1 /* Matsushita 10300 specific support for 32-bit ELF
2 Copyright (C) 1996-2014 Free Software Foundation, Inc.
4 This file is part of BFD, the Binary File Descriptor library.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
25 #include "elf/mn10300.h"
26 #include "libiberty.h"
28 /* The mn10300 linker needs to keep track of the number of relocs that
29 it decides to copy in check_relocs for each symbol. This is so
30 that it can discard PC relative relocs if it doesn't need them when
31 linking with -Bsymbolic. We store the information in a field
32 extending the regular ELF linker hash table. */
34 struct elf32_mn10300_link_hash_entry
36 /* The basic elf link hash table entry. */
37 struct elf_link_hash_entry root;
39 /* For function symbols, the number of times this function is
40 called directly (ie by name). */
41 unsigned int direct_calls;
43 /* For function symbols, the size of this function's stack
44 (if <= 255 bytes). We stuff this into "call" instructions
45 to this target when it's valid and profitable to do so.
47 This does not include stack allocated by movm! */
48 unsigned char stack_size;
50 /* For function symbols, arguments (if any) for movm instruction
51 in the prologue. We stuff this value into "call" instructions
52 to the target when it's valid and profitable to do so. */
53 unsigned char movm_args;
55 /* For function symbols, the amount of stack space that would be allocated
56 by the movm instruction. This is redundant with movm_args, but we
57 add it to the hash table to avoid computing it over and over. */
58 unsigned char movm_stack_size;
60 /* When set, convert all "call" instructions to this target into "calls"
62 #define MN10300_CONVERT_CALL_TO_CALLS 0x1
64 /* Used to mark functions which have had redundant parts of their
66 #define MN10300_DELETED_PROLOGUE_BYTES 0x2
69 /* Calculated value. */
77 /* Used to distinguish GOT entries for TLS types from normal GOT entries. */
78 unsigned char tls_type;
81 /* We derive a hash table from the main elf linker hash table so
82 we can store state variables and a secondary hash table without
83 resorting to global variables. */
84 struct elf32_mn10300_link_hash_table
86 /* The main hash table. */
87 struct elf_link_hash_table root;
89 /* A hash table for static functions. We could derive a new hash table
90 instead of using the full elf32_mn10300_link_hash_table if we wanted
91 to save some memory. */
92 struct elf32_mn10300_link_hash_table *static_hash_table;
94 /* Random linker state flags. */
95 #define MN10300_HASH_ENTRIES_INITIALIZED 0x1
99 bfd_signed_vma refcount;
106 #define elf_mn10300_hash_entry(ent) ((struct elf32_mn10300_link_hash_entry *)(ent))
108 struct elf_mn10300_obj_tdata
110 struct elf_obj_tdata root;
112 /* tls_type for each local got entry. */
113 char * local_got_tls_type;
116 #define elf_mn10300_tdata(abfd) \
117 ((struct elf_mn10300_obj_tdata *) (abfd)->tdata.any)
119 #define elf_mn10300_local_got_tls_type(abfd) \
120 (elf_mn10300_tdata (abfd)->local_got_tls_type)
123 #define streq(a, b) (strcmp ((a),(b)) == 0)
126 /* For MN10300 linker hash table. */
128 /* Get the MN10300 ELF linker hash table from a link_info structure. */
130 #define elf32_mn10300_hash_table(p) \
131 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
132 == MN10300_ELF_DATA ? ((struct elf32_mn10300_link_hash_table *) ((p)->hash)) : NULL)
134 #define elf32_mn10300_link_hash_traverse(table, func, info) \
135 (elf_link_hash_traverse \
137 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
140 static reloc_howto_type elf_mn10300_howto_table[] =
142 /* Dummy relocation. Does nothing. */
143 HOWTO (R_MN10300_NONE,
149 complain_overflow_bitfield,
150 bfd_elf_generic_reloc,
156 /* Standard 32 bit reloc. */
163 complain_overflow_bitfield,
164 bfd_elf_generic_reloc,
170 /* Standard 16 bit reloc. */
177 complain_overflow_bitfield,
178 bfd_elf_generic_reloc,
184 /* Standard 8 bit reloc. */
191 complain_overflow_bitfield,
192 bfd_elf_generic_reloc,
198 /* Standard 32bit pc-relative reloc. */
199 HOWTO (R_MN10300_PCREL32,
205 complain_overflow_bitfield,
206 bfd_elf_generic_reloc,
212 /* Standard 16bit pc-relative reloc. */
213 HOWTO (R_MN10300_PCREL16,
219 complain_overflow_bitfield,
220 bfd_elf_generic_reloc,
226 /* Standard 8 pc-relative reloc. */
227 HOWTO (R_MN10300_PCREL8,
233 complain_overflow_bitfield,
234 bfd_elf_generic_reloc,
241 /* GNU extension to record C++ vtable hierarchy. */
242 HOWTO (R_MN10300_GNU_VTINHERIT, /* type */
244 0, /* size (0 = byte, 1 = short, 2 = long) */
246 FALSE, /* pc_relative */
248 complain_overflow_dont, /* complain_on_overflow */
249 NULL, /* special_function */
250 "R_MN10300_GNU_VTINHERIT", /* name */
251 FALSE, /* partial_inplace */
254 FALSE), /* pcrel_offset */
256 /* GNU extension to record C++ vtable member usage */
257 HOWTO (R_MN10300_GNU_VTENTRY, /* type */
259 0, /* size (0 = byte, 1 = short, 2 = long) */
261 FALSE, /* pc_relative */
263 complain_overflow_dont, /* complain_on_overflow */
264 NULL, /* special_function */
265 "R_MN10300_GNU_VTENTRY", /* name */
266 FALSE, /* partial_inplace */
269 FALSE), /* pcrel_offset */
271 /* Standard 24 bit reloc. */
278 complain_overflow_bitfield,
279 bfd_elf_generic_reloc,
285 HOWTO (R_MN10300_GOTPC32, /* type */
287 2, /* size (0 = byte, 1 = short, 2 = long) */
289 TRUE, /* pc_relative */
291 complain_overflow_bitfield, /* complain_on_overflow */
292 bfd_elf_generic_reloc, /* */
293 "R_MN10300_GOTPC32", /* name */
294 FALSE, /* partial_inplace */
295 0xffffffff, /* src_mask */
296 0xffffffff, /* dst_mask */
297 TRUE), /* pcrel_offset */
299 HOWTO (R_MN10300_GOTPC16, /* type */
301 1, /* size (0 = byte, 1 = short, 2 = long) */
303 TRUE, /* pc_relative */
305 complain_overflow_bitfield, /* complain_on_overflow */
306 bfd_elf_generic_reloc, /* */
307 "R_MN10300_GOTPC16", /* name */
308 FALSE, /* partial_inplace */
309 0xffff, /* src_mask */
310 0xffff, /* dst_mask */
311 TRUE), /* pcrel_offset */
313 HOWTO (R_MN10300_GOTOFF32, /* type */
315 2, /* size (0 = byte, 1 = short, 2 = long) */
317 FALSE, /* pc_relative */
319 complain_overflow_bitfield, /* complain_on_overflow */
320 bfd_elf_generic_reloc, /* */
321 "R_MN10300_GOTOFF32", /* name */
322 FALSE, /* partial_inplace */
323 0xffffffff, /* src_mask */
324 0xffffffff, /* dst_mask */
325 FALSE), /* pcrel_offset */
327 HOWTO (R_MN10300_GOTOFF24, /* type */
329 2, /* size (0 = byte, 1 = short, 2 = long) */
331 FALSE, /* pc_relative */
333 complain_overflow_bitfield, /* complain_on_overflow */
334 bfd_elf_generic_reloc, /* */
335 "R_MN10300_GOTOFF24", /* name */
336 FALSE, /* partial_inplace */
337 0xffffff, /* src_mask */
338 0xffffff, /* dst_mask */
339 FALSE), /* pcrel_offset */
341 HOWTO (R_MN10300_GOTOFF16, /* type */
343 1, /* size (0 = byte, 1 = short, 2 = long) */
345 FALSE, /* pc_relative */
347 complain_overflow_bitfield, /* complain_on_overflow */
348 bfd_elf_generic_reloc, /* */
349 "R_MN10300_GOTOFF16", /* name */
350 FALSE, /* partial_inplace */
351 0xffff, /* src_mask */
352 0xffff, /* dst_mask */
353 FALSE), /* pcrel_offset */
355 HOWTO (R_MN10300_PLT32, /* type */
357 2, /* size (0 = byte, 1 = short, 2 = long) */
359 TRUE, /* pc_relative */
361 complain_overflow_bitfield, /* complain_on_overflow */
362 bfd_elf_generic_reloc, /* */
363 "R_MN10300_PLT32", /* name */
364 FALSE, /* partial_inplace */
365 0xffffffff, /* src_mask */
366 0xffffffff, /* dst_mask */
367 TRUE), /* pcrel_offset */
369 HOWTO (R_MN10300_PLT16, /* type */
371 1, /* size (0 = byte, 1 = short, 2 = long) */
373 TRUE, /* pc_relative */
375 complain_overflow_bitfield, /* complain_on_overflow */
376 bfd_elf_generic_reloc, /* */
377 "R_MN10300_PLT16", /* name */
378 FALSE, /* partial_inplace */
379 0xffff, /* src_mask */
380 0xffff, /* dst_mask */
381 TRUE), /* pcrel_offset */
383 HOWTO (R_MN10300_GOT32, /* type */
385 2, /* size (0 = byte, 1 = short, 2 = long) */
387 FALSE, /* pc_relative */
389 complain_overflow_bitfield, /* complain_on_overflow */
390 bfd_elf_generic_reloc, /* */
391 "R_MN10300_GOT32", /* name */
392 FALSE, /* partial_inplace */
393 0xffffffff, /* src_mask */
394 0xffffffff, /* dst_mask */
395 FALSE), /* pcrel_offset */
397 HOWTO (R_MN10300_GOT24, /* type */
399 2, /* size (0 = byte, 1 = short, 2 = long) */
401 FALSE, /* pc_relative */
403 complain_overflow_bitfield, /* complain_on_overflow */
404 bfd_elf_generic_reloc, /* */
405 "R_MN10300_GOT24", /* name */
406 FALSE, /* partial_inplace */
407 0xffffffff, /* src_mask */
408 0xffffffff, /* dst_mask */
409 FALSE), /* pcrel_offset */
411 HOWTO (R_MN10300_GOT16, /* type */
413 1, /* size (0 = byte, 1 = short, 2 = long) */
415 FALSE, /* pc_relative */
417 complain_overflow_bitfield, /* complain_on_overflow */
418 bfd_elf_generic_reloc, /* */
419 "R_MN10300_GOT16", /* name */
420 FALSE, /* partial_inplace */
421 0xffffffff, /* src_mask */
422 0xffffffff, /* dst_mask */
423 FALSE), /* pcrel_offset */
425 HOWTO (R_MN10300_COPY, /* type */
427 2, /* size (0 = byte, 1 = short, 2 = long) */
429 FALSE, /* pc_relative */
431 complain_overflow_bitfield, /* complain_on_overflow */
432 bfd_elf_generic_reloc, /* */
433 "R_MN10300_COPY", /* name */
434 FALSE, /* partial_inplace */
435 0xffffffff, /* src_mask */
436 0xffffffff, /* dst_mask */
437 FALSE), /* pcrel_offset */
439 HOWTO (R_MN10300_GLOB_DAT, /* type */
441 2, /* size (0 = byte, 1 = short, 2 = long) */
443 FALSE, /* pc_relative */
445 complain_overflow_bitfield, /* complain_on_overflow */
446 bfd_elf_generic_reloc, /* */
447 "R_MN10300_GLOB_DAT", /* name */
448 FALSE, /* partial_inplace */
449 0xffffffff, /* src_mask */
450 0xffffffff, /* dst_mask */
451 FALSE), /* pcrel_offset */
453 HOWTO (R_MN10300_JMP_SLOT, /* type */
455 2, /* size (0 = byte, 1 = short, 2 = long) */
457 FALSE, /* pc_relative */
459 complain_overflow_bitfield, /* complain_on_overflow */
460 bfd_elf_generic_reloc, /* */
461 "R_MN10300_JMP_SLOT", /* name */
462 FALSE, /* partial_inplace */
463 0xffffffff, /* src_mask */
464 0xffffffff, /* dst_mask */
465 FALSE), /* pcrel_offset */
467 HOWTO (R_MN10300_RELATIVE, /* type */
469 2, /* size (0 = byte, 1 = short, 2 = long) */
471 FALSE, /* pc_relative */
473 complain_overflow_bitfield, /* complain_on_overflow */
474 bfd_elf_generic_reloc, /* */
475 "R_MN10300_RELATIVE", /* name */
476 FALSE, /* partial_inplace */
477 0xffffffff, /* src_mask */
478 0xffffffff, /* dst_mask */
479 FALSE), /* pcrel_offset */
481 HOWTO (R_MN10300_TLS_GD, /* type */
483 2, /* size (0 = byte, 1 = short, 2 = long) */
485 FALSE, /* pc_relative */
487 complain_overflow_bitfield, /* complain_on_overflow */
488 bfd_elf_generic_reloc, /* */
489 "R_MN10300_TLS_GD", /* name */
490 FALSE, /* partial_inplace */
491 0xffffffff, /* src_mask */
492 0xffffffff, /* dst_mask */
493 FALSE), /* pcrel_offset */
495 HOWTO (R_MN10300_TLS_LD, /* type */
497 2, /* size (0 = byte, 1 = short, 2 = long) */
499 FALSE, /* pc_relative */
501 complain_overflow_bitfield, /* complain_on_overflow */
502 bfd_elf_generic_reloc, /* */
503 "R_MN10300_TLS_LD", /* name */
504 FALSE, /* partial_inplace */
505 0xffffffff, /* src_mask */
506 0xffffffff, /* dst_mask */
507 FALSE), /* pcrel_offset */
509 HOWTO (R_MN10300_TLS_LDO, /* type */
511 2, /* size (0 = byte, 1 = short, 2 = long) */
513 FALSE, /* pc_relative */
515 complain_overflow_bitfield, /* complain_on_overflow */
516 bfd_elf_generic_reloc, /* */
517 "R_MN10300_TLS_LDO", /* name */
518 FALSE, /* partial_inplace */
519 0xffffffff, /* src_mask */
520 0xffffffff, /* dst_mask */
521 FALSE), /* pcrel_offset */
523 HOWTO (R_MN10300_TLS_GOTIE, /* type */
525 2, /* size (0 = byte, 1 = short, 2 = long) */
527 FALSE, /* pc_relative */
529 complain_overflow_bitfield, /* complain_on_overflow */
530 bfd_elf_generic_reloc, /* */
531 "R_MN10300_TLS_GOTIE", /* name */
532 FALSE, /* partial_inplace */
533 0xffffffff, /* src_mask */
534 0xffffffff, /* dst_mask */
535 FALSE), /* pcrel_offset */
537 HOWTO (R_MN10300_TLS_IE, /* type */
539 2, /* size (0 = byte, 1 = short, 2 = long) */
541 FALSE, /* pc_relative */
543 complain_overflow_bitfield, /* complain_on_overflow */
544 bfd_elf_generic_reloc, /* */
545 "R_MN10300_TLS_IE", /* name */
546 FALSE, /* partial_inplace */
547 0xffffffff, /* src_mask */
548 0xffffffff, /* dst_mask */
549 FALSE), /* pcrel_offset */
551 HOWTO (R_MN10300_TLS_LE, /* type */
553 2, /* size (0 = byte, 1 = short, 2 = long) */
555 FALSE, /* pc_relative */
557 complain_overflow_bitfield, /* complain_on_overflow */
558 bfd_elf_generic_reloc, /* */
559 "R_MN10300_TLS_LE", /* name */
560 FALSE, /* partial_inplace */
561 0xffffffff, /* src_mask */
562 0xffffffff, /* dst_mask */
563 FALSE), /* pcrel_offset */
565 HOWTO (R_MN10300_TLS_DTPMOD, /* type */
567 2, /* size (0 = byte, 1 = short, 2 = long) */
569 FALSE, /* pc_relative */
571 complain_overflow_bitfield, /* complain_on_overflow */
572 bfd_elf_generic_reloc, /* */
573 "R_MN10300_TLS_DTPMOD", /* name */
574 FALSE, /* partial_inplace */
575 0xffffffff, /* src_mask */
576 0xffffffff, /* dst_mask */
577 FALSE), /* pcrel_offset */
579 HOWTO (R_MN10300_TLS_DTPOFF, /* type */
581 2, /* size (0 = byte, 1 = short, 2 = long) */
583 FALSE, /* pc_relative */
585 complain_overflow_bitfield, /* complain_on_overflow */
586 bfd_elf_generic_reloc, /* */
587 "R_MN10300_TLS_DTPOFF", /* name */
588 FALSE, /* partial_inplace */
589 0xffffffff, /* src_mask */
590 0xffffffff, /* dst_mask */
591 FALSE), /* pcrel_offset */
593 HOWTO (R_MN10300_TLS_TPOFF, /* type */
595 2, /* size (0 = byte, 1 = short, 2 = long) */
597 FALSE, /* pc_relative */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* */
601 "R_MN10300_TLS_TPOFF", /* name */
602 FALSE, /* partial_inplace */
603 0xffffffff, /* src_mask */
604 0xffffffff, /* dst_mask */
605 FALSE), /* pcrel_offset */
607 HOWTO (R_MN10300_SYM_DIFF, /* type */
609 2, /* size (0 = byte, 1 = short, 2 = long) */
611 FALSE, /* pc_relative */
613 complain_overflow_dont,/* complain_on_overflow */
614 NULL, /* special handler. */
615 "R_MN10300_SYM_DIFF", /* name */
616 FALSE, /* partial_inplace */
617 0xffffffff, /* src_mask */
618 0xffffffff, /* dst_mask */
619 FALSE), /* pcrel_offset */
621 HOWTO (R_MN10300_ALIGN, /* type */
623 0, /* size (0 = byte, 1 = short, 2 = long) */
625 FALSE, /* pc_relative */
627 complain_overflow_dont,/* complain_on_overflow */
628 NULL, /* special handler. */
629 "R_MN10300_ALIGN", /* name */
630 FALSE, /* partial_inplace */
633 FALSE) /* pcrel_offset */
636 struct mn10300_reloc_map
638 bfd_reloc_code_real_type bfd_reloc_val;
639 unsigned char elf_reloc_val;
642 static const struct mn10300_reloc_map mn10300_reloc_map[] =
644 { BFD_RELOC_NONE, R_MN10300_NONE, },
645 { BFD_RELOC_32, R_MN10300_32, },
646 { BFD_RELOC_16, R_MN10300_16, },
647 { BFD_RELOC_8, R_MN10300_8, },
648 { BFD_RELOC_32_PCREL, R_MN10300_PCREL32, },
649 { BFD_RELOC_16_PCREL, R_MN10300_PCREL16, },
650 { BFD_RELOC_8_PCREL, R_MN10300_PCREL8, },
651 { BFD_RELOC_24, R_MN10300_24, },
652 { BFD_RELOC_VTABLE_INHERIT, R_MN10300_GNU_VTINHERIT },
653 { BFD_RELOC_VTABLE_ENTRY, R_MN10300_GNU_VTENTRY },
654 { BFD_RELOC_32_GOT_PCREL, R_MN10300_GOTPC32 },
655 { BFD_RELOC_16_GOT_PCREL, R_MN10300_GOTPC16 },
656 { BFD_RELOC_32_GOTOFF, R_MN10300_GOTOFF32 },
657 { BFD_RELOC_MN10300_GOTOFF24, R_MN10300_GOTOFF24 },
658 { BFD_RELOC_16_GOTOFF, R_MN10300_GOTOFF16 },
659 { BFD_RELOC_32_PLT_PCREL, R_MN10300_PLT32 },
660 { BFD_RELOC_16_PLT_PCREL, R_MN10300_PLT16 },
661 { BFD_RELOC_MN10300_GOT32, R_MN10300_GOT32 },
662 { BFD_RELOC_MN10300_GOT24, R_MN10300_GOT24 },
663 { BFD_RELOC_MN10300_GOT16, R_MN10300_GOT16 },
664 { BFD_RELOC_MN10300_COPY, R_MN10300_COPY },
665 { BFD_RELOC_MN10300_GLOB_DAT, R_MN10300_GLOB_DAT },
666 { BFD_RELOC_MN10300_JMP_SLOT, R_MN10300_JMP_SLOT },
667 { BFD_RELOC_MN10300_RELATIVE, R_MN10300_RELATIVE },
668 { BFD_RELOC_MN10300_TLS_GD, R_MN10300_TLS_GD },
669 { BFD_RELOC_MN10300_TLS_LD, R_MN10300_TLS_LD },
670 { BFD_RELOC_MN10300_TLS_LDO, R_MN10300_TLS_LDO },
671 { BFD_RELOC_MN10300_TLS_GOTIE, R_MN10300_TLS_GOTIE },
672 { BFD_RELOC_MN10300_TLS_IE, R_MN10300_TLS_IE },
673 { BFD_RELOC_MN10300_TLS_LE, R_MN10300_TLS_LE },
674 { BFD_RELOC_MN10300_TLS_DTPMOD, R_MN10300_TLS_DTPMOD },
675 { BFD_RELOC_MN10300_TLS_DTPOFF, R_MN10300_TLS_DTPOFF },
676 { BFD_RELOC_MN10300_TLS_TPOFF, R_MN10300_TLS_TPOFF },
677 { BFD_RELOC_MN10300_SYM_DIFF, R_MN10300_SYM_DIFF },
678 { BFD_RELOC_MN10300_ALIGN, R_MN10300_ALIGN }
681 /* Create the GOT section. */
684 _bfd_mn10300_elf_create_got_section (bfd * abfd,
685 struct bfd_link_info * info)
690 struct elf_link_hash_entry * h;
691 const struct elf_backend_data * bed = get_elf_backend_data (abfd);
692 struct elf_link_hash_table *htab;
695 /* This function may be called more than once. */
696 htab = elf_hash_table (info);
697 if (htab->sgot != NULL)
700 switch (bed->s->arch_size)
711 bfd_set_error (bfd_error_bad_value);
715 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
716 | SEC_LINKER_CREATED);
719 pltflags |= SEC_CODE;
720 if (bed->plt_not_loaded)
721 pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
722 if (bed->plt_readonly)
723 pltflags |= SEC_READONLY;
725 s = bfd_make_section_anyway_with_flags (abfd, ".plt", pltflags);
728 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
731 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
733 if (bed->want_plt_sym)
735 h = _bfd_elf_define_linkage_sym (abfd, info, s,
736 "_PROCEDURE_LINKAGE_TABLE_");
742 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
