#define _bfd_sh_align_load_span(a,b,c,d,e,f,g,h,i,j) TRUE
|
|
|
|
#define GOT_BIAS (-((long)-32768))
|
|
#define INCLUDE_SHMEDIA
|
|
#include "elf32-sh.c"
|
|
|
|
/* Tack some extra info on struct bfd_elf_section_data. */
|
|
|
|
static bfd_boolean
|
|
sh64_elf_new_section_hook (bfd *abfd, asection *sec)
|
|
{
|
|
struct _sh64_elf_section_data *sdata;
|
|
bfd_size_type amt = sizeof (*sdata);
|
|
|
|
sdata = (struct _sh64_elf_section_data *) bfd_zalloc (abfd, amt);
|
|
if (sdata == NULL)
|
|
return FALSE;
|
|
sec->used_by_bfd = sdata;
|
|
|
|
return _bfd_elf_new_section_hook (abfd, sec);
|
|
}
|
|
|
|
/* Set the SHF_SH5_ISA32 flag for ISA SHmedia code sections, and pass
|
|
through SHT_SH5_CR_SORTED on a sorted .cranges section. */
|
|
|
|
bfd_boolean
|
|
sh64_elf_fake_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
|
|
Elf_Internal_Shdr *elf_section_hdr,
|
|
asection *asect)
|
|
{
|
|
if (sh64_elf_section_data (asect)->sh64_info != NULL)
|
|
elf_section_hdr->sh_flags
|
|
|= sh64_elf_section_data (asect)->sh64_info->contents_flags;
|
|
|
|
/* If this section has the SEC_SORT_ENTRIES flag set, it is a sorted
|
|
.cranges section passing through objcopy. */
|
|
if ((bfd_get_section_flags (output_bfd, asect) & SEC_SORT_ENTRIES) != 0
|
|
&& strcmp (bfd_get_section_name (output_bfd, asect),
|
|
SH64_CRANGES_SECTION_NAME) == 0)
|
|
elf_section_hdr->sh_type = SHT_SH5_CR_SORTED;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static bfd_boolean
|
|
sh64_elf_set_mach_from_flags (bfd *abfd)
|
|
{
|
|
flagword flags = elf_elfheader (abfd)->e_flags;
|
|
asection *cranges;
|
|
|
|
switch (flags & EF_SH_MACH_MASK)
|
|
{
|
|
case EF_SH5:
|
|
/* These are fit to execute on SH5. Just one but keep the switch
|
|
construct to make additions easy. */
|
|
bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh5);
|
|
break;
|
|
|
|
default:
|
|
bfd_set_error (bfd_error_wrong_format);
|
|
return FALSE;
|
|
}
|
|
|
|
/* We also need to set SEC_DEBUGGING on an incoming .cranges section.
|
|
We could have used elf_backend_section_flags if it had given us the
|
|
section name; the bfd_section member in the header argument is not
|
|
set at the point of the call. FIXME: Find out whether that is by
|
|
undocumented design or a bug. */
|
|
cranges = bfd_get_section_by_name (abfd, SH64_CRANGES_SECTION_NAME);
|
|
if (cranges != NULL
|
|
&& ! bfd_set_section_flags (abfd, cranges,
|
|
bfd_get_section_flags (abfd, cranges)
|
|
| SEC_DEBUGGING))
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static bfd_boolean
|
|
sh64_elf_copy_private_data (bfd * ibfd, bfd * obfd)
|
|
{
|
|
if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
|
|
|| bfd_get_flavour (obfd) != bfd_target_elf_flavour)
|
|
return TRUE;
|
|
|
|
BFD_ASSERT (!elf_flags_init (obfd)
|
|
|| (elf_elfheader (obfd)->e_flags
|
|
== elf_elfheader (ibfd)->e_flags));
|
|
|
|
elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
|
|
return TRUE;
|
|
}
|
|
|
|
static bfd_boolean
|
|
sh64_elf_merge_private_data (bfd *ibfd, bfd *obfd)
|
|
{
|
|
flagword old_flags, new_flags;
|
|
|
|
if (! _bfd_generic_verify_endian_match (ibfd, obfd))
|
|
return FALSE;
|
|
|
|
if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
|
|
|| bfd_get_flavour (obfd) != bfd_target_elf_flavour)
|
|
return TRUE;
|
|
|
|
if (bfd_get_arch_size (ibfd) != bfd_get_arch_size (obfd))
|
|
{
|
|
const char *msg;
|
|
|
|
if (bfd_get_arch_size (ibfd) == 32
|
|
&& bfd_get_arch_size (obfd) == 64)
|
|
msg = _("%s: compiled as 32-bit object and %s is 64-bit");
|
|
else if (bfd_get_arch_size (ibfd) == 64
|
|
&& bfd_get_arch_size (obfd) == 32)
|
|
