1 /* Matsushita 10300 specific support for 32-bit ELF
2 Copyright (C) 1996-2015 Free Software Foundation, Inc.
4 This file is part of BFD, the Binary File Descriptor library.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
25 #include "elf/mn10300.h"
26 #include "libiberty.h"
28 /* The mn10300 linker needs to keep track of the number of relocs that
29 it decides to copy in check_relocs for each symbol. This is so
30 that it can discard PC relative relocs if it doesn't need them when
31 linking with -Bsymbolic. We store the information in a field
32 extending the regular ELF linker hash table. */
34 struct elf32_mn10300_link_hash_entry
36 /* The basic elf link hash table entry. */
37 struct elf_link_hash_entry root
;
39 /* For function symbols, the number of times this function is
40 called directly (ie by name). */
41 unsigned int direct_calls
;
43 /* For function symbols, the size of this function's stack
44 (if <= 255 bytes). We stuff this into "call" instructions
45 to this target when it's valid and profitable to do so.
47 This does not include stack allocated by movm! */
48 unsigned char stack_size
;
50 /* For function symbols, arguments (if any) for movm instruction
51 in the prologue. We stuff this value into "call" instructions
52 to the target when it's valid and profitable to do so. */
53 unsigned char movm_args
;
55 /* For function symbols, the amount of stack space that would be allocated
56 by the movm instruction. This is redundant with movm_args, but we
57 add it to the hash table to avoid computing it over and over. */
58 unsigned char movm_stack_size
;
60 /* When set, convert all "call" instructions to this target into "calls"
62 #define MN10300_CONVERT_CALL_TO_CALLS 0x1
64 /* Used to mark functions which have had redundant parts of their
66 #define MN10300_DELETED_PROLOGUE_BYTES 0x2
69 /* Calculated value. */
77 /* Used to distinguish GOT entries for TLS types from normal GOT entries. */
78 unsigned char tls_type
;
81 /* We derive a hash table from the main elf linker hash table so
82 we can store state variables and a secondary hash table without
83 resorting to global variables. */
84 struct elf32_mn10300_link_hash_table
86 /* The main hash table. */
87 struct elf_link_hash_table root
;
89 /* A hash table for static functions. We could derive a new hash table
90 instead of using the full elf32_mn10300_link_hash_table if we wanted
91 to save some memory. */
92 struct elf32_mn10300_link_hash_table
*static_hash_table
;
94 /* Random linker state flags. */
95 #define MN10300_HASH_ENTRIES_INITIALIZED 0x1
99 bfd_signed_vma refcount
;
106 #define elf_mn10300_hash_entry(ent) ((struct elf32_mn10300_link_hash_entry *)(ent))
108 struct elf_mn10300_obj_tdata
110 struct elf_obj_tdata root
;
112 /* tls_type for each local got entry. */
113 char * local_got_tls_type
;
116 #define elf_mn10300_tdata(abfd) \
117 ((struct elf_mn10300_obj_tdata *) (abfd)->tdata.any)
119 #define elf_mn10300_local_got_tls_type(abfd) \
120 (elf_mn10300_tdata (abfd)->local_got_tls_type)
123 #define streq(a, b) (strcmp ((a),(b)) == 0)
126 /* For MN10300 linker hash table. */
128 /* Get the MN10300 ELF linker hash table from a link_info structure. */
130 #define elf32_mn10300_hash_table(p) \
131 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
132 == MN10300_ELF_DATA ? ((struct elf32_mn10300_link_hash_table *) ((p)->hash)) : NULL)
134 #define elf32_mn10300_link_hash_traverse(table, func, info) \
135 (elf_link_hash_traverse \
137 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
140 static reloc_howto_type elf_mn10300_howto_table
[] =
142 /* Dummy relocation. Does nothing. */
143 HOWTO (R_MN10300_NONE
,
149 complain_overflow_dont
,
150 bfd_elf_generic_reloc
,
156 /* Standard 32 bit reloc. */
163 complain_overflow_bitfield
,
164 bfd_elf_generic_reloc
,
170 /* Standard 16 bit reloc. */
177 complain_overflow_bitfield
,
178 bfd_elf_generic_reloc
,
184 /* Standard 8 bit reloc. */
191 complain_overflow_bitfield
,
192 bfd_elf_generic_reloc
,
198 /* Standard 32bit pc-relative reloc. */
199 HOWTO (R_MN10300_PCREL32
,
205 complain_overflow_bitfield
,
206 bfd_elf_generic_reloc
,
212 /* Standard 16bit pc-relative reloc. */
213 HOWTO (R_MN10300_PCREL16
,
219 complain_overflow_bitfield
,
220 bfd_elf_generic_reloc
,
226 /* Standard 8 pc-relative reloc. */
227 HOWTO (R_MN10300_PCREL8
,
233 complain_overflow_bitfield
,
234 bfd_elf_generic_reloc
,
241 /* GNU extension to record C++ vtable hierarchy. */
242 HOWTO (R_MN10300_GNU_VTINHERIT
, /* type */
244 0, /* size (0 = byte, 1 = short, 2 = long) */
246 FALSE
, /* pc_relative */
248 complain_overflow_dont
, /* complain_on_overflow */
249 NULL
, /* special_function */
250 "R_MN10300_GNU_VTINHERIT", /* name */
251 FALSE
, /* partial_inplace */
254 FALSE
), /* pcrel_offset */
256 /* GNU extension to record C++ vtable member usage */
257 HOWTO (R_MN10300_GNU_VTENTRY
, /* type */
259 0, /* size (0 = byte, 1 = short, 2 = long) */
261 FALSE
, /* pc_relative */
263 complain_overflow_dont
, /* complain_on_overflow */
264 NULL
, /* special_function */
265 "R_MN10300_GNU_VTENTRY", /* name */
266 FALSE
, /* partial_inplace */
269 FALSE
), /* pcrel_offset */
271 /* Standard 24 bit reloc. */
278 complain_overflow_bitfield
,
279 bfd_elf_generic_reloc
,
285 HOWTO (R_MN10300_GOTPC32
, /* type */
287 2, /* size (0 = byte, 1 = short, 2 = long) */
289 TRUE
, /* pc_relative */
291 complain_overflow_bitfield
, /* complain_on_overflow */
292 bfd_elf_generic_reloc
, /* */
293 "R_MN10300_GOTPC32", /* name */
294 FALSE
, /* partial_inplace */
295 0xffffffff, /* src_mask */
296 0xffffffff, /* dst_mask */
297 TRUE
), /* pcrel_offset */
299 HOWTO (R_MN10300_GOTPC16
, /* type */
301 1, /* size (0 = byte, 1 = short, 2 = long) */
303 TRUE
, /* pc_relative */
305 complain_overflow_bitfield
, /* complain_on_overflow */
306 bfd_elf_generic_reloc
, /* */
307 "R_MN10300_GOTPC16", /* name */
308 FALSE
, /* partial_inplace */
309 0xffff, /* src_mask */
310 0xffff, /* dst_mask */
311 TRUE
), /* pcrel_offset */
313 HOWTO (R_MN10300_GOTOFF32
, /* type */
315 2, /* size (0 = byte, 1 = short, 2 = long) */
317 FALSE
, /* pc_relative */
319 complain_overflow_bitfield
, /* complain_on_overflow */
320 bfd_elf_generic_reloc
, /* */
321 "R_MN10300_GOTOFF32", /* name */
322 FALSE
, /* partial_inplace */
323 0xffffffff, /* src_mask */
324 0xffffffff, /* dst_mask */
325 FALSE
), /* pcrel_offset */
327 HOWTO (R_MN10300_GOTOFF24
, /* type */
329 2, /* size (0 = byte, 1 = short, 2 = long) */
331 FALSE
, /* pc_relative */
333 complain_overflow_bitfield
, /* complain_on_overflow */
334 bfd_elf_generic_reloc
, /* */
335 "R_MN10300_GOTOFF24", /* name */
336 FALSE
, /* partial_inplace */
337 0xffffff, /* src_mask */
338 0xffffff, /* dst_mask */
339 FALSE
), /* pcrel_offset */
341 HOWTO (R_MN10300_GOTOFF16
, /* type */
343 1, /* size (0 = byte, 1 = short, 2 = long) */
345 FALSE
, /* pc_relative */
347 complain_overflow_bitfield
, /* complain_on_overflow */
348 bfd_elf_generic_reloc
, /* */
349 "R_MN10300_GOTOFF16", /* name */
350 FALSE
, /* partial_inplace */
351 0xffff, /* src_mask */
352 0xffff, /* dst_mask */
353 FALSE
), /* pcrel_offset */
355 HOWTO (R_MN10300_PLT32
, /* type */
357 2, /* size (0 = byte, 1 = short, 2 = long) */
359 TRUE
, /* pc_relative */
361 complain_overflow_bitfield
, /* complain_on_overflow */
362 bfd_elf_generic_reloc
, /* */
363 "R_MN10300_PLT32", /* name */
364 FALSE
, /* partial_inplace */
365 0xffffffff, /* src_mask */
366 0xffffffff, /* dst_mask */
367 TRUE
), /* pcrel_offset */
369 HOWTO (R_MN10300_PLT16
, /* type */
371 1, /* size (0 = byte, 1 = short, 2 = long) */
373 TRUE
, /* pc_relative */
375 complain_overflow_bitfield
, /* complain_on_overflow */
376 bfd_elf_generic_reloc
, /* */
377 "R_MN10300_PLT16", /* name */
378 FALSE
, /* partial_inplace */
379 0xffff, /* src_mask */
380 0xffff, /* dst_mask */
381 TRUE
), /* pcrel_offset */
383 HOWTO (R_MN10300_GOT32
, /* type */
385 2, /* size (0 = byte, 1 = short, 2 = long) */
387 FALSE
, /* pc_relative */
389 complain_overflow_bitfield
, /* complain_on_overflow */
390 bfd_elf_generic_reloc
, /* */
391 "R_MN10300_GOT32", /* name */
392 FALSE
, /* partial_inplace */
393 0xffffffff, /* src_mask */
394 0xffffffff, /* dst_mask */
395 FALSE
), /* pcrel_offset */
397 HOWTO (R_MN10300_GOT24
, /* type */
399 2, /* size (0 = byte, 1 = short, 2 = long) */
401 FALSE
, /* pc_relative */
403 complain_overflow_bitfield
, /* complain_on_overflow */
404 bfd_elf_generic_reloc
, /* */
405 "R_MN10300_GOT24", /* name */
406 FALSE
, /* partial_inplace */
407 0xffffffff, /* src_mask */
408 0xffffffff, /* dst_mask */
409 FALSE
), /* pcrel_offset */
411 HOWTO (R_MN10300_GOT16
, /* type */
413 1, /* size (0 = byte, 1 = short, 2 = long) */
415 FALSE
, /* pc_relative */
417 complain_overflow_bitfield
, /* complain_on_overflow */
418 bfd_elf_generic_reloc
, /* */
419 "R_MN10300_GOT16", /* name */
420 FALSE
, /* partial_inplace */
421 0xffffffff, /* src_mask */
422 0xffffffff, /* dst_mask */
423 FALSE
), /* pcrel_offset */
425 HOWTO (R_MN10300_COPY
, /* type */
427 2, /* size (0 = byte, 1 = short, 2 = long) */
429 FALSE
, /* pc_relative */
431 complain_overflow_bitfield
, /* complain_on_overflow */
432 bfd_elf_generic_reloc
, /* */
433 "R_MN10300_COPY", /* name */
434 FALSE
, /* partial_inplace */
435 0xffffffff, /* src_mask */
436 0xffffffff, /* dst_mask */
437 FALSE
), /* pcrel_offset */
439 HOWTO (R_MN10300_GLOB_DAT
, /* type */
441 2, /* size (0 = byte, 1 = short, 2 = long) */
443 FALSE
, /* pc_relative */
445 complain_overflow_bitfield
, /* complain_on_overflow */
446 bfd_elf_generic_reloc
, /* */
447 "R_MN10300_GLOB_DAT", /* name */
448 FALSE
, /* partial_inplace */
449 0xffffffff, /* src_mask */
450 0xffffffff, /* dst_mask */
451 FALSE
), /* pcrel_offset */
453 HOWTO (R_MN10300_JMP_SLOT
, /* type */
455 2, /* size (0 = byte, 1 = short, 2 = long) */
457 FALSE
, /* pc_relative */
459 complain_overflow_bitfield
, /* complain_on_overflow */
460 bfd_elf_generic_reloc
, /* */
461 "R_MN10300_JMP_SLOT", /* name */
462 FALSE
, /* partial_inplace */
463 0xffffffff, /* src_mask */
464 0xffffffff, /* dst_mask */
465 FALSE
), /* pcrel_offset */
467 HOWTO (R_MN10300_RELATIVE
, /* type */
469 2, /* size (0 = byte, 1 = short, 2 = long) */
471 FALSE
, /* pc_relative */
473 complain_overflow_bitfield
, /* complain_on_overflow */
474 bfd_elf_generic_reloc
, /* */
475 "R_MN10300_RELATIVE", /* name */
476 FALSE
, /* partial_inplace */
477 0xffffffff, /* src_mask */
478 0xffffffff, /* dst_mask */
479 FALSE
), /* pcrel_offset */
481 HOWTO (R_MN10300_TLS_GD
, /* type */
483 2, /* size (0 = byte, 1 = short, 2 = long) */
485 FALSE
, /* pc_relative */
487 complain_overflow_bitfield
, /* complain_on_overflow */
488 bfd_elf_generic_reloc
, /* */
489 "R_MN10300_TLS_GD", /* name */
490 FALSE
, /* partial_inplace */
491 0xffffffff, /* src_mask */
492 0xffffffff, /* dst_mask */
493 FALSE
), /* pcrel_offset */
495 HOWTO (R_MN10300_TLS_LD
, /* type */
497 2, /* size (0 = byte, 1 = short, 2 = long) */
499 FALSE
, /* pc_relative */
501 complain_overflow_bitfield
, /* complain_on_overflow */
502 bfd_elf_generic_reloc
, /* */
503 "R_MN10300_TLS_LD", /* name */
504 FALSE
, /* partial_inplace */
505 0xffffffff, /* src_mask */
506 0xffffffff, /* dst_mask */
507 FALSE
), /* pcrel_offset */
509 HOWTO (R_MN10300_TLS_LDO
, /* type */
511 2, /* size (0 = byte, 1 = short, 2 = long) */
513 FALSE
, /* pc_relative */
515 complain_overflow_bitfield
, /* complain_on_overflow */
516 bfd_elf_generic_reloc
, /* */
517 "R_MN10300_TLS_LDO", /* name */
518 FALSE
, /* partial_inplace */
519 0xffffffff, /* src_mask */
520 0xffffffff, /* dst_mask */
521 FALSE
), /* pcrel_offset */
523 HOWTO (R_MN10300_TLS_GOTIE
, /* type */
525 2, /* size (0 = byte, 1 = short, 2 = long) */
527 FALSE
, /* pc_relative */
529 complain_overflow_bitfield
, /* complain_on_overflow */
530 bfd_elf_generic_reloc
, /* */
531 "R_MN10300_TLS_GOTIE", /* name */
532 FALSE
, /* partial_inplace */
533 0xffffffff, /* src_mask */
534 0xffffffff, /* dst_mask */
535 FALSE
), /* pcrel_offset */
537 HOWTO (R_MN10300_TLS_IE
, /* type */
539 2, /* size (0 = byte, 1 = short, 2 = long) */
541 FALSE
, /* pc_relative */
543 complain_overflow_bitfield
, /* complain_on_overflow */
544 bfd_elf_generic_reloc
, /* */
545 "R_MN10300_TLS_IE", /* name */
546 FALSE
, /* partial_inplace */
547 0xffffffff, /* src_mask */
548 0xffffffff, /* dst_mask */
549 FALSE
), /* pcrel_offset */
551 HOWTO (R_MN10300_TLS_LE
, /* type */
553 2, /* size (0 = byte, 1 = short, 2 = long) */
555 FALSE
, /* pc_relative */
557 complain_overflow_bitfield
, /* complain_on_overflow */
558 bfd_elf_generic_reloc
, /* */
559 "R_MN10300_TLS_LE", /* name */
560 FALSE
, /* partial_inplace */
561 0xffffffff, /* src_mask */
562 0xffffffff, /* dst_mask */
563 FALSE
), /* pcrel_offset */
565 HOWTO (R_MN10300_TLS_DTPMOD
, /* type */
567 2, /* size (0 = byte, 1 = short, 2 = long) */
569 FALSE
, /* pc_relative */
571 complain_overflow_bitfield
, /* complain_on_overflow */
572 bfd_elf_generic_reloc
, /* */
573 "R_MN10300_TLS_DTPMOD", /* name */
574 FALSE
, /* partial_inplace */
575 0xffffffff, /* src_mask */
576 0xffffffff, /* dst_mask */
577 FALSE
), /* pcrel_offset */
579 HOWTO (R_MN10300_TLS_DTPOFF
, /* type */
581 2, /* size (0 = byte, 1 = short, 2 = long) */
583 FALSE
, /* pc_relative */
585 complain_overflow_bitfield
, /* complain_on_overflow */
586 bfd_elf_generic_reloc
, /* */
587 "R_MN10300_TLS_DTPOFF", /* name */
588 FALSE
, /* partial_inplace */
589 0xffffffff, /* src_mask */
590 0xffffffff, /* dst_mask */
591 FALSE
), /* pcrel_offset */
593 HOWTO (R_MN10300_TLS_TPOFF
, /* type */
595 2, /* size (0 = byte, 1 = short, 2 = long) */
597 FALSE
, /* pc_relative */
599 complain_overflow_bitfield
, /* complain_on_overflow */
600 bfd_elf_generic_reloc
, /* */
601 "R_MN10300_TLS_TPOFF", /* name */
602 FALSE
, /* partial_inplace */
603 0xffffffff, /* src_mask */
604 0xffffffff, /* dst_mask */
605 FALSE
), /* pcrel_offset */
607 HOWTO (R_MN10300_SYM_DIFF
, /* type */
609 2, /* size (0 = byte, 1 = short, 2 = long) */
611 FALSE
, /* pc_relative */
613 complain_overflow_dont
,/* complain_on_overflow */
614 NULL
, /* special handler. */
615 "R_MN10300_SYM_DIFF", /* name */
616 FALSE
, /* partial_inplace */
617 0xffffffff, /* src_mask */
618 0xffffffff, /* dst_mask */
619 FALSE
), /* pcrel_offset */
621 HOWTO (R_MN10300_ALIGN
, /* type */
623 0, /* size (0 = byte, 1 = short, 2 = long) */
625 FALSE
, /* pc_relative */
627 complain_overflow_dont
,/* complain_on_overflow */
628 NULL
, /* special handler. */
629 "R_MN10300_ALIGN", /* name */
630 FALSE
, /* partial_inplace */
633 FALSE
) /* pcrel_offset */
636 struct mn10300_reloc_map
638 bfd_reloc_code_real_type bfd_reloc_val
;
639 unsigned char elf_reloc_val
;
642 static const struct mn10300_reloc_map mn10300_reloc_map
[] =
644 { BFD_RELOC_NONE
, R_MN10300_NONE
, },
645 { BFD_RELOC_32
, R_MN10300_32
, },
646 { BFD_RELOC_16
, R_MN10300_16
, },
647 { BFD_RELOC_8
, R_MN10300_8
, },
648 { BFD_RELOC_32_PCREL
, R_MN10300_PCREL32
, },
649 { BFD_RELOC_16_PCREL
, R_MN10300_PCREL16
, },
650 { BFD_RELOC_8_PCREL
, R_MN10300_PCREL8
, },
651 { BFD_RELOC_24
, R_MN10300_24
, },
652 { BFD_RELOC_VTABLE_INHERIT
, R_MN10300_GNU_VTINHERIT
},
653 { BFD_RELOC_VTABLE_ENTRY
, R_MN10300_GNU_VTENTRY
},
654 { BFD_RELOC_32_GOT_PCREL
, R_MN10300_GOTPC32
},
655 { BFD_RELOC_16_GOT_PCREL
, R_MN10300_GOTPC16
},
656 { BFD_RELOC_32_GOTOFF
, R_MN10300_GOTOFF32
},
657 { BFD_RELOC_MN10300_GOTOFF24
, R_MN10300_GOTOFF24
},
658 { BFD_RELOC_16_GOTOFF
, R_MN10300_GOTOFF16
},
659 { BFD_RELOC_32_PLT_PCREL
, R_MN10300_PLT32
},
660 { BFD_RELOC_16_PLT_PCREL
, R_MN10300_PLT16
},
661 { BFD_RELOC_MN10300_GOT32
, R_MN10300_GOT32
},
662 { BFD_RELOC_MN10300_GOT24
, R_MN10300_GOT24
},
663 { BFD_RELOC_MN10300_GOT16
, R_MN10300_GOT16
},
664 { BFD_RELOC_MN10300_COPY
, R_MN10300_COPY
},
665 { BFD_RELOC_MN10300_GLOB_DAT
, R_MN10300_GLOB_DAT
},
666 { BFD_RELOC_MN10300_JMP_SLOT
, R_MN10300_JMP_SLOT
},
667 { BFD_RELOC_MN10300_RELATIVE
, R_MN10300_RELATIVE
},
668 { BFD_RELOC_MN10300_TLS_GD
, R_MN10300_TLS_GD
},
669 { BFD_RELOC_MN10300_TLS_LD
, R_MN10300_TLS_LD
},
670 { BFD_RELOC_MN10300_TLS_LDO
, R_MN10300_TLS_LDO
},
671 { BFD_RELOC_MN10300_TLS_GOTIE
, R_MN10300_TLS_GOTIE
},
672 { BFD_RELOC_MN10300_TLS_IE
, R_MN10300_TLS_IE
},
673 { BFD_RELOC_MN10300_TLS_LE
, R_MN10300_TLS_LE
},
674 { BFD_RELOC_MN10300_TLS_DTPMOD
, R_MN10300_TLS_DTPMOD
},
675 { BFD_RELOC_MN10300_TLS_DTPOFF
, R_MN10300_TLS_DTPOFF
},
676 { BFD_RELOC_MN10300_TLS_TPOFF
, R_MN10300_TLS_TPOFF
},
677 { BFD_RELOC_MN10300_SYM_DIFF
, R_MN10300_SYM_DIFF
},
678 { BFD_RELOC_MN10300_ALIGN
, R_MN10300_ALIGN
}
681 /* Create the GOT section. */
684 _bfd_mn10300_elf_create_got_section (bfd
* abfd
,
685 struct bfd_link_info
* info
)
690 struct elf_link_hash_entry
* h
;
691 const struct elf_backend_data
* bed
= get_elf_backend_data (abfd
);
692 struct elf_link_hash_table
*htab
;
695 /* This function may be called more than once. */
696 htab
= elf_hash_table (info
);
697 if (htab
->sgot
!= NULL
)
700 switch (bed
->s
->arch_size
)
711 bfd_set_error (bfd_error_bad_value
);
715 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
716 | SEC_LINKER_CREATED
);
719 pltflags
|= SEC_CODE
;
720 if (bed
->plt_not_loaded
)
721 pltflags
&= ~ (SEC_LOAD
| SEC_HAS_CONTENTS
);
722 if (bed
->plt_readonly
)
723 pltflags
|= SEC_READONLY
;
725 s
= bfd_make_section_anyway_with_flags (abfd
, ".plt", pltflags
);
728 || ! bfd_set_section_alignment (abfd
, s
, bed
->plt_alignment
))
731 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
733 if (bed
->want_plt_sym
)
735 h
= _bfd_elf_define_linkage_sym (abfd
, info
, s
,
736 "_PROCEDURE_LINKAGE_TABLE_");
742 s
= bfd_make_section_anyway_with_flags (abfd
, ".got", flags
);
745 || ! bfd_set_section_alignment (abfd
, s
, ptralign
))
748 if (bed
->want_got_plt
)
750 s
= bfd_make_section_anyway_with_flags (abfd
, ".got.plt", flags
);
753 || ! bfd_set_section_alignment (abfd
, s
, ptralign
))