745 || ! bfd_set_section_alignment (abfd, s, ptralign))
748 if (bed->want_got_plt)
750 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
753 || ! bfd_set_section_alignment (abfd, s, ptralign))
757 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
758 (or .got.plt) section. We don't do this in the linker script
759 because we don't want to define the symbol if we are not creating
760 a global offset table. */
761 h = _bfd_elf_define_linkage_sym (abfd, info, s, "_GLOBAL_OFFSET_TABLE_");
766 /* The first bit of the global offset table is the header. */
767 s->size += bed->got_header_size;
772 static reloc_howto_type *
773 bfd_elf32_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
774 bfd_reloc_code_real_type code)
778 for (i = ARRAY_SIZE (mn10300_reloc_map); i--;)
779 if (mn10300_reloc_map[i].bfd_reloc_val == code)
780 return &elf_mn10300_howto_table[mn10300_reloc_map[i].elf_reloc_val];
785 static reloc_howto_type *
786 bfd_elf32_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
791 for (i = ARRAY_SIZE (elf_mn10300_howto_table); i--;)
792 if (elf_mn10300_howto_table[i].name != NULL
793 && strcasecmp (elf_mn10300_howto_table[i].name, r_name) == 0)
794 return elf_mn10300_howto_table + i;
799 /* Set the howto pointer for an MN10300 ELF reloc. */
802 mn10300_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
804 Elf_Internal_Rela *dst)
808 r_type = ELF32_R_TYPE (dst->r_info);
809 BFD_ASSERT (r_type < (unsigned int) R_MN10300_MAX);
810 cache_ptr->howto = elf_mn10300_howto_table + r_type;
814 elf_mn10300_tls_transition (struct bfd_link_info * info,
816 struct elf_link_hash_entry * h,
818 bfd_boolean counting)
820 bfd_boolean is_local;
822 if (r_type == R_MN10300_TLS_GD
824 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_IE)
825 return R_MN10300_TLS_GOTIE;
830 if (! (sec->flags & SEC_CODE))
833 if (! counting && h != NULL && ! elf_hash_table (info)->dynamic_sections_created)
836 is_local = SYMBOL_CALLS_LOCAL (info, h);
838 /* For the main program, these are the transitions we do. */
841 case R_MN10300_TLS_GD: return is_local ? R_MN10300_TLS_LE : R_MN10300_TLS_GOTIE;
842 case R_MN10300_TLS_LD: return R_MN10300_NONE;
843 case R_MN10300_TLS_LDO: return R_MN10300_TLS_LE;
844 case R_MN10300_TLS_IE:
845 case R_MN10300_TLS_GOTIE: return is_local ? R_MN10300_TLS_LE : r_type;
851 /* Return the relocation value for @tpoff relocation
852 if STT_TLS virtual address is ADDRESS. */
855 dtpoff (struct bfd_link_info * info, bfd_vma address)
857 struct elf_link_hash_table *htab = elf_hash_table (info);
859 /* If tls_sec is NULL, we should have signalled an error already. */
860 if (htab->tls_sec == NULL)
862 return address - htab->tls_sec->vma;
865 /* Return the relocation value for @tpoff relocation
866 if STT_TLS virtual address is ADDRESS. */
869 tpoff (struct bfd_link_info * info, bfd_vma address)
871 struct elf_link_hash_table *htab = elf_hash_table (info);
873 /* If tls_sec is NULL, we should have signalled an error already. */
874 if (htab->tls_sec == NULL)
876 return address - (htab->tls_size + htab->tls_sec->vma);
879 /* Returns nonzero if there's a R_MN10300_PLT32 reloc that we now need
880 to skip, after this one. The actual value is the offset between
881 this reloc and the PLT reloc. */
884 mn10300_do_tls_transition (bfd * input_bfd,
886 unsigned int tls_r_type,
890 bfd_byte *op = contents + offset;
893 #define TLS_PAIR(r1,r2) ((r1) * R_MN10300_MAX + (r2))
895 /* This is common to all GD/LD transitions, so break it out. */
896 if (r_type == R_MN10300_TLS_GD
897 || r_type == R_MN10300_TLS_LD)
901 BFD_ASSERT (bfd_get_8 (input_bfd, op) == 0xFC);
902 BFD_ASSERT (bfd_get_8 (input_bfd, op + 1) == 0xCC);
904 BFD_ASSERT (bfd_get_8 (input_bfd, op + 6) == 0xF1);
905 gotreg = (bfd_get_8 (input_bfd, op + 7) & 0x0c) >> 2;
907 BFD_ASSERT (bfd_get_8 (input_bfd, op + 8) == 0xDD);
910 switch (TLS_PAIR (r_type, tls_r_type))
912 case TLS_PAIR (R_MN10300_TLS_GD, R_MN10300_TLS_GOTIE):
914 /* Keep track of which register we put GOTptr in. */
915 /* mov (_x@indntpoff,a2),a0. */
916 memcpy (op, "\xFC\x20\x00\x00\x00\x00", 6);
919 memcpy (op+6, "\xF9\x78\x28", 3);
920 /* or 0x00000000, d0 - six byte nop. */
921 memcpy (op+9, "\xFC\xE4\x00\x00\x00\x00", 6);
925 case TLS_PAIR (R_MN10300_TLS_GD, R_MN10300_TLS_LE):
927 /* Register is *always* a0. */
928 /* mov _x@tpoff,a0. */
929 memcpy (op, "\xFC\xDC\x00\x00\x00\x00", 6);
931 memcpy (op+6, "\xF9\x78\x28", 3);
932 /* or 0x00000000, d0 - six byte nop. */
933 memcpy (op+9, "\xFC\xE4\x00\x00\x00\x00", 6);
936 case TLS_PAIR (R_MN10300_TLS_LD, R_MN10300_NONE):
938 /* Register is *always* a0. */
940 memcpy (op, "\xF5\x88", 2);
941 /* or 0x00000000, d0 - six byte nop. */
942 memcpy (op+2, "\xFC\xE4\x00\x00\x00\x00", 6);
943 /* or 0x00000000, e2 - seven byte nop. */
944 memcpy (op+8, "\xFE\x19\x22\x00\x00\x00\x00", 7);
948 case TLS_PAIR (R_MN10300_TLS_LDO, R_MN10300_TLS_LE):
949 /* No changes needed, just the reloc change. */
952 /* These are a little tricky, because we have to detect which
953 opcode is being used (they're different sizes, with the reloc
954 at different offsets within the opcode) and convert each
955 accordingly, copying the operands as needed. The conversions
956 we do are as follows (IE,GOTIE,LE):
958 1111 1100 1010 01Dn [-- abs32 --] MOV (x@indntpoff),Dn
959 1111 1100 0000 DnAm [-- abs32 --] MOV (x@gotntpoff,Am),Dn
960 1111 1100 1100 11Dn [-- abs32 --] MOV x@tpoff,Dn
962 1111 1100 1010 00An [-- abs32 --] MOV (x@indntpoff),An
963 1111 1100 0010 AnAm [-- abs32 --] MOV (x@gotntpoff,Am),An
964 1111 1100 1101 11An [-- abs32 --] MOV x@tpoff,An
966 1111 1110 0000 1110 Rnnn Xxxx [-- abs32 --] MOV (x@indntpoff),Rn
967 1111 1110 0000 1010 Rnnn Rmmm [-- abs32 --] MOV (x@indntpoff,Rm),Rn
968 1111 1110 0000 1000 Rnnn Xxxx [-- abs32 --] MOV x@tpoff,Rn
970 Since the GOT pointer is always $a2, we assume the last
971 normally won't happen, but let's be paranoid and plan for the
972 day that GCC optimizes it somewhow. */
974 case TLS_PAIR (R_MN10300_TLS_IE, R_MN10300_TLS_LE):
978 if ((op[1] & 0xFC) == 0xA4) /* Dn */
980 op[1] &= 0x03; /* Leaves Dn. */
985 op[1] &= 0x03; /* Leaves An. */
989 else if (op[-3] == 0xFE)
995 case TLS_PAIR (R_MN10300_TLS_GOTIE, R_MN10300_TLS_LE):
999 if ((op[1] & 0xF0) == 0x00) /* Dn */
1001 op[1] &= 0x0C; /* Leaves Dn. */
1007 op[1] &= 0x0C; /* Leaves An. */
1012 else if (op[-3] == 0xFE)
1019 (*_bfd_error_handler)
1020 (_("%s: Unsupported transition from %s to %s"),
1021 bfd_get_filename (input_bfd),
1022 elf_mn10300_howto_table[r_type].name,
1023 elf_mn10300_howto_table[tls_r_type].name);
1030 /* Look through the relocs for a section during the first phase.
1031 Since we don't do .gots or .plts, we just need to consider the
1032 virtual table relocs for gc. */
1035 mn10300_elf_check_relocs (bfd *abfd,
1036 struct bfd_link_info *info,
1038 const Elf_Internal_Rela *relocs)
1040 struct elf32_mn10300_link_hash_table * htab = elf32_mn10300_hash_table (info);
1041 bfd_boolean sym_diff_reloc_seen;
1042 Elf_Internal_Shdr *symtab_hdr;
1043 Elf_Internal_Sym * isymbuf = NULL;
1044 struct elf_link_hash_entry **sym_hashes;
1045 const Elf_Internal_Rela *rel;
1046 const Elf_Internal_Rela *rel_end;
1048 bfd_vma * local_got_offsets;
1052 bfd_boolean result = FALSE;
1058 if (info->relocatable)
1061 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1062 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
1063 sym_hashes = elf_sym_hashes (abfd);
1065 dynobj = elf_hash_table (info)->dynobj;
1066 local_got_offsets = elf_local_got_offsets (abfd);
1067 rel_end = relocs + sec->reloc_count;
1068 sym_diff_reloc_seen = FALSE;
1070 for (rel = relocs; rel < rel_end; rel++)
1072 struct elf_link_hash_entry *h;
1073 unsigned long r_symndx;
1074 unsigned int r_type;
1075 int tls_type = GOT_NORMAL;
1077 r_symndx = ELF32_R_SYM (rel->r_info);
1078 if (r_symndx < symtab_hdr->sh_info)
1082 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1083 while (h->root.type == bfd_link_hash_indirect
1084 || h->root.type == bfd_link_hash_warning)
1085 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1087 /* PR15323, ref flags aren't set for references in the same
1089 h->root.non_ir_ref = 1;
1092 r_type = ELF32_R_TYPE (rel->r_info);
1093 r_type = elf_mn10300_tls_transition (info, r_type, h, sec, TRUE);
1095 /* Some relocs require a global offset table. */
1100 case R_MN10300_GOT32:
1101 case R_MN10300_GOT24:
1102 case R_MN10300_GOT16:
1103 case R_MN10300_GOTOFF32:
1104 case R_MN10300_GOTOFF24:
1105 case R_MN10300_GOTOFF16:
1106 case R_MN10300_GOTPC32:
1107 case R_MN10300_GOTPC16:
1108 case R_MN10300_TLS_GD:
1109 case R_MN10300_TLS_LD:
1110 case R_MN10300_TLS_GOTIE:
1111 case R_MN10300_TLS_IE:
1112 elf_hash_table (info)->dynobj = dynobj = abfd;
1113 if (! _bfd_mn10300_elf_create_got_section (dynobj, info))
1124 /* This relocation describes the C++ object vtable hierarchy.
1125 Reconstruct it for later use during GC. */
1126 case R_MN10300_GNU_VTINHERIT:
1127 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1131 /* This relocation describes which C++ vtable entries are actually
1132 used. Record for later use during GC. */
1133 case R_MN10300_GNU_VTENTRY:
1134 BFD_ASSERT (h != NULL);
1136 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1140 case R_MN10300_TLS_LD:
1141 htab->tls_ldm_got.refcount ++;
1142 tls_type = GOT_TLS_LD;
1144 if (htab->tls_ldm_got.got_allocated)
1148 case R_MN10300_TLS_IE:
1149 case R_MN10300_TLS_GOTIE:
1151 info->flags |= DF_STATIC_TLS;
1154 case R_MN10300_TLS_GD:
1155 case R_MN10300_GOT32:
1156 case R_MN10300_GOT24:
1157 case R_MN10300_GOT16:
1159 /* This symbol requires a global offset table entry. */
1163 case R_MN10300_TLS_IE:
1164 case R_MN10300_TLS_GOTIE: tls_type = GOT_TLS_IE; break;
1165 case R_MN10300_TLS_GD: tls_type = GOT_TLS_GD; break;
1166 default: tls_type = GOT_NORMAL; break;
1171 sgot = htab->root.sgot;
1172 BFD_ASSERT (sgot != NULL);
1176 && (h != NULL || info->shared))
1178 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1179 if (srelgot == NULL)
1181 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1182 | SEC_IN_MEMORY | SEC_LINKER_CREATED
1184 srelgot = bfd_make_section_anyway_with_flags (dynobj,
1188 || ! bfd_set_section_alignment (dynobj, srelgot, 2))
1193 if (r_type == R_MN10300_TLS_LD)
1195 htab->tls_ldm_got.offset = sgot->size;
1196 htab->tls_ldm_got.got_allocated ++;
1200 if (elf_mn10300_hash_entry (h)->tls_type != tls_type
1201 && elf_mn10300_hash_entry (h)->tls_type != GOT_UNKNOWN)
1203 if (tls_type == GOT_TLS_IE
1204 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_GD)
1205 /* No change - this is ok. */;
1206 else if (tls_type == GOT_TLS_GD
1207 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_IE)
1208 /* Transition GD->IE. */
1209 tls_type = GOT_TLS_IE;
1211 (*_bfd_error_handler)
1212 (_("%B: %s' accessed both as normal and thread local symbol"),
1213 abfd, h ? h->root.root.string : "<local>");
1216 elf_mn10300_hash_entry (h)->tls_type = tls_type;
1218 if (h->got.offset != (bfd_vma) -1)
1219 /* We have already allocated space in the .got. */
1222 h->got.offset = sgot->size;
1224 if (ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1225 /* Make sure this symbol is output as a dynamic symbol. */
1226 && h->dynindx == -1)
1228 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1232 srelgot->size += sizeof (Elf32_External_Rela);
1233 if (r_type == R_MN10300_TLS_GD)
1234 srelgot->size += sizeof (Elf32_External_Rela);
1238 /* This is a global offset table entry for a local
1240 if (local_got_offsets == NULL)
1245 size = symtab_hdr->sh_info * (sizeof (bfd_vma) + sizeof (char));
1246 local_got_offsets = bfd_alloc (abfd, size);
1248 if (local_got_offsets == NULL)
1251 elf_local_got_offsets (abfd) = local_got_offsets;
1252 elf_mn10300_local_got_tls_type (abfd)
1253 = (char *) (local_got_offsets + symtab_hdr->sh_info);
1255 for (i = 0; i < symtab_hdr->sh_info; i++)
1256 local_got_offsets[i] = (bfd_vma) -1;
1259 if (local_got_offsets[r_symndx] != (bfd_vma) -1)
1260 /* We have already allocated space in the .got. */
1263 local_got_offsets[r_symndx] = sgot->size;
1267 /* If we are generating a shared object, we need to
1268 output a R_MN10300_RELATIVE reloc so that the dynamic
1269 linker can adjust this GOT entry. */
1270 srelgot->size += sizeof (Elf32_External_Rela);
1272 if (r_type == R_MN10300_TLS_GD)
1273 /* And a R_MN10300_TLS_DTPOFF reloc as well. */
1274 srelgot->size += sizeof (Elf32_External_Rela);
1277 elf_mn10300_local_got_tls_type (abfd) [r_symndx] = tls_type;
1281 if (r_type == R_MN10300_TLS_GD
1282 || r_type == R_MN10300_TLS_LD)
1285 goto need_shared_relocs;
1287 case R_MN10300_PLT32:
1288 case R_MN10300_PLT16:
1289 /* This symbol requires a procedure linkage table entry. We
1290 actually build the entry in adjust_dynamic_symbol,
1291 because this might be a case of linking PIC code which is
1292 never referenced by a dynamic object, in which case we
1293 don't need to generate a procedure linkage table entry
1296 /* If this is a local symbol, we resolve it directly without
1297 creating a procedure linkage table entry. */
1301 if (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
1302 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN)
1311 case R_MN10300_PCREL32:
1312 case R_MN10300_PCREL16:
1313 case R_MN10300_PCREL8:
1318 case R_MN10300_SYM_DIFF:
1319 sym_diff_reloc_seen = TRUE;
1327 /* If we are creating a shared library, then we
1328 need to copy the reloc into the shared library. */
1330 && (sec->flags & SEC_ALLOC) != 0
1331 /* Do not generate a dynamic reloc for a
1332 reloc associated with a SYM_DIFF operation. */
1333 && ! sym_diff_reloc_seen)
1335 asection * sym_section = NULL;
1337 /* Find the section containing the
1338 symbol involved in the relocation. */
1341 Elf_Internal_Sym * isym;
1343 if (isymbuf == NULL)
1344 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
1345 symtab_hdr->sh_info, 0,
1349 isym = isymbuf + r_symndx;
1350 /* All we care about is whether this local symbol is absolute. */
1351 if (isym->st_shndx == SHN_ABS)
1352 sym_section = bfd_abs_section_ptr;
1357 if (h->root.type == bfd_link_hash_defined
1358 || h->root.type == bfd_link_hash_defweak)
1359 sym_section = h->root.u.def.section;
1362 /* If the symbol is absolute then the relocation can
1363 be resolved during linking and there is no need for
1365 if (sym_section != bfd_abs_section_ptr)
1367 /* When creating a shared object, we must copy these
1368 reloc types into the output file. We create a reloc
1369 section in dynobj and make room for this reloc. */
1372 sreloc = _bfd_elf_make_dynamic_reloc_section
1373 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
1378 sreloc->size += sizeof (Elf32_External_Rela);
1385 if (ELF32_R_TYPE (rel->r_info) != R_MN10300_SYM_DIFF)
1386 sym_diff_reloc_seen = FALSE;
1391 if (isymbuf != NULL)
1397 /* Return the section that should be marked against GC for a given
1401 mn10300_elf_gc_mark_hook (asection *sec,
1402 struct bfd_link_info *info,
1403 Elf_Internal_Rela *rel,
1404 struct elf_link_hash_entry *h,
1405 Elf_Internal_Sym *sym)
1408 switch (ELF32_R_TYPE (rel->r_info))
1410 case R_MN10300_GNU_VTINHERIT:
1411 case R_MN10300_GNU_VTENTRY:
1415 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1418 /* Perform a relocation as part of a final link. */
1420 static bfd_reloc_status_type
1421 mn10300_elf_final_link_relocate (reloc_howto_type *howto,
1423 bfd *output_bfd ATTRIBUTE_UNUSED,
1424 asection *input_section,
1429 struct elf_link_hash_entry * h,
1430 unsigned long symndx,
1431 struct bfd_link_info *info,
1432 asection *sym_sec ATTRIBUTE_UNUSED,
1433 int is_local ATTRIBUTE_UNUSED)
1435 struct elf32_mn10300_link_hash_table * htab = elf32_mn10300_hash_table (info);
1436 static asection * sym_diff_section;
1437 static bfd_vma sym_diff_value;
1438 bfd_boolean is_sym_diff_reloc;
1439 unsigned long r_type = howto->type;
1440 bfd_byte * hit_data = contents + offset;
1446 dynobj = elf_hash_table (info)->dynobj;
1456 case R_MN10300_PCREL8:
1457 case R_MN10300_PCREL16:
1458 case R_MN10300_PCREL32:
1459 case R_MN10300_GOTOFF32:
1460 case R_MN10300_GOTOFF24:
1461 case R_MN10300_GOTOFF16:
1463 && (input_section->flags & SEC_ALLOC) != 0
1465 && ! SYMBOL_REFERENCES_LOCAL (info, h))
1466 return bfd_reloc_dangerous;
1467 case R_MN10300_GOT32:
1469 Taking the address of a protected function in a shared library
1470 is illegal. Issue an error message here. */
1472 && (input_section->flags & SEC_ALLOC) != 0
1474 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED
1475 && (h->type == STT_FUNC || h->type == STT_GNU_IFUNC)
1476 && ! SYMBOL_REFERENCES_LOCAL (info, h))
1477 return bfd_reloc_dangerous;
1480 is_sym_diff_reloc = FALSE;
1481 if (sym_diff_section != NULL)
1483 BFD_ASSERT (sym_diff_section == input_section);
1491 value -= sym_diff_value;
1492 /* If we are computing a 32-bit value for the location lists
1493 and the result is 0 then we add one to the value. A zero
1494 value can result because of linker relaxation deleteing
1495 prologue instructions and using a value of 1 (for the begin
1496 and end offsets in the location list entry) results in a
1497 nul entry which does not prevent the following entries from
1499 if (r_type == R_MN10300_32
1501 && strcmp (input_section->name, ".debug_loc") == 0)
1503 sym_diff_section = NULL;
1504 is_sym_diff_reloc = TRUE;
1508 sym_diff_section = NULL;
1515 case R_MN10300_SYM_DIFF:
1516 BFD_ASSERT (addend == 0);
1517 /* Cache the input section and value.