msg = _("%s: compiled as 64-bit object and %s is 32-bit");
|
|
else
|
|
msg = _("%s: object size does not match that of target %s");
|
|
|
|
(*_bfd_error_handler) (msg, bfd_get_filename (ibfd),
|
|
bfd_get_filename (obfd));
|
|
bfd_set_error (bfd_error_wrong_format);
|
|
return FALSE;
|
|
}
|
|
|
|
old_flags = elf_elfheader (obfd)->e_flags;
|
|
new_flags = elf_elfheader (ibfd)->e_flags;
|
|
if (! elf_flags_init (obfd))
|
|
{
|
|
/* This happens when ld starts out with a 'blank' output file. */
|
|
elf_flags_init (obfd) = TRUE;
|
|
elf_elfheader (obfd)->e_flags = old_flags = new_flags;
|
|
}
|
|
/* We don't allow linking in non-SH64 code. */
|
|
else if ((new_flags & EF_SH_MACH_MASK) != EF_SH5)
|
|
{
|
|
(*_bfd_error_handler)
|
|
("%s: uses non-SH64 instructions while previous modules use SH64 instructions",
|
|
bfd_get_filename (ibfd));
|
|
bfd_set_error (bfd_error_bad_value);
|
|
return FALSE;
|
|
}
|
|
|
|
/* I can't think of anything sane other than old_flags being EF_SH5 and
|
|
that we need to preserve that. */
|
|
elf_elfheader (obfd)->e_flags = old_flags;
|
|
return sh64_elf_set_mach_from_flags (obfd);
|
|
}
|
|
|
|
/* Handle a SH64-specific section when reading an object file. This
|
|
is called when elfcode.h finds a section with an unknown type.
|
|
|
|
We only recognize SHT_SH5_CR_SORTED, on the .cranges section. */
|
|
|
|
bfd_boolean
|
|
sh64_backend_section_from_shdr (bfd *abfd, Elf_Internal_Shdr *hdr,
|
|
const char *name)
|
|
{
|
|
flagword flags = 0;
|
|
|
|
/* We do like MIPS with a bit switch for recognized types, and returning
|
|
FALSE for a recognized section type with an unexpected name. Right
|
|
now we only have one recognized type, but that might change. */
|
|
switch (hdr->sh_type)
|
|
{
|
|
case SHT_SH5_CR_SORTED:
|
|
if (strcmp (name, SH64_CRANGES_SECTION_NAME) != 0)
|
|
return FALSE;
|
|
|
|
/* We set the SEC_SORT_ENTRIES flag so it can be passed on to
|
|
sh64_elf_fake_sections, keeping SHT_SH5_CR_SORTED if this object
|
|
passes through objcopy. Perhaps it is brittle; the flag can
|
|
suddenly be used by other BFD parts, but it seems not really used
|
|
anywhere at the moment. */
|
|
flags = SEC_DEBUGGING | SEC_SORT_ENTRIES;
|
|
break;
|
|
|
|
default:
|
|
return FALSE;
|
|
}
|
|
|
|
if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
|
|
return FALSE;
|
|
|
|
if (flags
|
|
&& ! bfd_set_section_flags (abfd, hdr->bfd_section,
|
|
bfd_get_section_flags (abfd,
|
|
hdr->bfd_section)
|
|
| flags))
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/* In contrast to sh64_backend_section_from_shdr, this is called for all
|
|
sections, but only when copying sections, not when linking or
|
|
assembling. We need to set up the sh64_elf_section_data (asection *)
|
|
structure for the SH64 ELF section flags to be copied correctly. */
|
|
|
|
bfd_boolean
|
|
sh64_bfd_elf_copy_private_section_data (bfd *ibfd, asection *isec,
|
|
bfd *obfd, asection *osec)
|
|
{
|
|
struct sh64_section_data *sh64_sec_data;
|
|
|
|
if (ibfd->xvec->flavour != bfd_target_elf_flavour
|
|
|| obfd->xvec->flavour != bfd_target_elf_flavour)
|
|
return TRUE;
|
|
|
|
if (! _bfd_elf_copy_private_section_data (ibfd, isec, obfd, osec))
|
|
return FALSE;
|
|
|
|
sh64_sec_data = sh64_elf_section_data (isec)->sh64_info;
|
|
if (sh64_sec_data == NULL)
|
|
{
|
|
sh64_sec_data = bfd_zmalloc (sizeof (struct sh64_section_data));
|
|
|
|
if (sh64_sec_data == NULL)
|
|
return FALSE;
|
|
|
|
sh64_sec_data->contents_flags
|
|
= (elf_section_data (isec)->this_hdr.sh_flags
|
|
& (SHF_SH5_ISA32 | SHF_SH5_ISA32_MIXED));
|
|
|
|
