1 /* Xtensa-specific support for 32-bit ELF.
2 Copyright 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2014
3 Free Software Foundation, Inc.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or
8 modify it under the terms of the GNU General Public License as
9 published by the Free Software Foundation; either version 3 of the
10 License, or (at your option) any later version.
12 This program is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
31 #include "elf/xtensa.h"
32 #include "xtensa-isa.h"
33 #include "xtensa-config.h"
35 #define XTENSA_NO_NOP_REMOVAL 0
37 /* Local helper functions. */
39 static bfd_boolean add_extra_plt_sections (struct bfd_link_info *, int);
40 static char *vsprint_msg (const char *, const char *, int, ...) ATTRIBUTE_PRINTF(2,4);
41 static bfd_reloc_status_type bfd_elf_xtensa_reloc
42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
43 static bfd_boolean do_fix_for_relocatable_link
44 (Elf_Internal_Rela *, bfd *, asection *, bfd_byte *);
45 static void do_fix_for_final_link
46 (Elf_Internal_Rela *, bfd *, asection *, bfd_byte *, bfd_vma *);
48 /* Local functions to handle Xtensa configurability. */
50 static bfd_boolean is_indirect_call_opcode (xtensa_opcode);
51 static bfd_boolean is_direct_call_opcode (xtensa_opcode);
52 static bfd_boolean is_windowed_call_opcode (xtensa_opcode);
53 static xtensa_opcode get_const16_opcode (void);
54 static xtensa_opcode get_l32r_opcode (void);
55 static bfd_vma l32r_offset (bfd_vma, bfd_vma);
56 static int get_relocation_opnd (xtensa_opcode, int);
57 static int get_relocation_slot (int);
58 static xtensa_opcode get_relocation_opcode
59 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *);
60 static bfd_boolean is_l32r_relocation
61 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *);
62 static bfd_boolean is_alt_relocation (int);
63 static bfd_boolean is_operand_relocation (int);
64 static bfd_size_type insn_decode_len
65 (bfd_byte *, bfd_size_type, bfd_size_type);
66 static xtensa_opcode insn_decode_opcode
67 (bfd_byte *, bfd_size_type, bfd_size_type, int);
68 static bfd_boolean check_branch_target_aligned
69 (bfd_byte *, bfd_size_type, bfd_vma, bfd_vma);
70 static bfd_boolean check_loop_aligned
71 (bfd_byte *, bfd_size_type, bfd_vma, bfd_vma);
72 static bfd_boolean check_branch_target_aligned_address (bfd_vma, int);
73 static bfd_size_type get_asm_simplify_size
74 (bfd_byte *, bfd_size_type, bfd_size_type);
76 /* Functions for link-time code simplifications. */
78 static bfd_reloc_status_type elf_xtensa_do_asm_simplify
79 (bfd_byte *, bfd_vma, bfd_vma, char **);
80 static bfd_reloc_status_type contract_asm_expansion
81 (bfd_byte *, bfd_vma, Elf_Internal_Rela *, char **);
82 static xtensa_opcode swap_callx_for_call_opcode (xtensa_opcode);
83 static xtensa_opcode get_expanded_call_opcode (bfd_byte *, int, bfd_boolean *);
85 /* Access to internal relocations, section contents and symbols. */
87 static Elf_Internal_Rela *retrieve_internal_relocs
88 (bfd *, asection *, bfd_boolean);
89 static void pin_internal_relocs (asection *, Elf_Internal_Rela *);
90 static void release_internal_relocs (asection *, Elf_Internal_Rela *);
91 static bfd_byte *retrieve_contents (bfd *, asection *, bfd_boolean);
92 static void pin_contents (asection *, bfd_byte *);
93 static void release_contents (asection *, bfd_byte *);
94 static Elf_Internal_Sym *retrieve_local_syms (bfd *);
96 /* Miscellaneous utility functions. */
98 static asection *elf_xtensa_get_plt_section (struct bfd_link_info *, int);
99 static asection *elf_xtensa_get_gotplt_section (struct bfd_link_info *, int);
100 static asection *get_elf_r_symndx_section (bfd *, unsigned long);
101 static struct elf_link_hash_entry *get_elf_r_symndx_hash_entry
102 (bfd *, unsigned long);
103 static bfd_vma get_elf_r_symndx_offset (bfd *, unsigned long);
104 static bfd_boolean is_reloc_sym_weak (bfd *, Elf_Internal_Rela *);
105 static bfd_boolean pcrel_reloc_fits (xtensa_opcode, int, bfd_vma, bfd_vma);
106 static bfd_boolean xtensa_is_property_section (asection *);
107 static bfd_boolean xtensa_is_insntable_section (asection *);
108 static bfd_boolean xtensa_is_littable_section (asection *);
109 static bfd_boolean xtensa_is_proptable_section (asection *);
110 static int internal_reloc_compare (const void *, const void *);
111 static int internal_reloc_matches (const void *, const void *);
112 static asection *xtensa_get_property_section (asection *, const char *);
113 extern asection *xtensa_make_property_section (asection *, const char *);
114 static flagword xtensa_get_property_predef_flags (asection *);
116 /* Other functions called directly by the linker. */
118 typedef void (*deps_callback_t)
119 (asection *, bfd_vma, asection *, bfd_vma, void *);
120 extern bfd_boolean xtensa_callback_required_dependence
121 (bfd *, asection *, struct bfd_link_info *, deps_callback_t, void *);
124 /* Globally visible flag for choosing size optimization of NOP removal
125 instead of branch-target-aware minimization for NOP removal.
126 When nonzero, narrow all instructions and remove all NOPs possible
127 around longcall expansions. */
129 int elf32xtensa_size_opt;
132 /* The "new_section_hook" is used to set up a per-section
133 "xtensa_relax_info" data structure with additional information used
134 during relaxation. */
136 typedef struct xtensa_relax_info_struct xtensa_relax_info;
139 /* The GNU tools do not easily allow extending interfaces to pass around
140 the pointer to the Xtensa ISA information, so instead we add a global
141 variable here (in BFD) that can be used by any of the tools that need
144 xtensa_isa xtensa_default_isa;
147 /* When this is true, relocations may have been modified to refer to
148 symbols from other input files. The per-section list of "fix"
149 records needs to be checked when resolving relocations. */
151 static bfd_boolean relaxing_section = FALSE;
153 /* When this is true, during final links, literals that cannot be
154 coalesced and their relocations may be moved to other sections. */
156 int elf32xtensa_no_literal_movement = 1;
158 /* Rename one of the generic section flags to better document how it
160 /* Whether relocations have been processed. */
161 #define reloc_done sec_flg0
163 static reloc_howto_type elf_howto_table[] =
165 HOWTO (R_XTENSA_NONE, 0, 0, 0, FALSE, 0, complain_overflow_dont,
166 bfd_elf_xtensa_reloc, "R_XTENSA_NONE",
168 HOWTO (R_XTENSA_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
169 bfd_elf_xtensa_reloc, "R_XTENSA_32",
170 TRUE, 0xffffffff, 0xffffffff, FALSE),
172 /* Replace a 32-bit value with a value from the runtime linker (only
173 used by linker-generated stub functions). The r_addend value is
174 special: 1 means to substitute a pointer to the runtime linker's
175 dynamic resolver function; 2 means to substitute the link map for
176 the shared object. */
177 HOWTO (R_XTENSA_RTLD, 0, 2, 32, FALSE, 0, complain_overflow_dont,
178 NULL, "R_XTENSA_RTLD", FALSE, 0, 0, FALSE),
180 HOWTO (R_XTENSA_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
181 bfd_elf_generic_reloc, "R_XTENSA_GLOB_DAT",
182 FALSE, 0, 0xffffffff, FALSE),
183 HOWTO (R_XTENSA_JMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
184 bfd_elf_generic_reloc, "R_XTENSA_JMP_SLOT",
185 FALSE, 0, 0xffffffff, FALSE),
186 HOWTO (R_XTENSA_RELATIVE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
187 bfd_elf_generic_reloc, "R_XTENSA_RELATIVE",
188 FALSE, 0, 0xffffffff, FALSE),
189 HOWTO (R_XTENSA_PLT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
190 bfd_elf_xtensa_reloc, "R_XTENSA_PLT",
191 FALSE, 0, 0xffffffff, FALSE),
195 /* Old relocations for backward compatibility. */
196 HOWTO (R_XTENSA_OP0, 0, 0, 0, TRUE, 0, complain_overflow_dont,
197 bfd_elf_xtensa_reloc, "R_XTENSA_OP0", FALSE, 0, 0, TRUE),
198 HOWTO (R_XTENSA_OP1, 0, 0, 0, TRUE, 0, complain_overflow_dont,
199 bfd_elf_xtensa_reloc, "R_XTENSA_OP1", FALSE, 0, 0, TRUE),
200 HOWTO (R_XTENSA_OP2, 0, 0, 0, TRUE, 0, complain_overflow_dont,
201 bfd_elf_xtensa_reloc, "R_XTENSA_OP2", FALSE, 0, 0, TRUE),
203 /* Assembly auto-expansion. */
204 HOWTO (R_XTENSA_ASM_EXPAND, 0, 0, 0, TRUE, 0, complain_overflow_dont,
205 bfd_elf_xtensa_reloc, "R_XTENSA_ASM_EXPAND", FALSE, 0, 0, TRUE),
206 /* Relax assembly auto-expansion. */
207 HOWTO (R_XTENSA_ASM_SIMPLIFY, 0, 0, 0, TRUE, 0, complain_overflow_dont,
208 bfd_elf_xtensa_reloc, "R_XTENSA_ASM_SIMPLIFY", FALSE, 0, 0, TRUE),
212 HOWTO (R_XTENSA_32_PCREL, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
213 bfd_elf_xtensa_reloc, "R_XTENSA_32_PCREL",
214 FALSE, 0, 0xffffffff, TRUE),
216 /* GNU extension to record C++ vtable hierarchy. */
217 HOWTO (R_XTENSA_GNU_VTINHERIT, 0, 2, 0, FALSE, 0, complain_overflow_dont,
218 NULL, "R_XTENSA_GNU_VTINHERIT",
220 /* GNU extension to record C++ vtable member usage. */
221 HOWTO (R_XTENSA_GNU_VTENTRY, 0, 2, 0, FALSE, 0, complain_overflow_dont,
222 _bfd_elf_rel_vtable_reloc_fn, "R_XTENSA_GNU_VTENTRY",
225 /* Relocations for supporting difference of symbols. */
226 HOWTO (R_XTENSA_DIFF8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
227 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF8", FALSE, 0, 0xff, FALSE),
228 HOWTO (R_XTENSA_DIFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
229 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF16", FALSE, 0, 0xffff, FALSE),
230 HOWTO (R_XTENSA_DIFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
231 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF32", FALSE, 0, 0xffffffff, FALSE),
233 /* General immediate operand relocations. */
234 HOWTO (R_XTENSA_SLOT0_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
235 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT0_OP", FALSE, 0, 0, TRUE),
236 HOWTO (R_XTENSA_SLOT1_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
237 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT1_OP", FALSE, 0, 0, TRUE),
238 HOWTO (R_XTENSA_SLOT2_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
239 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT2_OP", FALSE, 0, 0, TRUE),
240 HOWTO (R_XTENSA_SLOT3_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
241 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT3_OP", FALSE, 0, 0, TRUE),
242 HOWTO (R_XTENSA_SLOT4_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
243 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT4_OP", FALSE, 0, 0, TRUE),
244 HOWTO (R_XTENSA_SLOT5_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
245 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT5_OP", FALSE, 0, 0, TRUE),
246 HOWTO (R_XTENSA_SLOT6_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
247 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT6_OP", FALSE, 0, 0, TRUE),
248 HOWTO (R_XTENSA_SLOT7_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
249 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT7_OP", FALSE, 0, 0, TRUE),
250 HOWTO (R_XTENSA_SLOT8_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
251 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT8_OP", FALSE, 0, 0, TRUE),
252 HOWTO (R_XTENSA_SLOT9_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
253 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT9_OP", FALSE, 0, 0, TRUE),
254 HOWTO (R_XTENSA_SLOT10_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
255 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT10_OP", FALSE, 0, 0, TRUE),
256 HOWTO (R_XTENSA_SLOT11_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
257 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT11_OP", FALSE, 0, 0, TRUE),
258 HOWTO (R_XTENSA_SLOT12_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
259 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT12_OP", FALSE, 0, 0, TRUE),
260 HOWTO (R_XTENSA_SLOT13_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
261 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT13_OP", FALSE, 0, 0, TRUE),