1518 The offset is unreliable, since relaxation may
1519 have reduced the following reloc's offset. */
1520 sym_diff_section = input_section;
1521 sym_diff_value = value;
1522 return bfd_reloc_ok;
1524 case R_MN10300_ALIGN:
1525 case R_MN10300_NONE:
1526 return bfd_reloc_ok;
1530 /* Do not generate relocs when an R_MN10300_32 has been used
1531 with an R_MN10300_SYM_DIFF to compute a difference of two
1533 && is_sym_diff_reloc == FALSE
1534 /* Also, do not generate a reloc when the symbol associated
1535 with the R_MN10300_32 reloc is absolute - there is no
1536 need for a run time computation in this case. */
1537 && sym_sec != bfd_abs_section_ptr
1538 /* If the section is not going to be allocated at load time
1539 then there is no need to generate relocs for it. */
1540 && (input_section->flags & SEC_ALLOC) != 0)
1542 Elf_Internal_Rela outrel;
1543 bfd_boolean skip, relocate;
1545 /* When generating a shared object, these relocations are
1546 copied into the output file to be resolved at run
1550 sreloc = _bfd_elf_get_dynamic_reloc_section
1551 (input_bfd, input_section, /*rela?*/ TRUE);
1558 outrel.r_offset = _bfd_elf_section_offset (input_bfd, info,
1559 input_section, offset);
1560 if (outrel.r_offset == (bfd_vma) -1)
1563 outrel.r_offset += (input_section->output_section->vma
1564 + input_section->output_offset);
1568 memset (&outrel, 0, sizeof outrel);
1573 /* h->dynindx may be -1 if this symbol was marked to
1576 || SYMBOL_REFERENCES_LOCAL (info, h))
1579 outrel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
1580 outrel.r_addend = value + addend;
1584 BFD_ASSERT (h->dynindx != -1);
1586 outrel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_32);
1587 outrel.r_addend = value + addend;
1591 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
1592 (bfd_byte *) (((Elf32_External_Rela *) sreloc->contents)
1593 + sreloc->reloc_count));
1594 ++sreloc->reloc_count;
1596 /* If this reloc is against an external symbol, we do
1597 not want to fiddle with the addend. Otherwise, we
1598 need to include the symbol value so that it becomes
1599 an addend for the dynamic reloc. */
1601 return bfd_reloc_ok;
1604 bfd_put_32 (input_bfd, value, hit_data);
1605 return bfd_reloc_ok;
1610 if ((long) value > 0x7fffff || (long) value < -0x800000)
1611 return bfd_reloc_overflow;
1613 bfd_put_8 (input_bfd, value & 0xff, hit_data);
1614 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1615 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1616 return bfd_reloc_ok;
1621 if ((long) value > 0x7fff || (long) value < -0x8000)
1622 return bfd_reloc_overflow;
1624 bfd_put_16 (input_bfd, value, hit_data);
1625 return bfd_reloc_ok;
1630 if ((long) value > 0x7f || (long) value < -0x80)
1631 return bfd_reloc_overflow;
1633 bfd_put_8 (input_bfd, value, hit_data);
1634 return bfd_reloc_ok;
1636 case R_MN10300_PCREL8:
1637 value -= (input_section->output_section->vma
1638 + input_section->output_offset);
1642 if ((long) value > 0x7f || (long) value < -0x80)
1643 return bfd_reloc_overflow;
1645 bfd_put_8 (input_bfd, value, hit_data);
1646 return bfd_reloc_ok;
1648 case R_MN10300_PCREL16:
1649 value -= (input_section->output_section->vma
1650 + input_section->output_offset);
1654 if ((long) value > 0x7fff || (long) value < -0x8000)
1655 return bfd_reloc_overflow;
1657 bfd_put_16 (input_bfd, value, hit_data);
1658 return bfd_reloc_ok;
1660 case R_MN10300_PCREL32:
1661 value -= (input_section->output_section->vma
1662 + input_section->output_offset);
1666 bfd_put_32 (input_bfd, value, hit_data);
1667 return bfd_reloc_ok;
1669 case R_MN10300_GNU_VTINHERIT:
1670 case R_MN10300_GNU_VTENTRY:
1671 return bfd_reloc_ok;
1673 case R_MN10300_GOTPC32:
1675 return bfd_reloc_dangerous;
1677 /* Use global offset table as symbol value. */
1678 value = htab->root.sgot->output_section->vma;
1679 value -= (input_section->output_section->vma
1680 + input_section->output_offset);
1684 bfd_put_32 (input_bfd, value, hit_data);
1685 return bfd_reloc_ok;
1687 case R_MN10300_GOTPC16:
1689 return bfd_reloc_dangerous;
1691 /* Use global offset table as symbol value. */
1692 value = htab->root.sgot->output_section->vma;
1693 value -= (input_section->output_section->vma
1694 + input_section->output_offset);
1698 if ((long) value > 0x7fff || (long) value < -0x8000)
1699 return bfd_reloc_overflow;
1701 bfd_put_16 (input_bfd, value, hit_data);
1702 return bfd_reloc_ok;
1704 case R_MN10300_GOTOFF32:
1706 return bfd_reloc_dangerous;
1708 value -= htab->root.sgot->output_section->vma;
1711 bfd_put_32 (input_bfd, value, hit_data);
1712 return bfd_reloc_ok;
1714 case R_MN10300_GOTOFF24:
1716 return bfd_reloc_dangerous;
1718 value -= htab->root.sgot->output_section->vma;
1721 if ((long) value > 0x7fffff || (long) value < -0x800000)
1722 return bfd_reloc_overflow;
1724 bfd_put_8 (input_bfd, value, hit_data);
1725 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1726 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1727 return bfd_reloc_ok;
1729 case R_MN10300_GOTOFF16:
1731 return bfd_reloc_dangerous;
1733 value -= htab->root.sgot->output_section->vma;
1736 if ((long) value > 0x7fff || (long) value < -0x8000)
1737 return bfd_reloc_overflow;
1739 bfd_put_16 (input_bfd, value, hit_data);
1740 return bfd_reloc_ok;
1742 case R_MN10300_PLT32:
1744 && ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1745 && ELF_ST_VISIBILITY (h->other) != STV_HIDDEN
1746 && h->plt.offset != (bfd_vma) -1)
1749 return bfd_reloc_dangerous;
1751 splt = htab->root.splt;
1752 value = (splt->output_section->vma
1753 + splt->output_offset
1754 + h->plt.offset) - value;
1757 value -= (input_section->output_section->vma
1758 + input_section->output_offset);
1762 bfd_put_32 (input_bfd, value, hit_data);
1763 return bfd_reloc_ok;
1765 case R_MN10300_PLT16:
1767 && ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1768 && ELF_ST_VISIBILITY (h->other) != STV_HIDDEN
1769 && h->plt.offset != (bfd_vma) -1)
1772 return bfd_reloc_dangerous;
1774 splt = htab->root.splt;
1775 value = (splt->output_section->vma
1776 + splt->output_offset
1777 + h->plt.offset) - value;
1780 value -= (input_section->output_section->vma
1781 + input_section->output_offset);
1785 if ((long) value > 0x7fff || (long) value < -0x8000)
1786 return bfd_reloc_overflow;
1788 bfd_put_16 (input_bfd, value, hit_data);
1789 return bfd_reloc_ok;
1791 case R_MN10300_TLS_LDO:
1792 value = dtpoff (info, value);
1793 bfd_put_32 (input_bfd, value + addend, hit_data);
1794 return bfd_reloc_ok;
1796 case R_MN10300_TLS_LE:
1797 value = tpoff (info, value);
1798 bfd_put_32 (input_bfd, value + addend, hit_data);
1799 return bfd_reloc_ok;
1801 case R_MN10300_TLS_LD:
1803 return bfd_reloc_dangerous;
1805 sgot = htab->root.sgot;
1806 BFD_ASSERT (sgot != NULL);
1807 value = htab->tls_ldm_got.offset + sgot->output_offset;
1808 bfd_put_32 (input_bfd, value, hit_data);
1810 if (!htab->tls_ldm_got.rel_emitted)
1812 asection * srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1813 Elf_Internal_Rela rel;
1815 BFD_ASSERT (srelgot != NULL);
1816 htab->tls_ldm_got.rel_emitted ++;
1817 rel.r_offset = (sgot->output_section->vma
1818 + sgot->output_offset
1819 + htab->tls_ldm_got.offset);
1820 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + htab->tls_ldm_got.offset);
1821 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + htab->tls_ldm_got.offset+4);
1822 rel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD);
1824 bfd_elf32_swap_reloca_out (output_bfd, & rel,
1825 (bfd_byte *) ((Elf32_External_Rela *) srelgot->contents
1826 + srelgot->reloc_count));
1827 ++ srelgot->reloc_count;
1830 return bfd_reloc_ok;
1832 case R_MN10300_TLS_GOTIE:
1833 value = tpoff (info, value);
1836 case R_MN10300_TLS_GD:
1837 case R_MN10300_TLS_IE:
1838 case R_MN10300_GOT32:
1839 case R_MN10300_GOT24:
1840 case R_MN10300_GOT16:
1842 return bfd_reloc_dangerous;
1844 sgot = htab->root.sgot;
1845 if (r_type == R_MN10300_TLS_GD)
1846 value = dtpoff (info, value);
1852 off = h->got.offset;
1853 /* Offsets in the GOT are allocated in check_relocs
1854 which is not called for shared libraries... */
1855 if (off == (bfd_vma) -1)
1858 if (sgot->contents != NULL
1859 && (! elf_hash_table (info)->dynamic_sections_created
1860 || SYMBOL_REFERENCES_LOCAL (info, h)))
1861 /* This is actually a static link, or it is a
1862 -Bsymbolic link and the symbol is defined
1863 locally, or the symbol was forced to be local
1864 because of a version file. We must initialize
1865 this entry in the global offset table.
1867 When doing a dynamic link, we create a .rela.got
1868 relocation entry to initialize the value. This
1869 is done in the finish_dynamic_symbol routine. */
1870 bfd_put_32 (output_bfd, value,
1871 sgot->contents + off);
1873 value = sgot->output_offset + off;
1879 off = elf_local_got_offsets (input_bfd)[symndx];
1882 bfd_put_32 (output_bfd, value, sgot->contents + (off & ~ 1));
1885 bfd_put_32 (output_bfd, value, sgot->contents + off);
1890 Elf_Internal_Rela outrel;
1892 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1893 BFD_ASSERT (srelgot != NULL);
1895 outrel.r_offset = (sgot->output_section->vma
1896 + sgot->output_offset
1900 case R_MN10300_TLS_GD:
1901 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPOFF);
1902 outrel.r_offset = (sgot->output_section->vma
1903 + sgot->output_offset
1905 bfd_elf32_swap_reloca_out (output_bfd, & outrel,
1906 (bfd_byte *) (((Elf32_External_Rela *)
1908 + srelgot->reloc_count));
1909 ++ srelgot->reloc_count;
1910 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD);
1912 case R_MN10300_TLS_GOTIE:
1913 case R_MN10300_TLS_IE:
1914 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_TPOFF);
1917 outrel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
1921 outrel.r_addend = value;
1922 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
1923 (bfd_byte *) (((Elf32_External_Rela *)
1925 + srelgot->reloc_count));
1926 ++ srelgot->reloc_count;
1927 elf_local_got_offsets (input_bfd)[symndx] |= 1;
1930 value = sgot->output_offset + (off & ~(bfd_vma) 1);
1936 if (r_type == R_MN10300_TLS_IE)
1938 value += sgot->output_section->vma;
1939 bfd_put_32 (input_bfd, value, hit_data);
1940 return bfd_reloc_ok;
1942 else if (r_type == R_MN10300_TLS_GOTIE
1943 || r_type == R_MN10300_TLS_GD
1944 || r_type == R_MN10300_TLS_LD)
1946 bfd_put_32 (input_bfd, value, hit_data);
1947 return bfd_reloc_ok;
1949 else if (r_type == R_MN10300_GOT32)
1951 bfd_put_32 (input_bfd, value, hit_data);
1952 return bfd_reloc_ok;
1954 else if (r_type == R_MN10300_GOT24)
1956 if ((long) value > 0x7fffff || (long) value < -0x800000)
1957 return bfd_reloc_overflow;
1959 bfd_put_8 (input_bfd, value & 0xff, hit_data);
1960 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1961 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1962 return bfd_reloc_ok;
1964 else if (r_type == R_MN10300_GOT16)
1966 if ((long) value > 0x7fff || (long) value < -0x8000)
1967 return bfd_reloc_overflow;
1969 bfd_put_16 (input_bfd, value, hit_data);
1970 return bfd_reloc_ok;
1975 return bfd_reloc_notsupported;
1979 /* Relocate an MN10300 ELF section. */
1982 mn10300_elf_relocate_section (bfd *output_bfd,
1983 struct bfd_link_info *info,
1985 asection *input_section,
1987 Elf_Internal_Rela *relocs,
1988 Elf_Internal_Sym *local_syms,
1989 asection **local_sections)
1991 Elf_Internal_Shdr *symtab_hdr;
1992 struct elf_link_hash_entry **sym_hashes;
1993 Elf_Internal_Rela *rel, *relend;
1994 Elf_Internal_Rela * trel;
1996 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1997 sym_hashes = elf_sym_hashes (input_bfd);
2000 relend = relocs + input_section->reloc_count;
2001 for (; rel < relend; rel++)
2004 reloc_howto_type *howto;
2005 unsigned long r_symndx;
2006 Elf_Internal_Sym *sym;
2008 struct elf32_mn10300_link_hash_entry *h;
2010 bfd_reloc_status_type r;
2012 bfd_boolean unresolved_reloc = FALSE;
2013 bfd_boolean warned, ignored;
2014 struct elf_link_hash_entry * hh;
2017 r_symndx = ELF32_R_SYM (rel->r_info);
2018 r_type = ELF32_R_TYPE (rel->r_info);
2019 howto = elf_mn10300_howto_table + r_type;
2021 /* Just skip the vtable gc relocs. */
2022 if (r_type == R_MN10300_GNU_VTINHERIT
2023 || r_type == R_MN10300_GNU_VTENTRY)
2029 if (r_symndx < symtab_hdr->sh_info)
2033 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2034 r_symndx, symtab_hdr, sym_hashes,
2035 hh, sec, relocation,
2036 unresolved_reloc, warned, ignored);
2038 h = elf_mn10300_hash_entry (hh);
2040 tls_r_type = elf_mn10300_tls_transition (info, r_type, hh, input_section, 0);
2041 if (tls_r_type != r_type)
2043 bfd_boolean had_plt;
2045 had_plt = mn10300_do_tls_transition (input_bfd, r_type, tls_r_type,
2046 contents, rel->r_offset);
2047 r_type = tls_r_type;
2048 howto = elf_mn10300_howto_table + r_type;
2051 for (trel = rel+1; trel < relend; trel++)
2052 if ((ELF32_R_TYPE (trel->r_info) == R_MN10300_PLT32
2053 || ELF32_R_TYPE (trel->r_info) == R_MN10300_PCREL32)
2054 && rel->r_offset + had_plt == trel->r_offset)
2055 trel->r_info = ELF32_R_INFO (0, R_MN10300_NONE);
2058 if (r_symndx < symtab_hdr->sh_info)
2060 sym = local_syms + r_symndx;
2061 sec = local_sections[r_symndx];
2062 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2066 if ((h->root.root.type == bfd_link_hash_defined
2067 || h->root.root.type == bfd_link_hash_defweak)
2068 && ( r_type == R_MN10300_GOTPC32
2069 || r_type == R_MN10300_GOTPC16
2070 || (( r_type == R_MN10300_PLT32
2071 || r_type == R_MN10300_PLT16)
2072 && ELF_ST_VISIBILITY (h->root.other) != STV_INTERNAL
2073 && ELF_ST_VISIBILITY (h->root.other) != STV_HIDDEN
2074 && h->root.plt.offset != (bfd_vma) -1)
2075 || (( r_type == R_MN10300_GOT32
2076 || r_type == R_MN10300_GOT24
2077 || r_type == R_MN10300_TLS_GD
2078 || r_type == R_MN10300_TLS_LD
2079 || r_type == R_MN10300_TLS_GOTIE
2080 || r_type == R_MN10300_TLS_IE
2081 || r_type == R_MN10300_GOT16)
2082 && elf_hash_table (info)->dynamic_sections_created
2083 && !SYMBOL_REFERENCES_LOCAL (info, hh))
2084 || (r_type == R_MN10300_32
2085 /* _32 relocs in executables force _COPY relocs,
2086 such that the address of the symbol ends up
2088 && !info->executable
2089 && !SYMBOL_REFERENCES_LOCAL (info, hh)
2090 && ((input_section->flags & SEC_ALLOC) != 0
2091 /* DWARF will emit R_MN10300_32 relocations
2092 in its sections against symbols defined
2093 externally in shared libraries. We can't
