1 /* Matsushita 10300 specific support for 32-bit ELF
2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
4 This file is part of BFD, the Binary File Descriptor library.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
25 #include "elf/mn10300.h"
26 #include "libiberty.h"
28 /* The mn10300 linker needs to keep track of the number of relocs that
29 it decides to copy in check_relocs for each symbol. This is so
30 that it can discard PC relative relocs if it doesn't need them when
31 linking with -Bsymbolic. We store the information in a field
32 extending the regular ELF linker hash table. */
34 struct elf32_mn10300_link_hash_entry
36 /* The basic elf link hash table entry. */
37 struct elf_link_hash_entry root
;
39 /* For function symbols, the number of times this function is
40 called directly (ie by name). */
41 unsigned int direct_calls
;
43 /* For function symbols, the size of this function's stack
44 (if <= 255 bytes). We stuff this into "call" instructions
45 to this target when it's valid and profitable to do so.
47 This does not include stack allocated by movm! */
48 unsigned char stack_size
;
50 /* For function symbols, arguments (if any) for movm instruction
51 in the prologue. We stuff this value into "call" instructions
52 to the target when it's valid and profitable to do so. */
53 unsigned char movm_args
;
55 /* For function symbols, the amount of stack space that would be allocated
56 by the movm instruction. This is redundant with movm_args, but we
57 add it to the hash table to avoid computing it over and over. */
58 unsigned char movm_stack_size
;
60 /* When set, convert all "call" instructions to this target into "calls"
62 #define MN10300_CONVERT_CALL_TO_CALLS 0x1
64 /* Used to mark functions which have had redundant parts of their
66 #define MN10300_DELETED_PROLOGUE_BYTES 0x2
69 /* Calculated value. */
77 /* Used to distinguish GOT entries for TLS types from normal GOT entries. */
78 unsigned char tls_type
;
81 /* We derive a hash table from the main elf linker hash table so
82 we can store state variables and a secondary hash table without
83 resorting to global variables. */
84 struct elf32_mn10300_link_hash_table
86 /* The main hash table. */
87 struct elf_link_hash_table root
;
89 /* A hash table for static functions. We could derive a new hash table
90 instead of using the full elf32_mn10300_link_hash_table if we wanted
91 to save some memory. */
92 struct elf32_mn10300_link_hash_table
*static_hash_table
;
94 /* Random linker state flags. */
95 #define MN10300_HASH_ENTRIES_INITIALIZED 0x1
99 bfd_signed_vma refcount
;
106 #define elf_mn10300_hash_entry(ent) ((struct elf32_mn10300_link_hash_entry *)(ent))
108 struct elf_mn10300_obj_tdata
110 struct elf_obj_tdata root
;
112 /* tls_type for each local got entry. */
113 char * local_got_tls_type
;
116 #define elf_mn10300_tdata(abfd) \
117 ((struct elf_mn10300_obj_tdata *) (abfd)->tdata.any)
119 #define elf_mn10300_local_got_tls_type(abfd) \
120 (elf_mn10300_tdata (abfd)->local_got_tls_type)
123 #define streq(a, b) (strcmp ((a),(b)) == 0)
126 /* For MN10300 linker hash table. */
128 /* Get the MN10300 ELF linker hash table from a link_info structure. */
130 #define elf32_mn10300_hash_table(p) \
131 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
132 == MN10300_ELF_DATA ? ((struct elf32_mn10300_link_hash_table *) ((p)->hash)) : NULL)
134 #define elf32_mn10300_link_hash_traverse(table, func, info) \
135 (elf_link_hash_traverse \
137 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
140 static reloc_howto_type elf_mn10300_howto_table
[] =
142 /* Dummy relocation. Does nothing. */
143 HOWTO (R_MN10300_NONE
,
149 complain_overflow_dont
,
150 bfd_elf_generic_reloc
,
156 /* Standard 32 bit reloc. */
163 complain_overflow_bitfield
,
164 bfd_elf_generic_reloc
,
170 /* Standard 16 bit reloc. */
177 complain_overflow_bitfield
,
178 bfd_elf_generic_reloc
,
184 /* Standard 8 bit reloc. */
191 complain_overflow_bitfield
,
192 bfd_elf_generic_reloc
,
198 /* Standard 32bit pc-relative reloc. */
199 HOWTO (R_MN10300_PCREL32
,
205 complain_overflow_bitfield
,
206 bfd_elf_generic_reloc
,
212 /* Standard 16bit pc-relative reloc. */
213 HOWTO (R_MN10300_PCREL16
,
219 complain_overflow_bitfield
,
220 bfd_elf_generic_reloc
,
226 /* Standard 8 pc-relative reloc. */
227 HOWTO (R_MN10300_PCREL8
,
233 complain_overflow_bitfield
,
234 bfd_elf_generic_reloc
,
241 /* GNU extension to record C++ vtable hierarchy. */
242 HOWTO (R_MN10300_GNU_VTINHERIT
, /* type */
244 0, /* size (0 = byte, 1 = short, 2 = long) */
246 FALSE
, /* pc_relative */
248 complain_overflow_dont
, /* complain_on_overflow */
249 NULL
, /* special_function */
250 "R_MN10300_GNU_VTINHERIT", /* name */
251 FALSE
, /* partial_inplace */
254 FALSE
), /* pcrel_offset */
256 /* GNU extension to record C++ vtable member usage */
257 HOWTO (R_MN10300_GNU_VTENTRY
, /* type */
259 0, /* size (0 = byte, 1 = short, 2 = long) */
261 FALSE
, /* pc_relative */
263 complain_overflow_dont
, /* complain_on_overflow */
264 NULL
, /* special_function */
265 "R_MN10300_GNU_VTENTRY", /* name */
266 FALSE
, /* partial_inplace */
269 FALSE
), /* pcrel_offset */
271 /* Standard 24 bit reloc. */
278 complain_overflow_bitfield
,
279 bfd_elf_generic_reloc
,
285 HOWTO (R_MN10300_GOTPC32
, /* type */
287 2, /* size (0 = byte, 1 = short, 2 = long) */
289 TRUE
, /* pc_relative */
291 complain_overflow_bitfield
, /* complain_on_overflow */
292 bfd_elf_generic_reloc
, /* */
293 "R_MN10300_GOTPC32", /* name */
294 FALSE
, /* partial_inplace */
295 0xffffffff, /* src_mask */
296 0xffffffff, /* dst_mask */
297 TRUE
), /* pcrel_offset */
299 HOWTO (R_MN10300_GOTPC16
, /* type */
301 1, /* size (0 = byte, 1 = short, 2 = long) */
303 TRUE
, /* pc_relative */
305 complain_overflow_bitfield
, /* complain_on_overflow */
306 bfd_elf_generic_reloc
, /* */
307 "R_MN10300_GOTPC16", /* name */
308 FALSE
, /* partial_inplace */
309 0xffff, /* src_mask */
310 0xffff, /* dst_mask */
311 TRUE
), /* pcrel_offset */
313 HOWTO (R_MN10300_GOTOFF32
, /* type */
315 2, /* size (0 = byte, 1 = short, 2 = long) */
317 FALSE
, /* pc_relative */
319 complain_overflow_bitfield
, /* complain_on_overflow */
320 bfd_elf_generic_reloc
, /* */
321 "R_MN10300_GOTOFF32", /* name */
322 FALSE
, /* partial_inplace */
323 0xffffffff, /* src_mask */
324 0xffffffff, /* dst_mask */
325 FALSE
), /* pcrel_offset */
327 HOWTO (R_MN10300_GOTOFF24
, /* type */
329 2, /* size (0 = byte, 1 = short, 2 = long) */
331 FALSE
, /* pc_relative */
333 complain_overflow_bitfield
, /* complain_on_overflow */
334 bfd_elf_generic_reloc
, /* */
335 "R_MN10300_GOTOFF24", /* name */
336 FALSE
, /* partial_inplace */
337 0xffffff, /* src_mask */
338 0xffffff, /* dst_mask */
339 FALSE
), /* pcrel_offset */
341 HOWTO (R_MN10300_GOTOFF16
, /* type */
343 1, /* size (0 = byte, 1 = short, 2 = long) */
345 FALSE
, /* pc_relative */
347 complain_overflow_bitfield
, /* complain_on_overflow */
348 bfd_elf_generic_reloc
, /* */
349 "R_MN10300_GOTOFF16", /* name */
350 FALSE
, /* partial_inplace */
351 0xffff, /* src_mask */
352 0xffff, /* dst_mask */
353 FALSE
), /* pcrel_offset */
355 HOWTO (R_MN10300_PLT32
, /* type */
357 2, /* size (0 = byte, 1 = short, 2 = long) */
359 TRUE
, /* pc_relative */
361 complain_overflow_bitfield
, /* complain_on_overflow */
362 bfd_elf_generic_reloc
, /* */
363 "R_MN10300_PLT32", /* name */
364 FALSE
, /* partial_inplace */
365 0xffffffff, /* src_mask */
366 0xffffffff, /* dst_mask */
367 TRUE
), /* pcrel_offset */
369 HOWTO (R_MN10300_PLT16
, /* type */
371 1, /* size (0 = byte, 1 = short, 2 = long) */
373 TRUE
, /* pc_relative */
375 complain_overflow_bitfield
, /* complain_on_overflow */
376 bfd_elf_generic_reloc
, /* */
377 "R_MN10300_PLT16", /* name */
378 FALSE
, /* partial_inplace */
379 0xffff, /* src_mask */
380 0xffff, /* dst_mask */
381 TRUE
), /* pcrel_offset */
383 HOWTO (R_MN10300_GOT32
, /* type */
385 2, /* size (0 = byte, 1 = short, 2 = long) */
387 FALSE
, /* pc_relative */
389 complain_overflow_bitfield
, /* complain_on_overflow */
390 bfd_elf_generic_reloc
, /* */
391 "R_MN10300_GOT32", /* name */
392 FALSE
, /* partial_inplace */
393 0xffffffff, /* src_mask */
394 0xffffffff, /* dst_mask */
395 FALSE
), /* pcrel_offset */
397 HOWTO (R_MN10300_GOT24
, /* type */
399 2, /* size (0 = byte, 1 = short, 2 = long) */
401 FALSE
, /* pc_relative */
403 complain_overflow_bitfield
, /* complain_on_overflow */
404 bfd_elf_generic_reloc
, /* */
405 "R_MN10300_GOT24", /* name */
406 FALSE
, /* partial_inplace */
407 0xffffffff, /* src_mask */
408 0xffffffff, /* dst_mask */
409 FALSE
), /* pcrel_offset */
411 HOWTO (R_MN10300_GOT16
, /* type */
413 1, /* size (0 = byte, 1 = short, 2 = long) */
415 FALSE
, /* pc_relative */
417 complain_overflow_bitfield
, /* complain_on_overflow */
418 bfd_elf_generic_reloc
, /* */
419 "R_MN10300_GOT16", /* name */
420 FALSE
, /* partial_inplace */
421 0xffffffff, /* src_mask */
422 0xffffffff, /* dst_mask */
423 FALSE
), /* pcrel_offset */
425 HOWTO (R_MN10300_COPY
, /* type */
427 2, /* size (0 = byte, 1 = short, 2 = long) */
429 FALSE
, /* pc_relative */
431 complain_overflow_bitfield
, /* complain_on_overflow */
432 bfd_elf_generic_reloc
, /* */
433 "R_MN10300_COPY", /* name */
434 FALSE
, /* partial_inplace */
435 0xffffffff, /* src_mask */
436 0xffffffff, /* dst_mask */
437 FALSE
), /* pcrel_offset */
439 HOWTO (R_MN10300_GLOB_DAT
, /* type */
441 2, /* size (0 = byte, 1 = short, 2 = long) */
443 FALSE
, /* pc_relative */
445 complain_overflow_bitfield
, /* complain_on_overflow */
446 bfd_elf_generic_reloc
, /* */
447 "R_MN10300_GLOB_DAT", /* name */
448 FALSE
, /* partial_inplace */
449 0xffffffff, /* src_mask */
450 0xffffffff, /* dst_mask */
451 FALSE
), /* pcrel_offset */
453 HOWTO (R_MN10300_JMP_SLOT
, /* type */
455 2, /* size (0 = byte, 1 = short, 2 = long) */
457 FALSE
, /* pc_relative */
459 complain_overflow_bitfield
, /* complain_on_overflow */
460 bfd_elf_generic_reloc
, /* */
461 "R_MN10300_JMP_SLOT", /* name */
462 FALSE
, /* partial_inplace */
463 0xffffffff, /* src_mask */
464 0xffffffff, /* dst_mask */
465 FALSE
), /* pcrel_offset */
467 HOWTO (R_MN10300_RELATIVE
, /* type */
469 2, /* size (0 = byte, 1 = short, 2 = long) */
471 FALSE
, /* pc_relative */
473 complain_overflow_bitfield
, /* complain_on_overflow */
474 bfd_elf_generic_reloc
, /* */
475 "R_MN10300_RELATIVE", /* name */
476 FALSE
, /* partial_inplace */
477 0xffffffff, /* src_mask */
478 0xffffffff, /* dst_mask */
479 FALSE
), /* pcrel_offset */
481 HOWTO (R_MN10300_TLS_GD
, /* type */
483 2, /* size (0 = byte, 1 = short, 2 = long) */
485 FALSE
, /* pc_relative */
487 complain_overflow_bitfield
, /* complain_on_overflow */
488 bfd_elf_generic_reloc
, /* */
489 "R_MN10300_TLS_GD", /* name */
490 FALSE
, /* partial_inplace */
491 0xffffffff, /* src_mask */
492 0xffffffff, /* dst_mask */
493 FALSE
), /* pcrel_offset */
495 HOWTO (R_MN10300_TLS_LD
, /* type */
497 2, /* size (0 = byte, 1 = short, 2 = long) */
499 FALSE
, /* pc_relative */
501 complain_overflow_bitfield
, /* complain_on_overflow */
502 bfd_elf_generic_reloc
, /* */
503 "R_MN10300_TLS_LD", /* name */
504 FALSE
, /* partial_inplace */
505 0xffffffff, /* src_mask */
506 0xffffffff, /* dst_mask */
507 FALSE
), /* pcrel_offset */
509 HOWTO (R_MN10300_TLS_LDO
, /* type */
511 2, /* size (0 = byte, 1 = short, 2 = long) */
513 FALSE
, /* pc_relative */
515 complain_overflow_bitfield
, /* complain_on_overflow */
516 bfd_elf_generic_reloc
, /* */
517 "R_MN10300_TLS_LDO", /* name */
518 FALSE
, /* partial_inplace */
519 0xffffffff, /* src_mask */
520 0xffffffff, /* dst_mask */
521 FALSE
), /* pcrel_offset */
523 HOWTO (R_MN10300_TLS_GOTIE
, /* type */
525 2, /* size (0 = byte, 1 = short, 2 = long) */
527 FALSE
, /* pc_relative */
529 complain_overflow_bitfield
, /* complain_on_overflow */
530 bfd_elf_generic_reloc
, /* */
531 "R_MN10300_TLS_GOTIE", /* name */
532 FALSE
, /* partial_inplace */
533 0xffffffff, /* src_mask */
534 0xffffffff, /* dst_mask */
535 FALSE
), /* pcrel_offset */
537 HOWTO (R_MN10300_TLS_IE
, /* type */
539 2, /* size (0 = byte, 1 = short, 2 = long) */
541 FALSE
, /* pc_relative */
543 complain_overflow_bitfield
, /* complain_on_overflow */
544 bfd_elf_generic_reloc
, /* */
545 "R_MN10300_TLS_IE", /* name */
546 FALSE
, /* partial_inplace */
547 0xffffffff, /* src_mask */
548 0xffffffff, /* dst_mask */
549 FALSE
), /* pcrel_offset */
551 HOWTO (R_MN10300_TLS_LE
, /* type */
553 2, /* size (0 = byte, 1 = short, 2 = long) */
555 FALSE
, /* pc_relative */
557 complain_overflow_bitfield
, /* complain_on_overflow */
558 bfd_elf_generic_reloc
, /* */
559 "R_MN10300_TLS_LE", /* name */
560 FALSE
, /* partial_inplace */
561 0xffffffff, /* src_mask */
562 0xffffffff, /* dst_mask */
563 FALSE
), /* pcrel_offset */
565 HOWTO (R_MN10300_TLS_DTPMOD
, /* type */
567 2, /* size (0 = byte, 1 = short, 2 = long) */
569 FALSE
, /* pc_relative */
571 complain_overflow_bitfield
, /* complain_on_overflow */
572 bfd_elf_generic_reloc
, /* */
573 "R_MN10300_TLS_DTPMOD", /* name */
574 FALSE
, /* partial_inplace */
575 0xffffffff, /* src_mask */
576 0xffffffff, /* dst_mask */
577 FALSE
), /* pcrel_offset */
579 HOWTO (R_MN10300_TLS_DTPOFF
, /* type */
581 2, /* size (0 = byte, 1 = short, 2 = long) */
583 FALSE
, /* pc_relative */
585 complain_overflow_bitfield
, /* complain_on_overflow */
586 bfd_elf_generic_reloc
, /* */
587 "R_MN10300_TLS_DTPOFF", /* name */
588 FALSE
, /* partial_inplace */
589 0xffffffff, /* src_mask */
590 0xffffffff, /* dst_mask */
591 FALSE
), /* pcrel_offset */
593 HOWTO (R_MN10300_TLS_TPOFF
, /* type */
595 2, /* size (0 = byte, 1 = short, 2 = long) */
597 FALSE
, /* pc_relative */
599 complain_overflow_bitfield
, /* complain_on_overflow */
600 bfd_elf_generic_reloc
, /* */
601 "R_MN10300_TLS_TPOFF", /* name */
602 FALSE
, /* partial_inplace */
603 0xffffffff, /* src_mask */
604 0xffffffff, /* dst_mask */
605 FALSE
), /* pcrel_offset */
607 HOWTO (R_MN10300_SYM_DIFF
, /* type */
609 2, /* size (0 = byte, 1 = short, 2 = long) */
611 FALSE
, /* pc_relative */
613 complain_overflow_dont
,/* complain_on_overflow */
614 NULL
, /* special handler. */
615 "R_MN10300_SYM_DIFF", /* name */
616 FALSE
, /* partial_inplace */
617 0xffffffff, /* src_mask */
618 0xffffffff, /* dst_mask */
619 FALSE
), /* pcrel_offset */
621 HOWTO (R_MN10300_ALIGN
, /* type */
623 0, /* size (0 = byte, 1 = short, 2 = long) */
625 FALSE
, /* pc_relative */
627 complain_overflow_dont
,/* complain_on_overflow */
628 NULL
, /* special handler. */
629 "R_MN10300_ALIGN", /* name */
630 FALSE
, /* partial_inplace */
633 FALSE
) /* pcrel_offset */
636 struct mn10300_reloc_map
638 bfd_reloc_code_real_type bfd_reloc_val
;
639 unsigned char elf_reloc_val
;
642 static const struct mn10300_reloc_map mn10300_reloc_map
[] =
644 { BFD_RELOC_NONE
, R_MN10300_NONE
, },
645 { BFD_RELOC_32
, R_MN10300_32
, },
646 { BFD_RELOC_16
, R_MN10300_16
, },
647 { BFD_RELOC_8
, R_MN10300_8
, },
648 { BFD_RELOC_32_PCREL
, R_MN10300_PCREL32
, },
649 { BFD_RELOC_16_PCREL
, R_MN10300_PCREL16
, },
650 { BFD_RELOC_8_PCREL
, R_MN10300_PCREL8
, },
651 { BFD_RELOC_24
, R_MN10300_24
, },
652 { BFD_RELOC_VTABLE_INHERIT
, R_MN10300_GNU_VTINHERIT
},
653 { BFD_RELOC_VTABLE_ENTRY
, R_MN10300_GNU_VTENTRY
},
654 { BFD_RELOC_32_GOT_PCREL
, R_MN10300_GOTPC32
},
655 { BFD_RELOC_16_GOT_PCREL
, R_MN10300_GOTPC16
},
656 { BFD_RELOC_32_GOTOFF
, R_MN10300_GOTOFF32
},
657 { BFD_RELOC_MN10300_GOTOFF24
, R_MN10300_GOTOFF24
},
658 { BFD_RELOC_16_GOTOFF
, R_MN10300_GOTOFF16
},
659 { BFD_RELOC_32_PLT_PCREL
, R_MN10300_PLT32
},
660 { BFD_RELOC_16_PLT_PCREL
, R_MN10300_PLT16
},
661 { BFD_RELOC_MN10300_GOT32
, R_MN10300_GOT32
},
662 { BFD_RELOC_MN10300_GOT24
, R_MN10300_GOT24
},
663 { BFD_RELOC_MN10300_GOT16
, R_MN10300_GOT16
},
664 { BFD_RELOC_MN10300_COPY
, R_MN10300_COPY
},
665 { BFD_RELOC_MN10300_GLOB_DAT
, R_MN10300_GLOB_DAT
},
666 { BFD_RELOC_MN10300_JMP_SLOT
, R_MN10300_JMP_SLOT
},
667 { BFD_RELOC_MN10300_RELATIVE
, R_MN10300_RELATIVE
},
668 { BFD_RELOC_MN10300_TLS_GD
, R_MN10300_TLS_GD
},
669 { BFD_RELOC_MN10300_TLS_LD
, R_MN10300_TLS_LD
},
670 { BFD_RELOC_MN10300_TLS_LDO
, R_MN10300_TLS_LDO
},
671 { BFD_RELOC_MN10300_TLS_GOTIE
, R_MN10300_TLS_GOTIE
},
672 { BFD_RELOC_MN10300_TLS_IE
, R_MN10300_TLS_IE
},
673 { BFD_RELOC_MN10300_TLS_LE
, R_MN10300_TLS_LE
},
674 { BFD_RELOC_MN10300_TLS_DTPMOD
, R_MN10300_TLS_DTPMOD
},
675 { BFD_RELOC_MN10300_TLS_DTPOFF
, R_MN10300_TLS_DTPOFF
},
676 { BFD_RELOC_MN10300_TLS_TPOFF
, R_MN10300_TLS_TPOFF
},
677 { BFD_RELOC_MN10300_SYM_DIFF
, R_MN10300_SYM_DIFF
},
678 { BFD_RELOC_MN10300_ALIGN
, R_MN10300_ALIGN
}
681 /* Create the GOT section. */
684 _bfd_mn10300_elf_create_got_section (bfd
* abfd
,
685 struct bfd_link_info
* info
)
690 struct elf_link_hash_entry
* h
;
691 const struct elf_backend_data
* bed
= get_elf_backend_data (abfd
);
692 struct elf_link_hash_table
*htab
;
695 /* This function may be called more than once. */
696 htab
= elf_hash_table (info
);
697 if (htab
->sgot
!= NULL
)
700 switch (bed
->s
->arch_size
)
711 bfd_set_error (bfd_error_bad_value
);
715 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
716 | SEC_LINKER_CREATED
);
719 pltflags
|= SEC_CODE
;
720 if (bed
->plt_not_loaded
)
721 pltflags
&= ~ (SEC_LOAD
| SEC_HAS_CONTENTS
);
722 if (bed
->plt_readonly
)
723 pltflags
|= SEC_READONLY
;
725 s
= bfd_make_section_anyway_with_flags (abfd
, ".plt", pltflags
);
728 || !bfd_set_section_alignment (s
, bed
->plt_alignment
))
731 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
733 if (bed
->want_plt_sym
)
735 h
= _bfd_elf_define_linkage_sym (abfd
, info
, s
,
736 "_PROCEDURE_LINKAGE_TABLE_");
742 s
= bfd_make_section_anyway_with_flags (abfd