sh64_elf_section_data (osec)->sh64_info = sh64_sec_data;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/* Function to keep SH64 specific file flags. */
|
|
|
|
static bfd_boolean
|
|
sh64_elf_set_private_flags (bfd *abfd, flagword flags)
|
|
{
|
|
BFD_ASSERT (! elf_flags_init (abfd)
|
|
|| elf_elfheader (abfd)->e_flags == flags);
|
|
|
|
elf_elfheader (abfd)->e_flags = flags;
|
|
elf_flags_init (abfd) = TRUE;
|
|
return sh64_elf_set_mach_from_flags (abfd);
|
|
}
|
|
|
|
/* Called when writing out an object file to decide the type of a symbol. */
|
|
|
|
static int
|
|
sh64_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
|
|
{
|
|
if (ELF_ST_TYPE (elf_sym->st_info) == STT_DATALABEL)
|
|
return STT_DATALABEL;
|
|
|
|
return type;
|
|
}
|
|
|
|
/* Hook called by the linker routine which adds symbols from an object
|
|
file. We must make indirect symbols for undefined symbols marked with
|
|
STT_DATALABEL, so relocations passing them will pick up that attribute
|
|
and neutralize STO_SH5_ISA32 found on the symbol definition.
|
|
|
|
There is a problem, though: We want to fill in the hash-table entry for
|
|
this symbol and signal to the caller that no further processing is
|
|
needed. But we don't have the index for this hash-table entry. We
|
|
rely here on that the current entry is the first hash-entry with NULL,
|
|
which seems brittle. Also, iterating over the hash-table to find that
|
|
entry is a linear operation on the number of symbols in this input
|
|
file, and this function should take constant time, so that's not good
|
|
too. Only comfort is that DataLabel references should only be found in
|
|
hand-written assembly code and thus be rare. FIXME: Talk maintainers
|
|
into adding an option to elf_add_symbol_hook (preferably) for the index
|
|
or the hash entry, alternatively adding the index to Elf_Internal_Sym
|
|
(not so good). */
|
|
|
|
static bfd_boolean
|
|
sh64_elf_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
|
|
const Elf_Internal_Sym *sym, const char **namep,
|
|
flagword *flagsp ATTRIBUTE_UNUSED,
|
|
asection **secp, bfd_vma *valp)
|
|
{
|
|
/* We want to do this for relocatable as well as final linking. */
|
|
if (ELF_ST_TYPE (sym->st_info) == STT_DATALABEL
|
|
&& info->hash->creator->flavour == bfd_target_elf_flavour)
|
|
{
|
|
struct elf_link_hash_entry *h;
|
|
|
|
/* For relocatable links, we register the DataLabel sym in its own
|
|
right, and tweak the name when it's output. Otherwise, we make
|
|
an indirect symbol of it. */
|
|
flagword flags
|
|
= info->relocatable || info->emitrelocations
|
|
? BSF_GLOBAL : BSF_GLOBAL | BSF_INDIRECT;
|
|
|
|
char *dl_name
|
|
= bfd_malloc (strlen (*namep) + sizeof (DATALABEL_SUFFIX));
|
|
struct elf_link_hash_entry ** sym_hash = elf_sym_hashes (abfd);
|
|
|
|
BFD_ASSERT (sym_hash != NULL);
|
|
|
|
/* Allocation may fail. */
|
|
if (dl_name == NULL)
|
|
return FALSE;
|
|
|
|
strcpy (dl_name, *namep);
|
|
strcat (dl_name, DATALABEL_SUFFIX);
|
|
|
|
h = (struct elf_link_hash_entry *)
|
|
bfd_link_hash_lookup (info->hash, dl_name, FALSE, FALSE, FALSE);
|
|
|
|
if (h == NULL)
|
|
{
|
|
/* No previous datalabel symbol. Make one. */
|
|
struct bfd_link_hash_entry *bh = NULL;
|
|
const struct elf_backend_data *bed = get_elf_backend_data (abfd);
|
|
|
|
if (! _bfd_generic_link_add_one_symbol (info, abfd, dl_name,
|
|
flags, *secp, *valp,
|
|
*namep, FALSE,
|
|
bed->collect, &bh))
|
|
{
|
|
free (dl_name);
|
|
return FALSE;
|
|
}
|
|
|
|
h = (struct elf_link_hash_entry *) bh;
|
|
h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
|
|
h->type = STT_DATALABEL;
|
|
}
|
|
else
|
|
/* If a new symbol was created, it holds the allocated name.
