blob: 5d7495c7fa56f94df84643d28d6c7b27a3a0f056 [file] [log] [blame]
/* LoongArch-specific support for NN-bit ELF.
Copyright (C) 2021-2024 Free Software Foundation, Inc.
Contributed by Loongson Ltd.
This file is part of BFD, the Binary File Descriptor library.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; see the file COPYING3. If not,
see <http://www.gnu.org/licenses/>. */
#include "ansidecl.h"
#include "sysdep.h"
#include "bfd.h"
#include "libbfd.h"
#define ARCH_SIZE NN
#include "elf-bfd.h"
#include "objalloc.h"
#include "elf/loongarch.h"
#include "elfxx-loongarch.h"
#include "opcode/loongarch.h"
static bool
loongarch_info_to_howto_rela (bfd *abfd, arelent *cache_ptr,
Elf_Internal_Rela *dst)
{
cache_ptr->howto = loongarch_elf_rtype_to_howto (abfd,
ELFNN_R_TYPE (dst->r_info));
return cache_ptr->howto != NULL;
}
/* LoongArch ELF linker hash entry. */
struct loongarch_elf_link_hash_entry
{
struct elf_link_hash_entry elf;
#define GOT_UNKNOWN 0
#define GOT_NORMAL 1
#define GOT_TLS_GD 2
#define GOT_TLS_IE 4
#define GOT_TLS_LE 8
#define GOT_TLS_GDESC 16
#define GOT_TLS_GD_BOTH_P(tls_type) \
((tls_type & GOT_TLS_GD) && (tls_type & GOT_TLS_GDESC))
#define GOT_TLS_GD_ANY_P(tls_type) \
((tls_type & GOT_TLS_GD) || (tls_type & GOT_TLS_GDESC))
char tls_type;
};
#define loongarch_elf_hash_entry(ent) \
((struct loongarch_elf_link_hash_entry *) (ent))
struct _bfd_loongarch_elf_obj_tdata
{
struct elf_obj_tdata root;
/* The tls_type for each local got entry. */
char *local_got_tls_type;
};
#define _bfd_loongarch_elf_tdata(abfd) \
((struct _bfd_loongarch_elf_obj_tdata *) (abfd)->tdata.any)
#define _bfd_loongarch_elf_local_got_tls_type(abfd) \
(_bfd_loongarch_elf_tdata (abfd)->local_got_tls_type)
#define _bfd_loongarch_elf_tls_type(abfd, h, symndx) \
(*((h) != NULL \
? &loongarch_elf_hash_entry (h)->tls_type \
: &_bfd_loongarch_elf_local_got_tls_type (abfd)[symndx]))
#define is_loongarch_elf(bfd) \
(bfd_get_flavour (bfd) == bfd_target_elf_flavour \
&& elf_tdata (bfd) != NULL \
&& elf_object_id (bfd) == LARCH_ELF_DATA)
struct relr_entry
{
asection *sec;
bfd_vma off;
};
struct loongarch_elf_link_hash_table
{
struct elf_link_hash_table elf;
/* Short-cuts to get to dynamic linker sections. */
asection *sdyntdata;
/* Small local sym to section mapping cache. */
struct sym_cache sym_cache;
/* Used by local STT_GNU_IFUNC symbols. */
htab_t loc_hash_table;
void *loc_hash_memory;
/* The max alignment of output sections. */
bfd_vma max_alignment;
/* The data segment phase, don't relax the section
when it is exp_seg_relro_adjust. */
int *data_segment_phase;
/* Array of relative relocs to be emitted in DT_RELR format. */
bfd_size_type relr_alloc;
bfd_size_type relr_count;
struct relr_entry *relr;
/* Sorted output addresses of above relative relocs. */
bfd_vma *relr_sorted;
/* Layout recomputation count. */
bfd_size_type relr_layout_iter;
/* In BFD DT_RELR is implemented as a "relaxation." If in a relax trip
size_relative_relocs is updating the layout, relax_section may see
a partially updated state (some sections have vma updated but the
others do not), and it's unsafe to do the normal relaxation. */
bool layout_mutating_for_relr;
};
struct loongarch_elf_section_data
{
struct bfd_elf_section_data elf;
/* &htab->relr[i] where i is the smallest number s.t.
elf_section_data (htab->relr[i].sec) == &elf.
NULL if there exists no such i. */
struct relr_entry *relr;
};
/* We need an additional field in elf_section_data to handle complex
interactions between DT_RELR and relaxation. */
static bool
loongarch_elf_new_section_hook (bfd *abfd, asection *sec)
{
if (!sec->used_by_bfd)
{
struct loongarch_elf_section_data *sdata;
size_t amt = sizeof (*sdata);
sdata = bfd_zalloc (abfd, amt);
if (!sdata)
return false;
sec->used_by_bfd = sdata;
}
return _bfd_elf_new_section_hook (abfd, sec);
}
#define loongarch_elf_section_data(x) \
((struct loongarch_elf_section_data *) elf_section_data (x))
/* Get the LoongArch ELF linker hash table from a link_info structure. */
#define loongarch_elf_hash_table(p) \
((struct loongarch_elf_link_hash_table *) ((p)->hash)) \
#define MINUS_ONE ((bfd_vma) 0 - 1)
#define sec_addr(sec) ((sec)->output_section->vma + (sec)->output_offset)
#define LARCH_ELF_LOG_WORD_BYTES (ARCH_SIZE == 32 ? 2 : 3)
#define LARCH_ELF_WORD_BYTES (1 << LARCH_ELF_LOG_WORD_BYTES)
#define PLT_HEADER_INSNS 8
#define PLT_HEADER_SIZE (PLT_HEADER_INSNS * 4)
#define PLT_ENTRY_INSNS 4
#define PLT_ENTRY_SIZE (PLT_ENTRY_INSNS * 4)
#define GOT_ENTRY_SIZE (LARCH_ELF_WORD_BYTES)
/* Reserve two entries of GOTPLT for ld.so, one is used for PLT
resolver _dl_runtime_resolve, the other is used for link map. */
#define GOTPLT_HEADER_SIZE (GOT_ENTRY_SIZE * 2)
#define elf_backend_want_got_plt 1
#define elf_backend_plt_readonly 1
#define elf_backend_want_plt_sym 1
#define elf_backend_plt_alignment 4
#define elf_backend_can_gc_sections 1
#define elf_backend_can_refcount 1
#define elf_backend_want_got_sym 1
#define elf_backend_got_header_size (GOT_ENTRY_SIZE * 1)
#define elf_backend_want_dynrelro 1
#define elf_backend_rela_normal 1
#define elf_backend_default_execstack 0
#define IS_LOONGARCH_TLS_TRANS_RELOC(R_TYPE) \
((R_TYPE) == R_LARCH_TLS_DESC_PC_HI20 \
|| (R_TYPE) == R_LARCH_TLS_DESC_PC_LO12 \
|| (R_TYPE) == R_LARCH_TLS_DESC_LD \
|| (R_TYPE) == R_LARCH_TLS_DESC_CALL \
|| (R_TYPE) == R_LARCH_TLS_IE_PC_HI20 \
|| (R_TYPE) == R_LARCH_TLS_IE_PC_LO12)
#define IS_OUTDATED_TLS_LE_RELOC(R_TYPE) \
((R_TYPE) == R_LARCH_TLS_LE_HI20 \
|| (R_TYPE) == R_LARCH_TLS_LE_LO12 \
|| (R_TYPE) == R_LARCH_TLS_LE64_LO20 \
|| (R_TYPE) == R_LARCH_TLS_LE64_HI12)
/* If TLS GD/IE need dynamic relocations, INDX will be the dynamic indx,
and set NEED_RELOC to true used in allocate_dynrelocs and
loongarch_elf_relocate_section for TLS GD/IE. */
#define LARCH_TLS_GD_IE_NEED_DYN_RELOC(INFO, DYN, H, INDX, NEED_RELOC) \
do \
{ \
if ((H) != NULL \
&& (H)->dynindx != -1 \
&& WILL_CALL_FINISH_DYNAMIC_SYMBOL ((DYN), \
bfd_link_pic (INFO), (H))) \
(INDX) = (H)->dynindx; \
if (((H) == NULL \
|| ELF_ST_VISIBILITY ((H)->other) == STV_DEFAULT \
|| (H)->root.type != bfd_link_hash_undefweak) \
&& (!bfd_link_executable (INFO) \
|| (INDX) != 0)) \
(NEED_RELOC) = true; \
} \
while (0)
/* TL;DR always use it in this file instead when you want to type
SYMBOL_REFERENCES_LOCAL.
It's like SYMBOL_REFERENCES_LOCAL, but it returns true for local
protected functions. It happens to be same as SYMBOL_CALLS_LOCAL but
let's not reuse SYMBOL_CALLS_LOCAL or "CALLS" may puzzle people.
We do generate a PLT entry when someone attempts to la.pcrel an external
function. But we never really implemented "R_LARCH_COPY", thus we've
never supported la.pcrel an external symbol unless the loaded address is
only used for locating a function to be called. Thus the PLT entry is
a normal PLT entry, not intended to be a so-called "canonical PLT entry"
on the ports supporting copy relocation. So attempting to la.pcrel an
external function will just break pointer equality, even it's a
STV_DEFAULT function:
$ cat t.c
#include <assert.h>
void check(void *p) {assert(p == check);}
$ cat main.c
extern void check(void *);
int main(void) { check(check); }
$ cc t.c -fPIC -shared -o t.so
$ cc main.c -mdirect-extern-access t.so -Wl,-rpath=. -fpie -pie
$ ./a.out
a.out: t.c:2: check: Assertion `p == check' failed.
Aborted
Thus handling STV_PROTECTED function specially just fixes nothing:
adding -fvisibility=protected compiling t.c will not magically fix
the inequality. The only possible and correct fix is not to use
-mdirect-extern-access.