, ".got", flags
);
745 || !bfd_set_section_alignment (s
, ptralign
))
748 if (bed
->want_got_plt
)
750 s
= bfd_make_section_anyway_with_flags (abfd
, ".got.plt", flags
);
753 || !bfd_set_section_alignment (s
, ptralign
))
757 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
758 (or .got.plt) section. We don't do this in the linker script
759 because we don't want to define the symbol if we are not creating
760 a global offset table. */
761 h
= _bfd_elf_define_linkage_sym (abfd
, info
, s
, "_GLOBAL_OFFSET_TABLE_");
766 /* The first bit of the global offset table is the header. */
767 s
->size
+= bed
->got_header_size
;
772 static reloc_howto_type
*
773 bfd_elf32_bfd_reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
774 bfd_reloc_code_real_type code
)
778 for (i
= ARRAY_SIZE (mn10300_reloc_map
); i
--;)
779 if (mn10300_reloc_map
[i
].bfd_reloc_val
== code
)
780 return &elf_mn10300_howto_table
[mn10300_reloc_map
[i
].elf_reloc_val
];
785 static reloc_howto_type
*
786 bfd_elf32_bfd_reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
791 for (i
= ARRAY_SIZE (elf_mn10300_howto_table
); i
--;)
792 if (elf_mn10300_howto_table
[i
].name
!= NULL
793 && strcasecmp (elf_mn10300_howto_table
[i
].name
, r_name
) == 0)
794 return elf_mn10300_howto_table
+ i
;
799 /* Set the howto pointer for an MN10300 ELF reloc. */
802 mn10300_info_to_howto (bfd
*abfd
,
804 Elf_Internal_Rela
*dst
)
808 r_type
= ELF32_R_TYPE (dst
->r_info
);
809 if (r_type
>= R_MN10300_MAX
)
811 /* xgettext:c-format */
812 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
814 bfd_set_error (bfd_error_bad_value
);
817 cache_ptr
->howto
= elf_mn10300_howto_table
+ r_type
;
822 elf_mn10300_tls_transition (struct bfd_link_info
* info
,
824 struct elf_link_hash_entry
* h
,
826 bfd_boolean counting
)
828 bfd_boolean is_local
;
830 if (r_type
== R_MN10300_TLS_GD
832 && elf_mn10300_hash_entry (h
)->tls_type
== GOT_TLS_IE
)
833 return R_MN10300_TLS_GOTIE
;
835 if (bfd_link_pic (info
))
838 if (! (sec
->flags
& SEC_CODE
))
841 if (! counting
&& h
!= NULL
&& ! elf_hash_table (info
)->dynamic_sections_created
)
844 is_local
= SYMBOL_CALLS_LOCAL (info
, h
);
846 /* For the main program, these are the transitions we do. */
849 case R_MN10300_TLS_GD
: return is_local
? R_MN10300_TLS_LE
: R_MN10300_TLS_GOTIE
;
850 case R_MN10300_TLS_LD
: return R_MN10300_NONE
;
851 case R_MN10300_TLS_LDO
: return R_MN10300_TLS_LE
;
852 case R_MN10300_TLS_IE
:
853 case R_MN10300_TLS_GOTIE
: return is_local
? R_MN10300_TLS_LE
: r_type
;
859 /* Return the relocation value for @tpoff relocation
860 if STT_TLS virtual address is ADDRESS. */
863 dtpoff (struct bfd_link_info
* info
, bfd_vma address
)
865 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
867 /* If tls_sec is NULL, we should have signalled an error already. */
868 if (htab
->tls_sec
== NULL
)
870 return address
- htab
->tls_sec
->vma
;
873 /* Return the relocation value for @tpoff relocation
874 if STT_TLS virtual address is ADDRESS. */
877 tpoff (struct bfd_link_info
* info
, bfd_vma address
)
879 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
881 /* If tls_sec is NULL, we should have signalled an error already. */
882 if (htab
->tls_sec
== NULL
)
884 return address
- (htab
->tls_size
+ htab
->tls_sec
->vma
);
887 /* Returns nonzero if there's a R_MN10300_PLT32 reloc that we now need
888 to skip, after this one. The actual value is the offset between
889 this reloc and the PLT reloc. */
892 mn10300_do_tls_transition (bfd
* input_bfd
,
894 unsigned int tls_r_type
,
898 bfd_byte
*op
= contents
+ offset
;
901 #define TLS_PAIR(r1,r2) ((r1) * R_MN10300_MAX + (r2))
903 /* This is common to all GD/LD transitions, so break it out. */
904 if (r_type
== R_MN10300_TLS_GD
905 || r_type
== R_MN10300_TLS_LD
)
909 BFD_ASSERT (bfd_get_8 (input_bfd
, op
) == 0xFC);
910 BFD_ASSERT (bfd_get_8 (input_bfd
, op
+ 1) == 0xCC);
912 BFD_ASSERT (bfd_get_8 (input_bfd
, op
+ 6) == 0xF1);
913 gotreg
= (bfd_get_8 (input_bfd
, op
+ 7) & 0x0c) >> 2;
915 BFD_ASSERT (bfd_get_8 (input_bfd
, op
+ 8) == 0xDD);
918 switch (TLS_PAIR (r_type
, tls_r_type
))
920 case TLS_PAIR (R_MN10300_TLS_GD
, R_MN10300_TLS_GOTIE
):
922 /* Keep track of which register we put GOTptr in. */
923 /* mov (_x@indntpoff,a2),a0. */
924 memcpy (op
, "\xFC\x20\x00\x00\x00\x00", 6);
927 memcpy (op
+6, "\xF9\x78\x28", 3);
928 /* or 0x00000000, d0 - six byte nop. */
929 memcpy (op
+9, "\xFC\xE4\x00\x00\x00\x00", 6);
933 case TLS_PAIR (R_MN10300_TLS_GD
, R_MN10300_TLS_LE
):
935 /* Register is *always* a0. */
936 /* mov _x@tpoff,a0. */
937 memcpy (op
, "\xFC\xDC\x00\x00\x00\x00", 6);
939 memcpy (op
+6, "\xF9\x78\x28", 3);
940 /* or 0x00000000, d0 - six byte nop. */
941 memcpy (op
+9, "\xFC\xE4\x00\x00\x00\x00", 6);
944 case TLS_PAIR (R_MN10300_TLS_LD
, R_MN10300_NONE
):
946 /* Register is *always* a0. */
948 memcpy (op
, "\xF5\x88", 2);
949 /* or 0x00000000, d0 - six byte nop. */
950 memcpy (op
+2, "\xFC\xE4\x00\x00\x00\x00", 6);
951 /* or 0x00000000, e2 - seven byte nop. */
952 memcpy (op
+8, "\xFE\x19\x22\x00\x00\x00\x00", 7);
956 case TLS_PAIR (R_MN10300_TLS_LDO
, R_MN10300_TLS_LE
):
957 /* No changes needed, just the reloc change. */
960 /* These are a little tricky, because we have to detect which
961 opcode is being used (they're different sizes, with the reloc
962 at different offsets within the opcode) and convert each
963 accordingly, copying the operands as needed. The conversions
964 we do are as follows (IE,GOTIE,LE):
966 1111 1100 1010 01Dn [-- abs32 --] MOV (x@indntpoff),Dn
967 1111 1100 0000 DnAm [-- abs32 --] MOV (x@gotntpoff,Am),Dn
968 1111 1100 1100 11Dn [-- abs32 --] MOV x@tpoff,Dn
970 1111 1100 1010 00An [-- abs32 --] MOV (x@indntpoff),An
971 1111 1100 0010 AnAm [-- abs32 --] MOV (x@gotntpoff,Am),An
972 1111 1100 1101 11An [-- abs32 --] MOV x@tpoff,An
974 1111 1110 0000 1110 Rnnn Xxxx [-- abs32 --] MOV (x@indntpoff),Rn
975 1111 1110 0000 1010 Rnnn Rmmm [-- abs32 --] MOV (x@indntpoff,Rm),Rn
976 1111 1110 0000 1000 Rnnn Xxxx [-- abs32 --] MOV x@tpoff,Rn
978 Since the GOT pointer is always $a2, we assume the last
979 normally won't happen, but let's be paranoid and plan for the
980 day that GCC optimizes it somewhow. */
982 case TLS_PAIR (R_MN10300_TLS_IE
, R_MN10300_TLS_LE
):
986 if ((op
[1] & 0xFC) == 0xA4) /* Dn */
988 op
[1] &= 0x03; /* Leaves Dn. */
993 op
[1] &= 0x03; /* Leaves An. */
997 else if (op
[-3] == 0xFE)
1003 case TLS_PAIR (R_MN10300_TLS_GOTIE
, R_MN10300_TLS_LE
):
1007 if ((op
[1] & 0xF0) == 0x00) /* Dn */
1009 op
[1] &= 0x0C; /* Leaves Dn. */
1015 op
[1] &= 0x0C; /* Leaves An. */
1020 else if (op
[-3] == 0xFE)
1028 /* xgettext:c-format */
1029 (_("%pB: unsupported transition from %s to %s"),
1031 elf_mn10300_howto_table
[r_type
].name
,
1032 elf_mn10300_howto_table
[tls_r_type
].name
);
1039 /* Look through the relocs for a section during the first phase.
1040 Since we don't do .gots or .plts, we just need to consider the
1041 virtual table relocs for gc. */
1044 mn10300_elf_check_relocs (bfd
*abfd
,
1045 struct bfd_link_info
*info
,
1047 const Elf_Internal_Rela
*relocs
)
1049 struct elf32_mn10300_link_hash_table
* htab
= elf32_mn10300_hash_table (info
);
1050 bfd_boolean sym_diff_reloc_seen
;
1051 Elf_Internal_Shdr
*symtab_hdr
;
1052 Elf_Internal_Sym
* isymbuf
= NULL
;
1053 struct elf_link_hash_entry
**sym_hashes
;
1054 const Elf_Internal_Rela
*rel
;
1055 const Elf_Internal_Rela
*rel_end
;
1057 bfd_vma
* local_got_offsets
;
1061 bfd_boolean result
= FALSE
;
1067 if (bfd_link_relocatable (info
))
1070 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1071 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
1072 sym_hashes
= elf_sym_hashes (abfd
);
1074 dynobj
= elf_hash_table (info
)->dynobj
;
1075 local_got_offsets
= elf_local_got_offsets (abfd
);
1076 rel_end
= relocs
+ sec
->reloc_count
;
1077 sym_diff_reloc_seen
= FALSE
;
1079 for (rel
= relocs
; rel
< rel_end
; rel
++)
1081 struct elf_link_hash_entry
*h
;
1082 unsigned long r_symndx
;
1083 unsigned int r_type
;
1084 int tls_type
= GOT_NORMAL
;
1086 r_symndx
= ELF32_R_SYM (rel
->r_info
);
1087 if (r_symndx
< symtab_hdr
->sh_info
)
1091 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
1092 while (h
->root
.type
== bfd_link_hash_indirect
1093 || h
->root
.type
== bfd_link_hash_warning
)
1094 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
1097 r_type
= ELF32_R_TYPE (rel
->r_info
);
1098 r_type
= elf_mn10300_tls_transition (info
, r_type
, h
, sec
, TRUE
);
1100 /* Some relocs require a global offset table. */
1105 case R_MN10300_GOT32
:
1106 case R_MN10300_GOT24
:
1107 case R_MN10300_GOT16
:
1108 case R_MN10300_GOTOFF32
:
1109 case R_MN10300_GOTOFF24
:
1110 case R_MN10300_GOTOFF16
:
1111 case R_MN10300_GOTPC32
:
1112 case R_MN10300_GOTPC16
:
1113 case R_MN10300_TLS_GD
:
1114 case R_MN10300_TLS_LD
:
1115 case R_MN10300_TLS_GOTIE
:
1116 case R_MN10300_TLS_IE
:
1117 elf_hash_table (info
)->dynobj
= dynobj
= abfd
;
1118 if (! _bfd_mn10300_elf_create_got_section (dynobj
, info
))
1129 /* This relocation describes the C++ object vtable hierarchy.
1130 Reconstruct it for later use during GC. */
1131 case R_MN10300_GNU_VTINHERIT
:
1132 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
1136 /* This relocation describes which C++ vtable entries are actually
1137 used. Record for later use during GC. */
1138 case R_MN10300_GNU_VTENTRY
:
1139 if (!bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
1143 case R_MN10300_TLS_LD
:
1144 htab
->tls_ldm_got
.refcount
++;
1145 tls_type
= GOT_TLS_LD
;
1147 if (htab
->tls_ldm_got
.got_allocated
)
1151 case R_MN10300_TLS_IE
:
1152 case R_MN10300_TLS_GOTIE
:
1153 if (bfd_link_pic (info
))
1154 info
->flags
|= DF_STATIC_TLS
;
1157 case R_MN10300_TLS_GD
:
1158 case R_MN10300_GOT32
:
1159 case R_MN10300_GOT24
:
1160 case R_MN10300_GOT16
:
1162 /* This symbol requires a global offset table entry. */
1166 case R_MN10300_TLS_IE
:
1167 case R_MN10300_TLS_GOTIE
: tls_type
= GOT_TLS_IE
; break;
1168 case R_MN10300_TLS_GD
: tls_type
= GOT_TLS_GD
; break;
1169 default: tls_type
= GOT_NORMAL
; break;
1172 sgot
= htab
->root
.sgot
;
1173 srelgot
= htab
->root
.srelgot
;
1174 BFD_ASSERT (sgot
!= NULL
&& srelgot
!= NULL
);
1176 if (r_type
== R_MN10300_TLS_LD
)
1178 htab
->tls_ldm_got
.offset
= sgot
->size
;
1179 htab
->tls_ldm_got
.got_allocated
++;
1183 if (elf_mn10300_hash_entry (h
)->tls_type
!= tls_type
1184 && elf_mn10300_hash_entry (h
)->tls_type
!= GOT_UNKNOWN
)
1186 if (tls_type
== GOT_TLS_IE
1187 && elf_mn10300_hash_entry (h
)->tls_type
== GOT_TLS_GD
)
1188 /* No change - this is ok. */;
1189 else if (tls_type
== GOT_TLS_GD
1190 && elf_mn10300_hash_entry (h
)->tls_type
== GOT_TLS_IE
)
1191 /* Transition GD->IE. */
1192 tls_type
= GOT_TLS_IE
;
1195 /* xgettext:c-format */
1196 (_("%pB: %s' accessed both as normal and thread local symbol"),
1197 abfd
, h
? h
->root
.root
.string
: "<local>");
1200 elf_mn10300_hash_entry (h
)->tls_type
= tls_type
;
1202 if (h
->got
.offset
!= (bfd_vma
) -1)
1203 /* We have already allocated space in the .got. */
1206 h
->got
.offset
= sgot
->size
;
1208 if (ELF_ST_VISIBILITY (h
->other
) != STV_INTERNAL
1209 /* Make sure this symbol is output as a dynamic symbol. */
1210 && h
->dynindx
== -1)
1212 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
1216 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1217 if (r_type
== R_MN10300_TLS_GD
)
1218 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1222 /* This is a global offset table entry for a local
1224 if (local_got_offsets
== NULL
)
1229 size
= symtab_hdr
->sh_info
* (sizeof (bfd_vma
) + sizeof (char));
1230 local_got_offsets
= bfd_alloc (abfd
, size
);
1232 if (local_got_offsets
== NULL
)
1235 elf_local_got_offsets (abfd
) = local_got_offsets
;
1236 elf_mn10300_local_got_tls_type (abfd
)
1237 = (char *) (local_got_offsets
+ symtab_hdr
->sh_info
);
1239 for (i
= 0; i
< symtab_hdr
->sh_info
; i
++)
1240 local_got_offsets
[i
] = (bfd_vma
) -1;
1243 if (local_got_offsets
[r_symndx
] != (bfd_vma
) -1)
1244 /* We have already allocated space in the .got. */
1247 local_got_offsets
[r_symndx
] = sgot
->size
;
1249 if (bfd_link_pic (info
))
1251 /* If we are generating a shared object, we need to
1252 output a R_MN10300_RELATIVE reloc so that the dynamic
1253 linker can adjust this GOT entry. */
1254 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1256 if (r_type
== R_MN10300_TLS_GD
)
1257 /* And a R_MN10300_TLS_DTPOFF reloc as well. */
1258 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1261 elf_mn10300_local_got_tls_type (abfd
) [r_symndx
] = tls_type
;
1265 if (r_type
== R_MN10300_TLS_GD
1266 || r_type
== R_MN10300_TLS_LD
)
1269 goto need_shared_relocs
;
1271 case R_MN10300_PLT32
:
1272 case R_MN10300_PLT16
:
1273 /* This symbol requires a procedure linkage table entry. We
1274 actually build the entry in adjust_dynamic_symbol,
1275 because this might be a case of linking PIC code which is
1276 never referenced by a dynamic object, in which case we
1277 don't need to generate a procedure linkage table entry
1280 /* If this is a local symbol, we resolve it directly without
1281 creating a procedure linkage table entry. */
1285 if (ELF_ST_VISIBILITY (h
->other
) == STV_INTERNAL
1286 || ELF_ST_VISIBILITY (h
->other
) == STV_HIDDEN
)
1295 case R_MN10300_PCREL32
:
1296 case R_MN10300_PCREL16
:
1297 case R_MN10300_PCREL8
:
1302 case R_MN10300_SYM_DIFF
:
1303 sym_diff_reloc_seen
= TRUE
;
1311 /* If we are creating a shared library, then we
1312 need to copy the reloc into the shared library. */
1313 if (bfd_link_pic (info
)
1314 && (sec
->flags
& SEC_ALLOC
) != 0
1315 /* Do not generate a dynamic reloc for a
1316 reloc associated with a SYM_DIFF operation. */
1317 && ! sym_diff_reloc_seen
)
1319 asection
* sym_section
= NULL
;
1321 /* Find the section containing the
1322 symbol involved in the relocation. */
1325 Elf_Internal_Sym
* isym
;
1327 if (isymbuf
== NULL
)
1328 isymbuf
= bfd_elf_get_elf_syms (abfd
, symtab_hdr
,
1329 symtab_hdr
->sh_info
, 0,
1333 isym
= isymbuf
+ r_symndx
;
1334 /* All we care about is whether this local symbol is absolute. */
1335 if (isym
->st_shndx
== SHN_ABS
)
1336 sym_section
= bfd_abs_section_ptr
;
1341 if (h
->root
.type
== bfd_link_hash_defined
1342 || h
->root
.type
== bfd_link_hash_defweak
)
1343 sym_section
= h
->root
.u
.def
.section
;
1346 /* If the symbol is absolute then the relocation can
1347 be resolved during linking and there is no need for
1349 if (sym_section
!= bfd_abs_section_ptr
)
1351 /* When creating a shared object, we must copy these
1352 reloc types into the output file. We create a reloc
1353 section in dynobj and make room for this reloc. */
1356 sreloc
= _bfd_elf_make_dynamic_reloc_section
1357 (sec
, dynobj
, 2, abfd
, /*rela?*/ TRUE
);
1362 sreloc
->size
+= sizeof (Elf32_External_Rela
);
1369 if (ELF32_R_TYPE (rel
->r_info
) != R_MN10300_SYM_DIFF
)
1370 sym_diff_reloc_seen
= FALSE
;
1375 if (symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
1381 /* Return the section that should be marked against GC for a given
1385 mn10300_elf_gc_mark_hook (asection
*sec
,
1386 struct bfd_link_info
*info
,
1387 Elf_Internal_Rela
*rel
,
1388 struct elf_link_hash_entry
*h
,
1389 Elf_Internal_Sym
*sym
)
1392 switch (ELF32_R_TYPE (rel
->r_info
))
1394 case R_MN10300_GNU_VTINHERIT
:
1395 case R_MN10300_GNU_VTENTRY
:
1399 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
1402 /* Perform a relocation as part of a final link. */
1404 static bfd_reloc_status_type
1405 mn10300_elf_final_link_relocate (reloc_howto_type
*howto
,
1407 bfd
*output_bfd ATTRIBUTE_UNUSED
,
1408 asection
*input_section
,
1413 struct elf_link_hash_entry
* h
,
1414 unsigned long symndx
,
1415 struct bfd_link_info
*info
,
1416 asection
*sym_sec ATTRIBUTE_UNUSED
,
1417 int is_local ATTRIBUTE_UNUSED
)
1419 struct elf32_mn10300_link_hash_table
* htab
= elf32_mn10300_hash_table (info
);
1420 static asection
* sym_diff_section
;
1421 static bfd_vma sym_diff_value
;
1422 bfd_boolean is_sym_diff_reloc
;
1423 unsigned long r_type
= howto
->type
;
1424 bfd_byte
* hit_data
= contents
+ offset
;
1430 dynobj
= elf_hash_table (info
)->dynobj
;
1440 case R_MN10300_PCREL8
:
1441 case R_MN10300_PCREL16
:
1442 case R_MN10300_PCREL32
:
1443 case R_MN10300_GOTOFF32
:
1444 case R_MN10300_GOTOFF24
:
1445 case R_MN10300_GOTOFF16
:
1446 if (bfd_link_pic (info
)
1447 && (input_section
->flags
& SEC_ALLOC
) != 0
1449 && ! SYMBOL_REFERENCES_LOCAL (info
, h
))
1450 return bfd_reloc_dangerous
;
1452 case R_MN10300_GOT32
:
1454 Taking the address of a protected function in a shared library
1455 is illegal. Issue an error message here. */
1456 if (bfd_link_pic (info
)
1457 && (input_section
->flags
& SEC_ALLOC
) != 0
1459 && ELF_ST_VISIBILITY (h
->other
) == STV_PROTECTED
1460 && (h
->type
== STT_FUNC
|| h
->type
== STT_GNU_IFUNC
)
1461 && ! SYMBOL_REFERENCES_LOCAL (info
, h
))
1462 return bfd_reloc_dangerous
;
1465 is_sym_diff_reloc
= FALSE
;
1466 if (sym_diff_section
!= NULL
)
1468 BFD_ASSERT (sym_diff_section
== input_section
);
1476 value
-= sym_diff_value
;
1477 /* If we are computing a 32-bit value for the location lists
1478 and the result is 0 then we add one to the value. A zero
1479 value can result because of linker relaxation deleteing
1480 prologue instructions and using a value of 1 (for the begin
1481 and end offsets in the location list entry) results in a
1482 nul entry which does not prevent the following entries from
1484 if (r_type
== R_MN10300_32
1486 && strcmp (input_section
->name
, ".debug_loc") == 0)
1488 sym_diff_section
= NULL
;
1489 is_sym_diff_reloc
= TRUE
;
1493 sym_diff_section
= NULL
;
1500 case R_MN10300_SYM_DIFF
:
1501 BFD_ASSERT (addend
== 0);
1502 /* Cache the input section and value.