757 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
758 (or .got.plt) section. We don't do this in the linker script
759 because we don't want to define the symbol if we are not creating
760 a global offset table. */
761 h
= _bfd_elf_define_linkage_sym (abfd
, info
, s
, "_GLOBAL_OFFSET_TABLE_");
766 /* The first bit of the global offset table is the header. */
767 s
->size
+= bed
->got_header_size
;
772 static reloc_howto_type
*
773 bfd_elf32_bfd_reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
774 bfd_reloc_code_real_type code
)
778 for (i
= ARRAY_SIZE (mn10300_reloc_map
); i
--;)
779 if (mn10300_reloc_map
[i
].bfd_reloc_val
== code
)
780 return &elf_mn10300_howto_table
[mn10300_reloc_map
[i
].elf_reloc_val
];
785 static reloc_howto_type
*
786 bfd_elf32_bfd_reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
791 for (i
= ARRAY_SIZE (elf_mn10300_howto_table
); i
--;)
792 if (elf_mn10300_howto_table
[i
].name
!= NULL
793 && strcasecmp (elf_mn10300_howto_table
[i
].name
, r_name
) == 0)
794 return elf_mn10300_howto_table
+ i
;
799 /* Set the howto pointer for an MN10300 ELF reloc. */
802 mn10300_info_to_howto (bfd
*abfd ATTRIBUTE_UNUSED
,
804 Elf_Internal_Rela
*dst
)
808 r_type
= ELF32_R_TYPE (dst
->r_info
);
809 if (r_type
>= R_MN10300_MAX
)
811 (*_bfd_error_handler
) (_("%B: unrecognised MN10300 reloc number: %d"),
813 bfd_set_error (bfd_error_bad_value
);
814 r_type
= R_MN10300_NONE
;
816 cache_ptr
->howto
= elf_mn10300_howto_table
+ r_type
;
820 elf_mn10300_tls_transition (struct bfd_link_info
* info
,
822 struct elf_link_hash_entry
* h
,
824 bfd_boolean counting
)
826 bfd_boolean is_local
;
828 if (r_type
== R_MN10300_TLS_GD
830 && elf_mn10300_hash_entry (h
)->tls_type
== GOT_TLS_IE
)
831 return R_MN10300_TLS_GOTIE
;
833 if (bfd_link_pic (info
))
836 if (! (sec
->flags
& SEC_CODE
))
839 if (! counting
&& h
!= NULL
&& ! elf_hash_table (info
)->dynamic_sections_created
)
842 is_local
= SYMBOL_CALLS_LOCAL (info
, h
);
844 /* For the main program, these are the transitions we do. */
847 case R_MN10300_TLS_GD
: return is_local
? R_MN10300_TLS_LE
: R_MN10300_TLS_GOTIE
;
848 case R_MN10300_TLS_LD
: return R_MN10300_NONE
;
849 case R_MN10300_TLS_LDO
: return R_MN10300_TLS_LE
;
850 case R_MN10300_TLS_IE
:
851 case R_MN10300_TLS_GOTIE
: return is_local
? R_MN10300_TLS_LE
: r_type
;
857 /* Return the relocation value for @tpoff relocation
858 if STT_TLS virtual address is ADDRESS. */
861 dtpoff (struct bfd_link_info
* info
, bfd_vma address
)
863 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
865 /* If tls_sec is NULL, we should have signalled an error already. */
866 if (htab
->tls_sec
== NULL
)
868 return address
- htab
->tls_sec
->vma
;
871 /* Return the relocation value for @tpoff relocation
872 if STT_TLS virtual address is ADDRESS. */
875 tpoff (struct bfd_link_info
* info
, bfd_vma address
)
877 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
879 /* If tls_sec is NULL, we should have signalled an error already. */
880 if (htab
->tls_sec
== NULL
)
882 return address
- (htab
->tls_size
+ htab
->tls_sec
->vma
);
885 /* Returns nonzero if there's a R_MN10300_PLT32 reloc that we now need
886 to skip, after this one. The actual value is the offset between
887 this reloc and the PLT reloc. */
890 mn10300_do_tls_transition (bfd
* input_bfd
,
892 unsigned int tls_r_type
,
896 bfd_byte
*op
= contents
+ offset
;
899 #define TLS_PAIR(r1,r2) ((r1) * R_MN10300_MAX + (r2))
901 /* This is common to all GD/LD transitions, so break it out. */
902 if (r_type
== R_MN10300_TLS_GD
903 || r_type
== R_MN10300_TLS_LD
)
907 BFD_ASSERT (bfd_get_8 (input_bfd
, op
) == 0xFC);
908 BFD_ASSERT (bfd_get_8 (input_bfd
, op
+ 1) == 0xCC);
910 BFD_ASSERT (bfd_get_8 (input_bfd
, op
+ 6) == 0xF1);
911 gotreg
= (bfd_get_8 (input_bfd
, op
+ 7) & 0x0c) >> 2;
913 BFD_ASSERT (bfd_get_8 (input_bfd
, op
+ 8) == 0xDD);
916 switch (TLS_PAIR (r_type
, tls_r_type
))
918 case TLS_PAIR (R_MN10300_TLS_GD
, R_MN10300_TLS_GOTIE
):
920 /* Keep track of which register we put GOTptr in. */
921 /* mov (_x@indntpoff,a2),a0. */
922 memcpy (op
, "\xFC\x20\x00\x00\x00\x00", 6);
925 memcpy (op
+6, "\xF9\x78\x28", 3);
926 /* or 0x00000000, d0 - six byte nop. */
927 memcpy (op
+9, "\xFC\xE4\x00\x00\x00\x00", 6);
931 case TLS_PAIR (R_MN10300_TLS_GD
, R_MN10300_TLS_LE
):
933 /* Register is *always* a0. */
934 /* mov _x@tpoff,a0. */
935 memcpy (op
, "\xFC\xDC\x00\x00\x00\x00", 6);
937 memcpy (op
+6, "\xF9\x78\x28", 3);
938 /* or 0x00000000, d0 - six byte nop. */
939 memcpy (op
+9, "\xFC\xE4\x00\x00\x00\x00", 6);
942 case TLS_PAIR (R_MN10300_TLS_LD
, R_MN10300_NONE
):
944 /* Register is *always* a0. */
946 memcpy (op
, "\xF5\x88", 2);
947 /* or 0x00000000, d0 - six byte nop. */
948 memcpy (op
+2, "\xFC\xE4\x00\x00\x00\x00", 6);
949 /* or 0x00000000, e2 - seven byte nop. */
950 memcpy (op
+8, "\xFE\x19\x22\x00\x00\x00\x00", 7);
954 case TLS_PAIR (R_MN10300_TLS_LDO
, R_MN10300_TLS_LE
):
955 /* No changes needed, just the reloc change. */
958 /* These are a little tricky, because we have to detect which
959 opcode is being used (they're different sizes, with the reloc
960 at different offsets within the opcode) and convert each
961 accordingly, copying the operands as needed. The conversions
962 we do are as follows (IE,GOTIE,LE):
964 1111 1100 1010 01Dn [-- abs32 --] MOV (x@indntpoff),Dn
965 1111 1100 0000 DnAm [-- abs32 --] MOV (x@gotntpoff,Am),Dn
966 1111 1100 1100 11Dn [-- abs32 --] MOV x@tpoff,Dn
968 1111 1100 1010 00An [-- abs32 --] MOV (x@indntpoff),An
969 1111 1100 0010 AnAm [-- abs32 --] MOV (x@gotntpoff,Am),An
970 1111 1100 1101 11An [-- abs32 --] MOV x@tpoff,An
972 1111 1110 0000 1110 Rnnn Xxxx [-- abs32 --] MOV (x@indntpoff),Rn
973 1111 1110 0000 1010 Rnnn Rmmm [-- abs32 --] MOV (x@indntpoff,Rm),Rn
974 1111 1110 0000 1000 Rnnn Xxxx [-- abs32 --] MOV x@tpoff,Rn
976 Since the GOT pointer is always $a2, we assume the last
977 normally won't happen, but let's be paranoid and plan for the
978 day that GCC optimizes it somewhow. */
980 case TLS_PAIR (R_MN10300_TLS_IE
, R_MN10300_TLS_LE
):
984 if ((op
[1] & 0xFC) == 0xA4) /* Dn */
986 op
[1] &= 0x03; /* Leaves Dn. */
991 op
[1] &= 0x03; /* Leaves An. */
995 else if (op
[-3] == 0xFE)
1001 case TLS_PAIR (R_MN10300_TLS_GOTIE
, R_MN10300_TLS_LE
):
1005 if ((op
[1] & 0xF0) == 0x00) /* Dn */
1007 op
[1] &= 0x0C; /* Leaves Dn. */
1013 op
[1] &= 0x0C; /* Leaves An. */
1018 else if (op
[-3] == 0xFE)
1025 (*_bfd_error_handler
)
1026 (_("%s: Unsupported transition from %s to %s"),
1027 bfd_get_filename (input_bfd
),
1028 elf_mn10300_howto_table
[r_type
].name
,
1029 elf_mn10300_howto_table
[tls_r_type
].name
);
1036 /* Look through the relocs for a section during the first phase.
1037 Since we don't do .gots or .plts, we just need to consider the
1038 virtual table relocs for gc. */
1041 mn10300_elf_check_relocs (bfd
*abfd
,
1042 struct bfd_link_info
*info
,
1044 const Elf_Internal_Rela
*relocs
)
1046 struct elf32_mn10300_link_hash_table
* htab
= elf32_mn10300_hash_table (info
);
1047 bfd_boolean sym_diff_reloc_seen
;
1048 Elf_Internal_Shdr
*symtab_hdr
;
1049 Elf_Internal_Sym
* isymbuf
= NULL
;
1050 struct elf_link_hash_entry
**sym_hashes
;
1051 const Elf_Internal_Rela
*rel
;
1052 const Elf_Internal_Rela
*rel_end
;
1054 bfd_vma
* local_got_offsets
;
1058 bfd_boolean result
= FALSE
;
1064 if (bfd_link_relocatable (info
))
1067 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1068 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
1069 sym_hashes
= elf_sym_hashes (abfd
);
1071 dynobj
= elf_hash_table (info
)->dynobj
;
1072 local_got_offsets
= elf_local_got_offsets (abfd
);
1073 rel_end
= relocs
+ sec
->reloc_count
;
1074 sym_diff_reloc_seen
= FALSE
;
1076 for (rel
= relocs
; rel
< rel_end
; rel
++)
1078 struct elf_link_hash_entry
*h
;
1079 unsigned long r_symndx
;
1080 unsigned int r_type
;
1081 int tls_type
= GOT_NORMAL
;
1083 r_symndx
= ELF32_R_SYM (rel
->r_info
);
1084 if (r_symndx
< symtab_hdr
->sh_info
)
1088 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
1089 while (h
->root
.type
== bfd_link_hash_indirect
1090 || h
->root
.type
== bfd_link_hash_warning
)
1091 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
1093 /* PR15323, ref flags aren't set for references in the same
1095 h
->root
.non_ir_ref
= 1;
1098 r_type
= ELF32_R_TYPE (rel
->r_info
);
1099 r_type
= elf_mn10300_tls_transition (info
, r_type
, h
, sec
, TRUE
);
1101 /* Some relocs require a global offset table. */
1106 case R_MN10300_GOT32
:
1107 case R_MN10300_GOT24
:
1108 case R_MN10300_GOT16
:
1109 case R_MN10300_GOTOFF32
:
1110 case R_MN10300_GOTOFF24
:
1111 case R_MN10300_GOTOFF16
:
1112 case R_MN10300_GOTPC32
:
1113 case R_MN10300_GOTPC16
:
1114 case R_MN10300_TLS_GD
:
1115 case R_MN10300_TLS_LD
:
1116 case R_MN10300_TLS_GOTIE
:
1117 case R_MN10300_TLS_IE
:
1118 elf_hash_table (info
)->dynobj
= dynobj
= abfd
;
1119 if (! _bfd_mn10300_elf_create_got_section (dynobj
, info
))
1130 /* This relocation describes the C++ object vtable hierarchy.
1131 Reconstruct it for later use during GC. */
1132 case R_MN10300_GNU_VTINHERIT
:
1133 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
1137 /* This relocation describes which C++ vtable entries are actually
1138 used. Record for later use during GC. */
1139 case R_MN10300_GNU_VTENTRY
:
1140 BFD_ASSERT (h
!= NULL
);
1142 && !bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
1146 case R_MN10300_TLS_LD
:
1147 htab
->tls_ldm_got
.refcount
++;
1148 tls_type
= GOT_TLS_LD
;
1150 if (htab
->tls_ldm_got
.got_allocated
)
1154 case R_MN10300_TLS_IE
:
1155 case R_MN10300_TLS_GOTIE
:
1156 if (bfd_link_pic (info
))
1157 info
->flags
|= DF_STATIC_TLS
;
1160 case R_MN10300_TLS_GD
:
1161 case R_MN10300_GOT32
:
1162 case R_MN10300_GOT24
:
1163 case R_MN10300_GOT16
:
1165 /* This symbol requires a global offset table entry. */
1169 case R_MN10300_TLS_IE
:
1170 case R_MN10300_TLS_GOTIE
: tls_type
= GOT_TLS_IE
; break;
1171 case R_MN10300_TLS_GD
: tls_type
= GOT_TLS_GD
; break;
1172 default: tls_type
= GOT_NORMAL
; break;
1177 sgot
= htab
->root
.sgot
;
1178 BFD_ASSERT (sgot
!= NULL
);
1182 && (h
!= NULL
|| bfd_link_pic (info
)))
1184 srelgot
= bfd_get_linker_section (dynobj
, ".rela.got");
1185 if (srelgot
== NULL
)
1187 flagword flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
1188 | SEC_IN_MEMORY
| SEC_LINKER_CREATED
1190 srelgot
= bfd_make_section_anyway_with_flags (dynobj
,
1194 || ! bfd_set_section_alignment (dynobj
, srelgot
, 2))
1199 if (r_type
== R_MN10300_TLS_LD
)
1201 htab
->tls_ldm_got
.offset
= sgot
->size
;
1202 htab
->tls_ldm_got
.got_allocated
++;
1206 if (elf_mn10300_hash_entry (h
)->tls_type
!= tls_type
1207 && elf_mn10300_hash_entry (h
)->tls_type
!= GOT_UNKNOWN
)
1209 if (tls_type
== GOT_TLS_IE
1210 && elf_mn10300_hash_entry (h
)->tls_type
== GOT_TLS_GD
)
1211 /* No change - this is ok. */;
1212 else if (tls_type
== GOT_TLS_GD
1213 && elf_mn10300_hash_entry (h
)->tls_type
== GOT_TLS_IE
)
1214 /* Transition GD->IE. */
1215 tls_type
= GOT_TLS_IE
;
1217 (*_bfd_error_handler
)
1218 (_("%B: %s' accessed both as normal and thread local symbol"),
1219 abfd
, h
? h
->root
.root
.string
: "<local>");
1222 elf_mn10300_hash_entry (h
)->tls_type
= tls_type
;
1224 if (h
->got
.offset
!= (bfd_vma
) -1)
1225 /* We have already allocated space in the .got. */
1228 h
->got
.offset
= sgot
->size
;
1230 if (ELF_ST_VISIBILITY (h
->other
) != STV_INTERNAL
1231 /* Make sure this symbol is output as a dynamic symbol. */
1232 && h
->dynindx
== -1)
1234 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
1238 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1239 if (r_type
== R_MN10300_TLS_GD
)
1240 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1244 /* This is a global offset table entry for a local
1246 if (local_got_offsets
== NULL
)
1251 size
= symtab_hdr
->sh_info
* (sizeof (bfd_vma
) + sizeof (char));
1252 local_got_offsets
= bfd_alloc (abfd
, size
);
1254 if (local_got_offsets
== NULL
)
1257 elf_local_got_offsets (abfd
) = local_got_offsets
;
1258 elf_mn10300_local_got_tls_type (abfd
)
1259 = (char *) (local_got_offsets
+ symtab_hdr
->sh_info
);
1261 for (i
= 0; i
< symtab_hdr
->sh_info
; i
++)
1262 local_got_offsets
[i
] = (bfd_vma
) -1;
1265 if (local_got_offsets
[r_symndx
] != (bfd_vma
) -1)
1266 /* We have already allocated space in the .got. */
1269 local_got_offsets
[r_symndx
] = sgot
->size
;
1271 if (bfd_link_pic (info
))
1273 /* If we are generating a shared object, we need to
1274 output a R_MN10300_RELATIVE reloc so that the dynamic
1275 linker can adjust this GOT entry. */
1276 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1278 if (r_type
== R_MN10300_TLS_GD
)
1279 /* And a R_MN10300_TLS_DTPOFF reloc as well. */
1280 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1283 elf_mn10300_local_got_tls_type (abfd
) [r_symndx
] = tls_type
;
1287 if (r_type
== R_MN10300_TLS_GD
1288 || r_type
== R_MN10300_TLS_LD
)
1291 goto need_shared_relocs
;
1293 case R_MN10300_PLT32
:
1294 case R_MN10300_PLT16
:
1295 /* This symbol requires a procedure linkage table entry. We
1296 actually build the entry in adjust_dynamic_symbol,
1297 because this might be a case of linking PIC code which is
1298 never referenced by a dynamic object, in which case we
1299 don't need to generate a procedure linkage table entry
1302 /* If this is a local symbol, we resolve it directly without
1303 creating a procedure linkage table entry. */
1307 if (ELF_ST_VISIBILITY (h
->other
) == STV_INTERNAL
1308 || ELF_ST_VISIBILITY (h
->other
) == STV_HIDDEN
)
1317 case R_MN10300_PCREL32
:
1318 case R_MN10300_PCREL16
:
1319 case R_MN10300_PCREL8
:
1324 case R_MN10300_SYM_DIFF
:
1325 sym_diff_reloc_seen
= TRUE
;
1333 /* If we are creating a shared library, then we
1334 need to copy the reloc into the shared library. */
1335 if (bfd_link_pic (info
)
1336 && (sec
->flags
& SEC_ALLOC
) != 0
1337 /* Do not generate a dynamic reloc for a
1338 reloc associated with a SYM_DIFF operation. */
1339 && ! sym_diff_reloc_seen
)
1341 asection
* sym_section
= NULL
;
1343 /* Find the section containing the
1344 symbol involved in the relocation. */
1347 Elf_Internal_Sym
* isym
;
1349 if (isymbuf
== NULL
)
1350 isymbuf
= bfd_elf_get_elf_syms (abfd
, symtab_hdr
,
1351 symtab_hdr
->sh_info
, 0,
1355 isym
= isymbuf
+ r_symndx
;
1356 /* All we care about is whether this local symbol is absolute. */
1357 if (isym
->st_shndx
== SHN_ABS
)
1358 sym_section
= bfd_abs_section_ptr
;
1363 if (h
->root
.type
== bfd_link_hash_defined
1364 || h
->root
.type
== bfd_link_hash_defweak
)
1365 sym_section
= h
->root
.u
.def
.section
;
1368 /* If the symbol is absolute then the relocation can
1369 be resolved during linking and there is no need for
1371 if (sym_section
!= bfd_abs_section_ptr
)
1373 /* When creating a shared object, we must copy these
1374 reloc types into the output file. We create a reloc
1375 section in dynobj and make room for this reloc. */
1378 sreloc
= _bfd_elf_make_dynamic_reloc_section
1379 (sec
, dynobj
, 2, abfd
, /*rela?*/ TRUE
);
1384 sreloc
->size
+= sizeof (Elf32_External_Rela
);
1391 if (ELF32_R_TYPE (rel
->r_info
) != R_MN10300_SYM_DIFF
)
1392 sym_diff_reloc_seen
= FALSE
;
1397 if (isymbuf
!= NULL
)
1403 /* Return the section that should be marked against GC for a given
1407 mn10300_elf_gc_mark_hook (asection
*sec
,
1408 struct bfd_link_info
*info
,
1409 Elf_Internal_Rela
*rel
,
1410 struct elf_link_hash_entry
*h
,
1411 Elf_Internal_Sym
*sym
)
1414 switch (ELF32_R_TYPE (rel
->r_info
))
1416 case R_MN10300_GNU_VTINHERIT
:
1417 case R_MN10300_GNU_VTENTRY
:
1421 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
1424 /* Perform a relocation as part of a final link. */
1426 static bfd_reloc_status_type
1427 mn10300_elf_final_link_relocate (reloc_howto_type
*howto
,
1429 bfd
*output_bfd ATTRIBUTE_UNUSED
,
1430 asection
*input_section
,
1435 struct elf_link_hash_entry
* h
,
1436 unsigned long symndx
,
1437 struct bfd_link_info
*info
,
1438 asection
*sym_sec ATTRIBUTE_UNUSED
,
1439 int is_local ATTRIBUTE_UNUSED
)
1441 struct elf32_mn10300_link_hash_table
* htab
= elf32_mn10300_hash_table (info
);
1442 static asection
* sym_diff_section
;
1443 static bfd_vma sym_diff_value
;
1444 bfd_boolean is_sym_diff_reloc
;
1445 unsigned long r_type
= howto
->type
;
1446 bfd_byte
* hit_data
= contents
+ offset
;
1452 dynobj
= elf_hash_table (info
)->dynobj
;
1462 case R_MN10300_PCREL8
:
1463 case R_MN10300_PCREL16
:
1464 case R_MN10300_PCREL32
:
1465 case R_MN10300_GOTOFF32
:
1466 case R_MN10300_GOTOFF24
:
1467 case R_MN10300_GOTOFF16
:
1468 if (bfd_link_pic (info
)
1469 && (input_section
->flags
& SEC_ALLOC
) != 0
1471 && ! SYMBOL_REFERENCES_LOCAL (info
, h
))
1472 return bfd_reloc_dangerous
;
1473 case R_MN10300_GOT32
:
1475 Taking the address of a protected function in a shared library
1476 is illegal. Issue an error message here. */
1477 if (bfd_link_pic (info
)
1478 && (input_section
->flags
& SEC_ALLOC
) != 0
1480 && ELF_ST_VISIBILITY (h
->other
) == STV_PROTECTED
1481 && (h
->type
== STT_FUNC
|| h
->type
== STT_GNU_IFUNC
)
1482 && ! SYMBOL_REFERENCES_LOCAL (info
, h
))
1483 return bfd_reloc_dangerous
;
1486 is_sym_diff_reloc
= FALSE
;
1487 if (sym_diff_section
!= NULL
)
1489 BFD_ASSERT (sym_diff_section
== input_section
);
1497 value
-= sym_diff_value
;
1498 /* If we are computing a 32-bit value for the location lists
1499 and the result is 0 then we add one to the value. A zero
1500 value can result because of linker relaxation deleteing
1501 prologue instructions and using a value of 1 (for the begin
1502 and end offsets in the location list entry) results in a
1503 nul entry which does not prevent the following entries from
1505 if (r_type
== R_MN10300_32
1507 && strcmp (input_section
->name
, ".debug_loc") == 0)
1509 sym_diff_section
= NULL
;
1510 is_sym_diff_reloc
= TRUE
;
1514 sym_diff_section
= NULL
;
1521 case R_MN10300_SYM_DIFF
:
1522 BFD_ASSERT (addend
== 0);
1523 /* Cache the input section and value.