2094 do anything with them here. */
2095 || ((input_section->flags & SEC_DEBUGGING) != 0
2096 && h->root.def_dynamic)))))
2097 /* In these cases, we don't need the relocation
2098 value. We check specially because in some
2099 obscure cases sec->output_section will be NULL. */
2102 else if (!info->relocatable && unresolved_reloc
2103 && _bfd_elf_section_offset (output_bfd, info, input_section,
2104 rel->r_offset) != (bfd_vma) -1)
2106 (*_bfd_error_handler)
2107 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
2110 (long) rel->r_offset,
2112 h->root.root.root.string);
2115 if (sec != NULL && discarded_section (sec))
2116 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2117 rel, 1, relend, howto, 0, contents);
2119 if (info->relocatable)
2122 r = mn10300_elf_final_link_relocate (howto, input_bfd, output_bfd,
2124 contents, rel->r_offset,
2125 relocation, rel->r_addend,
2126 (struct elf_link_hash_entry *) h,
2128 info, sec, h == NULL);
2130 if (r != bfd_reloc_ok)
2133 const char *msg = NULL;
2136 name = h->root.root.root.string;
2139 name = (bfd_elf_string_from_elf_section
2140 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2141 if (name == NULL || *name == '\0')
2142 name = bfd_section_name (input_bfd, sec);
2147 case bfd_reloc_overflow:
2148 if (! ((*info->callbacks->reloc_overflow)
2149 (info, (h ? &h->root.root : NULL), name,
2150 howto->name, (bfd_vma) 0, input_bfd,
2151 input_section, rel->r_offset)))
2155 case bfd_reloc_undefined:
2156 if (! ((*info->callbacks->undefined_symbol)
2157 (info, name, input_bfd, input_section,
2158 rel->r_offset, TRUE)))
2162 case bfd_reloc_outofrange:
2163 msg = _("internal error: out of range error");
2166 case bfd_reloc_notsupported:
2167 msg = _("internal error: unsupported relocation error");
2170 case bfd_reloc_dangerous:
2171 if (r_type == R_MN10300_PCREL32)
2172 msg = _("error: inappropriate relocation type for shared"
2173 " library (did you forget -fpic?)");
2174 else if (r_type == R_MN10300_GOT32)
2175 msg = _("%B: taking the address of protected function"
2176 " '%s' cannot be done when making a shared library");
2178 msg = _("internal error: suspicious relocation type used"
2179 " in shared library");
2183 msg = _("internal error: unknown error");
2187 _bfd_error_handler (msg, input_bfd, name);
2188 bfd_set_error (bfd_error_bad_value);
2197 /* Finish initializing one hash table entry. */
2200 elf32_mn10300_finish_hash_table_entry (struct bfd_hash_entry *gen_entry,
2203 struct elf32_mn10300_link_hash_entry *entry;
2204 struct bfd_link_info *link_info = (struct bfd_link_info *) in_args;
2205 unsigned int byte_count = 0;
2207 entry = (struct elf32_mn10300_link_hash_entry *) gen_entry;
2209 /* If we already know we want to convert "call" to "calls" for calls
2210 to this symbol, then return now. */
2211 if (entry->flags == MN10300_CONVERT_CALL_TO_CALLS)
2214 /* If there are no named calls to this symbol, or there's nothing we
2215 can move from the function itself into the "call" instruction,
2216 then note that all "call" instructions should be converted into
2217 "calls" instructions and return. If a symbol is available for
2218 dynamic symbol resolution (overridable or overriding), avoid
2219 custom calling conventions. */
2220 if (entry->direct_calls == 0
2221 || (entry->stack_size == 0 && entry->movm_args == 0)
2222 || (elf_hash_table (link_info)->dynamic_sections_created
2223 && ELF_ST_VISIBILITY (entry->root.other) != STV_INTERNAL
2224 && ELF_ST_VISIBILITY (entry->root.other) != STV_HIDDEN))
2226 /* Make a note that we should convert "call" instructions to "calls"
2227 instructions for calls to this symbol. */
2228 entry->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2232 /* We may be able to move some instructions from the function itself into
2233 the "call" instruction. Count how many bytes we might be able to
2234 eliminate in the function itself. */
2236 /* A movm instruction is two bytes. */
2237 if (entry->movm_args)
2240 /* Count the insn to allocate stack space too. */
2241 if (entry->stack_size > 0)
2243 if (entry->stack_size <= 128)
2249 /* If using "call" will result in larger code, then turn all
2250 the associated "call" instructions into "calls" instructions. */
2251 if (byte_count < entry->direct_calls)
2252 entry->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2254 /* This routine never fails. */
2258 /* Used to count hash table entries. */
2261 elf32_mn10300_count_hash_table_entries (struct bfd_hash_entry *gen_entry ATTRIBUTE_UNUSED,
2264 int *count = (int *) in_args;
2270 /* Used to enumerate hash table entries into a linear array. */
2273 elf32_mn10300_list_hash_table_entries (struct bfd_hash_entry *gen_entry,
2276 struct bfd_hash_entry ***ptr = (struct bfd_hash_entry ***) in_args;
2283 /* Used to sort the array created by the above. */
2286 sort_by_value (const void *va, const void *vb)
2288 struct elf32_mn10300_link_hash_entry *a
2289 = *(struct elf32_mn10300_link_hash_entry **) va;
2290 struct elf32_mn10300_link_hash_entry *b
2291 = *(struct elf32_mn10300_link_hash_entry **) vb;
2293 return a->value - b->value;
2296 /* Compute the stack size and movm arguments for the function
2297 referred to by HASH at address ADDR in section with
2298 contents CONTENTS, store the information in the hash table. */
2301 compute_function_info (bfd *abfd,
2302 struct elf32_mn10300_link_hash_entry *hash,
2304 unsigned char *contents)
2306 unsigned char byte1, byte2;
2307 /* We only care about a very small subset of the possible prologue
2308 sequences here. Basically we look for:
2310 movm [d2,d3,a2,a3],sp (optional)
2311 add <size>,sp (optional, and only for sizes which fit in an unsigned
2314 If we find anything else, we quit. */
2316 /* Look for movm [regs],sp. */
2317 byte1 = bfd_get_8 (abfd, contents + addr);
2318 byte2 = bfd_get_8 (abfd, contents + addr + 1);
2322 hash->movm_args = byte2;
2324 byte1 = bfd_get_8 (abfd, contents + addr);
2325 byte2 = bfd_get_8 (abfd, contents + addr + 1);
2328 /* Now figure out how much stack space will be allocated by the movm
2329 instruction. We need this kept separate from the function's normal
2331 if (hash->movm_args)
2334 if (hash->movm_args & 0x80)
2335 hash->movm_stack_size += 4;
2338 if (hash->movm_args & 0x40)
2339 hash->movm_stack_size += 4;
2342 if (hash->movm_args & 0x20)
2343 hash->movm_stack_size += 4;
2346 if (hash->movm_args & 0x10)
2347 hash->movm_stack_size += 4;
2349 /* "other" space. d0, d1, a0, a1, mdr, lir, lar, 4 byte pad. */
2350 if (hash->movm_args & 0x08)
2351 hash->movm_stack_size += 8 * 4;
2353 if (bfd_get_mach (abfd) == bfd_mach_am33
2354 || bfd_get_mach (abfd) == bfd_mach_am33_2)
2356 /* "exother" space. e0, e1, mdrq, mcrh, mcrl, mcvf */
2357 if (hash->movm_args & 0x1)
2358 hash->movm_stack_size += 6 * 4;
2360 /* exreg1 space. e4, e5, e6, e7 */
2361 if (hash->movm_args & 0x2)
2362 hash->movm_stack_size += 4 * 4;
2364 /* exreg0 space. e2, e3 */
2365 if (hash->movm_args & 0x4)
2366 hash->movm_stack_size += 2 * 4;
2370 /* Now look for the two stack adjustment variants. */
2371 if (byte1 == 0xf8 && byte2 == 0xfe)
2373 int temp = bfd_get_8 (abfd, contents + addr + 2);
2374 temp = ((temp & 0xff) ^ (~0x7f)) + 0x80;
2376 hash->stack_size = -temp;
2378 else if (byte1 == 0xfa && byte2 == 0xfe)
2380 int temp = bfd_get_16 (abfd, contents + addr + 2);
2381 temp = ((temp & 0xffff) ^ (~0x7fff)) + 0x8000;
2385 hash->stack_size = temp;
2388 /* If the total stack to be allocated by the call instruction is more
2389 than 255 bytes, then we can't remove the stack adjustment by using
2390 "call" (we might still be able to remove the "movm" instruction. */
2391 if (hash->stack_size + hash->movm_stack_size > 255)
2392 hash->stack_size = 0;
2395 /* Delete some bytes from a section while relaxing. */
2398 mn10300_elf_relax_delete_bytes (bfd *abfd,
2403 Elf_Internal_Shdr *symtab_hdr;
2404 unsigned int sec_shndx;
2406 Elf_Internal_Rela *irel, *irelend;
2407 Elf_Internal_Rela *irelalign;
2409 Elf_Internal_Sym *isym, *isymend;
2410 struct elf_link_hash_entry **sym_hashes;
2411 struct elf_link_hash_entry **end_hashes;
2412 unsigned int symcount;
2414 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
2416 contents = elf_section_data (sec)->this_hdr.contents;
2421 irel = elf_section_data (sec)->relocs;
2422 irelend = irel + sec->reloc_count;
2424 if (sec->reloc_count > 0)
2426 /* If there is an align reloc at the end of the section ignore it.
2427 GAS creates these relocs for reasons of its own, and they just
2428 serve to keep the section artifically inflated. */
2429 if (ELF32_R_TYPE ((irelend - 1)->r_info) == (int) R_MN10300_ALIGN)
2432 /* The deletion must stop at the next ALIGN reloc for an aligment
2433 power larger than, or not a multiple of, the number of bytes we
2435 for (; irel < irelend; irel++)
2437 int alignment = 1 << irel->r_addend;
2439 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN
2440 && irel->r_offset > addr
2441 && irel->r_offset < toaddr
2442 && (count < alignment
2443 || alignment % count != 0))
2446 toaddr = irel->r_offset;
2452 /* Actually delete the bytes. */
2453 memmove (contents + addr, contents + addr + count,
2454 (size_t) (toaddr - addr - count));
2456 /* Adjust the section's size if we are shrinking it, or else
2457 pad the bytes between the end of the shrunken region and
2458 the start of the next region with NOP codes. */
2459 if (irelalign == NULL)
2462 /* Include symbols at the end of the section, but
2463 not at the end of a sub-region of the section. */
2470 #define NOP_OPCODE 0xcb
2472 for (i = 0; i < count; i ++)
2473 bfd_put_8 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
2476 /* Adjust all the relocs. */
2477 for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
2479 /* Get the new reloc address. */
2480 if ((irel->r_offset > addr
2481 && irel->r_offset < toaddr)
2482 || (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN
2483 && irel->r_offset == toaddr))
2484 irel->r_offset -= count;
2487 /* Adjust the local symbols in the section, reducing their value
2488 by the number of bytes deleted. Note - symbols within the deleted
2489 region are moved to the address of the start of the region, which
2490 actually means that they will address the byte beyond the end of
2491 the region once the deletion has been completed. */
2492 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2493 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
2494 for (isymend = isym + symtab_hdr->sh_info; isym < isymend; isym++)
2496 if (isym->st_shndx == sec_shndx
2497 && isym->st_value > addr
2498 && isym->st_value < toaddr)
2500 if (isym->st_value < addr + count)
2501 isym->st_value = addr;
2503 isym->st_value -= count;
2505 /* Adjust the function symbol's size as well. */
2506 else if (isym->st_shndx == sec_shndx
2507 && ELF_ST_TYPE (isym->st_info) == STT_FUNC
2508 && isym->st_value + isym->st_size > addr
2509 && isym->st_value + isym->st_size < toaddr)
2510 isym->st_size -= count;
2513 /* Now adjust the global symbols defined in this section. */
2514 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2515 - symtab_hdr->sh_info);
2516 sym_hashes = elf_sym_hashes (abfd);
2517 end_hashes = sym_hashes + symcount;
2518 for (; sym_hashes < end_hashes; sym_hashes++)
2520 struct elf_link_hash_entry *sym_hash = *sym_hashes;
2522 if ((sym_hash->root.type == bfd_link_hash_defined
2523 || sym_hash->root.type == bfd_link_hash_defweak)
2524 && sym_hash->root.u.def.section == sec
2525 && sym_hash->root.u.def.value > addr
2526 && sym_hash->root.u.def.value < toaddr)
2528 if (sym_hash->root.u.def.value < addr + count)
2529 sym_hash->root.u.def.value = addr;
2531 sym_hash->root.u.def.value -= count;
2533 /* Adjust the function symbol's size as well. */
2534 else if (sym_hash->root.type == bfd_link_hash_defined
2535 && sym_hash->root.u.def.section == sec
2536 && sym_hash->type == STT_FUNC
2537 && sym_hash->root.u.def.value + sym_hash->size > addr
2538 && sym_hash->root.u.def.value + sym_hash->size < toaddr)
2539 sym_hash->size -= count;
2542 /* See if we can move the ALIGN reloc forward.
2543 We have adjusted r_offset for it already. */
2544 if (irelalign != NULL)
2546 bfd_vma alignto, alignaddr;
2548 if ((int) irelalign->r_addend > 0)
2550 /* This is the old address. */
2551 alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
2552 /* This is where the align points to now. */
2553 alignaddr = BFD_ALIGN (irelalign->r_offset,
2554 1 << irelalign->r_addend);
2555 if (alignaddr < alignto)
2556 /* Tail recursion. */
2557 return mn10300_elf_relax_delete_bytes (abfd, sec, alignaddr,
2558 (int) (alignto - alignaddr));
2565 /* Return TRUE if a symbol exists at the given address, else return
2569 mn10300_elf_symbol_address_p (bfd *abfd,
2571 Elf_Internal_Sym *isym,
2574 Elf_Internal_Shdr *symtab_hdr;
2575 unsigned int sec_shndx;
2576 Elf_Internal_Sym *isymend;
2577 struct elf_link_hash_entry **sym_hashes;
2578 struct elf_link_hash_entry **end_hashes;
2579 unsigned int symcount;
2581 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
2583 /* Examine all the symbols. */
2584 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2585 for (isymend = isym + symtab_hdr->sh_info; isym < isymend; isym++)
2586 if (isym->st_shndx == sec_shndx
2587 && isym->st_value == addr)
2590 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2591 - symtab_hdr->sh_info);
2592 sym_hashes = elf_sym_hashes (abfd);
2593 end_hashes = sym_hashes + symcount;
2594 for (; sym_hashes < end_hashes; sym_hashes++)
2596 struct elf_link_hash_entry *sym_hash = *sym_hashes;
2598 if ((sym_hash->root.type == bfd_link_hash_defined
2599 || sym_hash->root.type == bfd_link_hash_defweak)
2600 && sym_hash->root.u.def.section == sec
2601 && sym_hash->root.u.def.value == addr)
2608 /* This function handles relaxing for the mn10300.
2610 There are quite a few relaxing opportunities available on the mn10300:
2612 * calls:32 -> calls:16 2 bytes
2613 * call:32 -> call:16 2 bytes
2615 * call:32 -> calls:32 1 byte
2616 * call:16 -> calls:16 1 byte
2617 * These are done anytime using "calls" would result
2618 in smaller code, or when necessary to preserve the
2619 meaning of the program.
2623 * In some circumstances we can move instructions
2624 from a function prologue into a "call" instruction.
2625 This is only done if the resulting code is no larger
2626 than the original code.