1503 The offset is unreliable, since relaxation may
1504 have reduced the following reloc's offset. */
1505 sym_diff_section
= input_section
;
1506 sym_diff_value
= value
;
1507 return bfd_reloc_ok
;
1509 case R_MN10300_ALIGN
:
1510 case R_MN10300_NONE
:
1511 return bfd_reloc_ok
;
1514 if (bfd_link_pic (info
)
1515 /* Do not generate relocs when an R_MN10300_32 has been used
1516 with an R_MN10300_SYM_DIFF to compute a difference of two
1518 && !is_sym_diff_reloc
1519 /* Also, do not generate a reloc when the symbol associated
1520 with the R_MN10300_32 reloc is absolute - there is no
1521 need for a run time computation in this case. */
1522 && sym_sec
!= bfd_abs_section_ptr
1523 /* If the section is not going to be allocated at load time
1524 then there is no need to generate relocs for it. */
1525 && (input_section
->flags
& SEC_ALLOC
) != 0)
1527 Elf_Internal_Rela outrel
;
1528 bfd_boolean skip
, relocate
;
1530 /* When generating a shared object, these relocations are
1531 copied into the output file to be resolved at run
1535 sreloc
= _bfd_elf_get_dynamic_reloc_section
1536 (input_bfd
, input_section
, /*rela?*/ TRUE
);
1543 outrel
.r_offset
= _bfd_elf_section_offset (input_bfd
, info
,
1544 input_section
, offset
);
1545 if (outrel
.r_offset
== (bfd_vma
) -1)
1548 outrel
.r_offset
+= (input_section
->output_section
->vma
1549 + input_section
->output_offset
);
1553 memset (&outrel
, 0, sizeof outrel
);
1558 /* h->dynindx may be -1 if this symbol was marked to
1561 || SYMBOL_REFERENCES_LOCAL (info
, h
))
1564 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_RELATIVE
);
1565 outrel
.r_addend
= value
+ addend
;
1569 BFD_ASSERT (h
->dynindx
!= -1);
1571 outrel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_32
);
1572 outrel
.r_addend
= value
+ addend
;
1576 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
,
1577 (bfd_byte
*) (((Elf32_External_Rela
*) sreloc
->contents
)
1578 + sreloc
->reloc_count
));
1579 ++sreloc
->reloc_count
;
1581 /* If this reloc is against an external symbol, we do
1582 not want to fiddle with the addend. Otherwise, we
1583 need to include the symbol value so that it becomes
1584 an addend for the dynamic reloc. */
1586 return bfd_reloc_ok
;
1589 bfd_put_32 (input_bfd
, value
, hit_data
);
1590 return bfd_reloc_ok
;
1595 if ((long) value
> 0x7fffff || (long) value
< -0x800000)
1596 return bfd_reloc_overflow
;
1598 bfd_put_8 (input_bfd
, value
& 0xff, hit_data
);
1599 bfd_put_8 (input_bfd
, (value
>> 8) & 0xff, hit_data
+ 1);
1600 bfd_put_8 (input_bfd
, (value
>> 16) & 0xff, hit_data
+ 2);
1601 return bfd_reloc_ok
;
1606 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1607 return bfd_reloc_overflow
;
1609 bfd_put_16 (input_bfd
, value
, hit_data
);
1610 return bfd_reloc_ok
;
1615 if ((long) value
> 0x7f || (long) value
< -0x80)
1616 return bfd_reloc_overflow
;
1618 bfd_put_8 (input_bfd
, value
, hit_data
);
1619 return bfd_reloc_ok
;
1621 case R_MN10300_PCREL8
:
1622 value
-= (input_section
->output_section
->vma
1623 + input_section
->output_offset
);
1627 if ((long) value
> 0x7f || (long) value
< -0x80)
1628 return bfd_reloc_overflow
;
1630 bfd_put_8 (input_bfd
, value
, hit_data
);
1631 return bfd_reloc_ok
;
1633 case R_MN10300_PCREL16
:
1634 value
-= (input_section
->output_section
->vma
1635 + input_section
->output_offset
);
1639 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1640 return bfd_reloc_overflow
;
1642 bfd_put_16 (input_bfd
, value
, hit_data
);
1643 return bfd_reloc_ok
;
1645 case R_MN10300_PCREL32
:
1646 value
-= (input_section
->output_section
->vma
1647 + input_section
->output_offset
);
1651 bfd_put_32 (input_bfd
, value
, hit_data
);
1652 return bfd_reloc_ok
;
1654 case R_MN10300_GNU_VTINHERIT
:
1655 case R_MN10300_GNU_VTENTRY
:
1656 return bfd_reloc_ok
;
1658 case R_MN10300_GOTPC32
:
1660 return bfd_reloc_dangerous
;
1662 /* Use global offset table as symbol value. */
1663 value
= htab
->root
.sgot
->output_section
->vma
;
1664 value
-= (input_section
->output_section
->vma
1665 + input_section
->output_offset
);
1669 bfd_put_32 (input_bfd
, value
, hit_data
);
1670 return bfd_reloc_ok
;
1672 case R_MN10300_GOTPC16
:
1674 return bfd_reloc_dangerous
;
1676 /* Use global offset table as symbol value. */
1677 value
= htab
->root
.sgot
->output_section
->vma
;
1678 value
-= (input_section
->output_section
->vma
1679 + input_section
->output_offset
);
1683 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1684 return bfd_reloc_overflow
;
1686 bfd_put_16 (input_bfd
, value
, hit_data
);
1687 return bfd_reloc_ok
;
1689 case R_MN10300_GOTOFF32
:
1691 return bfd_reloc_dangerous
;
1693 value
-= htab
->root
.sgot
->output_section
->vma
;
1696 bfd_put_32 (input_bfd
, value
, hit_data
);
1697 return bfd_reloc_ok
;
1699 case R_MN10300_GOTOFF24
:
1701 return bfd_reloc_dangerous
;
1703 value
-= htab
->root
.sgot
->output_section
->vma
;
1706 if ((long) value
> 0x7fffff || (long) value
< -0x800000)
1707 return bfd_reloc_overflow
;
1709 bfd_put_8 (input_bfd
, value
, hit_data
);
1710 bfd_put_8 (input_bfd
, (value
>> 8) & 0xff, hit_data
+ 1);
1711 bfd_put_8 (input_bfd
, (value
>> 16) & 0xff, hit_data
+ 2);
1712 return bfd_reloc_ok
;
1714 case R_MN10300_GOTOFF16
:
1716 return bfd_reloc_dangerous
;
1718 value
-= htab
->root
.sgot
->output_section
->vma
;
1721 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1722 return bfd_reloc_overflow
;
1724 bfd_put_16 (input_bfd
, value
, hit_data
);
1725 return bfd_reloc_ok
;
1727 case R_MN10300_PLT32
:
1729 && ELF_ST_VISIBILITY (h
->other
) != STV_INTERNAL
1730 && ELF_ST_VISIBILITY (h
->other
) != STV_HIDDEN
1731 && h
->plt
.offset
!= (bfd_vma
) -1)
1734 return bfd_reloc_dangerous
;
1736 splt
= htab
->root
.splt
;
1737 value
= (splt
->output_section
->vma
1738 + splt
->output_offset
1739 + h
->plt
.offset
) - value
;
1742 value
-= (input_section
->output_section
->vma
1743 + input_section
->output_offset
);
1747 bfd_put_32 (input_bfd
, value
, hit_data
);
1748 return bfd_reloc_ok
;
1750 case R_MN10300_PLT16
:
1752 && ELF_ST_VISIBILITY (h
->other
) != STV_INTERNAL
1753 && ELF_ST_VISIBILITY (h
->other
) != STV_HIDDEN
1754 && h
->plt
.offset
!= (bfd_vma
) -1)
1757 return bfd_reloc_dangerous
;
1759 splt
= htab
->root
.splt
;
1760 value
= (splt
->output_section
->vma
1761 + splt
->output_offset
1762 + h
->plt
.offset
) - value
;
1765 value
-= (input_section
->output_section
->vma
1766 + input_section
->output_offset
);
1770 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1771 return bfd_reloc_overflow
;
1773 bfd_put_16 (input_bfd
, value
, hit_data
);
1774 return bfd_reloc_ok
;
1776 case R_MN10300_TLS_LDO
:
1777 value
= dtpoff (info
, value
);
1778 bfd_put_32 (input_bfd
, value
+ addend
, hit_data
);
1779 return bfd_reloc_ok
;
1781 case R_MN10300_TLS_LE
:
1782 value
= tpoff (info
, value
);
1783 bfd_put_32 (input_bfd
, value
+ addend
, hit_data
);
1784 return bfd_reloc_ok
;
1786 case R_MN10300_TLS_LD
:
1788 return bfd_reloc_dangerous
;
1790 sgot
= htab
->root
.sgot
;
1791 BFD_ASSERT (sgot
!= NULL
);
1792 value
= htab
->tls_ldm_got
.offset
+ sgot
->output_offset
;
1793 bfd_put_32 (input_bfd
, value
, hit_data
);
1795 if (!htab
->tls_ldm_got
.rel_emitted
)
1797 asection
*srelgot
= htab
->root
.srelgot
;
1798 Elf_Internal_Rela rel
;
1800 BFD_ASSERT (srelgot
!= NULL
);
1801 htab
->tls_ldm_got
.rel_emitted
++;
1802 rel
.r_offset
= (sgot
->output_section
->vma
1803 + sgot
->output_offset
1804 + htab
->tls_ldm_got
.offset
);
1805 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ htab
->tls_ldm_got
.offset
);
1806 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ htab
->tls_ldm_got
.offset
+4);
1807 rel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD
);
1809 bfd_elf32_swap_reloca_out (output_bfd
, & rel
,
1810 (bfd_byte
*) ((Elf32_External_Rela
*) srelgot
->contents
1811 + srelgot
->reloc_count
));
1812 ++ srelgot
->reloc_count
;
1815 return bfd_reloc_ok
;
1817 case R_MN10300_TLS_GOTIE
:
1818 value
= tpoff (info
, value
);
1821 case R_MN10300_TLS_GD
:
1822 case R_MN10300_TLS_IE
:
1823 case R_MN10300_GOT32
:
1824 case R_MN10300_GOT24
:
1825 case R_MN10300_GOT16
:
1827 return bfd_reloc_dangerous
;
1829 sgot
= htab
->root
.sgot
;
1830 if (r_type
== R_MN10300_TLS_GD
)
1831 value
= dtpoff (info
, value
);
1837 off
= h
->got
.offset
;
1838 /* Offsets in the GOT are allocated in check_relocs
1839 which is not called for shared libraries... */
1840 if (off
== (bfd_vma
) -1)
1843 if (sgot
->contents
!= NULL
1844 && (! elf_hash_table (info
)->dynamic_sections_created
1845 || SYMBOL_REFERENCES_LOCAL (info
, h
)))
1846 /* This is actually a static link, or it is a
1847 -Bsymbolic link and the symbol is defined
1848 locally, or the symbol was forced to be local
1849 because of a version file. We must initialize
1850 this entry in the global offset table.
1852 When doing a dynamic link, we create a .rela.got
1853 relocation entry to initialize the value. This
1854 is done in the finish_dynamic_symbol routine. */
1855 bfd_put_32 (output_bfd
, value
,
1856 sgot
->contents
+ off
);
1858 value
= sgot
->output_offset
+ off
;
1864 off
= elf_local_got_offsets (input_bfd
)[symndx
];
1867 bfd_put_32 (output_bfd
, value
, sgot
->contents
+ (off
& ~ 1));
1870 bfd_put_32 (output_bfd
, value
, sgot
->contents
+ off
);
1872 if (bfd_link_pic (info
))
1874 asection
*srelgot
= htab
->root
.srelgot
;;
1875 Elf_Internal_Rela outrel
;
1877 BFD_ASSERT (srelgot
!= NULL
);
1879 outrel
.r_offset
= (sgot
->output_section
->vma
1880 + sgot
->output_offset
1884 case R_MN10300_TLS_GD
:
1885 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_DTPOFF
);
1886 outrel
.r_offset
= (sgot
->output_section
->vma
1887 + sgot
->output_offset
1889 bfd_elf32_swap_reloca_out (output_bfd
, & outrel
,
1890 (bfd_byte
*) (((Elf32_External_Rela
*)
1892 + srelgot
->reloc_count
));
1893 ++ srelgot
->reloc_count
;
1894 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD
);
1896 case R_MN10300_TLS_GOTIE
:
1897 case R_MN10300_TLS_IE
:
1898 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_TPOFF
);
1901 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_RELATIVE
);
1905 outrel
.r_addend
= value
;
1906 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
,
1907 (bfd_byte
*) (((Elf32_External_Rela
*)
1909 + srelgot
->reloc_count
));
1910 ++ srelgot
->reloc_count
;
1911 elf_local_got_offsets (input_bfd
)[symndx
] |= 1;
1914 value
= sgot
->output_offset
+ (off
& ~(bfd_vma
) 1);
1920 if (r_type
== R_MN10300_TLS_IE
)
1922 value
+= sgot
->output_section
->vma
;
1923 bfd_put_32 (input_bfd
, value
, hit_data
);
1924 return bfd_reloc_ok
;
1926 else if (r_type
== R_MN10300_TLS_GOTIE
1927 || r_type
== R_MN10300_TLS_GD
1928 || r_type
== R_MN10300_TLS_LD
)
1930 bfd_put_32 (input_bfd
, value
, hit_data
);
1931 return bfd_reloc_ok
;
1933 else if (r_type
== R_MN10300_GOT32
)
1935 bfd_put_32 (input_bfd
, value
, hit_data
);
1936 return bfd_reloc_ok
;
1938 else if (r_type
== R_MN10300_GOT24
)
1940 if ((long) value
> 0x7fffff || (long) value
< -0x800000)
1941 return bfd_reloc_overflow
;
1943 bfd_put_8 (input_bfd
, value
& 0xff, hit_data
);
1944 bfd_put_8 (input_bfd
, (value
>> 8) & 0xff, hit_data
+ 1);
1945 bfd_put_8 (input_bfd
, (value
>> 16) & 0xff, hit_data
+ 2);
1946 return bfd_reloc_ok
;
1948 else if (r_type
== R_MN10300_GOT16
)
1950 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1951 return bfd_reloc_overflow
;
1953 bfd_put_16 (input_bfd
, value
, hit_data
);
1954 return bfd_reloc_ok
;
1959 return bfd_reloc_notsupported
;
1963 /* Relocate an MN10300 ELF section. */
1966 mn10300_elf_relocate_section (bfd
*output_bfd
,
1967 struct bfd_link_info
*info
,
1969 asection
*input_section
,
1971 Elf_Internal_Rela
*relocs
,
1972 Elf_Internal_Sym
*local_syms
,
1973 asection
**local_sections
)
1975 Elf_Internal_Shdr
*symtab_hdr
;
1976 struct elf_link_hash_entry
**sym_hashes
;
1977 Elf_Internal_Rela
*rel
, *relend
;
1978 Elf_Internal_Rela
* trel
;
1980 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
1981 sym_hashes
= elf_sym_hashes (input_bfd
);
1984 relend
= relocs
+ input_section
->reloc_count
;
1985 for (; rel
< relend
; rel
++)
1988 reloc_howto_type
*howto
;
1989 unsigned long r_symndx
;
1990 Elf_Internal_Sym
*sym
;
1992 struct elf32_mn10300_link_hash_entry
*h
;
1994 bfd_reloc_status_type r
;
1996 bfd_boolean unresolved_reloc
= FALSE
;
1997 bfd_boolean warned
, ignored
;
1998 struct elf_link_hash_entry
* hh
;
2001 r_symndx
= ELF32_R_SYM (rel
->r_info
);
2002 r_type
= ELF32_R_TYPE (rel
->r_info
);
2003 howto
= elf_mn10300_howto_table
+ r_type
;
2005 /* Just skip the vtable gc relocs. */
2006 if (r_type
== R_MN10300_GNU_VTINHERIT
2007 || r_type
== R_MN10300_GNU_VTENTRY
)
2013 if (r_symndx
< symtab_hdr
->sh_info
)
2017 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
2018 r_symndx
, symtab_hdr
, sym_hashes
,
2019 hh
, sec
, relocation
,
2020 unresolved_reloc
, warned
, ignored
);
2022 h
= elf_mn10300_hash_entry (hh
);
2024 tls_r_type
= elf_mn10300_tls_transition (info
, r_type
, hh
, input_section
, 0);
2025 if (tls_r_type
!= r_type
)
2027 bfd_boolean had_plt
;
2029 had_plt
= mn10300_do_tls_transition (input_bfd
, r_type
, tls_r_type
,
2030 contents
, rel
->r_offset
);
2031 r_type
= tls_r_type
;
2032 howto
= elf_mn10300_howto_table
+ r_type
;
2035 for (trel
= rel
+1; trel
< relend
; trel
++)
2036 if ((ELF32_R_TYPE (trel
->r_info
) == R_MN10300_PLT32
2037 || ELF32_R_TYPE (trel
->r_info
) == R_MN10300_PCREL32
)
2038 && rel
->r_offset
+ had_plt
== trel
->r_offset
)
2039 trel
->r_info
= ELF32_R_INFO (0, R_MN10300_NONE
);
2042 if (r_symndx
< symtab_hdr
->sh_info
)
2044 sym
= local_syms
+ r_symndx
;
2045 sec
= local_sections
[r_symndx
];
2046 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
2050 if ((h
->root
.root
.type
== bfd_link_hash_defined
2051 || h
->root
.root
.type
== bfd_link_hash_defweak
)
2052 && ( r_type
== R_MN10300_GOTPC32
2053 || r_type
== R_MN10300_GOTPC16
2054 || (( r_type
== R_MN10300_PLT32
2055 || r_type
== R_MN10300_PLT16
)
2056 && ELF_ST_VISIBILITY (h
->root
.other
) != STV_INTERNAL
2057 && ELF_ST_VISIBILITY (h
->root
.other
) != STV_HIDDEN
2058 && h
->root
.plt
.offset
!= (bfd_vma
) -1)
2059 || (( r_type
== R_MN10300_GOT32
2060 || r_type
== R_MN10300_GOT24
2061 || r_type
== R_MN10300_TLS_GD
2062 || r_type
== R_MN10300_TLS_LD
2063 || r_type
== R_MN10300_TLS_GOTIE
2064 || r_type
== R_MN10300_TLS_IE
2065 || r_type
== R_MN10300_GOT16
)
2066 && elf_hash_table (info
)->dynamic_sections_created
2067 && !SYMBOL_REFERENCES_LOCAL (info
, hh
))
2068 || (r_type
== R_MN10300_32
2069 && !SYMBOL_REFERENCES_LOCAL (info
, hh
)
2070 /* _32 relocs in executables force _COPY relocs,
2071 such that the address of the symbol ends up
2073 && (((input_section
->flags
& SEC_ALLOC
) != 0
2074 && !bfd_link_executable (info
))
2075 /* DWARF will emit R_MN10300_32 relocations
2076 in its sections against symbols defined
