1 /* Matsushita 10300 specific support for 32-bit ELF
2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
3 2006, 2007, 2008, 2009, 2010, 2011, 2012 Free Software Foundation, Inc.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
26 #include "elf/mn10300.h"
27 #include "libiberty.h"
29 /* The mn10300 linker needs to keep track of the number of relocs that
30 it decides to copy in check_relocs for each symbol. This is so
31 that it can discard PC relative relocs if it doesn't need them when
32 linking with -Bsymbolic. We store the information in a field
33 extending the regular ELF linker hash table. */
35 struct elf32_mn10300_link_hash_entry
37 /* The basic elf link hash table entry. */
38 struct elf_link_hash_entry root;
40 /* For function symbols, the number of times this function is
41 called directly (ie by name). */
42 unsigned int direct_calls;
44 /* For function symbols, the size of this function's stack
45 (if <= 255 bytes). We stuff this into "call" instructions
46 to this target when it's valid and profitable to do so.
48 This does not include stack allocated by movm! */
49 unsigned char stack_size;
51 /* For function symbols, arguments (if any) for movm instruction
52 in the prologue. We stuff this value into "call" instructions
53 to the target when it's valid and profitable to do so. */
54 unsigned char movm_args;
56 /* For function symbols, the amount of stack space that would be allocated
57 by the movm instruction. This is redundant with movm_args, but we
58 add it to the hash table to avoid computing it over and over. */
59 unsigned char movm_stack_size;
61 /* When set, convert all "call" instructions to this target into "calls"
63 #define MN10300_CONVERT_CALL_TO_CALLS 0x1
65 /* Used to mark functions which have had redundant parts of their
67 #define MN10300_DELETED_PROLOGUE_BYTES 0x2
70 /* Calculated value. */
78 /* Used to distinguish GOT entries for TLS types from normal GOT entries. */
79 unsigned char tls_type;
82 /* We derive a hash table from the main elf linker hash table so
83 we can store state variables and a secondary hash table without
84 resorting to global variables. */
85 struct elf32_mn10300_link_hash_table
87 /* The main hash table. */
88 struct elf_link_hash_table root;
90 /* A hash table for static functions. We could derive a new hash table
91 instead of using the full elf32_mn10300_link_hash_table if we wanted
92 to save some memory. */
93 struct elf32_mn10300_link_hash_table *static_hash_table;
95 /* Random linker state flags. */
96 #define MN10300_HASH_ENTRIES_INITIALIZED 0x1
100 bfd_signed_vma refcount;
107 #define elf_mn10300_hash_entry(ent) ((struct elf32_mn10300_link_hash_entry *)(ent))
109 struct elf_mn10300_obj_tdata
111 struct elf_obj_tdata root;
113 /* tls_type for each local got entry. */
114 char * local_got_tls_type;
117 #define elf_mn10300_tdata(abfd) \
118 ((struct elf_mn10300_obj_tdata *) (abfd)->tdata.any)
120 #define elf_mn10300_local_got_tls_type(abfd) \
121 (elf_mn10300_tdata (abfd)->local_got_tls_type)
124 #define streq(a, b) (strcmp ((a),(b)) == 0)
127 /* For MN10300 linker hash table. */
129 /* Get the MN10300 ELF linker hash table from a link_info structure. */
131 #define elf32_mn10300_hash_table(p) \
132 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
133 == MN10300_ELF_DATA ? ((struct elf32_mn10300_link_hash_table *) ((p)->hash)) : NULL)
135 #define elf32_mn10300_link_hash_traverse(table, func, info) \
136 (elf_link_hash_traverse \
138 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
141 static reloc_howto_type elf_mn10300_howto_table[] =
143 /* Dummy relocation. Does nothing. */
144 HOWTO (R_MN10300_NONE,
150 complain_overflow_bitfield,
151 bfd_elf_generic_reloc,
157 /* Standard 32 bit reloc. */
164 complain_overflow_bitfield,
165 bfd_elf_generic_reloc,
171 /* Standard 16 bit reloc. */
178 complain_overflow_bitfield,
179 bfd_elf_generic_reloc,
185 /* Standard 8 bit reloc. */
192 complain_overflow_bitfield,
193 bfd_elf_generic_reloc,
199 /* Standard 32bit pc-relative reloc. */
200 HOWTO (R_MN10300_PCREL32,
206 complain_overflow_bitfield,
207 bfd_elf_generic_reloc,
213 /* Standard 16bit pc-relative reloc. */
214 HOWTO (R_MN10300_PCREL16,
220 complain_overflow_bitfield,
221 bfd_elf_generic_reloc,
227 /* Standard 8 pc-relative reloc. */
228 HOWTO (R_MN10300_PCREL8,
234 complain_overflow_bitfield,
235 bfd_elf_generic_reloc,
242 /* GNU extension to record C++ vtable hierarchy. */
243 HOWTO (R_MN10300_GNU_VTINHERIT, /* type */
245 0, /* size (0 = byte, 1 = short, 2 = long) */
247 FALSE, /* pc_relative */
249 complain_overflow_dont, /* complain_on_overflow */
250 NULL, /* special_function */
251 "R_MN10300_GNU_VTINHERIT", /* name */
252 FALSE, /* partial_inplace */
255 FALSE), /* pcrel_offset */
257 /* GNU extension to record C++ vtable member usage */
258 HOWTO (R_MN10300_GNU_VTENTRY, /* type */
260 0, /* size (0 = byte, 1 = short, 2 = long) */
262 FALSE, /* pc_relative */
264 complain_overflow_dont, /* complain_on_overflow */
265 NULL, /* special_function */
266 "R_MN10300_GNU_VTENTRY", /* name */
267 FALSE, /* partial_inplace */
270 FALSE), /* pcrel_offset */
272 /* Standard 24 bit reloc. */
279 complain_overflow_bitfield,
280 bfd_elf_generic_reloc,
286 HOWTO (R_MN10300_GOTPC32, /* type */
288 2, /* size (0 = byte, 1 = short, 2 = long) */
290 TRUE, /* pc_relative */
292 complain_overflow_bitfield, /* complain_on_overflow */
293 bfd_elf_generic_reloc, /* */
294 "R_MN10300_GOTPC32", /* name */
295 FALSE, /* partial_inplace */
296 0xffffffff, /* src_mask */
297 0xffffffff, /* dst_mask */
298 TRUE), /* pcrel_offset */
300 HOWTO (R_MN10300_GOTPC16, /* type */
302 1, /* size (0 = byte, 1 = short, 2 = long) */
304 TRUE, /* pc_relative */
306 complain_overflow_bitfield, /* complain_on_overflow */
307 bfd_elf_generic_reloc, /* */
308 "R_MN10300_GOTPC16", /* name */
309 FALSE, /* partial_inplace */
310 0xffff, /* src_mask */
311 0xffff, /* dst_mask */
312 TRUE), /* pcrel_offset */
314 HOWTO (R_MN10300_GOTOFF32, /* type */
316 2, /* size (0 = byte, 1 = short, 2 = long) */
318 FALSE, /* pc_relative */
320 complain_overflow_bitfield, /* complain_on_overflow */
321 bfd_elf_generic_reloc, /* */
322 "R_MN10300_GOTOFF32", /* name */
323 FALSE, /* partial_inplace */
324 0xffffffff, /* src_mask */
325 0xffffffff, /* dst_mask */
326 FALSE), /* pcrel_offset */
328 HOWTO (R_MN10300_GOTOFF24, /* type */
330 2, /* size (0 = byte, 1 = short, 2 = long) */
332 FALSE, /* pc_relative */
334 complain_overflow_bitfield, /* complain_on_overflow */
335 bfd_elf_generic_reloc, /* */
336 "R_MN10300_GOTOFF24", /* name */
337 FALSE, /* partial_inplace */
338 0xffffff, /* src_mask */
339 0xffffff, /* dst_mask */
340 FALSE), /* pcrel_offset */
342 HOWTO (R_MN10300_GOTOFF16, /* type */
344 1, /* size (0 = byte, 1 = short, 2 = long) */
346 FALSE, /* pc_relative */
348 complain_overflow_bitfield, /* complain_on_overflow */
349 bfd_elf_generic_reloc, /* */
350 "R_MN10300_GOTOFF16", /* name */
351 FALSE, /* partial_inplace */
352 0xffff, /* src_mask */
353 0xffff, /* dst_mask */
354 FALSE), /* pcrel_offset */
356 HOWTO (R_MN10300_PLT32, /* type */
358 2, /* size (0 = byte, 1 = short, 2 = long) */
360 TRUE, /* pc_relative */
362 complain_overflow_bitfield, /* complain_on_overflow */
363 bfd_elf_generic_reloc, /* */
364 "R_MN10300_PLT32", /* name */
365 FALSE, /* partial_inplace */
366 0xffffffff, /* src_mask */
367 0xffffffff, /* dst_mask */
368 TRUE), /* pcrel_offset */
370 HOWTO (R_MN10300_PLT16, /* type */
372 1, /* size (0 = byte, 1 = short, 2 = long) */
374 TRUE, /* pc_relative */
376 complain_overflow_bitfield, /* complain_on_overflow */
377 bfd_elf_generic_reloc, /* */
378 "R_MN10300_PLT16", /* name */
379 FALSE, /* partial_inplace */
380 0xffff, /* src_mask */
381 0xffff, /* dst_mask */
382 TRUE), /* pcrel_offset */
384 HOWTO (R_MN10300_GOT32, /* type */
386 2, /* size (0 = byte, 1 = short, 2 = long) */
388 FALSE, /* pc_relative */
390 complain_overflow_bitfield, /* complain_on_overflow */
391 bfd_elf_generic_reloc, /* */
392 "R_MN10300_GOT32", /* name */
393 FALSE, /* partial_inplace */
394 0xffffffff, /* src_mask */
395 0xffffffff, /* dst_mask */
396 FALSE), /* pcrel_offset */
398 HOWTO (R_MN10300_GOT24, /* type */
400 2, /* size (0 = byte, 1 = short, 2 = long) */
402 FALSE, /* pc_relative */
404 complain_overflow_bitfield, /* complain_on_overflow */
405 bfd_elf_generic_reloc, /* */
406 "R_MN10300_GOT24", /* name */
407 FALSE, /* partial_inplace */
408 0xffffffff, /* src_mask */
409 0xffffffff, /* dst_mask */
410 FALSE), /* pcrel_offset */
412 HOWTO (R_MN10300_GOT16, /* type */
414 1, /* size (0 = byte, 1 = short, 2 = long) */
416 FALSE, /* pc_relative */
418 complain_overflow_bitfield, /* complain_on_overflow */
419 bfd_elf_generic_reloc, /* */
420 "R_MN10300_GOT16", /* name */
421 FALSE, /* partial_inplace */
422 0xffffffff, /* src_mask */
423 0xffffffff, /* dst_mask */
424 FALSE), /* pcrel_offset */
426 HOWTO (R_MN10300_COPY, /* type */
428 2, /* size (0 = byte, 1 = short, 2 = long) */
430 FALSE, /* pc_relative */
432 complain_overflow_bitfield, /* complain_on_overflow */
433 bfd_elf_generic_reloc, /* */
434 "R_MN10300_COPY", /* name */
435 FALSE, /* partial_inplace */
436 0xffffffff, /* src_mask */
437 0xffffffff, /* dst_mask */
438 FALSE), /* pcrel_offset */
440 HOWTO (R_MN10300_GLOB_DAT, /* type */
442 2, /* size (0 = byte, 1 = short, 2 = long) */
444 FALSE, /* pc_relative */
446 complain_overflow_bitfield, /* complain_on_overflow */
447 bfd_elf_generic_reloc, /* */
448 "R_MN10300_GLOB_DAT", /* name */
449 FALSE, /* partial_inplace */
450 0xffffffff, /* src_mask */
451 0xffffffff, /* dst_mask */
452 FALSE), /* pcrel_offset */
454 HOWTO (R_MN10300_JMP_SLOT, /* type */
456 2, /* size (0 = byte, 1 = short, 2 = long) */
458 FALSE, /* pc_relative */
460 complain_overflow_bitfield, /* complain_on_overflow */
461 bfd_elf_generic_reloc, /* */
462 "R_MN10300_JMP_SLOT", /* name */
463 FALSE, /* partial_inplace */
464 0xffffffff, /* src_mask */
465 0xffffffff, /* dst_mask */
466 FALSE), /* pcrel_offset */
468 HOWTO (R_MN10300_RELATIVE, /* type */
470 2, /* size (0 = byte, 1 = short, 2 = long) */
472 FALSE, /* pc_relative */
474 complain_overflow_bitfield, /* complain_on_overflow */
475 bfd_elf_generic_reloc, /* */
476 "R_MN10300_RELATIVE", /* name */
477 FALSE, /* partial_inplace */
478 0xffffffff, /* src_mask */
479 0xffffffff, /* dst_mask */
480 FALSE), /* pcrel_offset */
482 HOWTO (R_MN10300_TLS_GD, /* type */
484 2, /* size (0 = byte, 1 = short, 2 = long) */
486 FALSE, /* pc_relative */
488 complain_overflow_bitfield, /* complain_on_overflow */
489 bfd_elf_generic_reloc, /* */
490 "R_MN10300_TLS_GD", /* name */
491 FALSE, /* partial_inplace */
492 0xffffffff, /* src_mask */
493 0xffffffff, /* dst_mask */
494 FALSE), /* pcrel_offset */
496 HOWTO (R_MN10300_TLS_LD, /* type */
498 2, /* size (0 = byte, 1 = short, 2 = long) */
500 FALSE, /* pc_relative */
502 complain_overflow_bitfield, /* complain_on_overflow */
503 bfd_elf_generic_reloc, /* */
504 "R_MN10300_TLS_LD", /* name */
505 FALSE, /* partial_inplace */
506 0xffffffff, /* src_mask */
507 0xffffffff, /* dst_mask */
508 FALSE), /* pcrel_offset */
510 HOWTO (R_MN10300_TLS_LDO, /* type */
512 2, /* size (0 = byte, 1 = short, 2 = long) */
514 FALSE, /* pc_relative */
516 complain_overflow_bitfield, /* complain_on_overflow */
517 bfd_elf_generic_reloc, /* */
518 "R_MN10300_TLS_LDO", /* name */
519 FALSE, /* partial_inplace */
520 0xffffffff, /* src_mask */
521 0xffffffff, /* dst_mask */
522 FALSE), /* pcrel_offset */
524 HOWTO (R_MN10300_TLS_GOTIE, /* type */
526 2, /* size (0 = byte, 1 = short, 2 = long) */
528 FALSE, /* pc_relative */
530 complain_overflow_bitfield, /* complain_on_overflow */
531 bfd_elf_generic_reloc, /* */
532 "R_MN10300_TLS_GOTIE", /* name */
533 FALSE, /* partial_inplace */
534 0xffffffff, /* src_mask */
535 0xffffffff, /* dst_mask */
536 FALSE), /* pcrel_offset */
538 HOWTO (R_MN10300_TLS_IE, /* type */
540 2, /* size (0 = byte, 1 = short, 2 = long) */
542 FALSE, /* pc_relative */
544 complain_overflow_bitfield, /* complain_on_overflow */
545 bfd_elf_generic_reloc, /* */
546 "R_MN10300_TLS_IE", /* name */
547 FALSE, /* partial_inplace */
548 0xffffffff, /* src_mask */
549 0xffffffff, /* dst_mask */
550 FALSE), /* pcrel_offset */
552 HOWTO (R_MN10300_TLS_LE, /* type */
554 2, /* size (0 = byte, 1 = short, 2 = long) */
556 FALSE, /* pc_relative */
558 complain_overflow_bitfield, /* complain_on_overflow */
559 bfd_elf_generic_reloc, /* */
560 "R_MN10300_TLS_LE", /* name */
561 FALSE, /* partial_inplace */
562 0xffffffff, /* src_mask */
563 0xffffffff, /* dst_mask */
564 FALSE), /* pcrel_offset */
566 HOWTO (R_MN10300_TLS_DTPMOD, /* type */
568 2, /* size (0 = byte, 1 = short, 2 = long) */
570 FALSE, /* pc_relative */
572 complain_overflow_bitfield, /* complain_on_overflow */
573 bfd_elf_generic_reloc, /* */
574 "R_MN10300_TLS_DTPMOD", /* name */
575 FALSE, /* partial_inplace */
576 0xffffffff, /* src_mask */
577 0xffffffff, /* dst_mask */
578 FALSE), /* pcrel_offset */
580 HOWTO (R_MN10300_TLS_DTPOFF, /* type */
582 2, /* size (0 = byte, 1 = short, 2 = long) */
584 FALSE, /* pc_relative */
586 complain_overflow_bitfield, /* complain_on_overflow */
587 bfd_elf_generic_reloc, /* */
588 "R_MN10300_TLS_DTPOFF", /* name */
589 FALSE, /* partial_inplace */
590 0xffffffff, /* src_mask */
591 0xffffffff, /* dst_mask */
592 FALSE), /* pcrel_offset */
594 HOWTO (R_MN10300_TLS_TPOFF, /* type */
596 2, /* size (0 = byte, 1 = short, 2 = long) */
598 FALSE, /* pc_relative */
600 complain_overflow_bitfield, /* complain_on_overflow */
601 bfd_elf_generic_reloc, /* */
602 "R_MN10300_TLS_TPOFF", /* name */
603 FALSE, /* partial_inplace */
604 0xffffffff, /* src_mask */
605 0xffffffff, /* dst_mask */
606 FALSE), /* pcrel_offset */
608 HOWTO (R_MN10300_SYM_DIFF, /* type */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
612 FALSE, /* pc_relative */
614 complain_overflow_dont,/* complain_on_overflow */
615 NULL, /* special handler. */
616 "R_MN10300_SYM_DIFF", /* name */
617 FALSE, /* partial_inplace */
618 0xffffffff, /* src_mask */
619 0xffffffff, /* dst_mask */
620 FALSE), /* pcrel_offset */
622 HOWTO (R_MN10300_ALIGN, /* type */
624 0, /* size (0 = byte, 1 = short, 2 = long) */
626 FALSE, /* pc_relative */
628 complain_overflow_dont,/* complain_on_overflow */
629 NULL, /* special handler. */
630 "R_MN10300_ALIGN", /* name */
631 FALSE, /* partial_inplace */
634 FALSE) /* pcrel_offset */
637 struct mn10300_reloc_map
639 bfd_reloc_code_real_type bfd_reloc_val;
640 unsigned char elf_reloc_val;
643 static const struct mn10300_reloc_map mn10300_reloc_map[] =
645 { BFD_RELOC_NONE, R_MN10300_NONE, },
646 { BFD_RELOC_32, R_MN10300_32, },
647 { BFD_RELOC_16, R_MN10300_16, },
648 { BFD_RELOC_8, R_MN10300_8, },
649 { BFD_RELOC_32_PCREL, R_MN10300_PCREL32, },
650 { BFD_RELOC_16_PCREL, R_MN10300_PCREL16, },
651 { BFD_RELOC_8_PCREL, R_MN10300_PCREL8, },
652 { BFD_RELOC_24, R_MN10300_24, },
653 { BFD_RELOC_VTABLE_INHERIT, R_MN10300_GNU_VTINHERIT },
654 { BFD_RELOC_VTABLE_ENTRY, R_MN10300_GNU_VTENTRY },
655 { BFD_RELOC_32_GOT_PCREL, R_MN10300_GOTPC32 },
656 { BFD_RELOC_16_GOT_PCREL, R_MN10300_GOTPC16 },
657 { BFD_RELOC_32_GOTOFF, R_MN10300_GOTOFF32 },
658 { BFD_RELOC_MN10300_GOTOFF24, R_MN10300_GOTOFF24 },
659 { BFD_RELOC_16_GOTOFF, R_MN10300_GOTOFF16 },
660 { BFD_RELOC_32_PLT_PCREL, R_MN10300_PLT32 },
661 { BFD_RELOC_16_PLT_PCREL, R_MN10300_PLT16 },
662 { BFD_RELOC_MN10300_GOT32, R_MN10300_GOT32 },
663 { BFD_RELOC_MN10300_GOT24, R_MN10300_GOT24 },
664 { BFD_RELOC_MN10300_GOT16, R_MN10300_GOT16 },
665 { BFD_RELOC_MN10300_COPY, R_MN10300_COPY },
666 { BFD_RELOC_MN10300_GLOB_DAT, R_MN10300_GLOB_DAT },
667 { BFD_RELOC_MN10300_JMP_SLOT, R_MN10300_JMP_SLOT },
668 { BFD_RELOC_MN10300_RELATIVE, R_MN10300_RELATIVE },
669 { BFD_RELOC_MN10300_TLS_GD, R_MN10300_TLS_GD },
670 { BFD_RELOC_MN10300_TLS_LD, R_MN10300_TLS_LD },
671 { BFD_RELOC_MN10300_TLS_LDO, R_MN10300_TLS_LDO },
672 { BFD_RELOC_MN10300_TLS_GOTIE, R_MN10300_TLS_GOTIE },
673 { BFD_RELOC_MN10300_TLS_IE, R_MN10300_TLS_IE },
674 { BFD_RELOC_MN10300_TLS_LE, R_MN10300_TLS_LE },
675 { BFD_RELOC_MN10300_TLS_DTPMOD, R_MN10300_TLS_DTPMOD },
676 { BFD_RELOC_MN10300_TLS_DTPOFF, R_MN10300_TLS_DTPOFF },
677 { BFD_RELOC_MN10300_TLS_TPOFF, R_MN10300_TLS_TPOFF },
678 { BFD_RELOC_MN10300_SYM_DIFF, R_MN10300_SYM_DIFF },
679 { BFD_RELOC_MN10300_ALIGN, R_MN10300_ALIGN }
682 /* Create the GOT section. */
685 _bfd_mn10300_elf_create_got_section (bfd * abfd,
686 struct bfd_link_info * info)
691 struct elf_link_hash_entry * h;
692 const struct elf_backend_data * bed = get_elf_backend_data (abfd);
693 struct elf_link_hash_table *htab;
696 /* This function may be called more than once. */
697 htab = elf_hash_table (info);
698 if (htab->sgot != NULL)
701 switch (bed->s->arch_size)
712 bfd_set_error (bfd_error_bad_value);
716 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
717 | SEC_LINKER_CREATED);
720 pltflags |= SEC_CODE;
721 if (bed->plt_not_loaded)
722 pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
723 if (bed->plt_readonly)
724 pltflags |= SEC_READONLY;
726 s = bfd_make_section_anyway_with_flags (abfd, ".plt", pltflags);
729 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
732 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
734 if (bed->want_plt_sym)
736 h = _bfd_elf_define_linkage_sym (abfd, info, s,
737 "_PROCEDURE_LINKAGE_TABLE_");
743 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