|
|
Otherwise, we don't need it anymore and should deallocate it. */
|
|
free (dl_name);
|
|
|
|
if (h->type != STT_DATALABEL
|
|
|| ((info->relocatable || info->emitrelocations)
|
|
&& h->root.type != bfd_link_hash_undefined)
|
|
|| (! info->relocatable && !info->emitrelocations
|
|
&& h->root.type != bfd_link_hash_indirect))
|
|
{
|
|
/* Make sure we don't get confused on invalid input. */
|
|
(*_bfd_error_handler)
|
|
(_("%s: encountered datalabel symbol in input"),
|
|
bfd_get_filename (abfd));
|
|
bfd_set_error (bfd_error_bad_value);
|
|
return FALSE;
|
|
}
|
|
|
|
/* Now find the hash-table slot for this entry and fill it in. */
|
|
while (*sym_hash != NULL)
|
|
sym_hash++;
|
|
*sym_hash = h;
|
|
|
|
/* Signal to caller to skip this symbol - we've handled it. */
|
|
*namep = NULL;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/* This hook function is called before the linker writes out a global
|
|
symbol. For relocatable links, DataLabel symbols will be present in
|
|
linker output. We cut off the special suffix on those symbols, so the
|
|
right name appears in the output.
|
|
|
|
When linking and emitting relocations, there can appear global symbols
|
|
that are not referenced by relocs, but rather only implicitly through
|
|
DataLabel references, a relation that is not visible to the linker.
|
|
Since no stripping of global symbols in done when doing such linking,
|
|
we don't need to look up and make sure to emit the main symbol for each
|
|
DataLabel symbol. */
|
|
|
|
bfd_boolean
|
|
sh64_elf_link_output_symbol_hook (bfd *abfd ATTRIBUTE_UNUSED,
|
|
struct bfd_link_info *info,
|
|
const char *cname,
|
|
Elf_Internal_Sym *sym,
|
|
asection *input_sec ATTRIBUTE_UNUSED)
|
|
{
|
|
char *name = (char *) cname;
|
|
|
|
if (info->relocatable || info->emitrelocations)
|
|
{
|
|
if (ELF_ST_TYPE (sym->st_info) == STT_DATALABEL)
|
|
name[strlen (name) - strlen (DATALABEL_SUFFIX)] = 0;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/* Check a SH64-specific reloc and put the value to relocate to into
|
|
RELOCATION, ready to pass to _bfd_final_link_relocate. Return FALSE if
|
|
bad value, TRUE if ok. */
|
|
|
|
static bfd_boolean
|
|
shmedia_prepare_reloc (struct bfd_link_info *info, bfd *abfd,
|
|
asection *input_section, bfd_byte *contents,
|
|
const Elf_Internal_Rela *rel, bfd_vma *relocation)
|
|
{
|
|
bfd_vma disp, dropped;
|
|
|
|
switch (ELF32_R_TYPE (rel->r_info))
|
|
{
|
|
case R_SH_PT_16:
|
|
/* Check the lowest bit of the destination field. If it is 1, we
|
|
check the ISA type of the destination (i.e. the low bit of the
|
|
"relocation" value, and emit an error if the instruction does not
|
|
match). If it is 0, we change a PTA to PTB. There should never
|
|