2628 * jmp:32 -> jmp:16 2 bytes
2629 * jmp:16 -> bra:8 1 byte
2631 * If the previous instruction is a conditional branch
2632 around the jump/bra, we may be able to reverse its condition
2633 and change its target to the jump's target. The jump/bra
2634 can then be deleted. 2 bytes
2636 * mov abs32 -> mov abs16 1 or 2 bytes
2638 * Most instructions which accept imm32 can relax to imm16 1 or 2 bytes
2639 - Most instructions which accept imm16 can relax to imm8 1 or 2 bytes
2641 * Most instructions which accept d32 can relax to d16 1 or 2 bytes
2642 - Most instructions which accept d16 can relax to d8 1 or 2 bytes
2644 We don't handle imm16->imm8 or d16->d8 as they're very rare
2645 and somewhat more difficult to support. */
2648 mn10300_elf_relax_section (bfd *abfd,
2650 struct bfd_link_info *link_info,
2653 Elf_Internal_Shdr *symtab_hdr;
2654 Elf_Internal_Rela *internal_relocs = NULL;
2655 Elf_Internal_Rela *irel, *irelend;
2656 bfd_byte *contents = NULL;
2657 Elf_Internal_Sym *isymbuf = NULL;
2658 struct elf32_mn10300_link_hash_table *hash_table;
2659 asection *section = sec;
2660 bfd_vma align_gap_adjustment;
2662 if (link_info->relocatable)
2663 (*link_info->callbacks->einfo)
2664 (_("%P%F: --relax and -r may not be used together\n"));
2666 /* Assume nothing changes. */
2669 /* We need a pointer to the mn10300 specific hash table. */
2670 hash_table = elf32_mn10300_hash_table (link_info);
2671 if (hash_table == NULL)
2674 /* Initialize fields in each hash table entry the first time through. */
2675 if ((hash_table->flags & MN10300_HASH_ENTRIES_INITIALIZED) == 0)
2679 /* Iterate over all the input bfds. */
2680 for (input_bfd = link_info->input_bfds;
2682 input_bfd = input_bfd->link.next)
2684 /* We're going to need all the symbols for each bfd. */
2685 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2686 if (symtab_hdr->sh_info != 0)
2688 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
2689 if (isymbuf == NULL)
2690 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2691 symtab_hdr->sh_info, 0,
2693 if (isymbuf == NULL)
2697 /* Iterate over each section in this bfd. */
2698 for (section = input_bfd->sections;
2700 section = section->next)
2702 struct elf32_mn10300_link_hash_entry *hash;
2703 asection *sym_sec = NULL;
2704 const char *sym_name;
2707 /* If there's nothing to do in this section, skip it. */
2708 if (! ((section->flags & SEC_RELOC) != 0
2709 && section->reloc_count != 0))
2711 if ((section->flags & SEC_ALLOC) == 0)
2714 /* Get cached copy of section contents if it exists. */
2715 if (elf_section_data (section)->this_hdr.contents != NULL)
2716 contents = elf_section_data (section)->this_hdr.contents;
2717 else if (section->size != 0)
2719 /* Go get them off disk. */
2720 if (!bfd_malloc_and_get_section (input_bfd, section,
2727 /* If there aren't any relocs, then there's nothing to do. */
2728 if ((section->flags & SEC_RELOC) != 0
2729 && section->reloc_count != 0)
2731 /* Get a copy of the native relocations. */
2732 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, section,
2734 link_info->keep_memory);
2735 if (internal_relocs == NULL)
2738 /* Now examine each relocation. */
2739 irel = internal_relocs;
2740 irelend = irel + section->reloc_count;
2741 for (; irel < irelend; irel++)
2744 unsigned long r_index;
2747 r_type = ELF32_R_TYPE (irel->r_info);
2748 r_index = ELF32_R_SYM (irel->r_info);
2750 if (r_type < 0 || r_type >= (int) R_MN10300_MAX)
2753 /* We need the name and hash table entry of the target
2758 if (r_index < symtab_hdr->sh_info)
2760 /* A local symbol. */
2761 Elf_Internal_Sym *isym;
2762 struct elf_link_hash_table *elftab;
2765 isym = isymbuf + r_index;
2766 if (isym->st_shndx == SHN_UNDEF)
2767 sym_sec = bfd_und_section_ptr;
2768 else if (isym->st_shndx == SHN_ABS)
2769 sym_sec = bfd_abs_section_ptr;
2770 else if (isym->st_shndx == SHN_COMMON)
2771 sym_sec = bfd_com_section_ptr;
2774 = bfd_section_from_elf_index (input_bfd,
2778 = bfd_elf_string_from_elf_section (input_bfd,
2783 /* If it isn't a function, then we don't care
2785 if (ELF_ST_TYPE (isym->st_info) != STT_FUNC)
2788 /* Tack on an ID so we can uniquely identify this
2789 local symbol in the global hash table. */
2790 amt = strlen (sym_name) + 10;
2791 new_name = bfd_malloc (amt);
2792 if (new_name == NULL)
2795 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
2796 sym_name = new_name;
2798 elftab = &hash_table->static_hash_table->root;
2799 hash = ((struct elf32_mn10300_link_hash_entry *)
2800 elf_link_hash_lookup (elftab, sym_name,
2801 TRUE, TRUE, FALSE));
2806 r_index -= symtab_hdr->sh_info;
2807 hash = (struct elf32_mn10300_link_hash_entry *)
2808 elf_sym_hashes (input_bfd)[r_index];
2811 sym_name = hash->root.root.root.string;
2812 if ((section->flags & SEC_CODE) != 0)
2814 /* If this is not a "call" instruction, then we
2815 should convert "call" instructions to "calls"
2817 code = bfd_get_8 (input_bfd,
2818 contents + irel->r_offset - 1);
2819 if (code != 0xdd && code != 0xcd)
2820 hash->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2823 /* If this is a jump/call, then bump the
2824 direct_calls counter. Else force "call" to
2825 "calls" conversions. */
2826 if (r_type == R_MN10300_PCREL32
2827 || r_type == R_MN10300_PLT32
2828 || r_type == R_MN10300_PLT16
2829 || r_type == R_MN10300_PCREL16)
2830 hash->direct_calls++;
2832 hash->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2836 /* Now look at the actual contents to get the stack size,
2837 and a list of what registers were saved in the prologue
2839 if ((section->flags & SEC_CODE) != 0)
2841 Elf_Internal_Sym *isym, *isymend;
2842 unsigned int sec_shndx;
2843 struct elf_link_hash_entry **hashes;
2844 struct elf_link_hash_entry **end_hashes;
2845 unsigned int symcount;
2847 sec_shndx = _bfd_elf_section_from_bfd_section (input_bfd,
2850 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2851 - symtab_hdr->sh_info);
2852 hashes = elf_sym_hashes (input_bfd);
2853 end_hashes = hashes + symcount;
2855 /* Look at each function defined in this section and
2856 update info for that function. */
2857 isymend = isymbuf + symtab_hdr->sh_info;
2858 for (isym = isymbuf; isym < isymend; isym++)
2860 if (isym->st_shndx == sec_shndx
2861 && ELF_ST_TYPE (isym->st_info) == STT_FUNC)
2863 struct elf_link_hash_table *elftab;
2865 struct elf_link_hash_entry **lhashes = hashes;
2867 /* Skip a local symbol if it aliases a
2869 for (; lhashes < end_hashes; lhashes++)
2871 hash = (struct elf32_mn10300_link_hash_entry *) *lhashes;
2872 if ((hash->root.root.type == bfd_link_hash_defined
2873 || hash->root.root.type == bfd_link_hash_defweak)
2874 && hash->root.root.u.def.section == section
2875 && hash->root.type == STT_FUNC
2876 && hash->root.root.u.def.value == isym->st_value)
2879 if (lhashes != end_hashes)
2882 if (isym->st_shndx == SHN_UNDEF)
2883 sym_sec = bfd_und_section_ptr;
2884 else if (isym->st_shndx == SHN_ABS)
2885 sym_sec = bfd_abs_section_ptr;
2886 else if (isym->st_shndx == SHN_COMMON)
2887 sym_sec = bfd_com_section_ptr;
2890 = bfd_section_from_elf_index (input_bfd,
2893 sym_name = (bfd_elf_string_from_elf_section
2894 (input_bfd, symtab_hdr->sh_link,
2897 /* Tack on an ID so we can uniquely identify this
2898 local symbol in the global hash table. */
2899 amt = strlen (sym_name) + 10;
2900 new_name = bfd_malloc (amt);
2901 if (new_name == NULL)
2904 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
2905 sym_name = new_name;
2907 elftab = &hash_table->static_hash_table->root;
2908 hash = ((struct elf32_mn10300_link_hash_entry *)
2909 elf_link_hash_lookup (elftab, sym_name,
2910 TRUE, TRUE, FALSE));
2912 compute_function_info (input_bfd, hash,
2913 isym->st_value, contents);
2914 hash->value = isym->st_value;
2918 for (; hashes < end_hashes; hashes++)
2920 hash = (struct elf32_mn10300_link_hash_entry *) *hashes;
2921 if ((hash->root.root.type == bfd_link_hash_defined
2922 || hash->root.root.type == bfd_link_hash_defweak)
2923 && hash->root.root.u.def.section == section
2924 && hash->root.type == STT_FUNC)
2925 compute_function_info (input_bfd, hash,
2926 (hash)->root.root.u.def.value,
2931 /* Cache or free any memory we allocated for the relocs. */
2932 if (internal_relocs != NULL
2933 && elf_section_data (section)->relocs != internal_relocs)
2934 free (internal_relocs);
2935 internal_relocs = NULL;
2937 /* Cache or free any memory we allocated for the contents. */
2938 if (contents != NULL
2939 && elf_section_data (section)->this_hdr.contents != contents)
2941 if (! link_info->keep_memory)
2945 /* Cache the section contents for elf_link_input_bfd. */
2946 elf_section_data (section)->this_hdr.contents = contents;
2952 /* Cache or free any memory we allocated for the symbols. */
2954 && symtab_hdr->contents != (unsigned char *) isymbuf)
2956 if (! link_info->keep_memory)
2960 /* Cache the symbols for elf_link_input_bfd. */
2961 symtab_hdr->contents = (unsigned char *) isymbuf;
2967 /* Now iterate on each symbol in the hash table and perform
2968 the final initialization steps on each. */
2969 elf32_mn10300_link_hash_traverse (hash_table,
2970 elf32_mn10300_finish_hash_table_entry,
2972 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2973 elf32_mn10300_finish_hash_table_entry,
2977 /* This section of code collects all our local symbols, sorts
2978 them by value, and looks for multiple symbols referring to
2979 the same address. For those symbols, the flags are merged.
2980 At this point, the only flag that can be set is
2981 MN10300_CONVERT_CALL_TO_CALLS, so we simply OR the flags
2983 int static_count = 0, i;
2984 struct elf32_mn10300_link_hash_entry **entries;
2985 struct elf32_mn10300_link_hash_entry **ptr;
2987 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2988 elf32_mn10300_count_hash_table_entries,
2991 entries = bfd_malloc (static_count * sizeof (* ptr));
2994 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2995 elf32_mn10300_list_hash_table_entries,
2998 qsort (entries, static_count, sizeof (entries[0]), sort_by_value);
3000 for (i = 0; i < static_count - 1; i++)
3001 if (entries[i]->value && entries[i]->value == entries[i+1]->value)
3003 int v = entries[i]->flags;
3006 for (j = i + 1; j < static_count && entries[j]->value == entries[i]->value; j++)
3007 v |= entries[j]->flags;
3009 for (j = i; j < static_count && entries[j]->value == entries[i]->value; j++)
3010 entries[j]->flags = v;
3016 /* All entries in the hash table are fully initialized. */
3017 hash_table->flags |= MN10300_HASH_ENTRIES_INITIALIZED;
3019 /* Now that everything has been initialized, go through each
3020 code section and delete any prologue insns which will be
3021 redundant because their operations will be performed by
3022 a "call" instruction. */
3023 for (input_bfd = link_info->input_bfds;
3025 input_bfd = input_bfd->link.next)
3027 /* We're going to need all the local symbols for each bfd. */
3028 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3029 if (symtab_hdr->sh_info != 0)
3031 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3032 if (isymbuf == NULL)
3033 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
3034 symtab_hdr->sh_info, 0,
3036 if (isymbuf == NULL)
3040 /* Walk over each section in this bfd. */
3041 for (section = input_bfd->sections;
3043 section = section->next)
3045 unsigned int sec_shndx;
3046 Elf_Internal_Sym *isym, *isymend;
3047 struct elf_link_hash_entry **hashes;
3048 struct elf_link_hash_entry **end_hashes;
3049 unsigned int symcount;
3051 /* Skip non-code sections and empty sections. */
3052 if ((section->flags & SEC_CODE) == 0 || section->size == 0)
3055 if (section->reloc_count != 0)
3057 /* Get a copy of the native relocations. */
3058 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, section,
3060 link_info->keep_memory);
3061 if (internal_relocs == NULL)
3065 /* Get cached copy of section contents if it exists. */
3066 if (elf_section_data (section)->this_hdr.contents != NULL)
3067 contents = elf_section_data (section)->this_hdr.contents;
3070 /* Go get them off disk. */
3071 if (!bfd_malloc_and_get_section (input_bfd, section,
3076 sec_shndx = _bfd_elf_section_from_bfd_section (input_bfd,
3079 /* Now look for any function in this section which needs
3080 insns deleted from its prologue. */
3081 isymend = isymbuf + symtab_hdr->sh_info;
3082 for (isym = isymbuf; isym < isymend; isym++)
3084 struct elf32_mn10300_link_hash_entry *sym_hash;
3085 asection *sym_sec = NULL;
3086 const char *sym_name;
3088 struct elf_link_hash_table *elftab;
3091 if (isym->st_shndx != sec_shndx)
3094 if (isym->st_shndx == SHN_UNDEF)
3095 sym_sec = bfd_und_section_ptr;
3096 else if (isym->st_shndx == SHN_ABS)
3097 sym_sec = bfd_abs_section_ptr;
3098 else if (isym->st_shndx == SHN_COMMON)
3099 sym_sec = bfd_com_section_ptr;
3102 = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
3105 = bfd_elf_string_from_elf_section (input_bfd,
3106 symtab_hdr->sh_link,
3109 /* Tack on an ID so we can uniquely identify this
3110 local symbol in the global hash table. */
3111 amt = strlen (sym_name) + 10;
3112 new_name = bfd_malloc (amt);
3113 if (new_name == NULL)
3115 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
3116 sym_name = new_name;
3118 elftab = & hash_table->static_hash_table->root;
3119 sym_hash = (struct elf32_mn10300_link_hash_entry *)
3120 elf_link_hash_lookup (elftab, sym_name,
3121 FALSE, FALSE, FALSE);
3124 if (sym_hash == NULL)
3127 if (! (sym_hash->flags & MN10300_CONVERT_CALL_TO_CALLS)
3128 && ! (sym_hash->flags & MN10300_DELETED_PROLOGUE_BYTES))
3132 /* Note that we've changed things. */
3133 elf_section_data (section)->relocs = internal_relocs;
3134 elf_section_data (section)->this_hdr.contents = contents;
3135 symtab_hdr->contents = (unsigned char *) isymbuf;
3137 /* Count how many bytes we're going to delete. */
3138 if (sym_hash->movm_args)
3141 if (sym_hash->stack_size > 0)
3143 if (sym_hash->stack_size <= 128)
3149 /* Note that we've deleted prologue bytes for this
3151 sym_hash->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3153 /* Actually delete the bytes. */
3154 if (!mn10300_elf_relax_delete_bytes (input_bfd,
3160 /* Something changed. Not strictly necessary, but
3161 may lead to more relaxing opportunities. */
3166 /* Look for any global functions in this section which
3167 need insns deleted from their prologues. */
3168 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
3169 - symtab_hdr->sh_info);
3170 hashes = elf_sym_hashes (input_bfd);
3171 end_hashes = hashes + symcount;
3172 for (; hashes < end_hashes; hashes++)
3174 struct elf32_mn10300_link_hash_entry *sym_hash;
3176 sym_hash = (struct elf32_mn10300_link_hash_entry *) *hashes;
3177 if ((sym_hash->root.root.type == bfd_link_hash_defined
3178 || sym_hash->root.root.type == bfd_link_hash_defweak)
3179 && sym_hash->root.root.u.def.section == section
3180 && ! (sym_hash->flags & MN10300_CONVERT_CALL_TO_CALLS)
3181 && ! (sym_hash->flags & MN10300_DELETED_PROLOGUE_BYTES))
3185 struct elf_link_hash_entry **hh;
3187 /* Note that we've changed things. */
3188 elf_section_data (section)->relocs = internal_relocs;
3189 elf_section_data (section)->this_hdr.contents = contents;
3190 symtab_hdr->contents = (unsigned char *) isymbuf;
3192 /* Count how many bytes we're going to delete. */
3193 if (sym_hash->movm_args)
3196 if (sym_hash->stack_size > 0)
3198 if (sym_hash->stack_size <= 128)
3204 /* Note that we've deleted prologue bytes for this
3206 sym_hash->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3208 /* Actually delete the bytes. */
3209 symval = sym_hash->root.root.u.def.value;
3210 if (!mn10300_elf_relax_delete_bytes (input_bfd,
3216 /* There may be other C++ functions symbols with the same
3217 address. If so then mark these as having had their
3218 prologue bytes deleted as well. */
3219 for (hh = elf_sym_hashes (input_bfd); hh < end_hashes; hh++)
3221 struct elf32_mn10300_link_hash_entry *h;
3223 h = (struct elf32_mn10300_link_hash_entry *) * hh;
3226 && (h->root.root.type == bfd_link_hash_defined
3227 || h->root.root.type == bfd_link_hash_defweak)
3228 && h->root.root.u.def.section == section
3229 && ! (h->flags & MN10300_CONVERT_CALL_TO_CALLS)
3230 && h->root.root.u.def.value == symval
3231 && h->root.type == STT_FUNC)
3232 h->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3235 /* Something changed. Not strictly necessary, but
3236 may lead to more relaxing opportunities. */
3241 /* Cache or free any memory we allocated for the relocs. */
3242 if (internal_relocs != NULL
3243 && elf_section_data (section)->relocs != internal_relocs)
3244 free (internal_relocs);
3245 internal_relocs = NULL;
3247 /* Cache or free any memory we allocated for the contents. */
3248 if (contents != NULL
3249 && elf_section_data (section)->this_hdr.contents != contents)
3251 if (! link_info->keep_memory)
3254 /* Cache the section contents for elf_link_input_bfd. */
3255 elf_section_data (section)->this_hdr.contents = contents;
3260 /* Cache or free any memory we allocated for the symbols. */
3262 && symtab_hdr->contents != (unsigned char *) isymbuf)
3264 if (! link_info->keep_memory)
3267 /* Cache the symbols for elf_link_input_bfd. */
3268 symtab_hdr->contents = (unsigned char *) isymbuf;
3274 /* (Re)initialize for the basic instruction shortening/relaxing pass. */
3276 internal_relocs = NULL;
3278 /* For error_return. */
3281 /* We don't have to do anything for a relocatable link, if
3282 this section does not have relocs, or if this is not a
3284 if (link_info->relocatable
3285 || (sec->flags & SEC_RELOC) == 0
3286 || sec->reloc_count == 0
3287 || (sec->flags & SEC_CODE) == 0)
3290 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3292 /* Get a copy of the native relocations. */
3293 internal_relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
3294 link_info->keep_memory);
3295 if (internal_relocs == NULL)
3298 /* Scan for worst case alignment gap changes. Note that this logic
3299 is not ideal; what we should do is run this scan for every
3300 opcode/address range and adjust accordingly, but that's
3301 expensive. Worst case is that for an alignment of N bytes, we
3302 move by 2*N-N-1 bytes, assuming we have aligns of 1, 2, 4, 8, etc
3303 all before it. Plus, this still doesn't cover cross-section
3304 jumps with section alignment. */
3305 irelend = internal_relocs + sec->reloc_count;
3306 align_gap_adjustment = 0;
3307 for (irel = internal_relocs; irel < irelend; irel++)
3309 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN)
3311 bfd_vma adj = 1 << irel->r_addend;
3312 bfd_vma aend = irel->r_offset;
3314 aend = BFD_ALIGN (aend, 1 << irel->r_addend);
3315 adj = 2 * adj - adj - 1;
3317 /* Record the biggest adjustmnet. Skip any alignment at the
3318 end of our section. */
3319 if (align_gap_adjustment < adj
3320 && aend < sec->output_section->vma + sec->output_offset + sec->size)
3321 align_gap_adjustment = adj;
3325 /* Walk through them looking for relaxing opportunities. */
3326 irelend = internal_relocs + sec->reloc_count;
3327 for (irel = internal_relocs; irel < irelend; irel++)
3330 bfd_signed_vma jump_offset;
3331 asection *sym_sec = NULL;
3332 struct elf32_mn10300_link_hash_entry *h = NULL;
3334 /* If this isn't something that can be relaxed, then ignore
3336 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_NONE
3337 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_8
3338 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_MAX)
3341 /* Get the section contents if we haven't done so already. */
3342 if (contents == NULL)
3344 /* Get cached copy if it exists. */
3345 if (elf_section_data (sec)->this_hdr.contents != NULL)
3346 contents = elf_section_data (sec)->this_hdr.contents;
3349 /* Go get them off disk. */
3350 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
3355 /* Read this BFD's symbols if we haven't done so already. */
3356 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
3358 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3359 if (isymbuf == NULL)
3360 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3361 symtab_hdr->sh_info, 0,
3363 if (isymbuf == NULL)
3367 /* Get the value of the symbol referred to by the reloc. */
3368 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
3370 Elf_Internal_Sym *isym;
3371 const char *sym_name;
3374 /* A local symbol. */
3375 isym = isymbuf + ELF32_R_SYM (irel->r_info);
3376 if (isym->st_shndx == SHN_UNDEF)
3377 sym_sec = bfd_und_section_ptr;
3378 else if (isym->st_shndx == SHN_ABS)
3379 sym_sec = bfd_abs_section_ptr;
3380 else if (isym->st_shndx == SHN_COMMON)
3381 sym_sec = bfd_com_section_ptr;
3383 sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3385 sym_name = bfd_elf_string_from_elf_section (abfd,
3386 symtab_hdr->sh_link,
3389 if ((sym_sec->flags & SEC_MERGE)
3390 && sym_sec->sec_info_type == SEC_INFO_TYPE_MERGE)
3392 symval = isym->st_value;
3394 /* GAS may reduce relocations against symbols in SEC_MERGE
3395 sections to a relocation against the section symbol when
3396 the original addend was zero. When the reloc is against
3397 a section symbol we should include the addend in the
3398 offset passed to _bfd_merged_section_offset, since the
3399 location of interest is the original symbol. On the
3400 other hand, an access to "sym+addend" where "sym" is not
3401 a section symbol should not include the addend; Such an
3402 access is presumed to be an offset from "sym"; The
3403 location of interest is just "sym". */
3404 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
3405 symval += irel->r_addend;
3407 symval = _bfd_merged_section_offset (abfd, & sym_sec,
3408 elf_section_data (sym_sec)->sec_info,
3411 if (ELF_ST_TYPE (isym->st_info) != STT_SECTION)
3412 symval += irel->r_addend;
3414 symval += sym_sec->output_section->vma
3415 + sym_sec->output_offset - irel->r_addend;
3418 symval = (isym->st_value
3419 + sym_sec->output_section->vma
3420 + sym_sec->output_offset);
3422 /* Tack on an ID so we can uniquely identify this
3423 local symbol in the global hash table. */
3424 new_name = bfd_malloc ((bfd_size_type) strlen (sym_name) + 10);
3425 if (new_name == NULL)
3427 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
3428 sym_name = new_name;
3430 h = (struct elf32_mn10300_link_hash_entry *)
3431 elf_link_hash_lookup (&hash_table->static_hash_table->root,
3432 sym_name, FALSE, FALSE, FALSE);
3439 /* An external symbol. */
3440 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
3441 h = (struct elf32_mn10300_link_hash_entry *)
3442 (elf_sym_hashes (abfd)[indx]);
3443 BFD_ASSERT (h != NULL);
3444 if (h->root.root.type != bfd_link_hash_defined
3445 && h->root.root.type != bfd_link_hash_defweak)
3446 /* This appears to be a reference to an undefined
3447 symbol. Just ignore it--it will be caught by the
3448 regular reloc processing. */
3451 /* Check for a reference to a discarded symbol and ignore it. */
3452 if (h->root.root.u.def.section->output_section == NULL)
3455 sym_sec = h->root.root.u.def.section->output_section;
3457 symval = (h->root.root.u.def.value
3458 + h->root.root.u.def.section->output_section->vma
3459 + h->root.root.u.def.section->output_offset);
3462 /* For simplicity of coding, we are going to modify the section
3463 contents, the section relocs, and the BFD symbol table. We
3464 must tell the rest of the code not to free up this
3465 information. It would be possible to instead create a table
3466 of changes which have to be made, as is done in coff-mips.c;
3467 that would be more work, but would require less memory when
3468 the linker is run. */
3470 /* Try to turn a 32bit pc-relative branch/call into a 16bit pc-relative
3471 branch/call, also deal with "call" -> "calls" conversions and
3472 insertion of prologue data into "call" instructions. */
3473 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL32
3474 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PLT32)
3476 bfd_vma value = symval;
3478 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PLT32
3480 && ELF_ST_VISIBILITY (h->root.other) != STV_INTERNAL
3481 && ELF_ST_VISIBILITY (h->root.other) != STV_HIDDEN
3482 && h->root.plt.offset != (bfd_vma) -1)
3486 splt = hash_table->root.splt;
3487 value = ((splt->output_section->vma
3488 + splt->output_offset
3489 + h->root.plt.offset)
3490 - (sec->output_section->vma
3491 + sec->output_offset
3495 /* If we've got a "call" instruction that needs to be turned
3496 into a "calls" instruction, do so now. It saves a byte. */
3497 if (h && (h->flags & MN10300_CONVERT_CALL_TO_CALLS))
3501 /* Get the opcode. */
3502 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3504 /* Make sure we're working with a "call" instruction! */
3507 /* Note that we've changed the relocs, section contents,
3509 elf_section_data (sec)->relocs = internal_relocs;
3510 elf_section_data (sec)->this_hdr.contents = contents;
3511 symtab_hdr->contents = (unsigned char *) isymbuf;
3513 /* Fix the opcode. */
3514 bfd_put_8 (abfd, 0xfc, contents + irel->r_offset - 1);
3515 bfd_put_8 (abfd, 0xff, contents + irel->r_offset);
3517 /* Fix irel->r_offset and irel->r_addend. */
3518 irel->r_offset += 1;
3519 irel->r_addend += 1;
3521 /* Delete one byte of data. */
3522 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3523 irel->r_offset + 3, 1))
3526 /* That will change things, so, we should relax again.