746 || ! bfd_set_section_alignment (abfd, s, ptralign))
749 if (bed->want_got_plt)
751 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
754 || ! bfd_set_section_alignment (abfd, s, ptralign))
758 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
759 (or .got.plt) section. We don't do this in the linker script
760 because we don't want to define the symbol if we are not creating
761 a global offset table. */
762 h = _bfd_elf_define_linkage_sym (abfd, info, s, "_GLOBAL_OFFSET_TABLE_");
767 /* The first bit of the global offset table is the header. */
768 s->size += bed->got_header_size;
773 static reloc_howto_type *
774 bfd_elf32_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
775 bfd_reloc_code_real_type code)
779 for (i = ARRAY_SIZE (mn10300_reloc_map); i--;)
780 if (mn10300_reloc_map[i].bfd_reloc_val == code)
781 return &elf_mn10300_howto_table[mn10300_reloc_map[i].elf_reloc_val];
786 static reloc_howto_type *
787 bfd_elf32_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
792 for (i = ARRAY_SIZE (elf_mn10300_howto_table); i--;)
793 if (elf_mn10300_howto_table[i].name != NULL
794 && strcasecmp (elf_mn10300_howto_table[i].name, r_name) == 0)
795 return elf_mn10300_howto_table + i;
800 /* Set the howto pointer for an MN10300 ELF reloc. */
803 mn10300_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
805 Elf_Internal_Rela *dst)
809 r_type = ELF32_R_TYPE (dst->r_info);
810 BFD_ASSERT (r_type < (unsigned int) R_MN10300_MAX);
811 cache_ptr->howto = elf_mn10300_howto_table + r_type;
815 elf_mn10300_tls_transition (struct bfd_link_info * info,
817 struct elf_link_hash_entry * h,
819 bfd_boolean counting)
821 bfd_boolean is_local;
823 if (r_type == R_MN10300_TLS_GD
825 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_IE)
826 return R_MN10300_TLS_GOTIE;
831 if (! (sec->flags & SEC_CODE))
834 if (! counting && h != NULL && ! elf_hash_table (info)->dynamic_sections_created)
837 is_local = SYMBOL_CALLS_LOCAL (info, h);
839 /* For the main program, these are the transitions we do. */
842 case R_MN10300_TLS_GD: return is_local ? R_MN10300_TLS_LE : R_MN10300_TLS_GOTIE;
843 case R_MN10300_TLS_LD: return R_MN10300_NONE;
844 case R_MN10300_TLS_LDO: return R_MN10300_TLS_LE;
845 case R_MN10300_TLS_IE:
846 case R_MN10300_TLS_GOTIE: return is_local ? R_MN10300_TLS_LE : r_type;
852 /* Return the relocation value for @tpoff relocation
853 if STT_TLS virtual address is ADDRESS. */
856 dtpoff (struct bfd_link_info * info, bfd_vma address)
858 struct elf_link_hash_table *htab = elf_hash_table (info);
860 /* If tls_sec is NULL, we should have signalled an error already. */
861 if (htab->tls_sec == NULL)
863 return address - htab->tls_sec->vma;
866 /* Return the relocation value for @tpoff relocation
867 if STT_TLS virtual address is ADDRESS. */
870 tpoff (struct bfd_link_info * info, bfd_vma address)
872 struct elf_link_hash_table *htab = elf_hash_table (info);
874 /* If tls_sec is NULL, we should have signalled an error already. */
875 if (htab->tls_sec == NULL)
877 return address - (htab->tls_size + htab->tls_sec->vma);
880 /* Returns nonzero if there's a R_MN10300_PLT32 reloc that we now need
881 to skip, after this one. The actual value is the offset between
882 this reloc and the PLT reloc. */
885 mn10300_do_tls_transition (bfd * input_bfd,
887 unsigned int tls_r_type,
891 bfd_byte *op = contents + offset;
894 #define TLS_PAIR(r1,r2) ((r1) * R_MN10300_MAX + (r2))
896 /* This is common to all GD/LD transitions, so break it out. */
897 if (r_type == R_MN10300_TLS_GD
898 || r_type == R_MN10300_TLS_LD)
902 BFD_ASSERT (bfd_get_8 (input_bfd, op) == 0xFC);
903 BFD_ASSERT (bfd_get_8 (input_bfd, op + 1) == 0xCC);
905 BFD_ASSERT (bfd_get_8 (input_bfd, op + 6) == 0xF1);
906 gotreg = (bfd_get_8 (input_bfd, op + 7) & 0x0c) >> 2;
908 BFD_ASSERT (bfd_get_8 (input_bfd, op + 8) == 0xDD);
911 switch (TLS_PAIR (r_type, tls_r_type))
913 case TLS_PAIR (R_MN10300_TLS_GD, R_MN10300_TLS_GOTIE):
915 /* Keep track of which register we put GOTptr in. */
916 /* mov (_x@indntpoff,a2),a0. */
917 memcpy (op, "\xFC\x20\x00\x00\x00\x00", 6);
920 memcpy (op+6, "\xF9\x78\x28", 3);
921 /* or 0x00000000, d0 - six byte nop. */
922 memcpy (op+9, "\xFC\xE4\x00\x00\x00\x00", 6);
926 case TLS_PAIR (R_MN10300_TLS_GD, R_MN10300_TLS_LE):
928 /* Register is *always* a0. */
929 /* mov _x@tpoff,a0. */
930 memcpy (op, "\xFC\xDC\x00\x00\x00\x00", 6);
932 memcpy (op+6, "\xF9\x78\x28", 3);
933 /* or 0x00000000, d0 - six byte nop. */
934 memcpy (op+9, "\xFC\xE4\x00\x00\x00\x00", 6);
937 case TLS_PAIR (R_MN10300_TLS_LD, R_MN10300_NONE):
939 /* Register is *always* a0. */
941 memcpy (op, "\xF5\x88", 2);
942 /* or 0x00000000, d0 - six byte nop. */
943 memcpy (op+2, "\xFC\xE4\x00\x00\x00\x00", 6);
944 /* or 0x00000000, e2 - seven byte nop. */
945 memcpy (op+8, "\xFE\x19\x22\x00\x00\x00\x00", 7);
949 case TLS_PAIR (R_MN10300_TLS_LDO, R_MN10300_TLS_LE):
950 /* No changes needed, just the reloc change. */
953 /* These are a little tricky, because we have to detect which
954 opcode is being used (they're different sizes, with the reloc
955 at different offsets within the opcode) and convert each
956 accordingly, copying the operands as needed. The conversions
957 we do are as follows (IE,GOTIE,LE):
959 1111 1100 1010 01Dn [-- abs32 --] MOV (x@indntpoff),Dn
960 1111 1100 0000 DnAm [-- abs32 --] MOV (x@gotntpoff,Am),Dn
961 1111 1100 1100 11Dn [-- abs32 --] MOV x@tpoff,Dn
963 1111 1100 1010 00An [-- abs32 --] MOV (x@indntpoff),An
964 1111 1100 0010 AnAm [-- abs32 --] MOV (x@gotntpoff,Am),An
965 1111 1100 1101 11An [-- abs32 --] MOV x@tpoff,An
967 1111 1110 0000 1110 Rnnn Xxxx [-- abs32 --] MOV (x@indntpoff),Rn
968 1111 1110 0000 1010 Rnnn Rmmm [-- abs32 --] MOV (x@indntpoff,Rm),Rn
969 1111 1110 0000 1000 Rnnn Xxxx [-- abs32 --] MOV x@tpoff,Rn
971 Since the GOT pointer is always $a2, we assume the last
972 normally won't happen, but let's be paranoid and plan for the
973 day that GCC optimizes it somewhow. */
975 case TLS_PAIR (R_MN10300_TLS_IE, R_MN10300_TLS_LE):
979 if ((op[1] & 0xFC) == 0xA4) /* Dn */
981 op[1] &= 0x03; /* Leaves Dn. */
986 op[1] &= 0x03; /* Leaves An. */
990 else if (op[-3] == 0xFE)
996 case TLS_PAIR (R_MN10300_TLS_GOTIE, R_MN10300_TLS_LE):
1000 if ((op[1] & 0xF0) == 0x00) /* Dn */
1002 op[1] &= 0x0C; /* Leaves Dn. */
1008 op[1] &= 0x0C; /* Leaves An. */
1013 else if (op[-3] == 0xFE)
1020 (*_bfd_error_handler)
1021 (_("%s: Unsupported transition from %s to %s"),
1022 bfd_get_filename (input_bfd),
1023 elf_mn10300_howto_table[r_type].name,
1024 elf_mn10300_howto_table[tls_r_type].name);
1031 /* Look through the relocs for a section during the first phase.
1032 Since we don't do .gots or .plts, we just need to consider the
1033 virtual table relocs for gc. */
1036 mn10300_elf_check_relocs (bfd *abfd,
1037 struct bfd_link_info *info,
1039 const Elf_Internal_Rela *relocs)
1041 struct elf32_mn10300_link_hash_table * htab = elf32_mn10300_hash_table (info);
1042 bfd_boolean sym_diff_reloc_seen;
1043 Elf_Internal_Shdr *symtab_hdr;
1044 Elf_Internal_Sym * isymbuf = NULL;
1045 struct elf_link_hash_entry **sym_hashes;
1046 const Elf_Internal_Rela *rel;
1047 const Elf_Internal_Rela *rel_end;
1049 bfd_vma * local_got_offsets;
1053 bfd_boolean result = FALSE;
1059 if (info->relocatable)
1062 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1063 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
1064 sym_hashes = elf_sym_hashes (abfd);
1066 dynobj = elf_hash_table (info)->dynobj;
1067 local_got_offsets = elf_local_got_offsets (abfd);
1068 rel_end = relocs + sec->reloc_count;
1069 sym_diff_reloc_seen = FALSE;
1071 for (rel = relocs; rel < rel_end; rel++)
1073 struct elf_link_hash_entry *h;
1074 unsigned long r_symndx;
1075 unsigned int r_type;
1076 int tls_type = GOT_NORMAL;
1078 r_symndx = ELF32_R_SYM (rel->r_info);
1079 if (r_symndx < symtab_hdr->sh_info)
1083 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1084 while (h->root.type == bfd_link_hash_indirect
1085 || h->root.type == bfd_link_hash_warning)
1086 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1088 /* PR15323, ref flags aren't set for references in the same
1090 h->root.non_ir_ref = 1;
1093 r_type = ELF32_R_TYPE (rel->r_info);
1094 r_type = elf_mn10300_tls_transition (info, r_type, h, sec, TRUE);
1096 /* Some relocs require a global offset table. */
1101 case R_MN10300_GOT32:
1102 case R_MN10300_GOT24:
1103 case R_MN10300_GOT16:
1104 case R_MN10300_GOTOFF32:
1105 case R_MN10300_GOTOFF24:
1106 case R_MN10300_GOTOFF16:
1107 case R_MN10300_GOTPC32:
1108 case R_MN10300_GOTPC16:
1109 case R_MN10300_TLS_GD:
1110 case R_MN10300_TLS_LD:
1111 case R_MN10300_TLS_GOTIE:
1112 case R_MN10300_TLS_IE:
1113 elf_hash_table (info)->dynobj = dynobj = abfd;
1114 if (! _bfd_mn10300_elf_create_got_section (dynobj, info))
1125 /* This relocation describes the C++ object vtable hierarchy.
1126 Reconstruct it for later use during GC. */
1127 case R_MN10300_GNU_VTINHERIT:
1128 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1132 /* This relocation describes which C++ vtable entries are actually
1133 used. Record for later use during GC. */
1134 case R_MN10300_GNU_VTENTRY:
1135 BFD_ASSERT (h != NULL);
1137 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1141 case R_MN10300_TLS_LD:
1142 htab->tls_ldm_got.refcount ++;
1143 tls_type = GOT_TLS_LD;
1145 if (htab->tls_ldm_got.got_allocated)
1149 case R_MN10300_TLS_IE:
1150 case R_MN10300_TLS_GOTIE:
1152 info->flags |= DF_STATIC_TLS;
1155 case R_MN10300_TLS_GD:
1156 case R_MN10300_GOT32:
1157 case R_MN10300_GOT24:
1158 case R_MN10300_GOT16:
1160 /* This symbol requires a global offset table entry. */
1164 case R_MN10300_TLS_IE:
1165 case R_MN10300_TLS_GOTIE: tls_type = GOT_TLS_IE; break;
1166 case R_MN10300_TLS_GD: tls_type = GOT_TLS_GD; break;
1167 default: tls_type = GOT_NORMAL; break;
1172 sgot = htab->root.sgot;
1173 BFD_ASSERT (sgot != NULL);
1177 && (h != NULL || info->shared))
1179 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1180 if (srelgot == NULL)
1182 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1183 | SEC_IN_MEMORY | SEC_LINKER_CREATED
1185 srelgot = bfd_make_section_anyway_with_flags (dynobj,
1189 || ! bfd_set_section_alignment (dynobj, srelgot, 2))
1194 if (r_type == R_MN10300_TLS_LD)
1196 htab->tls_ldm_got.offset = sgot->size;
1197 htab->tls_ldm_got.got_allocated ++;
1201 if (elf_mn10300_hash_entry (h)->tls_type != tls_type
1202 && elf_mn10300_hash_entry (h)->tls_type != GOT_UNKNOWN)
1204 if (tls_type == GOT_TLS_IE
1205 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_GD)
1206 /* No change - this is ok. */;
1207 else if (tls_type == GOT_TLS_GD
1208 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_IE)
1209 /* Transition GD->IE. */
1210 tls_type = GOT_TLS_IE;
1212 (*_bfd_error_handler)
1213 (_("%B: %s' accessed both as normal and thread local symbol"),
1214 abfd, h ? h->root.root.string : "<local>");
1217 elf_mn10300_hash_entry (h)->tls_type = tls_type;
1219 if (h->got.offset != (bfd_vma) -1)
1220 /* We have already allocated space in the .got. */
1223 h->got.offset = sgot->size;
1225 if (ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1226 /* Make sure this symbol is output as a dynamic symbol. */
1227 && h->dynindx == -1)
1229 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1233 srelgot->size += sizeof (Elf32_External_Rela);
1234 if (r_type == R_MN10300_TLS_GD)
1235 srelgot->size += sizeof (Elf32_External_Rela);
1239 /* This is a global offset table entry for a local
1241 if (local_got_offsets == NULL)
1246 size = symtab_hdr->sh_info * (sizeof (bfd_vma) + sizeof (char));
1247 local_got_offsets = bfd_alloc (abfd, size);
1249 if (local_got_offsets == NULL)
1252 elf_local_got_offsets (abfd) = local_got_offsets;
1253 elf_mn10300_local_got_tls_type (abfd)
1254 = (char *) (local_got_offsets + symtab_hdr->sh_info);
1256 for (i = 0; i < symtab_hdr->sh_info; i++)
1257 local_got_offsets[i] = (bfd_vma) -1;
1260 if (local_got_offsets[r_symndx] != (bfd_vma) -1)
1261 /* We have already allocated space in the .got. */
1264 local_got_offsets[r_symndx] = sgot->size;
1268 /* If we are generating a shared object, we need to
1269 output a R_MN10300_RELATIVE reloc so that the dynamic
1270 linker can adjust this GOT entry. */
1271 srelgot->size += sizeof (Elf32_External_Rela);
1273 if (r_type == R_MN10300_TLS_GD)
1274 /* And a R_MN10300_TLS_DTPOFF reloc as well. */
1275 srelgot->size += sizeof (Elf32_External_Rela);
1278 elf_mn10300_local_got_tls_type (abfd) [r_symndx] = tls_type;
1282 if (r_type == R_MN10300_TLS_GD
1283 || r_type == R_MN10300_TLS_LD)
1286 goto need_shared_relocs;
1288 case R_MN10300_PLT32:
1289 case R_MN10300_PLT16:
1290 /* This symbol requires a procedure linkage table entry. We
1291 actually build the entry in adjust_dynamic_symbol,
1292 because this might be a case of linking PIC code which is
1293 never referenced by a dynamic object, in which case we
1294 don't need to generate a procedure linkage table entry
1297 /* If this is a local symbol, we resolve it directly without
1298 creating a procedure linkage table entry. */
1302 if (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
1303 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN)
1312 case R_MN10300_PCREL32:
1313 case R_MN10300_PCREL16:
1314 case R_MN10300_PCREL8:
1319 case R_MN10300_SYM_DIFF:
1320 sym_diff_reloc_seen = TRUE;
1328 /* If we are creating a shared library, then we
1329 need to copy the reloc into the shared library. */
1331 && (sec->flags & SEC_ALLOC) != 0
1332 /* Do not generate a dynamic reloc for a
1333 reloc associated with a SYM_DIFF operation. */
1334 && ! sym_diff_reloc_seen)
1336 asection * sym_section = NULL;
1338 /* Find the section containing the
1339 symbol involved in the relocation. */
1342 Elf_Internal_Sym * isym;
1344 if (isymbuf == NULL)
1345 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
1346 symtab_hdr->sh_info, 0,
1350 isym = isymbuf + r_symndx;
1351 /* All we care about is whether this local symbol is absolute. */
1352 if (isym->st_shndx == SHN_ABS)
1353 sym_section = bfd_abs_section_ptr;
1358 if (h->root.type == bfd_link_hash_defined
1359 || h->root.type == bfd_link_hash_defweak)
1360 sym_section = h->root.u.def.section;
1363 /* If the symbol is absolute then the relocation can
1364 be resolved during linking and there is no need for
1366 if (sym_section != bfd_abs_section_ptr)
1368 /* When creating a shared object, we must copy these
1369 reloc types into the output file. We create a reloc
1370 section in dynobj and make room for this reloc. */
1373 sreloc = _bfd_elf_make_dynamic_reloc_section
1374 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
1379 sreloc->size += sizeof (Elf32_External_Rela);
1386 if (ELF32_R_TYPE (rel->r_info) != R_MN10300_SYM_DIFF)
1387 sym_diff_reloc_seen = FALSE;
1392 if (isymbuf != NULL)
1398 /* Return the section that should be marked against GC for a given
1402 mn10300_elf_gc_mark_hook (asection *sec,
1403 struct bfd_link_info *info,
1404 Elf_Internal_Rela *rel,
1405 struct elf_link_hash_entry *h,
1406 Elf_Internal_Sym *sym)
1409 switch (ELF32_R_TYPE (rel->r_info))
1411 case R_MN10300_GNU_VTINHERIT:
1412 case R_MN10300_GNU_VTENTRY:
1416 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1419 /* Perform a relocation as part of a final link. */
1421 static bfd_reloc_status_type
1422 mn10300_elf_final_link_relocate (reloc_howto_type *howto,
1424 bfd *output_bfd ATTRIBUTE_UNUSED,
1425 asection *input_section,
1430 struct elf_link_hash_entry * h,
1431 unsigned long symndx,
1432 struct bfd_link_info *info,
1433 asection *sym_sec ATTRIBUTE_UNUSED,
1434 int is_local ATTRIBUTE_UNUSED)
1436 struct elf32_mn10300_link_hash_table * htab = elf32_mn10300_hash_table (info);
1437 static asection * sym_diff_section;
1438 static bfd_vma sym_diff_value;
1439 bfd_boolean is_sym_diff_reloc;
1440 unsigned long r_type = howto->type;
1441 bfd_byte * hit_data = contents + offset;
1447 dynobj = elf_hash_table (info)->dynobj;
1457 case R_MN10300_PCREL8:
1458 case R_MN10300_PCREL16:
1459 case R_MN10300_PCREL32:
1460 case R_MN10300_GOTOFF32:
1461 case R_MN10300_GOTOFF24:
1462 case R_MN10300_GOTOFF16:
1464 && (input_section->flags & SEC_ALLOC) != 0
1466 && ! SYMBOL_REFERENCES_LOCAL (info, h))
1467 return bfd_reloc_dangerous;
1468 case R_MN10300_GOT32:
1470 Taking the address of a protected function in a shared library
1471 is illegal. Issue an error message here. */
1473 && (input_section->flags & SEC_ALLOC) != 0
1475 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED
1476 && (h->type == STT_FUNC || h->type == STT_GNU_IFUNC)
1477 && ! SYMBOL_REFERENCES_LOCAL (info, h))
1478 return bfd_reloc_dangerous;
1481 is_sym_diff_reloc = FALSE;
1482 if (sym_diff_section != NULL)
1484 BFD_ASSERT (sym_diff_section == input_section);
1492 value -= sym_diff_value;
1493 /* If we are computing a 32-bit value for the location lists
1494 and the result is 0 then we add one to the value. A zero
1495 value can result because of linker relaxation deleteing
1496 prologue instructions and using a value of 1 (for the begin
1497 and end offsets in the location list entry) results in a
1498 nul entry which does not prevent the following entries from
1500 if (r_type == R_MN10300_32
1502 && strcmp (input_section->name, ".debug_loc") == 0)
1504 sym_diff_section = NULL;
1505 is_sym_diff_reloc = TRUE;
1509 sym_diff_section = NULL;
1516 case R_MN10300_SYM_DIFF:
1517 BFD_ASSERT (addend == 0);
1518 /* Cache the input section and value.