262 HOWTO (R_XTENSA_SLOT14_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
263 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT14_OP", FALSE, 0, 0, TRUE),
265 /* "Alternate" relocations. The meaning of these is opcode-specific. */
266 HOWTO (R_XTENSA_SLOT0_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
267 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT0_ALT", FALSE, 0, 0, TRUE),
268 HOWTO (R_XTENSA_SLOT1_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
269 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT1_ALT", FALSE, 0, 0, TRUE),
270 HOWTO (R_XTENSA_SLOT2_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
271 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT2_ALT", FALSE, 0, 0, TRUE),
272 HOWTO (R_XTENSA_SLOT3_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
273 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT3_ALT", FALSE, 0, 0, TRUE),
274 HOWTO (R_XTENSA_SLOT4_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
275 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT4_ALT", FALSE, 0, 0, TRUE),
276 HOWTO (R_XTENSA_SLOT5_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
277 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT5_ALT", FALSE, 0, 0, TRUE),
278 HOWTO (R_XTENSA_SLOT6_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
279 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT6_ALT", FALSE, 0, 0, TRUE),
280 HOWTO (R_XTENSA_SLOT7_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
281 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT7_ALT", FALSE, 0, 0, TRUE),
282 HOWTO (R_XTENSA_SLOT8_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
283 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT8_ALT", FALSE, 0, 0, TRUE),
284 HOWTO (R_XTENSA_SLOT9_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
285 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT9_ALT", FALSE, 0, 0, TRUE),
286 HOWTO (R_XTENSA_SLOT10_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
287 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT10_ALT", FALSE, 0, 0, TRUE),
288 HOWTO (R_XTENSA_SLOT11_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
289 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT11_ALT", FALSE, 0, 0, TRUE),
290 HOWTO (R_XTENSA_SLOT12_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
291 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT12_ALT", FALSE, 0, 0, TRUE),
292 HOWTO (R_XTENSA_SLOT13_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
293 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT13_ALT", FALSE, 0, 0, TRUE),
294 HOWTO (R_XTENSA_SLOT14_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
295 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT14_ALT", FALSE, 0, 0, TRUE),
297 /* TLS relocations. */
298 HOWTO (R_XTENSA_TLSDESC_FN, 0, 2, 32, FALSE, 0, complain_overflow_dont,
299 bfd_elf_xtensa_reloc, "R_XTENSA_TLSDESC_FN",
300 FALSE, 0, 0xffffffff, FALSE),
301 HOWTO (R_XTENSA_TLSDESC_ARG, 0, 2, 32, FALSE, 0, complain_overflow_dont,
302 bfd_elf_xtensa_reloc, "R_XTENSA_TLSDESC_ARG",
303 FALSE, 0, 0xffffffff, FALSE),
304 HOWTO (R_XTENSA_TLS_DTPOFF, 0, 2, 32, FALSE, 0, complain_overflow_dont,
305 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_DTPOFF",
306 FALSE, 0, 0xffffffff, FALSE),
307 HOWTO (R_XTENSA_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_dont,
308 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_TPOFF",
309 FALSE, 0, 0xffffffff, FALSE),
310 HOWTO (R_XTENSA_TLS_FUNC, 0, 0, 0, FALSE, 0, complain_overflow_dont,
311 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_FUNC",
313 HOWTO (R_XTENSA_TLS_ARG, 0, 0, 0, FALSE, 0, complain_overflow_dont,
314 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_ARG",
316 HOWTO (R_XTENSA_TLS_CALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
317 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_CALL",
323 fprintf (stderr, "Xtensa bfd reloc lookup %d (%s)\n", code, str)
328 static reloc_howto_type *
329 elf_xtensa_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
330 bfd_reloc_code_real_type code)
335 TRACE ("BFD_RELOC_NONE");
336 return &elf_howto_table[(unsigned) R_XTENSA_NONE ];
339 TRACE ("BFD_RELOC_32");
340 return &elf_howto_table[(unsigned) R_XTENSA_32 ];
342 case BFD_RELOC_32_PCREL:
343 TRACE ("BFD_RELOC_32_PCREL");
344 return &elf_howto_table[(unsigned) R_XTENSA_32_PCREL ];
346 case BFD_RELOC_XTENSA_DIFF8:
347 TRACE ("BFD_RELOC_XTENSA_DIFF8");
348 return &elf_howto_table[(unsigned) R_XTENSA_DIFF8 ];
350 case BFD_RELOC_XTENSA_DIFF16:
351 TRACE ("BFD_RELOC_XTENSA_DIFF16");
352 return &elf_howto_table[(unsigned) R_XTENSA_DIFF16 ];
354 case BFD_RELOC_XTENSA_DIFF32:
355 TRACE ("BFD_RELOC_XTENSA_DIFF32");
356 return &elf_howto_table[(unsigned) R_XTENSA_DIFF32 ];
358 case BFD_RELOC_XTENSA_RTLD:
359 TRACE ("BFD_RELOC_XTENSA_RTLD");
360 return &elf_howto_table[(unsigned) R_XTENSA_RTLD ];
362 case BFD_RELOC_XTENSA_GLOB_DAT:
363 TRACE ("BFD_RELOC_XTENSA_GLOB_DAT");
364 return &elf_howto_table[(unsigned) R_XTENSA_GLOB_DAT ];
366 case BFD_RELOC_XTENSA_JMP_SLOT:
367 TRACE ("BFD_RELOC_XTENSA_JMP_SLOT");
368 return &elf_howto_table[(unsigned) R_XTENSA_JMP_SLOT ];
370 case BFD_RELOC_XTENSA_RELATIVE:
371 TRACE ("BFD_RELOC_XTENSA_RELATIVE");
372 return &elf_howto_table[(unsigned) R_XTENSA_RELATIVE ];
374 case BFD_RELOC_XTENSA_PLT:
375 TRACE ("BFD_RELOC_XTENSA_PLT");
376 return &elf_howto_table[(unsigned) R_XTENSA_PLT ];
378 case BFD_RELOC_XTENSA_OP0:
379 TRACE ("BFD_RELOC_XTENSA_OP0");
380 return &elf_howto_table[(unsigned) R_XTENSA_OP0 ];
382 case BFD_RELOC_XTENSA_OP1:
383 TRACE ("BFD_RELOC_XTENSA_OP1");
384 return &elf_howto_table[(unsigned) R_XTENSA_OP1 ];
386 case BFD_RELOC_XTENSA_OP2:
387 TRACE ("BFD_RELOC_XTENSA_OP2");
388 return &elf_howto_table[(unsigned) R_XTENSA_OP2 ];
390 case BFD_RELOC_XTENSA_ASM_EXPAND:
391 TRACE ("BFD_RELOC_XTENSA_ASM_EXPAND");
392 return &elf_howto_table[(unsigned) R_XTENSA_ASM_EXPAND ];
394 case BFD_RELOC_XTENSA_ASM_SIMPLIFY:
395 TRACE ("BFD_RELOC_XTENSA_ASM_SIMPLIFY");
396 return &elf_howto_table[(unsigned) R_XTENSA_ASM_SIMPLIFY ];
398 case BFD_RELOC_VTABLE_INHERIT:
399 TRACE ("BFD_RELOC_VTABLE_INHERIT");
400 return &elf_howto_table[(unsigned) R_XTENSA_GNU_VTINHERIT ];
402 case BFD_RELOC_VTABLE_ENTRY:
403 TRACE ("BFD_RELOC_VTABLE_ENTRY");
404 return &elf_howto_table[(unsigned) R_XTENSA_GNU_VTENTRY ];
406 case BFD_RELOC_XTENSA_TLSDESC_FN:
407 TRACE ("BFD_RELOC_XTENSA_TLSDESC_FN");
408 return &elf_howto_table[(unsigned) R_XTENSA_TLSDESC_FN ];
410 case BFD_RELOC_XTENSA_TLSDESC_ARG:
411 TRACE ("BFD_RELOC_XTENSA_TLSDESC_ARG");
412 return &elf_howto_table[(unsigned) R_XTENSA_TLSDESC_ARG ];
414 case BFD_RELOC_XTENSA_TLS_DTPOFF:
415 TRACE ("BFD_RELOC_XTENSA_TLS_DTPOFF");
416 return &elf_howto_table[(unsigned) R_XTENSA_TLS_DTPOFF ];
418 case BFD_RELOC_XTENSA_TLS_TPOFF:
419 TRACE ("BFD_RELOC_XTENSA_TLS_TPOFF");
420 return &elf_howto_table[(unsigned) R_XTENSA_TLS_TPOFF ];
422 case BFD_RELOC_XTENSA_TLS_FUNC:
423 TRACE ("BFD_RELOC_XTENSA_TLS_FUNC");
424 return &elf_howto_table[(unsigned) R_XTENSA_TLS_FUNC ];
426 case BFD_RELOC_XTENSA_TLS_ARG:
427 TRACE ("BFD_RELOC_XTENSA_TLS_ARG");
428 return &elf_howto_table[(unsigned) R_XTENSA_TLS_ARG ];
430 case BFD_RELOC_XTENSA_TLS_CALL:
431 TRACE ("BFD_RELOC_XTENSA_TLS_CALL");
432 return &elf_howto_table[(unsigned) R_XTENSA_TLS_CALL ];
435 if (code >= BFD_RELOC_XTENSA_SLOT0_OP
436 && code <= BFD_RELOC_XTENSA_SLOT14_OP)
438 unsigned n = (R_XTENSA_SLOT0_OP +
439 (code - BFD_RELOC_XTENSA_SLOT0_OP));
440 return &elf_howto_table[n];
443 if (code >= BFD_RELOC_XTENSA_SLOT0_ALT
444 && code <= BFD_RELOC_XTENSA_SLOT14_ALT)
446 unsigned n = (R_XTENSA_SLOT0_ALT +
447 (code - BFD_RELOC_XTENSA_SLOT0_ALT));
448 return &elf_howto_table[n];
458 static reloc_howto_type *
459 elf_xtensa_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
464 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
465 if (elf_howto_table[i].name != NULL
466 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
467 return &elf_howto_table[i];
473 /* Given an ELF "rela" relocation, find the corresponding howto and record
474 it in the BFD internal arelent representation of the relocation. */
477 elf_xtensa_info_to_howto_rela (bfd *abfd ATTRIBUTE_UNUSED,
479 Elf_Internal_Rela *dst)
481 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
483 BFD_ASSERT (r_type < (unsigned int) R_XTENSA_max);
484 cache_ptr->howto = &elf_howto_table[r_type];
488 /* Functions for the Xtensa ELF linker. */
490 /* The name of the dynamic interpreter. This is put in the .interp
493 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so"
495 /* The size in bytes of an entry in the procedure linkage table.
496 (This does _not_ include the space for the literals associated with
499 #define PLT_ENTRY_SIZE 16
501 /* For _really_ large PLTs, we may need to alternate between literals
502 and code to keep the literals within the 256K range of the L32R
503 instructions in the code. It's unlikely that anyone would ever need
504 such a big PLT, but an arbitrary limit on the PLT size would be bad.
505 Thus, we split the PLT into chunks. Since there's very little
506 overhead (2 extra literals) for each chunk, the chunk size is kept
507 small so that the code for handling multiple chunks get used and
508 tested regularly. With 254 entries, there are 1K of literals for
509 each chunk, and that seems like a nice round number. */
511 #define PLT_ENTRIES_PER_CHUNK 254
513 /* PLT entries are actually used as stub functions for lazy symbol
514 resolution. Once the symbol is resolved, the stub function is never
515 invoked. Note: the 32-byte frame size used here cannot be changed
516 without a corresponding change in the runtime linker. */
518 static const bfd_byte elf_xtensa_be_plt_entry[PLT_ENTRY_SIZE] =
520 0x6c, 0x10, 0x04, /* entry sp, 32 */
521 0x18, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
522 0x1a, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
523 0x1b, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
524 0x0a, 0x80, 0x00, /* jx a8 */
528 static const bfd_byte elf_xtensa_le_plt_entry[PLT_ENTRY_SIZE] =
530 0x36, 0x41, 0x00, /* entry sp, 32 */
531 0x81, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
532 0xa1, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
533 0xb1, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
534 0xa0, 0x08, 0x00, /* jx a8 */
538 /* The size of the thread control block. */
541 struct elf_xtensa_link_hash_entry
543 struct elf_link_hash_entry elf;
545 bfd_signed_vma tlsfunc_refcount;
547 #define GOT_UNKNOWN 0
549 #define GOT_TLS_GD 2 /* global or local dynamic */
550 #define GOT_TLS_IE 4 /* initial or local exec */
551 #define GOT_TLS_ANY (GOT_TLS_GD | GOT_TLS_IE)
552 unsigned char tls_type;
555 #define elf_xtensa_hash_entry(ent) ((struct elf_xtensa_link_hash_entry *)(ent))
557 struct elf_xtensa_obj_tdata
559 struct elf_obj_tdata root;
561 /* tls_type for each local got entry. */
562 char *local_got_tls_type;
564 bfd_signed_vma *local_tlsfunc_refcounts;
567 #define elf_xtensa_tdata(abfd) \
568 ((struct elf_xtensa_obj_tdata *) (abfd)->tdata.any)
570 #define elf_xtensa_local_got_tls_type(abfd) \
571 (elf_xtensa_tdata (abfd)->local_got_tls_type)
573 #define elf_xtensa_local_tlsfunc_refcounts(abfd) \
574 (elf_xtensa_tdata (abfd)->local_tlsfunc_refcounts)
576 #define is_xtensa_elf(bfd) \
577 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
578 && elf_tdata (bfd) != NULL \
579 && elf_object_id (bfd) == XTENSA_ELF_DATA)
582 elf_xtensa_mkobject (bfd *abfd)
584 return bfd_elf_allocate_object (abfd, sizeof (struct elf_xtensa_obj_tdata),
588 /* Xtensa ELF linker hash table. */
590 struct elf_xtensa_link_hash_table
592 struct elf_link_hash_table elf;
594 /* Short-cuts to get to dynamic linker sections. */
601 asection *spltlittbl;
603 /* Total count of PLT relocations seen during check_relocs.