1524 The offset is unreliable, since relaxation may
1525 have reduced the following reloc's offset. */
1526 sym_diff_section
= input_section
;
1527 sym_diff_value
= value
;
1528 return bfd_reloc_ok
;
1530 case R_MN10300_ALIGN
:
1531 case R_MN10300_NONE
:
1532 return bfd_reloc_ok
;
1535 if (bfd_link_pic (info
)
1536 /* Do not generate relocs when an R_MN10300_32 has been used
1537 with an R_MN10300_SYM_DIFF to compute a difference of two
1539 && is_sym_diff_reloc
== FALSE
1540 /* Also, do not generate a reloc when the symbol associated
1541 with the R_MN10300_32 reloc is absolute - there is no
1542 need for a run time computation in this case. */
1543 && sym_sec
!= bfd_abs_section_ptr
1544 /* If the section is not going to be allocated at load time
1545 then there is no need to generate relocs for it. */
1546 && (input_section
->flags
& SEC_ALLOC
) != 0)
1548 Elf_Internal_Rela outrel
;
1549 bfd_boolean skip
, relocate
;
1551 /* When generating a shared object, these relocations are
1552 copied into the output file to be resolved at run
1556 sreloc
= _bfd_elf_get_dynamic_reloc_section
1557 (input_bfd
, input_section
, /*rela?*/ TRUE
);
1564 outrel
.r_offset
= _bfd_elf_section_offset (input_bfd
, info
,
1565 input_section
, offset
);
1566 if (outrel
.r_offset
== (bfd_vma
) -1)
1569 outrel
.r_offset
+= (input_section
->output_section
->vma
1570 + input_section
->output_offset
);
1574 memset (&outrel
, 0, sizeof outrel
);
1579 /* h->dynindx may be -1 if this symbol was marked to
1582 || SYMBOL_REFERENCES_LOCAL (info
, h
))
1585 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_RELATIVE
);
1586 outrel
.r_addend
= value
+ addend
;
1590 BFD_ASSERT (h
->dynindx
!= -1);
1592 outrel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_32
);
1593 outrel
.r_addend
= value
+ addend
;
1597 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
,
1598 (bfd_byte
*) (((Elf32_External_Rela
*) sreloc
->contents
)
1599 + sreloc
->reloc_count
));
1600 ++sreloc
->reloc_count
;
1602 /* If this reloc is against an external symbol, we do
1603 not want to fiddle with the addend. Otherwise, we
1604 need to include the symbol value so that it becomes
1605 an addend for the dynamic reloc. */
1607 return bfd_reloc_ok
;
1610 bfd_put_32 (input_bfd
, value
, hit_data
);
1611 return bfd_reloc_ok
;
1616 if ((long) value
> 0x7fffff || (long) value
< -0x800000)
1617 return bfd_reloc_overflow
;
1619 bfd_put_8 (input_bfd
, value
& 0xff, hit_data
);
1620 bfd_put_8 (input_bfd
, (value
>> 8) & 0xff, hit_data
+ 1);
1621 bfd_put_8 (input_bfd
, (value
>> 16) & 0xff, hit_data
+ 2);
1622 return bfd_reloc_ok
;
1627 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1628 return bfd_reloc_overflow
;
1630 bfd_put_16 (input_bfd
, value
, hit_data
);
1631 return bfd_reloc_ok
;
1636 if ((long) value
> 0x7f || (long) value
< -0x80)
1637 return bfd_reloc_overflow
;
1639 bfd_put_8 (input_bfd
, value
, hit_data
);
1640 return bfd_reloc_ok
;
1642 case R_MN10300_PCREL8
:
1643 value
-= (input_section
->output_section
->vma
1644 + input_section
->output_offset
);
1648 if ((long) value
> 0x7f || (long) value
< -0x80)
1649 return bfd_reloc_overflow
;
1651 bfd_put_8 (input_bfd
, value
, hit_data
);
1652 return bfd_reloc_ok
;
1654 case R_MN10300_PCREL16
:
1655 value
-= (input_section
->output_section
->vma
1656 + input_section
->output_offset
);
1660 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1661 return bfd_reloc_overflow
;
1663 bfd_put_16 (input_bfd
, value
, hit_data
);
1664 return bfd_reloc_ok
;
1666 case R_MN10300_PCREL32
:
1667 value
-= (input_section
->output_section
->vma
1668 + input_section
->output_offset
);
1672 bfd_put_32 (input_bfd
, value
, hit_data
);
1673 return bfd_reloc_ok
;
1675 case R_MN10300_GNU_VTINHERIT
:
1676 case R_MN10300_GNU_VTENTRY
:
1677 return bfd_reloc_ok
;
1679 case R_MN10300_GOTPC32
:
1681 return bfd_reloc_dangerous
;
1683 /* Use global offset table as symbol value. */
1684 value
= htab
->root
.sgot
->output_section
->vma
;
1685 value
-= (input_section
->output_section
->vma
1686 + input_section
->output_offset
);
1690 bfd_put_32 (input_bfd
, value
, hit_data
);
1691 return bfd_reloc_ok
;
1693 case R_MN10300_GOTPC16
:
1695 return bfd_reloc_dangerous
;
1697 /* Use global offset table as symbol value. */
1698 value
= htab
->root
.sgot
->output_section
->vma
;
1699 value
-= (input_section
->output_section
->vma
1700 + input_section
->output_offset
);
1704 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1705 return bfd_reloc_overflow
;
1707 bfd_put_16 (input_bfd
, value
, hit_data
);
1708 return bfd_reloc_ok
;
1710 case R_MN10300_GOTOFF32
:
1712 return bfd_reloc_dangerous
;
1714 value
-= htab
->root
.sgot
->output_section
->vma
;
1717 bfd_put_32 (input_bfd
, value
, hit_data
);
1718 return bfd_reloc_ok
;
1720 case R_MN10300_GOTOFF24
:
1722 return bfd_reloc_dangerous
;
1724 value
-= htab
->root
.sgot
->output_section
->vma
;
1727 if ((long) value
> 0x7fffff || (long) value
< -0x800000)
1728 return bfd_reloc_overflow
;
1730 bfd_put_8 (input_bfd
, value
, hit_data
);
1731 bfd_put_8 (input_bfd
, (value
>> 8) & 0xff, hit_data
+ 1);
1732 bfd_put_8 (input_bfd
, (value
>> 16) & 0xff, hit_data
+ 2);
1733 return bfd_reloc_ok
;
1735 case R_MN10300_GOTOFF16
:
1737 return bfd_reloc_dangerous
;
1739 value
-= htab
->root
.sgot
->output_section
->vma
;
1742 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1743 return bfd_reloc_overflow
;
1745 bfd_put_16 (input_bfd
, value
, hit_data
);
1746 return bfd_reloc_ok
;
1748 case R_MN10300_PLT32
:
1750 && ELF_ST_VISIBILITY (h
->other
) != STV_INTERNAL
1751 && ELF_ST_VISIBILITY (h
->other
) != STV_HIDDEN
1752 && h
->plt
.offset
!= (bfd_vma
) -1)
1755 return bfd_reloc_dangerous
;
1757 splt
= htab
->root
.splt
;
1758 value
= (splt
->output_section
->vma
1759 + splt
->output_offset
1760 + h
->plt
.offset
) - value
;
1763 value
-= (input_section
->output_section
->vma
1764 + input_section
->output_offset
);
1768 bfd_put_32 (input_bfd
, value
, hit_data
);
1769 return bfd_reloc_ok
;
1771 case R_MN10300_PLT16
:
1773 && ELF_ST_VISIBILITY (h
->other
) != STV_INTERNAL
1774 && ELF_ST_VISIBILITY (h
->other
) != STV_HIDDEN
1775 && h
->plt
.offset
!= (bfd_vma
) -1)
1778 return bfd_reloc_dangerous
;
1780 splt
= htab
->root
.splt
;
1781 value
= (splt
->output_section
->vma
1782 + splt
->output_offset
1783 + h
->plt
.offset
) - value
;
1786 value
-= (input_section
->output_section
->vma
1787 + input_section
->output_offset
);
1791 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1792 return bfd_reloc_overflow
;
1794 bfd_put_16 (input_bfd
, value
, hit_data
);
1795 return bfd_reloc_ok
;
1797 case R_MN10300_TLS_LDO
:
1798 value
= dtpoff (info
, value
);
1799 bfd_put_32 (input_bfd
, value
+ addend
, hit_data
);
1800 return bfd_reloc_ok
;
1802 case R_MN10300_TLS_LE
:
1803 value
= tpoff (info
, value
);
1804 bfd_put_32 (input_bfd
, value
+ addend
, hit_data
);
1805 return bfd_reloc_ok
;
1807 case R_MN10300_TLS_LD
:
1809 return bfd_reloc_dangerous
;
1811 sgot
= htab
->root
.sgot
;
1812 BFD_ASSERT (sgot
!= NULL
);
1813 value
= htab
->tls_ldm_got
.offset
+ sgot
->output_offset
;
1814 bfd_put_32 (input_bfd
, value
, hit_data
);
1816 if (!htab
->tls_ldm_got
.rel_emitted
)
1818 asection
* srelgot
= bfd_get_linker_section (dynobj
, ".rela.got");
1819 Elf_Internal_Rela rel
;
1821 BFD_ASSERT (srelgot
!= NULL
);
1822 htab
->tls_ldm_got
.rel_emitted
++;
1823 rel
.r_offset
= (sgot
->output_section
->vma
1824 + sgot
->output_offset
1825 + htab
->tls_ldm_got
.offset
);
1826 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ htab
->tls_ldm_got
.offset
);
1827 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ htab
->tls_ldm_got
.offset
+4);
1828 rel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD
);
1830 bfd_elf32_swap_reloca_out (output_bfd
, & rel
,
1831 (bfd_byte
*) ((Elf32_External_Rela
*) srelgot
->contents
1832 + srelgot
->reloc_count
));
1833 ++ srelgot
->reloc_count
;
1836 return bfd_reloc_ok
;
1838 case R_MN10300_TLS_GOTIE
:
1839 value
= tpoff (info
, value
);
1842 case R_MN10300_TLS_GD
:
1843 case R_MN10300_TLS_IE
:
1844 case R_MN10300_GOT32
:
1845 case R_MN10300_GOT24
:
1846 case R_MN10300_GOT16
:
1848 return bfd_reloc_dangerous
;
1850 sgot
= htab
->root
.sgot
;
1851 if (r_type
== R_MN10300_TLS_GD
)
1852 value
= dtpoff (info
, value
);
1858 off
= h
->got
.offset
;
1859 /* Offsets in the GOT are allocated in check_relocs
1860 which is not called for shared libraries... */
1861 if (off
== (bfd_vma
) -1)
1864 if (sgot
->contents
!= NULL
1865 && (! elf_hash_table (info
)->dynamic_sections_created
1866 || SYMBOL_REFERENCES_LOCAL (info
, h
)))
1867 /* This is actually a static link, or it is a
1868 -Bsymbolic link and the symbol is defined
1869 locally, or the symbol was forced to be local
1870 because of a version file. We must initialize
1871 this entry in the global offset table.
1873 When doing a dynamic link, we create a .rela.got
1874 relocation entry to initialize the value. This
1875 is done in the finish_dynamic_symbol routine. */
1876 bfd_put_32 (output_bfd
, value
,
1877 sgot
->contents
+ off
);
1879 value
= sgot
->output_offset
+ off
;
1885 off
= elf_local_got_offsets (input_bfd
)[symndx
];
1888 bfd_put_32 (output_bfd
, value
, sgot
->contents
+ (off
& ~ 1));
1891 bfd_put_32 (output_bfd
, value
, sgot
->contents
+ off
);
1893 if (bfd_link_pic (info
))
1896 Elf_Internal_Rela outrel
;
1898 srelgot
= bfd_get_linker_section (dynobj
, ".rela.got");
1899 BFD_ASSERT (srelgot
!= NULL
);
1901 outrel
.r_offset
= (sgot
->output_section
->vma
1902 + sgot
->output_offset
1906 case R_MN10300_TLS_GD
:
1907 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_DTPOFF
);
1908 outrel
.r_offset
= (sgot
->output_section
->vma
1909 + sgot
->output_offset
1911 bfd_elf32_swap_reloca_out (output_bfd
, & outrel
,
1912 (bfd_byte
*) (((Elf32_External_Rela
*)
1914 + srelgot
->reloc_count
));
1915 ++ srelgot
->reloc_count
;
1916 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD
);
1918 case R_MN10300_TLS_GOTIE
:
1919 case R_MN10300_TLS_IE
:
1920 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_TPOFF
);
1923 outrel
.r_info
= ELF32_R_INFO (0, R_MN10300_RELATIVE
);
1927 outrel
.r_addend
= value
;
1928 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
,
1929 (bfd_byte
*) (((Elf32_External_Rela
*)
1931 + srelgot
->reloc_count
));
1932 ++ srelgot
->reloc_count
;
1933 elf_local_got_offsets (input_bfd
)[symndx
] |= 1;
1936 value
= sgot
->output_offset
+ (off
& ~(bfd_vma
) 1);
1942 if (r_type
== R_MN10300_TLS_IE
)
1944 value
+= sgot
->output_section
->vma
;
1945 bfd_put_32 (input_bfd
, value
, hit_data
);
1946 return bfd_reloc_ok
;
1948 else if (r_type
== R_MN10300_TLS_GOTIE
1949 || r_type
== R_MN10300_TLS_GD
1950 || r_type
== R_MN10300_TLS_LD
)
1952 bfd_put_32 (input_bfd
, value
, hit_data
);
1953 return bfd_reloc_ok
;
1955 else if (r_type
== R_MN10300_GOT32
)
1957 bfd_put_32 (input_bfd
, value
, hit_data
);
1958 return bfd_reloc_ok
;
1960 else if (r_type
== R_MN10300_GOT24
)
1962 if ((long) value
> 0x7fffff || (long) value
< -0x800000)
1963 return bfd_reloc_overflow
;
1965 bfd_put_8 (input_bfd
, value
& 0xff, hit_data
);
1966 bfd_put_8 (input_bfd
, (value
>> 8) & 0xff, hit_data
+ 1);
1967 bfd_put_8 (input_bfd
, (value
>> 16) & 0xff, hit_data
+ 2);
1968 return bfd_reloc_ok
;
1970 else if (r_type
== R_MN10300_GOT16
)
1972 if ((long) value
> 0x7fff || (long) value
< -0x8000)
1973 return bfd_reloc_overflow
;
1975 bfd_put_16 (input_bfd
, value
, hit_data
);
1976 return bfd_reloc_ok
;
1981 return bfd_reloc_notsupported
;
1985 /* Relocate an MN10300 ELF section. */
1988 mn10300_elf_relocate_section (bfd
*output_bfd
,
1989 struct bfd_link_info
*info
,
1991 asection
*input_section
,
1993 Elf_Internal_Rela
*relocs
,
1994 Elf_Internal_Sym
*local_syms
,
1995 asection
**local_sections
)
1997 Elf_Internal_Shdr
*symtab_hdr
;
1998 struct elf_link_hash_entry
**sym_hashes
;
1999 Elf_Internal_Rela
*rel
, *relend
;
2000 Elf_Internal_Rela
* trel
;
2002 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
2003 sym_hashes
= elf_sym_hashes (input_bfd
);
2006 relend
= relocs
+ input_section
->reloc_count
;
2007 for (; rel
< relend
; rel
++)
2010 reloc_howto_type
*howto
;
2011 unsigned long r_symndx
;
2012 Elf_Internal_Sym
*sym
;
2014 struct elf32_mn10300_link_hash_entry
*h
;
2016 bfd_reloc_status_type r
;
2018 bfd_boolean unresolved_reloc
= FALSE
;
2019 bfd_boolean warned
, ignored
;
2020 struct elf_link_hash_entry
* hh
;
2023 r_symndx
= ELF32_R_SYM (rel
->r_info
);
2024 r_type
= ELF32_R_TYPE (rel
->r_info
);
2025 howto
= elf_mn10300_howto_table
+ r_type
;
2027 /* Just skip the vtable gc relocs. */
2028 if (r_type
== R_MN10300_GNU_VTINHERIT
2029 || r_type
== R_MN10300_GNU_VTENTRY
)
2035 if (r_symndx
< symtab_hdr
->sh_info
)
2039 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
2040 r_symndx
, symtab_hdr
, sym_hashes
,
2041 hh
, sec
, relocation
,
2042 unresolved_reloc
, warned
, ignored
);
2044 h
= elf_mn10300_hash_entry (hh
);
2046 tls_r_type
= elf_mn10300_tls_transition (info
, r_type
, hh
, input_section
, 0);
2047 if (tls_r_type
!= r_type
)
2049 bfd_boolean had_plt
;
2051 had_plt
= mn10300_do_tls_transition (input_bfd
, r_type
, tls_r_type
,
2052 contents
, rel
->r_offset
);
2053 r_type
= tls_r_type
;
2054 howto
= elf_mn10300_howto_table
+ r_type
;
2057 for (trel
= rel
+1; trel
< relend
; trel
++)
2058 if ((ELF32_R_TYPE (trel
->r_info
) == R_MN10300_PLT32
2059 || ELF32_R_TYPE (trel
->r_info
) == R_MN10300_PCREL32
)
2060 && rel
->r_offset
+ had_plt
== trel
->r_offset
)
2061 trel
->r_info
= ELF32_R_INFO (0, R_MN10300_NONE
);
2064 if (r_symndx
< symtab_hdr
->sh_info
)
2066 sym
= local_syms
+ r_symndx
;
2067 sec
= local_sections
[r_symndx
];
2068 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
2072 if ((h
->root
.root
.type
== bfd_link_hash_defined
2073 || h
->root
.root
.type
== bfd_link_hash_defweak
)
2074 && ( r_type
== R_MN10300_GOTPC32
2075 || r_type
== R_MN10300_GOTPC16
2076 || (( r_type
== R_MN10300_PLT32
2077 || r_type
== R_MN10300_PLT16
)
2078 && ELF_ST_VISIBILITY (h
->root
.other
) != STV_INTERNAL
2079 && ELF_ST_VISIBILITY (h
->root
.other
) != STV_HIDDEN
2080 && h
->root
.plt
.offset
!= (bfd_vma
) -1)
2081 || (( r_type
== R_MN10300_GOT32
2082 || r_type
== R_MN10300_GOT24
2083 || r_type
== R_MN10300_TLS_GD
2084 || r_type
== R_MN10300_TLS_LD
2085 || r_type
== R_MN10300_TLS_GOTIE
2086 || r_type
== R_MN10300_TLS_IE
2087 || r_type
== R_MN10300_GOT16
)
2088 && elf_hash_table (info
)->dynamic_sections_created
2089 && !SYMBOL_REFERENCES_LOCAL (info
, hh
))
2090 || (r_type
== R_MN10300_32
2091 /* _32 relocs in executables force _COPY relocs,
2092 such that the address of the symbol ends up
2094 && !bfd_link_executable (info
)
2095 && !SYMBOL_REFERENCES_LOCAL (info
, hh
)
2096 && ((input_section
->flags
& SEC_ALLOC
) != 0
2097 /* DWARF will emit R_MN10300_32 relocations