2077 externally in shared libraries. We can't
2078 do anything with them here. */
2079 || ((input_section
->flags
& SEC_DEBUGGING
) != 0
2080 && h
->root
.def_dynamic
)))))
2081 /* In these cases, we don't need the relocation
2082 value. We check specially because in some
2083 obscure cases sec->output_section will be NULL. */
2086 else if (!bfd_link_relocatable (info
) && unresolved_reloc
2087 && _bfd_elf_section_offset (output_bfd
, info
, input_section
,
2088 rel
->r_offset
) != (bfd_vma
) -1)
2091 /* xgettext:c-format */
2092 (_("%pB(%pA+%#" PRIx64
"): "
2093 "unresolvable %s relocation against symbol `%s'"),
2096 (uint64_t) rel
->r_offset
,
2098 h
->root
.root
.root
.string
);
2101 if (sec
!= NULL
&& discarded_section (sec
))
2102 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
2103 rel
, 1, relend
, howto
, 0, contents
);
2105 if (bfd_link_relocatable (info
))
2108 r
= mn10300_elf_final_link_relocate (howto
, input_bfd
, output_bfd
,
2110 contents
, rel
->r_offset
,
2111 relocation
, rel
->r_addend
,
2112 (struct elf_link_hash_entry
*) h
,
2114 info
, sec
, h
== NULL
);
2116 if (r
!= bfd_reloc_ok
)
2119 const char *msg
= NULL
;
2122 name
= h
->root
.root
.root
.string
;
2125 name
= (bfd_elf_string_from_elf_section
2126 (input_bfd
, symtab_hdr
->sh_link
, sym
->st_name
));
2127 if (name
== NULL
|| *name
== '\0')
2128 name
= bfd_section_name (sec
);
2133 case bfd_reloc_overflow
:
2134 (*info
->callbacks
->reloc_overflow
)
2135 (info
, (h
? &h
->root
.root
: NULL
), name
, howto
->name
,
2136 (bfd_vma
) 0, input_bfd
, input_section
, rel
->r_offset
);
2139 case bfd_reloc_undefined
:
2140 (*info
->callbacks
->undefined_symbol
)
2141 (info
, name
, input_bfd
, input_section
, rel
->r_offset
, TRUE
);
2144 case bfd_reloc_outofrange
:
2145 msg
= _("internal error: out of range error");
2148 case bfd_reloc_notsupported
:
2149 msg
= _("internal error: unsupported relocation error");
2152 case bfd_reloc_dangerous
:
2153 if (r_type
== R_MN10300_PCREL32
)
2154 msg
= _("error: inappropriate relocation type for shared"
2155 " library (did you forget -fpic?)");
2156 else if (r_type
== R_MN10300_GOT32
)
2157 /* xgettext:c-format */
2158 msg
= _("%pB: taking the address of protected function"
2159 " '%s' cannot be done when making a shared library");
2161 msg
= _("internal error: suspicious relocation type used"
2162 " in shared library");
2166 msg
= _("internal error: unknown error");
2170 _bfd_error_handler (msg
, input_bfd
, name
);
2171 bfd_set_error (bfd_error_bad_value
);
2180 /* Finish initializing one hash table entry. */
2183 elf32_mn10300_finish_hash_table_entry (struct bfd_hash_entry
*gen_entry
,
2186 struct elf32_mn10300_link_hash_entry
*entry
;
2187 struct bfd_link_info
*link_info
= (struct bfd_link_info
*) in_args
;
2188 unsigned int byte_count
= 0;
2190 entry
= (struct elf32_mn10300_link_hash_entry
*) gen_entry
;
2192 /* If we already know we want to convert "call" to "calls" for calls
2193 to this symbol, then return now. */
2194 if (entry
->flags
== MN10300_CONVERT_CALL_TO_CALLS
)
2197 /* If there are no named calls to this symbol, or there's nothing we
2198 can move from the function itself into the "call" instruction,
2199 then note that all "call" instructions should be converted into
2200 "calls" instructions and return. If a symbol is available for
2201 dynamic symbol resolution (overridable or overriding), avoid
2202 custom calling conventions. */
2203 if (entry
->direct_calls
== 0
2204 || (entry
->stack_size
== 0 && entry
->movm_args
== 0)
2205 || (elf_hash_table (link_info
)->dynamic_sections_created
2206 && ELF_ST_VISIBILITY (entry
->root
.other
) != STV_INTERNAL
2207 && ELF_ST_VISIBILITY (entry
->root
.other
) != STV_HIDDEN
))
2209 /* Make a note that we should convert "call" instructions to "calls"
2210 instructions for calls to this symbol. */
2211 entry
->flags
|= MN10300_CONVERT_CALL_TO_CALLS
;
2215 /* We may be able to move some instructions from the function itself into
2216 the "call" instruction. Count how many bytes we might be able to
2217 eliminate in the function itself. */
2219 /* A movm instruction is two bytes. */
2220 if (entry
->movm_args
)
2223 /* Count the insn to allocate stack space too. */
2224 if (entry
->stack_size
> 0)
2226 if (entry
->stack_size
<= 128)
2232 /* If using "call" will result in larger code, then turn all
2233 the associated "call" instructions into "calls" instructions. */
2234 if (byte_count
< entry
->direct_calls
)
2235 entry
->flags
|= MN10300_CONVERT_CALL_TO_CALLS
;
2237 /* This routine never fails. */
2241 /* Used to count hash table entries. */
2244 elf32_mn10300_count_hash_table_entries (struct bfd_hash_entry
*gen_entry ATTRIBUTE_UNUSED
,
2247 int *count
= (int *) in_args
;
2253 /* Used to enumerate hash table entries into a linear array. */
2256 elf32_mn10300_list_hash_table_entries (struct bfd_hash_entry
*gen_entry
,
2259 struct bfd_hash_entry
***ptr
= (struct bfd_hash_entry
***) in_args
;
2266 /* Used to sort the array created by the above. */
2269 sort_by_value (const void *va
, const void *vb
)
2271 struct elf32_mn10300_link_hash_entry
*a
2272 = *(struct elf32_mn10300_link_hash_entry
**) va
;
2273 struct elf32_mn10300_link_hash_entry
*b
2274 = *(struct elf32_mn10300_link_hash_entry
**) vb
;
2276 return a
->value
- b
->value
;
2279 /* Compute the stack size and movm arguments for the function
2280 referred to by HASH at address ADDR in section with
2281 contents CONTENTS, store the information in the hash table. */
2284 compute_function_info (bfd
*abfd
,
2285 struct elf32_mn10300_link_hash_entry
*hash
,
2287 unsigned char *contents
)
2289 unsigned char byte1
, byte2
;
2290 /* We only care about a very small subset of the possible prologue
2291 sequences here. Basically we look for:
2293 movm [d2,d3,a2,a3],sp (optional)
2294 add <size>,sp (optional, and only for sizes which fit in an unsigned
2297 If we find anything else, we quit. */
2299 /* Look for movm [regs],sp. */
2300 byte1
= bfd_get_8 (abfd
, contents
+ addr
);
2301 byte2
= bfd_get_8 (abfd
, contents
+ addr
+ 1);
2305 hash
->movm_args
= byte2
;
2307 byte1
= bfd_get_8 (abfd
, contents
+ addr
);
2308 byte2
= bfd_get_8 (abfd
, contents
+ addr
+ 1);
2311 /* Now figure out how much stack space will be allocated by the movm
2312 instruction. We need this kept separate from the function's normal
2314 if (hash
->movm_args
)
2317 if (hash
->movm_args
& 0x80)
2318 hash
->movm_stack_size
+= 4;
2321 if (hash
->movm_args
& 0x40)
2322 hash
->movm_stack_size
+= 4;
2325 if (hash
->movm_args
& 0x20)
2326 hash
->movm_stack_size
+= 4;
2329 if (hash
->movm_args
& 0x10)
2330 hash
->movm_stack_size
+= 4;
2332 /* "other" space. d0, d1, a0, a1, mdr, lir, lar, 4 byte pad. */
2333 if (hash
->movm_args
& 0x08)
2334 hash
->movm_stack_size
+= 8 * 4;
2336 if (bfd_get_mach (abfd
) == bfd_mach_am33
2337 || bfd_get_mach (abfd
) == bfd_mach_am33_2
)
2339 /* "exother" space. e0, e1, mdrq, mcrh, mcrl, mcvf */
2340 if (hash
->movm_args
& 0x1)
2341 hash
->movm_stack_size
+= 6 * 4;
2343 /* exreg1 space. e4, e5, e6, e7 */
2344 if (hash
->movm_args
& 0x2)
2345 hash
->movm_stack_size
+= 4 * 4;
2347 /* exreg0 space. e2, e3 */
2348 if (hash
->movm_args
& 0x4)
2349 hash
->movm_stack_size
+= 2 * 4;
2353 /* Now look for the two stack adjustment variants. */
2354 if (byte1
== 0xf8 && byte2
== 0xfe)
2356 int temp
= bfd_get_8 (abfd
, contents
+ addr
+ 2);
2357 temp
= ((temp
& 0xff) ^ (~0x7f)) + 0x80;
2359 hash
->stack_size
= -temp
;
2361 else if (byte1
== 0xfa && byte2
== 0xfe)
2363 int temp
= bfd_get_16 (abfd
, contents
+ addr
+ 2);
2364 temp
= ((temp
& 0xffff) ^ (~0x7fff)) + 0x8000;
2368 hash
->stack_size
= temp
;
2371 /* If the total stack to be allocated by the call instruction is more
2372 than 255 bytes, then we can't remove the stack adjustment by using
2373 "call" (we might still be able to remove the "movm" instruction. */
2374 if (hash
->stack_size
+ hash
->movm_stack_size
> 255)
2375 hash
->stack_size
= 0;
2378 /* Delete some bytes from a section while relaxing. */
2381 mn10300_elf_relax_delete_bytes (bfd
*abfd
,
2386 Elf_Internal_Shdr
*symtab_hdr
;
2387 unsigned int sec_shndx
;
2389 Elf_Internal_Rela
*irel
, *irelend
;
2390 Elf_Internal_Rela
*irelalign
;
2392 Elf_Internal_Sym
*isym
, *isymend
;
2393 struct elf_link_hash_entry
**sym_hashes
;
2394 struct elf_link_hash_entry
**end_hashes
;
2395 unsigned int symcount
;
2397 sec_shndx
= _bfd_elf_section_from_bfd_section (abfd
, sec
);
2399 contents
= elf_section_data (sec
)->this_hdr
.contents
;
2404 irel
= elf_section_data (sec
)->relocs
;
2405 irelend
= irel
+ sec
->reloc_count
;
2407 if (sec
->reloc_count
> 0)
2409 /* If there is an align reloc at the end of the section ignore it.
2410 GAS creates these relocs for reasons of its own, and they just
2411 serve to keep the section artifically inflated. */
2412 if (ELF32_R_TYPE ((irelend
- 1)->r_info
) == (int) R_MN10300_ALIGN
)
2415 /* The deletion must stop at the next ALIGN reloc for an alignment
2416 power larger than, or not a multiple of, the number of bytes we
2418 for (; irel
< irelend
; irel
++)
2420 int alignment
= 1 << irel
->r_addend
;
2422 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_ALIGN
2423 && irel
->r_offset
> addr
2424 && irel
->r_offset
< toaddr
2425 && (count
< alignment
2426 || alignment
% count
!= 0))
2429 toaddr
= irel
->r_offset
;
2435 /* Actually delete the bytes. */
2436 memmove (contents
+ addr
, contents
+ addr
+ count
,
2437 (size_t) (toaddr
- addr
- count
));
2439 /* Adjust the section's size if we are shrinking it, or else
2440 pad the bytes between the end of the shrunken region and
2441 the start of the next region with NOP codes. */
2442 if (irelalign
== NULL
)
2445 /* Include symbols at the end of the section, but
2446 not at the end of a sub-region of the section. */
2453 #define NOP_OPCODE 0xcb
2455 for (i
= 0; i
< count
; i
++)
2456 bfd_put_8 (abfd
, (bfd_vma
) NOP_OPCODE
, contents
+ toaddr
- count
+ i
);
2459 /* Adjust all the relocs. */
2460 for (irel
= elf_section_data (sec
)->relocs
; irel
< irelend
; irel
++)
2462 /* Get the new reloc address. */
2463 if ((irel
->r_offset
> addr
2464 && irel
->r_offset
< toaddr
)
2465 || (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_ALIGN
2466 && irel
->r_offset
== toaddr
))
2467 irel
->r_offset
-= count
;
2470 /* Adjust the local symbols in the section, reducing their value
2471 by the number of bytes deleted. Note - symbols within the deleted
2472 region are moved to the address of the start of the region, which
2473 actually means that they will address the byte beyond the end of
2474 the region once the deletion has been completed. */
2475 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
2476 isym
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
2477 for (isymend
= isym
+ symtab_hdr
->sh_info
; isym
< isymend
; isym
++)
2479 if (isym
->st_shndx
== sec_shndx
2480 && isym
->st_value
> addr
2481 && isym
->st_value
< toaddr
)
2483 if (isym
->st_value
< addr
+ count
)
2484 isym
->st_value
= addr
;
2486 isym
->st_value
-= count
;
2488 /* Adjust the function symbol's size as well. */
2489 else if (isym
->st_shndx
== sec_shndx
2490 && ELF_ST_TYPE (isym
->st_info
) == STT_FUNC
2491 && isym
->st_value
+ isym
->st_size
> addr
2492 && isym
->st_value
+ isym
->st_size
< toaddr
)
2493 isym
->st_size
-= count
;
2496 /* Now adjust the global symbols defined in this section. */
2497 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2498 - symtab_hdr
->sh_info
);
2499 sym_hashes
= elf_sym_hashes (abfd
);
2500 end_hashes
= sym_hashes
+ symcount
;
2501 for (; sym_hashes
< end_hashes
; sym_hashes
++)
2503 struct elf_link_hash_entry
*sym_hash
= *sym_hashes
;
2505 if ((sym_hash
->root
.type
== bfd_link_hash_defined
2506 || sym_hash
->root
.type
== bfd_link_hash_defweak
)
2507 && sym_hash
->root
.u
.def
.section
== sec
2508 && sym_hash
->root
.u
.def
.value
> addr
2509 && sym_hash
->root
.u
.def
.value
< toaddr
)
2511 if (sym_hash
->root
.u
.def
.value
< addr
+ count
)
2512 sym_hash
->root
.u
.def
.value
= addr
;
2514 sym_hash
->root
.u
.def
.value
-= count
;
2516 /* Adjust the function symbol's size as well. */
2517 else if (sym_hash
->root
.type
== bfd_link_hash_defined
2518 && sym_hash
->root
.u
.def
.section
== sec
2519 && sym_hash
->type
== STT_FUNC
2520 && sym_hash
->root
.u
.def
.value
+ sym_hash
->size
> addr
2521 && sym_hash
->root
.u
.def
.value
+ sym_hash
->size
< toaddr
)
2522 sym_hash
->size
-= count
;
2525 /* See if we can move the ALIGN reloc forward.
2526 We have adjusted r_offset for it already. */
2527 if (irelalign
!= NULL
)
2529 bfd_vma alignto
, alignaddr
;
2531 if ((int) irelalign
->r_addend
> 0)
2533 /* This is the old address. */
2534 alignto
= BFD_ALIGN (toaddr
, 1 << irelalign
->r_addend
);
2535 /* This is where the align points to now. */
2536 alignaddr
= BFD_ALIGN (irelalign
->r_offset
,
2537 1 << irelalign
->r_addend
);
2538 if (alignaddr
< alignto
)
2539 /* Tail recursion. */
2540 return mn10300_elf_relax_delete_bytes (abfd
, sec
, alignaddr
,
2541 (int) (alignto
- alignaddr
));
2548 /* Return TRUE if a symbol exists at the given address, else return
2552 mn10300_elf_symbol_address_p (bfd
*abfd
,
2554 Elf_Internal_Sym
*isym
,
2557 Elf_Internal_Shdr
*symtab_hdr
;
2558 unsigned int sec_shndx
;
2559 Elf_Internal_Sym
*isymend
;
2560 struct elf_link_hash_entry
**sym_hashes
;
2561 struct elf_link_hash_entry
**end_hashes
;
2562 unsigned int symcount
;
2564 sec_shndx
= _bfd_elf_section_from_bfd_section (abfd
, sec
);
2566 /* Examine all the symbols. */
2567 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
2568 for (isymend
= isym
+ symtab_hdr
->sh_info
; isym
< isymend
; isym
++)
2569 if (isym
->st_shndx
== sec_shndx
2570 && isym
->st_value
== addr
)
2573 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2574 - symtab_hdr
->sh_info
);
2575 sym_hashes
= elf_sym_hashes (abfd
);
2576 end_hashes
= sym_hashes
+ symcount
;
2577 for (; sym_hashes
< end_hashes
; sym_hashes
++)
2579 struct elf_link_hash_entry
*sym_hash
= *sym_hashes
;
2581 if ((sym_hash
->root
.type
== bfd_link_hash_defined
2582 || sym_hash
->root
.type
== bfd_link_hash_defweak
)
2583 && sym_hash
->root
.u
.def
.section
== sec
2584 && sym_hash
->root
.u
.def
.value
== addr
)
2591 /* This function handles relaxing for the mn10300.
2593 There are quite a few relaxing opportunities available on the mn10300:
2595 * calls:32 -> calls:16 2 bytes
2596 * call:32 -> call:16 2 bytes
2598 * call:32 -> calls:32 1 byte
2599 * call:16 -> calls:16 1 byte
2600 * These are done anytime using "calls" would result
2601 in smaller code, or when necessary to preserve the
2602 meaning of the program.
2606 * In some circumstances we can move instructions
2607 from a function prologue into a "call" instruction.
2608 This is only done if the resulting code is no larger
2609 than the original code.