604 The actual PLT code must be split into multiple sections and all
605 the sections have to be created before size_dynamic_sections,
606 where we figure out the exact number of PLT entries that will be
607 needed. It is OK if this count is an overestimate, e.g., some
608 relocations may be removed by GC. */
611 struct elf_xtensa_link_hash_entry *tlsbase;
614 /* Get the Xtensa ELF linker hash table from a link_info structure. */
616 #define elf_xtensa_hash_table(p) \
617 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
618 == XTENSA_ELF_DATA ? ((struct elf_xtensa_link_hash_table *) ((p)->hash)) : NULL)
620 /* Create an entry in an Xtensa ELF linker hash table. */
622 static struct bfd_hash_entry *
623 elf_xtensa_link_hash_newfunc (struct bfd_hash_entry *entry,
624 struct bfd_hash_table *table,
627 /* Allocate the structure if it has not already been allocated by a
631 entry = bfd_hash_allocate (table,
632 sizeof (struct elf_xtensa_link_hash_entry));
637 /* Call the allocation method of the superclass. */
638 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
641 struct elf_xtensa_link_hash_entry *eh = elf_xtensa_hash_entry (entry);
642 eh->tlsfunc_refcount = 0;
643 eh->tls_type = GOT_UNKNOWN;
649 /* Create an Xtensa ELF linker hash table. */
651 static struct bfd_link_hash_table *
652 elf_xtensa_link_hash_table_create (bfd *abfd)
654 struct elf_link_hash_entry *tlsbase;
655 struct elf_xtensa_link_hash_table *ret;
656 bfd_size_type amt = sizeof (struct elf_xtensa_link_hash_table);
658 ret = bfd_zmalloc (amt);
662 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
663 elf_xtensa_link_hash_newfunc,
664 sizeof (struct elf_xtensa_link_hash_entry),
671 /* Create a hash entry for "_TLS_MODULE_BASE_" to speed up checking
673 tlsbase = elf_link_hash_lookup (&ret->elf, "_TLS_MODULE_BASE_",
675 tlsbase->root.type = bfd_link_hash_new;
676 tlsbase->root.u.undef.abfd = NULL;
677 tlsbase->non_elf = 0;
678 ret->tlsbase = elf_xtensa_hash_entry (tlsbase);
679 ret->tlsbase->tls_type = GOT_UNKNOWN;
681 return &ret->elf.root;
684 /* Copy the extra info we tack onto an elf_link_hash_entry. */
687 elf_xtensa_copy_indirect_symbol (struct bfd_link_info *info,
688 struct elf_link_hash_entry *dir,
689 struct elf_link_hash_entry *ind)
691 struct elf_xtensa_link_hash_entry *edir, *eind;
693 edir = elf_xtensa_hash_entry (dir);
694 eind = elf_xtensa_hash_entry (ind);
696 if (ind->root.type == bfd_link_hash_indirect)
698 edir->tlsfunc_refcount += eind->tlsfunc_refcount;
699 eind->tlsfunc_refcount = 0;
701 if (dir->got.refcount <= 0)
703 edir->tls_type = eind->tls_type;
704 eind->tls_type = GOT_UNKNOWN;
708 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
711 static inline bfd_boolean
712 elf_xtensa_dynamic_symbol_p (struct elf_link_hash_entry *h,
713 struct bfd_link_info *info)
715 /* Check if we should do dynamic things to this symbol. The
716 "ignore_protected" argument need not be set, because Xtensa code
717 does not require special handling of STV_PROTECTED to make function
718 pointer comparisons work properly. The PLT addresses are never
719 used for function pointers. */
721 return _bfd_elf_dynamic_symbol_p (h, info, 0);
726 property_table_compare (const void *ap, const void *bp)
728 const property_table_entry *a = (const property_table_entry *) ap;
729 const property_table_entry *b = (const property_table_entry *) bp;
731 if (a->address == b->address)
733 if (a->size != b->size)
734 return (a->size - b->size);
736 if ((a->flags & XTENSA_PROP_ALIGN) != (b->flags & XTENSA_PROP_ALIGN))
737 return ((b->flags & XTENSA_PROP_ALIGN)
738 - (a->flags & XTENSA_PROP_ALIGN));
740 if ((a->flags & XTENSA_PROP_ALIGN)
741 && (GET_XTENSA_PROP_ALIGNMENT (a->flags)
742 != GET_XTENSA_PROP_ALIGNMENT (b->flags)))
743 return (GET_XTENSA_PROP_ALIGNMENT (a->flags)
744 - GET_XTENSA_PROP_ALIGNMENT (b->flags));
746 if ((a->flags & XTENSA_PROP_UNREACHABLE)
747 != (b->flags & XTENSA_PROP_UNREACHABLE))
748 return ((b->flags & XTENSA_PROP_UNREACHABLE)
749 - (a->flags & XTENSA_PROP_UNREACHABLE));
751 return (a->flags - b->flags);
754 return (a->address - b->address);
759 property_table_matches (const void *ap, const void *bp)
761 const property_table_entry *a = (const property_table_entry *) ap;
762 const property_table_entry *b = (const property_table_entry *) bp;
764 /* Check if one entry overlaps with the other. */
765 if ((b->address >= a->address && b->address < (a->address + a->size))
766 || (a->address >= b->address && a->address < (b->address + b->size)))
769 return (a->address - b->address);
773 /* Get the literal table or property table entries for the given
774 section. Sets TABLE_P and returns the number of entries. On
775 error, returns a negative value. */
778 xtensa_read_table_entries (bfd *abfd,
780 property_table_entry **table_p,
781 const char *sec_name,
782 bfd_boolean output_addr)
784 asection *table_section;
785 bfd_size_type table_size = 0;
786 bfd_byte *table_data;
787 property_table_entry *blocks;
788 int blk, block_count;
789 bfd_size_type num_records;
790 Elf_Internal_Rela *internal_relocs, *irel, *rel_end;
791 bfd_vma section_addr, off;
792 flagword predef_flags;
793 bfd_size_type table_entry_size, section_limit;
796 || !(section->flags & SEC_ALLOC)
797 || (section->flags & SEC_DEBUGGING))
803 table_section = xtensa_get_property_section (section, sec_name);
805 table_size = table_section->size;
813 predef_flags = xtensa_get_property_predef_flags (table_section);
814 table_entry_size = 12;
816 table_entry_size -= 4;
818 num_records = table_size / table_entry_size;
819 table_data = retrieve_contents (abfd, table_section, TRUE);
820 blocks = (property_table_entry *)
821 bfd_malloc (num_records * sizeof (property_table_entry));
825 section_addr = section->output_section->vma + section->output_offset;
827 section_addr = section->vma;
829 internal_relocs = retrieve_internal_relocs (abfd, table_section, TRUE);
830 if (internal_relocs && !table_section->reloc_done)
832 qsort (internal_relocs, table_section->reloc_count,
833 sizeof (Elf_Internal_Rela), internal_reloc_compare);
834 irel = internal_relocs;
839 section_limit = bfd_get_section_limit (abfd, section);
840 rel_end = internal_relocs + table_section->reloc_count;
842 for (off = 0; off < table_size; off += table_entry_size)
844 bfd_vma address = bfd_get_32 (abfd, table_data + off);
846 /* Skip any relocations before the current offset. This should help
847 avoid confusion caused by unexpected relocations for the preceding
850 (irel->r_offset < off
851 || (irel->r_offset == off
852 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_NONE)))
859 if (irel && irel->r_offset == off)
862 unsigned long r_symndx = ELF32_R_SYM (irel->r_info);
863 BFD_ASSERT (ELF32_R_TYPE (irel->r_info) == R_XTENSA_32);
865 if (get_elf_r_symndx_section (abfd, r_symndx) != section)
868 sym_off = get_elf_r_symndx_offset (abfd, r_symndx);
869 BFD_ASSERT (sym_off == 0);
870 address += (section_addr + sym_off + irel->r_addend);
874 if (address < section_addr
875 || address >= section_addr + section_limit)
879 blocks[block_count].address = address;
880 blocks[block_count].size = bfd_get_32 (abfd, table_data + off + 4);
882 blocks[block_count].flags = predef_flags;
884 blocks[block_count].flags = bfd_get_32 (abfd, table_data + off + 8);
888 release_contents (table_section, table_data);
889 release_internal_relocs (table_section, internal_relocs);
893 /* Now sort them into address order for easy reference. */
894 qsort (blocks, block_count, sizeof (property_table_entry),
895 property_table_compare);
897 /* Check that the table contents are valid. Problems may occur,
898 for example, if an unrelocated object file is stripped. */
899 for (blk = 1; blk < block_count; blk++)
901 /* The only circumstance where two entries may legitimately
902 have the same address is when one of them is a zero-size
903 placeholder to mark a place where fill can be inserted.
904 The zero-size entry should come first. */
905 if (blocks[blk - 1].address == blocks[blk].address &&
906 blocks[blk - 1].size != 0)
908 (*_bfd_error_handler) (_("%B(%A): invalid property table"),
910 bfd_set_error (bfd_error_bad_value);
922 static property_table_entry *
923 elf_xtensa_find_property_entry (property_table_entry *property_table,
924 int property_table_size,
927 property_table_entry entry;
928 property_table_entry *rv;
930 if (property_table_size == 0)
933 entry.address = addr;
937 rv = bsearch (&entry, property_table, property_table_size,
938 sizeof (property_table_entry), property_table_matches);
944 elf_xtensa_in_literal_pool (property_table_entry *lit_table,
948 if (elf_xtensa_find_property_entry (lit_table, lit_table_size, addr))
955 /* Look through the relocs for a section during the first phase, and
956 calculate needed space in the dynamic reloc sections. */
959 elf_xtensa_check_relocs (bfd *abfd,
960 struct bfd_link_info *info,
962 const Elf_Internal_Rela *relocs)
964 struct elf_xtensa_link_hash_table *htab;
965 Elf_Internal_Shdr *symtab_hdr;
966 struct elf_link_hash_entry **sym_hashes;
967 const Elf_Internal_Rela *rel;
968 const Elf_Internal_Rela *rel_end;
970 if (info->relocatable || (sec->flags & SEC_ALLOC) == 0)
973 BFD_ASSERT (is_xtensa_elf (abfd));
975 htab = elf_xtensa_hash_table (info);
979 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
980 sym_hashes = elf_sym_hashes (abfd);
982 rel_end = relocs + sec->reloc_count;
983 for (rel = relocs; rel < rel_end; rel++)
986 unsigned long r_symndx;
987 struct elf_link_hash_entry *h = NULL;
988 struct elf_xtensa_link_hash_entry *eh;
989 int tls_type, old_tls_type;
990 bfd_boolean is_got = FALSE;
991 bfd_boolean is_plt = FALSE;
992 bfd_boolean is_tlsfunc = FALSE;
994 r_symndx = ELF32_R_SYM (rel->r_info);
995 r_type = ELF32_R_TYPE (rel->r_info);
997 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
999 (*_bfd_error_handler) (_("%B: bad symbol index: %d"),
1004 if (r_symndx >= symtab_hdr->sh_info)
1006 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1007 while (h->root.type == bfd_link_hash_indirect
1008 || h->root.type == bfd_link_hash_warning)
1009 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1011 /* PR15323, ref flags aren't set for references in the same
1013 h->root.non_ir_ref = 1;
1015 eh = elf_xtensa_hash_entry (h);
1019 case R_XTENSA_TLSDESC_FN:
1022 tls_type = GOT_TLS_GD;
1027 tls_type = GOT_TLS_IE;
1030 case R_XTENSA_TLSDESC_ARG:
1033 tls_type = GOT_TLS_GD;
1038 tls_type = GOT_TLS_IE;
1039 if (h && elf_xtensa_hash_entry (h) != htab->tlsbase)
1044 case R_XTENSA_TLS_DTPOFF:
1046 tls_type = GOT_TLS_GD;
1048 tls_type = GOT_TLS_IE;
1051 case R_XTENSA_TLS_TPOFF:
1052 tls_type = GOT_TLS_IE;
1054 info->flags |= DF_STATIC_TLS;
1055 if (info->shared || h)
1060 tls_type = GOT_NORMAL;
1065 tls_type = GOT_NORMAL;
1069 case R_XTENSA_GNU_VTINHERIT:
1070 /* This relocation describes the C++ object vtable hierarchy.
1071 Reconstruct it for later use during GC. */
1072 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1076 case R_XTENSA_GNU_VTENTRY:
1077 /* This relocation describes which C++ vtable entries are actually
1078 used. Record for later use during GC. */
1079 BFD_ASSERT (h != NULL);
1081 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1086 /* Nothing to do for any other relocations. */
1094 if (h->plt.refcount <= 0)
1097 h->plt.refcount = 1;
1100 h->plt.refcount += 1;
1102 /* Keep track of the total PLT relocation count even if we
1103 don't yet know whether the dynamic sections will be
1105 htab->plt_reloc_count += 1;
1107 if (elf_hash_table (info)->dynamic_sections_created)
1109 if (! add_extra_plt_sections (info, htab->plt_reloc_count))
1115 if (h->got.refcount <= 0)
1116 h->got.refcount = 1;
1118 h->got.refcount += 1;
1122 eh->tlsfunc_refcount += 1;
1124 old_tls_type = eh->tls_type;
1128 /* Allocate storage the first time. */
1129 if (elf_local_got_refcounts (abfd) == NULL)
1131 bfd_size_type size = symtab_hdr->sh_info;
1134 mem = bfd_zalloc (abfd, size * sizeof (bfd_signed_vma));
1137 elf_local_got_refcounts (abfd) = (bfd_signed_vma *) mem;
1139 mem = bfd_zalloc (abfd, size);
1142 elf_xtensa_local_got_tls_type (abfd) = (char *) mem;
1144 mem = bfd_zalloc (abfd, size * sizeof (bfd_signed_vma));
1147 elf_xtensa_local_tlsfunc_refcounts (abfd)
1148 = (bfd_signed_vma *) mem;
1151 /* This is a global offset table entry for a local symbol. */
1152 if (is_got || is_plt)
1153 elf_local_got_refcounts (abfd) [r_symndx] += 1;
1156 elf_xtensa_local_tlsfunc_refcounts (abfd) [r_symndx] += 1;
1158 old_tls_type = elf_xtensa_local_got_tls_type (abfd) [r_symndx];
1161 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_IE))
1162 tls_type |= old_tls_type;
1163 /* If a TLS symbol is accessed using IE at least once,
1164 there is no point to use a dynamic model for it. */
1165 else if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
1166 && ((old_tls_type & GOT_TLS_GD) == 0
1167 || (tls_type & GOT_TLS_IE) == 0))
1169 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_GD))
1170 tls_type = old_tls_type;
1171 else if ((old_tls_type & GOT_TLS_GD) && (tls_type & GOT_TLS_GD))
1172 tls_type |= old_tls_type;
1175 (*_bfd_error_handler)
1176 (_("%B: `%s' accessed both as normal and thread local symbol"),
1178 h ? h->root.root.string : "<local>");
1183 if (old_tls_type != tls_type)
1186 eh->tls_type = tls_type;
1188 elf_xtensa_local_got_tls_type (abfd) [r_symndx] = tls_type;
1197 elf_xtensa_make_sym_local (struct bfd_link_info *info,
1198 struct elf_link_hash_entry *h)
1202 if (h->plt.refcount > 0)
1204 /* For shared objects, there's no need for PLT entries for local
1205 symbols (use RELATIVE relocs instead of JMP_SLOT relocs). */
1206 if (h->got.refcount < 0)
1207 h->got.refcount = 0;
1208 h->got.refcount += h->plt.refcount;
1209 h->plt.refcount = 0;
1214 /* Don't need any dynamic relocations at all. */
1215 h->plt.refcount = 0;
1216 h->got.refcount = 0;
1222 elf_xtensa_hide_symbol (struct bfd_link_info *info,
1223 struct elf_link_hash_entry *h,
1224 bfd_boolean force_local)
1226 /* For a shared link, move the plt refcount to the got refcount to leave
1227 space for RELATIVE relocs. */
1228 elf_xtensa_make_sym_local (info, h);
1230 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
1234 /* Return the section that should be marked against GC for a given
1238 elf_xtensa_gc_mark_hook (asection *sec,
1239 struct bfd_link_info *info,
1240 Elf_Internal_Rela *rel,
1241 struct elf_link_hash_entry *h,
1242 Elf_Internal_Sym *sym)
1244 /* Property sections are marked "KEEP" in the linker scripts, but they
1245 should not cause other sections to be marked. (This approach relies
1246 on elf_xtensa_discard_info to remove property table entries that
1247 describe discarded sections. Alternatively, it might be more
1248 efficient to avoid using "KEEP" in the linker scripts and instead use
1249 the gc_mark_extra_sections hook to mark only the property sections
1250 that describe marked sections. That alternative does not work well
1251 with the current property table sections, which do not correspond