1519 The offset is unreliable, since relaxation may
1520 have reduced the following reloc's offset. */
1521 sym_diff_section = input_section;
1522 sym_diff_value = value;
1523 return bfd_reloc_ok;
1525 case R_MN10300_ALIGN:
1526 case R_MN10300_NONE:
1527 return bfd_reloc_ok;
1531 /* Do not generate relocs when an R_MN10300_32 has been used
1532 with an R_MN10300_SYM_DIFF to compute a difference of two
1534 && is_sym_diff_reloc == FALSE
1535 /* Also, do not generate a reloc when the symbol associated
1536 with the R_MN10300_32 reloc is absolute - there is no
1537 need for a run time computation in this case. */
1538 && sym_sec != bfd_abs_section_ptr
1539 /* If the section is not going to be allocated at load time
1540 then there is no need to generate relocs for it. */
1541 && (input_section->flags & SEC_ALLOC) != 0)
1543 Elf_Internal_Rela outrel;
1544 bfd_boolean skip, relocate;
1546 /* When generating a shared object, these relocations are
1547 copied into the output file to be resolved at run
1551 sreloc = _bfd_elf_get_dynamic_reloc_section
1552 (input_bfd, input_section, /*rela?*/ TRUE);
1559 outrel.r_offset = _bfd_elf_section_offset (input_bfd, info,
1560 input_section, offset);
1561 if (outrel.r_offset == (bfd_vma) -1)
1564 outrel.r_offset += (input_section->output_section->vma
1565 + input_section->output_offset);
1569 memset (&outrel, 0, sizeof outrel);
1574 /* h->dynindx may be -1 if this symbol was marked to
1577 || SYMBOL_REFERENCES_LOCAL (info, h))
1580 outrel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
1581 outrel.r_addend = value + addend;
1585 BFD_ASSERT (h->dynindx != -1);
1587 outrel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_32);
1588 outrel.r_addend = value + addend;
1592 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
1593 (bfd_byte *) (((Elf32_External_Rela *) sreloc->contents)
1594 + sreloc->reloc_count));
1595 ++sreloc->reloc_count;
1597 /* If this reloc is against an external symbol, we do
1598 not want to fiddle with the addend. Otherwise, we
1599 need to include the symbol value so that it becomes
1600 an addend for the dynamic reloc. */
1602 return bfd_reloc_ok;
1605 bfd_put_32 (input_bfd, value, hit_data);
1606 return bfd_reloc_ok;
1611 if ((long) value > 0x7fffff || (long) value < -0x800000)
1612 return bfd_reloc_overflow;
1614 bfd_put_8 (input_bfd, value & 0xff, hit_data);
1615 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1616 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1617 return bfd_reloc_ok;
1622 if ((long) value > 0x7fff || (long) value < -0x8000)
1623 return bfd_reloc_overflow;
1625 bfd_put_16 (input_bfd, value, hit_data);
1626 return bfd_reloc_ok;
1631 if ((long) value > 0x7f || (long) value < -0x80)
1632 return bfd_reloc_overflow;
1634 bfd_put_8 (input_bfd, value, hit_data);
1635 return bfd_reloc_ok;
1637 case R_MN10300_PCREL8:
1638 value -= (input_section->output_section->vma
1639 + input_section->output_offset);
1643 if ((long) value > 0x7f || (long) value < -0x80)
1644 return bfd_reloc_overflow;
1646 bfd_put_8 (input_bfd, value, hit_data);
1647 return bfd_reloc_ok;
1649 case R_MN10300_PCREL16:
1650 value -= (input_section->output_section->vma
1651 + input_section->output_offset);
1655 if ((long) value > 0x7fff || (long) value < -0x8000)
1656 return bfd_reloc_overflow;
1658 bfd_put_16 (input_bfd, value, hit_data);
1659 return bfd_reloc_ok;
1661 case R_MN10300_PCREL32:
1662 value -= (input_section->output_section->vma
1663 + input_section->output_offset);
1667 bfd_put_32 (input_bfd, value, hit_data);
1668 return bfd_reloc_ok;
1670 case R_MN10300_GNU_VTINHERIT:
1671 case R_MN10300_GNU_VTENTRY:
1672 return bfd_reloc_ok;
1674 case R_MN10300_GOTPC32:
1676 return bfd_reloc_dangerous;
1678 /* Use global offset table as symbol value. */
1679 value = htab->root.sgot->output_section->vma;
1680 value -= (input_section->output_section->vma
1681 + input_section->output_offset);
1685 bfd_put_32 (input_bfd, value, hit_data);
1686 return bfd_reloc_ok;
1688 case R_MN10300_GOTPC16:
1690 return bfd_reloc_dangerous;
1692 /* Use global offset table as symbol value. */
1693 value = htab->root.sgot->output_section->vma;
1694 value -= (input_section->output_section->vma
1695 + input_section->output_offset);
1699 if ((long) value > 0x7fff || (long) value < -0x8000)
1700 return bfd_reloc_overflow;
1702 bfd_put_16 (input_bfd, value, hit_data);
1703 return bfd_reloc_ok;
1705 case R_MN10300_GOTOFF32:
1707 return bfd_reloc_dangerous;
1709 value -= htab->root.sgot->output_section->vma;
1712 bfd_put_32 (input_bfd, value, hit_data);
1713 return bfd_reloc_ok;
1715 case R_MN10300_GOTOFF24:
1717 return bfd_reloc_dangerous;
1719 value -= htab->root.sgot->output_section->vma;
1722 if ((long) value > 0x7fffff || (long) value < -0x800000)
1723 return bfd_reloc_overflow;
1725 bfd_put_8 (input_bfd, value, hit_data);
1726 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1727 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1728 return bfd_reloc_ok;
1730 case R_MN10300_GOTOFF16:
1732 return bfd_reloc_dangerous;
1734 value -= htab->root.sgot->output_section->vma;
1737 if ((long) value > 0x7fff || (long) value < -0x8000)
1738 return bfd_reloc_overflow;
1740 bfd_put_16 (input_bfd, value, hit_data);
1741 return bfd_reloc_ok;
1743 case R_MN10300_PLT32:
1745 && ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1746 && ELF_ST_VISIBILITY (h->other) != STV_HIDDEN
1747 && h->plt.offset != (bfd_vma) -1)
1750 return bfd_reloc_dangerous;
1752 splt = htab->root.splt;
1753 value = (splt->output_section->vma
1754 + splt->output_offset
1755 + h->plt.offset) - value;
1758 value -= (input_section->output_section->vma
1759 + input_section->output_offset);
1763 bfd_put_32 (input_bfd, value, hit_data);
1764 return bfd_reloc_ok;
1766 case R_MN10300_PLT16:
1768 && ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1769 && ELF_ST_VISIBILITY (h->other) != STV_HIDDEN
1770 && h->plt.offset != (bfd_vma) -1)
1773 return bfd_reloc_dangerous;
1775 splt = htab->root.splt;
1776 value = (splt->output_section->vma
1777 + splt->output_offset
1778 + h->plt.offset) - value;
1781 value -= (input_section->output_section->vma
1782 + input_section->output_offset);
1786 if ((long) value > 0x7fff || (long) value < -0x8000)
1787 return bfd_reloc_overflow;
1789 bfd_put_16 (input_bfd, value, hit_data);
1790 return bfd_reloc_ok;
1792 case R_MN10300_TLS_LDO:
1793 value = dtpoff (info, value);
1794 bfd_put_32 (input_bfd, value + addend, hit_data);
1795 return bfd_reloc_ok;
1797 case R_MN10300_TLS_LE:
1798 value = tpoff (info, value);
1799 bfd_put_32 (input_bfd, value + addend, hit_data);
1800 return bfd_reloc_ok;
1802 case R_MN10300_TLS_LD:
1804 return bfd_reloc_dangerous;
1806 sgot = htab->root.sgot;
1807 BFD_ASSERT (sgot != NULL);
1808 value = htab->tls_ldm_got.offset + sgot->output_offset;
1809 bfd_put_32 (input_bfd, value, hit_data);
1811 if (!htab->tls_ldm_got.rel_emitted)
1813 asection * srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1814 Elf_Internal_Rela rel;
1816 BFD_ASSERT (srelgot != NULL);
1817 htab->tls_ldm_got.rel_emitted ++;
1818 rel.r_offset = (sgot->output_section->vma
1819 + sgot->output_offset
1820 + htab->tls_ldm_got.offset);
1821 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + htab->tls_ldm_got.offset);
1822 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + htab->tls_ldm_got.offset+4);
1823 rel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD);
1825 bfd_elf32_swap_reloca_out (output_bfd, & rel,
1826 (bfd_byte *) ((Elf32_External_Rela *) srelgot->contents
1827 + srelgot->reloc_count));
1828 ++ srelgot->reloc_count;
1831 return bfd_reloc_ok;
1833 case R_MN10300_TLS_GOTIE:
1834 value = tpoff (info, value);
1837 case R_MN10300_TLS_GD:
1838 case R_MN10300_TLS_IE:
1839 case R_MN10300_GOT32:
1840 case R_MN10300_GOT24:
1841 case R_MN10300_GOT16:
1843 return bfd_reloc_dangerous;
1845 sgot = htab->root.sgot;
1846 if (r_type == R_MN10300_TLS_GD)
1847 value = dtpoff (info, value);
1853 off = h->got.offset;
1854 /* Offsets in the GOT are allocated in check_relocs
1855 which is not called for shared libraries... */
1856 if (off == (bfd_vma) -1)
1859 if (sgot->contents != NULL
1860 && (! elf_hash_table (info)->dynamic_sections_created
1861 || SYMBOL_REFERENCES_LOCAL (info, h)))
1862 /* This is actually a static link, or it is a
1863 -Bsymbolic link and the symbol is defined
1864 locally, or the symbol was forced to be local
1865 because of a version file. We must initialize
1866 this entry in the global offset table.
1868 When doing a dynamic link, we create a .rela.got
1869 relocation entry to initialize the value. This
1870 is done in the finish_dynamic_symbol routine. */
1871 bfd_put_32 (output_bfd, value,
1872 sgot->contents + off);
1874 value = sgot->output_offset + off;
1880 off = elf_local_got_offsets (input_bfd)[symndx];
1883 bfd_put_32 (output_bfd, value, sgot->contents + (off & ~ 1));
1886 bfd_put_32 (output_bfd, value, sgot->contents + off);
1891 Elf_Internal_Rela outrel;
1893 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1894 BFD_ASSERT (srelgot != NULL);
1896 outrel.r_offset = (sgot->output_section->vma
1897 + sgot->output_offset
1901 case R_MN10300_TLS_GD:
1902 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPOFF);
1903 outrel.r_offset = (sgot->output_section->vma
1904 + sgot->output_offset
1906 bfd_elf32_swap_reloca_out (output_bfd, & outrel,
1907 (bfd_byte *) (((Elf32_External_Rela *)
1909 + srelgot->reloc_count));
1910 ++ srelgot->reloc_count;
1911 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD);
1913 case R_MN10300_TLS_GOTIE:
1914 case R_MN10300_TLS_IE:
1915 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_TPOFF);
1918 outrel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
1922 outrel.r_addend = value;
1923 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
1924 (bfd_byte *) (((Elf32_External_Rela *)
1926 + srelgot->reloc_count));
1927 ++ srelgot->reloc_count;
1928 elf_local_got_offsets (input_bfd)[symndx] |= 1;
1931 value = sgot->output_offset + (off & ~(bfd_vma) 1);
1937 if (r_type == R_MN10300_TLS_IE)
1939 value += sgot->output_section->vma;
1940 bfd_put_32 (input_bfd, value, hit_data);
1941 return bfd_reloc_ok;
1943 else if (r_type == R_MN10300_TLS_GOTIE
1944 || r_type == R_MN10300_TLS_GD
1945 || r_type == R_MN10300_TLS_LD)
1947 bfd_put_32 (input_bfd, value, hit_data);
1948 return bfd_reloc_ok;
1950 else if (r_type == R_MN10300_GOT32)
1952 bfd_put_32 (input_bfd, value, hit_data);
1953 return bfd_reloc_ok;
1955 else if (r_type == R_MN10300_GOT24)
1957 if ((long) value > 0x7fffff || (long) value < -0x800000)
1958 return bfd_reloc_overflow;
1960 bfd_put_8 (input_bfd, value & 0xff, hit_data);
1961 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1962 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1963 return bfd_reloc_ok;
1965 else if (r_type == R_MN10300_GOT16)
1967 if ((long) value > 0x7fff || (long) value < -0x8000)
1968 return bfd_reloc_overflow;
1970 bfd_put_16 (input_bfd, value, hit_data);
1971 return bfd_reloc_ok;
1976 return bfd_reloc_notsupported;
1980 /* Relocate an MN10300 ELF section. */
1983 mn10300_elf_relocate_section (bfd *output_bfd,
1984 struct bfd_link_info *info,
1986 asection *input_section,
1988 Elf_Internal_Rela *relocs,
1989 Elf_Internal_Sym *local_syms,
1990 asection **local_sections)
1992 Elf_Internal_Shdr *symtab_hdr;
1993 struct elf_link_hash_entry **sym_hashes;
1994 Elf_Internal_Rela *rel, *relend;
1995 Elf_Internal_Rela * trel;
1997 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1998 sym_hashes = elf_sym_hashes (input_bfd);
2001 relend = relocs + input_section->reloc_count;
2002 for (; rel < relend; rel++)
2005 reloc_howto_type *howto;
2006 unsigned long r_symndx;
2007 Elf_Internal_Sym *sym;
2009 struct elf32_mn10300_link_hash_entry *h;
2011 bfd_reloc_status_type r;
2013 bfd_boolean unresolved_reloc = FALSE;
2015 struct elf_link_hash_entry * hh;
2018 r_symndx = ELF32_R_SYM (rel->r_info);
2019 r_type = ELF32_R_TYPE (rel->r_info);
2020 howto = elf_mn10300_howto_table + r_type;
2022 /* Just skip the vtable gc relocs. */
2023 if (r_type == R_MN10300_GNU_VTINHERIT
2024 || r_type == R_MN10300_GNU_VTENTRY)
2030 if (r_symndx < symtab_hdr->sh_info)
2034 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2035 r_symndx, symtab_hdr, sym_hashes,
2036 hh, sec, relocation,
2037 unresolved_reloc, warned);
2039 h = elf_mn10300_hash_entry (hh);
2041 tls_r_type = elf_mn10300_tls_transition (info, r_type, hh, input_section, 0);
2042 if (tls_r_type != r_type)
2044 bfd_boolean had_plt;
2046 had_plt = mn10300_do_tls_transition (input_bfd, r_type, tls_r_type,
2047 contents, rel->r_offset);
2048 r_type = tls_r_type;
2049 howto = elf_mn10300_howto_table + r_type;
2052 for (trel = rel+1; trel < relend; trel++)
2053 if ((ELF32_R_TYPE (trel->r_info) == R_MN10300_PLT32
2054 || ELF32_R_TYPE (trel->r_info) == R_MN10300_PCREL32)
2055 && rel->r_offset + had_plt == trel->r_offset)
2056 trel->r_info = ELF32_R_INFO (0, R_MN10300_NONE);
2059 if (r_symndx < symtab_hdr->sh_info)
2061 sym = local_syms + r_symndx;
2062 sec = local_sections[r_symndx];
2063 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2067 if ((h->root.root.type == bfd_link_hash_defined
2068 || h->root.root.type == bfd_link_hash_defweak)
2069 && ( r_type == R_MN10300_GOTPC32
2070 || r_type == R_MN10300_GOTPC16
2071 || (( r_type == R_MN10300_PLT32
2072 || r_type == R_MN10300_PLT16)
2073 && ELF_ST_VISIBILITY (h->root.other) != STV_INTERNAL
2074 && ELF_ST_VISIBILITY (h->root.other) != STV_HIDDEN
2075 && h->root.plt.offset != (bfd_vma) -1)
2076 || (( r_type == R_MN10300_GOT32
2077 || r_type == R_MN10300_GOT24
2078 || r_type == R_MN10300_TLS_GD
2079 || r_type == R_MN10300_TLS_LD
2080 || r_type == R_MN10300_TLS_GOTIE
2081 || r_type == R_MN10300_TLS_IE
2082 || r_type == R_MN10300_GOT16)
2083 && elf_hash_table (info)->dynamic_sections_created
2084 && !SYMBOL_REFERENCES_LOCAL (info, hh))
2085 || (r_type == R_MN10300_32
2086 /* _32 relocs in executables force _COPY relocs,
2087 such that the address of the symbol ends up
2089 && !info->executable
2090 && !SYMBOL_REFERENCES_LOCAL (info, hh)
2091 && ((input_section->flags & SEC_ALLOC) != 0
2092 /* DWARF will emit R_MN10300_32 relocations
2093 in its sections against symbols defined
2094 externally in shared libraries. We can't
2095 do anything with them here. */