be a PTB that should change to a PTA; that indicates a toolchain
|
|
error; a mismatch with GAS. */
|
|
{
|
|
char *msg = NULL;
|
|
bfd_vma insn = bfd_get_32 (abfd, contents + rel->r_offset);
|
|
|
|
if (insn & (1 << 10))
|
|
{
|
|
/* Check matching insn and ISA (address of target). */
|
|
if ((insn & SHMEDIA_PTB_BIT) != 0
|
|
&& ((*relocation + rel->r_addend) & 1) != 0)
|
|
msg = _("PTB mismatch: a SHmedia address (bit 0 == 1)");
|
|
else if ((insn & SHMEDIA_PTB_BIT) == 0
|
|
&& ((*relocation + rel->r_addend) & 1) == 0)
|
|
msg = _("PTA mismatch: a SHcompact address (bit 0 == 0)");
|
|
|
|
if (msg != NULL
|
|
&& ! ((*info->callbacks->reloc_dangerous)
|
|
(info, msg, abfd, input_section,
|
|
rel->r_offset)))
|
|
return FALSE;
|
|
}
|
|
else
|
|
{
|
|
/* We shouldn't get here with a PTB insn and a R_SH_PT_16. It
|
|
means GAS output does not match expectations; a PTA or PTB
|
|
expressed as such (or a PT found at assembly to be PTB)
|
|
would match the test above, and PT expansion with an
|
|
unknown destination (or when relaxing) will get us here. */
|
|
if ((insn & SHMEDIA_PTB_BIT) != 0)
|
|
{
|
|
(*_bfd_error_handler)
|
|
(_("%s: GAS error: unexpected PTB insn with R_SH_PT_16"),
|
|
bfd_get_filename (input_section->owner));
|
|
return FALSE;
|
|
}
|
|
|
|
/* Change the PTA to a PTB, if destination indicates so. */
|
|
if (((*relocation + rel->r_addend) & 1) == 0)
|
|
bfd_put_32 (abfd, insn | SHMEDIA_PTB_BIT,
|
|
contents + rel->r_offset);
|
|
}
|
|
}
|
|
|
|
case R_SH_SHMEDIA_CODE:
|
|
case R_SH_DIR5U:
|
|
case R_SH_DIR6S:
|
|
case R_SH_DIR6U:
|
|
case R_SH_DIR10S:
|
|
case R_SH_DIR10SW:
|
|
case R_SH_DIR10SL:
|
|
case R_SH_DIR10SQ:
|
|
case R_SH_IMMS16:
|
|
case R_SH_IMMU16:
|
|
case R_SH_IMM_LOW16:
|
|
case R_SH_IMM_LOW16_PCREL:
|
|
case R_SH_IMM_MEDLOW16:
|
|
case R_SH_IMM_MEDLOW16_PCREL:
|
|
case R_SH_IMM_MEDHI16:
|
|
case R_SH_IMM_MEDHI16_PCREL:
|
|
case R_SH_IMM_HI16:
|
|
case R_SH_IMM_HI16_PCREL:
|
|
case R_SH_64:
|
|
case R_SH_64_PCREL:
|
|
break;
|
|
|
|
default:
|
|
return FALSE;
|
|
}
|
|
|
|
disp = (*relocation & 0xf);
|
|
dropped = 0;
|
|
switch (ELF32_R_TYPE (rel->r_info))
|
|
{
|
|
case R_SH_DIR10SW: dropped = disp & 1; break;
|
|
case R_SH_DIR10SL: dropped = disp & 3; break;
|
|
case R_SH_DIR10SQ: dropped = disp & 7; break;
|
|
}
|
|
if (dropped != 0)
|
|
{
|
|
(*_bfd_error_handler)
|
|
(_("%s: error: unaligned relocation type %d at %08x reloc %08x\n"),
|
|
bfd_get_filename (input_section->owner), ELF32_R_TYPE (rel->r_info),
|
|
(unsigned)rel->r_offset, (unsigned)relocation);
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/* Helper function to locate the section holding a certain address. This
|
|
is called via bfd_map_over_sections. */
|
|
|
|
static void
|
|