1252 one-to-one with the sections they describe, but that should be fixed
1254 if (xtensa_is_property_section (sec))
1258 switch (ELF32_R_TYPE (rel->r_info))
1260 case R_XTENSA_GNU_VTINHERIT:
1261 case R_XTENSA_GNU_VTENTRY:
1265 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1269 /* Update the GOT & PLT entry reference counts
1270 for the section being removed. */
1273 elf_xtensa_gc_sweep_hook (bfd *abfd,
1274 struct bfd_link_info *info,
1276 const Elf_Internal_Rela *relocs)
1278 Elf_Internal_Shdr *symtab_hdr;
1279 struct elf_link_hash_entry **sym_hashes;
1280 const Elf_Internal_Rela *rel, *relend;
1281 struct elf_xtensa_link_hash_table *htab;
1283 htab = elf_xtensa_hash_table (info);
1287 if (info->relocatable)
1290 if ((sec->flags & SEC_ALLOC) == 0)
1293 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1294 sym_hashes = elf_sym_hashes (abfd);
1296 relend = relocs + sec->reloc_count;
1297 for (rel = relocs; rel < relend; rel++)
1299 unsigned long r_symndx;
1300 unsigned int r_type;
1301 struct elf_link_hash_entry *h = NULL;
1302 struct elf_xtensa_link_hash_entry *eh;
1303 bfd_boolean is_got = FALSE;
1304 bfd_boolean is_plt = FALSE;
1305 bfd_boolean is_tlsfunc = FALSE;
1307 r_symndx = ELF32_R_SYM (rel->r_info);
1308 if (r_symndx >= symtab_hdr->sh_info)
1310 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1311 while (h->root.type == bfd_link_hash_indirect
1312 || h->root.type == bfd_link_hash_warning)
1313 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1315 eh = elf_xtensa_hash_entry (h);
1317 r_type = ELF32_R_TYPE (rel->r_info);
1320 case R_XTENSA_TLSDESC_FN:
1328 case R_XTENSA_TLSDESC_ARG:
1333 if (h && elf_xtensa_hash_entry (h) != htab->tlsbase)
1338 case R_XTENSA_TLS_TPOFF:
1339 if (info->shared || h)
1359 if (h->plt.refcount > 0)
1364 if (h->got.refcount > 0)
1369 if (eh->tlsfunc_refcount > 0)
1370 eh->tlsfunc_refcount--;
1375 if (is_got || is_plt)
1377 bfd_signed_vma *got_refcount
1378 = &elf_local_got_refcounts (abfd) [r_symndx];
1379 if (*got_refcount > 0)
1384 bfd_signed_vma *tlsfunc_refcount
1385 = &elf_xtensa_local_tlsfunc_refcounts (abfd) [r_symndx];
1386 if (*tlsfunc_refcount > 0)
1387 *tlsfunc_refcount -= 1;
1396 /* Create all the dynamic sections. */
1399 elf_xtensa_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
1401 struct elf_xtensa_link_hash_table *htab;
1402 flagword flags, noalloc_flags;
1404 htab = elf_xtensa_hash_table (info);
1408 /* First do all the standard stuff. */
1409 if (! _bfd_elf_create_dynamic_sections (dynobj, info))
1411 htab->splt = bfd_get_linker_section (dynobj, ".plt");
1412 htab->srelplt = bfd_get_linker_section (dynobj, ".rela.plt");
1413 htab->sgot = bfd_get_linker_section (dynobj, ".got");
1414 htab->sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
1415 htab->srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1417 /* Create any extra PLT sections in case check_relocs has already
1418 been called on all the non-dynamic input files. */
1419 if (! add_extra_plt_sections (info, htab->plt_reloc_count))
1422 noalloc_flags = (SEC_HAS_CONTENTS | SEC_IN_MEMORY
1423 | SEC_LINKER_CREATED | SEC_READONLY);
1424 flags = noalloc_flags | SEC_ALLOC | SEC_LOAD;
1426 /* Mark the ".got.plt" section READONLY. */
1427 if (htab->sgotplt == NULL
1428 || ! bfd_set_section_flags (dynobj, htab->sgotplt, flags))
1431 /* Create ".got.loc" (literal tables for use by dynamic linker). */
1432 htab->sgotloc = bfd_make_section_anyway_with_flags (dynobj, ".got.loc",
1434 if (htab->sgotloc == NULL
1435 || ! bfd_set_section_alignment (dynobj, htab->sgotloc, 2))
1438 /* Create ".xt.lit.plt" (literal table for ".got.plt*"). */
1439 htab->spltlittbl = bfd_make_section_anyway_with_flags (dynobj, ".xt.lit.plt",
1441 if (htab->spltlittbl == NULL
1442 || ! bfd_set_section_alignment (dynobj, htab->spltlittbl, 2))
1450 add_extra_plt_sections (struct bfd_link_info *info, int count)
1452 bfd *dynobj = elf_hash_table (info)->dynobj;
1455 /* Iterate over all chunks except 0 which uses the standard ".plt" and
1456 ".got.plt" sections. */
1457 for (chunk = count / PLT_ENTRIES_PER_CHUNK; chunk > 0; chunk--)
1463 /* Stop when we find a section has already been created. */
1464 if (elf_xtensa_get_plt_section (info, chunk))
1467 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1468 | SEC_LINKER_CREATED | SEC_READONLY);
1470 sname = (char *) bfd_malloc (10);
1471 sprintf (sname, ".plt.%u", chunk);
1472 s = bfd_make_section_anyway_with_flags (dynobj, sname, flags | SEC_CODE);
1474 || ! bfd_set_section_alignment (dynobj, s, 2))
1477 sname = (char *) bfd_malloc (14);
1478 sprintf (sname, ".got.plt.%u", chunk);
1479 s = bfd_make_section_anyway_with_flags (dynobj, sname, flags);
1481 || ! bfd_set_section_alignment (dynobj, s, 2))
1489 /* Adjust a symbol defined by a dynamic object and referenced by a
1490 regular object. The current definition is in some section of the
1491 dynamic object, but we're not including those sections. We have to
1492 change the definition to something the rest of the link can
1496 elf_xtensa_adjust_dynamic_symbol (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1497 struct elf_link_hash_entry *h)
1499 /* If this is a weak symbol, and there is a real definition, the
1500 processor independent code will have arranged for us to see the
1501 real definition first, and we can just use the same value. */
1504 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1505 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1506 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1507 h->root.u.def.value = h->u.weakdef->root.u.def.value;
1511 /* This is a reference to a symbol defined by a dynamic object. The
1512 reference must go through the GOT, so there's no need for COPY relocs,
1520 elf_xtensa_allocate_dynrelocs (struct elf_link_hash_entry *h, void *arg)
1522 struct bfd_link_info *info;
1523 struct elf_xtensa_link_hash_table *htab;
1524 struct elf_xtensa_link_hash_entry *eh = elf_xtensa_hash_entry (h);
1526 if (h->root.type == bfd_link_hash_indirect)
1529 info = (struct bfd_link_info *) arg;
1530 htab = elf_xtensa_hash_table (info);
1534 /* If we saw any use of an IE model for this symbol, we can then optimize
1535 away GOT entries for any TLSDESC_FN relocs. */
1536 if ((eh->tls_type & GOT_TLS_IE) != 0)
1538 BFD_ASSERT (h->got.refcount >= eh->tlsfunc_refcount);
1539 h->got.refcount -= eh->tlsfunc_refcount;
1542 if (! elf_xtensa_dynamic_symbol_p (h, info))
1543 elf_xtensa_make_sym_local (info, h);
1545 if (h->plt.refcount > 0)
1546 htab->srelplt->size += (h->plt.refcount * sizeof (Elf32_External_Rela));
1548 if (h->got.refcount > 0)
1549 htab->srelgot->size += (h->got.refcount * sizeof (Elf32_External_Rela));
1556 elf_xtensa_allocate_local_got_size (struct bfd_link_info *info)
1558 struct elf_xtensa_link_hash_table *htab;
1561 htab = elf_xtensa_hash_table (info);
1565 for (i = info->input_bfds; i; i = i->link_next)
1567 bfd_signed_vma *local_got_refcounts;
1568 bfd_size_type j, cnt;
1569 Elf_Internal_Shdr *symtab_hdr;
1571 local_got_refcounts = elf_local_got_refcounts (i);
1572 if (!local_got_refcounts)
1575 symtab_hdr = &elf_tdata (i)->symtab_hdr;
1576 cnt = symtab_hdr->sh_info;
1578 for (j = 0; j < cnt; ++j)
1580 /* If we saw any use of an IE model for this symbol, we can
1581 then optimize away GOT entries for any TLSDESC_FN relocs. */
1582 if ((elf_xtensa_local_got_tls_type (i) [j] & GOT_TLS_IE) != 0)
1584 bfd_signed_vma *tlsfunc_refcount
1585 = &elf_xtensa_local_tlsfunc_refcounts (i) [j];
1586 BFD_ASSERT (local_got_refcounts[j] >= *tlsfunc_refcount);
1587 local_got_refcounts[j] -= *tlsfunc_refcount;
1590 if (local_got_refcounts[j] > 0)
1591 htab->srelgot->size += (local_got_refcounts[j]
1592 * sizeof (Elf32_External_Rela));
1598 /* Set the sizes of the dynamic sections. */
1601 elf_xtensa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1602 struct bfd_link_info *info)
1604 struct elf_xtensa_link_hash_table *htab;
1606 asection *s, *srelplt, *splt, *sgotplt, *srelgot, *spltlittbl, *sgotloc;
1607 bfd_boolean relplt, relgot;
1608 int plt_entries, plt_chunks, chunk;
1613 htab = elf_xtensa_hash_table (info);
1617 dynobj = elf_hash_table (info)->dynobj;
1620 srelgot = htab->srelgot;
1621 srelplt = htab->srelplt;
1623 if (elf_hash_table (info)->dynamic_sections_created)
1625 BFD_ASSERT (htab->srelgot != NULL
1626 && htab->srelplt != NULL
1627 && htab->sgot != NULL
1628 && htab->spltlittbl != NULL
1629 && htab->sgotloc != NULL);
1631 /* Set the contents of the .interp section to the interpreter. */
1632 if (info->executable)
1634 s = bfd_get_linker_section (dynobj, ".interp");
1637 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1638 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1641 /* Allocate room for one word in ".got". */
1642 htab->sgot->size = 4;
1644 /* Allocate space in ".rela.got" for literals that reference global
1645 symbols and space in ".rela.plt" for literals that have PLT
1647 elf_link_hash_traverse (elf_hash_table (info),
1648 elf_xtensa_allocate_dynrelocs,
1651 /* If we are generating a shared object, we also need space in
1652 ".rela.got" for R_XTENSA_RELATIVE relocs for literals that
1653 reference local symbols. */
1655 elf_xtensa_allocate_local_got_size (info);
1657 /* Allocate space in ".plt" to match the size of ".rela.plt". For
1658 each PLT entry, we need the PLT code plus a 4-byte literal.
1659 For each chunk of ".plt", we also need two more 4-byte
1660 literals, two corresponding entries in ".rela.got", and an
1661 8-byte entry in ".xt.lit.plt". */
1662 spltlittbl = htab->spltlittbl;
1663 plt_entries = srelplt->size / sizeof (Elf32_External_Rela);
1665 (plt_entries + PLT_ENTRIES_PER_CHUNK - 1) / PLT_ENTRIES_PER_CHUNK;
1667 /* Iterate over all the PLT chunks, including any extra sections
1668 created earlier because the initial count of PLT relocations
1669 was an overestimate. */
1671 (splt = elf_xtensa_get_plt_section (info, chunk)) != NULL;
1676 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
1677 BFD_ASSERT (sgotplt != NULL);
1679 if (chunk < plt_chunks - 1)
1680 chunk_entries = PLT_ENTRIES_PER_CHUNK;
1681 else if (chunk == plt_chunks - 1)
1682 chunk_entries = plt_entries - (chunk * PLT_ENTRIES_PER_CHUNK);
1686 if (chunk_entries != 0)
1688 sgotplt->size = 4 * (chunk_entries + 2);
1689 splt->size = PLT_ENTRY_SIZE * chunk_entries;
1690 srelgot->size += 2 * sizeof (Elf32_External_Rela);
1691 spltlittbl->size += 8;
1700 /* Allocate space in ".got.loc" to match the total size of all the
1702 sgotloc = htab->sgotloc;
1703 sgotloc->size = spltlittbl->size;
1704 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
1706 if (abfd->flags & DYNAMIC)
1708 for (s = abfd->sections; s != NULL; s = s->next)
1710 if (! discarded_section (s)
1711 && xtensa_is_littable_section (s)
1713 sgotloc->size += s->size;
1718 /* Allocate memory for dynamic sections. */
1721 for (s = dynobj->sections; s != NULL; s = s->next)
1725 if ((s->flags & SEC_LINKER_CREATED) == 0)
1728 /* It's OK to base decisions on the section name, because none
1729 of the dynobj section names depend upon the input files. */
1730 name = bfd_get_section_name (dynobj, s);
1732 if (CONST_STRNEQ (name, ".rela"))
1736 if (strcmp (name, ".rela.plt") == 0)
1738 else if (strcmp (name, ".rela.got") == 0)
1741 /* We use the reloc_count field as a counter if we need
1742 to copy relocs into the output file. */
1746 else if (! CONST_STRNEQ (name, ".plt.")
1747 && ! CONST_STRNEQ (name, ".got.plt.")
1748 && strcmp (name, ".got") != 0
1749 && strcmp (name, ".plt") != 0
1750 && strcmp (name, ".got.plt") != 0
1751 && strcmp (name, ".xt.lit.plt") != 0
1752 && strcmp (name, ".got.loc") != 0)
1754 /* It's not one of our sections, so don't allocate space. */
1760 /* If we don't need this section, strip it from the output
1761 file. We must create the ".plt*" and ".got.plt*"
1762 sections in create_dynamic_sections and/or check_relocs
1763 based on a conservative estimate of the PLT relocation
1764 count, because the sections must be created before the
1765 linker maps input sections to output sections. The
1766 linker does that before size_dynamic_sections, where we
1767 compute the exact size of the PLT, so there may be more
1768 of these sections than are actually needed. */
1769 s->flags |= SEC_EXCLUDE;
1771 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
1773 /* Allocate memory for the section contents. */
1774 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1775 if (s->contents == NULL)
1780 if (elf_hash_table (info)->dynamic_sections_created)
1782 /* Add the special XTENSA_RTLD relocations now. The offsets won't be
1783 known until finish_dynamic_sections, but we need to get the relocs
1784 in place before they are sorted. */
1785 for (chunk = 0; chunk < plt_chunks; chunk++)
1787 Elf_Internal_Rela irela;
1791 irela.r_info = ELF32_R_INFO (0, R_XTENSA_RTLD);
1794 loc = (srelgot->contents
1795 + srelgot->reloc_count * sizeof (Elf32_External_Rela));
1796 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
1797 bfd_elf32_swap_reloca_out (output_bfd, &irela,
1798 loc + sizeof (Elf32_External_Rela));
1799 srelgot->reloc_count += 2;
1802 /* Add some entries to the .dynamic section. We fill in the
1803 values later, in elf_xtensa_finish_dynamic_sections, but we
1804 must add the entries now so that we get the correct size for
1805 the .dynamic section. The DT_DEBUG entry is filled in by the
1806 dynamic linker and used by the debugger. */
1807 #define add_dynamic_entry(TAG, VAL) \
1808 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1810 if (info->executable)
1812 if (!add_dynamic_entry (DT_DEBUG, 0))
1818 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
1819 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1820 || !add_dynamic_entry (DT_JMPREL, 0))
1826 if (!add_dynamic_entry (DT_RELA, 0)
1827 || !add_dynamic_entry (DT_RELASZ, 0)
1828 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1832 if (!add_dynamic_entry (DT_PLTGOT, 0)
1833 || !add_dynamic_entry (DT_XTENSA_GOT_LOC_OFF, 0)
1834 || !add_dynamic_entry (DT_XTENSA_GOT_LOC_SZ, 0))
1837 #undef add_dynamic_entry
1843 elf_xtensa_always_size_sections (bfd *output_bfd,
1844 struct bfd_link_info *info)
1846 struct elf_xtensa_link_hash_table *htab;
1849 htab = elf_xtensa_hash_table (info);
1853 tls_sec = htab->elf.tls_sec;
1855 if (tls_sec && (htab->tlsbase->tls_type & GOT_TLS_ANY) != 0)
1857 struct elf_link_hash_entry *tlsbase = &htab->tlsbase->elf;
1858 struct bfd_link_hash_entry *bh = &tlsbase->root;
1859 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
1861 tlsbase->type = STT_TLS;
1862 if (!(_bfd_generic_link_add_one_symbol
1863 (info, output_bfd, "_TLS_MODULE_BASE_", BSF_LOCAL,
1864 tls_sec, 0, NULL, FALSE,
1865 bed->collect, &bh)))
1867 tlsbase->def_regular = 1;
1868 tlsbase->other = STV_HIDDEN;
1869 (*bed->elf_backend_hide_symbol) (info, tlsbase, TRUE);
1876 /* Return the base VMA address which should be subtracted from real addresses
1877 when resolving @dtpoff relocation.