2096 || ((input_section->flags & SEC_DEBUGGING) != 0
2097 && h->root.def_dynamic)))))
2098 /* In these cases, we don't need the relocation
2099 value. We check specially because in some
2100 obscure cases sec->output_section will be NULL. */
2103 else if (!info->relocatable && unresolved_reloc
2104 && _bfd_elf_section_offset (output_bfd, info, input_section,
2105 rel->r_offset) != (bfd_vma) -1)
2107 (*_bfd_error_handler)
2108 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
2111 (long) rel->r_offset,
2113 h->root.root.root.string);
2116 if (sec != NULL && discarded_section (sec))
2117 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2118 rel, 1, relend, howto, 0, contents);
2120 if (info->relocatable)
2123 r = mn10300_elf_final_link_relocate (howto, input_bfd, output_bfd,
2125 contents, rel->r_offset,
2126 relocation, rel->r_addend,
2127 (struct elf_link_hash_entry *) h,
2129 info, sec, h == NULL);
2131 if (r != bfd_reloc_ok)
2134 const char *msg = NULL;
2137 name = h->root.root.root.string;
2140 name = (bfd_elf_string_from_elf_section
2141 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2142 if (name == NULL || *name == '\0')
2143 name = bfd_section_name (input_bfd, sec);
2148 case bfd_reloc_overflow:
2149 if (! ((*info->callbacks->reloc_overflow)
2150 (info, (h ? &h->root.root : NULL), name,
2151 howto->name, (bfd_vma) 0, input_bfd,
2152 input_section, rel->r_offset)))
2156 case bfd_reloc_undefined:
2157 if (! ((*info->callbacks->undefined_symbol)
2158 (info, name, input_bfd, input_section,
2159 rel->r_offset, TRUE)))
2163 case bfd_reloc_outofrange:
2164 msg = _("internal error: out of range error");
2167 case bfd_reloc_notsupported:
2168 msg = _("internal error: unsupported relocation error");
2171 case bfd_reloc_dangerous:
2172 if (r_type == R_MN10300_PCREL32)
2173 msg = _("error: inappropriate relocation type for shared"
2174 " library (did you forget -fpic?)");
2175 else if (r_type == R_MN10300_GOT32)
2176 msg = _("%B: taking the address of protected function"
2177 " '%s' cannot be done when making a shared library");
2179 msg = _("internal error: suspicious relocation type used"
2180 " in shared library");
2184 msg = _("internal error: unknown error");
2188 _bfd_error_handler (msg, input_bfd, name);
2189 bfd_set_error (bfd_error_bad_value);
2198 /* Finish initializing one hash table entry. */
2201 elf32_mn10300_finish_hash_table_entry (struct bfd_hash_entry *gen_entry,
2204 struct elf32_mn10300_link_hash_entry *entry;
2205 struct bfd_link_info *link_info = (struct bfd_link_info *) in_args;
2206 unsigned int byte_count = 0;
2208 entry = (struct elf32_mn10300_link_hash_entry *) gen_entry;
2210 /* If we already know we want to convert "call" to "calls" for calls
2211 to this symbol, then return now. */
2212 if (entry->flags == MN10300_CONVERT_CALL_TO_CALLS)
2215 /* If there are no named calls to this symbol, or there's nothing we
2216 can move from the function itself into the "call" instruction,
2217 then note that all "call" instructions should be converted into
2218 "calls" instructions and return. If a symbol is available for
2219 dynamic symbol resolution (overridable or overriding), avoid
2220 custom calling conventions. */
2221 if (entry->direct_calls == 0
2222 || (entry->stack_size == 0 && entry->movm_args == 0)
2223 || (elf_hash_table (link_info)->dynamic_sections_created
2224 && ELF_ST_VISIBILITY (entry->root.other) != STV_INTERNAL
2225 && ELF_ST_VISIBILITY (entry->root.other) != STV_HIDDEN))
2227 /* Make a note that we should convert "call" instructions to "calls"
2228 instructions for calls to this symbol. */
2229 entry->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2233 /* We may be able to move some instructions from the function itself into
2234 the "call" instruction. Count how many bytes we might be able to
2235 eliminate in the function itself. */
2237 /* A movm instruction is two bytes. */
2238 if (entry->movm_args)
2241 /* Count the insn to allocate stack space too. */
2242 if (entry->stack_size > 0)
2244 if (entry->stack_size <= 128)
2250 /* If using "call" will result in larger code, then turn all
2251 the associated "call" instructions into "calls" instructions. */
2252 if (byte_count < entry->direct_calls)
2253 entry->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2255 /* This routine never fails. */
2259 /* Used to count hash table entries. */
2262 elf32_mn10300_count_hash_table_entries (struct bfd_hash_entry *gen_entry ATTRIBUTE_UNUSED,
2265 int *count = (int *) in_args;
2271 /* Used to enumerate hash table entries into a linear array. */
2274 elf32_mn10300_list_hash_table_entries (struct bfd_hash_entry *gen_entry,
2277 struct bfd_hash_entry ***ptr = (struct bfd_hash_entry ***) in_args;
2284 /* Used to sort the array created by the above. */
2287 sort_by_value (const void *va, const void *vb)
2289 struct elf32_mn10300_link_hash_entry *a
2290 = *(struct elf32_mn10300_link_hash_entry **) va;
2291 struct elf32_mn10300_link_hash_entry *b
2292 = *(struct elf32_mn10300_link_hash_entry **) vb;
2294 return a->value - b->value;
2297 /* Compute the stack size and movm arguments for the function
2298 referred to by HASH at address ADDR in section with
2299 contents CONTENTS, store the information in the hash table. */
2302 compute_function_info (bfd *abfd,
2303 struct elf32_mn10300_link_hash_entry *hash,
2305 unsigned char *contents)
2307 unsigned char byte1, byte2;
2308 /* We only care about a very small subset of the possible prologue
2309 sequences here. Basically we look for:
2311 movm [d2,d3,a2,a3],sp (optional)
2312 add <size>,sp (optional, and only for sizes which fit in an unsigned
2315 If we find anything else, we quit. */
2317 /* Look for movm [regs],sp. */
2318 byte1 = bfd_get_8 (abfd, contents + addr);
2319 byte2 = bfd_get_8 (abfd, contents + addr + 1);
2323 hash->movm_args = byte2;
2325 byte1 = bfd_get_8 (abfd, contents + addr);
2326 byte2 = bfd_get_8 (abfd, contents + addr + 1);
2329 /* Now figure out how much stack space will be allocated by the movm
2330 instruction. We need this kept separate from the function's normal
2332 if (hash->movm_args)
2335 if (hash->movm_args & 0x80)
2336 hash->movm_stack_size += 4;
2339 if (hash->movm_args & 0x40)
2340 hash->movm_stack_size += 4;
2343 if (hash->movm_args & 0x20)
2344 hash->movm_stack_size += 4;
2347 if (hash->movm_args & 0x10)
2348 hash->movm_stack_size += 4;
2350 /* "other" space. d0, d1, a0, a1, mdr, lir, lar, 4 byte pad. */
2351 if (hash->movm_args & 0x08)
2352 hash->movm_stack_size += 8 * 4;
2354 if (bfd_get_mach (abfd) == bfd_mach_am33
2355 || bfd_get_mach (abfd) == bfd_mach_am33_2)
2357 /* "exother" space. e0, e1, mdrq, mcrh, mcrl, mcvf */
2358 if (hash->movm_args & 0x1)
2359 hash->movm_stack_size += 6 * 4;
2361 /* exreg1 space. e4, e5, e6, e7 */
2362 if (hash->movm_args & 0x2)
2363 hash->movm_stack_size += 4 * 4;
2365 /* exreg0 space. e2, e3 */
2366 if (hash->movm_args & 0x4)
2367 hash->movm_stack_size += 2 * 4;
2371 /* Now look for the two stack adjustment variants. */
2372 if (byte1 == 0xf8 && byte2 == 0xfe)
2374 int temp = bfd_get_8 (abfd, contents + addr + 2);
2375 temp = ((temp & 0xff) ^ (~0x7f)) + 0x80;
2377 hash->stack_size = -temp;
2379 else if (byte1 == 0xfa && byte2 == 0xfe)
2381 int temp = bfd_get_16 (abfd, contents + addr + 2);
2382 temp = ((temp & 0xffff) ^ (~0x7fff)) + 0x8000;
2386 hash->stack_size = temp;
2389 /* If the total stack to be allocated by the call instruction is more
2390 than 255 bytes, then we can't remove the stack adjustment by using
2391 "call" (we might still be able to remove the "movm" instruction. */
2392 if (hash->stack_size + hash->movm_stack_size > 255)
2393 hash->stack_size = 0;
2396 /* Delete some bytes from a section while relaxing. */
2399 mn10300_elf_relax_delete_bytes (bfd *abfd,
2404 Elf_Internal_Shdr *symtab_hdr;
2405 unsigned int sec_shndx;
2407 Elf_Internal_Rela *irel, *irelend;
2408 Elf_Internal_Rela *irelalign;
2410 Elf_Internal_Sym *isym, *isymend;
2411 struct elf_link_hash_entry **sym_hashes;
2412 struct elf_link_hash_entry **end_hashes;
2413 unsigned int symcount;
2415 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
2417 contents = elf_section_data (sec)->this_hdr.contents;
2422 irel = elf_section_data (sec)->relocs;
2423 irelend = irel + sec->reloc_count;
2425 if (sec->reloc_count > 0)
2427 /* If there is an align reloc at the end of the section ignore it.
2428 GAS creates these relocs for reasons of its own, and they just
2429 serve to keep the section artifically inflated. */
2430 if (ELF32_R_TYPE ((irelend - 1)->r_info) == (int) R_MN10300_ALIGN)
2433 /* The deletion must stop at the next ALIGN reloc for an aligment
2434 power larger than, or not a multiple of, the number of bytes we
2436 for (; irel < irelend; irel++)
2438 int alignment = 1 << irel->r_addend;
2440 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN
2441 && irel->r_offset > addr
2442 && irel->r_offset < toaddr
2443 && (count < alignment
2444 || alignment % count != 0))
2447 toaddr = irel->r_offset;
2453 /* Actually delete the bytes. */
2454 memmove (contents + addr, contents + addr + count,
2455 (size_t) (toaddr - addr - count));
2457 /* Adjust the section's size if we are shrinking it, or else
2458 pad the bytes between the end of the shrunken region and
2459 the start of the next region with NOP codes. */
2460 if (irelalign == NULL)
2463 /* Include symbols at the end of the section, but
2464 not at the end of a sub-region of the section. */
2471 #define NOP_OPCODE 0xcb
2473 for (i = 0; i < count; i ++)
2474 bfd_put_8 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
2477 /* Adjust all the relocs. */
2478 for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
2480 /* Get the new reloc address. */
2481 if ((irel->r_offset > addr
2482 && irel->r_offset < toaddr)
2483 || (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN
2484 && irel->r_offset == toaddr))
2485 irel->r_offset -= count;
2488 /* Adjust the local symbols in the section, reducing their value
2489 by the number of bytes deleted. Note - symbols within the deleted
2490 region are moved to the address of the start of the region, which
2491 actually means that they will address the byte beyond the end of
2492 the region once the deletion has been completed. */
2493 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2494 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
2495 for (isymend = isym + symtab_hdr->sh_info; isym < isymend; isym++)
2497 if (isym->st_shndx == sec_shndx
2498 && isym->st_value > addr
2499 && isym->st_value < toaddr)
2501 if (isym->st_value < addr + count)
2502 isym->st_value = addr;
2504 isym->st_value -= count;
2506 /* Adjust the function symbol's size as well. */
2507 else if (isym->st_shndx == sec_shndx
2508 && ELF_ST_TYPE (isym->st_info) == STT_FUNC
2509 && isym->st_value + isym->st_size > addr
2510 && isym->st_value + isym->st_size < toaddr)
2511 isym->st_size -= count;
2514 /* Now adjust the global symbols defined in this section. */
2515 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2516 - symtab_hdr->sh_info);
2517 sym_hashes = elf_sym_hashes (abfd);
2518 end_hashes = sym_hashes + symcount;
2519 for (; sym_hashes < end_hashes; sym_hashes++)
2521 struct elf_link_hash_entry *sym_hash = *sym_hashes;
2523 if ((sym_hash->root.type == bfd_link_hash_defined
2524 || sym_hash->root.type == bfd_link_hash_defweak)
2525 && sym_hash->root.u.def.section == sec
2526 && sym_hash->root.u.def.value > addr
2527 && sym_hash->root.u.def.value < toaddr)
2529 if (sym_hash->root.u.def.value < addr + count)
2530 sym_hash->root.u.def.value = addr;
2532 sym_hash->root.u.def.value -= count;
2534 /* Adjust the function symbol's size as well. */
2535 else if (sym_hash->root.type == bfd_link_hash_defined
2536 && sym_hash->root.u.def.section == sec
2537 && sym_hash->type == STT_FUNC
2538 && sym_hash->root.u.def.value + sym_hash->size > addr
2539 && sym_hash->root.u.def.value + sym_hash->size < toaddr)
2540 sym_hash->size -= count;
2543 /* See if we can move the ALIGN reloc forward.
2544 We have adjusted r_offset for it already. */
2545 if (irelalign != NULL)
2547 bfd_vma alignto, alignaddr;
2549 if ((int) irelalign->r_addend > 0)
2551 /* This is the old address. */
2552 alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
2553 /* This is where the align points to now. */
2554 alignaddr = BFD_ALIGN (irelalign->r_offset,
2555 1 << irelalign->r_addend);
2556 if (alignaddr < alignto)
2557 /* Tail recursion. */
2558 return mn10300_elf_relax_delete_bytes (abfd, sec, alignaddr,
2559 (int) (alignto - alignaddr));
2566 /* Return TRUE if a symbol exists at the given address, else return
2570 mn10300_elf_symbol_address_p (bfd *abfd,
2572 Elf_Internal_Sym *isym,
2575 Elf_Internal_Shdr *symtab_hdr;
2576 unsigned int sec_shndx;
2577 Elf_Internal_Sym *isymend;
2578 struct elf_link_hash_entry **sym_hashes;
2579 struct elf_link_hash_entry **end_hashes;
2580 unsigned int symcount;
2582 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
2584 /* Examine all the symbols. */
2585 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2586 for (isymend = isym + symtab_hdr->sh_info; isym < isymend; isym++)
2587 if (isym->st_shndx == sec_shndx
2588 && isym->st_value == addr)
2591 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2592 - symtab_hdr->sh_info);
2593 sym_hashes = elf_sym_hashes (abfd);
2594 end_hashes = sym_hashes + symcount;
2595 for (; sym_hashes < end_hashes; sym_hashes++)
2597 struct elf_link_hash_entry *sym_hash = *sym_hashes;
2599 if ((sym_hash->root.type == bfd_link_hash_defined
2600 || sym_hash->root.type == bfd_link_hash_defweak)
2601 && sym_hash->root.u.def.section == sec
2602 && sym_hash->root.u.def.value == addr)
2609 /* This function handles relaxing for the mn10300.
2611 There are quite a few relaxing opportunities available on the mn10300:
2613 * calls:32 -> calls:16 2 bytes
2614 * call:32 -> call:16 2 bytes
2616 * call:32 -> calls:32 1 byte
2617 * call:16 -> calls:16 1 byte
2618 * These are done anytime using "calls" would result
2619 in smaller code, or when necessary to preserve the
2620 meaning of the program.
2624 * In some circumstances we can move instructions
2625 from a function prologue into a "call" instruction.
2626 This is only done if the resulting code is no larger
2627 than the original code.