So we should remove this special handling, because it's only an
unsuccessful workaround for invalid code and it's penalizing valid
code. */
#define LARCH_REF_LOCAL(info, h) \
(_bfd_elf_symbol_refs_local_p ((h), (info), true))
/* Generate a PLT header. */
static bool
loongarch_make_plt_header (bfd_vma got_plt_addr, bfd_vma plt_header_addr,
uint32_t *entry)
{
bfd_vma pcrel = got_plt_addr - plt_header_addr;
bfd_vma hi, lo;
if (pcrel + 0x80000800 > 0xffffffff)
{
_bfd_error_handler (_("%#" PRIx64 " invaild imm"), (uint64_t) pcrel);
bfd_set_error (bfd_error_bad_value);
return false;
}
hi = ((pcrel + 0x800) >> 12) & 0xfffff;
lo = pcrel & 0xfff;
/* pcaddu12i $t2, %hi(%pcrel(.got.plt))
sub.[wd] $t1, $t1, $t3
ld.[wd] $t3, $t2, %lo(%pcrel(.got.plt)) # _dl_runtime_resolve
addi.[wd] $t1, $t1, -(PLT_HEADER_SIZE + 12)
addi.[wd] $t0, $t2, %lo(%pcrel(.got.plt))
srli.[wd] $t1, $t1, log2(16 / GOT_ENTRY_SIZE)
ld.[wd] $t0, $t0, GOT_ENTRY_SIZE
jirl $r0, $t3, 0 */
if (GOT_ENTRY_SIZE == 8)
{
entry[0] = 0x1c00000e | (hi & 0xfffff) << 5;
entry[1] = 0x0011bdad;
entry[2] = 0x28c001cf | (lo & 0xfff) << 10;
entry[3] = 0x02c001ad | ((-(PLT_HEADER_SIZE + 12)) & 0xfff) << 10;
entry[4] = 0x02c001cc | (lo & 0xfff) << 10;
entry[5] = 0x004501ad | (4 - LARCH_ELF_LOG_WORD_BYTES) << 10;
entry[6] = 0x28c0018c | GOT_ENTRY_SIZE << 10;
entry[7] = 0x4c0001e0;
}
else
{
entry[0] = 0x1c00000e | (hi & 0xfffff) << 5;
entry[1] = 0x00113dad;
entry[2] = 0x288001cf | (lo & 0xfff) << 10;
entry[3] = 0x028001ad | ((-(PLT_HEADER_SIZE + 12)) & 0xfff) << 10;
entry[4] = 0x028001cc | (lo & 0xfff) << 10;
entry[5] = 0x004481ad | (4 - LARCH_ELF_LOG_WORD_BYTES) << 10;
entry[6] = 0x2880018c | GOT_ENTRY_SIZE << 10;
entry[7] = 0x4c0001e0;
}
return true;
}
/* Generate a PLT entry. */
static bool
loongarch_make_plt_entry (bfd_vma got_plt_entry_addr, bfd_vma plt_entry_addr,
uint32_t *entry)
{
bfd_vma pcrel = got_plt_entry_addr - plt_entry_addr;
bfd_vma hi, lo;
if (pcrel + 0x80000800 > 0xffffffff)
{
_bfd_error_handler (_("%#" PRIx64 " invaild imm"), (uint64_t) pcrel);
bfd_set_error (bfd_error_bad_value);
return false;
}
hi = ((pcrel + 0x800) >> 12) & 0xfffff;
lo = pcrel & 0xfff;
entry[0] = 0x1c00000f | (hi & 0xfffff) << 5;
entry[1] = ((GOT_ENTRY_SIZE == 8 ? 0x28c001ef : 0x288001ef)
| (lo & 0xfff) << 10);
entry[2] = 0x4c0001ed; /* jirl $r13, $15, 0 */
entry[3] = 0x03400000; /* nop */
return true;
}
/* Create an entry in an LoongArch ELF linker hash table. */
static struct bfd_hash_entry *
link_hash_newfunc (struct bfd_hash_entry *entry, struct bfd_hash_table *table,
const char *string)
{
struct loongarch_elf_link_hash_entry *eh;
/* Allocate the structure if it has not already been allocated by a
subclass. */
if (entry == NULL)
{
entry = bfd_hash_allocate (table, sizeof (*eh));
if (entry == NULL)
return entry;
}
/* Call the allocation method of the superclass. */
entry = _bfd_elf_link_hash_newfunc (entry, table, string);
if (entry != NULL)
{
eh = (struct loongarch_elf_link_hash_entry *) entry;
eh->tls_type = GOT_UNKNOWN;
}
return entry;
}
/* Compute a hash of a local hash entry. We use elf_link_hash_entry
for local symbol so that we can handle local STT_GNU_IFUNC symbols
as global symbol. We reuse indx and dynstr_index for local symbol
hash since they aren't used by global symbols in this backend. */
static hashval_t
elfNN_loongarch_local_htab_hash (const void *ptr)
{
struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) ptr;
return ELF_LOCAL_SYMBOL_HASH (h->indx, h->dynstr_index);
}
/* Compare local hash entries. */
static int
elfNN_loongarch_local_htab_eq (const void *ptr1, const void *ptr2)
{
struct elf_link_hash_entry *h1 = (struct elf_link_hash_entry *) ptr1;
struct elf_link_hash_entry *h2 = (struct elf_link_hash_entry *) ptr2;
return h1->indx == h2->indx && h1->dynstr_index == h2->dynstr_index;
}
/* Find and/or create a hash entry for local symbol. */
static struct elf_link_hash_entry *
elfNN_loongarch_get_local_sym_hash (struct loongarch_elf_link_hash_table *htab,
bfd *abfd, const Elf_Internal_Rela *rel,
bool create)
{
struct loongarch_elf_link_hash_entry e, *ret;
asection *sec = abfd->sections;
hashval_t h = ELF_LOCAL_SYMBOL_HASH (sec->id, ELFNN_R_SYM (rel->r_info));
void **slot;
e.elf.indx = sec->id;
e.elf.dynstr_index = ELFNN_R_SYM (rel->r_info);
slot = htab_find_slot_with_hash (htab->loc_hash_table, &e, h,
create ? INSERT : NO_INSERT);
if (!slot)
return NULL;
if (*slot)
{
ret = (struct loongarch_elf_link_hash_entry *) *slot;
return &ret->elf;
}
ret = ((struct loongarch_elf_link_hash_entry *)
objalloc_alloc ((struct objalloc *) htab->loc_hash_memory,
sizeof (struct loongarch_elf_link_hash_entry)));
if (ret)
{
memset (ret, 0, sizeof (*ret));
ret->elf.indx = sec->id;
ret->elf.pointer_equality_needed = 0;
ret->elf.dynstr_index = ELFNN_R_SYM (rel->r_info);
ret->elf.dynindx = -1;
ret->elf.needs_plt = 0;
ret->elf.plt.refcount = -1;
ret->elf.got.refcount = -1;
ret->elf.def_dynamic = 0;
ret->elf.def_regular = 1;
ret->elf.ref_dynamic = 0; /* This should be always 0 for local. */
ret->elf.ref_regular = 0;
ret->elf.forced_local = 1;
ret->elf.root.type = bfd_link_hash_defined;
*slot = ret;
}
return &ret->elf;
}
/* Destroy an LoongArch elf linker hash table. */
static void
elfNN_loongarch_link_hash_table_free (bfd *obfd)
{
struct loongarch_elf_link_hash_table *ret;
ret = (struct loongarch_elf_link_hash_table *) obfd->link.hash;
if (ret->loc_hash_table)
htab_delete (ret->loc_hash_table);
if (ret->loc_hash_memory)
objalloc_free ((struct objalloc *) ret->loc_hash_memory);
_bfd_elf_link_hash_table_free (obfd);
}
/* Create a LoongArch ELF linker hash table. */
static struct bfd_link_hash_table *
loongarch_elf_link_hash_table_create (bfd *abfd)
{
struct loongarch_elf_link_hash_table *ret;
bfd_size_type amt = sizeof (struct loongarch_elf_link_hash_table);
ret = (struct loongarch_elf_link_hash_table *) bfd_zmalloc (amt);
if (ret == NULL)
return NULL;
if (!_bfd_elf_link_hash_table_init
(&ret->elf, abfd, link_hash_newfunc,
sizeof (struct loongarch_elf_link_hash_entry), LARCH_ELF_DATA))
{
free (ret);
return NULL;
}
ret->max_alignment = MINUS_ONE;
ret->loc_hash_table = htab_try_create (1024, elfNN_loongarch_local_htab_hash,
elfNN_loongarch_local_htab_eq, NULL);
ret->loc_hash_memory = objalloc_create ();
if (!ret->loc_hash_table || !ret->loc_hash_memory)
{
elfNN_loongarch_link_hash_table_free (abfd);
return NULL;
}
ret->elf.root.hash_table_free = elfNN_loongarch_link_hash_table_free;
return &ret->elf.root;
}
/* Merge backend specific data from an object file to the output
object file when linking. */
static bool
elfNN_loongarch_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
{
bfd *obfd = info->output_bfd;
flagword in_flags = elf_elfheader (ibfd)->e_flags;
flagword out_flags = elf_elfheader (obfd)->e_flags;
if (!is_loongarch_elf (ibfd) || !is_loongarch_elf (obfd))
return true;
if (strcmp (bfd_get_target (ibfd), bfd_get_target (obfd)) != 0)
{
_bfd_error_handler (_("%pB: ABI is incompatible with that of "
"the selected emulation:\n"
" target emulation `%s' does not match `%s'"),
ibfd, bfd_get_target (ibfd), bfd_get_target (obfd));
return false;
}
if (!_bfd_elf_merge_object_attributes (ibfd, info))
return false;
/* If the input BFD is not a dynamic object and it does not contain any
non-data sections, do not account its ABI. For example, various
packages produces such data-only relocatable objects with
`ld -r -b binary` or `objcopy`, and these objects have zero e_flags.
But they are compatible with all ABIs. */
if (!(ibfd->flags & DYNAMIC))
{
asection *sec;
bool have_code_sections = false;
for (sec = ibfd->sections; sec != NULL; sec = sec->next)
if ((bfd_section_flags (sec)
& (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
== (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
{
have_code_sections = true;
break;
}
if (!have_code_sections)
return true;
}
if (!elf_flags_init (obfd))
{
elf_flags_init (obfd) = true;
elf_elfheader (obfd)->e_flags = in_flags;
return true;
}
else if (out_flags != in_flags)
{
if ((EF_LOONGARCH_IS_OBJ_V0 (out_flags)
&& EF_LOONGARCH_IS_OBJ_V1 (in_flags))
|| (EF_LOONGARCH_IS_OBJ_V0 (in_flags)
&& EF_LOONGARCH_IS_OBJ_V1 (out_flags)))
{
elf_elfheader (obfd)->e_flags |= EF_LOONGARCH_OBJABI_V1;
out_flags = elf_elfheader (obfd)->e_flags;
in_flags = out_flags;
}
}
/* Disallow linking different ABIs. */
/* Only check relocation version.
The obj_v0 is compatible with obj_v1. */
if (EF_LOONGARCH_ABI(out_flags ^ in_flags) & EF_LOONGARCH_ABI_MASK)
{
_bfd_error_handler (_("%pB: can't link different ABI object."), ibfd);
goto fail;
}
return true;
fail:
bfd_set_error (bfd_error_bad_value);
return false;
}
/* Create the .got section. */
static bool
loongarch_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
{
flagword flags;
char *name;
asection *s, *s_got;
struct elf_link_hash_entry *h;
const struct elf_backend_data *bed = get_elf_backend_data (abfd);
struct elf_link_hash_table *htab = elf_hash_table (info);
/* This function may be called more than once. */
if (htab->sgot != NULL)
return true;
flags = bed->dynamic_sec_flags;
name = bed->rela_plts_and_copies_p ? ".rela.got" : ".rel.got";
s = bfd_make_section_anyway_with_flags (abfd, name, flags | SEC_READONLY);
if (s == NULL || !bfd_set_section_alignment (s, bed->s->log_file_align))
return false;
htab->srelgot = s;
s = s_got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
if (s == NULL || !bfd_set_section_alignment (s, bed->s->log_file_align))
return false;
htab->sgot = s;
/* The first bit of the global offset table is the header. */
s->size += bed->got_header_size;
if (bed->want_got_plt)
{
s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
if (s == NULL || !bfd_set_section_alignment (s, bed->s->log_file_align))
return false;
htab->sgotplt = s;
/* Reserve room for the header. */
s->size = GOTPLT_HEADER_SIZE;
}
if (bed->want_got_sym)
{
/* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
section. We don't do this in the linker script because we don't want
to define the symbol if we are not creating a global offset table. */
h = _bfd_elf_define_linkage_sym (abfd, info, s_got,
"_GLOBAL_OFFSET_TABLE_");
elf_hash_table (info)->hgot = h;
if (h == NULL)
return false;
}
return true;
}
/* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
.rela.bss sections in DYNOBJ, and set up shortcuts to them in our
hash table. */
static bool
loongarch_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
{
struct loongarch_elf_link_hash_table *htab;
htab = loongarch_elf_hash_table (info);