3527 Note that this is not required, and it may be slow. */
3533 /* We've got a "call" instruction which needs some data
3534 from target function filled in. */
3537 /* Get the opcode. */
3538 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3540 /* Insert data from the target function into the "call"
3541 instruction if needed. */
3544 bfd_put_8 (abfd, h->movm_args, contents + irel->r_offset + 4);
3545 bfd_put_8 (abfd, h->stack_size + h->movm_stack_size,
3546 contents + irel->r_offset + 5);
3550 /* Deal with pc-relative gunk. */
3551 value -= (sec->output_section->vma + sec->output_offset);
3552 value -= irel->r_offset;
3553 value += irel->r_addend;
3555 /* See if the value will fit in 16 bits, note the high value is
3556 0x7fff + 2 as the target will be two bytes closer if we are
3557 able to relax, if it's in the same section. */
3558 if (sec->output_section == sym_sec->output_section)
3559 jump_offset = 0x8001;
3561 jump_offset = 0x7fff;
3563 /* Account for jumps across alignment boundaries using
3564 align_gap_adjustment. */
3565 if ((bfd_signed_vma) value < jump_offset - (bfd_signed_vma) align_gap_adjustment
3566 && ((bfd_signed_vma) value > -0x8000 + (bfd_signed_vma) align_gap_adjustment))
3570 /* Get the opcode. */
3571 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3573 if (code != 0xdc && code != 0xdd && code != 0xff)
3576 /* Note that we've changed the relocs, section contents, etc. */
3577 elf_section_data (sec)->relocs = internal_relocs;
3578 elf_section_data (sec)->this_hdr.contents = contents;
3579 symtab_hdr->contents = (unsigned char *) isymbuf;
3581 /* Fix the opcode. */
3583 bfd_put_8 (abfd, 0xcc, contents + irel->r_offset - 1);
3584 else if (code == 0xdd)
3585 bfd_put_8 (abfd, 0xcd, contents + irel->r_offset - 1);
3586 else if (code == 0xff)
3587 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
3589 /* Fix the relocation's type. */
3590 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3591 (ELF32_R_TYPE (irel->r_info)
3592 == (int) R_MN10300_PLT32)
3596 /* Delete two bytes of data. */
3597 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3598 irel->r_offset + 1, 2))
3601 /* That will change things, so, we should relax again.
3602 Note that this is not required, and it may be slow. */
3607 /* Try to turn a 16bit pc-relative branch into a 8bit pc-relative
3609 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL16)
3611 bfd_vma value = symval;
3613 /* If we've got a "call" instruction that needs to be turned
3614 into a "calls" instruction, do so now. It saves a byte. */
3615 if (h && (h->flags & MN10300_CONVERT_CALL_TO_CALLS))
3619 /* Get the opcode. */
3620 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3622 /* Make sure we're working with a "call" instruction! */
3625 /* Note that we've changed the relocs, section contents,
3627 elf_section_data (sec)->relocs = internal_relocs;
3628 elf_section_data (sec)->this_hdr.contents = contents;
3629 symtab_hdr->contents = (unsigned char *) isymbuf;
3631 /* Fix the opcode. */
3632 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 1);
3633 bfd_put_8 (abfd, 0xff, contents + irel->r_offset);
3635 /* Fix irel->r_offset and irel->r_addend. */
3636 irel->r_offset += 1;
3637 irel->r_addend += 1;
3639 /* Delete one byte of data. */
3640 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3641 irel->r_offset + 1, 1))
3644 /* That will change things, so, we should relax again.
3645 Note that this is not required, and it may be slow. */
3653 /* Get the opcode. */
3654 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3656 /* Insert data from the target function into the "call"
3657 instruction if needed. */
3660 bfd_put_8 (abfd, h->movm_args, contents + irel->r_offset + 2);
3661 bfd_put_8 (abfd, h->stack_size + h->movm_stack_size,
3662 contents + irel->r_offset + 3);
3666 /* Deal with pc-relative gunk. */
3667 value -= (sec->output_section->vma + sec->output_offset);
3668 value -= irel->r_offset;
3669 value += irel->r_addend;
3671 /* See if the value will fit in 8 bits, note the high value is
3672 0x7f + 1 as the target will be one bytes closer if we are
3674 if ((long) value < 0x80 && (long) value > -0x80)
3678 /* Get the opcode. */
3679 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3684 /* Note that we've changed the relocs, section contents, etc. */
3685 elf_section_data (sec)->relocs = internal_relocs;
3686 elf_section_data (sec)->this_hdr.contents = contents;
3687 symtab_hdr->contents = (unsigned char *) isymbuf;
3689 /* Fix the opcode. */
3690 bfd_put_8 (abfd, 0xca, contents + irel->r_offset - 1);
3692 /* Fix the relocation's type. */
3693 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3696 /* Delete one byte of data. */
3697 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3698 irel->r_offset + 1, 1))
3701 /* That will change things, so, we should relax again.
3702 Note that this is not required, and it may be slow. */
3707 /* Try to eliminate an unconditional 8 bit pc-relative branch
3708 which immediately follows a conditional 8 bit pc-relative
3709 branch around the unconditional branch.
3716 This happens when the bCC can't reach lab2 at assembly time,
3717 but due to other relaxations it can reach at link time. */
3718 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL8)
3720 Elf_Internal_Rela *nrel;
3721 bfd_vma value = symval;
3724 /* Deal with pc-relative gunk. */
3725 value -= (sec->output_section->vma + sec->output_offset);
3726 value -= irel->r_offset;
3727 value += irel->r_addend;
3729 /* Do nothing if this reloc is the last byte in the section. */
3730 if (irel->r_offset == sec->size)
3733 /* See if the next instruction is an unconditional pc-relative
3734 branch, more often than not this test will fail, so we
3735 test it first to speed things up. */
3736 code = bfd_get_8 (abfd, contents + irel->r_offset + 1);
3740 /* Also make sure the next relocation applies to the next
3741 instruction and that it's a pc-relative 8 bit branch. */
3744 || irel->r_offset + 2 != nrel->r_offset
3745 || ELF32_R_TYPE (nrel->r_info) != (int) R_MN10300_PCREL8)
3748 /* Make sure our destination immediately follows the
3749 unconditional branch. */
3750 if (symval != (sec->output_section->vma + sec->output_offset
3751 + irel->r_offset + 3))
3754 /* Now make sure we are a conditional branch. This may not
3755 be necessary, but why take the chance.
3757 Note these checks assume that R_MN10300_PCREL8 relocs
3758 only occur on bCC and bCCx insns. If they occured
3759 elsewhere, we'd need to know the start of this insn
3760 for this check to be accurate. */
3761 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3762 if (code != 0xc0 && code != 0xc1 && code != 0xc2
3763 && code != 0xc3 && code != 0xc4 && code != 0xc5
3764 && code != 0xc6 && code != 0xc7 && code != 0xc8
3765 && code != 0xc9 && code != 0xe8 && code != 0xe9
3766 && code != 0xea && code != 0xeb)
3769 /* We also have to be sure there is no symbol/label
3770 at the unconditional branch. */
3771 if (mn10300_elf_symbol_address_p (abfd, sec, isymbuf,
3772 irel->r_offset + 1))
3775 /* Note that we've changed the relocs, section contents, etc. */
3776 elf_section_data (sec)->relocs = internal_relocs;
3777 elf_section_data (sec)->this_hdr.contents = contents;
3778 symtab_hdr->contents = (unsigned char *) isymbuf;
3780 /* Reverse the condition of the first branch. */
3826 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
3828 /* Set the reloc type and symbol for the first branch
3829 from the second branch. */
3830 irel->r_info = nrel->r_info;
3832 /* Make the reloc for the second branch a null reloc. */
3833 nrel->r_info = ELF32_R_INFO (ELF32_R_SYM (nrel->r_info),
3836 /* Delete two bytes of data. */
3837 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3838 irel->r_offset + 1, 2))
3841 /* That will change things, so, we should relax again.
3842 Note that this is not required, and it may be slow. */
3846 /* Try to turn a 24 immediate, displacement or absolute address
3847 into a 8 immediate, displacement or absolute address. */
3848 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_24)
3850 bfd_vma value = symval;
3851 value += irel->r_addend;
3853 /* See if the value will fit in 8 bits. */
3854 if ((long) value < 0x7f && (long) value > -0x80)
3858 /* AM33 insns which have 24 operands are 6 bytes long and
3859 will have 0xfd as the first byte. */
3861 /* Get the first opcode. */
3862 code = bfd_get_8 (abfd, contents + irel->r_offset - 3);
3866 /* Get the second opcode. */
3867 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
3869 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3870 equivalent instructions exists. */
3871 if (code != 0x6b && code != 0x7b
3872 && code != 0x8b && code != 0x9b
3873 && ((code & 0x0f) == 0x09 || (code & 0x0f) == 0x08
3874 || (code & 0x0f) == 0x0a || (code & 0x0f) == 0x0b
3875 || (code & 0x0f) == 0x0e))
3877 /* Not safe if the high bit is on as relaxing may
3878 move the value out of high mem and thus not fit
3879 in a signed 8bit value. This is currently over
3881 if ((value & 0x80) == 0)
3883 /* Note that we've changed the relocation contents,
3885 elf_section_data (sec)->relocs = internal_relocs;
3886 elf_section_data (sec)->this_hdr.contents = contents;
3887 symtab_hdr->contents = (unsigned char *) isymbuf;
3889 /* Fix the opcode. */
3890 bfd_put_8 (abfd, 0xfb, contents + irel->r_offset - 3);
3891 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
3893 /* Fix the relocation's type. */
3895 ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3898 /* Delete two bytes of data. */
3899 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3900 irel->r_offset + 1, 2))
3903 /* That will change things, so, we should relax
3904 again. Note that this is not required, and it
3914 /* Try to turn a 32bit immediate, displacement or absolute address
3915 into a 16bit immediate, displacement or absolute address. */
3916 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_32
3917 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOT32
3918 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTOFF32)
3920 bfd_vma value = symval;
3922 if (ELF32_R_TYPE (irel->r_info) != (int) R_MN10300_32)
3926 sgot = hash_table->root.sgot;
3927 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOT32)
3929 value = sgot->output_offset;
3932 value += h->root.got.offset;
3934 value += (elf_local_got_offsets
3935 (abfd)[ELF32_R_SYM (irel->r_info)]);
3937 else if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTOFF32)
3938 value -= sgot->output_section->vma;
3939 else if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTPC32)
3940 value = (sgot->output_section->vma
3941 - (sec->output_section->vma
3942 + sec->output_offset
3948 value += irel->r_addend;
3950 /* See if the value will fit in 24 bits.
3951 We allow any 16bit match here. We prune those we can't
3953 if ((long) value < 0x7fffff && (long) value > -0x800000)
3957 /* AM33 insns which have 32bit operands are 7 bytes long and
3958 will have 0xfe as the first byte. */
3960 /* Get the first opcode. */
3961 code = bfd_get_8 (abfd, contents + irel->r_offset - 3);
3965 /* Get the second opcode. */
3966 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
3968 /* All the am33 32 -> 24 relaxing possibilities. */
3969 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3970 equivalent instructions exists. */
3971 if (code != 0x6b && code != 0x7b
3972 && code != 0x8b && code != 0x9b
3973 && (ELF32_R_TYPE (irel->r_info)
3974 != (int) R_MN10300_GOTPC32)
3975 && ((code & 0x0f) == 0x09 || (code & 0x0f) == 0x08
3976 || (code & 0x0f) == 0x0a || (code & 0x0f) == 0x0b
3977 || (code & 0x0f) == 0x0e))
3979 /* Not safe if the high bit is on as relaxing may
3980 move the value out of high mem and thus not fit
3981 in a signed 16bit value. This is currently over
3983 if ((value & 0x8000) == 0)
3985 /* Note that we've changed the relocation contents,
3987 elf_section_data (sec)->relocs = internal_relocs;
3988 elf_section_data (sec)->this_hdr.contents = contents;
3989 symtab_hdr->contents = (unsigned char *) isymbuf;
3991 /* Fix the opcode. */
3992 bfd_put_8 (abfd, 0xfd, contents + irel->r_offset - 3);
3993 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
3995 /* Fix the relocation's type. */
3997 ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3998 (ELF32_R_TYPE (irel->r_info)
3999 == (int) R_MN10300_GOTOFF32)
4000 ? R_MN10300_GOTOFF24
4001 : (ELF32_R_TYPE (irel->r_info)
4002 == (int) R_MN10300_GOT32)
4006 /* Delete one byte of data. */
4007 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4008 irel->r_offset + 3, 1))
4011 /* That will change things, so, we should relax
4012 again. Note that this is not required, and it
4021 /* See if the value will fit in 16 bits.
4022 We allow any 16bit match here. We prune those we can't
4024 if ((long) value < 0x7fff && (long) value > -0x8000)
4028 /* Most insns which have 32bit operands are 6 bytes long;
4029 exceptions are pcrel insns and bit insns.
4031 We handle pcrel insns above. We don't bother trying
4032 to handle the bit insns here.
4034 The first byte of the remaining insns will be 0xfc. */
4036 /* Get the first opcode. */
4037 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
4042 /* Get the second opcode. */
4043 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
4045 if ((code & 0xf0) < 0x80)
4046 switch (code & 0xf0)
4048 /* mov (d32,am),dn -> mov (d32,am),dn
4049 mov dm,(d32,am) -> mov dn,(d32,am)
4050 mov (d32,am),an -> mov (d32,am),an
4051 mov dm,(d32,am) -> mov dn,(d32,am)
4052 movbu (d32,am),dn -> movbu (d32,am),dn
4053 movbu dm,(d32,am) -> movbu dn,(d32,am)
4054 movhu (d32,am),dn -> movhu (d32,am),dn
4055 movhu dm,(d32,am) -> movhu dn,(d32,am) */
4064 /* Not safe if the high bit is on as relaxing may
4065 move the value out of high mem and thus not fit
4066 in a signed 16bit value. */
4068 && (value & 0x8000))
4071 /* Note that we've changed the relocation contents, etc. */
4072 elf_section_data (sec)->relocs = internal_relocs;
4073 elf_section_data (sec)->this_hdr.contents = contents;
4074 symtab_hdr->contents = (unsigned char *) isymbuf;
4076 /* Fix the opcode. */
4077 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4078 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4080 /* Fix the relocation's type. */
4081 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4082 (ELF32_R_TYPE (irel->r_info)
4083 == (int) R_MN10300_GOTOFF32)
4084 ? R_MN10300_GOTOFF16
4085 : (ELF32_R_TYPE (irel->r_info)
4086 == (int) R_MN10300_GOT32)
4088 : (ELF32_R_TYPE (irel->r_info)
4089 == (int) R_MN10300_GOTPC32)
4090 ? R_MN10300_GOTPC16 :
4093 /* Delete two bytes of data. */
4094 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4095 irel->r_offset + 2, 2))
4098 /* That will change things, so, we should relax again.
4099 Note that this is not required, and it may be slow. */
4103 else if ((code & 0xf0) == 0x80
4104 || (code & 0xf0) == 0x90)
4105 switch (code & 0xf3)
4107 /* mov dn,(abs32) -> mov dn,(abs16)
4108 movbu dn,(abs32) -> movbu dn,(abs16)
4109 movhu dn,(abs32) -> movhu dn,(abs16) */
4113 /* Note that we've changed the relocation contents, etc. */
4114 elf_section_data (sec)->relocs = internal_relocs;
4115 elf_section_data (sec)->this_hdr.contents = contents;
4116 symtab_hdr->contents = (unsigned char *) isymbuf;
4118 if ((code & 0xf3) == 0x81)
4119 code = 0x01 + (code & 0x0c);
4120 else if ((code & 0xf3) == 0x82)
4121 code = 0x02 + (code & 0x0c);
4122 else if ((code & 0xf3) == 0x83)
4123 code = 0x03 + (code & 0x0c);
4127 /* Fix the opcode. */
4128 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
4130 /* Fix the relocation's type. */
4131 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4132 (ELF32_R_TYPE (irel->r_info)
4133 == (int) R_MN10300_GOTOFF32)
4134 ? R_MN10300_GOTOFF16
4135 : (ELF32_R_TYPE (irel->r_info)
4136 == (int) R_MN10300_GOT32)
4138 : (ELF32_R_TYPE (irel->r_info)
4139 == (int) R_MN10300_GOTPC32)
4140 ? R_MN10300_GOTPC16 :
4143 /* The opcode got shorter too, so we have to fix the
4144 addend and offset too! */
4145 irel->r_offset -= 1;
4147 /* Delete three bytes of data. */
4148 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4149 irel->r_offset + 1, 3))
4152 /* That will change things, so, we should relax again.
4153 Note that this is not required, and it may be slow. */
4157 /* mov am,(abs32) -> mov am,(abs16)
4158 mov am,(d32,sp) -> mov am,(d16,sp)
4159 mov dm,(d32,sp) -> mov dm,(d32,sp)
4160 movbu dm,(d32,sp) -> movbu dm,(d32,sp)
4161 movhu dm,(d32,sp) -> movhu dm,(d32,sp) */
4167 /* sp-based offsets are zero-extended. */
4168 if (code >= 0x90 && code <= 0x93
4169 && (long) value < 0)
4172 /* Note that we've changed the relocation contents, etc. */
4173 elf_section_data (sec)->relocs = internal_relocs;
4174 elf_section_data (sec)->this_hdr.contents = contents;
4175 symtab_hdr->contents = (unsigned char *) isymbuf;
4177 /* Fix the opcode. */
4178 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4179 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4181 /* Fix the relocation's type. */
4182 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4183 (ELF32_R_TYPE (irel->r_info)
4184 == (int) R_MN10300_GOTOFF32)
4185 ? R_MN10300_GOTOFF16
4186 : (ELF32_R_TYPE (irel->r_info)
4187 == (int) R_MN10300_GOT32)
4189 : (ELF32_R_TYPE (irel->r_info)
4190 == (int) R_MN10300_GOTPC32)
4191 ? R_MN10300_GOTPC16 :
4194 /* Delete two bytes of data. */
4195 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4196 irel->r_offset + 2, 2))
4199 /* That will change things, so, we should relax again.