1878 This is PT_TLS segment p_vaddr. */
1881 dtpoff_base (struct bfd_link_info *info)
1883 /* If tls_sec is NULL, we should have signalled an error already. */
1884 if (elf_hash_table (info)->tls_sec == NULL)
1886 return elf_hash_table (info)->tls_sec->vma;
1889 /* Return the relocation value for @tpoff relocation
1890 if STT_TLS virtual address is ADDRESS. */
1893 tpoff (struct bfd_link_info *info, bfd_vma address)
1895 struct elf_link_hash_table *htab = elf_hash_table (info);
1898 /* If tls_sec is NULL, we should have signalled an error already. */
1899 if (htab->tls_sec == NULL)
1901 base = align_power ((bfd_vma) TCB_SIZE, htab->tls_sec->alignment_power);
1902 return address - htab->tls_sec->vma + base;
1905 /* Perform the specified relocation. The instruction at (contents + address)
1906 is modified to set one operand to represent the value in "relocation". The
1907 operand position is determined by the relocation type recorded in the
1910 #define CALL_SEGMENT_BITS (30)
1911 #define CALL_SEGMENT_SIZE (1 << CALL_SEGMENT_BITS)
1913 static bfd_reloc_status_type
1914 elf_xtensa_do_reloc (reloc_howto_type *howto,
1916 asection *input_section,
1920 bfd_boolean is_weak_undef,
1921 char **error_message)
1924 xtensa_opcode opcode;
1925 xtensa_isa isa = xtensa_default_isa;
1926 static xtensa_insnbuf ibuff = NULL;
1927 static xtensa_insnbuf sbuff = NULL;
1928 bfd_vma self_address;
1929 bfd_size_type input_size;
1935 ibuff = xtensa_insnbuf_alloc (isa);
1936 sbuff = xtensa_insnbuf_alloc (isa);
1939 input_size = bfd_get_section_limit (abfd, input_section);
1941 /* Calculate the PC address for this instruction. */
1942 self_address = (input_section->output_section->vma
1943 + input_section->output_offset
1946 switch (howto->type)
1949 case R_XTENSA_DIFF8:
1950 case R_XTENSA_DIFF16:
1951 case R_XTENSA_DIFF32:
1952 case R_XTENSA_TLS_FUNC:
1953 case R_XTENSA_TLS_ARG:
1954 case R_XTENSA_TLS_CALL:
1955 return bfd_reloc_ok;
1957 case R_XTENSA_ASM_EXPAND:
1960 /* Check for windowed CALL across a 1GB boundary. */
1961 opcode = get_expanded_call_opcode (contents + address,
1962 input_size - address, 0);
1963 if (is_windowed_call_opcode (opcode))
1965 if ((self_address >> CALL_SEGMENT_BITS)
1966 != (relocation >> CALL_SEGMENT_BITS))
1968 *error_message = "windowed longcall crosses 1GB boundary; "
1970 return bfd_reloc_dangerous;
1974 return bfd_reloc_ok;
1976 case R_XTENSA_ASM_SIMPLIFY:
1978 /* Convert the L32R/CALLX to CALL. */
1979 bfd_reloc_status_type retval =
1980 elf_xtensa_do_asm_simplify (contents, address, input_size,
1982 if (retval != bfd_reloc_ok)
1983 return bfd_reloc_dangerous;
1985 /* The CALL needs to be relocated. Continue below for that part. */
1988 howto = &elf_howto_table[(unsigned) R_XTENSA_SLOT0_OP ];
1995 x = bfd_get_32 (abfd, contents + address);
1997 bfd_put_32 (abfd, x, contents + address);
1999 return bfd_reloc_ok;
2001 case R_XTENSA_32_PCREL:
2002 bfd_put_32 (abfd, relocation - self_address, contents + address);
2003 return bfd_reloc_ok;
2006 case R_XTENSA_TLSDESC_FN:
2007 case R_XTENSA_TLSDESC_ARG:
2008 case R_XTENSA_TLS_DTPOFF:
2009 case R_XTENSA_TLS_TPOFF:
2010 bfd_put_32 (abfd, relocation, contents + address);
2011 return bfd_reloc_ok;
2014 /* Only instruction slot-specific relocations handled below.... */
2015 slot = get_relocation_slot (howto->type);
2016 if (slot == XTENSA_UNDEFINED)
2018 *error_message = "unexpected relocation";
2019 return bfd_reloc_dangerous;
2022 /* Read the instruction into a buffer and decode the opcode. */
2023 xtensa_insnbuf_from_chars (isa, ibuff, contents + address,
2024 input_size - address);
2025 fmt = xtensa_format_decode (isa, ibuff);
2026 if (fmt == XTENSA_UNDEFINED)
2028 *error_message = "cannot decode instruction format";
2029 return bfd_reloc_dangerous;
2032 xtensa_format_get_slot (isa, fmt, slot, ibuff, sbuff);
2034 opcode = xtensa_opcode_decode (isa, fmt, slot, sbuff);
2035 if (opcode == XTENSA_UNDEFINED)
2037 *error_message = "cannot decode instruction opcode";
2038 return bfd_reloc_dangerous;
2041 /* Check for opcode-specific "alternate" relocations. */
2042 if (is_alt_relocation (howto->type))
2044 if (opcode == get_l32r_opcode ())
2046 /* Handle the special-case of non-PC-relative L32R instructions. */
2047 bfd *output_bfd = input_section->output_section->owner;
2048 asection *lit4_sec = bfd_get_section_by_name (output_bfd, ".lit4");
2051 *error_message = "relocation references missing .lit4 section";
2052 return bfd_reloc_dangerous;
2054 self_address = ((lit4_sec->vma & ~0xfff)
2055 + 0x40000 - 3); /* -3 to compensate for do_reloc */
2056 newval = relocation;
2059 else if (opcode == get_const16_opcode ())
2061 /* ALT used for high 16 bits. */
2062 newval = relocation >> 16;
2067 /* No other "alternate" relocations currently defined. */
2068 *error_message = "unexpected relocation";
2069 return bfd_reloc_dangerous;
2072 else /* Not an "alternate" relocation.... */
2074 if (opcode == get_const16_opcode ())
2076 newval = relocation & 0xffff;
2081 /* ...normal PC-relative relocation.... */
2083 /* Determine which operand is being relocated. */
2084 opnd = get_relocation_opnd (opcode, howto->type);
2085 if (opnd == XTENSA_UNDEFINED)
2087 *error_message = "unexpected relocation";
2088 return bfd_reloc_dangerous;
2091 if (!howto->pc_relative)
2093 *error_message = "expected PC-relative relocation";
2094 return bfd_reloc_dangerous;
2097 newval = relocation;
2101 /* Apply the relocation. */
2102 if (xtensa_operand_do_reloc (isa, opcode, opnd, &newval, self_address)
2103 || xtensa_operand_encode (isa, opcode, opnd, &newval)
2104 || xtensa_operand_set_field (isa, opcode, opnd, fmt, slot,
2107 const char *opname = xtensa_opcode_name (isa, opcode);
2110 msg = "cannot encode";
2111 if (is_direct_call_opcode (opcode))
2113 if ((relocation & 0x3) != 0)
2114 msg = "misaligned call target";
2116 msg = "call target out of range";
2118 else if (opcode == get_l32r_opcode ())
2120 if ((relocation & 0x3) != 0)
2121 msg = "misaligned literal target";
2122 else if (is_alt_relocation (howto->type))
2123 msg = "literal target out of range (too many literals)";
2124 else if (self_address > relocation)
2125 msg = "literal target out of range (try using text-section-literals)";
2127 msg = "literal placed after use";
2130 *error_message = vsprint_msg (opname, ": %s", strlen (msg) + 2, msg);
2131 return bfd_reloc_dangerous;
2134 /* Check for calls across 1GB boundaries. */
2135 if (is_direct_call_opcode (opcode)
2136 && is_windowed_call_opcode (opcode))
2138 if ((self_address >> CALL_SEGMENT_BITS)
2139 != (relocation >> CALL_SEGMENT_BITS))
2142 "windowed call crosses 1GB boundary; return may fail";
2143 return bfd_reloc_dangerous;
2147 /* Write the modified instruction back out of the buffer. */
2148 xtensa_format_set_slot (isa, fmt, slot, ibuff, sbuff);
2149 xtensa_insnbuf_to_chars (isa, ibuff, contents + address,
2150 input_size - address);
2151 return bfd_reloc_ok;
2156 vsprint_msg (const char *origmsg, const char *fmt, int arglen, ...)
2158 /* To reduce the size of the memory leak,
2159 we only use a single message buffer. */
2160 static bfd_size_type alloc_size = 0;
2161 static char *message = NULL;
2162 bfd_size_type orig_len, len = 0;
2163 bfd_boolean is_append;
2166 va_start (ap, arglen);
2168 is_append = (origmsg == message);
2170 orig_len = strlen (origmsg);
2171 len = orig_len + strlen (fmt) + arglen + 20;
2172 if (len > alloc_size)
2174 message = (char *) bfd_realloc_or_free (message, len);
2177 if (message != NULL)
2180 memcpy (message, origmsg, orig_len);
2181 vsprintf (message + orig_len, fmt, ap);
2188 /* This function is registered as the "special_function" in the
2189 Xtensa howto for handling simplify operations.
2190 bfd_perform_relocation / bfd_install_relocation use it to
2191 perform (install) the specified relocation. Since this replaces the code
2192 in bfd_perform_relocation, it is basically an Xtensa-specific,
2193 stripped-down version of bfd_perform_relocation. */
2195 static bfd_reloc_status_type
2196 bfd_elf_xtensa_reloc (bfd *abfd,
2197 arelent *reloc_entry,
2200 asection *input_section,
2202 char **error_message)
2205 bfd_reloc_status_type flag;
2206 bfd_size_type octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2207 bfd_vma output_base = 0;
2208 reloc_howto_type *howto = reloc_entry->howto;
2209 asection *reloc_target_output_section;
2210 bfd_boolean is_weak_undef;
2212 if (!xtensa_default_isa)
2213 xtensa_default_isa = xtensa_isa_init (0, 0);
2215 /* ELF relocs are against symbols. If we are producing relocatable
2216 output, and the reloc is against an external symbol, the resulting
2217 reloc will also be against the same symbol. In such a case, we
2218 don't want to change anything about the way the reloc is handled,
2219 since it will all be done at final link time. This test is similar
2220 to what bfd_elf_generic_reloc does except that it lets relocs with
2221 howto->partial_inplace go through even if the addend is non-zero.
2222 (The real problem is that partial_inplace is set for XTENSA_32
2223 relocs to begin with, but that's a long story and there's little we
2224 can do about it now....) */
2226 if (output_bfd && (symbol->flags & BSF_SECTION_SYM) == 0)
2228 reloc_entry->address += input_section->output_offset;
2229 return bfd_reloc_ok;
2232 /* Is the address of the relocation really within the section? */
2233 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
2234 return bfd_reloc_outofrange;
2236 /* Work out which section the relocation is targeted at and the
2237 initial relocation command value. */
2239 /* Get symbol value. (Common symbols are special.) */
2240 if (bfd_is_com_section (symbol->section))
2243 relocation = symbol->value;
2245 reloc_target_output_section = symbol->section->output_section;
2247 /* Convert input-section-relative symbol value to absolute. */
2248 if ((output_bfd && !howto->partial_inplace)
2249 || reloc_target_output_section == NULL)
2252 output_base = reloc_target_output_section->vma;
2254 relocation += output_base + symbol->section->output_offset;
2256 /* Add in supplied addend. */
2257 relocation += reloc_entry->addend;
2259 /* Here the variable relocation holds the final address of the
2260 symbol we are relocating against, plus any addend. */
2263 if (!howto->partial_inplace)
2265 /* This is a partial relocation, and we want to apply the relocation
2266 to the reloc entry rather than the raw data. Everything except
2267 relocations against section symbols has already been handled
2270 BFD_ASSERT (symbol->flags & BSF_SECTION_SYM);
2271 reloc_entry->addend = relocation;
2272 reloc_entry->address += input_section->output_offset;
2273 return bfd_reloc_ok;
2277 reloc_entry->address += input_section->output_offset;
2278 reloc_entry->addend = 0;
2282 is_weak_undef = (bfd_is_und_section (symbol->section)
2283 && (symbol->flags & BSF_WEAK) != 0);
2284 flag = elf_xtensa_do_reloc (howto, abfd, input_section, relocation,
2285 (bfd_byte *) data, (bfd_vma) octets,
2286 is_weak_undef, error_message);
2288 if (flag == bfd_reloc_dangerous)
2290 /* Add the symbol name to the error message. */
2291 if (! *error_message)
2292 *error_message = "";
2293 *error_message = vsprint_msg (*error_message, ": (%s + 0x%lx)",
2294 strlen (symbol->name) + 17,
2296 (unsigned long) reloc_entry->addend);
2303 /* Set up an entry in the procedure linkage table. */
2306 elf_xtensa_create_plt_entry (struct bfd_link_info *info,
2308 unsigned reloc_index)
2310 asection *splt, *sgotplt;
2311 bfd_vma plt_base, got_base;
2312 bfd_vma code_offset, lit_offset;
2315 chunk = reloc_index / PLT_ENTRIES_PER_CHUNK;
2316 splt = elf_xtensa_get_plt_section (info, chunk);
2317 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
2318 BFD_ASSERT (splt != NULL && sgotplt != NULL);
2320 plt_base = splt->output_section->vma + splt->output_offset;
2321 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2323 lit_offset = 8 + (reloc_index % PLT_ENTRIES_PER_CHUNK) * 4;
2324 code_offset = (reloc_index % PLT_ENTRIES_PER_CHUNK) * PLT_ENTRY_SIZE;
2326 /* Fill in the literal entry. This is the offset of the dynamic
2327 relocation entry. */
2328 bfd_put_32 (output_bfd, reloc_index * sizeof (Elf32_External_Rela),
2329 sgotplt->contents + lit_offset);
2331 /* Fill in the entry in the procedure linkage table. */
2332 memcpy (splt->contents + code_offset,
2333 (bfd_big_endian (output_bfd)
2334 ? elf_xtensa_be_plt_entry
2335 : elf_xtensa_le_plt_entry),
2337 bfd_put_16 (output_bfd, l32r_offset (got_base + 0,
2338 plt_base + code_offset + 3),
2339 splt->contents + code_offset + 4);
2340 bfd_put_16 (output_bfd, l32r_offset (got_base + 4,
2341 plt_base + code_offset + 6),
2342 splt->contents + code_offset + 7);
2343 bfd_put_16 (output_bfd, l32r_offset (got_base + lit_offset,
2344 plt_base + code_offset + 9),
2345 splt->contents + code_offset + 10);
2347 return plt_base + code_offset;
2351 static bfd_boolean get_indirect_call_dest_reg (xtensa_opcode, unsigned *);
2354 replace_tls_insn (Elf_Internal_Rela *rel,
2356 asection *input_section,
2358 bfd_boolean is_ld_model,
2359 char **error_message)
2361 static xtensa_insnbuf ibuff = NULL;
2362 static xtensa_insnbuf sbuff = NULL;
2363 xtensa_isa isa = xtensa_default_isa;
2365 xtensa_opcode old_op, new_op;