2611 * jmp:32 -> jmp:16 2 bytes
2612 * jmp:16 -> bra:8 1 byte
2614 * If the previous instruction is a conditional branch
2615 around the jump/bra, we may be able to reverse its condition
2616 and change its target to the jump's target. The jump/bra
2617 can then be deleted. 2 bytes
2619 * mov abs32 -> mov abs16 1 or 2 bytes
2621 * Most instructions which accept imm32 can relax to imm16 1 or 2 bytes
2622 - Most instructions which accept imm16 can relax to imm8 1 or 2 bytes
2624 * Most instructions which accept d32 can relax to d16 1 or 2 bytes
2625 - Most instructions which accept d16 can relax to d8 1 or 2 bytes
2627 We don't handle imm16->imm8 or d16->d8 as they're very rare
2628 and somewhat more difficult to support. */
2631 mn10300_elf_relax_section (bfd
*abfd
,
2633 struct bfd_link_info
*link_info
,
2636 Elf_Internal_Shdr
*symtab_hdr
;
2637 Elf_Internal_Rela
*internal_relocs
= NULL
;
2638 Elf_Internal_Rela
*irel
, *irelend
;
2639 bfd_byte
*contents
= NULL
;
2640 Elf_Internal_Sym
*isymbuf
= NULL
;
2641 struct elf32_mn10300_link_hash_table
*hash_table
;
2642 asection
*section
= sec
;
2643 bfd_vma align_gap_adjustment
;
2645 if (bfd_link_relocatable (link_info
))
2646 (*link_info
->callbacks
->einfo
)
2647 (_("%P%F: --relax and -r may not be used together\n"));
2649 /* Assume nothing changes. */
2652 /* We need a pointer to the mn10300 specific hash table. */
2653 hash_table
= elf32_mn10300_hash_table (link_info
);
2654 if (hash_table
== NULL
)
2657 /* Initialize fields in each hash table entry the first time through. */
2658 if ((hash_table
->flags
& MN10300_HASH_ENTRIES_INITIALIZED
) == 0)
2662 /* Iterate over all the input bfds. */
2663 for (input_bfd
= link_info
->input_bfds
;
2665 input_bfd
= input_bfd
->link
.next
)
2667 /* We're going to need all the symbols for each bfd. */
2668 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
2669 if (symtab_hdr
->sh_info
!= 0)
2671 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
2672 if (isymbuf
== NULL
)
2673 isymbuf
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
2674 symtab_hdr
->sh_info
, 0,
2676 if (isymbuf
== NULL
)
2680 /* Iterate over each section in this bfd. */
2681 for (section
= input_bfd
->sections
;
2683 section
= section
->next
)
2685 struct elf32_mn10300_link_hash_entry
*hash
;
2686 asection
*sym_sec
= NULL
;
2687 const char *sym_name
;
2690 /* If there's nothing to do in this section, skip it. */
2691 if (! ((section
->flags
& SEC_RELOC
) != 0
2692 && section
->reloc_count
!= 0))
2694 if ((section
->flags
& SEC_ALLOC
) == 0)
2697 /* Get cached copy of section contents if it exists. */
2698 if (elf_section_data (section
)->this_hdr
.contents
!= NULL
)
2699 contents
= elf_section_data (section
)->this_hdr
.contents
;
2700 else if (section
->size
!= 0)
2702 /* Go get them off disk. */
2703 if (!bfd_malloc_and_get_section (input_bfd
, section
,
2710 /* If there aren't any relocs, then there's nothing to do. */
2711 if ((section
->flags
& SEC_RELOC
) != 0
2712 && section
->reloc_count
!= 0)
2714 /* Get a copy of the native relocations. */
2715 internal_relocs
= _bfd_elf_link_read_relocs (input_bfd
, section
,
2717 link_info
->keep_memory
);
2718 if (internal_relocs
== NULL
)
2721 /* Now examine each relocation. */
2722 irel
= internal_relocs
;
2723 irelend
= irel
+ section
->reloc_count
;
2724 for (; irel
< irelend
; irel
++)
2727 unsigned long r_index
;
2730 r_type
= ELF32_R_TYPE (irel
->r_info
);
2731 r_index
= ELF32_R_SYM (irel
->r_info
);
2733 if (r_type
< 0 || r_type
>= (int) R_MN10300_MAX
)
2736 /* We need the name and hash table entry of the target
2741 if (r_index
< symtab_hdr
->sh_info
)
2743 /* A local symbol. */
2744 Elf_Internal_Sym
*isym
;
2745 struct elf_link_hash_table
*elftab
;
2748 isym
= isymbuf
+ r_index
;
2749 if (isym
->st_shndx
== SHN_UNDEF
)
2750 sym_sec
= bfd_und_section_ptr
;
2751 else if (isym
->st_shndx
== SHN_ABS
)
2752 sym_sec
= bfd_abs_section_ptr
;
2753 else if (isym
->st_shndx
== SHN_COMMON
)
2754 sym_sec
= bfd_com_section_ptr
;
2757 = bfd_section_from_elf_index (input_bfd
,
2761 = bfd_elf_string_from_elf_section (input_bfd
,
2766 /* If it isn't a function, then we don't care
2768 if (ELF_ST_TYPE (isym
->st_info
) != STT_FUNC
)
2771 /* Tack on an ID so we can uniquely identify this
2772 local symbol in the global hash table. */
2773 amt
= strlen (sym_name
) + 10;
2774 new_name
= bfd_malloc (amt
);
2775 if (new_name
== NULL
)
2778 sprintf (new_name
, "%s_%08x", sym_name
, sym_sec
->id
);
2779 sym_name
= new_name
;
2781 elftab
= &hash_table
->static_hash_table
->root
;
2782 hash
= ((struct elf32_mn10300_link_hash_entry
*)
2783 elf_link_hash_lookup (elftab
, sym_name
,
2784 TRUE
, TRUE
, FALSE
));
2789 r_index
-= symtab_hdr
->sh_info
;
2790 hash
= (struct elf32_mn10300_link_hash_entry
*)
2791 elf_sym_hashes (input_bfd
)[r_index
];
2794 sym_name
= hash
->root
.root
.root
.string
;
2795 if ((section
->flags
& SEC_CODE
) != 0)
2797 /* If this is not a "call" instruction, then we
2798 should convert "call" instructions to "calls"
2800 code
= bfd_get_8 (input_bfd
,
2801 contents
+ irel
->r_offset
- 1);
2802 if (code
!= 0xdd && code
!= 0xcd)
2803 hash
->flags
|= MN10300_CONVERT_CALL_TO_CALLS
;
2806 /* If this is a jump/call, then bump the
2807 direct_calls counter. Else force "call" to
2808 "calls" conversions. */
2809 if (r_type
== R_MN10300_PCREL32
2810 || r_type
== R_MN10300_PLT32
2811 || r_type
== R_MN10300_PLT16
2812 || r_type
== R_MN10300_PCREL16
)
2813 hash
->direct_calls
++;
2815 hash
->flags
|= MN10300_CONVERT_CALL_TO_CALLS
;
2819 /* Now look at the actual contents to get the stack size,
2820 and a list of what registers were saved in the prologue
2822 if ((section
->flags
& SEC_CODE
) != 0)
2824 Elf_Internal_Sym
*isym
, *isymend
;
2825 unsigned int sec_shndx
;
2826 struct elf_link_hash_entry
**hashes
;
2827 struct elf_link_hash_entry
**end_hashes
;
2828 unsigned int symcount
;
2830 sec_shndx
= _bfd_elf_section_from_bfd_section (input_bfd
,
2833 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2834 - symtab_hdr
->sh_info
);
2835 hashes
= elf_sym_hashes (input_bfd
);
2836 end_hashes
= hashes
+ symcount
;
2838 /* Look at each function defined in this section and
2839 update info for that function. */
2840 isymend
= isymbuf
+ symtab_hdr
->sh_info
;
2841 for (isym
= isymbuf
; isym
< isymend
; isym
++)
2843 if (isym
->st_shndx
== sec_shndx
2844 && ELF_ST_TYPE (isym
->st_info
) == STT_FUNC
)
2846 struct elf_link_hash_table
*elftab
;
2848 struct elf_link_hash_entry
**lhashes
= hashes
;
2850 /* Skip a local symbol if it aliases a
2852 for (; lhashes
< end_hashes
; lhashes
++)
2854 hash
= (struct elf32_mn10300_link_hash_entry
*) *lhashes
;
2855 if ((hash
->root
.root
.type
== bfd_link_hash_defined
2856 || hash
->root
.root
.type
== bfd_link_hash_defweak
)
2857 && hash
->root
.root
.u
.def
.section
== section
2858 && hash
->root
.type
== STT_FUNC
2859 && hash
->root
.root
.u
.def
.value
== isym
->st_value
)
2862 if (lhashes
!= end_hashes
)
2865 if (isym
->st_shndx
== SHN_UNDEF
)
2866 sym_sec
= bfd_und_section_ptr
;
2867 else if (isym
->st_shndx
== SHN_ABS
)
2868 sym_sec
= bfd_abs_section_ptr
;
2869 else if (isym
->st_shndx
== SHN_COMMON
)
2870 sym_sec
= bfd_com_section_ptr
;
2873 = bfd_section_from_elf_index (input_bfd
,
2876 sym_name
= (bfd_elf_string_from_elf_section
2877 (input_bfd
, symtab_hdr
->sh_link
,
2880 /* Tack on an ID so we can uniquely identify this
2881 local symbol in the global hash table. */
2882 amt
= strlen (sym_name
) + 10;
2883 new_name
= bfd_malloc (amt
);
2884 if (new_name
== NULL
)
2887 sprintf (new_name
, "%s_%08x", sym_name
, sym_sec
->id
);
2888 sym_name
= new_name
;
2890 elftab
= &hash_table
->static_hash_table
->root
;
2891 hash
= ((struct elf32_mn10300_link_hash_entry
*)
2892 elf_link_hash_lookup (elftab
, sym_name
,
2893 TRUE
, TRUE
, FALSE
));
2895 compute_function_info (input_bfd
, hash
,
2896 isym
->st_value
, contents
);
2897 hash
->value
= isym
->st_value
;
2901 for (; hashes
< end_hashes
; hashes
++)
2903 hash
= (struct elf32_mn10300_link_hash_entry
*) *hashes
;
2904 if ((hash
->root
.root
.type
== bfd_link_hash_defined
2905 || hash
->root
.root
.type
== bfd_link_hash_defweak
)
2906 && hash
->root
.root
.u
.def
.section
== section
2907 && hash
->root
.type
== STT_FUNC
)
2908 compute_function_info (input_bfd
, hash
,
2909 (hash
)->root
.root
.u
.def
.value
,
2914 /* Cache or free any memory we allocated for the relocs. */
2915 if (elf_section_data (section
)->relocs
!= internal_relocs
)
2916 free (internal_relocs
);
2917 internal_relocs
= NULL
;
2919 /* Cache or free any memory we allocated for the contents. */
2920 if (contents
!= NULL
2921 && elf_section_data (section
)->this_hdr
.contents
!= contents
)
2923 if (! link_info
->keep_memory
)
2927 /* Cache the section contents for elf_link_input_bfd. */
2928 elf_section_data (section
)->this_hdr
.contents
= contents
;
2934 /* Cache or free any memory we allocated for the symbols. */
2936 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
2938 if (! link_info
->keep_memory
)
2942 /* Cache the symbols for elf_link_input_bfd. */
2943 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
2949 /* Now iterate on each symbol in the hash table and perform
2950 the final initialization steps on each. */
2951 elf32_mn10300_link_hash_traverse (hash_table
,
2952 elf32_mn10300_finish_hash_table_entry
,
2954 elf32_mn10300_link_hash_traverse (hash_table
->static_hash_table
,
2955 elf32_mn10300_finish_hash_table_entry
,
2959 /* This section of code collects all our local symbols, sorts
2960 them by value, and looks for multiple symbols referring to
2961 the same address. For those symbols, the flags are merged.
2962 At this point, the only flag that can be set is
2963 MN10300_CONVERT_CALL_TO_CALLS, so we simply OR the flags
2965 int static_count
= 0, i
;
2966 struct elf32_mn10300_link_hash_entry
**entries
;
2967 struct elf32_mn10300_link_hash_entry
**ptr
;
2969 elf32_mn10300_link_hash_traverse (hash_table
->static_hash_table
,
2970 elf32_mn10300_count_hash_table_entries
,
2973 entries
= bfd_malloc (static_count
* sizeof (* ptr
));
2976 elf32_mn10300_link_hash_traverse (hash_table
->static_hash_table
,
2977 elf32_mn10300_list_hash_table_entries
,
2980 qsort (entries
, static_count
, sizeof (entries
[0]), sort_by_value
);
2982 for (i
= 0; i
< static_count
- 1; i
++)
2983 if (entries
[i
]->value
&& entries
[i
]->value
== entries
[i
+1]->value
)
2985 int v
= entries
[i
]->flags
;
2988 for (j
= i
+ 1; j
< static_count
&& entries
[j
]->value
== entries
[i
]->value
; j
++)
2989 v
|= entries
[j
]->flags
;
2991 for (j
= i
; j
< static_count
&& entries
[j
]->value
== entries
[i
]->value
; j
++)
2992 entries
[j
]->flags
= v
;
2998 /* All entries in the hash table are fully initialized. */
2999 hash_table
->flags
|= MN10300_HASH_ENTRIES_INITIALIZED
;
3001 /* Now that everything has been initialized, go through each
3002 code section and delete any prologue insns which will be
3003 redundant because their operations will be performed by
3004 a "call" instruction. */
3005 for (input_bfd
= link_info
->input_bfds
;
3007 input_bfd
= input_bfd
->link
.next
)
3009 /* We're going to need all the local symbols for each bfd. */
3010 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
3011 if (symtab_hdr
->sh_info
!= 0)
3013 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
3014 if (isymbuf
== NULL
)
3015 isymbuf
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
3016 symtab_hdr
->sh_info
, 0,
3018 if (isymbuf
== NULL
)
3022 /* Walk over each section in this bfd. */
3023 for (section
= input_bfd
->sections
;
3025 section
= section
->next
)
3027 unsigned int sec_shndx
;
3028 Elf_Internal_Sym
*isym
, *isymend
;
3029 struct elf_link_hash_entry
**hashes
;
3030 struct elf_link_hash_entry
**end_hashes
;
3031 unsigned int symcount
;
3033 /* Skip non-code sections and empty sections. */
3034 if ((section
->flags
& SEC_CODE
) == 0 || section
->size
== 0)
3037 if (section
->reloc_count
!= 0)
3039 /* Get a copy of the native relocations. */
3040 internal_relocs
= _bfd_elf_link_read_relocs (input_bfd
, section
,
3042 link_info
->keep_memory
);
3043 if (internal_relocs
== NULL
)
3047 /* Get cached copy of section contents if it exists. */
3048 if (elf_section_data (section
)->this_hdr
.contents
!= NULL
)
3049 contents
= elf_section_data (section
)->this_hdr
.contents
;
3052 /* Go get them off disk. */
3053 if (!bfd_malloc_and_get_section (input_bfd
, section
,
3058 sec_shndx
= _bfd_elf_section_from_bfd_section (input_bfd
,
3061 /* Now look for any function in this section which needs
3062 insns deleted from its prologue. */
3063 isymend
= isymbuf
+ symtab_hdr
->sh_info
;
3064 for (isym
= isymbuf
; isym
< isymend
; isym
++)
3066 struct elf32_mn10300_link_hash_entry
*sym_hash
;
3067 asection
*sym_sec
= NULL
;
3068 const char *sym_name
;
3070 struct elf_link_hash_table
*elftab
;
3073 if (isym
->st_shndx
!= sec_shndx
)
3076 if (isym
->st_shndx
== SHN_UNDEF
)
3077 sym_sec
= bfd_und_section_ptr
;
3078 else if (isym
->st_shndx
== SHN_ABS
)
3079 sym_sec
= bfd_abs_section_ptr
;
3080 else if (isym
->st_shndx
== SHN_COMMON
)
3081 sym_sec
= bfd_com_section_ptr
;
3084 = bfd_section_from_elf_index (input_bfd
, isym
->st_shndx
);
3087 = bfd_elf_string_from_elf_section (input_bfd
,
3088 symtab_hdr
->sh_link
,
3091 /* Tack on an ID so we can uniquely identify this
3092 local symbol in the global hash table. */
3093 amt
= strlen (sym_name
) + 10;
3094 new_name
= bfd_malloc (amt
);
3095 if (new_name
== NULL
)
3097 sprintf (new_name
, "%s_%08x", sym_name
, sym_sec
->id
);
3098 sym_name
= new_name
;
3100 elftab
= & hash_table
->static_hash_table
->root
;
3101 sym_hash
= (struct elf32_mn10300_link_hash_entry
*)
3102 elf_link_hash_lookup (elftab
, sym_name
,
3103 FALSE
, FALSE
, FALSE
);
3106 if (sym_hash
== NULL
)
3109 if (! (sym_hash
->flags
& MN10300_CONVERT_CALL_TO_CALLS
)
3110 && ! (sym_hash
->flags
& MN10300_DELETED_PROLOGUE_BYTES
))
3114 /* Note that we've changed things. */
3115 elf_section_data (section
)->relocs
= internal_relocs
;
3116 elf_section_data (section
)->this_hdr
.contents
= contents
;
3117 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3119 /* Count how many bytes we're going to delete. */
3120 if (sym_hash
->movm_args
)
3123 if (sym_hash
->stack_size
> 0)
3125 if (sym_hash
->stack_size
<= 128)
3131 /* Note that we've deleted prologue bytes for this
3133 sym_hash
->flags
|= MN10300_DELETED_PROLOGUE_BYTES
;
3135 /* Actually delete the bytes. */
3136 if (!mn10300_elf_relax_delete_bytes (input_bfd
,
3142 /* Something changed. Not strictly necessary, but
3143 may lead to more relaxing opportunities. */
3148 /* Look for any global functions in this section which
3149 need insns deleted from their prologues. */
3150 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
3151 - symtab_hdr
->sh_info
);
3152 hashes
= elf_sym_hashes (input_bfd
);
3153 end_hashes
= hashes
+ symcount
;
3154 for (; hashes
< end_hashes
; hashes
++)
3156 struct elf32_mn10300_link_hash_entry
*sym_hash
;
3158 sym_hash
= (struct elf32_mn10300_link_hash_entry
*) *hashes
;
3159 if ((sym_hash
->root
.root
.type
== bfd_link_hash_defined
3160 || sym_hash
->root
.root
.type
== bfd_link_hash_defweak
)
3161 && sym_hash
->root
.root
.u
.def
.section
== section
3162 && ! (sym_hash
->flags
& MN10300_CONVERT_CALL_TO_CALLS
)
3163 && ! (sym_hash
->flags
& MN10300_DELETED_PROLOGUE_BYTES
))
3167 struct elf_link_hash_entry
**hh
;
3169 /* Note that we've changed things. */
3170 elf_section_data (section
)->relocs
= internal_relocs
;
3171 elf_section_data (section
)->this_hdr
.contents
= contents
;
3172 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3174 /* Count how many bytes we're going to delete. */
3175 if (sym_hash
->movm_args
)
3178 if (sym_hash
->stack_size
> 0)
3180 if (sym_hash
->stack_size
<= 128)
3186 /* Note that we've deleted prologue bytes for this
3188 sym_hash
->flags
|= MN10300_DELETED_PROLOGUE_BYTES
;
3190 /* Actually delete the bytes. */
3191 symval
= sym_hash
->root
.root
.u
.def
.value
;
3192 if (!mn10300_elf_relax_delete_bytes (input_bfd
,
3198 /* There may be other C++ functions symbols with the same
3199 address. If so then mark these as having had their
3200 prologue bytes deleted as well. */
3201 for (hh
= elf_sym_hashes (input_bfd
); hh
< end_hashes
; hh
++)
3203 struct elf32_mn10300_link_hash_entry
*h
;
3205 h
= (struct elf32_mn10300_link_hash_entry
*) * hh
;
3208 && (h
->root
.root
.type
== bfd_link_hash_defined
3209 || h
->root
.root
.type
== bfd_link_hash_defweak
)
3210 && h
->root
.root
.u
.def
.section
== section
3211 && ! (h
->flags
& MN10300_CONVERT_CALL_TO_CALLS
)
3212 && h
->root
.root
.u
.def
.value
== symval
3213 && h
->root
.type
== STT_FUNC
)
3214 h
->flags
|= MN10300_DELETED_PROLOGUE_BYTES
;
3217 /* Something changed. Not strictly necessary, but
3218 may lead to more relaxing opportunities. */
3223 /* Cache or free any memory we allocated for the relocs. */
3224 if (elf_section_data (section
)->relocs
!= internal_relocs
)
3225 free (internal_relocs
);
3226 internal_relocs
= NULL
;
3228 /* Cache or free any memory we allocated for the contents. */
3229 if (contents
!= NULL
3230 && elf_section_data (section
)->this_hdr
.contents
!= contents
)
3232 if (! link_info
->keep_memory
)
3235 /* Cache the section contents for elf_link_input_bfd. */
3236 elf_section_data (section
)->this_hdr
.contents
= contents
;
3241 /* Cache or free any memory we allocated for the symbols. */
3243 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
3245 if (! link_info
->keep_memory
)
3248 /* Cache the symbols for elf_link_input_bfd. */
3249 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3255 /* (Re)initialize for the basic instruction shortening/relaxing pass. */
3257 internal_relocs
= NULL
;
3259 /* For error_return. */
3262 /* We don't have to do anything for a relocatable link, if
3263 this section does not have relocs, or if this is not a
3265 if (bfd_link_relocatable (link_info
)
3266 || (sec
->flags
& SEC_RELOC
) == 0
3267 || sec
->reloc_count
== 0
3268 || (sec
->flags
& SEC_CODE
) == 0)
3271 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
3273 /* Get a copy of the native relocations. */
3274 internal_relocs
= _bfd_elf_link_read_relocs (abfd
, sec
, NULL
, NULL
,
3275 link_info
->keep_memory
);
3276 if (internal_relocs
== NULL
)
3279 /* Scan for worst case alignment gap changes. Note that this logic
3280 is not ideal; what we should do is run this scan for every
3281 opcode/address range and adjust accordingly, but that's
3282 expensive. Worst case is that for an alignment of N bytes, we
3283 move by 2*N-N-1 bytes, assuming we have aligns of 1, 2, 4, 8, etc
3284 all before it. Plus, this still doesn't cover cross-section
3285 jumps with section alignment. */
3286 irelend
= internal_relocs
+ sec
->reloc_count
;
3287 align_gap_adjustment
= 0;
3288 for (irel
= internal_relocs
; irel
< irelend
; irel
++)
3290 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_ALIGN
)
3292 bfd_vma adj
= 1 << irel
->r_addend
;
3293 bfd_vma aend
= irel
->r_offset
;
3295 aend
= BFD_ALIGN (aend
, 1 << irel
->r_addend
);
3296 adj
= 2 * adj
- adj
- 1;
3298 /* Record the biggest adjustmnet. Skip any alignment at the
3299 end of our section. */
3300 if (align_gap_adjustment
< adj
3301 && aend
< sec
->output_section
->vma
+ sec
->output_offset
+ sec
->size
)
3302 align_gap_adjustment
= adj
;
3306 /* Walk through them looking for relaxing opportunities. */
3307 irelend
= internal_relocs
+ sec
->reloc_count
;
3308 for (irel
= internal_relocs
; irel
< irelend
; irel
++)
3311 bfd_signed_vma jump_offset
;
3312 asection
*sym_sec
= NULL
;
3313 struct elf32_mn10300_link_hash_entry
*h
= NULL
;
3315 /* If this isn't something that can be relaxed, then ignore
3317 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_NONE
3318 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_8
3319 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_MAX
)
3322 /* Get the section contents if we haven't done so already. */
3323 if (contents
== NULL
)
3325 /* Get cached copy if it exists. */
3326 if (elf_section_data (sec
)->this_hdr
.contents
!= NULL
)
3327 contents
= elf_section_data (sec
)->this_hdr
.contents
;
3330 /* Go get them off disk. */
3331 if (!bfd_malloc_and_get_section (abfd
, sec
, &contents
))
3336 /* Read this BFD's symbols if we haven't done so already. */
3337 if (isymbuf
== NULL
&& symtab_hdr
->sh_info
!= 0)
3339 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
3340 if (isymbuf
== NULL
)
3341 isymbuf
= bfd_elf_get_elf_syms (abfd
, symtab_hdr
,
3342 symtab_hdr
->sh_info
, 0,
3344 if (isymbuf
== NULL
)
3348 /* Get the value of the symbol referred to by the reloc. */
3349 if (ELF32_R_SYM (irel
->r_info
) < symtab_hdr
->sh_info
)
3351 Elf_Internal_Sym
*isym
;
3352 const char *sym_name
;
3355 /* A local symbol. */
3356 isym
= isymbuf
+ ELF32_R_SYM (irel
->r_info
);
3357 if (isym
->st_shndx
== SHN_UNDEF
)
3358 sym_sec
= bfd_und_section_ptr
;
3359 else if (isym
->st_shndx
== SHN_ABS
)
3360 sym_sec
= bfd_abs_section_ptr
;
3361 else if (isym
->st_shndx
== SHN_COMMON
)
3362 sym_sec
= bfd_com_section_ptr
;
3364 sym_sec
= bfd_section_from_elf_index (abfd
, isym
->st_shndx
);
3366 sym_name
= bfd_elf_string_from_elf_section (abfd
,
3367 symtab_hdr
->sh_link
,
3370 if ((sym_sec
->flags
& SEC_MERGE
)
3371 && sym_sec
->sec_info_type
== SEC_INFO_TYPE_MERGE
)
3373 symval
= isym
->st_value
;
3375 /* GAS may reduce relocations against symbols in SEC_MERGE
3376 sections to a relocation against the section symbol when
3377 the original addend was zero. When the reloc is against
3378 a section symbol we should include the addend in the
3379 offset passed to _bfd_merged_section_offset, since the
3380 location of interest is the original symbol. On the
3381 other hand, an access to "sym+addend" where "sym" is not
3382 a section symbol should not include the addend; Such an
3383 access is presumed to be an offset from "sym"; The
3384 location of interest is just "sym". */
3385 if (ELF_ST_TYPE (isym
->st_info
) == STT_SECTION
)
3386 symval
+= irel
->r_addend
;
3388 symval
= _bfd_merged_section_offset (abfd
, & sym_sec
,
3389 elf_section_data (sym_sec
)->sec_info
,
3392 if (ELF_ST_TYPE (isym
->st_info
) != STT_SECTION
)
3393 symval
+= irel
->r_addend
;
3395 symval
+= sym_sec
->output_section
->vma
3396 + sym_sec
->output_offset
- irel
->r_addend
;
3399 symval
= (isym
->st_value
3400 + sym_sec
->output_section
->vma
3401 + sym_sec
->output_offset
);
3403 /* Tack on an ID so we can uniquely identify this
3404 local symbol in the global hash table. */
3405 new_name
= bfd_malloc ((bfd_size_type
) strlen (sym_name
) + 10);
3406 if (new_name
== NULL
)
3408 sprintf (new_name
, "%s_%08x", sym_name
, sym_sec
->id
);
3409 sym_name
= new_name
;
3411 h
= (struct elf32_mn10300_link_hash_entry
*)
3412 elf_link_hash_lookup (&hash_table
->static_hash_table
->root
,
3413 sym_name
, FALSE
, FALSE
, FALSE
);
3420 /* An external symbol. */
3421 indx
= ELF32_R_SYM (irel
->r_info
) - symtab_hdr
->sh_info
;
3422 h
= (struct elf32_mn10300_link_hash_entry
*)
3423 (elf_sym_hashes (abfd
)[indx
]);
3424 BFD_ASSERT (h
!= NULL
);
3425 if (h
->root
.root
.type
!= bfd_link_hash_defined
3426 && h
->root
.root
.type
!= bfd_link_hash_defweak
)
3427 /* This appears to be a reference to an undefined
3428 symbol. Just ignore it--it will be caught by the
3429 regular reloc processing. */
3432 /* Check for a reference to a discarded symbol and ignore it. */
3433 if (h
->root
.root
.u
.def
.section
->output_section
== NULL
)
3436 sym_sec
= h
->root
.root
.u
.def
.section
->output_section
;
3438 symval
= (h
->root
.root
.u
.def
.value
3439 + h
->root
.root
.u
.def
.section
->output_section
->vma
3440 + h
->root
.root
.u
.def
.section
->output_offset
);
3443 /* For simplicity of coding, we are going to modify the section
3444 contents, the section relocs, and the BFD symbol table. We
3445 must tell the rest of the code not to free up this
3446 information. It would be possible to instead create a table
3447 of changes which have to be made, as is done in coff-mips.c;
3448 that would be more work, but would require less memory when
3449 the linker is run. */
3451 /* Try to turn a 32bit pc-relative branch/call into a 16bit pc-relative
3452 branch/call, also deal with "call" -> "calls" conversions and
3453 insertion of prologue data into "call" instructions. */
3454 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PCREL32
3455 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PLT32
)
3457 bfd_vma value
= symval
;
3459 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PLT32
3461 && ELF_ST_VISIBILITY (h
->root
.other
) != STV_INTERNAL
3462 && ELF_ST_VISIBILITY (h
->root
.other
) != STV_HIDDEN
3463 && h
->root
.plt
.offset
!= (bfd_vma
) -1)
3467 splt
= hash_table
->root
.splt
;
3468 value
= ((splt
->output_section
->vma
3469 + splt
->output_offset
3470 + h
->root
.plt
.offset
)
3471 - (sec
->output_section
->vma
3472 + sec
->output_offset
3476 /* If we've got a "call" instruction that needs to be turned
3477 into a "calls" instruction, do so now. It saves a byte. */
3478 if (h
&& (h
->flags
& MN10300_CONVERT_CALL_TO_CALLS
))
3482 /* Get the opcode. */
3483 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3485 /* Make sure we're working with a "call" instruction! */
3488 /* Note that we've changed the relocs, section contents,
3490 elf_section_data (sec
)->relocs
= internal_relocs
;
3491 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3492 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3494 /* Fix the opcode. */
3495 bfd_put_8 (abfd
, 0xfc, contents
+ irel
->r_offset
- 1);
3496 bfd_put_8 (abfd
, 0xff, contents
+ irel
->r_offset
);
3498 /* Fix irel->r_offset and irel->r_addend. */
3499 irel
->r_offset
+= 1;
3500 irel
->r_addend
+= 1;
3502 /* Delete one byte of data. */
3503 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3504 irel
->r_offset
+ 3, 1))
3507 /* That will change things, so, we should relax again.