BFD_ASSERT (htab != NULL);
if (!loongarch_elf_create_got_section (dynobj, info))
return false;
if (!_bfd_elf_create_dynamic_sections (dynobj, info))
return false;
if (!bfd_link_pic (info))
htab->sdyntdata
= bfd_make_section_anyway_with_flags (dynobj, ".tdata.dyn",
SEC_ALLOC | SEC_THREAD_LOCAL);
if (!htab->elf.splt || !htab->elf.srelplt || !htab->elf.sdynbss
|| (!bfd_link_pic (info) && (!htab->elf.srelbss || !htab->sdyntdata)))
abort ();
return true;
}
static bool
loongarch_elf_record_tls_and_got_reference (bfd *abfd,
struct bfd_link_info *info,
struct elf_link_hash_entry *h,
unsigned long symndx,
char tls_type)
{
struct loongarch_elf_link_hash_table *htab = loongarch_elf_hash_table (info);
Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
/* This is a global offset table entry for a local symbol. */
if (elf_local_got_refcounts (abfd) == NULL)
{
bfd_size_type size =
symtab_hdr->sh_info * (sizeof (bfd_vma) + sizeof (tls_type));
if (!(elf_local_got_refcounts (abfd) = bfd_zalloc (abfd, size)))
return false;
_bfd_loongarch_elf_local_got_tls_type (abfd) =
(char *) (elf_local_got_refcounts (abfd) + symtab_hdr->sh_info);
}
switch (tls_type)
{
case GOT_NORMAL:
case GOT_TLS_GD:
case GOT_TLS_IE:
case GOT_TLS_GDESC:
/* Need GOT. */
if (htab->elf.sgot == NULL
&& !loongarch_elf_create_got_section (htab->elf.dynobj, info))
return false;
if (h)
{
if (h->got.refcount < 0)
h->got.refcount = 0;
h->got.refcount++;
}
else
elf_local_got_refcounts (abfd)[symndx]++;
break;
case GOT_TLS_LE:
/* No need for GOT. */
break;
default:
_bfd_error_handler (_("Internal error: unreachable."));
return false;
}
char *new_tls_type = &_bfd_loongarch_elf_tls_type (abfd, h, symndx);
*new_tls_type |= tls_type;
/* If a symbol is accessed by both IE and DESC, relax DESC to IE. */
if ((*new_tls_type & GOT_TLS_IE) && (*new_tls_type & GOT_TLS_GDESC))
*new_tls_type &= ~ (GOT_TLS_GDESC);
if ((*new_tls_type & GOT_NORMAL) && (*new_tls_type & ~GOT_NORMAL))
{
_bfd_error_handler (_("%pB: `%s' accessed both as normal and "
"thread local symbol"),
abfd,
h ? h->root.root.string : "<local>");
return false;
}
return true;
}
static unsigned int
loongarch_reloc_got_type (unsigned int r_type)
{
switch (r_type)
{
case R_LARCH_TLS_DESC_PC_HI20:
case R_LARCH_TLS_DESC_PC_LO12:
case R_LARCH_TLS_DESC_LD:
case R_LARCH_TLS_DESC_CALL:
return GOT_TLS_GDESC;
case R_LARCH_TLS_IE_PC_HI20:
case R_LARCH_TLS_IE_PC_LO12:
return GOT_TLS_IE;
default:
break;
}
return GOT_UNKNOWN;
}
/* Return true if tls type transition can be performed. */
static bool
loongarch_can_trans_tls (bfd *input_bfd,
struct bfd_link_info *info,
struct elf_link_hash_entry *h,
unsigned int r_symndx,
unsigned int r_type)
{
char symbol_tls_type;
unsigned int reloc_got_type;
/* Only TLS DESC/IE in normal code mode will perform type
transition. */
if (! IS_LOONGARCH_TLS_TRANS_RELOC (r_type))
return false;
/* Obtaining tls got type here may occur before
loongarch_elf_record_tls_and_got_reference, so it is necessary
to ensure that tls got type has been initialized, otherwise it
is set to GOT_UNKNOWN. */
symbol_tls_type = GOT_UNKNOWN;
if (_bfd_loongarch_elf_local_got_tls_type (input_bfd) || h)
symbol_tls_type = _bfd_loongarch_elf_tls_type (input_bfd, h, r_symndx);
reloc_got_type = loongarch_reloc_got_type (r_type);
if (symbol_tls_type == GOT_TLS_IE && GOT_TLS_GD_ANY_P (reloc_got_type))
return true;
if (! bfd_link_executable (info))
return false;
if (h && h->root.type == bfd_link_hash_undefweak)
return false;
return true;
}
/* The type of relocation that can be transitioned. */
static unsigned int
loongarch_tls_transition_without_check (struct bfd_link_info *info,
unsigned int r_type,
struct elf_link_hash_entry *h)
{
bool local_exec = bfd_link_executable (info)
&& LARCH_REF_LOCAL (info, h);
switch (r_type)
{
case R_LARCH_TLS_DESC_PC_HI20:
return (local_exec
? R_LARCH_TLS_LE_HI20
: R_LARCH_TLS_IE_PC_HI20);
case R_LARCH_TLS_DESC_PC_LO12:
return (local_exec
? R_LARCH_TLS_LE_LO12
: R_LARCH_TLS_IE_PC_LO12);
case R_LARCH_TLS_DESC_LD:
case R_LARCH_TLS_DESC_CALL:
return R_LARCH_NONE;
case R_LARCH_TLS_IE_PC_HI20:
return local_exec ? R_LARCH_TLS_LE_HI20 : r_type;
case R_LARCH_TLS_IE_PC_LO12:
return local_exec ? R_LARCH_TLS_LE_LO12 : r_type;
default:
break;
}
return r_type;
}
static unsigned int
loongarch_tls_transition (bfd *input_bfd,
struct bfd_link_info *info,
struct elf_link_hash_entry *h,
unsigned int r_symndx,
unsigned int r_type)
{
if (! loongarch_can_trans_tls (input_bfd, info, h, r_symndx, r_type))
return r_type;
return loongarch_tls_transition_without_check (info, r_type, h);
}
static bool
bad_static_reloc (bfd *abfd, const Elf_Internal_Rela *rel, asection *sec,
unsigned r_type, struct elf_link_hash_entry *h,
Elf_Internal_Sym *isym)
{
/* We propably can improve the information to tell users that they should
be recompile the code with -fPIC or -fPIE, just like what x86 does. */
reloc_howto_type * r = loongarch_elf_rtype_to_howto (abfd, r_type);
const char *name = NULL;
if (h)
name = h->root.root.string;
else if (isym)
name = bfd_elf_string_from_elf_section (abfd,
elf_symtab_hdr (abfd).sh_link,
isym->st_name);
if (name == NULL || *name == '\0')
name ="<nameless>";
(*_bfd_error_handler)
(_("%pB:(%pA+%#lx): relocation %s against `%s` can not be used when making "
"a shared object; recompile with -fPIC"),
abfd, sec, (long) rel->r_offset, r ? r->name : _("<unknown>"), name);
bfd_set_error (bfd_error_bad_value);
return false;
}
/* Look through the relocs for a section during the first phase, and
allocate space in the global offset table or procedure linkage
table. */
static bool
loongarch_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
asection *sec, const Elf_Internal_Rela *relocs)
{
struct loongarch_elf_link_hash_table *htab;
Elf_Internal_Shdr *symtab_hdr;
struct elf_link_hash_entry **sym_hashes;
const Elf_Internal_Rela *rel;
asection *sreloc = NULL;
if (bfd_link_relocatable (info))
return true;
htab = loongarch_elf_hash_table (info);
symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
sym_hashes = elf_sym_hashes (abfd);
if (htab->elf.dynobj == NULL)
htab->elf.dynobj = abfd;
for (rel = relocs; rel < relocs + sec->reloc_count; rel++)
{
unsigned int r_type;
unsigned int r_symndx;
struct elf_link_hash_entry *h;
bool is_abs_symbol = false;
Elf_Internal_Sym *isym = NULL;
r_symndx = ELFNN_R_SYM (rel->r_info);
r_type = ELFNN_R_TYPE (rel->r_info);
if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
{
_bfd_error_handler (_("%pB: bad symbol index: %d"), abfd, r_symndx);
return false;
}
if (r_symndx < symtab_hdr->sh_info)
{
/* A local symbol. */
isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache, abfd, r_symndx);
if (isym == NULL)
return false;
is_abs_symbol = isym->st_shndx == SHN_ABS;
if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
{
h = elfNN_loongarch_get_local_sym_hash (htab, abfd, rel, true);
if (h == NULL)
return false;
h->type = STT_GNU_IFUNC;
h->ref_regular = 1;
}
else
h = NULL;
}
else
{
h = sym_hashes[r_symndx - symtab_hdr->sh_info];
while (h->root.type == bfd_link_hash_indirect
|| h->root.type == bfd_link_hash_warning)
h = (struct elf_link_hash_entry *) h->root.u.i.link;
is_abs_symbol = bfd_is_abs_symbol (&h->root);
}
/* It is referenced by a non-shared object. */
if (h != NULL)
h->ref_regular = 1;
if (h && h->type == STT_GNU_IFUNC)
{
if (htab->elf.dynobj == NULL)
htab->elf.dynobj = abfd;
/* Create 'irelifunc' in PIC object. */
if (bfd_link_pic (info)
&& !_bfd_elf_create_ifunc_sections (htab->elf.dynobj, info))
return false;
/* If '.plt' not represent, create '.iplt' to deal with ifunc. */
else if (!htab->elf.splt
&& !_bfd_elf_create_ifunc_sections (htab->elf.dynobj, info))
return false;
/* Create the ifunc sections, iplt and ipltgot, for static
executables. */
if ((r_type == R_LARCH_64 || r_type == R_LARCH_32)
&& !_bfd_elf_create_ifunc_sections (htab->elf.dynobj, info))
return false;
if (h->plt.refcount < 0)
h->plt.refcount = 0;
h->plt.refcount++;
h->needs_plt = 1;
elf_tdata (info->output_bfd)->has_gnu_osabi |= elf_gnu_osabi_ifunc;
}
int need_dynreloc = 0;
int only_need_pcrel = 0;
/* Type transitions are only possible with relocations accompanied
by R_LARCH_RELAX. */
if (rel + 1 != relocs + sec->reloc_count
&& ELFNN_R_TYPE (rel[1].r_info) == R_LARCH_RELAX)
r_type = loongarch_tls_transition (abfd, info, h, r_symndx, r_type);
/* I don't want to spend time supporting DT_RELR with old object
files doing stack-based relocs. */
if (info->enable_dt_relr
&& r_type >= R_LARCH_SOP_PUSH_PCREL
&& r_type <= R_LARCH_SOP_POP_32_U)
{
/* xgettext:c-format */
_bfd_error_handler (_("%pB: stack based reloc type (%u) is not "
"supported with -z pack-relative-relocs"),
abfd, r_type);
return false;
}
switch (r_type)
{
case R_LARCH_GOT_PC_HI20:
case R_LARCH_GOT_HI20:
case R_LARCH_SOP_PUSH_GPREL:
/* For la.global. */
if (h)
h->pointer_equality_needed = 1;
if (!loongarch_elf_record_tls_and_got_reference (abfd, info, h,
r_symndx,
GOT_NORMAL))
return false;
break;
case R_LARCH_TLS_LD_PC_HI20:
case R_LARCH_TLS_LD_HI20:
case R_LARCH_TLS_GD_PC_HI20:
case R_LARCH_TLS_GD_HI20:
case R_LARCH_SOP_PUSH_TLS_GD:
if (!loongarch_elf_record_tls_and_got_reference (abfd, info, h,
r_symndx,
GOT_TLS_GD))
return false;
break;
case R_LARCH_TLS_IE_PC_HI20:
case R_LARCH_TLS_IE_HI20:
case R_LARCH_SOP_PUSH_TLS_GOT:
if (bfd_link_pic (info))
/* May fail for lazy-bind. */
info->flags |= DF_STATIC_TLS;
if (!loongarch_elf_record_tls_and_got_reference (abfd, info, h,
r_symndx,
GOT_TLS_IE))
return false;
break;
case R_LARCH_TLS_LE_HI20:
case R_LARCH_TLS_LE_HI20_R:
case R_LARCH_SOP_PUSH_TLS_TPREL:
if (!bfd_link_executable (info))
return bad_static_reloc (abfd, rel, sec, r_type, h, isym);
if (!loongarch_elf_record_tls_and_got_reference (abfd, info, h,
r_symndx,
GOT_TLS_LE))
return false;
break;
case R_LARCH_TLS_DESC_PC_HI20:
case R_LARCH_TLS_DESC_HI20:
if (!loongarch_elf_record_tls_and_got_reference (abfd, info, h,
r_symndx,
GOT_TLS_GDESC))
return false;
break;
case R_LARCH_ABS_HI20:
if (bfd_link_pic (info))
return bad_static_reloc (abfd, rel, sec, r_type, h, isym);
/* Fall through. */
case R_LARCH_SOP_PUSH_ABSOLUTE:
if (h != NULL)
/* If this reloc is in a read-only section, we might
need a copy reloc. We can't check reliably at this
stage whether the section is read-only, as input
sections have not yet been mapped to output sections.
Tentatively set the flag for now, and correct in
adjust_dynamic_symbol. */
h->non_got_ref = 1;
break;
/* For normal cmodel, pcalau12i + addi.d/w used to data.