4200 Note that this is not required, and it may be slow. */
4204 else if ((code & 0xf0) < 0xf0)
4205 switch (code & 0xfc)
4207 /* mov imm32,dn -> mov imm16,dn
4208 mov imm32,an -> mov imm16,an
4209 mov (abs32),dn -> mov (abs16),dn
4210 movbu (abs32),dn -> movbu (abs16),dn
4211 movhu (abs32),dn -> movhu (abs16),dn */
4217 /* Not safe if the high bit is on as relaxing may
4218 move the value out of high mem and thus not fit
4219 in a signed 16bit value. */
4221 && (value & 0x8000))
4224 /* "mov imm16, an" zero-extends the immediate. */
4225 if ((code & 0xfc) == 0xdc
4226 && (long) value < 0)
4229 /* Note that we've changed the relocation contents, etc. */
4230 elf_section_data (sec)->relocs = internal_relocs;
4231 elf_section_data (sec)->this_hdr.contents = contents;
4232 symtab_hdr->contents = (unsigned char *) isymbuf;
4234 if ((code & 0xfc) == 0xcc)
4235 code = 0x2c + (code & 0x03);
4236 else if ((code & 0xfc) == 0xdc)
4237 code = 0x24 + (code & 0x03);
4238 else if ((code & 0xfc) == 0xa4)
4239 code = 0x30 + (code & 0x03);
4240 else if ((code & 0xfc) == 0xa8)
4241 code = 0x34 + (code & 0x03);
4242 else if ((code & 0xfc) == 0xac)
4243 code = 0x38 + (code & 0x03);
4247 /* Fix the opcode. */
4248 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
4250 /* Fix the relocation's type. */
4251 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4252 (ELF32_R_TYPE (irel->r_info)
4253 == (int) R_MN10300_GOTOFF32)
4254 ? R_MN10300_GOTOFF16
4255 : (ELF32_R_TYPE (irel->r_info)
4256 == (int) R_MN10300_GOT32)
4258 : (ELF32_R_TYPE (irel->r_info)
4259 == (int) R_MN10300_GOTPC32)
4260 ? R_MN10300_GOTPC16 :
4263 /* The opcode got shorter too, so we have to fix the
4264 addend and offset too! */
4265 irel->r_offset -= 1;
4267 /* Delete three bytes of data. */
4268 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4269 irel->r_offset + 1, 3))
4272 /* That will change things, so, we should relax again.
4273 Note that this is not required, and it may be slow. */
4277 /* mov (abs32),an -> mov (abs16),an
4278 mov (d32,sp),an -> mov (d16,sp),an
4279 mov (d32,sp),dn -> mov (d16,sp),dn
4280 movbu (d32,sp),dn -> movbu (d16,sp),dn
4281 movhu (d32,sp),dn -> movhu (d16,sp),dn
4282 add imm32,dn -> add imm16,dn
4283 cmp imm32,dn -> cmp imm16,dn
4284 add imm32,an -> add imm16,an
4285 cmp imm32,an -> cmp imm16,an
4286 and imm32,dn -> and imm16,dn
4287 or imm32,dn -> or imm16,dn
4288 xor imm32,dn -> xor imm16,dn
4289 btst imm32,dn -> btst imm16,dn */
4305 /* cmp imm16, an zero-extends the immediate. */
4307 && (long) value < 0)
4310 /* So do sp-based offsets. */
4311 if (code >= 0xb0 && code <= 0xb3
4312 && (long) value < 0)
4315 /* Note that we've changed the relocation contents, etc. */
4316 elf_section_data (sec)->relocs = internal_relocs;
4317 elf_section_data (sec)->this_hdr.contents = contents;
4318 symtab_hdr->contents = (unsigned char *) isymbuf;
4320 /* Fix the opcode. */
4321 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4322 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4324 /* Fix the relocation's type. */
4325 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4326 (ELF32_R_TYPE (irel->r_info)
4327 == (int) R_MN10300_GOTOFF32)
4328 ? R_MN10300_GOTOFF16
4329 : (ELF32_R_TYPE (irel->r_info)
4330 == (int) R_MN10300_GOT32)
4332 : (ELF32_R_TYPE (irel->r_info)
4333 == (int) R_MN10300_GOTPC32)
4334 ? R_MN10300_GOTPC16 :
4337 /* Delete two bytes of data. */
4338 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4339 irel->r_offset + 2, 2))
4342 /* That will change things, so, we should relax again.
4343 Note that this is not required, and it may be slow. */
4347 else if (code == 0xfe)
4349 /* add imm32,sp -> add imm16,sp */
4351 /* Note that we've changed the relocation contents, etc. */
4352 elf_section_data (sec)->relocs = internal_relocs;
4353 elf_section_data (sec)->this_hdr.contents = contents;
4354 symtab_hdr->contents = (unsigned char *) isymbuf;
4356 /* Fix the opcode. */
4357 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4358 bfd_put_8 (abfd, 0xfe, contents + irel->r_offset - 1);
4360 /* Fix the relocation's type. */
4361 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
4362 (ELF32_R_TYPE (irel->r_info)
4363 == (int) R_MN10300_GOT32)
4365 : (ELF32_R_TYPE (irel->r_info)
4366 == (int) R_MN10300_GOTOFF32)
4367 ? R_MN10300_GOTOFF16
4368 : (ELF32_R_TYPE (irel->r_info)
4369 == (int) R_MN10300_GOTPC32)
4370 ? R_MN10300_GOTPC16 :
4373 /* Delete two bytes of data. */
4374 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4375 irel->r_offset + 2, 2))
4378 /* That will change things, so, we should relax again.
4379 Note that this is not required, and it may be slow. */
4388 && symtab_hdr->contents != (unsigned char *) isymbuf)
4390 if (! link_info->keep_memory)
4394 /* Cache the symbols for elf_link_input_bfd. */
4395 symtab_hdr->contents = (unsigned char *) isymbuf;
4399 if (contents != NULL
4400 && elf_section_data (sec)->this_hdr.contents != contents)
4402 if (! link_info->keep_memory)
4406 /* Cache the section contents for elf_link_input_bfd. */
4407 elf_section_data (sec)->this_hdr.contents = contents;
4411 if (internal_relocs != NULL
4412 && elf_section_data (sec)->relocs != internal_relocs)
4413 free (internal_relocs);
4419 && symtab_hdr->contents != (unsigned char *) isymbuf)
4421 if (contents != NULL
4422 && elf_section_data (section)->this_hdr.contents != contents)
4424 if (internal_relocs != NULL
4425 && elf_section_data (section)->relocs != internal_relocs)
4426 free (internal_relocs);
4431 /* This is a version of bfd_generic_get_relocated_section_contents
4432 which uses mn10300_elf_relocate_section. */
4435 mn10300_elf_get_relocated_section_contents (bfd *output_bfd,
4436 struct bfd_link_info *link_info,
4437 struct bfd_link_order *link_order,
4439 bfd_boolean relocatable,
4442 Elf_Internal_Shdr *symtab_hdr;
4443 asection *input_section = link_order->u.indirect.section;
4444 bfd *input_bfd = input_section->owner;
4445 asection **sections = NULL;
4446 Elf_Internal_Rela *internal_relocs = NULL;
4447 Elf_Internal_Sym *isymbuf = NULL;
4449 /* We only need to handle the case of relaxing, or of having a
4450 particular set of section contents, specially. */
4452 || elf_section_data (input_section)->this_hdr.contents == NULL)
4453 return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
4458 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4460 memcpy (data, elf_section_data (input_section)->this_hdr.contents,
4461 (size_t) input_section->size);
4463 if ((input_section->flags & SEC_RELOC) != 0
4464 && input_section->reloc_count > 0)
4467 Elf_Internal_Sym *isym, *isymend;
4470 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, input_section,
4472 if (internal_relocs == NULL)
4475 if (symtab_hdr->sh_info != 0)
4477 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
4478 if (isymbuf == NULL)
4479 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
4480 symtab_hdr->sh_info, 0,
4482 if (isymbuf == NULL)
4486 amt = symtab_hdr->sh_info;
4487 amt *= sizeof (asection *);
4488 sections = bfd_malloc (amt);
4489 if (sections == NULL && amt != 0)
4492 isymend = isymbuf + symtab_hdr->sh_info;
4493 for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
4497 if (isym->st_shndx == SHN_UNDEF)
4498 isec = bfd_und_section_ptr;
4499 else if (isym->st_shndx == SHN_ABS)
4500 isec = bfd_abs_section_ptr;
4501 else if (isym->st_shndx == SHN_COMMON)
4502 isec = bfd_com_section_ptr;
4504 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
4509 if (! mn10300_elf_relocate_section (output_bfd, link_info, input_bfd,
4510 input_section, data, internal_relocs,
4514 if (sections != NULL)
4516 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
4518 if (internal_relocs != elf_section_data (input_section)->relocs)
4519 free (internal_relocs);
4525 if (sections != NULL)
4527 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
4529 if (internal_relocs != NULL
4530 && internal_relocs != elf_section_data (input_section)->relocs)
4531 free (internal_relocs);
4535 /* Assorted hash table functions. */
4537 /* Initialize an entry in the link hash table. */
4539 /* Create an entry in an MN10300 ELF linker hash table. */
4541 static struct bfd_hash_entry *
4542 elf32_mn10300_link_hash_newfunc (struct bfd_hash_entry *entry,
4543 struct bfd_hash_table *table,
4546 struct elf32_mn10300_link_hash_entry *ret =
4547 (struct elf32_mn10300_link_hash_entry *) entry;
4549 /* Allocate the structure if it has not already been allocated by a
4552 ret = (struct elf32_mn10300_link_hash_entry *)
4553 bfd_hash_allocate (table, sizeof (* ret));
4555 return (struct bfd_hash_entry *) ret;
4557 /* Call the allocation method of the superclass. */
4558 ret = (struct elf32_mn10300_link_hash_entry *)
4559 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
4563 ret->direct_calls = 0;
4564 ret->stack_size = 0;
4566 ret->movm_stack_size = 0;
4569 ret->tls_type = GOT_UNKNOWN;
4572 return (struct bfd_hash_entry *) ret;
4576 _bfd_mn10300_copy_indirect_symbol (struct bfd_link_info * info,
4577 struct elf_link_hash_entry * dir,
4578 struct elf_link_hash_entry * ind)
4580 struct elf32_mn10300_link_hash_entry * edir;
4581 struct elf32_mn10300_link_hash_entry * eind;
4583 edir = elf_mn10300_hash_entry (dir);
4584 eind = elf_mn10300_hash_entry (ind);
4586 if (ind->root.type == bfd_link_hash_indirect
4587 && dir->got.refcount <= 0)
4589 edir->tls_type = eind->tls_type;
4590 eind->tls_type = GOT_UNKNOWN;
4592 edir->direct_calls = eind->direct_calls;
4593 edir->stack_size = eind->stack_size;
4594 edir->movm_args = eind->movm_args;
4595 edir->movm_stack_size = eind->movm_stack_size;
4596 edir->flags = eind->flags;
4598 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
4601 /* Destroy an mn10300 ELF linker hash table. */
4604 elf32_mn10300_link_hash_table_free (bfd *obfd)
4606 struct elf32_mn10300_link_hash_table *ret
4607 = (struct elf32_mn10300_link_hash_table *) obfd->link.hash;
4609 obfd->link.hash = &ret->static_hash_table->root.root;
4610 _bfd_elf_link_hash_table_free (obfd);
4611 obfd->is_linker_output = TRUE;
4612 obfd->link.hash = &ret->root.root;
4613 _bfd_elf_link_hash_table_free (obfd);
4616 /* Create an mn10300 ELF linker hash table. */
4618 static struct bfd_link_hash_table *
4619 elf32_mn10300_link_hash_table_create (bfd *abfd)
4621 struct elf32_mn10300_link_hash_table *ret;
4622 bfd_size_type amt = sizeof (* ret);
4624 ret = bfd_zmalloc (amt);
4628 amt = sizeof (struct elf_link_hash_table);
4629 ret->static_hash_table = bfd_zmalloc (amt);
4630 if (ret->static_hash_table == NULL)
4636 if (!_bfd_elf_link_hash_table_init (&ret->static_hash_table->root, abfd,
4637 elf32_mn10300_link_hash_newfunc,
4638 sizeof (struct elf32_mn10300_link_hash_entry),
4641 free (ret->static_hash_table);
4646 abfd->is_linker_output = FALSE;
4647 abfd->link.hash = NULL;
4648 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
4649 elf32_mn10300_link_hash_newfunc,
4650 sizeof (struct elf32_mn10300_link_hash_entry),
4653 abfd->is_linker_output = TRUE;
4654 abfd->link.hash = &ret->static_hash_table->root.root;
4655 _bfd_elf_link_hash_table_free (abfd);
4659 ret->root.root.hash_table_free = elf32_mn10300_link_hash_table_free;
4661 ret->tls_ldm_got.offset = -1;
4663 return & ret->root.root;
4666 static unsigned long
4667 elf_mn10300_mach (flagword flags)
4669 switch (flags & EF_MN10300_MACH)
4671 case E_MN10300_MACH_MN10300:
4673 return bfd_mach_mn10300;
4675 case E_MN10300_MACH_AM33:
4676 return bfd_mach_am33;
4678 case E_MN10300_MACH_AM33_2:
4679 return bfd_mach_am33_2;
4683 /* The final processing done just before writing out a MN10300 ELF object
4684 file. This gets the MN10300 architecture right based on the machine
4688 _bfd_mn10300_elf_final_write_processing (bfd *abfd,
4689 bfd_boolean linker ATTRIBUTE_UNUSED)
4693 switch (bfd_get_mach (abfd))
4696 case bfd_mach_mn10300:
4697 val = E_MN10300_MACH_MN10300;
4701 val = E_MN10300_MACH_AM33;
4704 case bfd_mach_am33_2:
4705 val = E_MN10300_MACH_AM33_2;
4709 elf_elfheader (abfd)->e_flags &= ~ (EF_MN10300_MACH);
4710 elf_elfheader (abfd)->e_flags |= val;
4714 _bfd_mn10300_elf_object_p (bfd *abfd)
4716 bfd_default_set_arch_mach (abfd, bfd_arch_mn10300,
4717 elf_mn10300_mach (elf_elfheader (abfd)->e_flags));
4721 /* Merge backend specific data from an object file to the output
4722 object file when linking. */
4725 _bfd_mn10300_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
4727 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4728 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4731 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
4732 && bfd_get_mach (obfd) < bfd_get_mach (ibfd))
4734 if (! bfd_set_arch_mach (obfd, bfd_get_arch (ibfd),
4735 bfd_get_mach (ibfd)))
4742 #define PLT0_ENTRY_SIZE 15
4743 #define PLT_ENTRY_SIZE 20
4744 #define PIC_PLT_ENTRY_SIZE 24
4746 static const bfd_byte elf_mn10300_plt0_entry[PLT0_ENTRY_SIZE] =
4748 0xfc, 0xa0, 0, 0, 0, 0, /* mov (.got+8),a0 */
4749 0xfe, 0xe, 0x10, 0, 0, 0, 0, /* mov (.got+4),r1 */
4750 0xf0, 0xf4, /* jmp (a0) */
4753 static const bfd_byte elf_mn10300_plt_entry[PLT_ENTRY_SIZE] =
4755 0xfc, 0xa0, 0, 0, 0, 0, /* mov (nameN@GOT + .got),a0 */
4756 0xf0, 0xf4, /* jmp (a0) */
4757 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4758 0xdc, 0, 0, 0, 0, /* jmp .plt0 */
4761 static const bfd_byte elf_mn10300_pic_plt_entry[PIC_PLT_ENTRY_SIZE] =
4763 0xfc, 0x22, 0, 0, 0, 0, /* mov (nameN@GOT,a2),a0 */
4764 0xf0, 0xf4, /* jmp (a0) */
4765 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4766 0xf8, 0x22, 8, /* mov (8,a2),a0 */
4767 0xfb, 0xa, 0x1a, 4, /* mov (4,a2),r1 */
4768 0xf0, 0xf4, /* jmp (a0) */
4771 /* Return size of the first PLT entry. */
4772 #define elf_mn10300_sizeof_plt0(info) \
4773 (info->shared ? PIC_PLT_ENTRY_SIZE : PLT0_ENTRY_SIZE)
4775 /* Return size of a PLT entry. */
4776 #define elf_mn10300_sizeof_plt(info) \
4777 (info->shared ? PIC_PLT_ENTRY_SIZE : PLT_ENTRY_SIZE)
4779 /* Return offset of the PLT0 address in an absolute PLT entry. */
4780 #define elf_mn10300_plt_plt0_offset(info) 16
4782 /* Return offset of the linker in PLT0 entry. */
4783 #define elf_mn10300_plt0_linker_offset(info) 2
4785 /* Return offset of the GOT id in PLT0 entry. */
4786 #define elf_mn10300_plt0_gotid_offset(info) 9
4788 /* Return offset of the temporary in PLT entry. */
4789 #define elf_mn10300_plt_temp_offset(info) 8
4791 /* Return offset of the symbol in PLT entry. */
4792 #define elf_mn10300_plt_symbol_offset(info) 2
4794 /* Return offset of the relocation in PLT entry. */
4795 #define elf_mn10300_plt_reloc_offset(info) 11
4797 /* The name of the dynamic interpreter. This is put in the .interp
4800 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
4802 /* Create dynamic sections when linking against a dynamic object. */
4805 _bfd_mn10300_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
4809 const struct elf_backend_data * bed = get_elf_backend_data (abfd);
4810 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
4813 switch (bed->s->arch_size)
4824 bfd_set_error (bfd_error_bad_value);
4828 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
4829 .rel[a].bss sections. */
4830 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4831 | SEC_LINKER_CREATED);
4833 s = bfd_make_section_anyway_with_flags (abfd,
4834 (bed->default_use_rela_p
4835 ? ".rela.plt" : ".rel.plt"),
4836 flags | SEC_READONLY);
4837 htab->root.srelplt = s;
4839 || ! bfd_set_section_alignment (abfd, s, ptralign))
4842 if (! _bfd_mn10300_elf_create_got_section (abfd, info))
4845 if (bed->want_dynbss)
4847 /* The .dynbss section is a place to put symbols which are defined
4848 by dynamic objects, are referenced by regular objects, and are
4849 not functions. We must allocate space for them in the process
4850 image and use a R_*_COPY reloc to tell the dynamic linker to
4851 initialize them at run time. The linker script puts the .dynbss
4852 section into the .bss section of the final image. */
4853 s = bfd_make_section_anyway_with_flags (abfd, ".dynbss",
4854 SEC_ALLOC | SEC_LINKER_CREATED);
4858 /* The .rel[a].bss section holds copy relocs. This section is not
4859 normally needed. We need to create it here, though, so that the
4860 linker will map it to an output section. We can't just create it
4861 only if we need it, because we will not know whether we need it
4862 until we have seen all the input files, and the first time the
4863 main linker code calls BFD after examining all the input files
4864 (size_dynamic_sections) the input sections have already been
4865 mapped to the output sections. If the section turns out not to
4866 be needed, we can discard it later. We will never need this
4867 section when generating a shared object, since they do not use
4871 s = bfd_make_section_anyway_with_flags (abfd,
4872 (bed->default_use_rela_p
4873 ? ".rela.bss" : ".rel.bss"),
4874 flags | SEC_READONLY);
4876 || ! bfd_set_section_alignment (abfd, s, ptralign))
4884 /* Adjust a symbol defined by a dynamic object and referenced by a
4885 regular object. The current definition is in some section of the
4886 dynamic object, but we're not including those sections. We have to
4887 change the definition to something the rest of the link can
4891 _bfd_mn10300_elf_adjust_dynamic_symbol (struct bfd_link_info * info,
4892 struct elf_link_hash_entry * h)
4894 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
4898 dynobj = htab->root.dynobj;
4900 /* Make sure we know what is going on here. */
4901 BFD_ASSERT (dynobj != NULL
4903 || h->u.weakdef != NULL
4906 && !h->def_regular)));
4908 /* If this is a function, put it in the procedure linkage table. We
4909 will fill in the contents of the procedure linkage table later,
4910 when we know the address of the .got section. */
4911 if (h->type == STT_FUNC
4918 /* This case can occur if we saw a PLT reloc in an input
4919 file, but the symbol was never referred to by a dynamic
4920 object. In such a case, we don't actually need to build
4921 a procedure linkage table, and we can just do a REL32
4923 BFD_ASSERT (h->needs_plt);
4927 /* Make sure this symbol is output as a dynamic symbol. */
4928 if (h->dynindx == -1)
4930 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4934 s = htab->root.splt;
4935 BFD_ASSERT (s != NULL);
4937 /* If this is the first .plt entry, make room for the special
4940 s->size += elf_mn10300_sizeof_plt0 (info);
4942 /* If this symbol is not defined in a regular file, and we are
4943 not generating a shared library, then set the symbol to this
4944 location in the .plt. This is required to make function
4945 pointers compare as equal between the normal executable and
4946 the shared library. */
4950 h->root.u.def.section = s;
4951 h->root.u.def.value = s->size;
4954 h->plt.offset = s->size;
4956 /* Make room for this entry. */
4957 s->size += elf_mn10300_sizeof_plt (info);
4959 /* We also need to make an entry in the .got.plt section, which
4960 will be placed in the .got section by the linker script. */
4961 s = htab->root.sgotplt;
4962 BFD_ASSERT (s != NULL);
4965 /* We also need to make an entry in the .rela.plt section. */
4966 s = bfd_get_linker_section (dynobj, ".rela.plt");
4967 BFD_ASSERT (s != NULL);
4968 s->size += sizeof (Elf32_External_Rela);
4973 /* If this is a weak symbol, and there is a real definition, the
4974 processor independent code will have arranged for us to see the
4975 real definition first, and we can just use the same value. */
4976 if (h->u.weakdef != NULL)
4978 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4979 || h->u.weakdef->root.type == bfd_link_hash_defweak);
4980 h->root.u.def.section = h->u.weakdef->root.u.def.section;
4981 h->root.u.def.value = h->u.weakdef->root.u.def.value;
4985 /* This is a reference to a symbol defined by a dynamic object which
4986 is not a function. */
4988 /* If we are creating a shared library, we must presume that the
4989 only references to the symbol are via the global offset table.