2629 * jmp:32 -> jmp:16 2 bytes
2630 * jmp:16 -> bra:8 1 byte
2632 * If the previous instruction is a conditional branch
2633 around the jump/bra, we may be able to reverse its condition
2634 and change its target to the jump's target. The jump/bra
2635 can then be deleted. 2 bytes
2637 * mov abs32 -> mov abs16 1 or 2 bytes
2639 * Most instructions which accept imm32 can relax to imm16 1 or 2 bytes
2640 - Most instructions which accept imm16 can relax to imm8 1 or 2 bytes
2642 * Most instructions which accept d32 can relax to d16 1 or 2 bytes
2643 - Most instructions which accept d16 can relax to d8 1 or 2 bytes
2645 We don't handle imm16->imm8 or d16->d8 as they're very rare
2646 and somewhat more difficult to support. */
2649 mn10300_elf_relax_section (bfd *abfd,
2651 struct bfd_link_info *link_info,
2654 Elf_Internal_Shdr *symtab_hdr;
2655 Elf_Internal_Rela *internal_relocs = NULL;
2656 Elf_Internal_Rela *irel, *irelend;
2657 bfd_byte *contents = NULL;
2658 Elf_Internal_Sym *isymbuf = NULL;
2659 struct elf32_mn10300_link_hash_table *hash_table;
2660 asection *section = sec;
2661 bfd_vma align_gap_adjustment;
2663 if (link_info->relocatable)
2664 (*link_info->callbacks->einfo)
2665 (_("%P%F: --relax and -r may not be used together\n"));
2667 /* Assume nothing changes. */
2670 /* We need a pointer to the mn10300 specific hash table. */
2671 hash_table = elf32_mn10300_hash_table (link_info);
2672 if (hash_table == NULL)
2675 /* Initialize fields in each hash table entry the first time through. */
2676 if ((hash_table->flags & MN10300_HASH_ENTRIES_INITIALIZED) == 0)
2680 /* Iterate over all the input bfds. */
2681 for (input_bfd = link_info->input_bfds;
2683 input_bfd = input_bfd->link_next)
2685 /* We're going to need all the symbols for each bfd. */
2686 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2687 if (symtab_hdr->sh_info != 0)
2689 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
2690 if (isymbuf == NULL)
2691 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2692 symtab_hdr->sh_info, 0,
2694 if (isymbuf == NULL)
2698 /* Iterate over each section in this bfd. */
2699 for (section = input_bfd->sections;
2701 section = section->next)
2703 struct elf32_mn10300_link_hash_entry *hash;
2704 asection *sym_sec = NULL;
2705 const char *sym_name;
2708 /* If there's nothing to do in this section, skip it. */
2709 if (! ((section->flags & SEC_RELOC) != 0
2710 && section->reloc_count != 0))
2712 if ((section->flags & SEC_ALLOC) == 0)
2715 /* Get cached copy of section contents if it exists. */
2716 if (elf_section_data (section)->this_hdr.contents != NULL)
2717 contents = elf_section_data (section)->this_hdr.contents;
2718 else if (section->size != 0)
2720 /* Go get them off disk. */
2721 if (!bfd_malloc_and_get_section (input_bfd, section,
2728 /* If there aren't any relocs, then there's nothing to do. */
2729 if ((section->flags & SEC_RELOC) != 0
2730 && section->reloc_count != 0)
2732 /* Get a copy of the native relocations. */
2733 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, section,
2735 link_info->keep_memory);
2736 if (internal_relocs == NULL)
2739 /* Now examine each relocation. */
2740 irel = internal_relocs;
2741 irelend = irel + section->reloc_count;
2742 for (; irel < irelend; irel++)
2745 unsigned long r_index;
2748 r_type = ELF32_R_TYPE (irel->r_info);
2749 r_index = ELF32_R_SYM (irel->r_info);
2751 if (r_type < 0 || r_type >= (int) R_MN10300_MAX)
2754 /* We need the name and hash table entry of the target
2759 if (r_index < symtab_hdr->sh_info)
2761 /* A local symbol. */
2762 Elf_Internal_Sym *isym;
2763 struct elf_link_hash_table *elftab;
2766 isym = isymbuf + r_index;
2767 if (isym->st_shndx == SHN_UNDEF)
2768 sym_sec = bfd_und_section_ptr;
2769 else if (isym->st_shndx == SHN_ABS)
2770 sym_sec = bfd_abs_section_ptr;
2771 else if (isym->st_shndx == SHN_COMMON)
2772 sym_sec = bfd_com_section_ptr;
2775 = bfd_section_from_elf_index (input_bfd,
2779 = bfd_elf_string_from_elf_section (input_bfd,
2784 /* If it isn't a function, then we don't care
2786 if (ELF_ST_TYPE (isym->st_info) != STT_FUNC)
2789 /* Tack on an ID so we can uniquely identify this
2790 local symbol in the global hash table. */
2791 amt = strlen (sym_name) + 10;
2792 new_name = bfd_malloc (amt);
2793 if (new_name == NULL)
2796 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
2797 sym_name = new_name;
2799 elftab = &hash_table->static_hash_table->root;
2800 hash = ((struct elf32_mn10300_link_hash_entry *)
2801 elf_link_hash_lookup (elftab, sym_name,
2802 TRUE, TRUE, FALSE));
2807 r_index -= symtab_hdr->sh_info;
2808 hash = (struct elf32_mn10300_link_hash_entry *)
2809 elf_sym_hashes (input_bfd)[r_index];
2812 sym_name = hash->root.root.root.string;
2813 if ((section->flags & SEC_CODE) != 0)
2815 /* If this is not a "call" instruction, then we
2816 should convert "call" instructions to "calls"
2818 code = bfd_get_8 (input_bfd,
2819 contents + irel->r_offset - 1);
2820 if (code != 0xdd && code != 0xcd)
2821 hash->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2824 /* If this is a jump/call, then bump the
2825 direct_calls counter. Else force "call" to
2826 "calls" conversions. */
2827 if (r_type == R_MN10300_PCREL32
2828 || r_type == R_MN10300_PLT32
2829 || r_type == R_MN10300_PLT16
2830 || r_type == R_MN10300_PCREL16)
2831 hash->direct_calls++;
2833 hash->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2837 /* Now look at the actual contents to get the stack size,
2838 and a list of what registers were saved in the prologue
2840 if ((section->flags & SEC_CODE) != 0)
2842 Elf_Internal_Sym *isym, *isymend;
2843 unsigned int sec_shndx;
2844 struct elf_link_hash_entry **hashes;
2845 struct elf_link_hash_entry **end_hashes;
2846 unsigned int symcount;
2848 sec_shndx = _bfd_elf_section_from_bfd_section (input_bfd,
2851 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2852 - symtab_hdr->sh_info);
2853 hashes = elf_sym_hashes (input_bfd);
2854 end_hashes = hashes + symcount;
2856 /* Look at each function defined in this section and
2857 update info for that function. */
2858 isymend = isymbuf + symtab_hdr->sh_info;
2859 for (isym = isymbuf; isym < isymend; isym++)
2861 if (isym->st_shndx == sec_shndx
2862 && ELF_ST_TYPE (isym->st_info) == STT_FUNC)
2864 struct elf_link_hash_table *elftab;
2866 struct elf_link_hash_entry **lhashes = hashes;
2868 /* Skip a local symbol if it aliases a
2870 for (; lhashes < end_hashes; lhashes++)
2872 hash = (struct elf32_mn10300_link_hash_entry *) *lhashes;
2873 if ((hash->root.root.type == bfd_link_hash_defined
2874 || hash->root.root.type == bfd_link_hash_defweak)
2875 && hash->root.root.u.def.section == section
2876 && hash->root.type == STT_FUNC
2877 && hash->root.root.u.def.value == isym->st_value)
2880 if (lhashes != end_hashes)
2883 if (isym->st_shndx == SHN_UNDEF)
2884 sym_sec = bfd_und_section_ptr;
2885 else if (isym->st_shndx == SHN_ABS)
2886 sym_sec = bfd_abs_section_ptr;
2887 else if (isym->st_shndx == SHN_COMMON)
2888 sym_sec = bfd_com_section_ptr;
2891 = bfd_section_from_elf_index (input_bfd,
2894 sym_name = (bfd_elf_string_from_elf_section
2895 (input_bfd, symtab_hdr->sh_link,
2898 /* Tack on an ID so we can uniquely identify this
2899 local symbol in the global hash table. */
2900 amt = strlen (sym_name) + 10;
2901 new_name = bfd_malloc (amt);
2902 if (new_name == NULL)
2905 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
2906 sym_name = new_name;
2908 elftab = &hash_table->static_hash_table->root;
2909 hash = ((struct elf32_mn10300_link_hash_entry *)
2910 elf_link_hash_lookup (elftab, sym_name,
2911 TRUE, TRUE, FALSE));
2913 compute_function_info (input_bfd, hash,
2914 isym->st_value, contents);
2915 hash->value = isym->st_value;
2919 for (; hashes < end_hashes; hashes++)
2921 hash = (struct elf32_mn10300_link_hash_entry *) *hashes;
2922 if ((hash->root.root.type == bfd_link_hash_defined
2923 || hash->root.root.type == bfd_link_hash_defweak)
2924 && hash->root.root.u.def.section == section
2925 && hash->root.type == STT_FUNC)
2926 compute_function_info (input_bfd, hash,
2927 (hash)->root.root.u.def.value,
2932 /* Cache or free any memory we allocated for the relocs. */
2933 if (internal_relocs != NULL
2934 && elf_section_data (section)->relocs != internal_relocs)
2935 free (internal_relocs);
2936 internal_relocs = NULL;
2938 /* Cache or free any memory we allocated for the contents. */
2939 if (contents != NULL
2940 && elf_section_data (section)->this_hdr.contents != contents)
2942 if (! link_info->keep_memory)
2946 /* Cache the section contents for elf_link_input_bfd. */
2947 elf_section_data (section)->this_hdr.contents = contents;
2953 /* Cache or free any memory we allocated for the symbols. */
2955 && symtab_hdr->contents != (unsigned char *) isymbuf)
2957 if (! link_info->keep_memory)
2961 /* Cache the symbols for elf_link_input_bfd. */
2962 symtab_hdr->contents = (unsigned char *) isymbuf;
2968 /* Now iterate on each symbol in the hash table and perform
2969 the final initialization steps on each. */
2970 elf32_mn10300_link_hash_traverse (hash_table,
2971 elf32_mn10300_finish_hash_table_entry,
2973 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2974 elf32_mn10300_finish_hash_table_entry,
2978 /* This section of code collects all our local symbols, sorts
2979 them by value, and looks for multiple symbols referring to
2980 the same address. For those symbols, the flags are merged.
2981 At this point, the only flag that can be set is
2982 MN10300_CONVERT_CALL_TO_CALLS, so we simply OR the flags
2984 int static_count = 0, i;
2985 struct elf32_mn10300_link_hash_entry **entries;
2986 struct elf32_mn10300_link_hash_entry **ptr;
2988 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2989 elf32_mn10300_count_hash_table_entries,
2992 entries = bfd_malloc (static_count * sizeof (* ptr));
2995 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2996 elf32_mn10300_list_hash_table_entries,
2999 qsort (entries, static_count, sizeof (entries[0]), sort_by_value);
3001 for (i = 0; i < static_count - 1; i++)
3002 if (entries[i]->value && entries[i]->value == entries[i+1]->value)
3004 int v = entries[i]->flags;
3007 for (j = i + 1; j < static_count && entries[j]->value == entries[i]->value; j++)
3008 v |= entries[j]->flags;
3010 for (j = i; j < static_count && entries[j]->value == entries[i]->value; j++)
3011 entries[j]->flags = v;
3017 /* All entries in the hash table are fully initialized. */
3018 hash_table->flags |= MN10300_HASH_ENTRIES_INITIALIZED;
3020 /* Now that everything has been initialized, go through each
3021 code section and delete any prologue insns which will be
3022 redundant because their operations will be performed by
3023 a "call" instruction. */
3024 for (input_bfd = link_info->input_bfds;
3026 input_bfd = input_bfd->link_next)
3028 /* We're going to need all the local symbols for each bfd. */
3029 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3030 if (symtab_hdr->sh_info != 0)
3032 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3033 if (isymbuf == NULL)
3034 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
3035 symtab_hdr->sh_info, 0,
3037 if (isymbuf == NULL)
3041 /* Walk over each section in this bfd. */
3042 for (section = input_bfd->sections;
3044 section = section->next)
3046 unsigned int sec_shndx;
3047 Elf_Internal_Sym *isym, *isymend;
3048 struct elf_link_hash_entry **hashes;
3049 struct elf_link_hash_entry **end_hashes;
3050 unsigned int symcount;
3052 /* Skip non-code sections and empty sections. */
3053 if ((section->flags & SEC_CODE) == 0 || section->size == 0)
3056 if (section->reloc_count != 0)
3058 /* Get a copy of the native relocations. */
3059 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, section,
3061 link_info->keep_memory);
3062 if (internal_relocs == NULL)
3066 /* Get cached copy of section contents if it exists. */
3067 if (elf_section_data (section)->this_hdr.contents != NULL)
3068 contents = elf_section_data (section)->this_hdr.contents;
3071 /* Go get them off disk. */
3072 if (!bfd_malloc_and_get_section (input_bfd, section,
3077 sec_shndx = _bfd_elf_section_from_bfd_section (input_bfd,
3080 /* Now look for any function in this section which needs
3081 insns deleted from its prologue. */
3082 isymend = isymbuf + symtab_hdr->sh_info;
3083 for (isym = isymbuf; isym < isymend; isym++)
3085 struct elf32_mn10300_link_hash_entry *sym_hash;
3086 asection *sym_sec = NULL;
3087 const char *sym_name;
3089 struct elf_link_hash_table *elftab;
3092 if (isym->st_shndx != sec_shndx)
3095 if (isym->st_shndx == SHN_UNDEF)
3096 sym_sec = bfd_und_section_ptr;
3097 else if (isym->st_shndx == SHN_ABS)
3098 sym_sec = bfd_abs_section_ptr;
3099 else if (isym->st_shndx == SHN_COMMON)
3100 sym_sec = bfd_com_section_ptr;
3103 = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
3106 = bfd_elf_string_from_elf_section (input_bfd,
3107 symtab_hdr->sh_link,
3110 /* Tack on an ID so we can uniquely identify this
3111 local symbol in the global hash table. */
3112 amt = strlen (sym_name) + 10;
3113 new_name = bfd_malloc (amt);
3114 if (new_name == NULL)
3116 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
3117 sym_name = new_name;
3119 elftab = & hash_table->static_hash_table->root;
3120 sym_hash = (struct elf32_mn10300_link_hash_entry *)
3121 elf_link_hash_lookup (elftab, sym_name,
3122 FALSE, FALSE, FALSE);
3125 if (sym_hash == NULL)
3128 if (! (sym_hash->flags & MN10300_CONVERT_CALL_TO_CALLS)
3129 && ! (sym_hash->flags & MN10300_DELETED_PROLOGUE_BYTES))
3133 /* Note that we've changed things. */
3134 elf_section_data (section)->relocs = internal_relocs;
3135 elf_section_data (section)->this_hdr.contents = contents;
3136 symtab_hdr->contents = (unsigned char *) isymbuf;
3138 /* Count how many bytes we're going to delete. */
3139 if (sym_hash->movm_args)
3142 if (sym_hash->stack_size > 0)
3144 if (sym_hash->stack_size <= 128)
3150 /* Note that we've deleted prologue bytes for this
3152 sym_hash->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3154 /* Actually delete the bytes. */
3155 if (!mn10300_elf_relax_delete_bytes (input_bfd,
3161 /* Something changed. Not strictly necessary, but
3162 may lead to more relaxing opportunities. */
3167 /* Look for any global functions in this section which
3168 need insns deleted from their prologues. */
3169 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
3170 - symtab_hdr->sh_info);
3171 hashes = elf_sym_hashes (input_bfd);
3172 end_hashes = hashes + symcount;
3173 for (; hashes < end_hashes; hashes++)
3175 struct elf32_mn10300_link_hash_entry *sym_hash;
3177 sym_hash = (struct elf32_mn10300_link_hash_entry *) *hashes;
3178 if ((sym_hash->root.root.type == bfd_link_hash_defined
3179 || sym_hash->root.root.type == bfd_link_hash_defweak)
3180 && sym_hash->root.root.u.def.section == section
3181 && ! (sym_hash->flags & MN10300_CONVERT_CALL_TO_CALLS)
3182 && ! (sym_hash->flags & MN10300_DELETED_PROLOGUE_BYTES))
3186 struct elf_link_hash_entry **hh;
3188 /* Note that we've changed things. */
3189 elf_section_data (section)->relocs = internal_relocs;
3190 elf_section_data (section)->this_hdr.contents = contents;
3191 symtab_hdr->contents = (unsigned char *) isymbuf;
3193 /* Count how many bytes we're going to delete. */
3194 if (sym_hash->movm_args)
3197 if (sym_hash->stack_size > 0)
3199 if (sym_hash->stack_size <= 128)
3205 /* Note that we've deleted prologue bytes for this
3207 sym_hash->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3209 /* Actually delete the bytes. */
3210 symval = sym_hash->root.root.u.def.value;
3211 if (!mn10300_elf_relax_delete_bytes (input_bfd,
3217 /* There may be other C++ functions symbols with the same
3218 address. If so then mark these as having had their
3219 prologue bytes deleted as well. */
3220 for (hh = elf_sym_hashes (input_bfd); hh < end_hashes; hh++)
3222 struct elf32_mn10300_link_hash_entry *h;
3224 h = (struct elf32_mn10300_link_hash_entry *) * hh;
3227 && (h->root.root.type == bfd_link_hash_defined
3228 || h->root.root.type == bfd_link_hash_defweak)
3229 && h->root.root.u.def.section == section
3230 && ! (h->flags & MN10300_CONVERT_CALL_TO_CALLS)
3231 && h->root.root.u.def.value == symval
3232 && h->root.type == STT_FUNC)
3233 h->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3236 /* Something changed. Not strictly necessary, but
3237 may lead to more relaxing opportunities. */
3242 /* Cache or free any memory we allocated for the relocs. */
3243 if (internal_relocs != NULL
3244 && elf_section_data (section)->relocs != internal_relocs)
3245 free (internal_relocs);
3246 internal_relocs = NULL;
3248 /* Cache or free any memory we allocated for the contents. */
3249 if (contents != NULL
3250 && elf_section_data (section)->this_hdr.contents != contents)
3252 if (! link_info->keep_memory)
3255 /* Cache the section contents for elf_link_input_bfd. */
3256 elf_section_data (section)->this_hdr.contents = contents;
3261 /* Cache or free any memory we allocated for the symbols. */
3263 && symtab_hdr->contents != (unsigned char *) isymbuf)
3265 if (! link_info->keep_memory)
3268 /* Cache the symbols for elf_link_input_bfd. */
3269 symtab_hdr->contents = (unsigned char *) isymbuf;
3275 /* (Re)initialize for the basic instruction shortening/relaxing pass. */
3277 internal_relocs = NULL;
3279 /* For error_return. */
3282 /* We don't have to do anything for a relocatable link, if
3283 this section does not have relocs, or if this is not a
3285 if (link_info->relocatable
3286 || (sec->flags & SEC_RELOC) == 0
3287 || sec->reloc_count == 0
3288 || (sec->flags & SEC_CODE) == 0)
3291 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3293 /* Get a copy of the native relocations. */
3294 internal_relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
3295 link_info->keep_memory);
3296 if (internal_relocs == NULL)
3299 /* Scan for worst case alignment gap changes. Note that this logic
3300 is not ideal; what we should do is run this scan for every
3301 opcode/address range and adjust accordingly, but that's
3302 expensive. Worst case is that for an alignment of N bytes, we
3303 move by 2*N-N-1 bytes, assuming we have aligns of 1, 2, 4, 8, etc
3304 all before it. Plus, this still doesn't cover cross-section
3305 jumps with section alignment. */
3306 irelend = internal_relocs + sec->reloc_count;
3307 align_gap_adjustment = 0;
3308 for (irel = internal_relocs; irel < irelend; irel++)
3310 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN)
3312 bfd_vma adj = 1 << irel->r_addend;
3313 bfd_vma aend = irel->r_offset;
3315 aend = BFD_ALIGN (aend, 1 << irel->r_addend);
3316 adj = 2 * adj - adj - 1;
3318 /* Record the biggest adjustmnet. Skip any alignment at the
3319 end of our section. */
3320 if (align_gap_adjustment < adj
3321 && aend < sec->output_section->vma + sec->output_offset + sec->size)
3322 align_gap_adjustment = adj;
3326 /* Walk through them looking for relaxing opportunities. */
3327 irelend = internal_relocs + sec->reloc_count;
3328 for (irel = internal_relocs; irel < irelend; irel++)
3331 bfd_signed_vma jump_offset;
3332 asection *sym_sec = NULL;
3333 struct elf32_mn10300_link_hash_entry *h = NULL;
3335 /* If this isn't something that can be relaxed, then ignore
3337 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_NONE
3338 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_8
3339 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_MAX)
3342 /* Get the section contents if we haven't done so already. */
3343 if (contents == NULL)
3345 /* Get cached copy if it exists. */
3346 if (elf_section_data (sec)->this_hdr.contents != NULL)
3347 contents = elf_section_data (sec)->this_hdr.contents;
3350 /* Go get them off disk. */
3351 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
3356 /* Read this BFD's symbols if we haven't done so already. */
3357 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
3359 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3360 if (isymbuf == NULL)
3361 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3362 symtab_hdr->sh_info, 0,
3364 if (isymbuf == NULL)
3368 /* Get the value of the symbol referred to by the reloc. */
3369 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
3371 Elf_Internal_Sym *isym;
3372 const char *sym_name;
3375 /* A local symbol. */
3376 isym = isymbuf + ELF32_R_SYM (irel->r_info);
3377 if (isym->st_shndx == SHN_UNDEF)
3378 sym_sec = bfd_und_section_ptr;
3379 else if (isym->st_shndx == SHN_ABS)
3380 sym_sec = bfd_abs_section_ptr;
3381 else if (isym->st_shndx == SHN_COMMON)
3382 sym_sec = bfd_com_section_ptr;
3384 sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3386 sym_name = bfd_elf_string_from_elf_section (abfd,
3387 symtab_hdr->sh_link,
3390 if ((sym_sec->flags & SEC_MERGE)
3391 && sym_sec->sec_info_type == SEC_INFO_TYPE_MERGE)
3393 symval = isym->st_value;
3395 /* GAS may reduce relocations against symbols in SEC_MERGE
3396 sections to a relocation against the section symbol when
3397 the original addend was zero. When the reloc is against
3398 a section symbol we should include the addend in the
3399 offset passed to _bfd_merged_section_offset, since the
3400 location of interest is the original symbol. On the
3401 other hand, an access to "sym+addend" where "sym" is not
3402 a section symbol should not include the addend; Such an
3403 access is presumed to be an offset from "sym"; The
3404 location of interest is just "sym". */
3405 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
3406 symval += irel->r_addend;
3408 symval = _bfd_merged_section_offset (abfd, & sym_sec,
3409 elf_section_data (sym_sec)->sec_info,
3412 if (ELF_ST_TYPE (isym->st_info) != STT_SECTION)
3413 symval += irel->r_addend;
3415 symval += sym_sec->output_section->vma
3416 + sym_sec->output_offset - irel->r_addend;
3419 symval = (isym->st_value
3420 + sym_sec->output_section->vma
3421 + sym_sec->output_offset);
3423 /* Tack on an ID so we can uniquely identify this
3424 local symbol in the global hash table. */
3425 new_name = bfd_malloc ((bfd_size_type) strlen (sym_name) + 10);
3426 if (new_name == NULL)
3428 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
3429 sym_name = new_name;
3431 h = (struct elf32_mn10300_link_hash_entry *)
3432 elf_link_hash_lookup (&hash_table->static_hash_table->root,
3433 sym_name, FALSE, FALSE, FALSE);
3440 /* An external symbol. */
3441 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
3442 h = (struct elf32_mn10300_link_hash_entry *)
3443 (elf_sym_hashes (abfd)[indx]);
3444 BFD_ASSERT (h != NULL);
3445 if (h->root.root.type != bfd_link_hash_defined
3446 && h->root.root.type != bfd_link_hash_defweak)
3447 /* This appears to be a reference to an undefined
3448 symbol. Just ignore it--it will be caught by the
3449 regular reloc processing. */
3452 /* Check for a reference to a discarded symbol and ignore it. */
3453 if (h->root.root.u.def.section->output_section == NULL)
3456 sym_sec = h->root.root.u.def.section->output_section;
3458 symval = (h->root.root.u.def.value
3459 + h->root.root.u.def.section->output_section->vma
3460 + h->root.root.u.def.section->output_offset);
3463 /* For simplicity of coding, we are going to modify the section
3464 contents, the section relocs, and the BFD symbol table. We
3465 must tell the rest of the code not to free up this
3466 information. It would be possible to instead create a table
3467 of changes which have to be made, as is done in coff-mips.c;
3468 that would be more work, but would require less memory when
3469 the linker is run. */
3471 /* Try to turn a 32bit pc-relative branch/call into a 16bit pc-relative
3472 branch/call, also deal with "call" -> "calls" conversions and
3473 insertion of prologue data into "call" instructions. */
3474 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL32
3475 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PLT32)
3477 bfd_vma value = symval;
3479 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PLT32
3481 && ELF_ST_VISIBILITY (h->root.other) != STV_INTERNAL
3482 && ELF_ST_VISIBILITY (h->root.other) != STV_HIDDEN
3483 && h->root.plt.offset != (bfd_vma) -1)
3487 splt = hash_table->root.splt;
3488 value = ((splt->output_section->vma
3489 + splt->output_offset
3490 + h->root.plt.offset)
3491 - (sec->output_section->vma
3492 + sec->output_offset
3496 /* If we've got a "call" instruction that needs to be turned
3497 into a "calls" instruction, do so now. It saves a byte. */
3498 if (h && (h->flags & MN10300_CONVERT_CALL_TO_CALLS))
3502 /* Get the opcode. */
3503 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3505 /* Make sure we're working with a "call" instruction! */
3508 /* Note that we've changed the relocs, section contents,
3510 elf_section_data (sec)->relocs = internal_relocs;
3511 elf_section_data (sec)->this_hdr.contents = contents;
3512 symtab_hdr->contents = (unsigned char *) isymbuf;
3514 /* Fix the opcode. */
3515 bfd_put_8 (abfd, 0xfc, contents + irel->r_offset - 1);
3516 bfd_put_8 (abfd, 0xff, contents + irel->r_offset);
3518 /* Fix irel->r_offset and irel->r_addend. */
3519 irel->r_offset += 1;
3520 irel->r_addend += 1;
3522 /* Delete one byte of data. */
3523 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3524 irel->r_offset + 3, 1))
3527 /* That will change things, so, we should relax again.