2098 in its sections against symbols defined
2099 externally in shared libraries. We can't
2100 do anything with them here. */
2101 || ((input_section
->flags
& SEC_DEBUGGING
) != 0
2102 && h
->root
.def_dynamic
)))))
2103 /* In these cases, we don't need the relocation
2104 value. We check specially because in some
2105 obscure cases sec->output_section will be NULL. */
2108 else if (!bfd_link_relocatable (info
) && unresolved_reloc
2109 && _bfd_elf_section_offset (output_bfd
, info
, input_section
,
2110 rel
->r_offset
) != (bfd_vma
) -1)
2112 (*_bfd_error_handler
)
2113 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
2116 (long) rel
->r_offset
,
2118 h
->root
.root
.root
.string
);
2121 if (sec
!= NULL
&& discarded_section (sec
))
2122 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
2123 rel
, 1, relend
, howto
, 0, contents
);
2125 if (bfd_link_relocatable (info
))
2128 r
= mn10300_elf_final_link_relocate (howto
, input_bfd
, output_bfd
,
2130 contents
, rel
->r_offset
,
2131 relocation
, rel
->r_addend
,
2132 (struct elf_link_hash_entry
*) h
,
2134 info
, sec
, h
== NULL
);
2136 if (r
!= bfd_reloc_ok
)
2139 const char *msg
= NULL
;
2142 name
= h
->root
.root
.root
.string
;
2145 name
= (bfd_elf_string_from_elf_section
2146 (input_bfd
, symtab_hdr
->sh_link
, sym
->st_name
));
2147 if (name
== NULL
|| *name
== '\0')
2148 name
= bfd_section_name (input_bfd
, sec
);
2153 case bfd_reloc_overflow
:
2154 if (! ((*info
->callbacks
->reloc_overflow
)
2155 (info
, (h
? &h
->root
.root
: NULL
), name
,
2156 howto
->name
, (bfd_vma
) 0, input_bfd
,
2157 input_section
, rel
->r_offset
)))
2161 case bfd_reloc_undefined
:
2162 if (! ((*info
->callbacks
->undefined_symbol
)
2163 (info
, name
, input_bfd
, input_section
,
2164 rel
->r_offset
, TRUE
)))
2168 case bfd_reloc_outofrange
:
2169 msg
= _("internal error: out of range error");
2172 case bfd_reloc_notsupported
:
2173 msg
= _("internal error: unsupported relocation error");
2176 case bfd_reloc_dangerous
:
2177 if (r_type
== R_MN10300_PCREL32
)
2178 msg
= _("error: inappropriate relocation type for shared"
2179 " library (did you forget -fpic?)");
2180 else if (r_type
== R_MN10300_GOT32
)
2181 msg
= _("%B: taking the address of protected function"
2182 " '%s' cannot be done when making a shared library");
2184 msg
= _("internal error: suspicious relocation type used"
2185 " in shared library");
2189 msg
= _("internal error: unknown error");
2193 _bfd_error_handler (msg
, input_bfd
, name
);
2194 bfd_set_error (bfd_error_bad_value
);
2203 /* Finish initializing one hash table entry. */
2206 elf32_mn10300_finish_hash_table_entry (struct bfd_hash_entry
*gen_entry
,
2209 struct elf32_mn10300_link_hash_entry
*entry
;
2210 struct bfd_link_info
*link_info
= (struct bfd_link_info
*) in_args
;
2211 unsigned int byte_count
= 0;
2213 entry
= (struct elf32_mn10300_link_hash_entry
*) gen_entry
;
2215 /* If we already know we want to convert "call" to "calls" for calls
2216 to this symbol, then return now. */
2217 if (entry
->flags
== MN10300_CONVERT_CALL_TO_CALLS
)
2220 /* If there are no named calls to this symbol, or there's nothing we
2221 can move from the function itself into the "call" instruction,
2222 then note that all "call" instructions should be converted into
2223 "calls" instructions and return. If a symbol is available for
2224 dynamic symbol resolution (overridable or overriding), avoid
2225 custom calling conventions. */
2226 if (entry
->direct_calls
== 0
2227 || (entry
->stack_size
== 0 && entry
->movm_args
== 0)
2228 || (elf_hash_table (link_info
)->dynamic_sections_created
2229 && ELF_ST_VISIBILITY (entry
->root
.other
) != STV_INTERNAL
2230 && ELF_ST_VISIBILITY (entry
->root
.other
) != STV_HIDDEN
))
2232 /* Make a note that we should convert "call" instructions to "calls"
2233 instructions for calls to this symbol. */
2234 entry
->flags
|= MN10300_CONVERT_CALL_TO_CALLS
;
2238 /* We may be able to move some instructions from the function itself into
2239 the "call" instruction. Count how many bytes we might be able to
2240 eliminate in the function itself. */
2242 /* A movm instruction is two bytes. */
2243 if (entry
->movm_args
)
2246 /* Count the insn to allocate stack space too. */
2247 if (entry
->stack_size
> 0)
2249 if (entry
->stack_size
<= 128)
2255 /* If using "call" will result in larger code, then turn all
2256 the associated "call" instructions into "calls" instructions. */
2257 if (byte_count
< entry
->direct_calls
)
2258 entry
->flags
|= MN10300_CONVERT_CALL_TO_CALLS
;
2260 /* This routine never fails. */
2264 /* Used to count hash table entries. */
2267 elf32_mn10300_count_hash_table_entries (struct bfd_hash_entry
*gen_entry ATTRIBUTE_UNUSED
,
2270 int *count
= (int *) in_args
;
2276 /* Used to enumerate hash table entries into a linear array. */
2279 elf32_mn10300_list_hash_table_entries (struct bfd_hash_entry
*gen_entry
,
2282 struct bfd_hash_entry
***ptr
= (struct bfd_hash_entry
***) in_args
;
2289 /* Used to sort the array created by the above. */
2292 sort_by_value (const void *va
, const void *vb
)
2294 struct elf32_mn10300_link_hash_entry
*a
2295 = *(struct elf32_mn10300_link_hash_entry
**) va
;
2296 struct elf32_mn10300_link_hash_entry
*b
2297 = *(struct elf32_mn10300_link_hash_entry
**) vb
;
2299 return a
->value
- b
->value
;
2302 /* Compute the stack size and movm arguments for the function
2303 referred to by HASH at address ADDR in section with
2304 contents CONTENTS, store the information in the hash table. */
2307 compute_function_info (bfd
*abfd
,
2308 struct elf32_mn10300_link_hash_entry
*hash
,
2310 unsigned char *contents
)
2312 unsigned char byte1
, byte2
;
2313 /* We only care about a very small subset of the possible prologue
2314 sequences here. Basically we look for:
2316 movm [d2,d3,a2,a3],sp (optional)
2317 add <size>,sp (optional, and only for sizes which fit in an unsigned
2320 If we find anything else, we quit. */
2322 /* Look for movm [regs],sp. */
2323 byte1
= bfd_get_8 (abfd
, contents
+ addr
);
2324 byte2
= bfd_get_8 (abfd
, contents
+ addr
+ 1);
2328 hash
->movm_args
= byte2
;
2330 byte1
= bfd_get_8 (abfd
, contents
+ addr
);
2331 byte2
= bfd_get_8 (abfd
, contents
+ addr
+ 1);
2334 /* Now figure out how much stack space will be allocated by the movm
2335 instruction. We need this kept separate from the function's normal
2337 if (hash
->movm_args
)
2340 if (hash
->movm_args
& 0x80)
2341 hash
->movm_stack_size
+= 4;
2344 if (hash
->movm_args
& 0x40)
2345 hash
->movm_stack_size
+= 4;
2348 if (hash
->movm_args
& 0x20)
2349 hash
->movm_stack_size
+= 4;
2352 if (hash
->movm_args
& 0x10)
2353 hash
->movm_stack_size
+= 4;
2355 /* "other" space. d0, d1, a0, a1, mdr, lir, lar, 4 byte pad. */
2356 if (hash
->movm_args
& 0x08)
2357 hash
->movm_stack_size
+= 8 * 4;
2359 if (bfd_get_mach (abfd
) == bfd_mach_am33
2360 || bfd_get_mach (abfd
) == bfd_mach_am33_2
)
2362 /* "exother" space. e0, e1, mdrq, mcrh, mcrl, mcvf */
2363 if (hash
->movm_args
& 0x1)
2364 hash
->movm_stack_size
+= 6 * 4;
2366 /* exreg1 space. e4, e5, e6, e7 */
2367 if (hash
->movm_args
& 0x2)
2368 hash
->movm_stack_size
+= 4 * 4;
2370 /* exreg0 space. e2, e3 */
2371 if (hash
->movm_args
& 0x4)
2372 hash
->movm_stack_size
+= 2 * 4;
2376 /* Now look for the two stack adjustment variants. */
2377 if (byte1
== 0xf8 && byte2
== 0xfe)
2379 int temp
= bfd_get_8 (abfd
, contents
+ addr
+ 2);
2380 temp
= ((temp
& 0xff) ^ (~0x7f)) + 0x80;
2382 hash
->stack_size
= -temp
;
2384 else if (byte1
== 0xfa && byte2
== 0xfe)
2386 int temp
= bfd_get_16 (abfd
, contents
+ addr
+ 2);
2387 temp
= ((temp
& 0xffff) ^ (~0x7fff)) + 0x8000;
2391 hash
->stack_size
= temp
;
2394 /* If the total stack to be allocated by the call instruction is more
2395 than 255 bytes, then we can't remove the stack adjustment by using
2396 "call" (we might still be able to remove the "movm" instruction. */
2397 if (hash
->stack_size
+ hash
->movm_stack_size
> 255)
2398 hash
->stack_size
= 0;
2401 /* Delete some bytes from a section while relaxing. */
2404 mn10300_elf_relax_delete_bytes (bfd
*abfd
,
2409 Elf_Internal_Shdr
*symtab_hdr
;
2410 unsigned int sec_shndx
;
2412 Elf_Internal_Rela
*irel
, *irelend
;
2413 Elf_Internal_Rela
*irelalign
;
2415 Elf_Internal_Sym
*isym
, *isymend
;
2416 struct elf_link_hash_entry
**sym_hashes
;
2417 struct elf_link_hash_entry
**end_hashes
;
2418 unsigned int symcount
;
2420 sec_shndx
= _bfd_elf_section_from_bfd_section (abfd
, sec
);
2422 contents
= elf_section_data (sec
)->this_hdr
.contents
;
2427 irel
= elf_section_data (sec
)->relocs
;
2428 irelend
= irel
+ sec
->reloc_count
;
2430 if (sec
->reloc_count
> 0)
2432 /* If there is an align reloc at the end of the section ignore it.
2433 GAS creates these relocs for reasons of its own, and they just
2434 serve to keep the section artifically inflated. */
2435 if (ELF32_R_TYPE ((irelend
- 1)->r_info
) == (int) R_MN10300_ALIGN
)
2438 /* The deletion must stop at the next ALIGN reloc for an aligment
2439 power larger than, or not a multiple of, the number of bytes we
2441 for (; irel
< irelend
; irel
++)
2443 int alignment
= 1 << irel
->r_addend
;
2445 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_ALIGN
2446 && irel
->r_offset
> addr
2447 && irel
->r_offset
< toaddr
2448 && (count
< alignment
2449 || alignment
% count
!= 0))
2452 toaddr
= irel
->r_offset
;
2458 /* Actually delete the bytes. */
2459 memmove (contents
+ addr
, contents
+ addr
+ count
,
2460 (size_t) (toaddr
- addr
- count
));
2462 /* Adjust the section's size if we are shrinking it, or else
2463 pad the bytes between the end of the shrunken region and
2464 the start of the next region with NOP codes. */
2465 if (irelalign
== NULL
)
2468 /* Include symbols at the end of the section, but
2469 not at the end of a sub-region of the section. */
2476 #define NOP_OPCODE 0xcb
2478 for (i
= 0; i
< count
; i
++)
2479 bfd_put_8 (abfd
, (bfd_vma
) NOP_OPCODE
, contents
+ toaddr
- count
+ i
);
2482 /* Adjust all the relocs. */
2483 for (irel
= elf_section_data (sec
)->relocs
; irel
< irelend
; irel
++)
2485 /* Get the new reloc address. */
2486 if ((irel
->r_offset
> addr
2487 && irel
->r_offset
< toaddr
)
2488 || (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_ALIGN
2489 && irel
->r_offset
== toaddr
))
2490 irel
->r_offset
-= count
;
2493 /* Adjust the local symbols in the section, reducing their value
2494 by the number of bytes deleted. Note - symbols within the deleted
2495 region are moved to the address of the start of the region, which
2496 actually means that they will address the byte beyond the end of
2497 the region once the deletion has been completed. */
2498 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
2499 isym
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
2500 for (isymend
= isym
+ symtab_hdr
->sh_info
; isym
< isymend
; isym
++)
2502 if (isym
->st_shndx
== sec_shndx
2503 && isym
->st_value
> addr
2504 && isym
->st_value
< toaddr
)
2506 if (isym
->st_value
< addr
+ count
)
2507 isym
->st_value
= addr
;
2509 isym
->st_value
-= count
;
2511 /* Adjust the function symbol's size as well. */
2512 else if (isym
->st_shndx
== sec_shndx
2513 && ELF_ST_TYPE (isym
->st_info
) == STT_FUNC
2514 && isym
->st_value
+ isym
->st_size
> addr
2515 && isym
->st_value
+ isym
->st_size
< toaddr
)
2516 isym
->st_size
-= count
;
2519 /* Now adjust the global symbols defined in this section. */
2520 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2521 - symtab_hdr
->sh_info
);
2522 sym_hashes
= elf_sym_hashes (abfd
);
2523 end_hashes
= sym_hashes
+ symcount
;
2524 for (; sym_hashes
< end_hashes
; sym_hashes
++)
2526 struct elf_link_hash_entry
*sym_hash
= *sym_hashes
;
2528 if ((sym_hash
->root
.type
== bfd_link_hash_defined
2529 || sym_hash
->root
.type
== bfd_link_hash_defweak
)
2530 && sym_hash
->root
.u
.def
.section
== sec
2531 && sym_hash
->root
.u
.def
.value
> addr
2532 && sym_hash
->root
.u
.def
.value
< toaddr
)
2534 if (sym_hash
->root
.u
.def
.value
< addr
+ count
)
2535 sym_hash
->root
.u
.def
.value
= addr
;
2537 sym_hash
->root
.u
.def
.value
-= count
;
2539 /* Adjust the function symbol's size as well. */
2540 else if (sym_hash
->root
.type
== bfd_link_hash_defined
2541 && sym_hash
->root
.u
.def
.section
== sec
2542 && sym_hash
->type
== STT_FUNC
2543 && sym_hash
->root
.u
.def
.value
+ sym_hash
->size
> addr
2544 && sym_hash
->root
.u
.def
.value
+ sym_hash
->size
< toaddr
)
2545 sym_hash
->size
-= count
;
2548 /* See if we can move the ALIGN reloc forward.
2549 We have adjusted r_offset for it already. */
2550 if (irelalign
!= NULL
)
2552 bfd_vma alignto
, alignaddr
;
2554 if ((int) irelalign
->r_addend
> 0)
2556 /* This is the old address. */
2557 alignto
= BFD_ALIGN (toaddr
, 1 << irelalign
->r_addend
);
2558 /* This is where the align points to now. */
2559 alignaddr
= BFD_ALIGN (irelalign
->r_offset
,
2560 1 << irelalign
->r_addend
);
2561 if (alignaddr
< alignto
)
2562 /* Tail recursion. */
2563 return mn10300_elf_relax_delete_bytes (abfd
, sec
, alignaddr
,
2564 (int) (alignto
- alignaddr
));
2571 /* Return TRUE if a symbol exists at the given address, else return
2575 mn10300_elf_symbol_address_p (bfd
*abfd
,
2577 Elf_Internal_Sym
*isym
,
2580 Elf_Internal_Shdr
*symtab_hdr
;
2581 unsigned int sec_shndx
;
2582 Elf_Internal_Sym
*isymend
;
2583 struct elf_link_hash_entry
**sym_hashes
;
2584 struct elf_link_hash_entry
**end_hashes
;
2585 unsigned int symcount
;
2587 sec_shndx
= _bfd_elf_section_from_bfd_section (abfd
, sec
);
2589 /* Examine all the symbols. */
2590 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
2591 for (isymend
= isym
+ symtab_hdr
->sh_info
; isym
< isymend
; isym
++)
2592 if (isym
->st_shndx
== sec_shndx
2593 && isym
->st_value
== addr
)
2596 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2597 - symtab_hdr
->sh_info
);
2598 sym_hashes
= elf_sym_hashes (abfd
);
2599 end_hashes
= sym_hashes
+ symcount
;
2600 for (; sym_hashes
< end_hashes
; sym_hashes
++)
2602 struct elf_link_hash_entry
*sym_hash
= *sym_hashes
;
2604 if ((sym_hash
->root
.type
== bfd_link_hash_defined
2605 || sym_hash
->root
.type
== bfd_link_hash_defweak
)
2606 && sym_hash
->root
.u
.def
.section
== sec
2607 && sym_hash
->root
.u
.def
.value
== addr
)
2614 /* This function handles relaxing for the mn10300.
2616 There are quite a few relaxing opportunities available on the mn10300:
2618 * calls:32 -> calls:16 2 bytes
2619 * call:32 -> call:16 2 bytes
2621 * call:32 -> calls:32 1 byte
2622 * call:16 -> calls:16 1 byte
2623 * These are done anytime using "calls" would result
2624 in smaller code, or when necessary to preserve the
2625 meaning of the program.
2629 * In some circumstances we can move instructions
2630 from a function prologue into a "call" instruction.
2631 This is only done if the resulting code is no larger
2632 than the original code.