2366 bfd_size_type input_size;
2368 unsigned dest_reg, src_reg;
2372 ibuff = xtensa_insnbuf_alloc (isa);
2373 sbuff = xtensa_insnbuf_alloc (isa);
2376 input_size = bfd_get_section_limit (abfd, input_section);
2378 /* Read the instruction into a buffer and decode the opcode. */
2379 xtensa_insnbuf_from_chars (isa, ibuff, contents + rel->r_offset,
2380 input_size - rel->r_offset);
2381 fmt = xtensa_format_decode (isa, ibuff);
2382 if (fmt == XTENSA_UNDEFINED)
2384 *error_message = "cannot decode instruction format";
2388 BFD_ASSERT (xtensa_format_num_slots (isa, fmt) == 1);
2389 xtensa_format_get_slot (isa, fmt, 0, ibuff, sbuff);
2391 old_op = xtensa_opcode_decode (isa, fmt, 0, sbuff);
2392 if (old_op == XTENSA_UNDEFINED)
2394 *error_message = "cannot decode instruction opcode";
2398 r_type = ELF32_R_TYPE (rel->r_info);
2401 case R_XTENSA_TLS_FUNC:
2402 case R_XTENSA_TLS_ARG:
2403 if (old_op != get_l32r_opcode ()
2404 || xtensa_operand_get_field (isa, old_op, 0, fmt, 0,
2405 sbuff, &dest_reg) != 0)
2407 *error_message = "cannot extract L32R destination for TLS access";
2412 case R_XTENSA_TLS_CALL:
2413 if (! get_indirect_call_dest_reg (old_op, &dest_reg)
2414 || xtensa_operand_get_field (isa, old_op, 0, fmt, 0,
2415 sbuff, &src_reg) != 0)
2417 *error_message = "cannot extract CALLXn operands for TLS access";
2430 case R_XTENSA_TLS_FUNC:
2431 case R_XTENSA_TLS_ARG:
2432 /* Change the instruction to a NOP (or "OR a1, a1, a1" for older
2433 versions of Xtensa). */
2434 new_op = xtensa_opcode_lookup (isa, "nop");
2435 if (new_op == XTENSA_UNDEFINED)
2437 new_op = xtensa_opcode_lookup (isa, "or");
2438 if (new_op == XTENSA_UNDEFINED
2439 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2440 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2442 || xtensa_operand_set_field (isa, new_op, 1, fmt, 0,
2444 || xtensa_operand_set_field (isa, new_op, 2, fmt, 0,
2447 *error_message = "cannot encode OR for TLS access";
2453 if (xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0)
2455 *error_message = "cannot encode NOP for TLS access";
2461 case R_XTENSA_TLS_CALL:
2462 /* Read THREADPTR into the CALLX's return value register. */
2463 new_op = xtensa_opcode_lookup (isa, "rur.threadptr");
2464 if (new_op == XTENSA_UNDEFINED
2465 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2466 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2467 sbuff, dest_reg + 2) != 0)
2469 *error_message = "cannot encode RUR.THREADPTR for TLS access";
2479 case R_XTENSA_TLS_FUNC:
2480 new_op = xtensa_opcode_lookup (isa, "rur.threadptr");
2481 if (new_op == XTENSA_UNDEFINED
2482 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2483 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2484 sbuff, dest_reg) != 0)
2486 *error_message = "cannot encode RUR.THREADPTR for TLS access";
2491 case R_XTENSA_TLS_ARG:
2492 /* Nothing to do. Keep the original L32R instruction. */
2495 case R_XTENSA_TLS_CALL:
2496 /* Add the CALLX's src register (holding the THREADPTR value)
2497 to the first argument register (holding the offset) and put
2498 the result in the CALLX's return value register. */
2499 new_op = xtensa_opcode_lookup (isa, "add");
2500 if (new_op == XTENSA_UNDEFINED
2501 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2502 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2503 sbuff, dest_reg + 2) != 0
2504 || xtensa_operand_set_field (isa, new_op, 1, fmt, 0,
2505 sbuff, dest_reg + 2) != 0
2506 || xtensa_operand_set_field (isa, new_op, 2, fmt, 0,
2507 sbuff, src_reg) != 0)
2509 *error_message = "cannot encode ADD for TLS access";
2516 xtensa_format_set_slot (isa, fmt, 0, ibuff, sbuff);
2517 xtensa_insnbuf_to_chars (isa, ibuff, contents + rel->r_offset,
2518 input_size - rel->r_offset);
2524 #define IS_XTENSA_TLS_RELOC(R_TYPE) \
2525 ((R_TYPE) == R_XTENSA_TLSDESC_FN \
2526 || (R_TYPE) == R_XTENSA_TLSDESC_ARG \
2527 || (R_TYPE) == R_XTENSA_TLS_DTPOFF \
2528 || (R_TYPE) == R_XTENSA_TLS_TPOFF \
2529 || (R_TYPE) == R_XTENSA_TLS_FUNC \
2530 || (R_TYPE) == R_XTENSA_TLS_ARG \
2531 || (R_TYPE) == R_XTENSA_TLS_CALL)
2533 /* Relocate an Xtensa ELF section. This is invoked by the linker for
2534 both relocatable and final links. */
2537 elf_xtensa_relocate_section (bfd *output_bfd,
2538 struct bfd_link_info *info,
2540 asection *input_section,
2542 Elf_Internal_Rela *relocs,
2543 Elf_Internal_Sym *local_syms,
2544 asection **local_sections)
2546 struct elf_xtensa_link_hash_table *htab;
2547 Elf_Internal_Shdr *symtab_hdr;
2548 Elf_Internal_Rela *rel;
2549 Elf_Internal_Rela *relend;
2550 struct elf_link_hash_entry **sym_hashes;
2551 property_table_entry *lit_table = 0;
2553 char *local_got_tls_types;
2554 char *error_message = NULL;
2555 bfd_size_type input_size;
2558 if (!xtensa_default_isa)
2559 xtensa_default_isa = xtensa_isa_init (0, 0);
2561 BFD_ASSERT (is_xtensa_elf (input_bfd));
2563 htab = elf_xtensa_hash_table (info);
2567 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2568 sym_hashes = elf_sym_hashes (input_bfd);
2569 local_got_tls_types = elf_xtensa_local_got_tls_type (input_bfd);
2571 if (elf_hash_table (info)->dynamic_sections_created)
2573 ltblsize = xtensa_read_table_entries (input_bfd, input_section,
2574 &lit_table, XTENSA_LIT_SEC_NAME,
2580 input_size = bfd_get_section_limit (input_bfd, input_section);
2583 relend = relocs + input_section->reloc_count;
2584 for (; rel < relend; rel++)
2587 reloc_howto_type *howto;
2588 unsigned long r_symndx;
2589 struct elf_link_hash_entry *h;
2590 Elf_Internal_Sym *sym;
2595 bfd_reloc_status_type r;
2596 bfd_boolean is_weak_undef;
2597 bfd_boolean unresolved_reloc;
2599 bfd_boolean dynamic_symbol;
2601 r_type = ELF32_R_TYPE (rel->r_info);
2602 if (r_type == (int) R_XTENSA_GNU_VTINHERIT
2603 || r_type == (int) R_XTENSA_GNU_VTENTRY)
2606 if (r_type < 0 || r_type >= (int) R_XTENSA_max)
2608 bfd_set_error (bfd_error_bad_value);
2611 howto = &elf_howto_table[r_type];
2613 r_symndx = ELF32_R_SYM (rel->r_info);
2618 is_weak_undef = FALSE;
2619 unresolved_reloc = FALSE;
2622 if (howto->partial_inplace && !info->relocatable)
2624 /* Because R_XTENSA_32 was made partial_inplace to fix some
2625 problems with DWARF info in partial links, there may be
2626 an addend stored in the contents. Take it out of there
2627 and move it back into the addend field of the reloc. */
2628 rel->r_addend += bfd_get_32 (input_bfd, contents + rel->r_offset);
2629 bfd_put_32 (input_bfd, 0, contents + rel->r_offset);
2632 if (r_symndx < symtab_hdr->sh_info)
2634 sym = local_syms + r_symndx;
2635 sym_type = ELF32_ST_TYPE (sym->st_info);
2636 sec = local_sections[r_symndx];
2637 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2641 bfd_boolean ignored;
2643 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2644 r_symndx, symtab_hdr, sym_hashes,
2646 unresolved_reloc, warned, ignored);
2649 && !unresolved_reloc
2650 && h->root.type == bfd_link_hash_undefweak)
2651 is_weak_undef = TRUE;
2656 if (sec != NULL && discarded_section (sec))
2657 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2658 rel, 1, relend, howto, 0, contents);
2660 if (info->relocatable)
2663 asection * sym_sec = get_elf_r_symndx_section (input_bfd, r_symndx);
2665 /* This is a relocatable link.
2666 1) If the reloc is against a section symbol, adjust
2667 according to the output section.
2668 2) If there is a new target for this relocation,
2669 the new target will be in the same output section.
2670 We adjust the relocation by the output section
2673 if (relaxing_section)
2675 /* Check if this references a section in another input file. */
2676 if (!do_fix_for_relocatable_link (rel, input_bfd, input_section,
2681 dest_addr = sym_sec->output_section->vma + sym_sec->output_offset
2682 + get_elf_r_symndx_offset (input_bfd, r_symndx) + rel->r_addend;
2684 if (r_type == R_XTENSA_ASM_SIMPLIFY)
2686 error_message = NULL;
2687 /* Convert ASM_SIMPLIFY into the simpler relocation
2688 so that they never escape a relaxing link. */
2689 r = contract_asm_expansion (contents, input_size, rel,
2691 if (r != bfd_reloc_ok)
2693 if (!((*info->callbacks->reloc_dangerous)
2694 (info, error_message, input_bfd, input_section,
2698 r_type = ELF32_R_TYPE (rel->r_info);
2701 /* This is a relocatable link, so we don't have to change
2702 anything unless the reloc is against a section symbol,
2703 in which case we have to adjust according to where the
2704 section symbol winds up in the output section. */
2705 if (r_symndx < symtab_hdr->sh_info)
2707 sym = local_syms + r_symndx;
2708 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
2710 sec = local_sections[r_symndx];
2711 rel->r_addend += sec->output_offset + sym->st_value;
2715 /* If there is an addend with a partial_inplace howto,
2716 then move the addend to the contents. This is a hack
2717 to work around problems with DWARF in relocatable links
2718 with some previous version of BFD. Now we can't easily get
2719 rid of the hack without breaking backward compatibility.... */
2721 howto = &elf_howto_table[r_type];
2722 if (howto->partial_inplace && rel->r_addend)
2724 r = elf_xtensa_do_reloc (howto, input_bfd, input_section,
2725 rel->r_addend, contents,
2726 rel->r_offset, FALSE,
2732 /* Put the correct bits in the target instruction, even
2733 though the relocation will still be present in the output
2734 file. This makes disassembly clearer, as well as
2735 allowing loadable kernel modules to work without needing
2736 relocations on anything other than calls and l32r's. */
2738 /* If it is not in the same section, there is nothing we can do. */
2739 if (r_type >= R_XTENSA_SLOT0_OP && r_type <= R_XTENSA_SLOT14_OP &&
2740 sym_sec->output_section == input_section->output_section)
2742 r = elf_xtensa_do_reloc (howto, input_bfd, input_section,
2743 dest_addr, contents,
2744 rel->r_offset, FALSE,
2748 if (r != bfd_reloc_ok)
2750 if (!((*info->callbacks->reloc_dangerous)
2751 (info, error_message, input_bfd, input_section,
2756 /* Done with work for relocatable link; continue with next reloc. */
2760 /* This is a final link. */
2762 if (relaxing_section)
2764 /* Check if this references a section in another input file. */
2765 do_fix_for_final_link (rel, input_bfd, input_section, contents,
2769 /* Sanity check the address. */
2770 if (rel->r_offset >= input_size
2771 && ELF32_R_TYPE (rel->r_info) != R_XTENSA_NONE)
2773 (*_bfd_error_handler)
2774 (_("%B(%A+0x%lx): relocation offset out of range (size=0x%x)"),
2775 input_bfd, input_section, rel->r_offset, input_size);
2776 bfd_set_error (bfd_error_bad_value);
2781 name = h->root.root.string;
2784 name = (bfd_elf_string_from_elf_section
2785 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2786 if (name == NULL || *name == '\0')
2787 name = bfd_section_name (input_bfd, sec);
2790 if (r_symndx != STN_UNDEF
2791 && r_type != R_XTENSA_NONE
2793 || h->root.type == bfd_link_hash_defined
2794 || h->root.type == bfd_link_hash_defweak)
2795 && IS_XTENSA_TLS_RELOC (r_type) != (sym_type == STT_TLS))
2797 (*_bfd_error_handler)
2798 ((sym_type == STT_TLS
2799 ? _("%B(%A+0x%lx): %s used with TLS symbol %s")
2800 : _("%B(%A+0x%lx): %s used with non-TLS symbol %s")),
2803 (long) rel->r_offset,
2808 dynamic_symbol = elf_xtensa_dynamic_symbol_p (h, info);
2810 tls_type = GOT_UNKNOWN;
2812 tls_type = elf_xtensa_hash_entry (h)->tls_type;
2813 else if (local_got_tls_types)
2814 tls_type = local_got_tls_types [r_symndx];
2820 if (elf_hash_table (info)->dynamic_sections_created
2821 && (input_section->flags & SEC_ALLOC) != 0
2822 && (dynamic_symbol || info->shared))
2824 Elf_Internal_Rela outrel;
2828 if (dynamic_symbol && r_type == R_XTENSA_PLT)
2829 srel = htab->srelplt;
2831 srel = htab->srelgot;
2833 BFD_ASSERT (srel != NULL);
2836 _bfd_elf_section_offset (output_bfd, info,
2837 input_section, rel->r_offset);
2839 if ((outrel.r_offset | 1) == (bfd_vma) -1)
2840 memset (&outrel, 0, sizeof outrel);
2843 outrel.r_offset += (input_section->output_section->vma
2844 + input_section->output_offset);
2846 /* Complain if the relocation is in a read-only section
2847 and not in a literal pool. */
2848 if ((input_section->flags & SEC_READONLY) != 0
2849 && !elf_xtensa_in_literal_pool (lit_table, ltblsize,
2853 _("dynamic relocation in read-only section");
2854 if (!((*info->callbacks->reloc_dangerous)
2855 (info, error_message, input_bfd, input_section,
2862 outrel.r_addend = rel->r_addend;
2865 if (r_type == R_XTENSA_32)
2868 ELF32_R_INFO (h->dynindx, R_XTENSA_GLOB_DAT);
2871 else /* r_type == R_XTENSA_PLT */
2874 ELF32_R_INFO (h->dynindx, R_XTENSA_JMP_SLOT);
2876 /* Create the PLT entry and set the initial
2877 contents of the literal entry to the address of
2880 elf_xtensa_create_plt_entry (info, output_bfd,
2883 unresolved_reloc = FALSE;
2887 /* Generate a RELATIVE relocation. */
2888 outrel.r_info = ELF32_R_INFO (0, R_XTENSA_RELATIVE);
2889 outrel.r_addend = 0;
2893 loc = (srel->contents
2894 + srel->reloc_count++ * sizeof (Elf32_External_Rela));
2895 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2896 BFD_ASSERT (sizeof (Elf32_External_Rela) * srel->reloc_count
2899 else if (r_type == R_XTENSA_ASM_EXPAND && dynamic_symbol)
2901 /* This should only happen for non-PIC code, which is not
2902 supposed to be used on systems with dynamic linking.