3508 Note that this is not required, and it may be slow. */
3514 /* We've got a "call" instruction which needs some data
3515 from target function filled in. */
3518 /* Get the opcode. */
3519 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3521 /* Insert data from the target function into the "call"
3522 instruction if needed. */
3525 bfd_put_8 (abfd
, h
->movm_args
, contents
+ irel
->r_offset
+ 4);
3526 bfd_put_8 (abfd
, h
->stack_size
+ h
->movm_stack_size
,
3527 contents
+ irel
->r_offset
+ 5);
3531 /* Deal with pc-relative gunk. */
3532 value
-= (sec
->output_section
->vma
+ sec
->output_offset
);
3533 value
-= irel
->r_offset
;
3534 value
+= irel
->r_addend
;
3536 /* See if the value will fit in 16 bits, note the high value is
3537 0x7fff + 2 as the target will be two bytes closer if we are
3538 able to relax, if it's in the same section. */
3539 if (sec
->output_section
== sym_sec
->output_section
)
3540 jump_offset
= 0x8001;
3542 jump_offset
= 0x7fff;
3544 /* Account for jumps across alignment boundaries using
3545 align_gap_adjustment. */
3546 if ((bfd_signed_vma
) value
< jump_offset
- (bfd_signed_vma
) align_gap_adjustment
3547 && ((bfd_signed_vma
) value
> -0x8000 + (bfd_signed_vma
) align_gap_adjustment
))
3551 /* Get the opcode. */
3552 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3554 if (code
!= 0xdc && code
!= 0xdd && code
!= 0xff)
3557 /* Note that we've changed the relocs, section contents, etc. */
3558 elf_section_data (sec
)->relocs
= internal_relocs
;
3559 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3560 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3562 /* Fix the opcode. */
3564 bfd_put_8 (abfd
, 0xcc, contents
+ irel
->r_offset
- 1);
3565 else if (code
== 0xdd)
3566 bfd_put_8 (abfd
, 0xcd, contents
+ irel
->r_offset
- 1);
3567 else if (code
== 0xff)
3568 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
3570 /* Fix the relocation's type. */
3571 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
3572 (ELF32_R_TYPE (irel
->r_info
)
3573 == (int) R_MN10300_PLT32
)
3577 /* Delete two bytes of data. */
3578 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3579 irel
->r_offset
+ 1, 2))
3582 /* That will change things, so, we should relax again.
3583 Note that this is not required, and it may be slow. */
3588 /* Try to turn a 16bit pc-relative branch into a 8bit pc-relative
3590 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PCREL16
)
3592 bfd_vma value
= symval
;
3594 /* If we've got a "call" instruction that needs to be turned
3595 into a "calls" instruction, do so now. It saves a byte. */
3596 if (h
&& (h
->flags
& MN10300_CONVERT_CALL_TO_CALLS
))
3600 /* Get the opcode. */
3601 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3603 /* Make sure we're working with a "call" instruction! */
3606 /* Note that we've changed the relocs, section contents,
3608 elf_section_data (sec
)->relocs
= internal_relocs
;
3609 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3610 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3612 /* Fix the opcode. */
3613 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 1);
3614 bfd_put_8 (abfd
, 0xff, contents
+ irel
->r_offset
);
3616 /* Fix irel->r_offset and irel->r_addend. */
3617 irel
->r_offset
+= 1;
3618 irel
->r_addend
+= 1;
3620 /* Delete one byte of data. */
3621 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3622 irel
->r_offset
+ 1, 1))
3625 /* That will change things, so, we should relax again.
3626 Note that this is not required, and it may be slow. */
3634 /* Get the opcode. */
3635 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3637 /* Insert data from the target function into the "call"
3638 instruction if needed. */
3641 bfd_put_8 (abfd
, h
->movm_args
, contents
+ irel
->r_offset
+ 2);
3642 bfd_put_8 (abfd
, h
->stack_size
+ h
->movm_stack_size
,
3643 contents
+ irel
->r_offset
+ 3);
3647 /* Deal with pc-relative gunk. */
3648 value
-= (sec
->output_section
->vma
+ sec
->output_offset
);
3649 value
-= irel
->r_offset
;
3650 value
+= irel
->r_addend
;
3652 /* See if the value will fit in 8 bits, note the high value is
3653 0x7f + 1 as the target will be one bytes closer if we are
3655 if ((long) value
< 0x80 && (long) value
> -0x80)
3659 /* Get the opcode. */
3660 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3665 /* Note that we've changed the relocs, section contents, etc. */
3666 elf_section_data (sec
)->relocs
= internal_relocs
;
3667 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3668 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3670 /* Fix the opcode. */
3671 bfd_put_8 (abfd
, 0xca, contents
+ irel
->r_offset
- 1);
3673 /* Fix the relocation's type. */
3674 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
3677 /* Delete one byte of data. */
3678 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3679 irel
->r_offset
+ 1, 1))
3682 /* That will change things, so, we should relax again.
3683 Note that this is not required, and it may be slow. */
3688 /* Try to eliminate an unconditional 8 bit pc-relative branch
3689 which immediately follows a conditional 8 bit pc-relative
3690 branch around the unconditional branch.
3697 This happens when the bCC can't reach lab2 at assembly time,
3698 but due to other relaxations it can reach at link time. */
3699 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PCREL8
)
3701 Elf_Internal_Rela
*nrel
;
3702 bfd_vma value
= symval
;
3705 /* Deal with pc-relative gunk. */
3706 value
-= (sec
->output_section
->vma
+ sec
->output_offset
);
3707 value
-= irel
->r_offset
;
3708 value
+= irel
->r_addend
;
3710 /* Do nothing if this reloc is the last byte in the section. */
3711 if (irel
->r_offset
== sec
->size
)
3714 /* See if the next instruction is an unconditional pc-relative
3715 branch, more often than not this test will fail, so we
3716 test it first to speed things up. */
3717 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
+ 1);
3721 /* Also make sure the next relocation applies to the next
3722 instruction and that it's a pc-relative 8 bit branch. */
3725 || irel
->r_offset
+ 2 != nrel
->r_offset
3726 || ELF32_R_TYPE (nrel
->r_info
) != (int) R_MN10300_PCREL8
)
3729 /* Make sure our destination immediately follows the
3730 unconditional branch. */
3731 if (symval
!= (sec
->output_section
->vma
+ sec
->output_offset
3732 + irel
->r_offset
+ 3))
3735 /* Now make sure we are a conditional branch. This may not
3736 be necessary, but why take the chance.
3738 Note these checks assume that R_MN10300_PCREL8 relocs
3739 only occur on bCC and bCCx insns. If they occured
3740 elsewhere, we'd need to know the start of this insn
3741 for this check to be accurate. */
3742 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3743 if (code
!= 0xc0 && code
!= 0xc1 && code
!= 0xc2
3744 && code
!= 0xc3 && code
!= 0xc4 && code
!= 0xc5
3745 && code
!= 0xc6 && code
!= 0xc7 && code
!= 0xc8
3746 && code
!= 0xc9 && code
!= 0xe8 && code
!= 0xe9
3747 && code
!= 0xea && code
!= 0xeb)
3750 /* We also have to be sure there is no symbol/label
3751 at the unconditional branch. */
3752 if (mn10300_elf_symbol_address_p (abfd
, sec
, isymbuf
,
3753 irel
->r_offset
+ 1))
3756 /* Note that we've changed the relocs, section contents, etc. */
3757 elf_section_data (sec
)->relocs
= internal_relocs
;
3758 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3759 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3761 /* Reverse the condition of the first branch. */
3807 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 1);
3809 /* Set the reloc type and symbol for the first branch
3810 from the second branch. */
3811 irel
->r_info
= nrel
->r_info
;
3813 /* Make the reloc for the second branch a null reloc. */
3814 nrel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (nrel
->r_info
),
3817 /* Delete two bytes of data. */
3818 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3819 irel
->r_offset
+ 1, 2))
3822 /* That will change things, so, we should relax again.
3823 Note that this is not required, and it may be slow. */
3827 /* Try to turn a 24 immediate, displacement or absolute address
3828 into a 8 immediate, displacement or absolute address. */
3829 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_24
)
3831 bfd_vma value
= symval
;
3832 value
+= irel
->r_addend
;
3834 /* See if the value will fit in 8 bits. */
3835 if ((long) value
< 0x7f && (long) value
> -0x80)
3839 /* AM33 insns which have 24 operands are 6 bytes long and
3840 will have 0xfd as the first byte. */
3842 /* Get the first opcode. */
3843 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 3);
3847 /* Get the second opcode. */
3848 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 2);
3850 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3851 equivalent instructions exists. */
3852 if (code
!= 0x6b && code
!= 0x7b
3853 && code
!= 0x8b && code
!= 0x9b
3854 && ((code
& 0x0f) == 0x09 || (code
& 0x0f) == 0x08
3855 || (code
& 0x0f) == 0x0a || (code
& 0x0f) == 0x0b
3856 || (code
& 0x0f) == 0x0e))
3858 /* Not safe if the high bit is on as relaxing may
3859 move the value out of high mem and thus not fit
3860 in a signed 8bit value. This is currently over
3862 if ((value
& 0x80) == 0)
3864 /* Note that we've changed the relocation contents,
3866 elf_section_data (sec
)->relocs
= internal_relocs
;
3867 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3868 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3870 /* Fix the opcode. */
3871 bfd_put_8 (abfd
, 0xfb, contents
+ irel
->r_offset
- 3);
3872 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 2);
3874 /* Fix the relocation's type. */
3876 ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
3879 /* Delete two bytes of data. */
3880 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3881 irel
->r_offset
+ 1, 2))
3884 /* That will change things, so, we should relax
3885 again. Note that this is not required, and it
3895 /* Try to turn a 32bit immediate, displacement or absolute address
3896 into a 16bit immediate, displacement or absolute address. */
3897 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_32
3898 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOT32
3899 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOTOFF32
)
3901 bfd_vma value
= symval
;
3903 if (ELF32_R_TYPE (irel
->r_info
) != (int) R_MN10300_32
)
3907 sgot
= hash_table
->root
.sgot
;
3908 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOT32
)
3910 value
= sgot
->output_offset
;
3913 value
+= h
->root
.got
.offset
;
3915 value
+= (elf_local_got_offsets
3916 (abfd
)[ELF32_R_SYM (irel
->r_info
)]);
3918 else if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOTOFF32
)
3919 value
-= sgot
->output_section
->vma
;
3920 else if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOTPC32
)
3921 value
= (sgot
->output_section
->vma
3922 - (sec
->output_section
->vma
3923 + sec
->output_offset
3929 value
+= irel
->r_addend
;
3931 /* See if the value will fit in 24 bits.
3932 We allow any 16bit match here. We prune those we can't
3934 if ((long) value
< 0x7fffff && (long) value
> -0x800000)
3938 /* AM33 insns which have 32bit operands are 7 bytes long and
3939 will have 0xfe as the first byte. */
3941 /* Get the first opcode. */
3942 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 3);
3946 /* Get the second opcode. */
3947 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 2);
3949 /* All the am33 32 -> 24 relaxing possibilities. */
3950 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3951 equivalent instructions exists. */
3952 if (code
!= 0x6b && code
!= 0x7b
3953 && code
!= 0x8b && code
!= 0x9b
3954 && (ELF32_R_TYPE (irel
->r_info
)
3955 != (int) R_MN10300_GOTPC32
)
3956 && ((code
& 0x0f) == 0x09 || (code
& 0x0f) == 0x08
3957 || (code
& 0x0f) == 0x0a || (code
& 0x0f) == 0x0b
3958 || (code
& 0x0f) == 0x0e))
3960 /* Not safe if the high bit is on as relaxing may
3961 move the value out of high mem and thus not fit
3962 in a signed 16bit value. This is currently over
3964 if ((value
& 0x8000) == 0)
3966 /* Note that we've changed the relocation contents,
3968 elf_section_data (sec
)->relocs
= internal_relocs
;
3969 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3970 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3972 /* Fix the opcode. */
3973 bfd_put_8 (abfd
, 0xfd, contents
+ irel
->r_offset
- 3);
3974 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 2);
3976 /* Fix the relocation's type. */
3978 ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
3979 (ELF32_R_TYPE (irel
->r_info
)
3980 == (int) R_MN10300_GOTOFF32
)
3981 ? R_MN10300_GOTOFF24
3982 : (ELF32_R_TYPE (irel
->r_info
)
3983 == (int) R_MN10300_GOT32
)
3987 /* Delete one byte of data. */
3988 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3989 irel
->r_offset
+ 3, 1))
3992 /* That will change things, so, we should relax
3993 again. Note that this is not required, and it
4002 /* See if the value will fit in 16 bits.
4003 We allow any 16bit match here. We prune those we can't
4005 if ((long) value
< 0x7fff && (long) value
> -0x8000)
4009 /* Most insns which have 32bit operands are 6 bytes long;
4010 exceptions are pcrel insns and bit insns.
4012 We handle pcrel insns above. We don't bother trying
4013 to handle the bit insns here.
4015 The first byte of the remaining insns will be 0xfc. */
4017 /* Get the first opcode. */
4018 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 2);
4023 /* Get the second opcode. */
4024 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
4026 if ((code
& 0xf0) < 0x80)
4027 switch (code
& 0xf0)
4029 /* mov (d32,am),dn -> mov (d32,am),dn
4030 mov dm,(d32,am) -> mov dn,(d32,am)
4031 mov (d32,am),an -> mov (d32,am),an
4032 mov dm,(d32,am) -> mov dn,(d32,am)
4033 movbu (d32,am),dn -> movbu (d32,am),dn
4034 movbu dm,(d32,am) -> movbu dn,(d32,am)
4035 movhu (d32,am),dn -> movhu (d32,am),dn
4036 movhu dm,(d32,am) -> movhu dn,(d32,am) */
4045 /* Not safe if the high bit is on as relaxing may
4046 move the value out of high mem and thus not fit
4047 in a signed 16bit value. */
4049 && (value
& 0x8000))
4052 /* Note that we've changed the relocation contents, etc. */
4053 elf_section_data (sec
)->relocs
= internal_relocs
;
4054 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4055 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4057 /* Fix the opcode. */
4058 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
4059 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 1);
4061 /* Fix the relocation's type. */
4062 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4063 (ELF32_R_TYPE (irel
->r_info
)
4064 == (int) R_MN10300_GOTOFF32
)
4065 ? R_MN10300_GOTOFF16
4066 : (ELF32_R_TYPE (irel
->r_info
)
4067 == (int) R_MN10300_GOT32
)
4069 : (ELF32_R_TYPE (irel
->r_info
)
4070 == (int) R_MN10300_GOTPC32
)
4071 ? R_MN10300_GOTPC16
:
4074 /* Delete two bytes of data. */
4075 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4076 irel
->r_offset
+ 2, 2))
4079 /* That will change things, so, we should relax again.
4080 Note that this is not required, and it may be slow. */
4084 else if ((code
& 0xf0) == 0x80
4085 || (code
& 0xf0) == 0x90)
4086 switch (code
& 0xf3)
4088 /* mov dn,(abs32) -> mov dn,(abs16)
4089 movbu dn,(abs32) -> movbu dn,(abs16)
4090 movhu dn,(abs32) -> movhu dn,(abs16) */
4094 /* Note that we've changed the relocation contents, etc. */
4095 elf_section_data (sec
)->relocs
= internal_relocs
;
4096 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4097 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4099 if ((code
& 0xf3) == 0x81)
4100 code
= 0x01 + (code
& 0x0c);
4101 else if ((code
& 0xf3) == 0x82)
4102 code
= 0x02 + (code
& 0x0c);
4103 else if ((code
& 0xf3) == 0x83)
4104 code
= 0x03 + (code
& 0x0c);
4108 /* Fix the opcode. */
4109 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 2);
4111 /* Fix the relocation's type. */
4112 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4113 (ELF32_R_TYPE (irel
->r_info
)
4114 == (int) R_MN10300_GOTOFF32
)
4115 ? R_MN10300_GOTOFF16
4116 : (ELF32_R_TYPE (irel
->r_info
)
4117 == (int) R_MN10300_GOT32
)
4119 : (ELF32_R_TYPE (irel
->r_info
)
4120 == (int) R_MN10300_GOTPC32
)
4121 ? R_MN10300_GOTPC16
:
4124 /* The opcode got shorter too, so we have to fix the
4125 addend and offset too! */
4126 irel
->r_offset
-= 1;
4128 /* Delete three bytes of data. */
4129 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4130 irel
->r_offset
+ 1, 3))
4133 /* That will change things, so, we should relax again.
4134 Note that this is not required, and it may be slow. */
4138 /* mov am,(abs32) -> mov am,(abs16)
4139 mov am,(d32,sp) -> mov am,(d16,sp)
4140 mov dm,(d32,sp) -> mov dm,(d32,sp)
4141 movbu dm,(d32,sp) -> movbu dm,(d32,sp)
4142 movhu dm,(d32,sp) -> movhu dm,(d32,sp) */
4148 /* sp-based offsets are zero-extended. */
4149 if (code
>= 0x90 && code
<= 0x93
4150 && (long) value
< 0)
4153 /* Note that we've changed the relocation contents, etc. */
4154 elf_section_data (sec
)->relocs
= internal_relocs
;
4155 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4156 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4158 /* Fix the opcode. */
4159 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
4160 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 1);
4162 /* Fix the relocation's type. */
4163 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4164 (ELF32_R_TYPE (irel
->r_info
)
4165 == (int) R_MN10300_GOTOFF32
)
4166 ? R_MN10300_GOTOFF16
4167 : (ELF32_R_TYPE (irel
->r_info
)
4168 == (int) R_MN10300_GOT32
)
4170 : (ELF32_R_TYPE (irel
->r_info
)
4171 == (int) R_MN10300_GOTPC32
)
4172 ? R_MN10300_GOTPC16
:
4175 /* Delete two bytes of data. */
4176 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4177 irel
->r_offset
+ 2, 2))
4180 /* That will change things, so, we should relax again.