For first version medium cmodel, pcalau12i + jirl are used to
function call, it need to creat PLT entry for STT_FUNC and
STT_GNU_IFUNC type symbol. */
case R_LARCH_PCALA_HI20:
if (h != NULL && (STT_FUNC == h->type || STT_GNU_IFUNC == h->type))
{
/* For pcalau12i + jirl. */
h->needs_plt = 1;
if (h->plt.refcount < 0)
h->plt.refcount = 0;
h->plt.refcount++;
h->non_got_ref = 1;
h->pointer_equality_needed = 1;
}
break;
case R_LARCH_B16:
case R_LARCH_B21:
case R_LARCH_B26:
case R_LARCH_CALL36:
if (h != NULL)
{
h->needs_plt = 1;
if (!bfd_link_pic (info))
h->non_got_ref = 1;
/* We try to create PLT stub for all non-local function. */
if (h->plt.refcount < 0)
h->plt.refcount = 0;
h->plt.refcount++;
}
break;
case R_LARCH_SOP_PUSH_PCREL:
if (h != NULL)
{
if (!bfd_link_pic (info))
h->non_got_ref = 1;
/* We try to create PLT stub for all non-local function. */
if (h->plt.refcount < 0)
h->plt.refcount = 0;
h->plt.refcount++;
h->pointer_equality_needed = 1;
}
break;
case R_LARCH_SOP_PUSH_PLT_PCREL:
/* This symbol requires a procedure linkage table entry. We
actually build the entry in adjust_dynamic_symbol,
because this might be a case of linking PIC code without
linking in any dynamic objects, in which case we don't
need to generate a procedure linkage table after all. */
if (h != NULL)
{
h->needs_plt = 1;
if (h->plt.refcount < 0)
h->plt.refcount = 0;
h->plt.refcount++;
}
break;
case R_LARCH_TLS_DTPREL32:
case R_LARCH_TLS_DTPREL64:
need_dynreloc = 1;
only_need_pcrel = 1;
break;
case R_LARCH_32:
if (ARCH_SIZE > 32
&& bfd_link_pic (info)
&& (sec->flags & SEC_ALLOC) != 0)
{
if (!is_abs_symbol)
{
_bfd_error_handler
(_("%pB: relocation R_LARCH_32 against non-absolute "
"symbol `%s' cannot be used in ELFCLASS64 when "
"making a shared object or PIE"),
abfd, h ? h->root.root.string : "a local symbol");
bfd_set_error (bfd_error_bad_value);
return false;
}
}
/* Fall through. */
case R_LARCH_JUMP_SLOT:
case R_LARCH_64:
/* Resolved to const. */
if (is_abs_symbol)
break;
need_dynreloc = 1;
/* If resolved symbol is defined in this object,
1. Under pie, the symbol is known. We convert it
into R_LARCH_RELATIVE and need load-addr still.
2. Under pde, the symbol is known and we can discard R_LARCH_NN.
3. Under dll, R_LARCH_NN can't be changed normally, since
its defination could be covered by the one in executable.
For symbolic, we convert it into R_LARCH_RELATIVE.
Thus, only under pde, it needs pcrel only. We discard it. */
only_need_pcrel = bfd_link_pde (info);
if (h != NULL
&& (!bfd_link_pic (info)
|| h->type == STT_GNU_IFUNC))
{
/* This reloc might not bind locally. */
h->non_got_ref = 1;
h->pointer_equality_needed = 1;
if (!h->def_regular
|| (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
{
/* We may need a .plt entry if the symbol is a function
defined in a shared lib or is a function referenced
from the code or read-only section. */
h->plt.refcount += 1;
}
}
break;
case R_LARCH_GNU_VTINHERIT:
if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
return false;
break;
case R_LARCH_GNU_VTENTRY:
if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
return false;
break;
case R_LARCH_ALIGN:
/* Check against irrational R_LARCH_ALIGN relocs which may cause
removing an odd number of bytes and disrupt DT_RELR. */
if (rel->r_offset % 4 != 0)
{
/* xgettext:c-format */
_bfd_error_handler (
_("%pB: R_LARCH_ALIGN with offset %" PRId64 " not aligned "
"to instruction boundary"),
abfd, (uint64_t) rel->r_offset);
return false;
}
break;
default:
break;
}
/* Record some info for sizing and allocating dynamic entry. */
if (need_dynreloc && (sec->flags & SEC_ALLOC))
{
/* When creating a shared object, we must copy these
relocs into the output file. We create a reloc
section in dynobj and make room for the reloc. */
struct elf_dyn_relocs *p;
struct elf_dyn_relocs **head;
if (sreloc == NULL)
{
sreloc
= _bfd_elf_make_dynamic_reloc_section (sec, htab->elf.dynobj,
LARCH_ELF_LOG_WORD_BYTES,
abfd, /*rela?*/ true);
if (sreloc == NULL)
return false;
}
/* If this is a global symbol, we count the number of
relocations we need for this symbol. */
if (h != NULL)
head = &h->dyn_relocs;
else
{
/* Track dynamic relocs needed for local syms too.
We really need local syms available to do this
easily. Oh well. */
asection *s;
void *vpp;
s = bfd_section_from_elf_index (abfd, isym->st_shndx);
if (s == NULL)
s = sec;
vpp = &elf_section_data (s)->local_dynrel;
head = (struct elf_dyn_relocs **) vpp;
}
p = *head;
if (p == NULL || p->sec != sec)
{
bfd_size_type amt = sizeof *p;
p = (struct elf_dyn_relocs *) bfd_alloc (htab->elf.dynobj, amt);
if (p == NULL)
return false;
p->next = *head;
*head = p;
p->sec = sec;
p->count = 0;
p->pc_count = 0;
}
p->count++;
p->pc_count += only_need_pcrel;
}
}
return true;
}
/* Find dynamic relocs for H that apply to read-only sections. */
static asection *
readonly_dynrelocs (struct elf_link_hash_entry *h)
{
struct elf_dyn_relocs *p;
for (p = h->dyn_relocs; p != NULL; p = p->next)
{
asection *s = p->sec->output_section;
if (s != NULL && (s->flags & SEC_READONLY) != 0)
return p->sec;
}
return NULL;
}
/* Adjust a symbol defined by a dynamic object and referenced by a
regular object. The current definition is in some section of the
dynamic object, but we're not including those sections. We have to
change the definition to something the rest of the link can
understand. */
static bool
loongarch_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
struct elf_link_hash_entry *h)
{
struct loongarch_elf_link_hash_table *htab;
bfd *dynobj;
htab = loongarch_elf_hash_table (info);
BFD_ASSERT (htab != NULL);
dynobj = htab->elf.dynobj;
/* Make sure we know what is going on here. */
BFD_ASSERT (dynobj != NULL
&& (h->needs_plt
|| h->type == STT_GNU_IFUNC
|| h->is_weakalias
|| (h->def_dynamic
&& h->ref_regular
&& !h->def_regular)));
/* If this is a function, put it in the procedure linkage table. We
will fill in the contents of the procedure linkage table later
(although we could actually do it here). */
if (h->type == STT_FUNC || h->type == STT_GNU_IFUNC || h->needs_plt)
{
if (h->plt.refcount <= 0
|| (h->type != STT_GNU_IFUNC
&& (LARCH_REF_LOCAL (info, h)
|| (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
&& h->root.type == bfd_link_hash_undefweak))))
{
/* This case can occur if we saw a R_LARCH_SOP_PUSH_PLT_PCREL reloc
in an input file, but the symbol was never referred to by a
dynamic object, or if all references were garbage collected.
In such a case, we don't actually need to build a PLT entry. */
h->plt.offset = MINUS_ONE;
h->needs_plt = 0;
}
return true;
}
else
h->plt.offset = MINUS_ONE;
/* If this is a weak symbol, and there is a real definition, the
processor independent code will have arranged for us to see the
real definition first, and we can just use the same value. */
if (h->is_weakalias)
{
struct elf_link_hash_entry *def = weakdef (h);
BFD_ASSERT (def->root.type == bfd_link_hash_defined);
h->root.u.def.section = def->root.u.def.section;
h->root.u.def.value = def->root.u.def.value;
return true;
}
/* R_LARCH_COPY is not adept glibc, not to generate. */
/* Can not print anything, because make check ld. */
return true;
}
/* Allocate space in .plt, .got and associated reloc sections for
dynamic relocs. */
static bool
allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
{
struct bfd_link_info *info;
struct loongarch_elf_link_hash_table *htab;
struct elf_dyn_relocs *p;
if (h->root.type == bfd_link_hash_indirect)
return true;
if (h->type == STT_GNU_IFUNC
&& h->def_regular)
return true;
info = (struct bfd_link_info *) inf;
htab = loongarch_elf_hash_table (info);
bool dyn = htab->elf.dynamic_sections_created;
BFD_ASSERT (htab != NULL);
do
{
asection *plt, *gotplt, *relplt;
if (!h->needs_plt)
break;
h->needs_plt = 0;
if (htab->elf.splt)
{
if (h->dynindx == -1 && !h->forced_local && dyn
&& h->root.type == bfd_link_hash_undefweak)
{
if (!bfd_elf_link_record_dynamic_symbol (info, h))
return false;
}
if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h)
&& h->type != STT_GNU_IFUNC)
break;
plt = htab->elf.splt;
gotplt = htab->elf.sgotplt;
relplt = htab->elf.srelplt;
}
else if (htab->elf.iplt)
{
/* .iplt only for IFUNC. */
if (h->type != STT_GNU_IFUNC)
break;
plt = htab->elf.iplt;
gotplt = htab->elf.igotplt;
relplt = htab->elf.irelplt;
}
else
break;
if (plt->size == 0)
plt->size = PLT_HEADER_SIZE;
h->plt.offset = plt->size;
plt->size += PLT_ENTRY_SIZE;
gotplt->size += GOT_ENTRY_SIZE;
relplt->size += sizeof (ElfNN_External_Rela);
/* If this symbol is not defined in a regular file, and we are
not generating a shared library, then set the symbol to this
location in the .plt. This is required to make function
pointers compare as equal between the normal executable and
the shared library. */
if (!bfd_link_pic (info)
&& !h->def_regular)
{
h->root.u.def.section = plt;
h->root.u.def.value = h->plt.offset;
}
h->needs_plt = 1;
}
while (0);
if (!h->needs_plt)
h->plt.offset = MINUS_ONE;
if (0 < h->got.refcount)
{
asection *s;
int tls_type = loongarch_elf_hash_entry (h)->tls_type;
/* Make sure this symbol is output as a dynamic symbol.
Undefined weak syms won't yet be marked as dynamic. */
if (h->dynindx == -1 && !h->forced_local && dyn
&& h->root.type == bfd_link_hash_undefweak)
{
if (!bfd_elf_link_record_dynamic_symbol (info, h))
return false;
}
s = htab->elf.sgot;
h->got.offset = s->size;
if (tls_type & (GOT_TLS_GD | GOT_TLS_IE | GOT_TLS_GDESC))
{
int indx = 0;
bool need_reloc = false;
LARCH_TLS_GD_IE_NEED_DYN_RELOC (info, dyn, h, indx,
need_reloc);
/* TLS_GD needs two dynamic relocs and two GOT slots. */
if (tls_type & GOT_TLS_GD)
{
s->size += 2 * GOT_ENTRY_SIZE;
if (need_reloc)
htab->elf.srelgot->size += 2 * sizeof (ElfNN_External_Rela);
}
/* TLS_IE needs one dynamic reloc and one GOT slot. */
if (tls_type & GOT_TLS_IE)
{
s->size += GOT_ENTRY_SIZE;
if (need_reloc)
htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
}
/* TLS_DESC needs one dynamic reloc and two GOT slot. */
if (tls_type & GOT_TLS_GDESC)
{
s->size += GOT_ENTRY_SIZE * 2;
htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
}
}
else
{
s->size += GOT_ENTRY_SIZE;
if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
|| h->root.type != bfd_link_hash_undefweak)
&& (bfd_link_pic (info)
|| WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info),
h))
&& !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
/* Undefined weak symbol in static PIE resolves to 0 without
any dynamic relocations. */
htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
}
}
else
h->got.offset = MINUS_ONE;
if (h->dyn_relocs == NULL)
return true;
/* Extra dynamic relocate,
* R_LARCH_64
* R_LARCH_TLS_DTPRELNN
* R_LARCH_JUMP_SLOT
* R_LARCH_NN. */
if (SYMBOL_CALLS_LOCAL (info, h))
{
struct elf_dyn_relocs **pp;
for (pp = &h->dyn_relocs; (p = *pp) != NULL;)
{
p->count -= p->pc_count;
p->pc_count = 0;
if (p->count == 0)
*pp = p->next;
else
pp = &p->next;
}
}
if (h->root.type == bfd_link_hash_undefweak)
{
if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
|| ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
|| (!bfd_link_pic (info) && h->non_got_ref))
h->dyn_relocs = NULL;
else if (h->dynindx == -1 && !h->forced_local)
{
/* Make sure this symbol is output as a dynamic symbol.