3528 Note that this is not required, and it may be slow. */
3534 /* We've got a "call" instruction which needs some data
3535 from target function filled in. */
3538 /* Get the opcode. */
3539 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3541 /* Insert data from the target function into the "call"
3542 instruction if needed. */
3545 bfd_put_8 (abfd, h->movm_args, contents + irel->r_offset + 4);
3546 bfd_put_8 (abfd, h->stack_size + h->movm_stack_size,
3547 contents + irel->r_offset + 5);
3551 /* Deal with pc-relative gunk. */
3552 value -= (sec->output_section->vma + sec->output_offset);
3553 value -= irel->r_offset;
3554 value += irel->r_addend;
3556 /* See if the value will fit in 16 bits, note the high value is
3557 0x7fff + 2 as the target will be two bytes closer if we are
3558 able to relax, if it's in the same section. */
3559 if (sec->output_section == sym_sec->output_section)
3560 jump_offset = 0x8001;
3562 jump_offset = 0x7fff;
3564 /* Account for jumps across alignment boundaries using
3565 align_gap_adjustment. */
3566 if ((bfd_signed_vma) value < jump_offset - (bfd_signed_vma) align_gap_adjustment
3567 && ((bfd_signed_vma) value > -0x8000 + (bfd_signed_vma) align_gap_adjustment))
3571 /* Get the opcode. */
3572 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3574 if (code != 0xdc && code != 0xdd && code != 0xff)
3577 /* Note that we've changed the relocs, section contents, etc. */
3578 elf_section_data (sec)->relocs = internal_relocs;
3579 elf_section_data (sec)->this_hdr.contents = contents;
3580 symtab_hdr->contents = (unsigned char *) isymbuf;
3582 /* Fix the opcode. */
3584 bfd_put_8 (abfd, 0xcc, contents + irel->r_offset - 1);
3585 else if (code == 0xdd)
3586 bfd_put_8 (abfd, 0xcd, contents + irel->r_offset - 1);
3587 else if (code == 0xff)
3588 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
3590 /* Fix the relocation's type. */
3591 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3592 (ELF32_R_TYPE (irel->r_info)
3593 == (int) R_MN10300_PLT32)
3597 /* Delete two bytes of data. */
3598 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3599 irel->r_offset + 1, 2))
3602 /* That will change things, so, we should relax again.
3603 Note that this is not required, and it may be slow. */
3608 /* Try to turn a 16bit pc-relative branch into a 8bit pc-relative
3610 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL16)
3612 bfd_vma value = symval;
3614 /* If we've got a "call" instruction that needs to be turned
3615 into a "calls" instruction, do so now. It saves a byte. */
3616 if (h && (h->flags & MN10300_CONVERT_CALL_TO_CALLS))
3620 /* Get the opcode. */
3621 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3623 /* Make sure we're working with a "call" instruction! */
3626 /* Note that we've changed the relocs, section contents,
3628 elf_section_data (sec)->relocs = internal_relocs;
3629 elf_section_data (sec)->this_hdr.contents = contents;
3630 symtab_hdr->contents = (unsigned char *) isymbuf;
3632 /* Fix the opcode. */
3633 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 1);
3634 bfd_put_8 (abfd, 0xff, contents + irel->r_offset);
3636 /* Fix irel->r_offset and irel->r_addend. */
3637 irel->r_offset += 1;
3638 irel->r_addend += 1;
3640 /* Delete one byte of data. */
3641 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3642 irel->r_offset + 1, 1))
3645 /* That will change things, so, we should relax again.
3646 Note that this is not required, and it may be slow. */
3654 /* Get the opcode. */
3655 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3657 /* Insert data from the target function into the "call"
3658 instruction if needed. */
3661 bfd_put_8 (abfd, h->movm_args, contents + irel->r_offset + 2);
3662 bfd_put_8 (abfd, h->stack_size + h->movm_stack_size,
3663 contents + irel->r_offset + 3);
3667 /* Deal with pc-relative gunk. */
3668 value -= (sec->output_section->vma + sec->output_offset);
3669 value -= irel->r_offset;
3670 value += irel->r_addend;
3672 /* See if the value will fit in 8 bits, note the high value is
3673 0x7f + 1 as the target will be one bytes closer if we are
3675 if ((long) value < 0x80 && (long) value > -0x80)
3679 /* Get the opcode. */
3680 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3685 /* Note that we've changed the relocs, section contents, etc. */
3686 elf_section_data (sec)->relocs = internal_relocs;
3687 elf_section_data (sec)->this_hdr.contents = contents;
3688 symtab_hdr->contents = (unsigned char *) isymbuf;
3690 /* Fix the opcode. */
3691 bfd_put_8 (abfd, 0xca, contents + irel->r_offset - 1);
3693 /* Fix the relocation's type. */
3694 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3697 /* Delete one byte of data. */
3698 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3699 irel->r_offset + 1, 1))
3702 /* That will change things, so, we should relax again.
3703 Note that this is not required, and it may be slow. */
3708 /* Try to eliminate an unconditional 8 bit pc-relative branch
3709 which immediately follows a conditional 8 bit pc-relative
3710 branch around the unconditional branch.
3717 This happens when the bCC can't reach lab2 at assembly time,
3718 but due to other relaxations it can reach at link time. */
3719 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL8)
3721 Elf_Internal_Rela *nrel;
3722 bfd_vma value = symval;
3725 /* Deal with pc-relative gunk. */
3726 value -= (sec->output_section->vma + sec->output_offset);
3727 value -= irel->r_offset;
3728 value += irel->r_addend;
3730 /* Do nothing if this reloc is the last byte in the section. */
3731 if (irel->r_offset == sec->size)
3734 /* See if the next instruction is an unconditional pc-relative
3735 branch, more often than not this test will fail, so we
3736 test it first to speed things up. */
3737 code = bfd_get_8 (abfd, contents + irel->r_offset + 1);
3741 /* Also make sure the next relocation applies to the next
3742 instruction and that it's a pc-relative 8 bit branch. */
3745 || irel->r_offset + 2 != nrel->r_offset
3746 || ELF32_R_TYPE (nrel->r_info) != (int) R_MN10300_PCREL8)
3749 /* Make sure our destination immediately follows the
3750 unconditional branch. */
3751 if (symval != (sec->output_section->vma + sec->output_offset
3752 + irel->r_offset + 3))
3755 /* Now make sure we are a conditional branch. This may not
3756 be necessary, but why take the chance.
3758 Note these checks assume that R_MN10300_PCREL8 relocs
3759 only occur on bCC and bCCx insns. If they occured
3760 elsewhere, we'd need to know the start of this insn
3761 for this check to be accurate. */
3762 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3763 if (code != 0xc0 && code != 0xc1 && code != 0xc2
3764 && code != 0xc3 && code != 0xc4 && code != 0xc5
3765 && code != 0xc6 && code != 0xc7 && code != 0xc8
3766 && code != 0xc9 && code != 0xe8 && code != 0xe9
3767 && code != 0xea && code != 0xeb)
3770 /* We also have to be sure there is no symbol/label
3771 at the unconditional branch. */
3772 if (mn10300_elf_symbol_address_p (abfd, sec, isymbuf,
3773 irel->r_offset + 1))
3776 /* Note that we've changed the relocs, section contents, etc. */
3777 elf_section_data (sec)->relocs = internal_relocs;
3778 elf_section_data (sec)->this_hdr.contents = contents;
3779 symtab_hdr->contents = (unsigned char *) isymbuf;
3781 /* Reverse the condition of the first branch. */
3827 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
3829 /* Set the reloc type and symbol for the first branch
3830 from the second branch. */
3831 irel->r_info = nrel->r_info;
3833 /* Make the reloc for the second branch a null reloc. */
3834 nrel->r_info = ELF32_R_INFO (ELF32_R_SYM (nrel->r_info),
3837 /* Delete two bytes of data. */
3838 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3839 irel->r_offset + 1, 2))
3842 /* That will change things, so, we should relax again.
3843 Note that this is not required, and it may be slow. */
3847 /* Try to turn a 24 immediate, displacement or absolute address
3848 into a 8 immediate, displacement or absolute address. */
3849 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_24)
3851 bfd_vma value = symval;
3852 value += irel->r_addend;
3854 /* See if the value will fit in 8 bits. */
3855 if ((long) value < 0x7f && (long) value > -0x80)
3859 /* AM33 insns which have 24 operands are 6 bytes long and
3860 will have 0xfd as the first byte. */
3862 /* Get the first opcode. */
3863 code = bfd_get_8 (abfd, contents + irel->r_offset - 3);
3867 /* Get the second opcode. */
3868 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
3870 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3871 equivalent instructions exists. */
3872 if (code != 0x6b && code != 0x7b
3873 && code != 0x8b && code != 0x9b
3874 && ((code & 0x0f) == 0x09 || (code & 0x0f) == 0x08
3875 || (code & 0x0f) == 0x0a || (code & 0x0f) == 0x0b
3876 || (code & 0x0f) == 0x0e))
3878 /* Not safe if the high bit is on as relaxing may
3879 move the value out of high mem and thus not fit
3880 in a signed 8bit value. This is currently over
3882 if ((value & 0x80) == 0)
3884 /* Note that we've changed the relocation contents,
3886 elf_section_data (sec)->relocs = internal_relocs;
3887 elf_section_data (sec)->this_hdr.contents = contents;
3888 symtab_hdr->contents = (unsigned char *) isymbuf;
3890 /* Fix the opcode. */
3891 bfd_put_8 (abfd, 0xfb, contents + irel->r_offset - 3);
3892 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
3894 /* Fix the relocation's type. */
3896 ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3899 /* Delete two bytes of data. */
3900 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3901 irel->r_offset + 1, 2))
3904 /* That will change things, so, we should relax
3905 again. Note that this is not required, and it
3915 /* Try to turn a 32bit immediate, displacement or absolute address
3916 into a 16bit immediate, displacement or absolute address. */
3917 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_32
3918 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOT32
3919 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTOFF32)
3921 bfd_vma value = symval;
3923 if (ELF32_R_TYPE (irel->r_info) != (int) R_MN10300_32)
3927 sgot = hash_table->root.sgot;
3928 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOT32)
3930 value = sgot->output_offset;
3933 value += h->root.got.offset;
3935 value += (elf_local_got_offsets
3936 (abfd)[ELF32_R_SYM (irel->r_info)]);
3938 else if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTOFF32)
3939 value -= sgot->output_section->vma;
3940 else if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTPC32)
3941 value = (sgot->output_section->vma
3942 - (sec->output_section->vma
3943 + sec->output_offset
3949 value += irel->r_addend;
3951 /* See if the value will fit in 24 bits.
3952 We allow any 16bit match here. We prune those we can't
3954 if ((long) value < 0x7fffff && (long) value > -0x800000)
3958 /* AM33 insns which have 32bit operands are 7 bytes long and
3959 will have 0xfe as the first byte. */
3961 /* Get the first opcode. */
3962 code = bfd_get_8 (abfd, contents + irel->r_offset - 3);
3966 /* Get the second opcode. */
3967 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
3969 /* All the am33 32 -> 24 relaxing possibilities. */
3970 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3971 equivalent instructions exists. */
3972 if (code != 0x6b && code != 0x7b
3973 && code != 0x8b && code != 0x9b
3974 && (ELF32_R_TYPE (irel->r_info)
3975 != (int) R_MN10300_GOTPC32)
3976 && ((code & 0x0f) == 0x09 || (code & 0x0f) == 0x08
3977 || (code & 0x0f) == 0x0a || (code & 0x0f) == 0x0b
3978 || (code & 0x0f) == 0x0e))
3980 /* Not safe if the high bit is on as relaxing may
3981 move the value out of high mem and thus not fit
3982 in a signed 16bit value. This is currently over
3984 if ((value & 0x8000) == 0)
3986 /* Note that we've changed the relocation contents,
3988 elf_section_data (sec)->relocs = internal_relocs;
3989 elf_section_data (sec)->this_hdr.contents = contents;
3990 symtab_hdr->contents = (unsigned char *) isymbuf;
3992 /* Fix the opcode. */
3993 bfd_put_8 (abfd, 0xfd, contents + irel->r_offset - 3);
3994 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
3996 /* Fix the relocation's type. */
3998 ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3999 (ELF32_R_TYPE (irel->r_info)
4000 == (int) R_MN10300_GOTOFF32)
4001 ? R_MN10300_GOTOFF24
4002 : (ELF32_R_TYPE (irel->r_info)
4003 == (int) R_MN10300_GOT32)
4007 /* Delete one byte of data. */
4008 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4009 irel->r_offset + 3, 1))
4012 /* That will change things, so, we should relax
4013 again. Note that this is not required, and it
4022 /* See if the value will fit in 16 bits.
4023 We allow any 16bit match here. We prune those we can't
4025 if ((long) value < 0x7fff && (long) value > -0x8000)
4029 /* Most insns which have 32bit operands are 6 bytes long;
4030 exceptions are pcrel insns and bit insns.
4032 We handle pcrel insns above. We don't bother trying
4033 to handle the bit insns here.
4035 The first byte of the remaining insns will be 0xfc. */
4037 /* Get the first opcode. */
4038 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
4043 /* Get the second opcode. */
4044 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
4046 if ((code & 0xf0) < 0x80)
4047 switch (code & 0xf0)
4049 /* mov (d32,am),dn -> mov (d32,am),dn
4050 mov dm,(d32,am) -> mov dn,(d32,am)
4051 mov (d32,am),an -> mov (d32,am),an
4052 mov dm,(d32,am) -> mov dn,(d32,am)
4053 movbu (d32,am),dn -> movbu (d32,am),dn
4054 movbu dm,(d32,am) -> movbu dn,(d32,am)
4055 movhu (d32,am),dn -> movhu (d32,am),dn
4056 movhu dm,(d32,am) -> movhu dn,(d32,am) */
4065 /* Not safe if the high bit is on as relaxing may
4066 move the value out of high mem and thus not fit
4067 in a signed 16bit value. */
4069 && (value & 0x8000))
4072 /* Note that we've changed the relocation contents, etc. */
4073 elf_section_data (sec)->relocs = internal_relocs;
4074 elf_section_data (sec)->this_hdr.contents = contents;
4075 symtab_hdr->contents = (unsigned char *) isymbuf;
4077 /* Fix the opcode. */
4078 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4079 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4081 /* Fix the relocation's type. */
4082 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4083 (ELF32_R_TYPE (irel->r_info)
4084 == (int) R_MN10300_GOTOFF32)
4085 ? R_MN10300_GOTOFF16
4086 : (ELF32_R_TYPE (irel->r_info)
4087 == (int) R_MN10300_GOT32)
4089 : (ELF32_R_TYPE (irel->r_info)
4090 == (int) R_MN10300_GOTPC32)
4091 ? R_MN10300_GOTPC16 :
4094 /* Delete two bytes of data. */
4095 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4096 irel->r_offset + 2, 2))
4099 /* That will change things, so, we should relax again.
4100 Note that this is not required, and it may be slow. */
4104 else if ((code & 0xf0) == 0x80
4105 || (code & 0xf0) == 0x90)
4106 switch (code & 0xf3)
4108 /* mov dn,(abs32) -> mov dn,(abs16)
4109 movbu dn,(abs32) -> movbu dn,(abs16)
4110 movhu dn,(abs32) -> movhu dn,(abs16) */
4114 /* Note that we've changed the relocation contents, etc. */
4115 elf_section_data (sec)->relocs = internal_relocs;
4116 elf_section_data (sec)->this_hdr.contents = contents;
4117 symtab_hdr->contents = (unsigned char *) isymbuf;
4119 if ((code & 0xf3) == 0x81)
4120 code = 0x01 + (code & 0x0c);
4121 else if ((code & 0xf3) == 0x82)
4122 code = 0x02 + (code & 0x0c);
4123 else if ((code & 0xf3) == 0x83)
4124 code = 0x03 + (code & 0x0c);
4128 /* Fix the opcode. */
4129 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
4131 /* Fix the relocation's type. */
4132 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4133 (ELF32_R_TYPE (irel->r_info)
4134 == (int) R_MN10300_GOTOFF32)
4135 ? R_MN10300_GOTOFF16
4136 : (ELF32_R_TYPE (irel->r_info)
4137 == (int) R_MN10300_GOT32)
4139 : (ELF32_R_TYPE (irel->r_info)
4140 == (int) R_MN10300_GOTPC32)
4141 ? R_MN10300_GOTPC16 :
4144 /* The opcode got shorter too, so we have to fix the
4145 addend and offset too! */
4146 irel->r_offset -= 1;
4148 /* Delete three bytes of data. */
4149 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4150 irel->r_offset + 1, 3))
4153 /* That will change things, so, we should relax again.
4154 Note that this is not required, and it may be slow. */
4158 /* mov am,(abs32) -> mov am,(abs16)
4159 mov am,(d32,sp) -> mov am,(d16,sp)
4160 mov dm,(d32,sp) -> mov dm,(d32,sp)
4161 movbu dm,(d32,sp) -> movbu dm,(d32,sp)
4162 movhu dm,(d32,sp) -> movhu dm,(d32,sp) */
4168 /* sp-based offsets are zero-extended. */
4169 if (code >= 0x90 && code <= 0x93
4170 && (long) value < 0)
4173 /* Note that we've changed the relocation contents, etc. */
4174 elf_section_data (sec)->relocs = internal_relocs;
4175 elf_section_data (sec)->this_hdr.contents = contents;
4176 symtab_hdr->contents = (unsigned char *) isymbuf;
4178 /* Fix the opcode. */
4179 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4180 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4182 /* Fix the relocation's type. */
4183 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4184 (ELF32_R_TYPE (irel->r_info)
4185 == (int) R_MN10300_GOTOFF32)
4186 ? R_MN10300_GOTOFF16
4187 : (ELF32_R_TYPE (irel->r_info)
4188 == (int) R_MN10300_GOT32)
4190 : (ELF32_R_TYPE (irel->r_info)
4191 == (int) R_MN10300_GOTPC32)
4192 ? R_MN10300_GOTPC16 :
4195 /* Delete two bytes of data. */
4196 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4197 irel->r_offset + 2, 2))
4200 /* That will change things, so, we should relax again.