4181 Note that this is not required, and it may be slow. */
4185 else if ((code
& 0xf0) < 0xf0)
4186 switch (code
& 0xfc)
4188 /* mov imm32,dn -> mov imm16,dn
4189 mov imm32,an -> mov imm16,an
4190 mov (abs32),dn -> mov (abs16),dn
4191 movbu (abs32),dn -> movbu (abs16),dn
4192 movhu (abs32),dn -> movhu (abs16),dn */
4198 /* Not safe if the high bit is on as relaxing may
4199 move the value out of high mem and thus not fit
4200 in a signed 16bit value. */
4202 && (value
& 0x8000))
4205 /* "mov imm16, an" zero-extends the immediate. */
4206 if ((code
& 0xfc) == 0xdc
4207 && (long) value
< 0)
4210 /* Note that we've changed the relocation contents, etc. */
4211 elf_section_data (sec
)->relocs
= internal_relocs
;
4212 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4213 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4215 if ((code
& 0xfc) == 0xcc)
4216 code
= 0x2c + (code
& 0x03);
4217 else if ((code
& 0xfc) == 0xdc)
4218 code
= 0x24 + (code
& 0x03);
4219 else if ((code
& 0xfc) == 0xa4)
4220 code
= 0x30 + (code
& 0x03);
4221 else if ((code
& 0xfc) == 0xa8)
4222 code
= 0x34 + (code
& 0x03);
4223 else if ((code
& 0xfc) == 0xac)
4224 code
= 0x38 + (code
& 0x03);
4228 /* Fix the opcode. */
4229 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 2);
4231 /* Fix the relocation's type. */
4232 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4233 (ELF32_R_TYPE (irel
->r_info
)
4234 == (int) R_MN10300_GOTOFF32
)
4235 ? R_MN10300_GOTOFF16
4236 : (ELF32_R_TYPE (irel
->r_info
)
4237 == (int) R_MN10300_GOT32
)
4239 : (ELF32_R_TYPE (irel
->r_info
)
4240 == (int) R_MN10300_GOTPC32
)
4241 ? R_MN10300_GOTPC16
:
4244 /* The opcode got shorter too, so we have to fix the
4245 addend and offset too! */
4246 irel
->r_offset
-= 1;
4248 /* Delete three bytes of data. */
4249 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4250 irel
->r_offset
+ 1, 3))
4253 /* That will change things, so, we should relax again.
4254 Note that this is not required, and it may be slow. */
4258 /* mov (abs32),an -> mov (abs16),an
4259 mov (d32,sp),an -> mov (d16,sp),an
4260 mov (d32,sp),dn -> mov (d16,sp),dn
4261 movbu (d32,sp),dn -> movbu (d16,sp),dn
4262 movhu (d32,sp),dn -> movhu (d16,sp),dn
4263 add imm32,dn -> add imm16,dn
4264 cmp imm32,dn -> cmp imm16,dn
4265 add imm32,an -> add imm16,an
4266 cmp imm32,an -> cmp imm16,an
4267 and imm32,dn -> and imm16,dn
4268 or imm32,dn -> or imm16,dn
4269 xor imm32,dn -> xor imm16,dn
4270 btst imm32,dn -> btst imm16,dn */
4286 /* cmp imm16, an zero-extends the immediate. */
4288 && (long) value
< 0)
4291 /* So do sp-based offsets. */
4292 if (code
>= 0xb0 && code
<= 0xb3
4293 && (long) value
< 0)
4296 /* Note that we've changed the relocation contents, etc. */
4297 elf_section_data (sec
)->relocs
= internal_relocs
;
4298 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4299 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4301 /* Fix the opcode. */
4302 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
4303 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 1);
4305 /* Fix the relocation's type. */
4306 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4307 (ELF32_R_TYPE (irel
->r_info
)
4308 == (int) R_MN10300_GOTOFF32
)
4309 ? R_MN10300_GOTOFF16
4310 : (ELF32_R_TYPE (irel
->r_info
)
4311 == (int) R_MN10300_GOT32
)
4313 : (ELF32_R_TYPE (irel
->r_info
)
4314 == (int) R_MN10300_GOTPC32
)
4315 ? R_MN10300_GOTPC16
:
4318 /* Delete two bytes of data. */
4319 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4320 irel
->r_offset
+ 2, 2))
4323 /* That will change things, so, we should relax again.
4324 Note that this is not required, and it may be slow. */
4328 else if (code
== 0xfe)
4330 /* add imm32,sp -> add imm16,sp */
4332 /* Note that we've changed the relocation contents, etc. */
4333 elf_section_data (sec
)->relocs
= internal_relocs
;
4334 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4335 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4337 /* Fix the opcode. */
4338 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
4339 bfd_put_8 (abfd
, 0xfe, contents
+ irel
->r_offset
- 1);
4341 /* Fix the relocation's type. */
4342 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4343 (ELF32_R_TYPE (irel
->r_info
)
4344 == (int) R_MN10300_GOT32
)
4346 : (ELF32_R_TYPE (irel
->r_info
)
4347 == (int) R_MN10300_GOTOFF32
)
4348 ? R_MN10300_GOTOFF16
4349 : (ELF32_R_TYPE (irel
->r_info
)
4350 == (int) R_MN10300_GOTPC32
)
4351 ? R_MN10300_GOTPC16
:
4354 /* Delete two bytes of data. */
4355 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4356 irel
->r_offset
+ 2, 2))
4359 /* That will change things, so, we should relax again.
4360 Note that this is not required, and it may be slow. */
4369 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
4371 if (! link_info
->keep_memory
)
4375 /* Cache the symbols for elf_link_input_bfd. */
4376 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4380 if (contents
!= NULL
4381 && elf_section_data (sec
)->this_hdr
.contents
!= contents
)
4383 if (! link_info
->keep_memory
)
4387 /* Cache the section contents for elf_link_input_bfd. */
4388 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4392 if (elf_section_data (sec
)->relocs
!= internal_relocs
)
4393 free (internal_relocs
);
4398 if (symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
4400 if (elf_section_data (section
)->this_hdr
.contents
!= contents
)
4402 if (elf_section_data (section
)->relocs
!= internal_relocs
)
4403 free (internal_relocs
);
4408 /* This is a version of bfd_generic_get_relocated_section_contents
4409 which uses mn10300_elf_relocate_section. */
4412 mn10300_elf_get_relocated_section_contents (bfd
*output_bfd
,
4413 struct bfd_link_info
*link_info
,
4414 struct bfd_link_order
*link_order
,
4416 bfd_boolean relocatable
,
4419 Elf_Internal_Shdr
*symtab_hdr
;
4420 asection
*input_section
= link_order
->u
.indirect
.section
;
4421 bfd
*input_bfd
= input_section
->owner
;
4422 asection
**sections
= NULL
;
4423 Elf_Internal_Rela
*internal_relocs
= NULL
;
4424 Elf_Internal_Sym
*isymbuf
= NULL
;
4426 /* We only need to handle the case of relaxing, or of having a
4427 particular set of section contents, specially. */
4429 || elf_section_data (input_section
)->this_hdr
.contents
== NULL
)
4430 return bfd_generic_get_relocated_section_contents (output_bfd
, link_info
,
4435 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
4437 memcpy (data
, elf_section_data (input_section
)->this_hdr
.contents
,
4438 (size_t) input_section
->size
);
4440 if ((input_section
->flags
& SEC_RELOC
) != 0
4441 && input_section
->reloc_count
> 0)
4444 Elf_Internal_Sym
*isym
, *isymend
;
4447 internal_relocs
= _bfd_elf_link_read_relocs (input_bfd
, input_section
,
4449 if (internal_relocs
== NULL
)
4452 if (symtab_hdr
->sh_info
!= 0)
4454 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
4455 if (isymbuf
== NULL
)
4456 isymbuf
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
4457 symtab_hdr
->sh_info
, 0,
4459 if (isymbuf
== NULL
)
4463 amt
= symtab_hdr
->sh_info
;
4464 amt
*= sizeof (asection
*);
4465 sections
= bfd_malloc (amt
);
4466 if (sections
== NULL
&& amt
!= 0)
4469 isymend
= isymbuf
+ symtab_hdr
->sh_info
;
4470 for (isym
= isymbuf
, secpp
= sections
; isym
< isymend
; ++isym
, ++secpp
)
4474 if (isym
->st_shndx
== SHN_UNDEF
)
4475 isec
= bfd_und_section_ptr
;
4476 else if (isym
->st_shndx
== SHN_ABS
)
4477 isec
= bfd_abs_section_ptr
;
4478 else if (isym
->st_shndx
== SHN_COMMON
)
4479 isec
= bfd_com_section_ptr
;
4481 isec
= bfd_section_from_elf_index (input_bfd
, isym
->st_shndx
);
4486 if (! mn10300_elf_relocate_section (output_bfd
, link_info
, input_bfd
,
4487 input_section
, data
, internal_relocs
,
4492 if (symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
4494 if (internal_relocs
!= elf_section_data (input_section
)->relocs
)
4495 free (internal_relocs
);
4502 if (symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
4504 if (internal_relocs
!= elf_section_data (input_section
)->relocs
)
4505 free (internal_relocs
);
4509 /* Assorted hash table functions. */
4511 /* Initialize an entry in the link hash table. */
4513 /* Create an entry in an MN10300 ELF linker hash table. */
4515 static struct bfd_hash_entry
*
4516 elf32_mn10300_link_hash_newfunc (struct bfd_hash_entry
*entry
,
4517 struct bfd_hash_table
*table
,
4520 struct elf32_mn10300_link_hash_entry
*ret
=
4521 (struct elf32_mn10300_link_hash_entry
*) entry
;
4523 /* Allocate the structure if it has not already been allocated by a
4526 ret
= (struct elf32_mn10300_link_hash_entry
*)
4527 bfd_hash_allocate (table
, sizeof (* ret
));
4529 return (struct bfd_hash_entry
*) ret
;
4531 /* Call the allocation method of the superclass. */
4532 ret
= (struct elf32_mn10300_link_hash_entry
*)
4533 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry
*) ret
,
4537 ret
->direct_calls
= 0;
4538 ret
->stack_size
= 0;
4540 ret
->movm_stack_size
= 0;
4543 ret
->tls_type
= GOT_UNKNOWN
;
4546 return (struct bfd_hash_entry
*) ret
;
4550 _bfd_mn10300_copy_indirect_symbol (struct bfd_link_info
* info
,
4551 struct elf_link_hash_entry
* dir
,
4552 struct elf_link_hash_entry
* ind
)
4554 struct elf32_mn10300_link_hash_entry
* edir
;
4555 struct elf32_mn10300_link_hash_entry
* eind
;
4557 edir
= elf_mn10300_hash_entry (dir
);
4558 eind
= elf_mn10300_hash_entry (ind
);
4560 if (ind
->root
.type
== bfd_link_hash_indirect
4561 && dir
->got
.refcount
<= 0)
4563 edir
->tls_type
= eind
->tls_type
;
4564 eind
->tls_type
= GOT_UNKNOWN
;
4566 edir
->direct_calls
= eind
->direct_calls
;
4567 edir
->stack_size
= eind
->stack_size
;
4568 edir
->movm_args
= eind
->movm_args
;
4569 edir
->movm_stack_size
= eind
->movm_stack_size
;
4570 edir
->flags
= eind
->flags
;
4572 _bfd_elf_link_hash_copy_indirect (info
, dir
, ind
);
4575 /* Destroy an mn10300 ELF linker hash table. */
4578 elf32_mn10300_link_hash_table_free (bfd
*obfd
)
4580 struct elf32_mn10300_link_hash_table
*ret
4581 = (struct elf32_mn10300_link_hash_table
*) obfd
->link
.hash
;
4583 obfd
->link
.hash
= &ret
->static_hash_table
->root
.root
;
4584 _bfd_elf_link_hash_table_free (obfd
);
4585 obfd
->is_linker_output
= TRUE
;
4586 obfd
->link
.hash
= &ret
->root
.root
;
4587 _bfd_elf_link_hash_table_free (obfd
);
4590 /* Create an mn10300 ELF linker hash table. */
4592 static struct bfd_link_hash_table
*
4593 elf32_mn10300_link_hash_table_create (bfd
*abfd
)
4595 struct elf32_mn10300_link_hash_table
*ret
;
4596 size_t amt
= sizeof (* ret
);
4598 ret
= bfd_zmalloc (amt
);
4602 amt
= sizeof (struct elf_link_hash_table
);
4603 ret
->static_hash_table
= bfd_zmalloc (amt
);
4604 if (ret
->static_hash_table
== NULL
)
4610 if (!_bfd_elf_link_hash_table_init (&ret
->static_hash_table
->root
, abfd
,
4611 elf32_mn10300_link_hash_newfunc
,
4612 sizeof (struct elf32_mn10300_link_hash_entry
),
4615 free (ret
->static_hash_table
);
4620 abfd
->is_linker_output
= FALSE
;
4621 abfd
->link
.hash
= NULL
;
4622 if (!_bfd_elf_link_hash_table_init (&ret
->root
, abfd
,
4623 elf32_mn10300_link_hash_newfunc
,
4624 sizeof (struct elf32_mn10300_link_hash_entry
),
4627 abfd
->is_linker_output
= TRUE
;
4628 abfd
->link
.hash
= &ret
->static_hash_table
->root
.root
;
4629 _bfd_elf_link_hash_table_free (abfd
);
4633 ret
->root
.root
.hash_table_free
= elf32_mn10300_link_hash_table_free
;
4635 ret
->tls_ldm_got
.offset
= -1;
4637 return & ret
->root
.root
;
4640 static unsigned long
4641 elf_mn10300_mach (flagword flags
)
4643 switch (flags
& EF_MN10300_MACH
)
4645 case E_MN10300_MACH_MN10300
:
4647 return bfd_mach_mn10300
;
4649 case E_MN10300_MACH_AM33
:
4650 return bfd_mach_am33
;
4652 case E_MN10300_MACH_AM33_2
:
4653 return bfd_mach_am33_2
;
4657 /* The final processing done just before writing out a MN10300 ELF object
4658 file. This gets the MN10300 architecture right based on the machine
4662 _bfd_mn10300_elf_final_write_processing (bfd
*abfd
)
4666 switch (bfd_get_mach (abfd
))
4669 case bfd_mach_mn10300
:
4670 val
= E_MN10300_MACH_MN10300
;
4674 val
= E_MN10300_MACH_AM33
;
4677 case bfd_mach_am33_2
:
4678 val
= E_MN10300_MACH_AM33_2
;
4682 elf_elfheader (abfd
)->e_flags
&= ~ (EF_MN10300_MACH
);
4683 elf_elfheader (abfd
)->e_flags
|= val
;
4684 return _bfd_elf_final_write_processing (abfd
);
4688 _bfd_mn10300_elf_object_p (bfd
*abfd
)
4690 bfd_default_set_arch_mach (abfd
, bfd_arch_mn10300
,
4691 elf_mn10300_mach (elf_elfheader (abfd
)->e_flags
));
4695 /* Merge backend specific data from an object file to the output
4696 object file when linking. */
4699 _bfd_mn10300_elf_merge_private_bfd_data (bfd
*ibfd
, struct bfd_link_info
*info
)
4701 bfd
*obfd
= info
->output_bfd
;
4703 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
4704 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
4707 if (bfd_get_arch (obfd
) == bfd_get_arch (ibfd
)
4708 && bfd_get_mach (obfd
) < bfd_get_mach (ibfd
))
4710 if (! bfd_set_arch_mach (obfd
, bfd_get_arch (ibfd
),
4711 bfd_get_mach (ibfd
)))
4718 #define PLT0_ENTRY_SIZE 15
4719 #define PLT_ENTRY_SIZE 20
4720 #define PIC_PLT_ENTRY_SIZE 24
4722 static const bfd_byte elf_mn10300_plt0_entry
[PLT0_ENTRY_SIZE
] =
4724 0xfc, 0xa0, 0, 0, 0, 0, /* mov (.got+8),a0 */
4725 0xfe, 0xe, 0x10, 0, 0, 0, 0, /* mov (.got+4),r1 */
4726 0xf0, 0xf4, /* jmp (a0) */
4729 static const bfd_byte elf_mn10300_plt_entry
[PLT_ENTRY_SIZE
] =
4731 0xfc, 0xa0, 0, 0, 0, 0, /* mov (nameN@GOT + .got),a0 */
4732 0xf0, 0xf4, /* jmp (a0) */
4733 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4734 0xdc, 0, 0, 0, 0, /* jmp .plt0 */
4737 static const bfd_byte elf_mn10300_pic_plt_entry
[PIC_PLT_ENTRY_SIZE
] =
4739 0xfc, 0x22, 0, 0, 0, 0, /* mov (nameN@GOT,a2),a0 */
4740 0xf0, 0xf4, /* jmp (a0) */
4741 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4742 0xf8, 0x22, 8, /* mov (8,a2),a0 */
4743 0xfb, 0xa, 0x1a, 4, /* mov (4,a2),r1 */
4744 0xf0, 0xf4, /* jmp (a0) */
4747 /* Return size of the first PLT entry. */
4748 #define elf_mn10300_sizeof_plt0(info) \
4749 (bfd_link_pic (info) ? PIC_PLT_ENTRY_SIZE : PLT0_ENTRY_SIZE)
4751 /* Return size of a PLT entry. */
4752 #define elf_mn10300_sizeof_plt(info) \
4753 (bfd_link_pic (info) ? PIC_PLT_ENTRY_SIZE : PLT_ENTRY_SIZE)
4755 /* Return offset of the PLT0 address in an absolute PLT entry. */
4756 #define elf_mn10300_plt_plt0_offset(info) 16
4758 /* Return offset of the linker in PLT0 entry. */
4759 #define elf_mn10300_plt0_linker_offset(info) 2
4761 /* Return offset of the GOT id in PLT0 entry. */
4762 #define elf_mn10300_plt0_gotid_offset(info) 9
4764 /* Return offset of the temporary in PLT entry. */
4765 #define elf_mn10300_plt_temp_offset(info) 8
4767 /* Return offset of the symbol in PLT entry. */
4768 #define elf_mn10300_plt_symbol_offset(info) 2
4770 /* Return offset of the relocation in PLT entry. */
4771 #define elf_mn10300_plt_reloc_offset(info) 11
4773 /* The name of the dynamic interpreter. This is put in the .interp
4776 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
4778 /* Create dynamic sections when linking against a dynamic object. */
4781 _bfd_mn10300_elf_create_dynamic_sections (bfd
*abfd
, struct bfd_link_info
*info
)
4785 const struct elf_backend_data
* bed
= get_elf_backend_data (abfd
);
4786 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
4789 switch (bed
->s
->arch_size
)
4800 bfd_set_error (bfd_error_bad_value
);
4804 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
4805 .rel[a].bss sections. */
4806 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
4807 | SEC_LINKER_CREATED
);
4809 s
= bfd_make_section_anyway_with_flags (abfd
,
4810 (bed
->default_use_rela_p
4811 ? ".rela.plt" : ".rel.plt"),
4812 flags
| SEC_READONLY
);
4813 htab
->root
.srelplt
= s
;
4815 || !bfd_set_section_alignment (s
, ptralign
))
4818 if (! _bfd_mn10300_elf_create_got_section (abfd
, info
))
4821 if (bed
->want_dynbss
)
4823 /* The .dynbss section is a place to put symbols which are defined
4824 by dynamic objects, are referenced by regular objects, and are
4825 not functions. We must allocate space for them in the process
4826 image and use a R_*_COPY reloc to tell the dynamic linker to
4827 initialize them at run time. The linker script puts the .dynbss
4828 section into the .bss section of the final image. */
4829 s
= bfd_make_section_anyway_with_flags (abfd
, ".dynbss",
4830 SEC_ALLOC
| SEC_LINKER_CREATED
);
4834 /* The .rel[a].bss section holds copy relocs. This section is not
4835 normally needed. We need to create it here, though, so that the
4836 linker will map it to an output section. We can't just create it
4837 only if we need it, because we will not know whether we need it
4838 until we have seen all the input files, and the first time the
4839 main linker code calls BFD after examining all the input files
4840 (size_dynamic_sections) the input sections have already been
4841 mapped to the output sections. If the section turns out not to
4842 be needed, we can discard it later. We will never need this
4843 section when generating a shared object, since they do not use
4845 if (! bfd_link_pic (info
))
4847 s
= bfd_make_section_anyway_with_flags (abfd
,
4848 (bed
->default_use_rela_p
4849 ? ".rela.bss" : ".rel.bss"),
4850 flags
| SEC_READONLY
);
4852 || !bfd_set_section_alignment (s
, ptralign
))
4860 /* Adjust a symbol defined by a dynamic object and referenced by a
4861 regular object. The current definition is in some section of the
4862 dynamic object, but we're not including those sections. We have to
4863 change the definition to something the rest of the link can
4867 _bfd_mn10300_elf_adjust_dynamic_symbol (struct bfd_link_info
* info
,
4868 struct elf_link_hash_entry
* h
)
4870 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
4874 dynobj
= htab
->root
.dynobj
;
4876 /* Make sure we know what is going on here. */
4877 BFD_ASSERT (dynobj
!= NULL
4882 && !h
->def_regular
)));
4884 /* If this is a function, put it in the procedure linkage table. We
4885 will fill in the contents of the procedure linkage table later,
4886 when we know the address of the .got section. */
4887 if (h
->type
== STT_FUNC
4890 if (! bfd_link_pic (info
)
4894 /* This case can occur if we saw a PLT reloc in an input
4895 file, but the symbol was never referred to by a dynamic
4896 object. In such a case, we don't actually need to build
4897 a procedure linkage table, and we can just do a REL32
4899 BFD_ASSERT (h
->needs_plt
);
4903 /* Make sure this symbol is output as a dynamic symbol. */
4904 if (h
->dynindx
== -1)
4906 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
4910 s
= htab
->root
.splt
;
4911 BFD_ASSERT (s
!= NULL
);
4913 /* If this is the first .plt entry, make room for the special
4916 s
->size
+= elf_mn10300_sizeof_plt0 (info
);
4918 /* If this symbol is not defined in a regular file, and we are
4919 not generating a shared library, then set the symbol to this
4920 location in the .plt. This is required to make function
4921 pointers compare as equal between the normal executable and
4922 the shared library. */
4923 if (! bfd_link_pic (info
)
4926 h
->root
.u
.def
.section
= s
;
4927 h
->root
.u
.def
.value
= s
->size
;
4930 h
->plt
.offset
= s
->size
;
4932 /* Make room for this entry. */
4933 s
->size
+= elf_mn10300_sizeof_plt (info
);
4935 /* We also need to make an entry in the .got.plt section, which
4936 will be placed in the .got section by the linker script. */
4937 s
= htab
->root
.sgotplt
;
4938 BFD_ASSERT (s
!= NULL
);
4941 /* We also need to make an entry in the .rela.plt section. */
4942 s
= htab
->root
.srelplt
;
4943 BFD_ASSERT (s
!= NULL
);
4944 s
->size
+= sizeof (Elf32_External_Rela
);
4949 /* If this is a weak symbol, and there is a real definition, the
4950 processor independent code will have arranged for us to see the
4951 real definition first, and we can just use the same value. */
4952 if (h
->is_weakalias
)
4954 struct elf_link_hash_entry
*def
= weakdef (h
);
4955 BFD_ASSERT (def
->root
.type
== bfd_link_hash_defined
);
4956 h
->root
.u
.def
.section
= def
->root
.u
.def
.section
;
4957 h
->root
.u
.def
.value
= def
->root
.u
.def
.value
;
4961 /* This is a reference to a symbol defined by a dynamic object which
4962 is not a function. */
4964 /* If we are creating a shared library, we must presume that the
4965 only references to the symbol are via the global offset table.