2634 * jmp:32 -> jmp:16 2 bytes
2635 * jmp:16 -> bra:8 1 byte
2637 * If the previous instruction is a conditional branch
2638 around the jump/bra, we may be able to reverse its condition
2639 and change its target to the jump's target. The jump/bra
2640 can then be deleted. 2 bytes
2642 * mov abs32 -> mov abs16 1 or 2 bytes
2644 * Most instructions which accept imm32 can relax to imm16 1 or 2 bytes
2645 - Most instructions which accept imm16 can relax to imm8 1 or 2 bytes
2647 * Most instructions which accept d32 can relax to d16 1 or 2 bytes
2648 - Most instructions which accept d16 can relax to d8 1 or 2 bytes
2650 We don't handle imm16->imm8 or d16->d8 as they're very rare
2651 and somewhat more difficult to support. */
2654 mn10300_elf_relax_section (bfd
*abfd
,
2656 struct bfd_link_info
*link_info
,
2659 Elf_Internal_Shdr
*symtab_hdr
;
2660 Elf_Internal_Rela
*internal_relocs
= NULL
;
2661 Elf_Internal_Rela
*irel
, *irelend
;
2662 bfd_byte
*contents
= NULL
;
2663 Elf_Internal_Sym
*isymbuf
= NULL
;
2664 struct elf32_mn10300_link_hash_table
*hash_table
;
2665 asection
*section
= sec
;
2666 bfd_vma align_gap_adjustment
;
2668 if (bfd_link_relocatable (link_info
))
2669 (*link_info
->callbacks
->einfo
)
2670 (_("%P%F: --relax and -r may not be used together\n"));
2672 /* Assume nothing changes. */
2675 /* We need a pointer to the mn10300 specific hash table. */
2676 hash_table
= elf32_mn10300_hash_table (link_info
);
2677 if (hash_table
== NULL
)
2680 /* Initialize fields in each hash table entry the first time through. */
2681 if ((hash_table
->flags
& MN10300_HASH_ENTRIES_INITIALIZED
) == 0)
2685 /* Iterate over all the input bfds. */
2686 for (input_bfd
= link_info
->input_bfds
;
2688 input_bfd
= input_bfd
->link
.next
)
2690 /* We're going to need all the symbols for each bfd. */
2691 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
2692 if (symtab_hdr
->sh_info
!= 0)
2694 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
2695 if (isymbuf
== NULL
)
2696 isymbuf
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
2697 symtab_hdr
->sh_info
, 0,
2699 if (isymbuf
== NULL
)
2703 /* Iterate over each section in this bfd. */
2704 for (section
= input_bfd
->sections
;
2706 section
= section
->next
)
2708 struct elf32_mn10300_link_hash_entry
*hash
;
2709 asection
*sym_sec
= NULL
;
2710 const char *sym_name
;
2713 /* If there's nothing to do in this section, skip it. */
2714 if (! ((section
->flags
& SEC_RELOC
) != 0
2715 && section
->reloc_count
!= 0))
2717 if ((section
->flags
& SEC_ALLOC
) == 0)
2720 /* Get cached copy of section contents if it exists. */
2721 if (elf_section_data (section
)->this_hdr
.contents
!= NULL
)
2722 contents
= elf_section_data (section
)->this_hdr
.contents
;
2723 else if (section
->size
!= 0)
2725 /* Go get them off disk. */
2726 if (!bfd_malloc_and_get_section (input_bfd
, section
,
2733 /* If there aren't any relocs, then there's nothing to do. */
2734 if ((section
->flags
& SEC_RELOC
) != 0
2735 && section
->reloc_count
!= 0)
2737 /* Get a copy of the native relocations. */
2738 internal_relocs
= _bfd_elf_link_read_relocs (input_bfd
, section
,
2740 link_info
->keep_memory
);
2741 if (internal_relocs
== NULL
)
2744 /* Now examine each relocation. */
2745 irel
= internal_relocs
;
2746 irelend
= irel
+ section
->reloc_count
;
2747 for (; irel
< irelend
; irel
++)
2750 unsigned long r_index
;
2753 r_type
= ELF32_R_TYPE (irel
->r_info
);
2754 r_index
= ELF32_R_SYM (irel
->r_info
);
2756 if (r_type
< 0 || r_type
>= (int) R_MN10300_MAX
)
2759 /* We need the name and hash table entry of the target
2764 if (r_index
< symtab_hdr
->sh_info
)
2766 /* A local symbol. */
2767 Elf_Internal_Sym
*isym
;
2768 struct elf_link_hash_table
*elftab
;
2771 isym
= isymbuf
+ r_index
;
2772 if (isym
->st_shndx
== SHN_UNDEF
)
2773 sym_sec
= bfd_und_section_ptr
;
2774 else if (isym
->st_shndx
== SHN_ABS
)
2775 sym_sec
= bfd_abs_section_ptr
;
2776 else if (isym
->st_shndx
== SHN_COMMON
)
2777 sym_sec
= bfd_com_section_ptr
;
2780 = bfd_section_from_elf_index (input_bfd
,
2784 = bfd_elf_string_from_elf_section (input_bfd
,
2789 /* If it isn't a function, then we don't care
2791 if (ELF_ST_TYPE (isym
->st_info
) != STT_FUNC
)
2794 /* Tack on an ID so we can uniquely identify this
2795 local symbol in the global hash table. */
2796 amt
= strlen (sym_name
) + 10;
2797 new_name
= bfd_malloc (amt
);
2798 if (new_name
== NULL
)
2801 sprintf (new_name
, "%s_%08x", sym_name
, sym_sec
->id
);
2802 sym_name
= new_name
;
2804 elftab
= &hash_table
->static_hash_table
->root
;
2805 hash
= ((struct elf32_mn10300_link_hash_entry
*)
2806 elf_link_hash_lookup (elftab
, sym_name
,
2807 TRUE
, TRUE
, FALSE
));
2812 r_index
-= symtab_hdr
->sh_info
;
2813 hash
= (struct elf32_mn10300_link_hash_entry
*)
2814 elf_sym_hashes (input_bfd
)[r_index
];
2817 sym_name
= hash
->root
.root
.root
.string
;
2818 if ((section
->flags
& SEC_CODE
) != 0)
2820 /* If this is not a "call" instruction, then we
2821 should convert "call" instructions to "calls"
2823 code
= bfd_get_8 (input_bfd
,
2824 contents
+ irel
->r_offset
- 1);
2825 if (code
!= 0xdd && code
!= 0xcd)
2826 hash
->flags
|= MN10300_CONVERT_CALL_TO_CALLS
;
2829 /* If this is a jump/call, then bump the
2830 direct_calls counter. Else force "call" to
2831 "calls" conversions. */
2832 if (r_type
== R_MN10300_PCREL32
2833 || r_type
== R_MN10300_PLT32
2834 || r_type
== R_MN10300_PLT16
2835 || r_type
== R_MN10300_PCREL16
)
2836 hash
->direct_calls
++;
2838 hash
->flags
|= MN10300_CONVERT_CALL_TO_CALLS
;
2842 /* Now look at the actual contents to get the stack size,
2843 and a list of what registers were saved in the prologue
2845 if ((section
->flags
& SEC_CODE
) != 0)
2847 Elf_Internal_Sym
*isym
, *isymend
;
2848 unsigned int sec_shndx
;
2849 struct elf_link_hash_entry
**hashes
;
2850 struct elf_link_hash_entry
**end_hashes
;
2851 unsigned int symcount
;
2853 sec_shndx
= _bfd_elf_section_from_bfd_section (input_bfd
,
2856 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2857 - symtab_hdr
->sh_info
);
2858 hashes
= elf_sym_hashes (input_bfd
);
2859 end_hashes
= hashes
+ symcount
;
2861 /* Look at each function defined in this section and
2862 update info for that function. */
2863 isymend
= isymbuf
+ symtab_hdr
->sh_info
;
2864 for (isym
= isymbuf
; isym
< isymend
; isym
++)
2866 if (isym
->st_shndx
== sec_shndx
2867 && ELF_ST_TYPE (isym
->st_info
) == STT_FUNC
)
2869 struct elf_link_hash_table
*elftab
;
2871 struct elf_link_hash_entry
**lhashes
= hashes
;
2873 /* Skip a local symbol if it aliases a
2875 for (; lhashes
< end_hashes
; lhashes
++)
2877 hash
= (struct elf32_mn10300_link_hash_entry
*) *lhashes
;
2878 if ((hash
->root
.root
.type
== bfd_link_hash_defined
2879 || hash
->root
.root
.type
== bfd_link_hash_defweak
)
2880 && hash
->root
.root
.u
.def
.section
== section
2881 && hash
->root
.type
== STT_FUNC
2882 && hash
->root
.root
.u
.def
.value
== isym
->st_value
)
2885 if (lhashes
!= end_hashes
)
2888 if (isym
->st_shndx
== SHN_UNDEF
)
2889 sym_sec
= bfd_und_section_ptr
;
2890 else if (isym
->st_shndx
== SHN_ABS
)
2891 sym_sec
= bfd_abs_section_ptr
;
2892 else if (isym
->st_shndx
== SHN_COMMON
)
2893 sym_sec
= bfd_com_section_ptr
;
2896 = bfd_section_from_elf_index (input_bfd
,
2899 sym_name
= (bfd_elf_string_from_elf_section
2900 (input_bfd
, symtab_hdr
->sh_link
,
2903 /* Tack on an ID so we can uniquely identify this
2904 local symbol in the global hash table. */
2905 amt
= strlen (sym_name
) + 10;
2906 new_name
= bfd_malloc (amt
);
2907 if (new_name
== NULL
)
2910 sprintf (new_name
, "%s_%08x", sym_name
, sym_sec
->id
);
2911 sym_name
= new_name
;
2913 elftab
= &hash_table
->static_hash_table
->root
;
2914 hash
= ((struct elf32_mn10300_link_hash_entry
*)
2915 elf_link_hash_lookup (elftab
, sym_name
,
2916 TRUE
, TRUE
, FALSE
));
2918 compute_function_info (input_bfd
, hash
,
2919 isym
->st_value
, contents
);
2920 hash
->value
= isym
->st_value
;
2924 for (; hashes
< end_hashes
; hashes
++)
2926 hash
= (struct elf32_mn10300_link_hash_entry
*) *hashes
;
2927 if ((hash
->root
.root
.type
== bfd_link_hash_defined
2928 || hash
->root
.root
.type
== bfd_link_hash_defweak
)
2929 && hash
->root
.root
.u
.def
.section
== section
2930 && hash
->root
.type
== STT_FUNC
)
2931 compute_function_info (input_bfd
, hash
,
2932 (hash
)->root
.root
.u
.def
.value
,
2937 /* Cache or free any memory we allocated for the relocs. */
2938 if (internal_relocs
!= NULL
2939 && elf_section_data (section
)->relocs
!= internal_relocs
)
2940 free (internal_relocs
);
2941 internal_relocs
= NULL
;
2943 /* Cache or free any memory we allocated for the contents. */
2944 if (contents
!= NULL
2945 && elf_section_data (section
)->this_hdr
.contents
!= contents
)
2947 if (! link_info
->keep_memory
)
2951 /* Cache the section contents for elf_link_input_bfd. */
2952 elf_section_data (section
)->this_hdr
.contents
= contents
;
2958 /* Cache or free any memory we allocated for the symbols. */
2960 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
2962 if (! link_info
->keep_memory
)
2966 /* Cache the symbols for elf_link_input_bfd. */
2967 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
2973 /* Now iterate on each symbol in the hash table and perform
2974 the final initialization steps on each. */
2975 elf32_mn10300_link_hash_traverse (hash_table
,
2976 elf32_mn10300_finish_hash_table_entry
,
2978 elf32_mn10300_link_hash_traverse (hash_table
->static_hash_table
,
2979 elf32_mn10300_finish_hash_table_entry
,
2983 /* This section of code collects all our local symbols, sorts
2984 them by value, and looks for multiple symbols referring to
2985 the same address. For those symbols, the flags are merged.
2986 At this point, the only flag that can be set is
2987 MN10300_CONVERT_CALL_TO_CALLS, so we simply OR the flags
2989 int static_count
= 0, i
;
2990 struct elf32_mn10300_link_hash_entry
**entries
;
2991 struct elf32_mn10300_link_hash_entry
**ptr
;
2993 elf32_mn10300_link_hash_traverse (hash_table
->static_hash_table
,
2994 elf32_mn10300_count_hash_table_entries
,
2997 entries
= bfd_malloc (static_count
* sizeof (* ptr
));
3000 elf32_mn10300_link_hash_traverse (hash_table
->static_hash_table
,
3001 elf32_mn10300_list_hash_table_entries
,
3004 qsort (entries
, static_count
, sizeof (entries
[0]), sort_by_value
);
3006 for (i
= 0; i
< static_count
- 1; i
++)
3007 if (entries
[i
]->value
&& entries
[i
]->value
== entries
[i
+1]->value
)
3009 int v
= entries
[i
]->flags
;
3012 for (j
= i
+ 1; j
< static_count
&& entries
[j
]->value
== entries
[i
]->value
; j
++)
3013 v
|= entries
[j
]->flags
;
3015 for (j
= i
; j
< static_count
&& entries
[j
]->value
== entries
[i
]->value
; j
++)
3016 entries
[j
]->flags
= v
;
3022 /* All entries in the hash table are fully initialized. */
3023 hash_table
->flags
|= MN10300_HASH_ENTRIES_INITIALIZED
;
3025 /* Now that everything has been initialized, go through each
3026 code section and delete any prologue insns which will be
3027 redundant because their operations will be performed by
3028 a "call" instruction. */
3029 for (input_bfd
= link_info
->input_bfds
;
3031 input_bfd
= input_bfd
->link
.next
)
3033 /* We're going to need all the local symbols for each bfd. */
3034 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
3035 if (symtab_hdr
->sh_info
!= 0)
3037 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
3038 if (isymbuf
== NULL
)
3039 isymbuf
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
3040 symtab_hdr
->sh_info
, 0,
3042 if (isymbuf
== NULL
)
3046 /* Walk over each section in this bfd. */
3047 for (section
= input_bfd
->sections
;
3049 section
= section
->next
)
3051 unsigned int sec_shndx
;
3052 Elf_Internal_Sym
*isym
, *isymend
;
3053 struct elf_link_hash_entry
**hashes
;
3054 struct elf_link_hash_entry
**end_hashes
;
3055 unsigned int symcount
;
3057 /* Skip non-code sections and empty sections. */
3058 if ((section
->flags
& SEC_CODE
) == 0 || section
->size
== 0)
3061 if (section
->reloc_count
!= 0)
3063 /* Get a copy of the native relocations. */
3064 internal_relocs
= _bfd_elf_link_read_relocs (input_bfd
, section
,
3066 link_info
->keep_memory
);
3067 if (internal_relocs
== NULL
)
3071 /* Get cached copy of section contents if it exists. */
3072 if (elf_section_data (section
)->this_hdr
.contents
!= NULL
)
3073 contents
= elf_section_data (section
)->this_hdr
.contents
;
3076 /* Go get them off disk. */
3077 if (!bfd_malloc_and_get_section (input_bfd
, section
,
3082 sec_shndx
= _bfd_elf_section_from_bfd_section (input_bfd
,
3085 /* Now look for any function in this section which needs
3086 insns deleted from its prologue. */
3087 isymend
= isymbuf
+ symtab_hdr
->sh_info
;
3088 for (isym
= isymbuf
; isym
< isymend
; isym
++)
3090 struct elf32_mn10300_link_hash_entry
*sym_hash
;
3091 asection
*sym_sec
= NULL
;
3092 const char *sym_name
;
3094 struct elf_link_hash_table
*elftab
;
3097 if (isym
->st_shndx
!= sec_shndx
)
3100 if (isym
->st_shndx
== SHN_UNDEF
)
3101 sym_sec
= bfd_und_section_ptr
;
3102 else if (isym
->st_shndx
== SHN_ABS
)
3103 sym_sec
= bfd_abs_section_ptr
;
3104 else if (isym
->st_shndx
== SHN_COMMON
)
3105 sym_sec
= bfd_com_section_ptr
;
3108 = bfd_section_from_elf_index (input_bfd
, isym
->st_shndx
);
3111 = bfd_elf_string_from_elf_section (input_bfd
,
3112 symtab_hdr
->sh_link
,
3115 /* Tack on an ID so we can uniquely identify this
3116 local symbol in the global hash table. */
3117 amt
= strlen (sym_name
) + 10;
3118 new_name
= bfd_malloc (amt
);
3119 if (new_name
== NULL
)
3121 sprintf (new_name
, "%s_%08x", sym_name
, sym_sec
->id
);
3122 sym_name
= new_name
;
3124 elftab
= & hash_table
->static_hash_table
->root
;
3125 sym_hash
= (struct elf32_mn10300_link_hash_entry
*)
3126 elf_link_hash_lookup (elftab
, sym_name
,
3127 FALSE
, FALSE
, FALSE
);
3130 if (sym_hash
== NULL
)
3133 if (! (sym_hash
->flags
& MN10300_CONVERT_CALL_TO_CALLS
)
3134 && ! (sym_hash
->flags
& MN10300_DELETED_PROLOGUE_BYTES
))
3138 /* Note that we've changed things. */
3139 elf_section_data (section
)->relocs
= internal_relocs
;
3140 elf_section_data (section
)->this_hdr
.contents
= contents
;
3141 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3143 /* Count how many bytes we're going to delete. */
3144 if (sym_hash
->movm_args
)
3147 if (sym_hash
->stack_size
> 0)
3149 if (sym_hash
->stack_size
<= 128)
3155 /* Note that we've deleted prologue bytes for this
3157 sym_hash
->flags
|= MN10300_DELETED_PROLOGUE_BYTES
;
3159 /* Actually delete the bytes. */
3160 if (!mn10300_elf_relax_delete_bytes (input_bfd
,
3166 /* Something changed. Not strictly necessary, but
3167 may lead to more relaxing opportunities. */
3172 /* Look for any global functions in this section which
3173 need insns deleted from their prologues. */
3174 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
3175 - symtab_hdr
->sh_info
);
3176 hashes
= elf_sym_hashes (input_bfd
);
3177 end_hashes
= hashes
+ symcount
;
3178 for (; hashes
< end_hashes
; hashes
++)
3180 struct elf32_mn10300_link_hash_entry
*sym_hash
;
3182 sym_hash
= (struct elf32_mn10300_link_hash_entry
*) *hashes
;
3183 if ((sym_hash
->root
.root
.type
== bfd_link_hash_defined
3184 || sym_hash
->root
.root
.type
== bfd_link_hash_defweak
)
3185 && sym_hash
->root
.root
.u
.def
.section
== section
3186 && ! (sym_hash
->flags
& MN10300_CONVERT_CALL_TO_CALLS
)
3187 && ! (sym_hash
->flags
& MN10300_DELETED_PROLOGUE_BYTES
))
3191 struct elf_link_hash_entry
**hh
;
3193 /* Note that we've changed things. */
3194 elf_section_data (section
)->relocs
= internal_relocs
;
3195 elf_section_data (section
)->this_hdr
.contents
= contents
;
3196 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3198 /* Count how many bytes we're going to delete. */
3199 if (sym_hash
->movm_args
)
3202 if (sym_hash
->stack_size
> 0)
3204 if (sym_hash
->stack_size
<= 128)
3210 /* Note that we've deleted prologue bytes for this
3212 sym_hash
->flags
|= MN10300_DELETED_PROLOGUE_BYTES
;
3214 /* Actually delete the bytes. */
3215 symval
= sym_hash
->root
.root
.u
.def
.value
;
3216 if (!mn10300_elf_relax_delete_bytes (input_bfd
,
3222 /* There may be other C++ functions symbols with the same
3223 address. If so then mark these as having had their
3224 prologue bytes deleted as well. */
3225 for (hh
= elf_sym_hashes (input_bfd
); hh
< end_hashes
; hh
++)
3227 struct elf32_mn10300_link_hash_entry
*h
;
3229 h
= (struct elf32_mn10300_link_hash_entry
*) * hh
;
3232 && (h
->root
.root
.type
== bfd_link_hash_defined
3233 || h
->root
.root
.type
== bfd_link_hash_defweak
)
3234 && h
->root
.root
.u
.def
.section
== section
3235 && ! (h
->flags
& MN10300_CONVERT_CALL_TO_CALLS
)
3236 && h
->root
.root
.u
.def
.value
== symval
3237 && h
->root
.type
== STT_FUNC
)
3238 h
->flags
|= MN10300_DELETED_PROLOGUE_BYTES
;
3241 /* Something changed. Not strictly necessary, but
3242 may lead to more relaxing opportunities. */
3247 /* Cache or free any memory we allocated for the relocs. */
3248 if (internal_relocs
!= NULL
3249 && elf_section_data (section
)->relocs
!= internal_relocs
)
3250 free (internal_relocs
);
3251 internal_relocs
= NULL
;
3253 /* Cache or free any memory we allocated for the contents. */
3254 if (contents
!= NULL
3255 && elf_section_data (section
)->this_hdr
.contents
!= contents
)
3257 if (! link_info
->keep_memory
)
3260 /* Cache the section contents for elf_link_input_bfd. */
3261 elf_section_data (section
)->this_hdr
.contents
= contents
;
3266 /* Cache or free any memory we allocated for the symbols. */
3268 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
3270 if (! link_info
->keep_memory
)
3273 /* Cache the symbols for elf_link_input_bfd. */
3274 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3280 /* (Re)initialize for the basic instruction shortening/relaxing pass. */
3282 internal_relocs
= NULL
;
3284 /* For error_return. */
3287 /* We don't have to do anything for a relocatable link, if
3288 this section does not have relocs, or if this is not a
3290 if (bfd_link_relocatable (link_info
)
3291 || (sec
->flags
& SEC_RELOC
) == 0
3292 || sec
->reloc_count
== 0
3293 || (sec
->flags
& SEC_CODE
) == 0)
3296 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
3298 /* Get a copy of the native relocations. */
3299 internal_relocs
= _bfd_elf_link_read_relocs (abfd
, sec
, NULL
, NULL
,
3300 link_info
->keep_memory
);
3301 if (internal_relocs
== NULL
)
3304 /* Scan for worst case alignment gap changes. Note that this logic
3305 is not ideal; what we should do is run this scan for every
3306 opcode/address range and adjust accordingly, but that's
3307 expensive. Worst case is that for an alignment of N bytes, we
3308 move by 2*N-N-1 bytes, assuming we have aligns of 1, 2, 4, 8, etc
3309 all before it. Plus, this still doesn't cover cross-section
3310 jumps with section alignment. */
3311 irelend
= internal_relocs
+ sec
->reloc_count
;
3312 align_gap_adjustment
= 0;
3313 for (irel
= internal_relocs
; irel
< irelend
; irel
++)
3315 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_ALIGN
)
3317 bfd_vma adj
= 1 << irel
->r_addend
;
3318 bfd_vma aend
= irel
->r_offset
;
3320 aend
= BFD_ALIGN (aend
, 1 << irel
->r_addend
);
3321 adj
= 2 * adj
- adj
- 1;
3323 /* Record the biggest adjustmnet. Skip any alignment at the
3324 end of our section. */
3325 if (align_gap_adjustment
< adj
3326 && aend
< sec
->output_section
->vma
+ sec
->output_offset
+ sec
->size
)
3327 align_gap_adjustment
= adj
;
3331 /* Walk through them looking for relaxing opportunities. */
3332 irelend
= internal_relocs
+ sec
->reloc_count
;
3333 for (irel
= internal_relocs
; irel
< irelend
; irel
++)
3336 bfd_signed_vma jump_offset
;
3337 asection
*sym_sec
= NULL
;
3338 struct elf32_mn10300_link_hash_entry
*h
= NULL
;
3340 /* If this isn't something that can be relaxed, then ignore
3342 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_NONE
3343 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_8
3344 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_MAX
)
3347 /* Get the section contents if we haven't done so already. */
3348 if (contents
== NULL
)
3350 /* Get cached copy if it exists. */
3351 if (elf_section_data (sec
)->this_hdr
.contents
!= NULL
)
3352 contents
= elf_section_data (sec
)->this_hdr
.contents
;
3355 /* Go get them off disk. */
3356 if (!bfd_malloc_and_get_section (abfd
, sec
, &contents
))
3361 /* Read this BFD's symbols if we haven't done so already. */
3362 if (isymbuf
== NULL
&& symtab_hdr
->sh_info
!= 0)
3364 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
3365 if (isymbuf
== NULL
)
3366 isymbuf
= bfd_elf_get_elf_syms (abfd
, symtab_hdr
,
3367 symtab_hdr
->sh_info
, 0,
3369 if (isymbuf
== NULL
)
3373 /* Get the value of the symbol referred to by the reloc. */
3374 if (ELF32_R_SYM (irel
->r_info
) < symtab_hdr
->sh_info
)
3376 Elf_Internal_Sym
*isym
;
3377 const char *sym_name
;
3380 /* A local symbol. */
3381 isym
= isymbuf
+ ELF32_R_SYM (irel
->r_info
);
3382 if (isym
->st_shndx
== SHN_UNDEF
)
3383 sym_sec
= bfd_und_section_ptr
;
3384 else if (isym
->st_shndx
== SHN_ABS
)
3385 sym_sec
= bfd_abs_section_ptr
;
3386 else if (isym
->st_shndx
== SHN_COMMON
)
3387 sym_sec
= bfd_com_section_ptr
;
3389 sym_sec
= bfd_section_from_elf_index (abfd
, isym
->st_shndx
);
3391 sym_name
= bfd_elf_string_from_elf_section (abfd
,
3392 symtab_hdr
->sh_link
,
3395 if ((sym_sec
->flags
& SEC_MERGE
)
3396 && sym_sec
->sec_info_type
== SEC_INFO_TYPE_MERGE
)
3398 symval
= isym
->st_value
;
3400 /* GAS may reduce relocations against symbols in SEC_MERGE
3401 sections to a relocation against the section symbol when
3402 the original addend was zero. When the reloc is against
3403 a section symbol we should include the addend in the
3404 offset passed to _bfd_merged_section_offset, since the
3405 location of interest is the original symbol. On the
3406 other hand, an access to "sym+addend" where "sym" is not
3407 a section symbol should not include the addend; Such an
3408 access is presumed to be an offset from "sym"; The
3409 location of interest is just "sym". */
3410 if (ELF_ST_TYPE (isym
->st_info
) == STT_SECTION
)
3411 symval
+= irel
->r_addend
;
3413 symval
= _bfd_merged_section_offset (abfd
, & sym_sec
,
3414 elf_section_data (sym_sec
)->sec_info
,
3417 if (ELF_ST_TYPE (isym
->st_info
) != STT_SECTION
)
3418 symval
+= irel
->r_addend
;
3420 symval
+= sym_sec
->output_section
->vma
3421 + sym_sec
->output_offset
- irel
->r_addend
;
3424 symval
= (isym
->st_value
3425 + sym_sec
->output_section
->vma
3426 + sym_sec
->output_offset
);
3428 /* Tack on an ID so we can uniquely identify this
3429 local symbol in the global hash table. */
3430 new_name
= bfd_malloc ((bfd_size_type
) strlen (sym_name
) + 10);
3431 if (new_name
== NULL
)
3433 sprintf (new_name
, "%s_%08x", sym_name
, sym_sec
->id
);
3434 sym_name
= new_name
;
3436 h
= (struct elf32_mn10300_link_hash_entry
*)
3437 elf_link_hash_lookup (&hash_table
->static_hash_table
->root
,
3438 sym_name
, FALSE
, FALSE
, FALSE
);
3445 /* An external symbol. */
3446 indx
= ELF32_R_SYM (irel
->r_info
) - symtab_hdr
->sh_info
;
3447 h
= (struct elf32_mn10300_link_hash_entry
*)
3448 (elf_sym_hashes (abfd
)[indx
]);
3449 BFD_ASSERT (h
!= NULL
);
3450 if (h
->root
.root
.type
!= bfd_link_hash_defined
3451 && h
->root
.root
.type
!= bfd_link_hash_defweak
)
3452 /* This appears to be a reference to an undefined
3453 symbol. Just ignore it--it will be caught by the
3454 regular reloc processing. */
3457 /* Check for a reference to a discarded symbol and ignore it. */
3458 if (h
->root
.root
.u
.def
.section
->output_section
== NULL
)
3461 sym_sec
= h
->root
.root
.u
.def
.section
->output_section
;
3463 symval
= (h
->root
.root
.u
.def
.value
3464 + h
->root
.root
.u
.def
.section
->output_section
->vma
3465 + h
->root
.root
.u
.def
.section
->output_offset
);
3468 /* For simplicity of coding, we are going to modify the section
3469 contents, the section relocs, and the BFD symbol table. We
3470 must tell the rest of the code not to free up this
3471 information. It would be possible to instead create a table
3472 of changes which have to be made, as is done in coff-mips.c;
3473 that would be more work, but would require less memory when
3474 the linker is run. */
3476 /* Try to turn a 32bit pc-relative branch/call into a 16bit pc-relative
3477 branch/call, also deal with "call" -> "calls" conversions and
3478 insertion of prologue data into "call" instructions. */
3479 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PCREL32
3480 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PLT32
)
3482 bfd_vma value
= symval
;
3484 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PLT32
3486 && ELF_ST_VISIBILITY (h
->root
.other
) != STV_INTERNAL
3487 && ELF_ST_VISIBILITY (h
->root
.other
) != STV_HIDDEN
3488 && h
->root
.plt
.offset
!= (bfd_vma
) -1)
3492 splt
= hash_table
->root
.splt
;
3493 value
= ((splt
->output_section
->vma
3494 + splt
->output_offset
3495 + h
->root
.plt
.offset
)
3496 - (sec
->output_section
->vma
3497 + sec
->output_offset
3501 /* If we've got a "call" instruction that needs to be turned
3502 into a "calls" instruction, do so now. It saves a byte. */
3503 if (h
&& (h
->flags
& MN10300_CONVERT_CALL_TO_CALLS
))
3507 /* Get the opcode. */
3508 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3510 /* Make sure we're working with a "call" instruction! */
3513 /* Note that we've changed the relocs, section contents,
3515 elf_section_data (sec
)->relocs
= internal_relocs
;
3516 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3517 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3519 /* Fix the opcode. */
3520 bfd_put_8 (abfd
, 0xfc, contents
+ irel
->r_offset
- 1);
3521 bfd_put_8 (abfd
, 0xff, contents
+ irel
->r_offset
);
3523 /* Fix irel->r_offset and irel->r_addend. */
3524 irel
->r_offset
+= 1;
3525 irel
->r_addend
+= 1;
3527 /* Delete one byte of data. */
3528 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3529 irel
->r_offset
+ 3, 1))
3532 /* That will change things, so, we should relax again.