4201 Note that this is not required, and it may be slow. */
4205 else if ((code & 0xf0) < 0xf0)
4206 switch (code & 0xfc)
4208 /* mov imm32,dn -> mov imm16,dn
4209 mov imm32,an -> mov imm16,an
4210 mov (abs32),dn -> mov (abs16),dn
4211 movbu (abs32),dn -> movbu (abs16),dn
4212 movhu (abs32),dn -> movhu (abs16),dn */
4218 /* Not safe if the high bit is on as relaxing may
4219 move the value out of high mem and thus not fit
4220 in a signed 16bit value. */
4222 && (value & 0x8000))
4225 /* "mov imm16, an" zero-extends the immediate. */
4226 if ((code & 0xfc) == 0xdc
4227 && (long) value < 0)
4230 /* Note that we've changed the relocation contents, etc. */
4231 elf_section_data (sec)->relocs = internal_relocs;
4232 elf_section_data (sec)->this_hdr.contents = contents;
4233 symtab_hdr->contents = (unsigned char *) isymbuf;
4235 if ((code & 0xfc) == 0xcc)
4236 code = 0x2c + (code & 0x03);
4237 else if ((code & 0xfc) == 0xdc)
4238 code = 0x24 + (code & 0x03);
4239 else if ((code & 0xfc) == 0xa4)
4240 code = 0x30 + (code & 0x03);
4241 else if ((code & 0xfc) == 0xa8)
4242 code = 0x34 + (code & 0x03);
4243 else if ((code & 0xfc) == 0xac)
4244 code = 0x38 + (code & 0x03);
4248 /* Fix the opcode. */
4249 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
4251 /* Fix the relocation's type. */
4252 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4253 (ELF32_R_TYPE (irel->r_info)
4254 == (int) R_MN10300_GOTOFF32)
4255 ? R_MN10300_GOTOFF16
4256 : (ELF32_R_TYPE (irel->r_info)
4257 == (int) R_MN10300_GOT32)
4259 : (ELF32_R_TYPE (irel->r_info)
4260 == (int) R_MN10300_GOTPC32)
4261 ? R_MN10300_GOTPC16 :
4264 /* The opcode got shorter too, so we have to fix the
4265 addend and offset too! */
4266 irel->r_offset -= 1;
4268 /* Delete three bytes of data. */
4269 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4270 irel->r_offset + 1, 3))
4273 /* That will change things, so, we should relax again.
4274 Note that this is not required, and it may be slow. */
4278 /* mov (abs32),an -> mov (abs16),an
4279 mov (d32,sp),an -> mov (d16,sp),an
4280 mov (d32,sp),dn -> mov (d16,sp),dn
4281 movbu (d32,sp),dn -> movbu (d16,sp),dn
4282 movhu (d32,sp),dn -> movhu (d16,sp),dn
4283 add imm32,dn -> add imm16,dn
4284 cmp imm32,dn -> cmp imm16,dn
4285 add imm32,an -> add imm16,an
4286 cmp imm32,an -> cmp imm16,an
4287 and imm32,dn -> and imm16,dn
4288 or imm32,dn -> or imm16,dn
4289 xor imm32,dn -> xor imm16,dn
4290 btst imm32,dn -> btst imm16,dn */
4306 /* cmp imm16, an zero-extends the immediate. */
4308 && (long) value < 0)
4311 /* So do sp-based offsets. */
4312 if (code >= 0xb0 && code <= 0xb3
4313 && (long) value < 0)
4316 /* Note that we've changed the relocation contents, etc. */
4317 elf_section_data (sec)->relocs = internal_relocs;
4318 elf_section_data (sec)->this_hdr.contents = contents;
4319 symtab_hdr->contents = (unsigned char *) isymbuf;
4321 /* Fix the opcode. */
4322 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4323 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4325 /* Fix the relocation's type. */
4326 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4327 (ELF32_R_TYPE (irel->r_info)
4328 == (int) R_MN10300_GOTOFF32)
4329 ? R_MN10300_GOTOFF16
4330 : (ELF32_R_TYPE (irel->r_info)
4331 == (int) R_MN10300_GOT32)
4333 : (ELF32_R_TYPE (irel->r_info)
4334 == (int) R_MN10300_GOTPC32)
4335 ? R_MN10300_GOTPC16 :
4338 /* Delete two bytes of data. */
4339 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4340 irel->r_offset + 2, 2))
4343 /* That will change things, so, we should relax again.
4344 Note that this is not required, and it may be slow. */
4348 else if (code == 0xfe)
4350 /* add imm32,sp -> add imm16,sp */
4352 /* Note that we've changed the relocation contents, etc. */
4353 elf_section_data (sec)->relocs = internal_relocs;
4354 elf_section_data (sec)->this_hdr.contents = contents;
4355 symtab_hdr->contents = (unsigned char *) isymbuf;
4357 /* Fix the opcode. */
4358 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4359 bfd_put_8 (abfd, 0xfe, contents + irel->r_offset - 1);
4361 /* Fix the relocation's type. */
4362 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4363 (ELF32_R_TYPE (irel->r_info)
4364 == (int) R_MN10300_GOT32)
4366 : (ELF32_R_TYPE (irel->r_info)
4367 == (int) R_MN10300_GOTOFF32)
4368 ? R_MN10300_GOTOFF16
4369 : (ELF32_R_TYPE (irel->r_info)
4370 == (int) R_MN10300_GOTPC32)
4371 ? R_MN10300_GOTPC16 :
4374 /* Delete two bytes of data. */
4375 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4376 irel->r_offset + 2, 2))
4379 /* That will change things, so, we should relax again.
4380 Note that this is not required, and it may be slow. */
4389 && symtab_hdr->contents != (unsigned char *) isymbuf)
4391 if (! link_info->keep_memory)
4395 /* Cache the symbols for elf_link_input_bfd. */
4396 symtab_hdr->contents = (unsigned char *) isymbuf;
4400 if (contents != NULL
4401 && elf_section_data (sec)->this_hdr.contents != contents)
4403 if (! link_info->keep_memory)
4407 /* Cache the section contents for elf_link_input_bfd. */
4408 elf_section_data (sec)->this_hdr.contents = contents;
4412 if (internal_relocs != NULL
4413 && elf_section_data (sec)->relocs != internal_relocs)
4414 free (internal_relocs);
4420 && symtab_hdr->contents != (unsigned char *) isymbuf)
4422 if (contents != NULL
4423 && elf_section_data (section)->this_hdr.contents != contents)
4425 if (internal_relocs != NULL
4426 && elf_section_data (section)->relocs != internal_relocs)
4427 free (internal_relocs);
4432 /* This is a version of bfd_generic_get_relocated_section_contents
4433 which uses mn10300_elf_relocate_section. */
4436 mn10300_elf_get_relocated_section_contents (bfd *output_bfd,
4437 struct bfd_link_info *link_info,
4438 struct bfd_link_order *link_order,
4440 bfd_boolean relocatable,
4443 Elf_Internal_Shdr *symtab_hdr;
4444 asection *input_section = link_order->u.indirect.section;
4445 bfd *input_bfd = input_section->owner;
4446 asection **sections = NULL;
4447 Elf_Internal_Rela *internal_relocs = NULL;
4448 Elf_Internal_Sym *isymbuf = NULL;
4450 /* We only need to handle the case of relaxing, or of having a
4451 particular set of section contents, specially. */
4453 || elf_section_data (input_section)->this_hdr.contents == NULL)
4454 return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
4459 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4461 memcpy (data, elf_section_data (input_section)->this_hdr.contents,
4462 (size_t) input_section->size);
4464 if ((input_section->flags & SEC_RELOC) != 0
4465 && input_section->reloc_count > 0)
4468 Elf_Internal_Sym *isym, *isymend;
4471 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, input_section,
4473 if (internal_relocs == NULL)
4476 if (symtab_hdr->sh_info != 0)
4478 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
4479 if (isymbuf == NULL)
4480 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
4481 symtab_hdr->sh_info, 0,
4483 if (isymbuf == NULL)
4487 amt = symtab_hdr->sh_info;
4488 amt *= sizeof (asection *);
4489 sections = bfd_malloc (amt);
4490 if (sections == NULL && amt != 0)
4493 isymend = isymbuf + symtab_hdr->sh_info;
4494 for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
4498 if (isym->st_shndx == SHN_UNDEF)
4499 isec = bfd_und_section_ptr;
4500 else if (isym->st_shndx == SHN_ABS)
4501 isec = bfd_abs_section_ptr;
4502 else if (isym->st_shndx == SHN_COMMON)
4503 isec = bfd_com_section_ptr;
4505 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
4510 if (! mn10300_elf_relocate_section (output_bfd, link_info, input_bfd,
4511 input_section, data, internal_relocs,
4515 if (sections != NULL)
4517 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
4519 if (internal_relocs != elf_section_data (input_section)->relocs)
4520 free (internal_relocs);
4526 if (sections != NULL)
4528 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
4530 if (internal_relocs != NULL
4531 && internal_relocs != elf_section_data (input_section)->relocs)
4532 free (internal_relocs);
4536 /* Assorted hash table functions. */
4538 /* Initialize an entry in the link hash table. */
4540 /* Create an entry in an MN10300 ELF linker hash table. */
4542 static struct bfd_hash_entry *
4543 elf32_mn10300_link_hash_newfunc (struct bfd_hash_entry *entry,
4544 struct bfd_hash_table *table,
4547 struct elf32_mn10300_link_hash_entry *ret =
4548 (struct elf32_mn10300_link_hash_entry *) entry;
4550 /* Allocate the structure if it has not already been allocated by a
4553 ret = (struct elf32_mn10300_link_hash_entry *)
4554 bfd_hash_allocate (table, sizeof (* ret));
4556 return (struct bfd_hash_entry *) ret;
4558 /* Call the allocation method of the superclass. */
4559 ret = (struct elf32_mn10300_link_hash_entry *)
4560 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
4564 ret->direct_calls = 0;
4565 ret->stack_size = 0;
4567 ret->movm_stack_size = 0;
4570 ret->tls_type = GOT_UNKNOWN;
4573 return (struct bfd_hash_entry *) ret;
4577 _bfd_mn10300_copy_indirect_symbol (struct bfd_link_info * info,
4578 struct elf_link_hash_entry * dir,
4579 struct elf_link_hash_entry * ind)
4581 struct elf32_mn10300_link_hash_entry * edir;
4582 struct elf32_mn10300_link_hash_entry * eind;
4584 edir = elf_mn10300_hash_entry (dir);
4585 eind = elf_mn10300_hash_entry (ind);
4587 if (ind->root.type == bfd_link_hash_indirect
4588 && dir->got.refcount <= 0)
4590 edir->tls_type = eind->tls_type;
4591 eind->tls_type = GOT_UNKNOWN;
4593 edir->direct_calls = eind->direct_calls;
4594 edir->stack_size = eind->stack_size;
4595 edir->movm_args = eind->movm_args;
4596 edir->movm_stack_size = eind->movm_stack_size;
4597 edir->flags = eind->flags;
4599 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
4602 /* Create an mn10300 ELF linker hash table. */
4604 static struct bfd_link_hash_table *
4605 elf32_mn10300_link_hash_table_create (bfd *abfd)
4607 struct elf32_mn10300_link_hash_table *ret;
4608 bfd_size_type amt = sizeof (* ret);
4610 ret = bfd_zmalloc (amt);
4614 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
4615 elf32_mn10300_link_hash_newfunc,
4616 sizeof (struct elf32_mn10300_link_hash_entry),
4623 ret->tls_ldm_got.offset = -1;
4625 amt = sizeof (struct elf_link_hash_table);
4626 ret->static_hash_table = bfd_zmalloc (amt);
4627 if (ret->static_hash_table == NULL)
4633 if (!_bfd_elf_link_hash_table_init (&ret->static_hash_table->root, abfd,
4634 elf32_mn10300_link_hash_newfunc,
4635 sizeof (struct elf32_mn10300_link_hash_entry),
4638 free (ret->static_hash_table);
4642 return & ret->root.root;
4645 /* Free an mn10300 ELF linker hash table. */
4648 elf32_mn10300_link_hash_table_free (struct bfd_link_hash_table *hash)
4650 struct elf32_mn10300_link_hash_table *ret
4651 = (struct elf32_mn10300_link_hash_table *) hash;
4653 _bfd_elf_link_hash_table_free
4654 ((struct bfd_link_hash_table *) ret->static_hash_table);
4655 _bfd_elf_link_hash_table_free
4656 ((struct bfd_link_hash_table *) ret);
4659 static unsigned long
4660 elf_mn10300_mach (flagword flags)
4662 switch (flags & EF_MN10300_MACH)
4664 case E_MN10300_MACH_MN10300:
4666 return bfd_mach_mn10300;
4668 case E_MN10300_MACH_AM33:
4669 return bfd_mach_am33;
4671 case E_MN10300_MACH_AM33_2:
4672 return bfd_mach_am33_2;
4676 /* The final processing done just before writing out a MN10300 ELF object
4677 file. This gets the MN10300 architecture right based on the machine
4681 _bfd_mn10300_elf_final_write_processing (bfd *abfd,
4682 bfd_boolean linker ATTRIBUTE_UNUSED)
4686 switch (bfd_get_mach (abfd))
4689 case bfd_mach_mn10300:
4690 val = E_MN10300_MACH_MN10300;
4694 val = E_MN10300_MACH_AM33;
4697 case bfd_mach_am33_2:
4698 val = E_MN10300_MACH_AM33_2;
4702 elf_elfheader (abfd)->e_flags &= ~ (EF_MN10300_MACH);
4703 elf_elfheader (abfd)->e_flags |= val;
4707 _bfd_mn10300_elf_object_p (bfd *abfd)
4709 bfd_default_set_arch_mach (abfd, bfd_arch_mn10300,
4710 elf_mn10300_mach (elf_elfheader (abfd)->e_flags));
4714 /* Merge backend specific data from an object file to the output
4715 object file when linking. */
4718 _bfd_mn10300_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
4720 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4721 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4724 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
4725 && bfd_get_mach (obfd) < bfd_get_mach (ibfd))
4727 if (! bfd_set_arch_mach (obfd, bfd_get_arch (ibfd),
4728 bfd_get_mach (ibfd)))
4735 #define PLT0_ENTRY_SIZE 15
4736 #define PLT_ENTRY_SIZE 20
4737 #define PIC_PLT_ENTRY_SIZE 24
4739 static const bfd_byte elf_mn10300_plt0_entry[PLT0_ENTRY_SIZE] =
4741 0xfc, 0xa0, 0, 0, 0, 0, /* mov (.got+8),a0 */
4742 0xfe, 0xe, 0x10, 0, 0, 0, 0, /* mov (.got+4),r1 */
4743 0xf0, 0xf4, /* jmp (a0) */
4746 static const bfd_byte elf_mn10300_plt_entry[PLT_ENTRY_SIZE] =
4748 0xfc, 0xa0, 0, 0, 0, 0, /* mov (nameN@GOT + .got),a0 */
4749 0xf0, 0xf4, /* jmp (a0) */
4750 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4751 0xdc, 0, 0, 0, 0, /* jmp .plt0 */
4754 static const bfd_byte elf_mn10300_pic_plt_entry[PIC_PLT_ENTRY_SIZE] =
4756 0xfc, 0x22, 0, 0, 0, 0, /* mov (nameN@GOT,a2),a0 */
4757 0xf0, 0xf4, /* jmp (a0) */
4758 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4759 0xf8, 0x22, 8, /* mov (8,a2),a0 */
4760 0xfb, 0xa, 0x1a, 4, /* mov (4,a2),r1 */
4761 0xf0, 0xf4, /* jmp (a0) */
4764 /* Return size of the first PLT entry. */
4765 #define elf_mn10300_sizeof_plt0(info) \
4766 (info->shared ? PIC_PLT_ENTRY_SIZE : PLT0_ENTRY_SIZE)
4768 /* Return size of a PLT entry. */
4769 #define elf_mn10300_sizeof_plt(info) \
4770 (info->shared ? PIC_PLT_ENTRY_SIZE : PLT_ENTRY_SIZE)
4772 /* Return offset of the PLT0 address in an absolute PLT entry. */
4773 #define elf_mn10300_plt_plt0_offset(info) 16
4775 /* Return offset of the linker in PLT0 entry. */
4776 #define elf_mn10300_plt0_linker_offset(info) 2
4778 /* Return offset of the GOT id in PLT0 entry. */
4779 #define elf_mn10300_plt0_gotid_offset(info) 9
4781 /* Return offset of the temporary in PLT entry. */
4782 #define elf_mn10300_plt_temp_offset(info) 8
4784 /* Return offset of the symbol in PLT entry. */
4785 #define elf_mn10300_plt_symbol_offset(info) 2
4787 /* Return offset of the relocation in PLT entry. */
4788 #define elf_mn10300_plt_reloc_offset(info) 11
4790 /* The name of the dynamic interpreter. This is put in the .interp
4793 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
4795 /* Create dynamic sections when linking against a dynamic object. */
4798 _bfd_mn10300_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
4802 const struct elf_backend_data * bed = get_elf_backend_data (abfd);
4803 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
4806 switch (bed->s->arch_size)
4817 bfd_set_error (bfd_error_bad_value);
4821 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
4822 .rel[a].bss sections. */
4823 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4824 | SEC_LINKER_CREATED);
4826 s = bfd_make_section_anyway_with_flags (abfd,
4827 (bed->default_use_rela_p
4828 ? ".rela.plt" : ".rel.plt"),
4829 flags | SEC_READONLY);
4830 htab->root.srelplt = s;
4832 || ! bfd_set_section_alignment (abfd, s, ptralign))
4835 if (! _bfd_mn10300_elf_create_got_section (abfd, info))
4838 if (bed->want_dynbss)
4840 /* The .dynbss section is a place to put symbols which are defined
4841 by dynamic objects, are referenced by regular objects, and are
4842 not functions. We must allocate space for them in the process
4843 image and use a R_*_COPY reloc to tell the dynamic linker to
4844 initialize them at run time. The linker script puts the .dynbss
4845 section into the .bss section of the final image. */
4846 s = bfd_make_section_anyway_with_flags (abfd, ".dynbss",
4847 SEC_ALLOC | SEC_LINKER_CREATED);
4851 /* The .rel[a].bss section holds copy relocs. This section is not
4852 normally needed. We need to create it here, though, so that the
4853 linker will map it to an output section. We can't just create it
4854 only if we need it, because we will not know whether we need it
4855 until we have seen all the input files, and the first time the
4856 main linker code calls BFD after examining all the input files
4857 (size_dynamic_sections) the input sections have already been
4858 mapped to the output sections. If the section turns out not to
4859 be needed, we can discard it later. We will never need this
4860 section when generating a shared object, since they do not use
4864 s = bfd_make_section_anyway_with_flags (abfd,
4865 (bed->default_use_rela_p
4866 ? ".rela.bss" : ".rel.bss"),
4867 flags | SEC_READONLY);
4869 || ! bfd_set_section_alignment (abfd, s, ptralign))
4877 /* Adjust a symbol defined by a dynamic object and referenced by a
4878 regular object. The current definition is in some section of the
4879 dynamic object, but we're not including those sections. We have to
4880 change the definition to something the rest of the link can
4884 _bfd_mn10300_elf_adjust_dynamic_symbol (struct bfd_link_info * info,
4885 struct elf_link_hash_entry * h)
4887 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
4891 dynobj = htab->root.dynobj;
4893 /* Make sure we know what is going on here. */
4894 BFD_ASSERT (dynobj != NULL
4896 || h->u.weakdef != NULL
4899 && !h->def_regular)));
4901 /* If this is a function, put it in the procedure linkage table. We
4902 will fill in the contents of the procedure linkage table later,
4903 when we know the address of the .got section. */
4904 if (h->type == STT_FUNC
4911 /* This case can occur if we saw a PLT reloc in an input
4912 file, but the symbol was never referred to by a dynamic
4913 object. In such a case, we don't actually need to build
4914 a procedure linkage table, and we can just do a REL32
4916 BFD_ASSERT (h->needs_plt);
4920 /* Make sure this symbol is output as a dynamic symbol. */
4921 if (h->dynindx == -1)
4923 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4927 s = htab->root.splt;
4928 BFD_ASSERT (s != NULL);
4930 /* If this is the first .plt entry, make room for the special
4933 s->size += elf_mn10300_sizeof_plt0 (info);
4935 /* If this symbol is not defined in a regular file, and we are
4936 not generating a shared library, then set the symbol to this
4937 location in the .plt. This is required to make function
4938 pointers compare as equal between the normal executable and
4939 the shared library. */
4943 h->root.u.def.section = s;
4944 h->root.u.def.value = s->size;
4947 h->plt.offset = s->size;
4949 /* Make room for this entry. */
4950 s->size += elf_mn10300_sizeof_plt (info);
4952 /* We also need to make an entry in the .got.plt section, which
4953 will be placed in the .got section by the linker script. */
4954 s = htab->root.sgotplt;
4955 BFD_ASSERT (s != NULL);
4958 /* We also need to make an entry in the .rela.plt section. */
4959 s = bfd_get_linker_section (dynobj, ".rela.plt");
4960 BFD_ASSERT (s != NULL);
4961 s->size += sizeof (Elf32_External_Rela);
4966 /* If this is a weak symbol, and there is a real definition, the
4967 processor independent code will have arranged for us to see the
4968 real definition first, and we can just use the same value. */
4969 if (h->u.weakdef != NULL)
4971 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4972 || h->u.weakdef->root.type == bfd_link_hash_defweak);
4973 h->root.u.def.section = h->u.weakdef->root.u.def.section;
4974 h->root.u.def.value = h->u.weakdef->root.u.def.value;
4978 /* This is a reference to a symbol defined by a dynamic object which
4979 is not a function. */
4981 /* If we are creating a shared library, we must presume that the
4982 only references to the symbol are via the global offset table.