4990 For such cases we need not do anything here; the relocations will
4991 be handled correctly by relocate_section. */
4995 /* If there are no references to this symbol that do not use the
4996 GOT, we don't need to generate a copy reloc. */
4997 if (!h->non_got_ref)
5000 /* We must allocate the symbol in our .dynbss section, which will
5001 become part of the .bss section of the executable. There will be
5002 an entry for this symbol in the .dynsym section. The dynamic
5003 object will contain position independent code, so all references
5004 from the dynamic object to this symbol will go through the global
5005 offset table. The dynamic linker will use the .dynsym entry to
5006 determine the address it must put in the global offset table, so
5007 both the dynamic object and the regular object will refer to the
5008 same memory location for the variable. */
5010 s = bfd_get_linker_section (dynobj, ".dynbss");
5011 BFD_ASSERT (s != NULL);
5013 /* We must generate a R_MN10300_COPY reloc to tell the dynamic linker to
5014 copy the initial value out of the dynamic object and into the
5015 runtime process image. We need to remember the offset into the
5016 .rela.bss section we are going to use. */
5017 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5021 srel = bfd_get_linker_section (dynobj, ".rela.bss");
5022 BFD_ASSERT (srel != NULL);
5023 srel->size += sizeof (Elf32_External_Rela);
5027 return _bfd_elf_adjust_dynamic_copy (h, s);
5030 /* Set the sizes of the dynamic sections. */
5033 _bfd_mn10300_elf_size_dynamic_sections (bfd * output_bfd,
5034 struct bfd_link_info * info)
5036 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
5041 bfd_boolean reltext;
5043 dynobj = htab->root.dynobj;
5044 BFD_ASSERT (dynobj != NULL);
5046 if (elf_hash_table (info)->dynamic_sections_created)
5048 /* Set the contents of the .interp section to the interpreter. */
5049 if (info->executable)
5051 s = bfd_get_linker_section (dynobj, ".interp");
5052 BFD_ASSERT (s != NULL);
5053 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5054 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5059 /* We may have created entries in the .rela.got section.
5060 However, if we are not creating the dynamic sections, we will
5061 not actually use these entries. Reset the size of .rela.got,
5062 which will cause it to get stripped from the output file
5064 s = htab->root.sgot;
5069 if (htab->tls_ldm_got.refcount > 0)
5071 s = bfd_get_linker_section (dynobj, ".rela.got");
5072 BFD_ASSERT (s != NULL);
5073 s->size += sizeof (Elf32_External_Rela);
5076 /* The check_relocs and adjust_dynamic_symbol entry points have
5077 determined the sizes of the various dynamic sections. Allocate
5082 for (s = dynobj->sections; s != NULL; s = s->next)
5086 if ((s->flags & SEC_LINKER_CREATED) == 0)
5089 /* It's OK to base decisions on the section name, because none
5090 of the dynobj section names depend upon the input files. */
5091 name = bfd_get_section_name (dynobj, s);
5093 if (streq (name, ".plt"))
5095 /* Remember whether there is a PLT. */
5098 else if (CONST_STRNEQ (name, ".rela"))
5104 /* Remember whether there are any reloc sections other
5106 if (! streq (name, ".rela.plt"))
5108 const char * outname;
5112 /* If this relocation section applies to a read only
5113 section, then we probably need a DT_TEXTREL
5114 entry. The entries in the .rela.plt section
5115 really apply to the .got section, which we
5116 created ourselves and so know is not readonly. */
5117 outname = bfd_get_section_name (output_bfd,
5119 target = bfd_get_section_by_name (output_bfd, outname + 5);
5121 && (target->flags & SEC_READONLY) != 0
5122 && (target->flags & SEC_ALLOC) != 0)
5126 /* We use the reloc_count field as a counter if we need
5127 to copy relocs into the output file. */
5131 else if (! CONST_STRNEQ (name, ".got")
5132 && ! streq (name, ".dynbss"))
5133 /* It's not one of our sections, so don't allocate space. */
5138 /* If we don't need this section, strip it from the
5139 output file. This is mostly to handle .rela.bss and
5140 .rela.plt. We must create both sections in
5141 create_dynamic_sections, because they must be created
5142 before the linker maps input sections to output
5143 sections. The linker does that before
5144 adjust_dynamic_symbol is called, and it is that
5145 function which decides whether anything needs to go
5146 into these sections. */
5147 s->flags |= SEC_EXCLUDE;
5151 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5154 /* Allocate memory for the section contents. We use bfd_zalloc
5155 here in case unused entries are not reclaimed before the
5156 section's contents are written out. This should not happen,
5157 but this way if it does, we get a R_MN10300_NONE reloc
5158 instead of garbage. */
5159 s->contents = bfd_zalloc (dynobj, s->size);
5160 if (s->contents == NULL)
5164 if (elf_hash_table (info)->dynamic_sections_created)
5166 /* Add some entries to the .dynamic section. We fill in the
5167 values later, in _bfd_mn10300_elf_finish_dynamic_sections,
5168 but we must add the entries now so that we get the correct
5169 size for the .dynamic section. The DT_DEBUG entry is filled
5170 in by the dynamic linker and used by the debugger. */
5173 if (!_bfd_elf_add_dynamic_entry (info, DT_DEBUG, 0))
5179 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0)
5180 || !_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
5181 || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_RELA)
5182 || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
5188 if (!_bfd_elf_add_dynamic_entry (info, DT_RELA, 0)
5189 || !_bfd_elf_add_dynamic_entry (info, DT_RELASZ, 0)
5190 || !_bfd_elf_add_dynamic_entry (info, DT_RELAENT,
5191 sizeof (Elf32_External_Rela)))
5197 if (!_bfd_elf_add_dynamic_entry (info, DT_TEXTREL, 0))
5205 /* Finish up dynamic symbol handling. We set the contents of various
5206 dynamic sections here. */
5209 _bfd_mn10300_elf_finish_dynamic_symbol (bfd * output_bfd,
5210 struct bfd_link_info * info,
5211 struct elf_link_hash_entry * h,
5212 Elf_Internal_Sym * sym)
5214 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
5217 dynobj = htab->root.dynobj;
5219 if (h->plt.offset != (bfd_vma) -1)
5226 Elf_Internal_Rela rel;
5228 /* This symbol has an entry in the procedure linkage table. Set
5231 BFD_ASSERT (h->dynindx != -1);
5233 splt = htab->root.splt;
5234 sgot = htab->root.sgotplt;
5235 srel = bfd_get_linker_section (dynobj, ".rela.plt");
5236 BFD_ASSERT (splt != NULL && sgot != NULL && srel != NULL);
5238 /* Get the index in the procedure linkage table which
5239 corresponds to this symbol. This is the index of this symbol
5240 in all the symbols for which we are making plt entries. The
5241 first entry in the procedure linkage table is reserved. */
5242 plt_index = ((h->plt.offset - elf_mn10300_sizeof_plt0 (info))
5243 / elf_mn10300_sizeof_plt (info));
5245 /* Get the offset into the .got table of the entry that
5246 corresponds to this function. Each .got entry is 4 bytes.
5247 The first three are reserved. */
5248 got_offset = (plt_index + 3) * 4;
5250 /* Fill in the entry in the procedure linkage table. */
5253 memcpy (splt->contents + h->plt.offset, elf_mn10300_plt_entry,
5254 elf_mn10300_sizeof_plt (info));
5255 bfd_put_32 (output_bfd,
5256 (sgot->output_section->vma
5257 + sgot->output_offset
5259 (splt->contents + h->plt.offset
5260 + elf_mn10300_plt_symbol_offset (info)));
5262 bfd_put_32 (output_bfd,
5263 (1 - h->plt.offset - elf_mn10300_plt_plt0_offset (info)),
5264 (splt->contents + h->plt.offset
5265 + elf_mn10300_plt_plt0_offset (info)));
5269 memcpy (splt->contents + h->plt.offset, elf_mn10300_pic_plt_entry,
5270 elf_mn10300_sizeof_plt (info));
5272 bfd_put_32 (output_bfd, got_offset,
5273 (splt->contents + h->plt.offset
5274 + elf_mn10300_plt_symbol_offset (info)));
5277 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
5278 (splt->contents + h->plt.offset
5279 + elf_mn10300_plt_reloc_offset (info)));
5281 /* Fill in the entry in the global offset table. */
5282 bfd_put_32 (output_bfd,
5283 (splt->output_section->vma
5284 + splt->output_offset
5286 + elf_mn10300_plt_temp_offset (info)),
5287 sgot->contents + got_offset);
5289 /* Fill in the entry in the .rela.plt section. */
5290 rel.r_offset = (sgot->output_section->vma
5291 + sgot->output_offset
5293 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_JMP_SLOT);
5295 bfd_elf32_swap_reloca_out (output_bfd, &rel,
5296 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5299 if (!h->def_regular)
5300 /* Mark the symbol as undefined, rather than as defined in
5301 the .plt section. Leave the value alone. */
5302 sym->st_shndx = SHN_UNDEF;
5305 if (h->got.offset != (bfd_vma) -1)
5309 Elf_Internal_Rela rel;
5311 /* This symbol has an entry in the global offset table. Set it up. */
5312 sgot = htab->root.sgot;
5313 srel = bfd_get_linker_section (dynobj, ".rela.got");
5314 BFD_ASSERT (sgot != NULL && srel != NULL);
5316 rel.r_offset = (sgot->output_section->vma
5317 + sgot->output_offset
5318 + (h->got.offset & ~1));
5320 switch (elf_mn10300_hash_entry (h)->tls_type)
5323 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5324 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset + 4);
5325 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_DTPMOD);
5327 bfd_elf32_swap_reloca_out (output_bfd, & rel,
5328 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5329 + srel->reloc_count));
5330 ++ srel->reloc_count;
5331 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_DTPOFF);
5337 /* We originally stored the addend in the GOT, but at this
5338 point, we want to move it to the reloc instead as that's
5339 where the dynamic linker wants it. */
5340 rel.r_addend = bfd_get_32 (output_bfd, sgot->contents + h->got.offset);
5341 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5342 if (h->dynindx == -1)
5343 rel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_TPOFF);
5345 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_TPOFF);
5349 /* If this is a -Bsymbolic link, and the symbol is defined
5350 locally, we just want to emit a RELATIVE reloc. Likewise if
5351 the symbol was forced to be local because of a version file.
5352 The entry in the global offset table will already have been
5353 initialized in the relocate_section function. */
5355 && (info->symbolic || h->dynindx == -1)
5358 rel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
5359 rel.r_addend = (h->root.u.def.value
5360 + h->root.u.def.section->output_section->vma
5361 + h->root.u.def.section->output_offset);
5365 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5366 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_GLOB_DAT);
5371 if (ELF32_R_TYPE (rel.r_info) != R_MN10300_NONE)
5373 bfd_elf32_swap_reloca_out (output_bfd, &rel,
5374 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5375 + srel->reloc_count));
5376 ++ srel->reloc_count;
5383 Elf_Internal_Rela rel;
5385 /* This symbol needs a copy reloc. Set it up. */
5386 BFD_ASSERT (h->dynindx != -1
5387 && (h->root.type == bfd_link_hash_defined
5388 || h->root.type == bfd_link_hash_defweak));
5390 s = bfd_get_linker_section (dynobj, ".rela.bss");
5391 BFD_ASSERT (s != NULL);
5393 rel.r_offset = (h->root.u.def.value
5394 + h->root.u.def.section->output_section->vma
5395 + h->root.u.def.section->output_offset);
5396 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_COPY);
5398 bfd_elf32_swap_reloca_out (output_bfd, & rel,
5399 (bfd_byte *) ((Elf32_External_Rela *) s->contents
5404 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5405 if (h == elf_hash_table (info)->hdynamic
5406 || h == elf_hash_table (info)->hgot)
5407 sym->st_shndx = SHN_ABS;
5412 /* Finish up the dynamic sections. */
5415 _bfd_mn10300_elf_finish_dynamic_sections (bfd * output_bfd,
5416 struct bfd_link_info * info)
5421 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
5423 dynobj = htab->root.dynobj;
5424 sgot = htab->root.sgotplt;
5425 BFD_ASSERT (sgot != NULL);
5426 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5428 if (elf_hash_table (info)->dynamic_sections_created)
5431 Elf32_External_Dyn * dyncon;
5432 Elf32_External_Dyn * dynconend;
5434 BFD_ASSERT (sdyn != NULL);
5436 dyncon = (Elf32_External_Dyn *) sdyn->contents;
5437 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
5439 for (; dyncon < dynconend; dyncon++)
5441 Elf_Internal_Dyn dyn;
5445 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5459 s = bfd_get_section_by_name (output_bfd, name);
5460 BFD_ASSERT (s != NULL);
5461 dyn.d_un.d_ptr = s->vma;
5462 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5466 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
5467 BFD_ASSERT (s != NULL);
5468 dyn.d_un.d_val = s->size;
5469 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5473 /* My reading of the SVR4 ABI indicates that the
5474 procedure linkage table relocs (DT_JMPREL) should be
5475 included in the overall relocs (DT_RELA). This is
5476 what Solaris does. However, UnixWare can not handle
5477 that case. Therefore, we override the DT_RELASZ entry
5478 here to make it not include the JMPREL relocs. Since
5479 the linker script arranges for .rela.plt to follow all
5480 other relocation sections, we don't have to worry
5481 about changing the DT_RELA entry. */
5482 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
5484 dyn.d_un.d_val -= s->size;
5485 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5490 /* Fill in the first entry in the procedure linkage table. */
5491 splt = htab->root.splt;
5492 if (splt && splt->size > 0)
5496 memcpy (splt->contents, elf_mn10300_pic_plt_entry,
5497 elf_mn10300_sizeof_plt (info));
5501 memcpy (splt->contents, elf_mn10300_plt0_entry, PLT0_ENTRY_SIZE);
5502 bfd_put_32 (output_bfd,
5503 sgot->output_section->vma + sgot->output_offset + 4,
5504 splt->contents + elf_mn10300_plt0_gotid_offset (info));
5505 bfd_put_32 (output_bfd,
5506 sgot->output_section->vma + sgot->output_offset + 8,
5507 splt->contents + elf_mn10300_plt0_linker_offset (info));
5510 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5511 really seem like the right value. */
5512 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
5514 /* UnixWare sets the entsize of .plt to 4, but this is incorrect
5515 as it means that the size of the PLT0 section (15 bytes) is not
5516 a multiple of the sh_entsize. Some ELF tools flag this as an
5517 error. We could pad PLT0 to 16 bytes, but that would introduce
5518 compatibilty issues with previous toolchains, so instead we
5519 just set the entry size to 1. */
5520 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 1;
5524 /* Fill in the first three entries in the global offset table. */
5528 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
5530 bfd_put_32 (output_bfd,
5531 sdyn->output_section->vma + sdyn->output_offset,
5533 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
5534 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
5537 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
5542 /* Classify relocation types, such that combreloc can sort them
5545 static enum elf_reloc_type_class
5546 _bfd_mn10300_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5547 const asection *rel_sec ATTRIBUTE_UNUSED,
5548 const Elf_Internal_Rela *rela)
5550 switch ((int) ELF32_R_TYPE (rela->r_info))
5552 case R_MN10300_RELATIVE: return reloc_class_relative;
5553 case R_MN10300_JMP_SLOT: return reloc_class_plt;
5554 case R_MN10300_COPY: return reloc_class_copy;
5555 default: return reloc_class_normal;
5559 /* Allocate space for an MN10300 extension to the bfd elf data structure. */
5562 mn10300_elf_mkobject (bfd *abfd)
5564 return bfd_elf_allocate_object (abfd, sizeof (struct elf_mn10300_obj_tdata),
5568 #define bfd_elf32_mkobject mn10300_elf_mkobject
5571 #define TARGET_LITTLE_SYM mn10300_elf32_vec
5572 #define TARGET_LITTLE_NAME "elf32-mn10300"
5573 #define ELF_ARCH bfd_arch_mn10300
5574 #define ELF_TARGET_ID MN10300_ELF_DATA
5575 #define ELF_MACHINE_CODE EM_MN10300
5576 #define ELF_MACHINE_ALT1 EM_CYGNUS_MN10300
5577 #define ELF_MAXPAGESIZE 0x1000
5580 #define elf_info_to_howto mn10300_info_to_howto
5581 #define elf_info_to_howto_rel 0
5582 #define elf_backend_can_gc_sections 1
5583 #define elf_backend_rela_normal 1
5584 #define elf_backend_check_relocs mn10300_elf_check_relocs
5585 #define elf_backend_gc_mark_hook mn10300_elf_gc_mark_hook
5586 #define elf_backend_relocate_section mn10300_elf_relocate_section
5587 #define bfd_elf32_bfd_relax_section mn10300_elf_relax_section
5588 #define bfd_elf32_bfd_get_relocated_section_contents \
5589 mn10300_elf_get_relocated_section_contents
5590 #define bfd_elf32_bfd_link_hash_table_create \
5591 elf32_mn10300_link_hash_table_create
5593 #ifndef elf_symbol_leading_char
5594 #define elf_symbol_leading_char '_'
5597 /* So we can set bits in e_flags. */
5598 #define elf_backend_final_write_processing \
5599 _bfd_mn10300_elf_final_write_processing
5600 #define elf_backend_object_p _bfd_mn10300_elf_object_p
5602 #define bfd_elf32_bfd_merge_private_bfd_data \
5603 _bfd_mn10300_elf_merge_private_bfd_data
5605 #define elf_backend_can_gc_sections 1
5606 #define elf_backend_create_dynamic_sections \
5607 _bfd_mn10300_elf_create_dynamic_sections
5608 #define elf_backend_adjust_dynamic_symbol \
5609 _bfd_mn10300_elf_adjust_dynamic_symbol
5610 #define elf_backend_size_dynamic_sections \
5611 _bfd_mn10300_elf_size_dynamic_sections
5612 #define elf_backend_omit_section_dynsym \
5613 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
5614 #define elf_backend_finish_dynamic_symbol \
5615 _bfd_mn10300_elf_finish_dynamic_symbol
5616 #define elf_backend_finish_dynamic_sections \
5617 _bfd_mn10300_elf_finish_dynamic_sections
5618 #define elf_backend_copy_indirect_symbol \
5619 _bfd_mn10300_copy_indirect_symbol
5620 #define elf_backend_reloc_type_class \
5621 _bfd_mn10300_elf_reloc_type_class
5623 #define elf_backend_want_got_plt 1
5624 #define elf_backend_plt_readonly 1
5625 #define elf_backend_want_plt_sym 0
5626 #define elf_backend_got_header_size 12
5628 #include "elf32-target.h"