sh64_find_section_for_address (bfd *abfd ATTRIBUTE_UNUSED,
|
|
asection *section, void *data)
|
|
{
|
|
bfd_vma vma;
|
|
bfd_size_type size;
|
|
struct sh64_find_section_vma_data *fsec_datap
|
|
= (struct sh64_find_section_vma_data *) data;
|
|
|
|
/* Return if already found. */
|
|
if (fsec_datap->section)
|
|
return;
|
|
|
|
/* If this section isn't part of the addressable contents, skip it. */
|
|
if ((bfd_get_section_flags (abfd, section) & SEC_ALLOC) == 0)
|
|
return;
|
|
|
|
vma = bfd_get_section_vma (abfd, section);
|
|
if (fsec_datap->addr < vma)
|
|
return;
|
|
|
|
/* FIXME: section->reloc_done isn't set properly; a generic buglet
|
|
preventing us from using bfd_get_section_size_after_reloc. */
|
|
size
|
|
= section->_cooked_size ? section->_cooked_size : section->_raw_size;
|
|
|
|
if (fsec_datap->addr >= vma + size)
|
|
return;
|
|
|
|
fsec_datap->section = section;
|
|
}
|
|
|
|
/* Make sure to write out the generated entries in the .cranges section
|
|
when doing partial linking, and set bit 0 on the entry address if it
|
|
points to SHmedia code and write sorted .cranges entries when writing
|
|
executables (final linking and objcopy). */
|
|
|
|
static void
|
|
sh64_elf_final_write_processing (bfd *abfd,
|
|
bfd_boolean linker ATTRIBUTE_UNUSED)
|
|
{
|
|
bfd_vma ld_generated_cranges_size;
|
|
asection *cranges
|
|
= bfd_get_section_by_name (abfd, SH64_CRANGES_SECTION_NAME);
|
|
|
|
/* If no new .cranges were added, the generic ELF linker parts will
|
|
write it all out. If not, we need to write them out when doing
|
|
partial linking. For a final link, we will sort them and write them
|
|
all out further below. */
|
|
if (linker
|
|
&& cranges != NULL
|
|
&& elf_elfheader (abfd)->e_type != ET_EXEC
|
|
&& (ld_generated_cranges_size
|
|
= sh64_elf_section_data (cranges)->sh64_info->cranges_growth) != 0)
|
|
{
|
|
bfd_vma incoming_cranges_size
|
|
= ((cranges->_cooked_size != 0
|
|
? cranges->_cooked_size : cranges->_raw_size)
|
|
- ld_generated_cranges_size);
|
|
|
|
if (! bfd_set_section_contents (abfd, cranges,
|
|
cranges->contents
|
|
+ incoming_cranges_size,
|
|
cranges->output_offset
|
|
+ incoming_cranges_size,
|
|
ld_generated_cranges_size))
|
|
{
|
|
bfd_set_error (bfd_error_file_truncated);
|
|
(*_bfd_error_handler)
|
|
(_("%s: could not write out added .cranges entries"),
|
|
bfd_get_filename (abfd));
|
|
}
|
|
}
|
|
|
|
/* Only set entry address bit 0 and sort .cranges when linking to an
|
|
executable; never with objcopy or strip. */
|
|
if (linker && elf_elfheader (abfd)->e_type == ET_EXEC)
|
|
{
|
|
struct sh64_find_section_vma_data fsec_data;
|
|
sh64_elf_crange dummy;
|
|
|
|
/* For a final link, set the low bit of the entry address to
|
|
reflect whether or not it is a SHmedia address.