4983 For such cases we need not do anything here; the relocations will
4984 be handled correctly by relocate_section. */
4988 /* If there are no references to this symbol that do not use the
4989 GOT, we don't need to generate a copy reloc. */
4990 if (!h->non_got_ref)
4993 /* We must allocate the symbol in our .dynbss section, which will
4994 become part of the .bss section of the executable. There will be
4995 an entry for this symbol in the .dynsym section. The dynamic
4996 object will contain position independent code, so all references
4997 from the dynamic object to this symbol will go through the global
4998 offset table. The dynamic linker will use the .dynsym entry to
4999 determine the address it must put in the global offset table, so
5000 both the dynamic object and the regular object will refer to the
5001 same memory location for the variable. */
5003 s = bfd_get_linker_section (dynobj, ".dynbss");
5004 BFD_ASSERT (s != NULL);
5006 /* We must generate a R_MN10300_COPY reloc to tell the dynamic linker to
5007 copy the initial value out of the dynamic object and into the
5008 runtime process image. We need to remember the offset into the
5009 .rela.bss section we are going to use. */
5010 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5014 srel = bfd_get_linker_section (dynobj, ".rela.bss");
5015 BFD_ASSERT (srel != NULL);
5016 srel->size += sizeof (Elf32_External_Rela);
5020 return _bfd_elf_adjust_dynamic_copy (h, s);
5023 /* Set the sizes of the dynamic sections. */
5026 _bfd_mn10300_elf_size_dynamic_sections (bfd * output_bfd,
5027 struct bfd_link_info * info)
5029 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
5034 bfd_boolean reltext;
5036 dynobj = htab->root.dynobj;
5037 BFD_ASSERT (dynobj != NULL);
5039 if (elf_hash_table (info)->dynamic_sections_created)
5041 /* Set the contents of the .interp section to the interpreter. */
5042 if (info->executable)
5044 s = bfd_get_linker_section (dynobj, ".interp");
5045 BFD_ASSERT (s != NULL);
5046 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5047 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5052 /* We may have created entries in the .rela.got section.
5053 However, if we are not creating the dynamic sections, we will
5054 not actually use these entries. Reset the size of .rela.got,
5055 which will cause it to get stripped from the output file
5057 s = htab->root.sgot;
5062 if (htab->tls_ldm_got.refcount > 0)
5064 s = bfd_get_linker_section (dynobj, ".rela.got");
5065 BFD_ASSERT (s != NULL);
5066 s->size += sizeof (Elf32_External_Rela);
5069 /* The check_relocs and adjust_dynamic_symbol entry points have
5070 determined the sizes of the various dynamic sections. Allocate
5075 for (s = dynobj->sections; s != NULL; s = s->next)
5079 if ((s->flags & SEC_LINKER_CREATED) == 0)
5082 /* It's OK to base decisions on the section name, because none
5083 of the dynobj section names depend upon the input files. */
5084 name = bfd_get_section_name (dynobj, s);
5086 if (streq (name, ".plt"))
5088 /* Remember whether there is a PLT. */
5091 else if (CONST_STRNEQ (name, ".rela"))
5097 /* Remember whether there are any reloc sections other
5099 if (! streq (name, ".rela.plt"))
5101 const char * outname;
5105 /* If this relocation section applies to a read only
5106 section, then we probably need a DT_TEXTREL
5107 entry. The entries in the .rela.plt section
5108 really apply to the .got section, which we
5109 created ourselves and so know is not readonly. */
5110 outname = bfd_get_section_name (output_bfd,
5112 target = bfd_get_section_by_name (output_bfd, outname + 5);
5114 && (target->flags & SEC_READONLY) != 0
5115 && (target->flags & SEC_ALLOC) != 0)
5119 /* We use the reloc_count field as a counter if we need
5120 to copy relocs into the output file. */
5124 else if (! CONST_STRNEQ (name, ".got")
5125 && ! streq (name, ".dynbss"))
5126 /* It's not one of our sections, so don't allocate space. */
5131 /* If we don't need this section, strip it from the
5132 output file. This is mostly to handle .rela.bss and
5133 .rela.plt. We must create both sections in
5134 create_dynamic_sections, because they must be created
5135 before the linker maps input sections to output
5136 sections. The linker does that before
5137 adjust_dynamic_symbol is called, and it is that
5138 function which decides whether anything needs to go
5139 into these sections. */
5140 s->flags |= SEC_EXCLUDE;
5144 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5147 /* Allocate memory for the section contents. We use bfd_zalloc
5148 here in case unused entries are not reclaimed before the
5149 section's contents are written out. This should not happen,
5150 but this way if it does, we get a R_MN10300_NONE reloc
5151 instead of garbage. */
5152 s->contents = bfd_zalloc (dynobj, s->size);
5153 if (s->contents == NULL)
5157 if (elf_hash_table (info)->dynamic_sections_created)
5159 /* Add some entries to the .dynamic section. We fill in the
5160 values later, in _bfd_mn10300_elf_finish_dynamic_sections,
5161 but we must add the entries now so that we get the correct
5162 size for the .dynamic section. The DT_DEBUG entry is filled
5163 in by the dynamic linker and used by the debugger. */
5166 if (!_bfd_elf_add_dynamic_entry (info, DT_DEBUG, 0))
5172 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0)
5173 || !_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
5174 || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_RELA)
5175 || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
5181 if (!_bfd_elf_add_dynamic_entry (info, DT_RELA, 0)
5182 || !_bfd_elf_add_dynamic_entry (info, DT_RELASZ, 0)
5183 || !_bfd_elf_add_dynamic_entry (info, DT_RELAENT,
5184 sizeof (Elf32_External_Rela)))
5190 if (!_bfd_elf_add_dynamic_entry (info, DT_TEXTREL, 0))
5198 /* Finish up dynamic symbol handling. We set the contents of various
5199 dynamic sections here. */
5202 _bfd_mn10300_elf_finish_dynamic_symbol (bfd * output_bfd,
5203 struct bfd_link_info * info,
5204 struct elf_link_hash_entry * h,
5205 Elf_Internal_Sym * sym)
5207 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
5210 dynobj = htab->root.dynobj;
5212 if (h->plt.offset != (bfd_vma) -1)
5219 Elf_Internal_Rela rel;
5221 /* This symbol has an entry in the procedure linkage table. Set
5224 BFD_ASSERT (h->dynindx != -1);
5226 splt = htab->root.splt;
5227 sgot = htab->root.sgotplt;
5228 srel = bfd_get_linker_section (dynobj, ".rela.plt");
5229 BFD_ASSERT (splt != NULL && sgot != NULL && srel != NULL);
5231 /* Get the index in the procedure linkage table which
5232 corresponds to this symbol. This is the index of this symbol
5233 in all the symbols for which we are making plt entries. The
5234 first entry in the procedure linkage table is reserved. */
5235 plt_index = ((h->plt.offset - elf_mn10300_sizeof_plt0 (info))
5236 / elf_mn10300_sizeof_plt (info));
5238 /* Get the offset into the .got table of the entry that
5239 corresponds to this function. Each .got entry is 4 bytes.
5240 The first three are reserved. */
5241 got_offset = (plt_index + 3) * 4;
5243 /* Fill in the entry in the procedure linkage table. */
5246 memcpy (splt->contents + h->plt.offset, elf_mn10300_plt_entry,
5247 elf_mn10300_sizeof_plt (info));
5248 bfd_put_32 (output_bfd,
5249 (sgot->output_section->vma
5250 + sgot->output_offset
5252 (splt->contents + h->plt.offset
5253 + elf_mn10300_plt_symbol_offset (info)));
5255 bfd_put_32 (output_bfd,
5256 (1 - h->plt.offset - elf_mn10300_plt_plt0_offset (info)),
5257 (splt->contents + h->plt.offset
5258 + elf_mn10300_plt_plt0_offset (info)));
5262 memcpy (splt->contents + h->plt.offset, elf_mn10300_pic_plt_entry,
5263 elf_mn10300_sizeof_plt (info));
5265 bfd_put_32 (output_bfd, got_offset,
5266 (splt->contents + h->plt.offset
5267 + elf_mn10300_plt_symbol_offset (info)));
5270 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
5271 (splt->contents + h->plt.offset
5272 + elf_mn10300_plt_reloc_offset (info)));
5274 /* Fill in the entry in the global offset table. */
5275 bfd_put_32 (output_bfd,
5276 (splt->output_section->vma
5277 + splt->output_offset
5279 + elf_mn10300_plt_temp_offset (info)),
5280 sgot->contents + got_offset);
5282 /* Fill in the entry in the .rela.plt section. */
5283 rel.r_offset = (sgot->output_section->vma
5284 + sgot->output_offset
5286 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_JMP_SLOT);
5288 bfd_elf32_swap_reloca_out (output_bfd, &rel,
5289 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5292 if (!h->def_regular)
5293 /* Mark the symbol as undefined, rather than as defined in
5294 the .plt section. Leave the value alone. */
5295 sym->st_shndx = SHN_UNDEF;
5298 if (h->got.offset != (bfd_vma) -1)
5302 Elf_Internal_Rela rel;
5304 /* This symbol has an entry in the global offset table. Set it up. */
5305 sgot = htab->root.sgot;
5306 srel = bfd_get_linker_section (dynobj, ".rela.got");
5307 BFD_ASSERT (sgot != NULL && srel != NULL);
5309 rel.r_offset = (sgot->output_section->vma
5310 + sgot->output_offset
5311 + (h->got.offset & ~1));
5313 switch (elf_mn10300_hash_entry (h)->tls_type)
5316 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5317 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset + 4);
5318 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_DTPMOD);
5320 bfd_elf32_swap_reloca_out (output_bfd, & rel,
5321 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5322 + srel->reloc_count));
5323 ++ srel->reloc_count;
5324 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_DTPOFF);
5330 /* We originally stored the addend in the GOT, but at this
5331 point, we want to move it to the reloc instead as that's
5332 where the dynamic linker wants it. */
5333 rel.r_addend = bfd_get_32 (output_bfd, sgot->contents + h->got.offset);
5334 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5335 if (h->dynindx == -1)
5336 rel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_TPOFF);
5338 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_TPOFF);
5342 /* If this is a -Bsymbolic link, and the symbol is defined
5343 locally, we just want to emit a RELATIVE reloc. Likewise if
5344 the symbol was forced to be local because of a version file.
5345 The entry in the global offset table will already have been
5346 initialized in the relocate_section function. */
5348 && (info->symbolic || h->dynindx == -1)
5351 rel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
5352 rel.r_addend = (h->root.u.def.value
5353 + h->root.u.def.section->output_section->vma
5354 + h->root.u.def.section->output_offset);
5358 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5359 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_GLOB_DAT);
5364 if (ELF32_R_TYPE (rel.r_info) != R_MN10300_NONE)
5366 bfd_elf32_swap_reloca_out (output_bfd, &rel,
5367 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5368 + srel->reloc_count));
5369 ++ srel->reloc_count;
5376 Elf_Internal_Rela rel;
5378 /* This symbol needs a copy reloc. Set it up. */
5379 BFD_ASSERT (h->dynindx != -1
5380 && (h->root.type == bfd_link_hash_defined
5381 || h->root.type == bfd_link_hash_defweak));
5383 s = bfd_get_linker_section (dynobj, ".rela.bss");
5384 BFD_ASSERT (s != NULL);
5386 rel.r_offset = (h->root.u.def.value
5387 + h->root.u.def.section->output_section->vma
5388 + h->root.u.def.section->output_offset);
5389 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_COPY);
5391 bfd_elf32_swap_reloca_out (output_bfd, & rel,
5392 (bfd_byte *) ((Elf32_External_Rela *) s->contents
5397 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5398 if (h == elf_hash_table (info)->hdynamic
5399 || h == elf_hash_table (info)->hgot)
5400 sym->st_shndx = SHN_ABS;
5405 /* Finish up the dynamic sections. */
5408 _bfd_mn10300_elf_finish_dynamic_sections (bfd * output_bfd,
5409 struct bfd_link_info * info)
5414 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
5416 dynobj = htab->root.dynobj;
5417 sgot = htab->root.sgotplt;
5418 BFD_ASSERT (sgot != NULL);
5419 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5421 if (elf_hash_table (info)->dynamic_sections_created)
5424 Elf32_External_Dyn * dyncon;
5425 Elf32_External_Dyn * dynconend;
5427 BFD_ASSERT (sdyn != NULL);
5429 dyncon = (Elf32_External_Dyn *) sdyn->contents;
5430 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
5432 for (; dyncon < dynconend; dyncon++)
5434 Elf_Internal_Dyn dyn;
5438 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5452 s = bfd_get_section_by_name (output_bfd, name);
5453 BFD_ASSERT (s != NULL);
5454 dyn.d_un.d_ptr = s->vma;
5455 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5459 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
5460 BFD_ASSERT (s != NULL);
5461 dyn.d_un.d_val = s->size;
5462 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5466 /* My reading of the SVR4 ABI indicates that the
5467 procedure linkage table relocs (DT_JMPREL) should be
5468 included in the overall relocs (DT_RELA). This is
5469 what Solaris does. However, UnixWare can not handle
5470 that case. Therefore, we override the DT_RELASZ entry
5471 here to make it not include the JMPREL relocs. Since
5472 the linker script arranges for .rela.plt to follow all
5473 other relocation sections, we don't have to worry
5474 about changing the DT_RELA entry. */
5475 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
5477 dyn.d_un.d_val -= s->size;
5478 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5483 /* Fill in the first entry in the procedure linkage table. */
5484 splt = htab->root.splt;
5485 if (splt && splt->size > 0)
5489 memcpy (splt->contents, elf_mn10300_pic_plt_entry,
5490 elf_mn10300_sizeof_plt (info));
5494 memcpy (splt->contents, elf_mn10300_plt0_entry, PLT0_ENTRY_SIZE);
5495 bfd_put_32 (output_bfd,
5496 sgot->output_section->vma + sgot->output_offset + 4,
5497 splt->contents + elf_mn10300_plt0_gotid_offset (info));
5498 bfd_put_32 (output_bfd,
5499 sgot->output_section->vma + sgot->output_offset + 8,
5500 splt->contents + elf_mn10300_plt0_linker_offset (info));
5503 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5504 really seem like the right value. */
5505 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
5507 /* UnixWare sets the entsize of .plt to 4, but this is incorrect
5508 as it means that the size of the PLT0 section (15 bytes) is not
5509 a multiple of the sh_entsize. Some ELF tools flag this as an
5510 error. We could pad PLT0 to 16 bytes, but that would introduce
5511 compatibilty issues with previous toolchains, so instead we
5512 just set the entry size to 1. */
5513 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 1;
5517 /* Fill in the first three entries in the global offset table. */
5521 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
5523 bfd_put_32 (output_bfd,
5524 sdyn->output_section->vma + sdyn->output_offset,
5526 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
5527 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
5530 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
5535 /* Classify relocation types, such that combreloc can sort them
5538 static enum elf_reloc_type_class
5539 _bfd_mn10300_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5540 const asection *rel_sec ATTRIBUTE_UNUSED,
5541 const Elf_Internal_Rela *rela)
5543 switch ((int) ELF32_R_TYPE (rela->r_info))
5545 case R_MN10300_RELATIVE: return reloc_class_relative;
5546 case R_MN10300_JMP_SLOT: return reloc_class_plt;
5547 case R_MN10300_COPY: return reloc_class_copy;
5548 default: return reloc_class_normal;
5552 /* Allocate space for an MN10300 extension to the bfd elf data structure. */
5555 mn10300_elf_mkobject (bfd *abfd)
5557 return bfd_elf_allocate_object (abfd, sizeof (struct elf_mn10300_obj_tdata),
5561 #define bfd_elf32_mkobject mn10300_elf_mkobject
5564 #define TARGET_LITTLE_SYM bfd_elf32_mn10300_vec
5565 #define TARGET_LITTLE_NAME "elf32-mn10300"
5566 #define ELF_ARCH bfd_arch_mn10300
5567 #define ELF_TARGET_ID MN10300_ELF_DATA
5568 #define ELF_MACHINE_CODE EM_MN10300
5569 #define ELF_MACHINE_ALT1 EM_CYGNUS_MN10300
5570 #define ELF_MAXPAGESIZE 0x1000
5573 #define elf_info_to_howto mn10300_info_to_howto
5574 #define elf_info_to_howto_rel 0
5575 #define elf_backend_can_gc_sections 1
5576 #define elf_backend_rela_normal 1
5577 #define elf_backend_check_relocs mn10300_elf_check_relocs
5578 #define elf_backend_gc_mark_hook mn10300_elf_gc_mark_hook
5579 #define elf_backend_relocate_section mn10300_elf_relocate_section
5580 #define bfd_elf32_bfd_relax_section mn10300_elf_relax_section
5581 #define bfd_elf32_bfd_get_relocated_section_contents \
5582 mn10300_elf_get_relocated_section_contents
5583 #define bfd_elf32_bfd_link_hash_table_create \
5584 elf32_mn10300_link_hash_table_create
5585 #define bfd_elf32_bfd_link_hash_table_free \
5586 elf32_mn10300_link_hash_table_free
5588 #ifndef elf_symbol_leading_char
5589 #define elf_symbol_leading_char '_'
5592 /* So we can set bits in e_flags. */
5593 #define elf_backend_final_write_processing \
5594 _bfd_mn10300_elf_final_write_processing
5595 #define elf_backend_object_p _bfd_mn10300_elf_object_p
5597 #define bfd_elf32_bfd_merge_private_bfd_data \
5598 _bfd_mn10300_elf_merge_private_bfd_data
5600 #define elf_backend_can_gc_sections 1
5601 #define elf_backend_create_dynamic_sections \
5602 _bfd_mn10300_elf_create_dynamic_sections
5603 #define elf_backend_adjust_dynamic_symbol \
5604 _bfd_mn10300_elf_adjust_dynamic_symbol
5605 #define elf_backend_size_dynamic_sections \
5606 _bfd_mn10300_elf_size_dynamic_sections
5607 #define elf_backend_omit_section_dynsym \
5608 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
5609 #define elf_backend_finish_dynamic_symbol \
5610 _bfd_mn10300_elf_finish_dynamic_symbol
5611 #define elf_backend_finish_dynamic_sections \
5612 _bfd_mn10300_elf_finish_dynamic_sections
5613 #define elf_backend_copy_indirect_symbol \
5614 _bfd_mn10300_copy_indirect_symbol
5615 #define elf_backend_reloc_type_class \
5616 _bfd_mn10300_elf_reloc_type_class
5618 #define elf_backend_want_got_plt 1
5619 #define elf_backend_plt_readonly 1
5620 #define elf_backend_want_plt_sym 0
5621 #define elf_backend_got_header_size 12
5623 #include "elf32-target.h"