3533 Note that this is not required, and it may be slow. */
3539 /* We've got a "call" instruction which needs some data
3540 from target function filled in. */
3543 /* Get the opcode. */
3544 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3546 /* Insert data from the target function into the "call"
3547 instruction if needed. */
3550 bfd_put_8 (abfd
, h
->movm_args
, contents
+ irel
->r_offset
+ 4);
3551 bfd_put_8 (abfd
, h
->stack_size
+ h
->movm_stack_size
,
3552 contents
+ irel
->r_offset
+ 5);
3556 /* Deal with pc-relative gunk. */
3557 value
-= (sec
->output_section
->vma
+ sec
->output_offset
);
3558 value
-= irel
->r_offset
;
3559 value
+= irel
->r_addend
;
3561 /* See if the value will fit in 16 bits, note the high value is
3562 0x7fff + 2 as the target will be two bytes closer if we are
3563 able to relax, if it's in the same section. */
3564 if (sec
->output_section
== sym_sec
->output_section
)
3565 jump_offset
= 0x8001;
3567 jump_offset
= 0x7fff;
3569 /* Account for jumps across alignment boundaries using
3570 align_gap_adjustment. */
3571 if ((bfd_signed_vma
) value
< jump_offset
- (bfd_signed_vma
) align_gap_adjustment
3572 && ((bfd_signed_vma
) value
> -0x8000 + (bfd_signed_vma
) align_gap_adjustment
))
3576 /* Get the opcode. */
3577 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3579 if (code
!= 0xdc && code
!= 0xdd && code
!= 0xff)
3582 /* Note that we've changed the relocs, section contents, etc. */
3583 elf_section_data (sec
)->relocs
= internal_relocs
;
3584 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3585 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3587 /* Fix the opcode. */
3589 bfd_put_8 (abfd
, 0xcc, contents
+ irel
->r_offset
- 1);
3590 else if (code
== 0xdd)
3591 bfd_put_8 (abfd
, 0xcd, contents
+ irel
->r_offset
- 1);
3592 else if (code
== 0xff)
3593 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
3595 /* Fix the relocation's type. */
3596 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
3597 (ELF32_R_TYPE (irel
->r_info
)
3598 == (int) R_MN10300_PLT32
)
3602 /* Delete two bytes of data. */
3603 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3604 irel
->r_offset
+ 1, 2))
3607 /* That will change things, so, we should relax again.
3608 Note that this is not required, and it may be slow. */
3613 /* Try to turn a 16bit pc-relative branch into a 8bit pc-relative
3615 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PCREL16
)
3617 bfd_vma value
= symval
;
3619 /* If we've got a "call" instruction that needs to be turned
3620 into a "calls" instruction, do so now. It saves a byte. */
3621 if (h
&& (h
->flags
& MN10300_CONVERT_CALL_TO_CALLS
))
3625 /* Get the opcode. */
3626 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3628 /* Make sure we're working with a "call" instruction! */
3631 /* Note that we've changed the relocs, section contents,
3633 elf_section_data (sec
)->relocs
= internal_relocs
;
3634 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3635 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3637 /* Fix the opcode. */
3638 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 1);
3639 bfd_put_8 (abfd
, 0xff, contents
+ irel
->r_offset
);
3641 /* Fix irel->r_offset and irel->r_addend. */
3642 irel
->r_offset
+= 1;
3643 irel
->r_addend
+= 1;
3645 /* Delete one byte of data. */
3646 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3647 irel
->r_offset
+ 1, 1))
3650 /* That will change things, so, we should relax again.
3651 Note that this is not required, and it may be slow. */
3659 /* Get the opcode. */
3660 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3662 /* Insert data from the target function into the "call"
3663 instruction if needed. */
3666 bfd_put_8 (abfd
, h
->movm_args
, contents
+ irel
->r_offset
+ 2);
3667 bfd_put_8 (abfd
, h
->stack_size
+ h
->movm_stack_size
,
3668 contents
+ irel
->r_offset
+ 3);
3672 /* Deal with pc-relative gunk. */
3673 value
-= (sec
->output_section
->vma
+ sec
->output_offset
);
3674 value
-= irel
->r_offset
;
3675 value
+= irel
->r_addend
;
3677 /* See if the value will fit in 8 bits, note the high value is
3678 0x7f + 1 as the target will be one bytes closer if we are
3680 if ((long) value
< 0x80 && (long) value
> -0x80)
3684 /* Get the opcode. */
3685 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3690 /* Note that we've changed the relocs, section contents, etc. */
3691 elf_section_data (sec
)->relocs
= internal_relocs
;
3692 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3693 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3695 /* Fix the opcode. */
3696 bfd_put_8 (abfd
, 0xca, contents
+ irel
->r_offset
- 1);
3698 /* Fix the relocation's type. */
3699 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
3702 /* Delete one byte of data. */
3703 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3704 irel
->r_offset
+ 1, 1))
3707 /* That will change things, so, we should relax again.
3708 Note that this is not required, and it may be slow. */
3713 /* Try to eliminate an unconditional 8 bit pc-relative branch
3714 which immediately follows a conditional 8 bit pc-relative
3715 branch around the unconditional branch.
3722 This happens when the bCC can't reach lab2 at assembly time,
3723 but due to other relaxations it can reach at link time. */
3724 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_PCREL8
)
3726 Elf_Internal_Rela
*nrel
;
3727 bfd_vma value
= symval
;
3730 /* Deal with pc-relative gunk. */
3731 value
-= (sec
->output_section
->vma
+ sec
->output_offset
);
3732 value
-= irel
->r_offset
;
3733 value
+= irel
->r_addend
;
3735 /* Do nothing if this reloc is the last byte in the section. */
3736 if (irel
->r_offset
== sec
->size
)
3739 /* See if the next instruction is an unconditional pc-relative
3740 branch, more often than not this test will fail, so we
3741 test it first to speed things up. */
3742 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
+ 1);
3746 /* Also make sure the next relocation applies to the next
3747 instruction and that it's a pc-relative 8 bit branch. */
3750 || irel
->r_offset
+ 2 != nrel
->r_offset
3751 || ELF32_R_TYPE (nrel
->r_info
) != (int) R_MN10300_PCREL8
)
3754 /* Make sure our destination immediately follows the
3755 unconditional branch. */
3756 if (symval
!= (sec
->output_section
->vma
+ sec
->output_offset
3757 + irel
->r_offset
+ 3))
3760 /* Now make sure we are a conditional branch. This may not
3761 be necessary, but why take the chance.
3763 Note these checks assume that R_MN10300_PCREL8 relocs
3764 only occur on bCC and bCCx insns. If they occured
3765 elsewhere, we'd need to know the start of this insn
3766 for this check to be accurate. */
3767 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
3768 if (code
!= 0xc0 && code
!= 0xc1 && code
!= 0xc2
3769 && code
!= 0xc3 && code
!= 0xc4 && code
!= 0xc5
3770 && code
!= 0xc6 && code
!= 0xc7 && code
!= 0xc8
3771 && code
!= 0xc9 && code
!= 0xe8 && code
!= 0xe9
3772 && code
!= 0xea && code
!= 0xeb)
3775 /* We also have to be sure there is no symbol/label
3776 at the unconditional branch. */
3777 if (mn10300_elf_symbol_address_p (abfd
, sec
, isymbuf
,
3778 irel
->r_offset
+ 1))
3781 /* Note that we've changed the relocs, section contents, etc. */
3782 elf_section_data (sec
)->relocs
= internal_relocs
;
3783 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3784 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3786 /* Reverse the condition of the first branch. */
3832 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 1);
3834 /* Set the reloc type and symbol for the first branch
3835 from the second branch. */
3836 irel
->r_info
= nrel
->r_info
;
3838 /* Make the reloc for the second branch a null reloc. */
3839 nrel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (nrel
->r_info
),
3842 /* Delete two bytes of data. */
3843 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3844 irel
->r_offset
+ 1, 2))
3847 /* That will change things, so, we should relax again.
3848 Note that this is not required, and it may be slow. */
3852 /* Try to turn a 24 immediate, displacement or absolute address
3853 into a 8 immediate, displacement or absolute address. */
3854 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_24
)
3856 bfd_vma value
= symval
;
3857 value
+= irel
->r_addend
;
3859 /* See if the value will fit in 8 bits. */
3860 if ((long) value
< 0x7f && (long) value
> -0x80)
3864 /* AM33 insns which have 24 operands are 6 bytes long and
3865 will have 0xfd as the first byte. */
3867 /* Get the first opcode. */
3868 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 3);
3872 /* Get the second opcode. */
3873 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 2);
3875 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3876 equivalent instructions exists. */
3877 if (code
!= 0x6b && code
!= 0x7b
3878 && code
!= 0x8b && code
!= 0x9b
3879 && ((code
& 0x0f) == 0x09 || (code
& 0x0f) == 0x08
3880 || (code
& 0x0f) == 0x0a || (code
& 0x0f) == 0x0b
3881 || (code
& 0x0f) == 0x0e))
3883 /* Not safe if the high bit is on as relaxing may
3884 move the value out of high mem and thus not fit
3885 in a signed 8bit value. This is currently over
3887 if ((value
& 0x80) == 0)
3889 /* Note that we've changed the relocation contents,
3891 elf_section_data (sec
)->relocs
= internal_relocs
;
3892 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3893 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3895 /* Fix the opcode. */
3896 bfd_put_8 (abfd
, 0xfb, contents
+ irel
->r_offset
- 3);
3897 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 2);
3899 /* Fix the relocation's type. */
3901 ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
3904 /* Delete two bytes of data. */
3905 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
3906 irel
->r_offset
+ 1, 2))
3909 /* That will change things, so, we should relax
3910 again. Note that this is not required, and it
3920 /* Try to turn a 32bit immediate, displacement or absolute address
3921 into a 16bit immediate, displacement or absolute address. */
3922 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_32
3923 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOT32
3924 || ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOTOFF32
)
3926 bfd_vma value
= symval
;
3928 if (ELF32_R_TYPE (irel
->r_info
) != (int) R_MN10300_32
)
3932 sgot
= hash_table
->root
.sgot
;
3933 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOT32
)
3935 value
= sgot
->output_offset
;
3938 value
+= h
->root
.got
.offset
;
3940 value
+= (elf_local_got_offsets
3941 (abfd
)[ELF32_R_SYM (irel
->r_info
)]);
3943 else if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOTOFF32
)
3944 value
-= sgot
->output_section
->vma
;
3945 else if (ELF32_R_TYPE (irel
->r_info
) == (int) R_MN10300_GOTPC32
)
3946 value
= (sgot
->output_section
->vma
3947 - (sec
->output_section
->vma
3948 + sec
->output_offset
3954 value
+= irel
->r_addend
;
3956 /* See if the value will fit in 24 bits.
3957 We allow any 16bit match here. We prune those we can't
3959 if ((long) value
< 0x7fffff && (long) value
> -0x800000)
3963 /* AM33 insns which have 32bit operands are 7 bytes long and
3964 will have 0xfe as the first byte. */
3966 /* Get the first opcode. */
3967 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 3);
3971 /* Get the second opcode. */
3972 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 2);
3974 /* All the am33 32 -> 24 relaxing possibilities. */
3975 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3976 equivalent instructions exists. */
3977 if (code
!= 0x6b && code
!= 0x7b
3978 && code
!= 0x8b && code
!= 0x9b
3979 && (ELF32_R_TYPE (irel
->r_info
)
3980 != (int) R_MN10300_GOTPC32
)
3981 && ((code
& 0x0f) == 0x09 || (code
& 0x0f) == 0x08
3982 || (code
& 0x0f) == 0x0a || (code
& 0x0f) == 0x0b
3983 || (code
& 0x0f) == 0x0e))
3985 /* Not safe if the high bit is on as relaxing may
3986 move the value out of high mem and thus not fit
3987 in a signed 16bit value. This is currently over
3989 if ((value
& 0x8000) == 0)
3991 /* Note that we've changed the relocation contents,
3993 elf_section_data (sec
)->relocs
= internal_relocs
;
3994 elf_section_data (sec
)->this_hdr
.contents
= contents
;
3995 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
3997 /* Fix the opcode. */
3998 bfd_put_8 (abfd
, 0xfd, contents
+ irel
->r_offset
- 3);
3999 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 2);
4001 /* Fix the relocation's type. */
4003 ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4004 (ELF32_R_TYPE (irel
->r_info
)
4005 == (int) R_MN10300_GOTOFF32
)
4006 ? R_MN10300_GOTOFF24
4007 : (ELF32_R_TYPE (irel
->r_info
)
4008 == (int) R_MN10300_GOT32
)
4012 /* Delete one byte of data. */
4013 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4014 irel
->r_offset
+ 3, 1))
4017 /* That will change things, so, we should relax
4018 again. Note that this is not required, and it
4027 /* See if the value will fit in 16 bits.
4028 We allow any 16bit match here. We prune those we can't
4030 if ((long) value
< 0x7fff && (long) value
> -0x8000)
4034 /* Most insns which have 32bit operands are 6 bytes long;
4035 exceptions are pcrel insns and bit insns.
4037 We handle pcrel insns above. We don't bother trying
4038 to handle the bit insns here.
4040 The first byte of the remaining insns will be 0xfc. */
4042 /* Get the first opcode. */
4043 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 2);
4048 /* Get the second opcode. */
4049 code
= bfd_get_8 (abfd
, contents
+ irel
->r_offset
- 1);
4051 if ((code
& 0xf0) < 0x80)
4052 switch (code
& 0xf0)
4054 /* mov (d32,am),dn -> mov (d32,am),dn
4055 mov dm,(d32,am) -> mov dn,(d32,am)
4056 mov (d32,am),an -> mov (d32,am),an
4057 mov dm,(d32,am) -> mov dn,(d32,am)
4058 movbu (d32,am),dn -> movbu (d32,am),dn
4059 movbu dm,(d32,am) -> movbu dn,(d32,am)
4060 movhu (d32,am),dn -> movhu (d32,am),dn
4061 movhu dm,(d32,am) -> movhu dn,(d32,am) */
4070 /* Not safe if the high bit is on as relaxing may
4071 move the value out of high mem and thus not fit
4072 in a signed 16bit value. */
4074 && (value
& 0x8000))
4077 /* Note that we've changed the relocation contents, etc. */
4078 elf_section_data (sec
)->relocs
= internal_relocs
;
4079 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4080 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4082 /* Fix the opcode. */
4083 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
4084 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 1);
4086 /* Fix the relocation's type. */
4087 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4088 (ELF32_R_TYPE (irel
->r_info
)
4089 == (int) R_MN10300_GOTOFF32
)
4090 ? R_MN10300_GOTOFF16
4091 : (ELF32_R_TYPE (irel
->r_info
)
4092 == (int) R_MN10300_GOT32
)
4094 : (ELF32_R_TYPE (irel
->r_info
)
4095 == (int) R_MN10300_GOTPC32
)
4096 ? R_MN10300_GOTPC16
:
4099 /* Delete two bytes of data. */
4100 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4101 irel
->r_offset
+ 2, 2))
4104 /* That will change things, so, we should relax again.
4105 Note that this is not required, and it may be slow. */
4109 else if ((code
& 0xf0) == 0x80
4110 || (code
& 0xf0) == 0x90)
4111 switch (code
& 0xf3)
4113 /* mov dn,(abs32) -> mov dn,(abs16)
4114 movbu dn,(abs32) -> movbu dn,(abs16)
4115 movhu dn,(abs32) -> movhu dn,(abs16) */
4119 /* Note that we've changed the relocation contents, etc. */
4120 elf_section_data (sec
)->relocs
= internal_relocs
;
4121 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4122 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4124 if ((code
& 0xf3) == 0x81)
4125 code
= 0x01 + (code
& 0x0c);
4126 else if ((code
& 0xf3) == 0x82)
4127 code
= 0x02 + (code
& 0x0c);
4128 else if ((code
& 0xf3) == 0x83)
4129 code
= 0x03 + (code
& 0x0c);
4133 /* Fix the opcode. */
4134 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 2);
4136 /* Fix the relocation's type. */
4137 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4138 (ELF32_R_TYPE (irel
->r_info
)
4139 == (int) R_MN10300_GOTOFF32
)
4140 ? R_MN10300_GOTOFF16
4141 : (ELF32_R_TYPE (irel
->r_info
)
4142 == (int) R_MN10300_GOT32
)
4144 : (ELF32_R_TYPE (irel
->r_info
)
4145 == (int) R_MN10300_GOTPC32
)
4146 ? R_MN10300_GOTPC16
:
4149 /* The opcode got shorter too, so we have to fix the
4150 addend and offset too! */
4151 irel
->r_offset
-= 1;
4153 /* Delete three bytes of data. */
4154 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4155 irel
->r_offset
+ 1, 3))
4158 /* That will change things, so, we should relax again.
4159 Note that this is not required, and it may be slow. */
4163 /* mov am,(abs32) -> mov am,(abs16)
4164 mov am,(d32,sp) -> mov am,(d16,sp)
4165 mov dm,(d32,sp) -> mov dm,(d32,sp)
4166 movbu dm,(d32,sp) -> movbu dm,(d32,sp)
4167 movhu dm,(d32,sp) -> movhu dm,(d32,sp) */
4173 /* sp-based offsets are zero-extended. */
4174 if (code
>= 0x90 && code
<= 0x93
4175 && (long) value
< 0)
4178 /* Note that we've changed the relocation contents, etc. */
4179 elf_section_data (sec
)->relocs
= internal_relocs
;
4180 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4181 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4183 /* Fix the opcode. */
4184 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
4185 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 1);
4187 /* Fix the relocation's type. */
4188 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4189 (ELF32_R_TYPE (irel
->r_info
)
4190 == (int) R_MN10300_GOTOFF32
)
4191 ? R_MN10300_GOTOFF16
4192 : (ELF32_R_TYPE (irel
->r_info
)
4193 == (int) R_MN10300_GOT32
)
4195 : (ELF32_R_TYPE (irel
->r_info
)
4196 == (int) R_MN10300_GOTPC32
)
4197 ? R_MN10300_GOTPC16
:
4200 /* Delete two bytes of data. */
4201 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4202 irel
->r_offset
+ 2, 2))
4205 /* That will change things, so, we should relax again.