2903 Just ignore these relocations. */
2908 case R_XTENSA_TLS_TPOFF:
2909 /* Switch to LE model for local symbols in an executable. */
2910 if (! info->shared && ! dynamic_symbol)
2912 relocation = tpoff (info, relocation);
2917 case R_XTENSA_TLSDESC_FN:
2918 case R_XTENSA_TLSDESC_ARG:
2920 if (r_type == R_XTENSA_TLSDESC_FN)
2922 if (! info->shared || (tls_type & GOT_TLS_IE) != 0)
2923 r_type = R_XTENSA_NONE;
2925 else if (r_type == R_XTENSA_TLSDESC_ARG)
2929 if ((tls_type & GOT_TLS_IE) != 0)
2930 r_type = R_XTENSA_TLS_TPOFF;
2934 r_type = R_XTENSA_TLS_TPOFF;
2935 if (! dynamic_symbol)
2937 relocation = tpoff (info, relocation);
2943 if (r_type == R_XTENSA_NONE)
2944 /* Nothing to do here; skip to the next reloc. */
2947 if (! elf_hash_table (info)->dynamic_sections_created)
2950 _("TLS relocation invalid without dynamic sections");
2951 if (!((*info->callbacks->reloc_dangerous)
2952 (info, error_message, input_bfd, input_section,
2958 Elf_Internal_Rela outrel;
2960 asection *srel = htab->srelgot;
2963 outrel.r_offset = (input_section->output_section->vma
2964 + input_section->output_offset
2967 /* Complain if the relocation is in a read-only section
2968 and not in a literal pool. */
2969 if ((input_section->flags & SEC_READONLY) != 0
2970 && ! elf_xtensa_in_literal_pool (lit_table, ltblsize,
2974 _("dynamic relocation in read-only section");
2975 if (!((*info->callbacks->reloc_dangerous)
2976 (info, error_message, input_bfd, input_section,
2981 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2983 outrel.r_addend = relocation - dtpoff_base (info);
2985 outrel.r_addend = 0;
2988 outrel.r_info = ELF32_R_INFO (indx, r_type);
2990 unresolved_reloc = FALSE;
2993 loc = (srel->contents
2994 + srel->reloc_count++ * sizeof (Elf32_External_Rela));
2995 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2996 BFD_ASSERT (sizeof (Elf32_External_Rela) * srel->reloc_count
3002 case R_XTENSA_TLS_DTPOFF:
3004 /* Switch from LD model to LE model. */
3005 relocation = tpoff (info, relocation);
3007 relocation -= dtpoff_base (info);
3010 case R_XTENSA_TLS_FUNC:
3011 case R_XTENSA_TLS_ARG:
3012 case R_XTENSA_TLS_CALL:
3013 /* Check if optimizing to IE or LE model. */
3014 if ((tls_type & GOT_TLS_IE) != 0)
3016 bfd_boolean is_ld_model =
3017 (h && elf_xtensa_hash_entry (h) == htab->tlsbase);
3018 if (! replace_tls_insn (rel, input_bfd, input_section, contents,
3019 is_ld_model, &error_message))
3021 if (!((*info->callbacks->reloc_dangerous)
3022 (info, error_message, input_bfd, input_section,
3027 if (r_type != R_XTENSA_TLS_ARG || is_ld_model)
3029 /* Skip subsequent relocations on the same instruction. */
3030 while (rel + 1 < relend && rel[1].r_offset == rel->r_offset)
3037 if (elf_hash_table (info)->dynamic_sections_created
3038 && dynamic_symbol && (is_operand_relocation (r_type)
3039 || r_type == R_XTENSA_32_PCREL))
3042 vsprint_msg ("invalid relocation for dynamic symbol", ": %s",
3043 strlen (name) + 2, name);
3044 if (!((*info->callbacks->reloc_dangerous)
3045 (info, error_message, input_bfd, input_section,
3053 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3054 because such sections are not SEC_ALLOC and thus ld.so will
3055 not process them. */
3056 if (unresolved_reloc
3057 && !((input_section->flags & SEC_DEBUGGING) != 0
3059 && _bfd_elf_section_offset (output_bfd, info, input_section,
3060 rel->r_offset) != (bfd_vma) -1)
3062 (*_bfd_error_handler)
3063 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
3066 (long) rel->r_offset,
3072 /* TLS optimizations may have changed r_type; update "howto". */
3073 howto = &elf_howto_table[r_type];
3075 /* There's no point in calling bfd_perform_relocation here.
3076 Just go directly to our "special function". */
3077 r = elf_xtensa_do_reloc (howto, input_bfd, input_section,
3078 relocation + rel->r_addend,
3079 contents, rel->r_offset, is_weak_undef,
3082 if (r != bfd_reloc_ok && !warned)
3084 BFD_ASSERT (r == bfd_reloc_dangerous || r == bfd_reloc_other);
3085 BFD_ASSERT (error_message != NULL);
3087 if (rel->r_addend == 0)
3088 error_message = vsprint_msg (error_message, ": %s",
3089 strlen (name) + 2, name);
3091 error_message = vsprint_msg (error_message, ": (%s+0x%x)",
3093 name, (int) rel->r_addend);
3095 if (!((*info->callbacks->reloc_dangerous)
3096 (info, error_message, input_bfd, input_section,
3105 input_section->reloc_done = TRUE;
3111 /* Finish up dynamic symbol handling. There's not much to do here since
3112 the PLT and GOT entries are all set up by relocate_section. */
3115 elf_xtensa_finish_dynamic_symbol (bfd *output_bfd ATTRIBUTE_UNUSED,
3116 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3117 struct elf_link_hash_entry *h,
3118 Elf_Internal_Sym *sym)
3120 if (h->needs_plt && !h->def_regular)
3122 /* Mark the symbol as undefined, rather than as defined in
3123 the .plt section. Leave the value alone. */
3124 sym->st_shndx = SHN_UNDEF;
3125 /* If the symbol is weak, we do need to clear the value.
3126 Otherwise, the PLT entry would provide a definition for
3127 the symbol even if the symbol wasn't defined anywhere,
3128 and so the symbol would never be NULL. */
3129 if (!h->ref_regular_nonweak)
3133 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3134 if (h == elf_hash_table (info)->hdynamic
3135 || h == elf_hash_table (info)->hgot)
3136 sym->st_shndx = SHN_ABS;
3142 /* Combine adjacent literal table entries in the output. Adjacent
3143 entries within each input section may have been removed during
3144 relaxation, but we repeat the process here, even though it's too late
3145 to shrink the output section, because it's important to minimize the
3146 number of literal table entries to reduce the start-up work for the
3147 runtime linker. Returns the number of remaining table entries or -1
3151 elf_xtensa_combine_prop_entries (bfd *output_bfd,
3156 property_table_entry *table;
3157 bfd_size_type section_size, sgotloc_size;
3161 section_size = sxtlit->size;
3162 BFD_ASSERT (section_size % 8 == 0);
3163 num = section_size / 8;
3165 sgotloc_size = sgotloc->size;
3166 if (sgotloc_size != section_size)
3168 (*_bfd_error_handler)
3169 (_("internal inconsistency in size of .got.loc section"));
3173 table = bfd_malloc (num * sizeof (property_table_entry));
3177 /* The ".xt.lit.plt" section has the SEC_IN_MEMORY flag set and this
3178 propagates to the output section, where it doesn't really apply and
3179 where it breaks the following call to bfd_malloc_and_get_section. */
3180 sxtlit->flags &= ~SEC_IN_MEMORY;
3182 if (!bfd_malloc_and_get_section (output_bfd, sxtlit, &contents))
3190 /* There should never be any relocations left at this point, so this
3191 is quite a bit easier than what is done during relaxation. */
3193 /* Copy the raw contents into a property table array and sort it. */
3195 for (n = 0; n < num; n++)
3197 table[n].address = bfd_get_32 (output_bfd, &contents[offset]);
3198 table[n].size = bfd_get_32 (output_bfd, &contents[offset + 4]);
3201 qsort (table, num, sizeof (property_table_entry), property_table_compare);
3203 for (n = 0; n < num; n++)
3205 bfd_boolean remove_entry = FALSE;
3207 if (table[n].size == 0)
3208 remove_entry = TRUE;
3210 && (table[n-1].address + table[n-1].size == table[n].address))
3212 table[n-1].size += table[n].size;
3213 remove_entry = TRUE;
3218 for (m = n; m < num - 1; m++)
3220 table[m].address = table[m+1].address;
3221 table[m].size = table[m+1].size;
3229 /* Copy the data back to the raw contents. */
3231 for (n = 0; n < num; n++)
3233 bfd_put_32 (output_bfd, table[n].address, &contents[offset]);
3234 bfd_put_32 (output_bfd, table[n].size, &contents[offset + 4]);
3238 /* Clear the removed bytes. */
3239 if ((bfd_size_type) (num * 8) < section_size)
3240 memset (&contents[num * 8], 0, section_size - num * 8);
3242 if (! bfd_set_section_contents (output_bfd, sxtlit, contents, 0,
3246 /* Copy the contents to ".got.loc". */
3247 memcpy (sgotloc->contents, contents, section_size);
3255 /* Finish up the dynamic sections. */
3258 elf_xtensa_finish_dynamic_sections (bfd *output_bfd,
3259 struct bfd_link_info *info)
3261 struct elf_xtensa_link_hash_table *htab;
3263 asection *sdyn, *srelplt, *sgot, *sxtlit, *sgotloc;
3264 Elf32_External_Dyn *dyncon, *dynconend;
3265 int num_xtlit_entries = 0;
3267 if (! elf_hash_table (info)->dynamic_sections_created)
3270 htab = elf_xtensa_hash_table (info);
3274 dynobj = elf_hash_table (info)->dynobj;
3275 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3276 BFD_ASSERT (sdyn != NULL);
3278 /* Set the first entry in the global offset table to the address of
3279 the dynamic section. */
3283 BFD_ASSERT (sgot->size == 4);
3285 bfd_put_32 (output_bfd, 0, sgot->contents);
3287 bfd_put_32 (output_bfd,
3288 sdyn->output_section->vma + sdyn->output_offset,
3292 srelplt = htab->srelplt;
3293 if (srelplt && srelplt->size != 0)
3295 asection *sgotplt, *srelgot, *spltlittbl;
3296 int chunk, plt_chunks, plt_entries;
3297 Elf_Internal_Rela irela;
3299 unsigned rtld_reloc;
3301 srelgot = htab->srelgot;
3302 spltlittbl = htab->spltlittbl;
3303 BFD_ASSERT (srelgot != NULL && spltlittbl != NULL);
3305 /* Find the first XTENSA_RTLD relocation. Presumably the rest
3306 of them follow immediately after.... */
3307 for (rtld_reloc = 0; rtld_reloc < srelgot->reloc_count; rtld_reloc++)
3309 loc = srelgot->contents + rtld_reloc * sizeof (Elf32_External_Rela);
3310 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3311 if (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD)
3314 BFD_ASSERT (rtld_reloc < srelgot->reloc_count);
3316 plt_entries = srelplt->size / sizeof (Elf32_External_Rela);
3318 (plt_entries + PLT_ENTRIES_PER_CHUNK - 1) / PLT_ENTRIES_PER_CHUNK;
3320 for (chunk = 0; chunk < plt_chunks; chunk++)
3322 int chunk_entries = 0;
3324 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
3325 BFD_ASSERT (sgotplt != NULL);
3327 /* Emit special RTLD relocations for the first two entries in
3328 each chunk of the .got.plt section. */
3330 loc = srelgot->contents + rtld_reloc * sizeof (Elf32_External_Rela);
3331 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3332 BFD_ASSERT (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD);
3333 irela.r_offset = (sgotplt->output_section->vma
3334 + sgotplt->output_offset);
3335 irela.r_addend = 1; /* tell rtld to set value to resolver function */
3336 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
3338 BFD_ASSERT (rtld_reloc <= srelgot->reloc_count);
3340 /* Next literal immediately follows the first. */
3341 loc += sizeof (Elf32_External_Rela);
3342 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3343 BFD_ASSERT (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD);
3344 irela.r_offset = (sgotplt->output_section->vma
3345 + sgotplt->output_offset + 4);
3346 /* Tell rtld to set value to object's link map. */
3348 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
3350 BFD_ASSERT (rtld_reloc <= srelgot->reloc_count);
3352 /* Fill in the literal table. */
3353 if (chunk < plt_chunks - 1)
3354 chunk_entries = PLT_ENTRIES_PER_CHUNK;
3356 chunk_entries = plt_entries - (chunk * PLT_ENTRIES_PER_CHUNK);
3358 BFD_ASSERT ((unsigned) (chunk + 1) * 8 <= spltlittbl->size);
3359 bfd_put_32 (output_bfd,
3360 sgotplt->output_section->vma + sgotplt->output_offset,
3361 spltlittbl->contents + (chunk * 8) + 0);
3362 bfd_put_32 (output_bfd,
3363 8 + (chunk_entries * 4),
3364 spltlittbl->contents + (chunk * 8) + 4);
3367 /* All the dynamic relocations have been emitted at this point.