Undefined weak syms won't yet be marked as dynamic. */
if (!bfd_elf_link_record_dynamic_symbol (info, h))
return false;
if (h->dynindx == -1)
h->dyn_relocs = NULL;
}
}
for (p = h->dyn_relocs; p != NULL; p = p->next)
{
if (discarded_section (p->sec))
continue;
asection *sreloc = elf_section_data (p->sec)->sreloc;
sreloc->size += p->count * sizeof (ElfNN_External_Rela);
}
return true;
}
/* A modified version of _bfd_elf_allocate_ifunc_dyn_relocs.
For local def and ref ifunc,
dynamic relocations are stored in
1. rela.srelgot section in dynamic object (dll or exec).
2. rela.irelplt section in static executable.
Unlike _bfd_elf_allocate_ifunc_dyn_relocs, rela.srelgot is used
instead of rela.srelplt. Glibc ELF loader will not support
R_LARCH_IRELATIVE relocation in rela.plt. */
static bool
local_allocate_ifunc_dyn_relocs (struct bfd_link_info *info,
struct elf_link_hash_entry *h,
struct elf_dyn_relocs **head,
unsigned int plt_entry_size,
unsigned int plt_header_size,
unsigned int got_entry_size,
bool avoid_plt)
{
asection *plt, *gotplt, *relplt;
struct elf_dyn_relocs *p;
unsigned int sizeof_reloc;
const struct elf_backend_data *bed;
struct elf_link_hash_table *htab;
/* If AVOID_PLT is TRUE, don't use PLT if possible. */
bool use_plt = !avoid_plt || h->plt.refcount > 0;
bool need_dynreloc = !use_plt || bfd_link_pic (info);
/* When a PIC object references a STT_GNU_IFUNC symbol defined
in executable or it isn't referenced via PLT, the address of
the resolved function may be used. But in non-PIC executable,
the address of its plt slot may be used. Pointer equality may
not work correctly. PIE or non-PLT reference should be used if
pointer equality is required here.
If STT_GNU_IFUNC symbol is defined in position-dependent executable,
backend should change it to the normal function and set its address
to its PLT entry which should be resolved by R_*_IRELATIVE at
run-time. All external references should be resolved to its PLT in
executable. */
if (!need_dynreloc
&& !(bfd_link_pde (info) && h->def_regular)
&& (h->dynindx != -1
|| info->export_dynamic)
&& h->pointer_equality_needed)
{
info->callbacks->einfo
/* xgettext:c-format. */
(_("%F%P: dynamic STT_GNU_IFUNC symbol `%s' with pointer "
"equality in `%pB' can not be used when making an "
"executable; recompile with -fPIE and relink with -pie\n"),
h->root.root.string,
h->root.u.def.section->owner);
bfd_set_error (bfd_error_bad_value);
return false;
}
htab = elf_hash_table (info);
/* When the symbol is marked with regular reference, if PLT isn't used
or we are building a PIC object, we must keep dynamic relocation
if there is non-GOT reference and use PLT if there is PC-relative
reference. */
if (need_dynreloc && h->ref_regular)
{
bool keep = false;
for (p = *head; p != NULL; p = p->next)
if (p->count)
{
h->non_got_ref = 1;
/* Need dynamic relocations for non-GOT reference. */
keep = true;
if (p->pc_count)
{
/* Must use PLT for PC-relative reference. */
use_plt = true;
need_dynreloc = bfd_link_pic (info);
break;
}
}
if (keep)
goto keep;
}
/* Support garbage collection against STT_GNU_IFUNC symbols. */
if (h->plt.refcount <= 0 && h->got.refcount <= 0)
{
h->got = htab->init_got_offset;
h->plt = htab->init_plt_offset;
*head = NULL;
return true;
}
/* Return and discard space for dynamic relocations against it if
it is never referenced. */
if (!h->ref_regular)
{
if (h->plt.refcount > 0
|| h->got.refcount > 0)
abort ();
h->got = htab->init_got_offset;
h->plt = htab->init_plt_offset;
*head = NULL;
return true;
}
keep:
bed = get_elf_backend_data (info->output_bfd);
if (bed->rela_plts_and_copies_p)
sizeof_reloc = bed->s->sizeof_rela;
else
sizeof_reloc = bed->s->sizeof_rel;
/* When building a static executable, use iplt, igot.plt and
rela.iplt sections for STT_GNU_IFUNC symbols. */
if (htab->splt != NULL)
{
plt = htab->splt;
gotplt = htab->sgotplt;
/* Change dynamic info of ifunc gotplt from srelplt to srelgot. */
relplt = htab->srelgot;
/* If this is the first plt entry and PLT is used, make room for
the special first entry. */
if (plt->size == 0 && use_plt)
plt->size += plt_header_size;
}
else
{
plt = htab->iplt;
gotplt = htab->igotplt;
relplt = htab->irelplt;
}
if (use_plt)
{
/* Don't update value of STT_GNU_IFUNC symbol to PLT. We need
the original value for R_*_IRELATIVE. */
h->plt.offset = plt->size;
/* Make room for this entry in the plt/iplt section. */
plt->size += plt_entry_size;
/* We also need to make an entry in the got.plt/got.iplt section,
which will be placed in the got section by the linker script. */
gotplt->size += got_entry_size;
}
/* We also need to make an entry in the rela.plt/.rela.iplt
section for GOTPLT relocation if PLT is used. */
if (use_plt)
{
relplt->size += sizeof_reloc;
relplt->reloc_count++;
}
/* We need dynamic relocation for STT_GNU_IFUNC symbol only when
there is a non-GOT reference in a PIC object or PLT isn't used. */
if (!need_dynreloc || !h->non_got_ref)
*head = NULL;
/* Finally, allocate space. */
p = *head;
if (p != NULL)
{
bfd_size_type count = 0;
do
{
count += p->count;
p = p->next;
}
while (p != NULL);
htab->ifunc_resolvers = count != 0;
/* Dynamic relocations are stored in
1. rela.srelgot section in PIC object.
2. rela.srelgot section in dynamic executable.
3. rela.irelplt section in static executable. */
if (htab->splt != NULL)
htab->srelgot->size += count * sizeof_reloc;
else
{
relplt->size += count * sizeof_reloc;
relplt->reloc_count += count;
}
}
/* For STT_GNU_IFUNC symbol, got.plt has the real function address
and got has the PLT entry adddress. We will load the GOT entry
with the PLT entry in finish_dynamic_symbol if it is used. For
branch, it uses got.plt. For symbol value, if PLT is used,
1. Use got.plt in a PIC object if it is forced local or not
dynamic.
2. Use got.plt in a non-PIC object if pointer equality isn't
needed.
3. Use got.plt in PIE.
4. Use got.plt if got isn't used.
5. Otherwise use got so that it can be shared among different
objects at run-time.
If PLT isn't used, always use got for symbol value.
We only need to relocate got entry in PIC object or in dynamic
executable without PLT. */
if (use_plt
&& (h->got.refcount <= 0
|| (bfd_link_pic (info)
&& (h->dynindx == -1
|| h->forced_local))
|| (
!h->pointer_equality_needed)
|| htab->sgot == NULL))
{
/* Use got.plt. */
h->got.offset = (bfd_vma) -1;
}
else
{
if (!use_plt)
{
/* PLT isn't used. */
h->plt.offset = (bfd_vma) -1;
}
if (h->got.refcount <= 0)
{
/* GOT isn't need when there are only relocations for static
pointers. */
h->got.offset = (bfd_vma) -1;
}
else
{
h->got.offset = htab->sgot->size;
htab->sgot->size += got_entry_size;
/* Need to relocate the GOT entry in a PIC object or PLT isn't
used. Otherwise, the GOT entry will be filled with the PLT
entry and dynamic GOT relocation isn't needed. */
if (need_dynreloc)
{
/* For non-static executable, dynamic GOT relocation is in
rela.got section, but for static executable, it is
in rela.iplt section. */
if (htab->splt != NULL)
htab->srelgot->size += sizeof_reloc;
else
{
relplt->size += sizeof_reloc;
relplt->reloc_count++;
}
}
}
}
return true;
}
/* Allocate space in .plt, .got and associated reloc sections for
ifunc dynamic relocs. */
static bool
elfNN_allocate_ifunc_dynrelocs (struct elf_link_hash_entry *h,
struct bfd_link_info *info,
bool ref_local)
{
/* An example of a bfd_link_hash_indirect symbol is versioned
symbol. For example: __gxx_personality_v0(bfd_link_hash_indirect)
-> __gxx_personality_v0(bfd_link_hash_defined)
There is no need to process bfd_link_hash_indirect symbols here
because we will also be presented with the concrete instance of
the symbol and loongarch_elf_copy_indirect_symbol () will have been
called to copy all relevant data from the generic to the concrete
symbol instance. */
if (h->root.type == bfd_link_hash_indirect)
return true;
if (h->root.type == bfd_link_hash_warning)
h = (struct elf_link_hash_entry *) h->root.u.i.link;
/* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
here if it is defined and referenced in a non-shared object. */
if (h->type == STT_GNU_IFUNC && h->def_regular)
{
if (ref_local && LARCH_REF_LOCAL (info, h))
return local_allocate_ifunc_dyn_relocs (info, h,
&h->dyn_relocs,
PLT_ENTRY_SIZE,
PLT_HEADER_SIZE,
GOT_ENTRY_SIZE,
false);
else if (!ref_local && !LARCH_REF_LOCAL (info, h))
return _bfd_elf_allocate_ifunc_dyn_relocs (info, h,
&h->dyn_relocs,
PLT_ENTRY_SIZE,
PLT_HEADER_SIZE,
GOT_ENTRY_SIZE,
false);
}
return true;
}
static bool
elfNN_allocate_ifunc_dynrelocs_ref_local (struct elf_link_hash_entry *h,
void *info)
{
return elfNN_allocate_ifunc_dynrelocs (h, (struct bfd_link_info *) info,
true);
}
static bool
elfNN_allocate_ifunc_dynrelocs_ref_global (struct elf_link_hash_entry *h,
void *info)
{
return elfNN_allocate_ifunc_dynrelocs (h, (struct bfd_link_info *) info,
false);
}
/* Allocate space in .plt, .got and associated reloc sections for
ifunc dynamic relocs. */
static int
elfNN_allocate_local_ifunc_dynrelocs (void **slot, void *inf)
{
struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) *slot;
if (h->type != STT_GNU_IFUNC
|| !h->def_regular
|| !h->ref_regular
|| !h->forced_local
|| h->root.type != bfd_link_hash_defined)
abort ();
return elfNN_allocate_ifunc_dynrelocs_ref_local (h, inf);
}
/* Set DF_TEXTREL if we find any dynamic relocs that apply to
read-only sections. */
static bool
maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
{
asection *sec;
if (h->root.type == bfd_link_hash_indirect)
return true;
sec = readonly_dynrelocs (h);
if (sec != NULL)
{
struct bfd_link_info *info = (struct bfd_link_info *) info_p;
info->flags |= DF_TEXTREL;
info->callbacks->minfo (_("%pB: dynamic relocation against `%pT' in "
"read-only section `%pA'\n"),
sec->owner, h->root.root.string, sec);
/* Not an error, just cut short the traversal. */
return false;
}
return true;
}
static bool
record_relr (struct loongarch_elf_link_hash_table *htab, asection *sec,
bfd_vma off, asection *sreloc)
{
struct relr_entry **sec_relr = &loongarch_elf_section_data (sec)->relr;
/* Undo the relocation section size accounting. */
BFD_ASSERT (sreloc->size >= sizeof (ElfNN_External_Rela));
sreloc->size -= sizeof (ElfNN_External_Rela);
BFD_ASSERT (off % 2 == 0 && sec->alignment_power > 0);
if (htab->relr_count >= htab->relr_alloc)
{
if (htab->relr_alloc == 0)
htab->relr_alloc = 4096;
else
htab->relr_alloc *= 2;
htab->relr = bfd_realloc (htab->relr,
htab->relr_alloc * sizeof (*htab->relr));
if (!htab->relr)
return false;
}
htab->relr[htab->relr_count].sec = sec;
htab->relr[htab->relr_count].off = off;
if (*sec_relr == NULL)
*sec_relr = &htab->relr[htab->relr_count];
htab->relr_count++;
return true;
}
static bool
record_relr_local_got_relocs (bfd *input_bfd, struct bfd_link_info *info)
{
bfd_vma *local_got_offsets = elf_local_got_offsets (input_bfd);
char *local_tls_type = _bfd_loongarch_elf_local_got_tls_type (input_bfd);
Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_bfd);
struct loongarch_elf_link_hash_table *htab =
loongarch_elf_hash_table (info);