4206 Note that this is not required, and it may be slow. */
4210 else if ((code
& 0xf0) < 0xf0)
4211 switch (code
& 0xfc)
4213 /* mov imm32,dn -> mov imm16,dn
4214 mov imm32,an -> mov imm16,an
4215 mov (abs32),dn -> mov (abs16),dn
4216 movbu (abs32),dn -> movbu (abs16),dn
4217 movhu (abs32),dn -> movhu (abs16),dn */
4223 /* Not safe if the high bit is on as relaxing may
4224 move the value out of high mem and thus not fit
4225 in a signed 16bit value. */
4227 && (value
& 0x8000))
4230 /* "mov imm16, an" zero-extends the immediate. */
4231 if ((code
& 0xfc) == 0xdc
4232 && (long) value
< 0)
4235 /* Note that we've changed the relocation contents, etc. */
4236 elf_section_data (sec
)->relocs
= internal_relocs
;
4237 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4238 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4240 if ((code
& 0xfc) == 0xcc)
4241 code
= 0x2c + (code
& 0x03);
4242 else if ((code
& 0xfc) == 0xdc)
4243 code
= 0x24 + (code
& 0x03);
4244 else if ((code
& 0xfc) == 0xa4)
4245 code
= 0x30 + (code
& 0x03);
4246 else if ((code
& 0xfc) == 0xa8)
4247 code
= 0x34 + (code
& 0x03);
4248 else if ((code
& 0xfc) == 0xac)
4249 code
= 0x38 + (code
& 0x03);
4253 /* Fix the opcode. */
4254 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 2);
4256 /* Fix the relocation's type. */
4257 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4258 (ELF32_R_TYPE (irel
->r_info
)
4259 == (int) R_MN10300_GOTOFF32
)
4260 ? R_MN10300_GOTOFF16
4261 : (ELF32_R_TYPE (irel
->r_info
)
4262 == (int) R_MN10300_GOT32
)
4264 : (ELF32_R_TYPE (irel
->r_info
)
4265 == (int) R_MN10300_GOTPC32
)
4266 ? R_MN10300_GOTPC16
:
4269 /* The opcode got shorter too, so we have to fix the
4270 addend and offset too! */
4271 irel
->r_offset
-= 1;
4273 /* Delete three bytes of data. */
4274 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4275 irel
->r_offset
+ 1, 3))
4278 /* That will change things, so, we should relax again.
4279 Note that this is not required, and it may be slow. */
4283 /* mov (abs32),an -> mov (abs16),an
4284 mov (d32,sp),an -> mov (d16,sp),an
4285 mov (d32,sp),dn -> mov (d16,sp),dn
4286 movbu (d32,sp),dn -> movbu (d16,sp),dn
4287 movhu (d32,sp),dn -> movhu (d16,sp),dn
4288 add imm32,dn -> add imm16,dn
4289 cmp imm32,dn -> cmp imm16,dn
4290 add imm32,an -> add imm16,an
4291 cmp imm32,an -> cmp imm16,an
4292 and imm32,dn -> and imm16,dn
4293 or imm32,dn -> or imm16,dn
4294 xor imm32,dn -> xor imm16,dn
4295 btst imm32,dn -> btst imm16,dn */
4311 /* cmp imm16, an zero-extends the immediate. */
4313 && (long) value
< 0)
4316 /* So do sp-based offsets. */
4317 if (code
>= 0xb0 && code
<= 0xb3
4318 && (long) value
< 0)
4321 /* Note that we've changed the relocation contents, etc. */
4322 elf_section_data (sec
)->relocs
= internal_relocs
;
4323 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4324 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4326 /* Fix the opcode. */
4327 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
4328 bfd_put_8 (abfd
, code
, contents
+ irel
->r_offset
- 1);
4330 /* Fix the relocation's type. */
4331 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4332 (ELF32_R_TYPE (irel
->r_info
)
4333 == (int) R_MN10300_GOTOFF32
)
4334 ? R_MN10300_GOTOFF16
4335 : (ELF32_R_TYPE (irel
->r_info
)
4336 == (int) R_MN10300_GOT32
)
4338 : (ELF32_R_TYPE (irel
->r_info
)
4339 == (int) R_MN10300_GOTPC32
)
4340 ? R_MN10300_GOTPC16
:
4343 /* Delete two bytes of data. */
4344 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4345 irel
->r_offset
+ 2, 2))
4348 /* That will change things, so, we should relax again.
4349 Note that this is not required, and it may be slow. */
4353 else if (code
== 0xfe)
4355 /* add imm32,sp -> add imm16,sp */
4357 /* Note that we've changed the relocation contents, etc. */
4358 elf_section_data (sec
)->relocs
= internal_relocs
;
4359 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4360 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4362 /* Fix the opcode. */
4363 bfd_put_8 (abfd
, 0xfa, contents
+ irel
->r_offset
- 2);
4364 bfd_put_8 (abfd
, 0xfe, contents
+ irel
->r_offset
- 1);
4366 /* Fix the relocation's type. */
4367 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
4368 (ELF32_R_TYPE (irel
->r_info
)
4369 == (int) R_MN10300_GOT32
)
4371 : (ELF32_R_TYPE (irel
->r_info
)
4372 == (int) R_MN10300_GOTOFF32
)
4373 ? R_MN10300_GOTOFF16
4374 : (ELF32_R_TYPE (irel
->r_info
)
4375 == (int) R_MN10300_GOTPC32
)
4376 ? R_MN10300_GOTPC16
:
4379 /* Delete two bytes of data. */
4380 if (!mn10300_elf_relax_delete_bytes (abfd
, sec
,
4381 irel
->r_offset
+ 2, 2))
4384 /* That will change things, so, we should relax again.
4385 Note that this is not required, and it may be slow. */
4394 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
4396 if (! link_info
->keep_memory
)
4400 /* Cache the symbols for elf_link_input_bfd. */
4401 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
4405 if (contents
!= NULL
4406 && elf_section_data (sec
)->this_hdr
.contents
!= contents
)
4408 if (! link_info
->keep_memory
)
4412 /* Cache the section contents for elf_link_input_bfd. */
4413 elf_section_data (sec
)->this_hdr
.contents
= contents
;
4417 if (internal_relocs
!= NULL
4418 && elf_section_data (sec
)->relocs
!= internal_relocs
)
4419 free (internal_relocs
);
4425 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
4427 if (contents
!= NULL
4428 && elf_section_data (section
)->this_hdr
.contents
!= contents
)
4430 if (internal_relocs
!= NULL
4431 && elf_section_data (section
)->relocs
!= internal_relocs
)
4432 free (internal_relocs
);
4437 /* This is a version of bfd_generic_get_relocated_section_contents
4438 which uses mn10300_elf_relocate_section. */
4441 mn10300_elf_get_relocated_section_contents (bfd
*output_bfd
,
4442 struct bfd_link_info
*link_info
,
4443 struct bfd_link_order
*link_order
,
4445 bfd_boolean relocatable
,
4448 Elf_Internal_Shdr
*symtab_hdr
;
4449 asection
*input_section
= link_order
->u
.indirect
.section
;
4450 bfd
*input_bfd
= input_section
->owner
;
4451 asection
**sections
= NULL
;
4452 Elf_Internal_Rela
*internal_relocs
= NULL
;
4453 Elf_Internal_Sym
*isymbuf
= NULL
;
4455 /* We only need to handle the case of relaxing, or of having a
4456 particular set of section contents, specially. */
4458 || elf_section_data (input_section
)->this_hdr
.contents
== NULL
)
4459 return bfd_generic_get_relocated_section_contents (output_bfd
, link_info
,
4464 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
4466 memcpy (data
, elf_section_data (input_section
)->this_hdr
.contents
,
4467 (size_t) input_section
->size
);
4469 if ((input_section
->flags
& SEC_RELOC
) != 0
4470 && input_section
->reloc_count
> 0)
4473 Elf_Internal_Sym
*isym
, *isymend
;
4476 internal_relocs
= _bfd_elf_link_read_relocs (input_bfd
, input_section
,
4478 if (internal_relocs
== NULL
)
4481 if (symtab_hdr
->sh_info
!= 0)
4483 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
4484 if (isymbuf
== NULL
)
4485 isymbuf
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
4486 symtab_hdr
->sh_info
, 0,
4488 if (isymbuf
== NULL
)
4492 amt
= symtab_hdr
->sh_info
;
4493 amt
*= sizeof (asection
*);
4494 sections
= bfd_malloc (amt
);
4495 if (sections
== NULL
&& amt
!= 0)
4498 isymend
= isymbuf
+ symtab_hdr
->sh_info
;
4499 for (isym
= isymbuf
, secpp
= sections
; isym
< isymend
; ++isym
, ++secpp
)
4503 if (isym
->st_shndx
== SHN_UNDEF
)
4504 isec
= bfd_und_section_ptr
;
4505 else if (isym
->st_shndx
== SHN_ABS
)
4506 isec
= bfd_abs_section_ptr
;
4507 else if (isym
->st_shndx
== SHN_COMMON
)
4508 isec
= bfd_com_section_ptr
;
4510 isec
= bfd_section_from_elf_index (input_bfd
, isym
->st_shndx
);
4515 if (! mn10300_elf_relocate_section (output_bfd
, link_info
, input_bfd
,
4516 input_section
, data
, internal_relocs
,
4520 if (sections
!= NULL
)
4522 if (isymbuf
!= NULL
&& symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
4524 if (internal_relocs
!= elf_section_data (input_section
)->relocs
)
4525 free (internal_relocs
);
4531 if (sections
!= NULL
)
4533 if (isymbuf
!= NULL
&& symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
4535 if (internal_relocs
!= NULL
4536 && internal_relocs
!= elf_section_data (input_section
)->relocs
)
4537 free (internal_relocs
);
4541 /* Assorted hash table functions. */
4543 /* Initialize an entry in the link hash table. */
4545 /* Create an entry in an MN10300 ELF linker hash table. */
4547 static struct bfd_hash_entry
*
4548 elf32_mn10300_link_hash_newfunc (struct bfd_hash_entry
*entry
,
4549 struct bfd_hash_table
*table
,
4552 struct elf32_mn10300_link_hash_entry
*ret
=
4553 (struct elf32_mn10300_link_hash_entry
*) entry
;
4555 /* Allocate the structure if it has not already been allocated by a
4558 ret
= (struct elf32_mn10300_link_hash_entry
*)
4559 bfd_hash_allocate (table
, sizeof (* ret
));
4561 return (struct bfd_hash_entry
*) ret
;
4563 /* Call the allocation method of the superclass. */
4564 ret
= (struct elf32_mn10300_link_hash_entry
*)
4565 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry
*) ret
,
4569 ret
->direct_calls
= 0;
4570 ret
->stack_size
= 0;
4572 ret
->movm_stack_size
= 0;
4575 ret
->tls_type
= GOT_UNKNOWN
;
4578 return (struct bfd_hash_entry
*) ret
;
4582 _bfd_mn10300_copy_indirect_symbol (struct bfd_link_info
* info
,
4583 struct elf_link_hash_entry
* dir
,
4584 struct elf_link_hash_entry
* ind
)
4586 struct elf32_mn10300_link_hash_entry
* edir
;
4587 struct elf32_mn10300_link_hash_entry
* eind
;
4589 edir
= elf_mn10300_hash_entry (dir
);
4590 eind
= elf_mn10300_hash_entry (ind
);
4592 if (ind
->root
.type
== bfd_link_hash_indirect
4593 && dir
->got
.refcount
<= 0)
4595 edir
->tls_type
= eind
->tls_type
;
4596 eind
->tls_type
= GOT_UNKNOWN
;
4598 edir
->direct_calls
= eind
->direct_calls
;
4599 edir
->stack_size
= eind
->stack_size
;
4600 edir
->movm_args
= eind
->movm_args
;
4601 edir
->movm_stack_size
= eind
->movm_stack_size
;
4602 edir
->flags
= eind
->flags
;
4604 _bfd_elf_link_hash_copy_indirect (info
, dir
, ind
);
4607 /* Destroy an mn10300 ELF linker hash table. */
4610 elf32_mn10300_link_hash_table_free (bfd
*obfd
)
4612 struct elf32_mn10300_link_hash_table
*ret
4613 = (struct elf32_mn10300_link_hash_table
*) obfd
->link
.hash
;
4615 obfd
->link
.hash
= &ret
->static_hash_table
->root
.root
;
4616 _bfd_elf_link_hash_table_free (obfd
);
4617 obfd
->is_linker_output
= TRUE
;
4618 obfd
->link
.hash
= &ret
->root
.root
;
4619 _bfd_elf_link_hash_table_free (obfd
);
4622 /* Create an mn10300 ELF linker hash table. */
4624 static struct bfd_link_hash_table
*
4625 elf32_mn10300_link_hash_table_create (bfd
*abfd
)
4627 struct elf32_mn10300_link_hash_table
*ret
;
4628 bfd_size_type amt
= sizeof (* ret
);
4630 ret
= bfd_zmalloc (amt
);
4634 amt
= sizeof (struct elf_link_hash_table
);
4635 ret
->static_hash_table
= bfd_zmalloc (amt
);
4636 if (ret
->static_hash_table
== NULL
)
4642 if (!_bfd_elf_link_hash_table_init (&ret
->static_hash_table
->root
, abfd
,
4643 elf32_mn10300_link_hash_newfunc
,
4644 sizeof (struct elf32_mn10300_link_hash_entry
),
4647 free (ret
->static_hash_table
);
4652 abfd
->is_linker_output
= FALSE
;
4653 abfd
->link
.hash
= NULL
;
4654 if (!_bfd_elf_link_hash_table_init (&ret
->root
, abfd
,
4655 elf32_mn10300_link_hash_newfunc
,
4656 sizeof (struct elf32_mn10300_link_hash_entry
),
4659 abfd
->is_linker_output
= TRUE
;
4660 abfd
->link
.hash
= &ret
->static_hash_table
->root
.root
;
4661 _bfd_elf_link_hash_table_free (abfd
);
4665 ret
->root
.root
.hash_table_free
= elf32_mn10300_link_hash_table_free
;
4667 ret
->tls_ldm_got
.offset
= -1;
4669 return & ret
->root
.root
;
4672 static unsigned long
4673 elf_mn10300_mach (flagword flags
)
4675 switch (flags
& EF_MN10300_MACH
)
4677 case E_MN10300_MACH_MN10300
:
4679 return bfd_mach_mn10300
;
4681 case E_MN10300_MACH_AM33
:
4682 return bfd_mach_am33
;
4684 case E_MN10300_MACH_AM33_2
:
4685 return bfd_mach_am33_2
;
4689 /* The final processing done just before writing out a MN10300 ELF object
4690 file. This gets the MN10300 architecture right based on the machine
4694 _bfd_mn10300_elf_final_write_processing (bfd
*abfd
,
4695 bfd_boolean linker ATTRIBUTE_UNUSED
)
4699 switch (bfd_get_mach (abfd
))
4702 case bfd_mach_mn10300
:
4703 val
= E_MN10300_MACH_MN10300
;
4707 val
= E_MN10300_MACH_AM33
;
4710 case bfd_mach_am33_2
:
4711 val
= E_MN10300_MACH_AM33_2
;
4715 elf_elfheader (abfd
)->e_flags
&= ~ (EF_MN10300_MACH
);
4716 elf_elfheader (abfd
)->e_flags
|= val
;
4720 _bfd_mn10300_elf_object_p (bfd
*abfd
)
4722 bfd_default_set_arch_mach (abfd
, bfd_arch_mn10300
,
4723 elf_mn10300_mach (elf_elfheader (abfd
)->e_flags
));
4727 /* Merge backend specific data from an object file to the output
4728 object file when linking. */
4731 _bfd_mn10300_elf_merge_private_bfd_data (bfd
*ibfd
, bfd
*obfd
)
4733 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
4734 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
4737 if (bfd_get_arch (obfd
) == bfd_get_arch (ibfd
)
4738 && bfd_get_mach (obfd
) < bfd_get_mach (ibfd
))
4740 if (! bfd_set_arch_mach (obfd
, bfd_get_arch (ibfd
),
4741 bfd_get_mach (ibfd
)))
4748 #define PLT0_ENTRY_SIZE 15
4749 #define PLT_ENTRY_SIZE 20
4750 #define PIC_PLT_ENTRY_SIZE 24
4752 static const bfd_byte elf_mn10300_plt0_entry
[PLT0_ENTRY_SIZE
] =
4754 0xfc, 0xa0, 0, 0, 0, 0, /* mov (.got+8),a0 */
4755 0xfe, 0xe, 0x10, 0, 0, 0, 0, /* mov (.got+4),r1 */
4756 0xf0, 0xf4, /* jmp (a0) */
4759 static const bfd_byte elf_mn10300_plt_entry
[PLT_ENTRY_SIZE
] =
4761 0xfc, 0xa0, 0, 0, 0, 0, /* mov (nameN@GOT + .got),a0 */
4762 0xf0, 0xf4, /* jmp (a0) */
4763 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4764 0xdc, 0, 0, 0, 0, /* jmp .plt0 */
4767 static const bfd_byte elf_mn10300_pic_plt_entry
[PIC_PLT_ENTRY_SIZE
] =
4769 0xfc, 0x22, 0, 0, 0, 0, /* mov (nameN@GOT,a2),a0 */
4770 0xf0, 0xf4, /* jmp (a0) */
4771 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4772 0xf8, 0x22, 8, /* mov (8,a2),a0 */
4773 0xfb, 0xa, 0x1a, 4, /* mov (4,a2),r1 */
4774 0xf0, 0xf4, /* jmp (a0) */
4777 /* Return size of the first PLT entry. */
4778 #define elf_mn10300_sizeof_plt0(info) \
4779 (bfd_link_pic (info) ? PIC_PLT_ENTRY_SIZE : PLT0_ENTRY_SIZE)
4781 /* Return size of a PLT entry. */
4782 #define elf_mn10300_sizeof_plt(info) \
4783 (bfd_link_pic (info) ? PIC_PLT_ENTRY_SIZE : PLT_ENTRY_SIZE)
4785 /* Return offset of the PLT0 address in an absolute PLT entry. */
4786 #define elf_mn10300_plt_plt0_offset(info) 16
4788 /* Return offset of the linker in PLT0 entry. */
4789 #define elf_mn10300_plt0_linker_offset(info) 2
4791 /* Return offset of the GOT id in PLT0 entry. */
4792 #define elf_mn10300_plt0_gotid_offset(info) 9
4794 /* Return offset of the temporary in PLT entry. */
4795 #define elf_mn10300_plt_temp_offset(info) 8
4797 /* Return offset of the symbol in PLT entry. */
4798 #define elf_mn10300_plt_symbol_offset(info) 2
4800 /* Return offset of the relocation in PLT entry. */
4801 #define elf_mn10300_plt_reloc_offset(info) 11
4803 /* The name of the dynamic interpreter. This is put in the .interp
4806 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
4808 /* Create dynamic sections when linking against a dynamic object. */
4811 _bfd_mn10300_elf_create_dynamic_sections (bfd
*abfd
, struct bfd_link_info
*info
)
4815 const struct elf_backend_data
* bed
= get_elf_backend_data (abfd
);
4816 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
4819 switch (bed
->s
->arch_size
)
4830 bfd_set_error (bfd_error_bad_value
);
4834 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
4835 .rel[a].bss sections. */
4836 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
4837 | SEC_LINKER_CREATED
);
4839 s
= bfd_make_section_anyway_with_flags (abfd
,
4840 (bed
->default_use_rela_p
4841 ? ".rela.plt" : ".rel.plt"),
4842 flags
| SEC_READONLY
);
4843 htab
->root
.srelplt
= s
;
4845 || ! bfd_set_section_alignment (abfd
, s
, ptralign
))
4848 if (! _bfd_mn10300_elf_create_got_section (abfd
, info
))
4851 if (bed
->want_dynbss
)
4853 /* The .dynbss section is a place to put symbols which are defined
4854 by dynamic objects, are referenced by regular objects, and are
4855 not functions. We must allocate space for them in the process
4856 image and use a R_*_COPY reloc to tell the dynamic linker to
4857 initialize them at run time. The linker script puts the .dynbss
4858 section into the .bss section of the final image. */
4859 s
= bfd_make_section_anyway_with_flags (abfd
, ".dynbss",
4860 SEC_ALLOC
| SEC_LINKER_CREATED
);
4864 /* The .rel[a].bss section holds copy relocs. This section is not
4865 normally needed. We need to create it here, though, so that the
4866 linker will map it to an output section. We can't just create it
4867 only if we need it, because we will not know whether we need it
4868 until we have seen all the input files, and the first time the
4869 main linker code calls BFD after examining all the input files
4870 (size_dynamic_sections) the input sections have already been
4871 mapped to the output sections. If the section turns out not to
4872 be needed, we can discard it later. We will never need this
4873 section when generating a shared object, since they do not use
4875 if (! bfd_link_pic (info
))
4877 s
= bfd_make_section_anyway_with_flags (abfd
,
4878 (bed
->default_use_rela_p
4879 ? ".rela.bss" : ".rel.bss"),
4880 flags
| SEC_READONLY
);
4882 || ! bfd_set_section_alignment (abfd
, s
, ptralign
))
4890 /* Adjust a symbol defined by a dynamic object and referenced by a
4891 regular object. The current definition is in some section of the
4892 dynamic object, but we're not including those sections. We have to
4893 change the definition to something the rest of the link can
4897 _bfd_mn10300_elf_adjust_dynamic_symbol (struct bfd_link_info
* info
,
4898 struct elf_link_hash_entry
* h
)
4900 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
4904 dynobj
= htab
->root
.dynobj
;
4906 /* Make sure we know what is going on here. */
4907 BFD_ASSERT (dynobj
!= NULL
4909 || h
->u
.weakdef
!= NULL
4912 && !h
->def_regular
)));
4914 /* If this is a function, put it in the procedure linkage table. We
4915 will fill in the contents of the procedure linkage table later,
4916 when we know the address of the .got section. */
4917 if (h
->type
== STT_FUNC
4920 if (! bfd_link_pic (info
)
4924 /* This case can occur if we saw a PLT reloc in an input
4925 file, but the symbol was never referred to by a dynamic
4926 object. In such a case, we don't actually need to build
4927 a procedure linkage table, and we can just do a REL32
4929 BFD_ASSERT (h
->needs_plt
);
4933 /* Make sure this symbol is output as a dynamic symbol. */
4934 if (h
->dynindx
== -1)
4936 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
4940 s
= htab
->root
.splt
;
4941 BFD_ASSERT (s
!= NULL
);
4943 /* If this is the first .plt entry, make room for the special
4946 s
->size
+= elf_mn10300_sizeof_plt0 (info
);
4948 /* If this symbol is not defined in a regular file, and we are
4949 not generating a shared library, then set the symbol to this
4950 location in the .plt. This is required to make function
4951 pointers compare as equal between the normal executable and
4952 the shared library. */
4953 if (! bfd_link_pic (info
)
4956 h
->root
.u
.def
.section
= s
;
4957 h
->root
.u
.def
.value
= s
->size
;
4960 h
->plt
.offset
= s
->size
;
4962 /* Make room for this entry. */
4963 s
->size
+= elf_mn10300_sizeof_plt (info
);
4965 /* We also need to make an entry in the .got.plt section, which
4966 will be placed in the .got section by the linker script. */
4967 s
= htab
->root
.sgotplt
;
4968 BFD_ASSERT (s
!= NULL
);
4971 /* We also need to make an entry in the .rela.plt section. */
4972 s
= bfd_get_linker_section (dynobj
, ".rela.plt");
4973 BFD_ASSERT (s
!= NULL
);
4974 s
->size
+= sizeof (Elf32_External_Rela
);
4979 /* If this is a weak symbol, and there is a real definition, the
4980 processor independent code will have arranged for us to see the
4981 real definition first, and we can just use the same value. */
4982 if (h
->u
.weakdef
!= NULL
)
4984 BFD_ASSERT (h
->u
.weakdef
->root
.type
== bfd_link_hash_defined
4985 || h
->u
.weakdef
->root
.type
== bfd_link_hash_defweak
);
4986 h
->root
.u
.def
.section
= h
->u
.weakdef
->root
.u
.def
.section
;
4987 h
->root
.u
.def
.value
= h
->u
.weakdef
->root
.u
.def
.value
;
4991 /* This is a reference to a symbol defined by a dynamic object which
4992 is not a function. */
4994 /* If we are creating a shared library, we must presume that the
4995 only references to the symbol are via the global offset table.