4966 For such cases we need not do anything here; the relocations will
4967 be handled correctly by relocate_section. */
4968 if (bfd_link_pic (info
))
4971 /* If there are no references to this symbol that do not use the
4972 GOT, we don't need to generate a copy reloc. */
4973 if (!h
->non_got_ref
)
4976 /* We must allocate the symbol in our .dynbss section, which will
4977 become part of the .bss section of the executable. There will be
4978 an entry for this symbol in the .dynsym section. The dynamic
4979 object will contain position independent code, so all references
4980 from the dynamic object to this symbol will go through the global
4981 offset table. The dynamic linker will use the .dynsym entry to
4982 determine the address it must put in the global offset table, so
4983 both the dynamic object and the regular object will refer to the
4984 same memory location for the variable. */
4986 s
= bfd_get_linker_section (dynobj
, ".dynbss");
4987 BFD_ASSERT (s
!= NULL
);
4989 /* We must generate a R_MN10300_COPY reloc to tell the dynamic linker to
4990 copy the initial value out of the dynamic object and into the
4991 runtime process image. We need to remember the offset into the
4992 .rela.bss section we are going to use. */
4993 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0 && h
->size
!= 0)
4997 srel
= bfd_get_linker_section (dynobj
, ".rela.bss");
4998 BFD_ASSERT (srel
!= NULL
);
4999 srel
->size
+= sizeof (Elf32_External_Rela
);
5003 return _bfd_elf_adjust_dynamic_copy (info
, h
, s
);
5006 /* Set the sizes of the dynamic sections. */
5009 _bfd_mn10300_elf_size_dynamic_sections (bfd
* output_bfd
,
5010 struct bfd_link_info
* info
)
5012 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
5017 bfd_boolean reltext
;
5019 dynobj
= htab
->root
.dynobj
;
5020 BFD_ASSERT (dynobj
!= NULL
);
5022 if (elf_hash_table (info
)->dynamic_sections_created
)
5024 /* Set the contents of the .interp section to the interpreter. */
5025 if (bfd_link_executable (info
) && !info
->nointerp
)
5027 s
= bfd_get_linker_section (dynobj
, ".interp");
5028 BFD_ASSERT (s
!= NULL
);
5029 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
5030 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
5035 /* We may have created entries in the .rela.got section.
5036 However, if we are not creating the dynamic sections, we will
5037 not actually use these entries. Reset the size of .rela.got,
5038 which will cause it to get stripped from the output file
5040 s
= htab
->root
.sgot
;
5045 if (htab
->tls_ldm_got
.refcount
> 0)
5047 s
= htab
->root
.srelgot
;
5048 BFD_ASSERT (s
!= NULL
);
5049 s
->size
+= sizeof (Elf32_External_Rela
);
5052 /* The check_relocs and adjust_dynamic_symbol entry points have
5053 determined the sizes of the various dynamic sections. Allocate
5058 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
5062 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
5065 /* It's OK to base decisions on the section name, because none
5066 of the dynobj section names depend upon the input files. */
5067 name
= bfd_section_name (s
);
5069 if (streq (name
, ".plt"))
5071 /* Remember whether there is a PLT. */
5074 else if (CONST_STRNEQ (name
, ".rela"))
5080 /* Remember whether there are any reloc sections other
5082 if (! streq (name
, ".rela.plt"))
5084 const char * outname
;
5088 /* If this relocation section applies to a read only
5089 section, then we probably need a DT_TEXTREL
5090 entry. The entries in the .rela.plt section
5091 really apply to the .got section, which we
5092 created ourselves and so know is not readonly. */
5093 outname
= bfd_section_name (s
->output_section
);
5094 target
= bfd_get_section_by_name (output_bfd
, outname
+ 5);
5096 && (target
->flags
& SEC_READONLY
) != 0
5097 && (target
->flags
& SEC_ALLOC
) != 0)
5101 /* We use the reloc_count field as a counter if we need
5102 to copy relocs into the output file. */
5106 else if (! CONST_STRNEQ (name
, ".got")
5107 && ! streq (name
, ".dynbss"))
5108 /* It's not one of our sections, so don't allocate space. */
5113 /* If we don't need this section, strip it from the
5114 output file. This is mostly to handle .rela.bss and
5115 .rela.plt. We must create both sections in
5116 create_dynamic_sections, because they must be created
5117 before the linker maps input sections to output
5118 sections. The linker does that before
5119 adjust_dynamic_symbol is called, and it is that
5120 function which decides whether anything needs to go
5121 into these sections. */
5122 s
->flags
|= SEC_EXCLUDE
;
5126 if ((s
->flags
& SEC_HAS_CONTENTS
) == 0)
5129 /* Allocate memory for the section contents. We use bfd_zalloc
5130 here in case unused entries are not reclaimed before the
5131 section's contents are written out. This should not happen,
5132 but this way if it does, we get a R_MN10300_NONE reloc
5133 instead of garbage. */
5134 s
->contents
= bfd_zalloc (dynobj
, s
->size
);
5135 if (s
->contents
== NULL
)
5139 if (elf_hash_table (info
)->dynamic_sections_created
)
5141 /* Add some entries to the .dynamic section. We fill in the
5142 values later, in _bfd_mn10300_elf_finish_dynamic_sections,
5143 but we must add the entries now so that we get the correct
5144 size for the .dynamic section. The DT_DEBUG entry is filled
5145 in by the dynamic linker and used by the debugger. */
5146 if (! bfd_link_pic (info
))
5148 if (!_bfd_elf_add_dynamic_entry (info
, DT_DEBUG
, 0))
5154 if (!_bfd_elf_add_dynamic_entry (info
, DT_PLTGOT
, 0)
5155 || !_bfd_elf_add_dynamic_entry (info
, DT_PLTRELSZ
, 0)
5156 || !_bfd_elf_add_dynamic_entry (info
, DT_PLTREL
, DT_RELA
)
5157 || !_bfd_elf_add_dynamic_entry (info
, DT_JMPREL
, 0))
5163 if (!_bfd_elf_add_dynamic_entry (info
, DT_RELA
, 0)
5164 || !_bfd_elf_add_dynamic_entry (info
, DT_RELASZ
, 0)
5165 || !_bfd_elf_add_dynamic_entry (info
, DT_RELAENT
,
5166 sizeof (Elf32_External_Rela
)))
5172 if (!_bfd_elf_add_dynamic_entry (info
, DT_TEXTREL
, 0))
5180 /* Finish up dynamic symbol handling. We set the contents of various
5181 dynamic sections here. */
5184 _bfd_mn10300_elf_finish_dynamic_symbol (bfd
* output_bfd
,
5185 struct bfd_link_info
* info
,
5186 struct elf_link_hash_entry
* h
,
5187 Elf_Internal_Sym
* sym
)
5189 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
5192 dynobj
= htab
->root
.dynobj
;
5194 if (h
->plt
.offset
!= (bfd_vma
) -1)
5201 Elf_Internal_Rela rel
;
5203 /* This symbol has an entry in the procedure linkage table. Set
5206 BFD_ASSERT (h
->dynindx
!= -1);
5208 splt
= htab
->root
.splt
;
5209 sgot
= htab
->root
.sgotplt
;
5210 srel
= htab
->root
.srelplt
;
5211 BFD_ASSERT (splt
!= NULL
&& sgot
!= NULL
&& srel
!= NULL
);
5213 /* Get the index in the procedure linkage table which
5214 corresponds to this symbol. This is the index of this symbol
5215 in all the symbols for which we are making plt entries. The
5216 first entry in the procedure linkage table is reserved. */
5217 plt_index
= ((h
->plt
.offset
- elf_mn10300_sizeof_plt0 (info
))
5218 / elf_mn10300_sizeof_plt (info
));
5220 /* Get the offset into the .got table of the entry that
5221 corresponds to this function. Each .got entry is 4 bytes.
5222 The first three are reserved. */
5223 got_offset
= (plt_index
+ 3) * 4;
5225 /* Fill in the entry in the procedure linkage table. */
5226 if (! bfd_link_pic (info
))
5228 memcpy (splt
->contents
+ h
->plt
.offset
, elf_mn10300_plt_entry
,
5229 elf_mn10300_sizeof_plt (info
));
5230 bfd_put_32 (output_bfd
,
5231 (sgot
->output_section
->vma
5232 + sgot
->output_offset
5234 (splt
->contents
+ h
->plt
.offset
5235 + elf_mn10300_plt_symbol_offset (info
)));
5237 bfd_put_32 (output_bfd
,
5238 (1 - h
->plt
.offset
- elf_mn10300_plt_plt0_offset (info
)),
5239 (splt
->contents
+ h
->plt
.offset
5240 + elf_mn10300_plt_plt0_offset (info
)));
5244 memcpy (splt
->contents
+ h
->plt
.offset
, elf_mn10300_pic_plt_entry
,
5245 elf_mn10300_sizeof_plt (info
));
5247 bfd_put_32 (output_bfd
, got_offset
,
5248 (splt
->contents
+ h
->plt
.offset
5249 + elf_mn10300_plt_symbol_offset (info
)));
5252 bfd_put_32 (output_bfd
, plt_index
* sizeof (Elf32_External_Rela
),
5253 (splt
->contents
+ h
->plt
.offset
5254 + elf_mn10300_plt_reloc_offset (info
)));
5256 /* Fill in the entry in the global offset table. */
5257 bfd_put_32 (output_bfd
,
5258 (splt
->output_section
->vma
5259 + splt
->output_offset
5261 + elf_mn10300_plt_temp_offset (info
)),
5262 sgot
->contents
+ got_offset
);
5264 /* Fill in the entry in the .rela.plt section. */
5265 rel
.r_offset
= (sgot
->output_section
->vma
5266 + sgot
->output_offset
5268 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_JMP_SLOT
);
5270 bfd_elf32_swap_reloca_out (output_bfd
, &rel
,
5271 (bfd_byte
*) ((Elf32_External_Rela
*) srel
->contents
5274 if (!h
->def_regular
)
5275 /* Mark the symbol as undefined, rather than as defined in
5276 the .plt section. Leave the value alone. */
5277 sym
->st_shndx
= SHN_UNDEF
;
5280 if (h
->got
.offset
!= (bfd_vma
) -1)
5284 Elf_Internal_Rela rel
;
5286 /* This symbol has an entry in the global offset table. Set it up. */
5287 sgot
= htab
->root
.sgot
;
5288 srel
= htab
->root
.srelgot
;
5289 BFD_ASSERT (sgot
!= NULL
&& srel
!= NULL
);
5291 rel
.r_offset
= (sgot
->output_section
->vma
5292 + sgot
->output_offset
5293 + (h
->got
.offset
& ~1));
5295 switch (elf_mn10300_hash_entry (h
)->tls_type
)
5298 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
);
5299 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
+ 4);
5300 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_TLS_DTPMOD
);
5302 bfd_elf32_swap_reloca_out (output_bfd
, & rel
,
5303 (bfd_byte
*) ((Elf32_External_Rela
*) srel
->contents
5304 + srel
->reloc_count
));
5305 ++ srel
->reloc_count
;
5306 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_TLS_DTPOFF
);
5312 /* We originally stored the addend in the GOT, but at this
5313 point, we want to move it to the reloc instead as that's
5314 where the dynamic linker wants it. */
5315 rel
.r_addend
= bfd_get_32 (output_bfd
, sgot
->contents
+ h
->got
.offset
);
5316 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
);
5317 if (h
->dynindx
== -1)
5318 rel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_TPOFF
);
5320 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_TLS_TPOFF
);
5324 /* If this is a -Bsymbolic link, and the symbol is defined
5325 locally, we just want to emit a RELATIVE reloc. Likewise if
5326 the symbol was forced to be local because of a version file.
5327 The entry in the global offset table will already have been
5328 initialized in the relocate_section function. */
5329 if (bfd_link_pic (info
)
5330 && (info
->symbolic
|| h
->dynindx
== -1)
5333 rel
.r_info
= ELF32_R_INFO (0, R_MN10300_RELATIVE
);
5334 rel
.r_addend
= (h
->root
.u
.def
.value
5335 + h
->root
.u
.def
.section
->output_section
->vma
5336 + h
->root
.u
.def
.section
->output_offset
);
5340 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
);
5341 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_GLOB_DAT
);
5346 if (ELF32_R_TYPE (rel
.r_info
) != R_MN10300_NONE
)
5348 bfd_elf32_swap_reloca_out (output_bfd
, &rel
,
5349 (bfd_byte
*) ((Elf32_External_Rela
*) srel
->contents
5350 + srel
->reloc_count
));
5351 ++ srel
->reloc_count
;
5358 Elf_Internal_Rela rel
;
5360 /* This symbol needs a copy reloc. Set it up. */
5361 BFD_ASSERT (h
->dynindx
!= -1
5362 && (h
->root
.type
== bfd_link_hash_defined
5363 || h
->root
.type
== bfd_link_hash_defweak
));
5365 s
= bfd_get_linker_section (dynobj
, ".rela.bss");
5366 BFD_ASSERT (s
!= NULL
);
5368 rel
.r_offset
= (h
->root
.u
.def
.value
5369 + h
->root
.u
.def
.section
->output_section
->vma
5370 + h
->root
.u
.def
.section
->output_offset
);
5371 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_COPY
);
5373 bfd_elf32_swap_reloca_out (output_bfd
, & rel
,
5374 (bfd_byte
*) ((Elf32_External_Rela
*) s
->contents
5379 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5380 if (h
== elf_hash_table (info
)->hdynamic
5381 || h
== elf_hash_table (info
)->hgot
)
5382 sym
->st_shndx
= SHN_ABS
;
5387 /* Finish up the dynamic sections. */
5390 _bfd_mn10300_elf_finish_dynamic_sections (bfd
* output_bfd
,
5391 struct bfd_link_info
* info
)
5396 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
5398 dynobj
= htab
->root
.dynobj
;
5399 sgot
= htab
->root
.sgotplt
;
5400 BFD_ASSERT (sgot
!= NULL
);
5401 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
5403 if (elf_hash_table (info
)->dynamic_sections_created
)
5406 Elf32_External_Dyn
* dyncon
;
5407 Elf32_External_Dyn
* dynconend
;
5409 BFD_ASSERT (sdyn
!= NULL
);
5411 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
5412 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
5414 for (; dyncon
< dynconend
; dyncon
++)
5416 Elf_Internal_Dyn dyn
;
5419 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
5427 s
= htab
->root
.sgot
;
5431 s
= htab
->root
.srelplt
;
5433 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
5434 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
5438 s
= htab
->root
.srelplt
;
5439 dyn
.d_un
.d_val
= s
->size
;
5440 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
5445 /* Fill in the first entry in the procedure linkage table. */
5446 splt
= htab
->root
.splt
;
5447 if (splt
&& splt
->size
> 0)
5449 if (bfd_link_pic (info
))
5451 memcpy (splt
->contents
, elf_mn10300_pic_plt_entry
,
5452 elf_mn10300_sizeof_plt (info
));
5456 memcpy (splt
->contents
, elf_mn10300_plt0_entry
, PLT0_ENTRY_SIZE
);
5457 bfd_put_32 (output_bfd
,
5458 sgot
->output_section
->vma
+ sgot
->output_offset
+ 4,
5459 splt
->contents
+ elf_mn10300_plt0_gotid_offset (info
));
5460 bfd_put_32 (output_bfd
,
5461 sgot
->output_section
->vma
+ sgot
->output_offset
+ 8,
5462 splt
->contents
+ elf_mn10300_plt0_linker_offset (info
));
5465 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5466 really seem like the right value. */
5467 elf_section_data (splt
->output_section
)->this_hdr
.sh_entsize
= 4;
5469 /* UnixWare sets the entsize of .plt to 4, but this is incorrect
5470 as it means that the size of the PLT0 section (15 bytes) is not
5471 a multiple of the sh_entsize. Some ELF tools flag this as an
5472 error. We could pad PLT0 to 16 bytes, but that would introduce
5473 compatibilty issues with previous toolchains, so instead we
5474 just set the entry size to 1. */
5475 elf_section_data (splt
->output_section
)->this_hdr
.sh_entsize
= 1;
5479 /* Fill in the first three entries in the global offset table. */
5483 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
);
5485 bfd_put_32 (output_bfd
,
5486 sdyn
->output_section
->vma
+ sdyn
->output_offset
,
5488 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 4);
5489 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 8);
5492 elf_section_data (sgot
->output_section
)->this_hdr
.sh_entsize
= 4;
5497 /* Classify relocation types, such that combreloc can sort them
5500 static enum elf_reloc_type_class
5501 _bfd_mn10300_elf_reloc_type_class (const struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
5502 const asection
*rel_sec ATTRIBUTE_UNUSED
,
5503 const Elf_Internal_Rela
*rela
)
5505 switch ((int) ELF32_R_TYPE (rela
->r_info
))
5507 case R_MN10300_RELATIVE
: return reloc_class_relative
;
5508 case R_MN10300_JMP_SLOT
: return reloc_class_plt
;
5509 case R_MN10300_COPY
: return reloc_class_copy
;
5510 default: return reloc_class_normal
;
5514 /* Allocate space for an MN10300 extension to the bfd elf data structure. */
5517 mn10300_elf_mkobject (bfd
*abfd
)
5519 return bfd_elf_allocate_object (abfd
, sizeof (struct elf_mn10300_obj_tdata
),
5523 #define bfd_elf32_mkobject mn10300_elf_mkobject
5526 #define TARGET_LITTLE_SYM mn10300_elf32_vec
5527 #define TARGET_LITTLE_NAME "elf32-mn10300"
5528 #define ELF_ARCH bfd_arch_mn10300
5529 #define ELF_TARGET_ID MN10300_ELF_DATA
5530 #define ELF_MACHINE_CODE EM_MN10300
5531 #define ELF_MACHINE_ALT1 EM_CYGNUS_MN10300
5532 #define ELF_MAXPAGESIZE 0x1000
5535 #define elf_info_to_howto mn10300_info_to_howto
5536 #define elf_info_to_howto_rel NULL
5537 #define elf_backend_can_gc_sections 1
5538 #define elf_backend_rela_normal 1
5539 #define elf_backend_check_relocs mn10300_elf_check_relocs
5540 #define elf_backend_gc_mark_hook mn10300_elf_gc_mark_hook
5541 #define elf_backend_relocate_section mn10300_elf_relocate_section
5542 #define bfd_elf32_bfd_relax_section mn10300_elf_relax_section
5543 #define bfd_elf32_bfd_get_relocated_section_contents \
5544 mn10300_elf_get_relocated_section_contents
5545 #define bfd_elf32_bfd_link_hash_table_create \
5546 elf32_mn10300_link_hash_table_create
5548 #ifndef elf_symbol_leading_char
5549 #define elf_symbol_leading_char '_'
5552 /* So we can set bits in e_flags. */
5553 #define elf_backend_final_write_processing \
5554 _bfd_mn10300_elf_final_write_processing
5555 #define elf_backend_object_p _bfd_mn10300_elf_object_p
5557 #define bfd_elf32_bfd_merge_private_bfd_data \
5558 _bfd_mn10300_elf_merge_private_bfd_data
5560 #define elf_backend_can_gc_sections 1
5561 #define elf_backend_create_dynamic_sections \
5562 _bfd_mn10300_elf_create_dynamic_sections
5563 #define elf_backend_adjust_dynamic_symbol \
5564 _bfd_mn10300_elf_adjust_dynamic_symbol
5565 #define elf_backend_size_dynamic_sections \
5566 _bfd_mn10300_elf_size_dynamic_sections
5567 #define elf_backend_omit_section_dynsym _bfd_elf_omit_section_dynsym_all
5568 #define elf_backend_finish_dynamic_symbol \
5569 _bfd_mn10300_elf_finish_dynamic_symbol
5570 #define elf_backend_finish_dynamic_sections \
5571 _bfd_mn10300_elf_finish_dynamic_sections
5572 #define elf_backend_copy_indirect_symbol \
5573 _bfd_mn10300_copy_indirect_symbol
5574 #define elf_backend_reloc_type_class \
5575 _bfd_mn10300_elf_reloc_type_class
5577 #define elf_backend_want_got_plt 1
5578 #define elf_backend_plt_readonly 1
5579 #define elf_backend_want_plt_sym 0
5580 #define elf_backend_got_header_size 12
5581 #define elf_backend_dtrel_excludes_plt 1
5583 #include "elf32-target.h"