if (!local_got_offsets || !local_tls_type || !bfd_link_pic (info))
return true;
for (unsigned i = 0; i < symtab_hdr->sh_info; i++)
{
bfd_vma off = local_got_offsets[i];
/* FIXME: If the local symbol is in SHN_ABS then emitting
a relative relocation is not correct, but it seems to be wrong
in loongarch_elf_relocate_section too. */
if (local_tls_type[i] == GOT_NORMAL
&& !record_relr (htab, htab->elf.sgot, off, htab->elf.srelgot))
return false;
}
return true;
}
static bool
record_relr_dyn_got_relocs (struct elf_link_hash_entry *h, void *inf)
{
struct bfd_link_info *info = (struct bfd_link_info *) inf;
struct loongarch_elf_link_hash_table *htab =
loongarch_elf_hash_table (info);
if (h->root.type == bfd_link_hash_indirect)
return true;
if (h->type == STT_GNU_IFUNC && h->def_regular)
return true;
if (h->got.refcount <= 0)
return true;
if (loongarch_elf_hash_entry (h)->tls_type
& (GOT_TLS_GD | GOT_TLS_IE | GOT_TLS_GDESC))
return true;
if (!bfd_link_pic (info))
return true;
/* On LoongArch a GOT entry for undefined weak symbol is never relocated
with R_LARCH_RELATIVE: we don't have -z dynamic-undefined-weak, thus
the GOT entry is either const 0 (if the symbol is LARCH_REF_LOCAL) or
relocated with R_LARCH_NN (otherwise). */
if (h->root.type == bfd_link_hash_undefweak)
return true;
if (!LARCH_REF_LOCAL (info, h))
return true;
if (bfd_is_abs_symbol (&h->root))
return true;
if (!record_relr (htab, htab->elf.sgot, h->got.offset,
htab->elf.srelgot))
return false;
return true;
}
static bool
record_relr_non_got_relocs (bfd *input_bfd, struct bfd_link_info *info,
asection *sec)
{
asection *sreloc;
struct loongarch_elf_link_hash_table *htab;
Elf_Internal_Rela *relocs, *rel, *rel_end;
Elf_Internal_Shdr *symtab_hdr;
struct elf_link_hash_entry **sym_hashes;
if (!bfd_link_pic (info))
return true;
if (sec->reloc_count == 0)
return true;
if ((sec->flags & (SEC_RELOC | SEC_ALLOC | SEC_DEBUGGING))
!= (SEC_RELOC | SEC_ALLOC))
return true;
if (sec->alignment_power == 0)
return true;
if (discarded_section (sec))
return true;
sreloc = elf_section_data (sec)->sreloc;
if (sreloc == NULL)
return true;
htab = loongarch_elf_hash_table (info);
symtab_hdr = &elf_symtab_hdr (input_bfd);
sym_hashes = elf_sym_hashes (input_bfd);
relocs = _bfd_elf_link_info_read_relocs (input_bfd, info, sec, NULL,
NULL, info->keep_memory);
BFD_ASSERT (relocs != NULL);
rel_end = relocs + sec->reloc_count;
for (rel = relocs; rel < rel_end; rel++)
{
unsigned r_symndx = ELFNN_R_SYM (rel->r_info);
unsigned int r_type = ELFNN_R_TYPE (rel->r_info);
struct elf_link_hash_entry *h = NULL;
asection *def_sec = NULL;
if ((r_type != R_LARCH_64 && r_type != R_LARCH_32)
|| rel->r_offset % 2 != 0)
continue;
/* The logical below must match loongarch_elf_relocate_section. */
if (r_symndx < symtab_hdr->sh_info)
{
/* A local symbol. */
Elf_Internal_Sym *isym;
isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache, input_bfd,
r_symndx);
BFD_ASSERT(isym != NULL);
/* Local STT_GNU_IFUNC symbol uses R_LARCH_IRELATIVE for
R_LARCH_NN, not R_LARCH_RELATIVE. */
if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
continue;
def_sec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
}
else
{
h = sym_hashes[r_symndx - symtab_hdr->sh_info];
while (h->root.type == bfd_link_hash_indirect
|| h->root.type == bfd_link_hash_warning)
h = (struct elf_link_hash_entry *) h->root.u.i.link;
/* Filter out symbols that cannot have a relative reloc. */
if (h->dyn_relocs == NULL)
continue;
if (bfd_is_abs_symbol (&h->root))
continue;
if (h->type == STT_GNU_IFUNC)
continue;
if (h->root.type == bfd_link_hash_defined
|| h->root.type == bfd_link_hash_defweak)
def_sec = h->root.u.def.section;
/* On LoongArch an R_LARCH_NN against undefined weak symbol
is never converted to R_LARCH_RELATIVE: we don't have
-z dynamic-undefined-weak, thus the reloc is either removed
(if the symbol is LARCH_REF_LOCAL) or kept (otherwise). */
if (h->root.type == bfd_link_hash_undefweak)
continue;
if (!LARCH_REF_LOCAL (info, h))
continue;
}
if (!def_sec || discarded_section (def_sec))
continue;
if (!record_relr (htab, sec, rel->r_offset, sreloc))
return false;
}
return true;
}
static int
cmp_relr_addr (const void *p, const void *q)
{
const bfd_vma *a = p, *b = q;
return (*a > *b) - (*a < *b);
}
static bool
sort_relr (struct bfd_link_info *info,
struct loongarch_elf_link_hash_table *htab)
{
if (htab->relr_count == 0)
return true;
bfd_vma *addr = htab->relr_sorted;
if (!addr)
{
addr = bfd_malloc (htab->relr_count * sizeof (*addr));
if (!addr)
return false;
htab->relr_sorted = addr;
}
for (bfd_size_type i = 0; i < htab->relr_count; i++)
{
bfd_vma off = _bfd_elf_section_offset (info->output_bfd, info,
htab->relr[i].sec,
htab->relr[i].off);
addr[i] = htab->relr[i].sec->output_section->vma
+ htab->relr[i].sec->output_offset + off;
}
qsort(addr, htab->relr_count, sizeof (*addr), cmp_relr_addr);
return true;
}
static bool
loongarch_elf_size_relative_relocs (struct bfd_link_info *info,
bool *need_layout)
{
struct loongarch_elf_link_hash_table *htab =
loongarch_elf_hash_table (info);
asection *srelrdyn = htab->elf.srelrdyn;
*need_layout = false;
if (!sort_relr (info, htab))
return false;
bfd_vma *addr = htab->relr_sorted;
BFD_ASSERT (srelrdyn != NULL);
bfd_size_type oldsize = srelrdyn->size;
srelrdyn->size = 0;
for (bfd_size_type i = 0; i < htab->relr_count; )
{
bfd_vma base = addr[i];
i++;
srelrdyn->size += NN / 8;
base += NN / 8;
while (1)
{
bfd_size_type start_i = i;
while (i < htab->relr_count
&& addr[i] - base < (NN - 1) * (NN / 8)
&& (addr[i] - base) % (NN / 8) == 0)
i++;
if (i == start_i)
break;
srelrdyn->size += NN / 8;
base += (NN - 1) * (NN / 8);
}
}
if (srelrdyn->size != oldsize)
{
*need_layout = true;
/* Stop after a few iterations in case the layout does not converge,
but we can only stop when the size would shrink (and pad the
spare space with 1. */
if (htab->relr_layout_iter++ > 5 && srelrdyn->size < oldsize)
{
srelrdyn->size = oldsize;
*need_layout = false;
}
}
htab->layout_mutating_for_relr = *need_layout;
return true;
}
static bool
loongarch_elf_finish_relative_relocs (struct bfd_link_info *info)
{
struct loongarch_elf_link_hash_table *htab =
loongarch_elf_hash_table (info);
asection *srelrdyn = htab->elf.srelrdyn;
bfd *dynobj = htab->elf.dynobj;
if (!srelrdyn || srelrdyn->size == 0)
return true;
srelrdyn->contents = bfd_alloc (dynobj, srelrdyn->size);
if (!srelrdyn->contents)
return false;
bfd_vma *addr = htab->relr_sorted;
bfd_byte *loc = srelrdyn->contents;
for (bfd_size_type i = 0; i < htab->relr_count; )
{
bfd_vma base = addr[i];
i++;
bfd_put_NN (dynobj, base, loc);
loc += NN / 8;
base += NN / 8;
while (1)
{
uintNN_t bits = 0;
while (i < htab->relr_count)
{
bfd_vma delta = addr[i] - base;
if (delta >= (NN - 1) * (NN / 8) || delta % (NN / 8) != 0)
break;
bits |= (uintNN_t) 1 << (delta / (NN / 8));
i++;
}
if (bits == 0)
break;
bfd_put_NN (dynobj, (bits << 1) | 1, loc);
loc += NN / 8;
base += (NN - 1) * (NN / 8);
}
}
free (addr);
htab->relr_sorted = NULL;
/* Pad any excess with 1's, a do-nothing encoding. */
while (loc < srelrdyn->contents + srelrdyn->size)
{
bfd_put_NN (dynobj, 1, loc);
loc += NN / 8;
}
return true;
}
static bool
loongarch_elf_late_size_sections (bfd *output_bfd,
struct bfd_link_info *info)
{
struct loongarch_elf_link_hash_table *htab;
bfd *dynobj;
asection *s;
bfd *ibfd;
htab = loongarch_elf_hash_table (info);
BFD_ASSERT (htab != NULL);
dynobj = htab->elf.dynobj;
if (dynobj == NULL)
return true;
if (htab->elf.dynamic_sections_created)
{
/* Set the contents of the .interp section to the interpreter. */
if (bfd_link_executable (info) && !info->nointerp)
{
const char *interpreter;
s = bfd_get_linker_section (dynobj, ".interp");
BFD_ASSERT (s != NULL);
if (elf_elfheader (output_bfd)->e_ident[EI_CLASS] == ELFCLASS32)
interpreter = "/lib32/ld.so.1";
else if (elf_elfheader (output_bfd)->e_ident[EI_CLASS] == ELFCLASS64)
interpreter = "/lib64/ld.so.1";
else
interpreter = "/lib/ld.so.1";
s->contents = (unsigned char *) interpreter;
s->size = strlen (interpreter) + 1;
}
}
/* Set up .got offsets for local syms, and space for local dynamic
relocs. */
for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
{
bfd_signed_vma *local_got;
bfd_signed_vma *end_local_got;
char *local_tls_type;
bfd_size_type locsymcount;
Elf_Internal_Shdr *symtab_hdr;
asection *srel;
if (!is_loongarch_elf (ibfd))
continue;
for (s = ibfd->sections; s != NULL; s = s->next)
{
struct elf_dyn_relocs *p;
for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
{
p->count -= p->pc_count;
if (!bfd_is_abs_section (p->sec)
&& bfd_is_abs_section (p->sec->output_section))
{
/* Input section has been discarded, either because
it is a copy of a linkonce section or due to
linker script /DISCARD/, so we'll be discarding
the relocs too. */
}
else if (0 < p->count)
{
srel = elf_section_data (p->sec)->sreloc;
srel->size += p->count * sizeof (ElfNN_External_Rela);
if ((p->sec->output_section->flags & SEC_READONLY) != 0)
info->flags |= DF_TEXTREL;
}
}
}
local_got = elf_local_got_refcounts (ibfd);
if (!local_got)
continue;
symtab_hdr = &elf_symtab_hdr (ibfd);
locsymcount = symtab_hdr->sh_info;
end_local_got = local_got + locsymcount;
local_tls_type = _bfd_loongarch_elf_local_got_tls_type (ibfd);
s = htab->elf.sgot;
srel = htab->elf.srelgot;
for (; local_got < end_local_got; ++local_got, ++local_tls_type)
{
if (0 < *local_got)
{
*local_got = s->size;
if (*local_tls_type & (GOT_TLS_GD | GOT_TLS_IE | GOT_TLS_GDESC))
{
/* TLS gd use two got. */
if (*local_tls_type & GOT_TLS_GD)
{
s->size += 2 * GOT_ENTRY_SIZE;
if (!bfd_link_executable (info))
srel->size += sizeof (ElfNN_External_Rela);
}
/* TLS_DESC use two got. */
if (*local_tls_type & GOT_TLS_GDESC)
{
s->size += 2 * GOT_ENTRY_SIZE;
srel->size += sizeof (ElfNN_External_Rela);
}
/* TLS ie and use one got. */
if (*local_tls_type & GOT_TLS_IE)
{
s->size += GOT_ENTRY_SIZE;
if (!bfd_link_executable (info))
srel->size += sizeof (ElfNN_External_Rela);
}
}
else
{
s->size += GOT_ENTRY_SIZE;
srel->size += sizeof (ElfNN_External_Rela);
}
}
else
*local_got = MINUS_ONE;
}
}
/* Allocate global sym .plt and .got entries, and space for global
sym dynamic relocs. */
elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
/* Allocate global ifunc sym .plt and .got entries, and space for
*preemptible* ifunc sym dynamic relocs. Note that we must do it
for *all* preemptible ifunc (including local ifuncs and STV_HIDDEN
ifuncs) before doing it for any non-preemptible ifunc symbol:
assuming we are not so careful, when we link a shared library the
correlation of .plt and .rela.plt might look like:
idx in .plt idx in .rela.plt
ext_func1@plt 0 0
ext_func2@plt 1 1
ext_func3@plt 2 2
hidden_ifunc1@plt 3 None: it's in .rela.got
hidden_ifunc2@plt 4 None: it's in .rela.got
normal_ifunc1@plt 5 != 3
normal_ifunc2@plt 6 != 4
local_ifunc@plt 7 None: it's in .rela.got
Now oops the indices for normal_ifunc{1,2} in .rela.plt were different
from the indices in .plt :(. This would break finish_dynamic_symbol
which assumes the index in .rela.plt matches the index in .plt.