4996 For such cases we need not do anything here; the relocations will
4997 be handled correctly by relocate_section. */
4998 if (bfd_link_pic (info
))
5001 /* If there are no references to this symbol that do not use the
5002 GOT, we don't need to generate a copy reloc. */
5003 if (!h
->non_got_ref
)
5006 /* We must allocate the symbol in our .dynbss section, which will
5007 become part of the .bss section of the executable. There will be
5008 an entry for this symbol in the .dynsym section. The dynamic
5009 object will contain position independent code, so all references
5010 from the dynamic object to this symbol will go through the global
5011 offset table. The dynamic linker will use the .dynsym entry to
5012 determine the address it must put in the global offset table, so
5013 both the dynamic object and the regular object will refer to the
5014 same memory location for the variable. */
5016 s
= bfd_get_linker_section (dynobj
, ".dynbss");
5017 BFD_ASSERT (s
!= NULL
);
5019 /* We must generate a R_MN10300_COPY reloc to tell the dynamic linker to
5020 copy the initial value out of the dynamic object and into the
5021 runtime process image. We need to remember the offset into the
5022 .rela.bss section we are going to use. */
5023 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0 && h
->size
!= 0)
5027 srel
= bfd_get_linker_section (dynobj
, ".rela.bss");
5028 BFD_ASSERT (srel
!= NULL
);
5029 srel
->size
+= sizeof (Elf32_External_Rela
);
5033 return _bfd_elf_adjust_dynamic_copy (info
, h
, s
);
5036 /* Set the sizes of the dynamic sections. */
5039 _bfd_mn10300_elf_size_dynamic_sections (bfd
* output_bfd
,
5040 struct bfd_link_info
* info
)
5042 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
5047 bfd_boolean reltext
;
5049 dynobj
= htab
->root
.dynobj
;
5050 BFD_ASSERT (dynobj
!= NULL
);
5052 if (elf_hash_table (info
)->dynamic_sections_created
)
5054 /* Set the contents of the .interp section to the interpreter. */
5055 if (bfd_link_executable (info
))
5057 s
= bfd_get_linker_section (dynobj
, ".interp");
5058 BFD_ASSERT (s
!= NULL
);
5059 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
5060 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
5065 /* We may have created entries in the .rela.got section.
5066 However, if we are not creating the dynamic sections, we will
5067 not actually use these entries. Reset the size of .rela.got,
5068 which will cause it to get stripped from the output file
5070 s
= htab
->root
.sgot
;
5075 if (htab
->tls_ldm_got
.refcount
> 0)
5077 s
= bfd_get_linker_section (dynobj
, ".rela.got");
5078 BFD_ASSERT (s
!= NULL
);
5079 s
->size
+= sizeof (Elf32_External_Rela
);
5082 /* The check_relocs and adjust_dynamic_symbol entry points have
5083 determined the sizes of the various dynamic sections. Allocate
5088 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
5092 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
5095 /* It's OK to base decisions on the section name, because none
5096 of the dynobj section names depend upon the input files. */
5097 name
= bfd_get_section_name (dynobj
, s
);
5099 if (streq (name
, ".plt"))
5101 /* Remember whether there is a PLT. */
5104 else if (CONST_STRNEQ (name
, ".rela"))
5110 /* Remember whether there are any reloc sections other
5112 if (! streq (name
, ".rela.plt"))
5114 const char * outname
;
5118 /* If this relocation section applies to a read only
5119 section, then we probably need a DT_TEXTREL
5120 entry. The entries in the .rela.plt section
5121 really apply to the .got section, which we
5122 created ourselves and so know is not readonly. */
5123 outname
= bfd_get_section_name (output_bfd
,
5125 target
= bfd_get_section_by_name (output_bfd
, outname
+ 5);
5127 && (target
->flags
& SEC_READONLY
) != 0
5128 && (target
->flags
& SEC_ALLOC
) != 0)
5132 /* We use the reloc_count field as a counter if we need
5133 to copy relocs into the output file. */
5137 else if (! CONST_STRNEQ (name
, ".got")
5138 && ! streq (name
, ".dynbss"))
5139 /* It's not one of our sections, so don't allocate space. */
5144 /* If we don't need this section, strip it from the
5145 output file. This is mostly to handle .rela.bss and
5146 .rela.plt. We must create both sections in
5147 create_dynamic_sections, because they must be created
5148 before the linker maps input sections to output
5149 sections. The linker does that before
5150 adjust_dynamic_symbol is called, and it is that
5151 function which decides whether anything needs to go
5152 into these sections. */
5153 s
->flags
|= SEC_EXCLUDE
;
5157 if ((s
->flags
& SEC_HAS_CONTENTS
) == 0)
5160 /* Allocate memory for the section contents. We use bfd_zalloc
5161 here in case unused entries are not reclaimed before the
5162 section's contents are written out. This should not happen,
5163 but this way if it does, we get a R_MN10300_NONE reloc
5164 instead of garbage. */
5165 s
->contents
= bfd_zalloc (dynobj
, s
->size
);
5166 if (s
->contents
== NULL
)
5170 if (elf_hash_table (info
)->dynamic_sections_created
)
5172 /* Add some entries to the .dynamic section. We fill in the
5173 values later, in _bfd_mn10300_elf_finish_dynamic_sections,
5174 but we must add the entries now so that we get the correct
5175 size for the .dynamic section. The DT_DEBUG entry is filled
5176 in by the dynamic linker and used by the debugger. */
5177 if (! bfd_link_pic (info
))
5179 if (!_bfd_elf_add_dynamic_entry (info
, DT_DEBUG
, 0))
5185 if (!_bfd_elf_add_dynamic_entry (info
, DT_PLTGOT
, 0)
5186 || !_bfd_elf_add_dynamic_entry (info
, DT_PLTRELSZ
, 0)
5187 || !_bfd_elf_add_dynamic_entry (info
, DT_PLTREL
, DT_RELA
)
5188 || !_bfd_elf_add_dynamic_entry (info
, DT_JMPREL
, 0))
5194 if (!_bfd_elf_add_dynamic_entry (info
, DT_RELA
, 0)
5195 || !_bfd_elf_add_dynamic_entry (info
, DT_RELASZ
, 0)
5196 || !_bfd_elf_add_dynamic_entry (info
, DT_RELAENT
,
5197 sizeof (Elf32_External_Rela
)))
5203 if (!_bfd_elf_add_dynamic_entry (info
, DT_TEXTREL
, 0))
5211 /* Finish up dynamic symbol handling. We set the contents of various
5212 dynamic sections here. */
5215 _bfd_mn10300_elf_finish_dynamic_symbol (bfd
* output_bfd
,
5216 struct bfd_link_info
* info
,
5217 struct elf_link_hash_entry
* h
,
5218 Elf_Internal_Sym
* sym
)
5220 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
5223 dynobj
= htab
->root
.dynobj
;
5225 if (h
->plt
.offset
!= (bfd_vma
) -1)
5232 Elf_Internal_Rela rel
;
5234 /* This symbol has an entry in the procedure linkage table. Set
5237 BFD_ASSERT (h
->dynindx
!= -1);
5239 splt
= htab
->root
.splt
;
5240 sgot
= htab
->root
.sgotplt
;
5241 srel
= bfd_get_linker_section (dynobj
, ".rela.plt");
5242 BFD_ASSERT (splt
!= NULL
&& sgot
!= NULL
&& srel
!= NULL
);
5244 /* Get the index in the procedure linkage table which
5245 corresponds to this symbol. This is the index of this symbol
5246 in all the symbols for which we are making plt entries. The
5247 first entry in the procedure linkage table is reserved. */
5248 plt_index
= ((h
->plt
.offset
- elf_mn10300_sizeof_plt0 (info
))
5249 / elf_mn10300_sizeof_plt (info
));
5251 /* Get the offset into the .got table of the entry that
5252 corresponds to this function. Each .got entry is 4 bytes.
5253 The first three are reserved. */
5254 got_offset
= (plt_index
+ 3) * 4;
5256 /* Fill in the entry in the procedure linkage table. */
5257 if (! bfd_link_pic (info
))
5259 memcpy (splt
->contents
+ h
->plt
.offset
, elf_mn10300_plt_entry
,
5260 elf_mn10300_sizeof_plt (info
));
5261 bfd_put_32 (output_bfd
,
5262 (sgot
->output_section
->vma
5263 + sgot
->output_offset
5265 (splt
->contents
+ h
->plt
.offset
5266 + elf_mn10300_plt_symbol_offset (info
)));
5268 bfd_put_32 (output_bfd
,
5269 (1 - h
->plt
.offset
- elf_mn10300_plt_plt0_offset (info
)),
5270 (splt
->contents
+ h
->plt
.offset
5271 + elf_mn10300_plt_plt0_offset (info
)));
5275 memcpy (splt
->contents
+ h
->plt
.offset
, elf_mn10300_pic_plt_entry
,
5276 elf_mn10300_sizeof_plt (info
));
5278 bfd_put_32 (output_bfd
, got_offset
,
5279 (splt
->contents
+ h
->plt
.offset
5280 + elf_mn10300_plt_symbol_offset (info
)));
5283 bfd_put_32 (output_bfd
, plt_index
* sizeof (Elf32_External_Rela
),
5284 (splt
->contents
+ h
->plt
.offset
5285 + elf_mn10300_plt_reloc_offset (info
)));
5287 /* Fill in the entry in the global offset table. */
5288 bfd_put_32 (output_bfd
,
5289 (splt
->output_section
->vma
5290 + splt
->output_offset
5292 + elf_mn10300_plt_temp_offset (info
)),
5293 sgot
->contents
+ got_offset
);
5295 /* Fill in the entry in the .rela.plt section. */
5296 rel
.r_offset
= (sgot
->output_section
->vma
5297 + sgot
->output_offset
5299 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_JMP_SLOT
);
5301 bfd_elf32_swap_reloca_out (output_bfd
, &rel
,
5302 (bfd_byte
*) ((Elf32_External_Rela
*) srel
->contents
5305 if (!h
->def_regular
)
5306 /* Mark the symbol as undefined, rather than as defined in
5307 the .plt section. Leave the value alone. */
5308 sym
->st_shndx
= SHN_UNDEF
;
5311 if (h
->got
.offset
!= (bfd_vma
) -1)
5315 Elf_Internal_Rela rel
;
5317 /* This symbol has an entry in the global offset table. Set it up. */
5318 sgot
= htab
->root
.sgot
;
5319 srel
= bfd_get_linker_section (dynobj
, ".rela.got");
5320 BFD_ASSERT (sgot
!= NULL
&& srel
!= NULL
);
5322 rel
.r_offset
= (sgot
->output_section
->vma
5323 + sgot
->output_offset
5324 + (h
->got
.offset
& ~1));
5326 switch (elf_mn10300_hash_entry (h
)->tls_type
)
5329 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
);
5330 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
+ 4);
5331 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_TLS_DTPMOD
);
5333 bfd_elf32_swap_reloca_out (output_bfd
, & rel
,
5334 (bfd_byte
*) ((Elf32_External_Rela
*) srel
->contents
5335 + srel
->reloc_count
));
5336 ++ srel
->reloc_count
;
5337 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_TLS_DTPOFF
);
5343 /* We originally stored the addend in the GOT, but at this
5344 point, we want to move it to the reloc instead as that's
5345 where the dynamic linker wants it. */
5346 rel
.r_addend
= bfd_get_32 (output_bfd
, sgot
->contents
+ h
->got
.offset
);
5347 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
);
5348 if (h
->dynindx
== -1)
5349 rel
.r_info
= ELF32_R_INFO (0, R_MN10300_TLS_TPOFF
);
5351 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_TLS_TPOFF
);
5355 /* If this is a -Bsymbolic link, and the symbol is defined
5356 locally, we just want to emit a RELATIVE reloc. Likewise if
5357 the symbol was forced to be local because of a version file.
5358 The entry in the global offset table will already have been
5359 initialized in the relocate_section function. */
5360 if (bfd_link_pic (info
)
5361 && (info
->symbolic
|| h
->dynindx
== -1)
5364 rel
.r_info
= ELF32_R_INFO (0, R_MN10300_RELATIVE
);
5365 rel
.r_addend
= (h
->root
.u
.def
.value
5366 + h
->root
.u
.def
.section
->output_section
->vma
5367 + h
->root
.u
.def
.section
->output_offset
);
5371 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
);
5372 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_GLOB_DAT
);
5377 if (ELF32_R_TYPE (rel
.r_info
) != R_MN10300_NONE
)
5379 bfd_elf32_swap_reloca_out (output_bfd
, &rel
,
5380 (bfd_byte
*) ((Elf32_External_Rela
*) srel
->contents
5381 + srel
->reloc_count
));
5382 ++ srel
->reloc_count
;
5389 Elf_Internal_Rela rel
;
5391 /* This symbol needs a copy reloc. Set it up. */
5392 BFD_ASSERT (h
->dynindx
!= -1
5393 && (h
->root
.type
== bfd_link_hash_defined
5394 || h
->root
.type
== bfd_link_hash_defweak
));
5396 s
= bfd_get_linker_section (dynobj
, ".rela.bss");
5397 BFD_ASSERT (s
!= NULL
);
5399 rel
.r_offset
= (h
->root
.u
.def
.value
5400 + h
->root
.u
.def
.section
->output_section
->vma
5401 + h
->root
.u
.def
.section
->output_offset
);
5402 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_MN10300_COPY
);
5404 bfd_elf32_swap_reloca_out (output_bfd
, & rel
,
5405 (bfd_byte
*) ((Elf32_External_Rela
*) s
->contents
5410 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5411 if (h
== elf_hash_table (info
)->hdynamic
5412 || h
== elf_hash_table (info
)->hgot
)
5413 sym
->st_shndx
= SHN_ABS
;
5418 /* Finish up the dynamic sections. */
5421 _bfd_mn10300_elf_finish_dynamic_sections (bfd
* output_bfd
,
5422 struct bfd_link_info
* info
)
5427 struct elf32_mn10300_link_hash_table
*htab
= elf32_mn10300_hash_table (info
);
5429 dynobj
= htab
->root
.dynobj
;
5430 sgot
= htab
->root
.sgotplt
;
5431 BFD_ASSERT (sgot
!= NULL
);
5432 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
5434 if (elf_hash_table (info
)->dynamic_sections_created
)
5437 Elf32_External_Dyn
* dyncon
;
5438 Elf32_External_Dyn
* dynconend
;
5440 BFD_ASSERT (sdyn
!= NULL
);
5442 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
5443 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
5445 for (; dyncon
< dynconend
; dyncon
++)
5447 Elf_Internal_Dyn dyn
;
5451 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
5465 s
= bfd_get_section_by_name (output_bfd
, name
);
5466 BFD_ASSERT (s
!= NULL
);
5467 dyn
.d_un
.d_ptr
= s
->vma
;
5468 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
5472 s
= bfd_get_section_by_name (output_bfd
, ".rela.plt");
5473 BFD_ASSERT (s
!= NULL
);
5474 dyn
.d_un
.d_val
= s
->size
;
5475 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
5479 /* My reading of the SVR4 ABI indicates that the
5480 procedure linkage table relocs (DT_JMPREL) should be
5481 included in the overall relocs (DT_RELA). This is
5482 what Solaris does. However, UnixWare can not handle
5483 that case. Therefore, we override the DT_RELASZ entry
5484 here to make it not include the JMPREL relocs. Since
5485 the linker script arranges for .rela.plt to follow all
5486 other relocation sections, we don't have to worry
5487 about changing the DT_RELA entry. */
5488 s
= bfd_get_section_by_name (output_bfd
, ".rela.plt");
5490 dyn
.d_un
.d_val
-= s
->size
;
5491 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
5496 /* Fill in the first entry in the procedure linkage table. */
5497 splt
= htab
->root
.splt
;
5498 if (splt
&& splt
->size
> 0)
5500 if (bfd_link_pic (info
))
5502 memcpy (splt
->contents
, elf_mn10300_pic_plt_entry
,
5503 elf_mn10300_sizeof_plt (info
));
5507 memcpy (splt
->contents
, elf_mn10300_plt0_entry
, PLT0_ENTRY_SIZE
);
5508 bfd_put_32 (output_bfd
,
5509 sgot
->output_section
->vma
+ sgot
->output_offset
+ 4,
5510 splt
->contents
+ elf_mn10300_plt0_gotid_offset (info
));
5511 bfd_put_32 (output_bfd
,
5512 sgot
->output_section
->vma
+ sgot
->output_offset
+ 8,
5513 splt
->contents
+ elf_mn10300_plt0_linker_offset (info
));
5516 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5517 really seem like the right value. */
5518 elf_section_data (splt
->output_section
)->this_hdr
.sh_entsize
= 4;
5520 /* UnixWare sets the entsize of .plt to 4, but this is incorrect
5521 as it means that the size of the PLT0 section (15 bytes) is not
5522 a multiple of the sh_entsize. Some ELF tools flag this as an
5523 error. We could pad PLT0 to 16 bytes, but that would introduce
5524 compatibilty issues with previous toolchains, so instead we
5525 just set the entry size to 1. */
5526 elf_section_data (splt
->output_section
)->this_hdr
.sh_entsize
= 1;
5530 /* Fill in the first three entries in the global offset table. */
5534 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
);
5536 bfd_put_32 (output_bfd
,
5537 sdyn
->output_section
->vma
+ sdyn
->output_offset
,
5539 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 4);
5540 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 8);
5543 elf_section_data (sgot
->output_section
)->this_hdr
.sh_entsize
= 4;
5548 /* Classify relocation types, such that combreloc can sort them
5551 static enum elf_reloc_type_class
5552 _bfd_mn10300_elf_reloc_type_class (const struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
5553 const asection
*rel_sec ATTRIBUTE_UNUSED
,
5554 const Elf_Internal_Rela
*rela
)
5556 switch ((int) ELF32_R_TYPE (rela
->r_info
))
5558 case R_MN10300_RELATIVE
: return reloc_class_relative
;
5559 case R_MN10300_JMP_SLOT
: return reloc_class_plt
;
5560 case R_MN10300_COPY
: return reloc_class_copy
;
5561 default: return reloc_class_normal
;
5565 /* Allocate space for an MN10300 extension to the bfd elf data structure. */
5568 mn10300_elf_mkobject (bfd
*abfd
)
5570 return bfd_elf_allocate_object (abfd
, sizeof (struct elf_mn10300_obj_tdata
),
5574 #define bfd_elf32_mkobject mn10300_elf_mkobject
5577 #define TARGET_LITTLE_SYM mn10300_elf32_vec
5578 #define TARGET_LITTLE_NAME "elf32-mn10300"
5579 #define ELF_ARCH bfd_arch_mn10300
5580 #define ELF_TARGET_ID MN10300_ELF_DATA
5581 #define ELF_MACHINE_CODE EM_MN10300
5582 #define ELF_MACHINE_ALT1 EM_CYGNUS_MN10300
5583 #define ELF_MAXPAGESIZE 0x1000
5586 #define elf_info_to_howto mn10300_info_to_howto
5587 #define elf_info_to_howto_rel 0
5588 #define elf_backend_can_gc_sections 1
5589 #define elf_backend_rela_normal 1
5590 #define elf_backend_check_relocs mn10300_elf_check_relocs
5591 #define elf_backend_gc_mark_hook mn10300_elf_gc_mark_hook
5592 #define elf_backend_relocate_section mn10300_elf_relocate_section
5593 #define bfd_elf32_bfd_relax_section mn10300_elf_relax_section
5594 #define bfd_elf32_bfd_get_relocated_section_contents \
5595 mn10300_elf_get_relocated_section_contents
5596 #define bfd_elf32_bfd_link_hash_table_create \
5597 elf32_mn10300_link_hash_table_create
5599 #ifndef elf_symbol_leading_char
5600 #define elf_symbol_leading_char '_'
5603 /* So we can set bits in e_flags. */
5604 #define elf_backend_final_write_processing \
5605 _bfd_mn10300_elf_final_write_processing
5606 #define elf_backend_object_p _bfd_mn10300_elf_object_p
5608 #define bfd_elf32_bfd_merge_private_bfd_data \
5609 _bfd_mn10300_elf_merge_private_bfd_data
5611 #define elf_backend_can_gc_sections 1
5612 #define elf_backend_create_dynamic_sections \
5613 _bfd_mn10300_elf_create_dynamic_sections
5614 #define elf_backend_adjust_dynamic_symbol \
5615 _bfd_mn10300_elf_adjust_dynamic_symbol
5616 #define elf_backend_size_dynamic_sections \
5617 _bfd_mn10300_elf_size_dynamic_sections
5618 #define elf_backend_omit_section_dynsym \
5619 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
5620 #define elf_backend_finish_dynamic_symbol \
5621 _bfd_mn10300_elf_finish_dynamic_symbol
5622 #define elf_backend_finish_dynamic_sections \
5623 _bfd_mn10300_elf_finish_dynamic_sections
5624 #define elf_backend_copy_indirect_symbol \
5625 _bfd_mn10300_copy_indirect_symbol
5626 #define elf_backend_reloc_type_class \
5627 _bfd_mn10300_elf_reloc_type_class
5629 #define elf_backend_want_got_plt 1
5630 #define elf_backend_plt_readonly 1
5631 #define elf_backend_want_plt_sym 0
5632 #define elf_backend_got_header_size 12
5634 #include "elf32-target.h"