|
|
FIXME: Perhaps we shouldn't do this if the entry address was
|
|
supplied numerically, but we currently lack the infrastructure to
|
|
recognize that: The entry symbol, and info whether it is numeric
|
|
or a symbol name is kept private in the linker. */
|
|
fsec_data.addr = elf_elfheader (abfd)->e_entry;
|
|
fsec_data.section = NULL;
|
|
|
|
bfd_map_over_sections (abfd, sh64_find_section_for_address,
|
|
&fsec_data);
|
|
if (fsec_data.section
|
|
&& (sh64_get_contents_type (fsec_data.section,
|
|
elf_elfheader (abfd)->e_entry,
|
|
&dummy) == CRT_SH5_ISA32))
|
|
elf_elfheader (abfd)->e_entry |= 1;
|
|
|
|
/* If we have a .cranges section, sort the entries. */
|
|
if (cranges != NULL)
|
|
{
|
|
bfd_size_type cranges_size
|
|
= (cranges->_cooked_size != 0
|
|
? cranges->_cooked_size : cranges->_raw_size);
|
|
|
|
/* We know we always have these in memory at this time. */
|
|
BFD_ASSERT (cranges->contents != NULL);
|
|
|
|
/* The .cranges may already have been sorted in the process of
|
|
finding out the ISA-type of the entry address. If not, we do
|
|
it here. */
|
|
if (elf_section_data (cranges)->this_hdr.sh_type
|
|
!= SHT_SH5_CR_SORTED)
|
|
{
|
|
qsort (cranges->contents, cranges_size / SH64_CRANGE_SIZE,
|
|
SH64_CRANGE_SIZE,
|
|
bfd_big_endian (cranges->owner)
|
|
? _bfd_sh64_crange_qsort_cmpb
|
|
: _bfd_sh64_crange_qsort_cmpl);
|
|
elf_section_data (cranges)->this_hdr.sh_type
|
|
= SHT_SH5_CR_SORTED;
|
|
}
|
|
|
|
/* We need to write it out in whole as sorted. */
|
|
if (! bfd_set_section_contents (abfd, cranges,
|
|
cranges->contents,
|
|
cranges->output_offset,
|
|
cranges_size))
|
|
{
|
|
bfd_set_error (bfd_error_file_truncated);
|
|
(*_bfd_error_handler)
|
|
(_("%s: could not write out sorted .cranges entries"),
|
|
bfd_get_filename (abfd));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Merge non visibility st_other attribute when the symbol comes from
|
|
a dynamic object. */
|
|
static void
|
|
sh64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
|
|
const Elf_Internal_Sym *isym,
|
|
bfd_boolean definition,
|
|
bfd_boolean dynamic)
|
|
{
|
|
if (isym->st_other != 0 && dynamic)
|
|
{
|
|
unsigned char other;
|
|
|
|
/* Take the balance of OTHER from the definition. */
|
|
other = (definition ? isym->st_other : h->other);
|
|
other &= ~ ELF_ST_VISIBILITY (-1);
|
|
h->other = other | ELF_ST_VISIBILITY (h->other);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
static struct bfd_elf_special_section const sh64_elf_special_sections[]=
|
|
{
|
|
{ ".cranges", 8, 0, SHT_PROGBITS, 0 },
|
|
{ NULL, 0, 0, 0, 0 }
|
|
};
|
|
|
|
#undef TARGET_BIG_SYM
|
|
#define TARGET_BIG_SYM bfd_elf32_sh64_vec
|
|
#undef TARGET_BIG_NAME
|
|
#define TARGET_BIG_NAME "elf32-sh64"
|
|
#undef TARGET_LITTLE_SYM
|
|
#define TARGET_LITTLE_SYM bfd_elf32_sh64l_vec
|
|
#undef TARGET_LITTLE_NAME
|
|
#define TARGET_LITTLE_NAME "elf32-sh64l"
|
|
|
|
#include "elf32-target.h"
|
|
|
|
/* NetBSD support. */
|
|
#undef TARGET_BIG_SYM
|
|
#define TARGET_BIG_SYM bfd_elf32_sh64nbsd_vec
|
|
#undef TARGET_BIG_NAME
|
|
#define TARGET_BIG_NAME "elf32-sh64-nbsd"
|
|
#undef TARGET_LITTLE_SYM
|
|
#define TARGET_LITTLE_SYM bfd_elf32_sh64lnbsd_vec
|
|
#undef TARGET_LITTLE_NAME
|
|
#define TARGET_LITTLE_NAME "elf32-sh64l-nbsd"
|
|
#undef ELF_MAXPAGESIZE
|
|
#define ELF_MAXPAGESIZE 0x10000
|
|
#undef elf_symbol_leading_char
|
|
#define elf_symbol_leading_char 0
|
|
#undef elf32_bed
|
|
#define elf32_bed elf32_sh64_nbsd_bed
|
|
|
|
#include "elf32-target.h"
|
|
|
|
/* Linux support. */
|
|
#undef TARGET_BIG_SYM
|
|
#define TARGET_BIG_SYM bfd_elf32_sh64blin_vec
|
|
#undef TARGET_BIG_NAME
|
|
#define TARGET_BIG_NAME "elf32-sh64big-linux"
|
|
#undef TARGET_LITTLE_SYM
|
|
#define TARGET_LITTLE_SYM bfd_elf32_sh64lin_vec
|
|
#undef TARGET_LITTLE_NAME
|
|
#define TARGET_LITTLE_NAME "elf32-sh64-linux"
|
|
#undef elf32_bed
|
|
#define elf32_bed elf32_sh64_lin_bed
|
|
|
|
#include "elf32-target.h"
|
|
|