So let's be careful and make it correct:
idx in .plt idx in .rela.plt
ext_func1@plt 0 0
ext_func2@plt 1 1
ext_func3@plt 2 2
normal_ifunc1@plt 3 3
normal_ifunc2@plt 4 4
hidden_ifunc1@plt 5 None: it's in .rela.got
hidden_ifunc2@plt 6 None: it's in .rela.got
local_ifunc@plt 7 None: it's in .rela.got
Now normal_ifuncs first. */
elf_link_hash_traverse (&htab->elf,
elfNN_allocate_ifunc_dynrelocs_ref_global, info);
/* Next hidden_ifuncs follows. */
elf_link_hash_traverse (&htab->elf,
elfNN_allocate_ifunc_dynrelocs_ref_local, info);
/* Finally local_ifuncs. */
htab_traverse (htab->loc_hash_table,
elfNN_allocate_local_ifunc_dynrelocs, info);
/* Don't allocate .got.plt section if there are no PLT. */
if (htab->elf.sgotplt && htab->elf.sgotplt->size == GOTPLT_HEADER_SIZE
&& (htab->elf.splt == NULL || htab->elf.splt->size == 0))
htab->elf.sgotplt->size = 0;
if (info->enable_dt_relr && !bfd_link_relocatable (info))
{
elf_link_hash_traverse (&htab->elf, record_relr_dyn_got_relocs, info);
for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
{
if (!is_loongarch_elf (ibfd))
continue;
for (s = ibfd->sections; s != NULL; s = s->next)
if (!record_relr_non_got_relocs (ibfd, info, s))
return false;
if (!record_relr_local_got_relocs (ibfd, info))
return false;
}
}
/* The check_relocs and adjust_dynamic_symbol entry points have
determined the sizes of the various dynamic sections. Allocate
memory for them. */
for (s = dynobj->sections; s != NULL; s = s->next)
{
if ((s->flags & SEC_LINKER_CREATED) == 0)
continue;
if (s == htab->elf.splt || s == htab->elf.iplt || s == htab->elf.sgot
|| s == htab->elf.sgotplt || s == htab->elf.igotplt
|| s == htab->elf.sdynbss || s == htab->elf.sdynrelro)
{
/* Strip this section if we don't need it; see the
comment below. */
}
else if (strncmp (s->name, ".rela", 5) == 0)
{
if (s->size != 0)
{
/* We use the reloc_count field as a counter if we need
to copy relocs into the output file. */
s->reloc_count = 0;
}
}
else if (s == htab->elf.srelrdyn && htab->relr_count == 0)
{
/* Remove .relr.dyn based on relr_count, not size, since
it is not sized yet. */
s->flags |= SEC_EXCLUDE;
/* Allocate contents later. */
continue;
}
else
{
/* It's not one of our sections. */
continue;
}
if (s->size == 0)
{
/* If we don't need this section, strip it from the
output file. This is mostly to handle .rela.bss and
.rela.plt. We must create both sections in
create_dynamic_sections, because they must be created
before the linker maps input sections to output
sections. The linker does that before
adjust_dynamic_symbol is called, and it is that
function which decides whether anything needs to go
into these sections. */
s->flags |= SEC_EXCLUDE;
continue;
}
if ((s->flags & SEC_HAS_CONTENTS) == 0)
continue;
/* Allocate memory for the section contents. Zero the memory
for the benefit of .rela.plt, which has 4 unused entries
at the beginning, and we don't want garbage. */
s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
if (s->contents == NULL)
return false;
}
if (elf_hash_table (info)->dynamic_sections_created)
{
/* Add some entries to the .dynamic section. We fill in the
values later, in loongarch_elf_finish_dynamic_sections, but we
must add the entries now so that we get the correct size for
the .dynamic section. The DT_DEBUG entry is filled in by the
dynamic linker and used by the debugger. */
#define add_dynamic_entry(TAG, VAL) _bfd_elf_add_dynamic_entry (info, TAG, VAL)
if (bfd_link_executable (info))
{
if (!add_dynamic_entry (DT_DEBUG, 0))
return false;
}
if (htab->elf.srelplt->size != 0)
{
if (!add_dynamic_entry (DT_PLTGOT, 0)
|| !add_dynamic_entry (DT_PLTRELSZ, 0)
|| !add_dynamic_entry (DT_PLTREL, DT_RELA)
|| !add_dynamic_entry (DT_JMPREL, 0))
return false;
}
if (!add_dynamic_entry (DT_RELA, 0)
|| !add_dynamic_entry (DT_RELASZ, 0)
|| !add_dynamic_entry (DT_RELAENT, sizeof (ElfNN_External_Rela)))
return false;
/* If any dynamic relocs apply to a read-only section,
then we need a DT_TEXTREL entry. */
if ((info->flags & DF_TEXTREL) == 0)
elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
if (info->flags & DF_TEXTREL)
{
if (!add_dynamic_entry (DT_TEXTREL, 0))
return false;
/* Clear the DF_TEXTREL flag. It will be set again if we
write out an actual text relocation; we may not, because
at this point we do not know whether e.g. any .eh_frame
absolute relocations have been converted to PC-relative. */
info->flags &= ~DF_TEXTREL;
}
}
#undef add_dynamic_entry
return true;
}
#define LARCH_LD_STACK_DEPTH 16
static int64_t larch_opc_stack[LARCH_LD_STACK_DEPTH];
static size_t larch_stack_top = 0;
static bfd_reloc_status_type
loongarch_push (int64_t val)
{
if (LARCH_LD_STACK_DEPTH <= larch_stack_top)
return bfd_reloc_outofrange;
larch_opc_stack[larch_stack_top++] = val;
return bfd_reloc_ok;
}
static bfd_reloc_status_type
loongarch_pop (int64_t *val)
{
if (larch_stack_top == 0)
return bfd_reloc_outofrange;
BFD_ASSERT (val);
*val = larch_opc_stack[--larch_stack_top];
return bfd_reloc_ok;
}
static bfd_reloc_status_type
loongarch_top (int64_t *val)
{
if (larch_stack_top == 0)
return bfd_reloc_outofrange;
BFD_ASSERT (val);
*val = larch_opc_stack[larch_stack_top - 1];
return bfd_reloc_ok;
}
static void
loongarch_elf_append_rela (bfd *abfd, asection *s, Elf_Internal_Rela *rel)
{
BFD_ASSERT (s && s->contents);
const struct elf_backend_data *bed;
bfd_byte *loc;
bed = get_elf_backend_data (abfd);
if (!(s->size > s->reloc_count * bed->s->sizeof_rela))
BFD_ASSERT (s->size > s->reloc_count * bed->s->sizeof_rela);
loc = s->contents + (s->reloc_count++ * bed->s->sizeof_rela);
bed->s->swap_reloca_out (abfd, rel, loc);
}
/* Check rel->r_offset in range of contents. */
static bfd_reloc_status_type
loongarch_check_offset (const Elf_Internal_Rela *rel,
const asection *input_section)
{
if (0 == strcmp(input_section->name, ".text")
&& rel->r_offset > input_section->size)
return bfd_reloc_overflow;
return bfd_reloc_ok;
}
#define LARCH_RELOC_PERFORM_3OP(op1, op2, op3) \
({ \
bfd_reloc_status_type ret = loongarch_pop (&op2); \
if (ret == bfd_reloc_ok) \
{ \
ret = loongarch_pop (&op1); \
if (ret == bfd_reloc_ok) \
ret = loongarch_push (op3); \
} \
ret; \
})
/* Write immediate to instructions. */
static bfd_reloc_status_type
loongarch_reloc_rewrite_imm_insn (const Elf_Internal_Rela *rel,
const asection *input_section ATTRIBUTE_UNUSED,
reloc_howto_type *howto, bfd *input_bfd,
bfd_byte *contents, bfd_vma reloc_val)
{
/* Adjust the immediate based on alignment and
its position in the instruction. */
if (!loongarch_adjust_reloc_bitsfield (input_bfd, howto, &reloc_val))
return bfd_reloc_overflow;
int bits = bfd_get_reloc_size (howto) * 8;
uint64_t insn = bfd_get (bits, input_bfd, contents + rel->r_offset);
/* Write immediate to instruction. */
insn = (insn & ~howto->dst_mask) | (reloc_val & howto->dst_mask);
bfd_put (bits, input_bfd, insn, contents + rel->r_offset);
return bfd_reloc_ok;
}
static bfd_reloc_status_type
perform_relocation (const Elf_Internal_Rela *rel, asection *input_section,
reloc_howto_type *howto, bfd_vma value,
bfd *input_bfd, bfd_byte *contents)
{
int64_t opr1, opr2, opr3;
bfd_reloc_status_type r = bfd_reloc_ok;
int bits = bfd_get_reloc_size (howto) * 8;
switch (ELFNN_R_TYPE (rel->r_info))
{
case R_LARCH_SOP_PUSH_PCREL:
case R_LARCH_SOP_PUSH_ABSOLUTE:
case R_LARCH_SOP_PUSH_GPREL:
case R_LARCH_SOP_PUSH_TLS_TPREL:
case R_LARCH_SOP_PUSH_TLS_GOT:
case R_LARCH_SOP_PUSH_TLS_GD:
case R_LARCH_SOP_PUSH_PLT_PCREL:
r = loongarch_push (value);
break;
case R_LARCH_SOP_PUSH_DUP:
r = loongarch_pop (&opr1);
if (r == bfd_reloc_ok)
{
r = loongarch_push (opr1);
if (r == bfd_reloc_ok)
r = loongarch_push (opr1);
}
break;
case R_LARCH_SOP_ASSERT:
r = loongarch_pop (&opr1);
if (r != bfd_reloc_ok || !opr1)
r = bfd_reloc_notsupported;
break;
case R_LARCH_SOP_NOT:
r = loongarch_pop (&opr1);
if (r == bfd_reloc_ok)
r = loongarch_push (!opr1);
break;
case R_LARCH_SOP_SUB:
r = LARCH_RELOC_PERFORM_3OP (opr1, opr2, opr1 - opr2);
break;
case R_LARCH_SOP_SL:
r = LARCH_RELOC_PERFORM_3OP (opr1, opr2, opr1 << opr2);
break;
case R_LARCH_SOP_SR:
r = LARCH_RELOC_PERFORM_3OP (opr1, opr2, opr1 >> opr2);
break;
case R_LARCH_SOP_AND:
r = LARCH_RELOC_PERFORM_3OP (opr1, opr2, opr1 & opr2);
break;
case R_LARCH_SOP_ADD:
r = LARCH_RELOC_PERFORM_3OP (opr1, opr2, opr1 + opr2);
break;
case R_LARCH_SOP_IF_ELSE:
r = loongarch_pop (&opr3);
if (r == bfd_reloc_ok)
{
r = loongarch_pop (&opr2);
if (r == bfd_reloc_ok)
{
r = loongarch_pop (&opr1);
if (r == bfd_reloc_ok)
r = loongarch_push (opr1 ? opr2 : opr3);
}
}
break;
case R_LARCH_SOP_POP_32_S_10_5:
case R_LARCH_SOP_POP_32_S_10_12:
case R_LARCH_SOP_POP_32_S_10_16:
case R_LARCH_SOP_POP_32_S_10_16_S2:
case R_LARCH_SOP_POP_32_S_0_5_10_16_S2:
case R_LARCH_SOP_POP_32_S_0_10_10_16_S2:
case R_LARCH_SOP_POP_32_S_5_20:
case R_LARCH_SOP_POP_32_U_10_12:
case R_LARCH_SOP_POP_32_U:
r = loongarch_pop (&opr1);
if (r != bfd_reloc_ok)
break;
r = loongarch_check_offset (rel, input_section);
if (r != bfd_reloc_ok)
break;
r = loongarch_reloc_rewrite_imm_insn (rel, input_section,
howto, input_bfd,
contents, (bfd_vma)opr1);
break;
case R_LARCH_TLS_DTPREL32:
case R_LARCH_32:
case R_LARCH_TLS_DTPREL64:
case R_LARCH_64:
r = loongarch_check_offset (rel, input_section);
if (r != bfd_reloc_ok)
break;
bfd_put (bits, input_bfd, value, contents + rel->r_offset);
break;
/* LoongArch only has add/sub reloc pair, not has set/sub reloc pair.
Because set/sub reloc pair not support multi-thread. While add/sub
reloc pair process order not affect the final result.
For add/sub reloc, the original value will be involved in the
calculation. In order not to add/sub extra value, we write 0 to symbol
address at assembly time.
add/sub reloc bits determined by the value after symbol subtraction,
not symbol value.
add/sub reloc save part of the symbol value, so we only need to
save howto->dst_mask bits. */
case R_LARCH_ADD6:
case R_LARCH_SUB6:
{
bfd_vma word = bfd_get (howto->bitsize, input_bfd,
contents + rel->r_offset);
word = (word & ~howto->dst_mask) | (value & howto->dst_mask);
bfd_put (howto->bitsize, input_bfd, word, contents + rel->r_offset);
r = bfd_reloc_ok;
break;
}
/* Not need to read the original value, just write the new value. */
case R_LARCH_ADD8:
case R_LARCH_ADD16:
case R_LARCH_ADD24:
case R_LARCH_ADD32:
case R_LARCH_ADD64:
case R_LARCH_SUB8:
case R_LARCH_SUB16:
case R_LARCH_SUB24:
case R_LARCH_SUB32:
case R_LARCH_SUB64:
{
/* Because add/sub reloc is processed separately,
so the high bits is invalid. */
bfd_vma word = value & howto->dst_mask;
bfd_put (howto->bitsize, input_bfd, word, contents + rel->r_offset);
r = bfd_reloc_ok;
break;
}
case R_LARCH_ADD_ULEB128:
case R_LARCH_SUB_ULEB128:
{
unsigned int len = 0;
/* Before write uleb128, first read it to get it's length. */
_bfd_read_unsigned_leb128 (input_bfd, contents + rel->r_offset, &len);
loongarch_write_unsigned_leb128 (contents + rel->r_offset, len, value);
r = bfd_reloc_ok;
break;
}
/* For eh_frame and debug info. */
case R_LARCH_32_PCREL:
case R_LARCH_64_PCREL:
{
value -= sec_addr (input_section) + rel->r_offset;
value += rel->r_addend;
bfd_vma word = bfd_get (howto->bitsize, input_bfd,
contents + rel->r_offset);
word = (word & ~howto->dst_mask) | (value & howto->dst_mask);
bfd_put (howto->bitsize, input_bfd, word, contents + rel->r_offset);
r = bfd_reloc_ok;
break;
}
/* New reloc type.
R_LARCH_B16 ~ R_LARCH_TLS_GD_HI20. */
case R_LARCH_B16:
case R_LARCH_B21:
case R_LARCH_B26:
case R_LARCH_ABS_HI20:
case R_LARCH_ABS_LO12:
case R_LARCH_ABS64_LO20:
case R_LARCH_ABS64_HI12:
case R_LARCH_PCALA_HI20:
case R_LARCH_PCALA_LO12:
case R_LARCH_PCALA64_LO20:
case R_LARCH_PCALA64_HI12:
case R_LARCH_GOT_PC_HI20:
case R_LARCH_GOT_PC_LO12:
case R_LARCH_GOT64_PC_LO20:
case R_LARCH_GOT64_PC_HI12:
case R_LARCH_GOT_HI20:
case R_LARCH_GOT_LO12:
case R_LARCH_GOT64_LO20:
case R_LARCH_GOT64_HI12:
case R_LARCH_TLS_LE_HI20:
case R_LARCH_TLS_LE_LO12:
case R_LARCH_TLS_LE_HI20_R:
case R_LARCH_TLS_LE_LO12_R:
case R_LARCH_TLS_LE64_LO20:
case R_LARCH_TLS_LE64_HI12:
case R_LARCH_TLS_IE_PC_HI20:
case R_LARCH_TLS_IE_PC_LO12:
case R_LARCH_TLS_IE64_PC_LO20:
case R_LARCH_TLS_IE64_PC_HI12:
case R_LARCH_TLS_IE_HI20:
case R_LARCH_TLS_IE_LO12:
case R_LARCH_TLS_IE64_LO20:
case R_LARCH_TLS_IE64_HI12:
case R_LARCH_TLS_LD_PC_HI20:
case R_LARCH_TLS_LD_HI20:
case R_LARCH_TLS_GD_PC_HI20:
case R_LARCH_TLS_GD_HI20:
case R_LARCH_PCREL20_S2:
case R_LARCH_CALL36:
case R_LARCH_TLS_DESC_PC_HI20:
case R_LARCH_TLS_DESC_PC_LO12:
case R_LARCH_TLS_DESC64_PC_LO20:
case R_LARCH_TLS_DESC64_PC_HI12:
case R_LARCH_TLS_DESC_HI20:
case R_LARCH_TLS_DESC_LO12:
case R_LARCH_TLS_DESC64_LO20:
case R_LARCH_TLS_DESC64_HI12:
case R_LARCH_TLS_LD_PCREL20_S2:
case R_LARCH_TLS_GD_PCREL20_S2:
case R_LARCH_TLS_DESC_PCREL20_S2:
r = loongarch_check_offset (rel, input_section);
if (r != bfd_reloc_ok)
break;
r = loongarch_reloc_rewrite_imm_insn (rel, input_section,
howto, input_bfd,
contents, value);
break;
case R_LARCH_TLS_DESC_LD:
case R_LARCH_TLS_DESC_CALL:
r = bfd_reloc_ok;
break;
case R_LARCH_RELAX:
case R_LARCH_TLS_LE_ADD_R:
break;
default:
r = bfd_reloc_notsupported;
}
return r;
}
#define LARCH_RECENT_RELOC_QUEUE_LENGTH 72
static struct
{
bfd *bfd;
asection *section;
bfd_vma r_offset;
int r_type;
bfd_vma relocation;
Elf_Internal_Sym *sym;
struct elf_link_hash_entry *h;
bfd_vma addend;
int64_t top_then;
} larch_reloc_queue[LARCH_RECENT_RELOC_QUEUE_LENGTH];
static size_t larch_reloc_queue_head = 0;
static size_t larch_reloc_queue_tail = 0;
static const char *
loongarch_sym_name (bfd *input_bfd, struct elf_link_hash_entry *h,
Elf_Internal_Sym *sym)
{
const char *ret = NULL;
if (sym)
ret = bfd_elf_string_from_elf_section (input_bfd,
elf_symtab_hdr (input_bfd).sh_link,
sym->st_name);
else if (h)
ret = h->root.root.string;
if (ret == NULL || *ret == '\0')
ret = "<nameless>";
return ret;
}
static void
loongarch_record_one_reloc (bfd *abfd, asection *section, int r_type,
bfd_vma r_offset, Elf_Internal_Sym *sym,
struct elf_link_hash_entry *h, bfd_vma addend)
{
if ((larch_reloc_queue_head == 0
&& larch_reloc_queue_tail == LARCH_RECENT_RELOC_QUEUE_LENGTH - 1)
|| larch_reloc_queue_head == larch_reloc_queue_tail + 1)
larch_reloc_queue_head =
(larch_reloc_queue_head + 1) % LARCH_RECENT_RELOC_QUEUE_LENGTH;
larch_reloc_queue[larch_reloc_queue_tail].bfd = abfd;
larch_reloc_queue[larch_reloc_queue_tail].section = section;
larch_reloc_queue[larch_reloc_queue_tail].r_offset = r_offset;
larch_reloc_queue[larch_reloc_queue_tail].r_type = r_type;
larch_reloc_queue[larch_reloc_queue_tail].sym = sym;
larch_reloc_queue[larch_reloc_queue_tail].h = h;
larch_reloc_queue[larch_reloc_queue_tail].addend = addend;
loongarch_top (&larch_reloc_queue[larch_reloc_queue_tail].top_then);
larch_reloc_queue_tail =
(larch_reloc_queue_tail + 1) % LARCH_RECENT_RELOC_QUEUE_LENGTH;
}
static void
loongarch_dump_reloc_record (void (*p) (const char *fmt, ...))
{
size_t i = larch_reloc_queue_head;
bfd *a_bfd = NULL;
asection *section = NULL;
bfd_vma r_offset = 0;
int inited = 0;
p ("Dump relocate record:\n");
p ("stack top\t\trelocation name\t\tsymbol");
while (i != larch_reloc_queue_tail)
{
if (a_bfd != larch_reloc_queue[i].bfd
|| section != larch_reloc_queue[i].section
|| r_offset != larch_reloc_queue[i].r_offset)
{
a_bfd = larch_reloc_queue[i].bfd;
section = larch_reloc_queue[i].section;
r_offset = larch_reloc_queue[i].r_offset;
p ("\nat %pB(%pA+0x%v):\n", larch_reloc_queue[i].bfd,
larch_reloc_queue[i].section, larch_reloc_queue[i].r_offset);
}
if (!inited)
inited = 1, p ("...\n");
reloc_howto_type *howto =
loongarch_elf_rtype_to_howto (larch_reloc_queue[i].bfd,
larch_reloc_queue[i].r_type);
p ("0x%V %s\t`%s'", (bfd_vma) larch_reloc_queue[i].top_then,
howto ? howto->name : "<unknown reloc>",
loongarch_sym_name (larch_reloc_queue[i].bfd, larch_reloc_queue[i].h,
larch_reloc_queue[i].sym));
long addend = larch_reloc_queue[i].addend;
if (addend < 0)
p (" - %ld", -addend);
else if (0 < addend)
p (" + %ld(0x%v)", addend, larch_reloc_queue[i].addend);
p ("\n");
i = (i + 1) % LARCH_RECENT_RELOC_QUEUE_LENGTH;
}
p ("\n"
"-- Record dump end --\n\n");
}
static bool
loongarch_reloc_is_fatal (struct bfd_link_info *info,
bfd *input_bfd,
asection *input_section,
Elf_Internal_Rela *rel,
reloc_howto_type *howto,
bfd_reloc_status_type rtype,
bool is_undefweak,
const char *name,
const char *msg)
{
bool fatal = true;
switch (rtype)
{
/* 'dangerous' means we do it but can't promise it's ok
'unsupport' means out of ability of relocation type
'undefined' means we can't deal with the undefined symbol. */
case bfd_reloc_undefined:
info->callbacks->undefined_symbol (info, name, input_bfd, input_section,
rel->r_offset, true);
info->callbacks->info ("%X%pB(%pA+0x%v): error: %s against %s`%s':\n%s\n",
input_bfd, input_section, rel->r_offset,
howto->name,
is_undefweak ? "[undefweak] " : "", name, msg);
break;
case bfd_reloc_dangerous:
info->callbacks->info ("%pB(%pA+0x%v): warning: %s against %s`%s':\n%s\n",
input_bfd, input_section, rel->r_offset,
howto->name,
is_undefweak ? "[undefweak] " : "", name, msg);
fatal = false;
break;
case bfd_reloc_notsupported:
info->callbacks->info ("%X%pB(%pA+0x%v): error: %s against %s`%s':\n%s\n",
input_bfd, input_section, rel->r_offset,
howto->name,
is_undefweak ? "[undefweak] " : "", name, msg);
break;