3368 Make sure the relocation sections are the correct size. */
3369 if (srelgot->size != (sizeof (Elf32_External_Rela)
3370 * srelgot->reloc_count)
3371 || srelplt->size != (sizeof (Elf32_External_Rela)
3372 * srelplt->reloc_count))
3375 /* The .xt.lit.plt section has just been modified. This must
3376 happen before the code below which combines adjacent literal
3377 table entries, and the .xt.lit.plt contents have to be forced to
3379 if (! bfd_set_section_contents (output_bfd,
3380 spltlittbl->output_section,
3381 spltlittbl->contents,
3382 spltlittbl->output_offset,
3385 /* Clear SEC_HAS_CONTENTS so the contents won't be output again. */
3386 spltlittbl->flags &= ~SEC_HAS_CONTENTS;
3389 /* Combine adjacent literal table entries. */
3390 BFD_ASSERT (! info->relocatable);
3391 sxtlit = bfd_get_section_by_name (output_bfd, ".xt.lit");
3392 sgotloc = htab->sgotloc;
3393 BFD_ASSERT (sgotloc);
3397 elf_xtensa_combine_prop_entries (output_bfd, sxtlit, sgotloc);
3398 if (num_xtlit_entries < 0)
3402 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3403 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3404 for (; dyncon < dynconend; dyncon++)
3406 Elf_Internal_Dyn dyn;
3408 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3415 case DT_XTENSA_GOT_LOC_SZ:
3416 dyn.d_un.d_val = num_xtlit_entries;
3419 case DT_XTENSA_GOT_LOC_OFF:
3420 dyn.d_un.d_ptr = htab->sgotloc->output_section->vma;
3424 dyn.d_un.d_ptr = htab->sgot->output_section->vma;
3428 dyn.d_un.d_ptr = htab->srelplt->output_section->vma;
3432 dyn.d_un.d_val = htab->srelplt->output_section->size;
3436 /* Adjust RELASZ to not include JMPREL. This matches what
3437 glibc expects and what is done for several other ELF
3438 targets (e.g., i386, alpha), but the "correct" behavior
3439 seems to be unresolved. Since the linker script arranges
3440 for .rela.plt to follow all other relocation sections, we
3441 don't have to worry about changing the DT_RELA entry. */
3443 dyn.d_un.d_val -= htab->srelplt->output_section->size;
3447 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3454 /* Functions for dealing with the e_flags field. */
3456 /* Merge backend specific data from an object file to the output
3457 object file when linking. */
3460 elf_xtensa_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
3462 unsigned out_mach, in_mach;
3463 flagword out_flag, in_flag;
3465 /* Check if we have the same endianness. */
3466 if (!_bfd_generic_verify_endian_match (ibfd, obfd))
3469 /* Don't even pretend to support mixed-format linking. */
3470 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3471 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
3474 out_flag = elf_elfheader (obfd)->e_flags;
3475 in_flag = elf_elfheader (ibfd)->e_flags;
3477 out_mach = out_flag & EF_XTENSA_MACH;
3478 in_mach = in_flag & EF_XTENSA_MACH;
3479 if (out_mach != in_mach)
3481 (*_bfd_error_handler)
3482 (_("%B: incompatible machine type. Output is 0x%x. Input is 0x%x"),
3483 ibfd, out_mach, in_mach);
3484 bfd_set_error (bfd_error_wrong_format);
3488 if (! elf_flags_init (obfd))
3490 elf_flags_init (obfd) = TRUE;
3491 elf_elfheader (obfd)->e_flags = in_flag;
3493 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
3494 && bfd_get_arch_info (obfd)->the_default)
3495 return bfd_set_arch_mach (obfd, bfd_get_arch (ibfd),
3496 bfd_get_mach (ibfd));
3501 if ((out_flag & EF_XTENSA_XT_INSN) != (in_flag & EF_XTENSA_XT_INSN))
3502 elf_elfheader (obfd)->e_flags &= (~ EF_XTENSA_XT_INSN);
3504 if ((out_flag & EF_XTENSA_XT_LIT) != (in_flag & EF_XTENSA_XT_LIT))
3505 elf_elfheader (obfd)->e_flags &= (~ EF_XTENSA_XT_LIT);
3512 elf_xtensa_set_private_flags (bfd *abfd, flagword flags)
3514 BFD_ASSERT (!elf_flags_init (abfd)
3515 || elf_elfheader (abfd)->e_flags == flags);
3517 elf_elfheader (abfd)->e_flags |= flags;
3518 elf_flags_init (abfd) = TRUE;
3525 elf_xtensa_print_private_bfd_data (bfd *abfd, void *farg)
3527 FILE *f = (FILE *) farg;
3528 flagword e_flags = elf_elfheader (abfd)->e_flags;
3530 fprintf (f, "\nXtensa header:\n");
3531 if ((e_flags & EF_XTENSA_MACH) == E_XTENSA_MACH)
3532 fprintf (f, "\nMachine = Base\n");
3534 fprintf (f, "\nMachine Id = 0x%x\n", e_flags & EF_XTENSA_MACH);
3536 fprintf (f, "Insn tables = %s\n",
3537 (e_flags & EF_XTENSA_XT_INSN) ? "true" : "false");
3539 fprintf (f, "Literal tables = %s\n",
3540 (e_flags & EF_XTENSA_XT_LIT) ? "true" : "false");
3542 return _bfd_elf_print_private_bfd_data (abfd, farg);
3546 /* Set the right machine number for an Xtensa ELF file. */
3549 elf_xtensa_object_p (bfd *abfd)
3552 unsigned long arch = elf_elfheader (abfd)->e_flags & EF_XTENSA_MACH;
3557 mach = bfd_mach_xtensa;
3563 (void) bfd_default_set_arch_mach (abfd, bfd_arch_xtensa, mach);
3568 /* The final processing done just before writing out an Xtensa ELF object
3569 file. This gets the Xtensa architecture right based on the machine
3573 elf_xtensa_final_write_processing (bfd *abfd,
3574 bfd_boolean linker ATTRIBUTE_UNUSED)
3579 switch (mach = bfd_get_mach (abfd))
3581 case bfd_mach_xtensa:
3582 val = E_XTENSA_MACH;
3588 elf_elfheader (abfd)->e_flags &= (~ EF_XTENSA_MACH);
3589 elf_elfheader (abfd)->e_flags |= val;
3593 static enum elf_reloc_type_class
3594 elf_xtensa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3595 const asection *rel_sec ATTRIBUTE_UNUSED,
3596 const Elf_Internal_Rela *rela)
3598 switch ((int) ELF32_R_TYPE (rela->r_info))
3600 case R_XTENSA_RELATIVE:
3601 return reloc_class_relative;
3602 case R_XTENSA_JMP_SLOT:
3603 return reloc_class_plt;
3605 return reloc_class_normal;
3611 elf_xtensa_discard_info_for_section (bfd *abfd,
3612 struct elf_reloc_cookie *cookie,
3613 struct bfd_link_info *info,
3617 bfd_vma offset, actual_offset;
3618 bfd_size_type removed_bytes = 0;
3619 bfd_size_type entry_size;
3621 if (sec->output_section
3622 && bfd_is_abs_section (sec->output_section))
3625 if (xtensa_is_proptable_section (sec))
3630 if (sec->size == 0 || sec->size % entry_size != 0)
3633 contents = retrieve_contents (abfd, sec, info->keep_memory);
3637 cookie->rels = retrieve_internal_relocs (abfd, sec, info->keep_memory);
3640 release_contents (sec, contents);
3644 /* Sort the relocations. They should already be in order when
3645 relaxation is enabled, but it might not be. */
3646 qsort (cookie->rels, sec->reloc_count, sizeof (Elf_Internal_Rela),
3647 internal_reloc_compare);
3649 cookie->rel = cookie->rels;
3650 cookie->relend = cookie->rels + sec->reloc_count;
3652 for (offset = 0; offset < sec->size; offset += entry_size)
3654 actual_offset = offset - removed_bytes;
3656 /* The ...symbol_deleted_p function will skip over relocs but it
3657 won't adjust their offsets, so do that here. */
3658 while (cookie->rel < cookie->relend
3659 && cookie->rel->r_offset < offset)
3661 cookie->rel->r_offset -= removed_bytes;
3665 while (cookie->rel < cookie->relend
3666 && cookie->rel->r_offset == offset)
3668 if (bfd_elf_reloc_symbol_deleted_p (offset, cookie))
3670 /* Remove the table entry. (If the reloc type is NONE, then
3671 the entry has already been merged with another and deleted
3672 during relaxation.) */
3673 if (ELF32_R_TYPE (cookie->rel->r_info) != R_XTENSA_NONE)
3675 /* Shift the contents up. */
3676 if (offset + entry_size < sec->size)
3677 memmove (&contents[actual_offset],
3678 &contents[actual_offset + entry_size],
3679 sec->size - offset - entry_size);
3680 removed_bytes += entry_size;
3683 /* Remove this relocation. */
3684 cookie->rel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
3687 /* Adjust the relocation offset for previous removals. This
3688 should not be done before calling ...symbol_deleted_p
3689 because it might mess up the offset comparisons there.
3690 Make sure the offset doesn't underflow in the case where
3691 the first entry is removed. */
3692 if (cookie->rel->r_offset >= removed_bytes)
3693 cookie->rel->r_offset -= removed_bytes;
3695 cookie->rel->r_offset = 0;
3701 if (removed_bytes != 0)
3703 /* Adjust any remaining relocs (shouldn't be any). */
3704 for (; cookie->rel < cookie->relend; cookie->rel++)
3706 if (cookie->rel->r_offset >= removed_bytes)
3707 cookie->rel->r_offset -= removed_bytes;
3709 cookie->rel->r_offset = 0;
3712 /* Clear the removed bytes. */
3713 memset (&contents[sec->size - removed_bytes], 0, removed_bytes);
3715 pin_contents (sec, contents);
3716 pin_internal_relocs (sec, cookie->rels);
3719 if (sec->rawsize == 0)
3720 sec->rawsize = sec->size;
3721 sec->size -= removed_bytes;
3723 if (xtensa_is_littable_section (sec))
3725 asection *sgotloc = elf_xtensa_hash_table (info)->sgotloc;
3727 sgotloc->size -= removed_bytes;
3732 release_contents (sec, contents);
3733 release_internal_relocs (sec, cookie->rels);
3736 return (removed_bytes != 0);
3741 elf_xtensa_discard_info (bfd *abfd,
3742 struct elf_reloc_cookie *cookie,
3743 struct bfd_link_info *info)
3746 bfd_boolean changed = FALSE;
3748 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3750 if (xtensa_is_property_section (sec))
3752 if (elf_xtensa_discard_info_for_section (abfd, cookie, info, sec))
3762 elf_xtensa_ignore_discarded_relocs (asection *sec)
3764 return xtensa_is_property_section (sec);
3769 elf_xtensa_action_discarded (asection *sec)
3771 if (strcmp (".xt_except_table", sec->name) == 0)
3774 if (strcmp (".xt_except_desc", sec->name) == 0)
3777 return _bfd_elf_default_action_discarded (sec);
3781 /* Support for core dump NOTE sections. */
3784 elf_xtensa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3789 /* The size for Xtensa is variable, so don't try to recognize the format
3790 based on the size. Just assume this is GNU/Linux. */
3793 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3796 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
3800 size = note->descsz - offset - 4;
3802 /* Make a ".reg/999" section. */
3803 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3804 size, note->descpos + offset);
3809 elf_xtensa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3811 switch (note->descsz)
3816 case 128: /* GNU/Linux elf_prpsinfo */
3817 elf_tdata (abfd)->core->program
3818 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
3819 elf_tdata (abfd)->core->command
3820 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
3823 /* Note that for some reason, a spurious space is tacked
3824 onto the end of the args in some (at least one anyway)
3825 implementations, so strip it off if it exists. */
3828 char *command = elf_tdata (abfd)->core->command;
3829 int n = strlen (command);
3831 if (0 < n && command[n - 1] == ' ')
3832 command[n - 1] = '\0';
3839 /* Generic Xtensa configurability stuff. */
3841 static xtensa_opcode callx0_op = XTENSA_UNDEFINED;
3842 static xtensa_opcode callx4_op = XTENSA_UNDEFINED;
3843 static xtensa_opcode callx8_op = XTENSA_UNDEFINED;
3844 static xtensa_opcode callx12_op = XTENSA_UNDEFINED;
3845 static xtensa_opcode call0_op = XTENSA_UNDEFINED;
3846 static xtensa_opcode call4_op = XTENSA_UNDEFINED;
3847 static xtensa_opcode call8_op = XTENSA_UNDEFINED;
3848 static xtensa_opcode call12_op = XTENSA_UNDEFINED;
3851 init_call_opcodes (void)
3853 if (callx0_op == XTENSA_UNDEFINED)
3855 callx0_op = xtensa_opcode_lookup (xtensa_default_isa, "callx0");
3856 callx4_op = xtensa_opcode_lookup (xtensa_default_isa, "callx4");
3857 callx8_op = xtensa_opcode_lookup (xtensa_default_isa, "callx8");
3858 callx12_op = xtensa_opcode_lookup (xtensa_default_isa, "callx12");
3859 call0_op = xtensa_opcode_lookup (xtensa_default_isa, "call0");
3860 call4_op = xtensa_opcode_lookup (xtensa_default_isa, "call4");
3861 call8_op = xtensa_opcode_lookup (xtensa_default_isa, "call8");
3862 call12_op = xtensa_opcode_lookup (xtensa_default_isa, "call12");
3868 is_indirect_call_opcode (xtensa_opcode opcode)
3870 init_call_opcodes ();
3871 return (opcode == callx0_op
3872 || opcode == callx4_op
3873 || opcode == callx8_op
3874 || opcode == callx12_op);
3879 is_direct_call_opcode (xtensa_opcode opcode)
3881 init_call_opcodes ();
3882 return (opcode == call0_op
3883 || opcode == call4_op
3884 || opcode == call8_op
3885 || opcode == call12_op);
3890 is_windowed_call_opcode (xtensa_opcode opcode)
3892 init_call_opcodes ();
3893 return (opcode == call4_op
3894 || opcode == call8_op
3895 || opcode == call12_op
3896 || opcode == callx4_op
3897 || opcode == callx8_op
3898 || opcode == callx12_op);
3903 get_indirect_call_dest_reg (xtensa_opcode opcode, unsigned *pdst)
3905 unsigned dst = (unsigned) -1;
3907 init_call_opcodes ();
3908 if (opcode == callx0_op)
3910 else if (opcode == callx4_op)
3912 else if (opcode == callx8_op)
3914 else if (opcode == callx12_op)
3917 if (dst == (unsigned) -1)
3925 static xtensa_opcode
3926 get_const16_opcode (void)
3928 static bfd_boolean done_lookup = FALSE;
3929 static xtensa_opcode const16_opcode = XTENSA_UNDEFINED;
3932 const16_opcode = xtensa_opcode_lookup (xtensa_default_isa, "const16");
3935 return const16_opcode;
3939 static xtensa_opcode
3940 get_l32r_opcode (void)
3942 static xtensa_opcode l32r_opcode = XTENSA_UNDEFINED;
3943 static bfd_boolean done_lookup = FALSE;
3947 l32r_opcode = xtensa_opcode_lookup (xtensa_default_isa, "l32r");
3955 l32r_offset (bfd_vma addr, bfd_vma pc)
3959 offset = addr - ((pc+3) & -4);
3960 BFD_ASSERT ((offset & ((1 << 2) - 1)) == 0);
3961 offset = (signed int) offset >> 2;
3962 BFD_ASSERT ((signed int) offset >> 16 == -1);
3968 get_relocation_opnd (xtensa_opcode opcode, int r_type)
3970 xtensa_isa isa = xtensa_default_isa;
3971 int last_immed, last_opnd, opi;
3973 if (opcode == XTENSA_UNDEFINED)
3974 return XTENSA_UNDEFINED;
3976 /* Find the last visible PC-relative immediate operand for the opcode.
3977 If there are no PC-relative immediates, then choose the last visible
3978 immediate; otherwise, fail and return XTENSA_UNDEFINED. */
3979 last_immed = XTENSA_UNDEFINED;
3980 last_opnd = xtensa_opcode_num_operands (isa, opcode);
3981 for (opi = last_opnd - 1; opi >= 0; opi--)
3983 if (xtensa_operand_is_visible (isa, opcode, opi) == 0)
3985 if (xtensa_operand_is_PCrelative (isa, opcode, opi) == 1)
3990 if (last_immed == XTENSA_UNDEFINED
3991 && xtensa_operand_is_register (isa, opcode, opi) == 0)
3995 return XTENSA_UNDEFINED;
3997 /* If the operand number was specified in an old-style relocation,
3998 check for consistency with the operand computed above. */
3999 if (r_type >= R_XTENSA_OP0 && r_type <= R_XTENSA_OP2)
4001 int reloc_opnd = r_type - R_XTENSA_OP0;
4002 if (reloc_opnd != last_immed)
4003 return XTENSA_UNDEFINED;
4011 get_relocation_slot (int r_type)
4021 if (r_type >= R_XTENSA_SLOT0_OP && r_type <= R_XTENSA_SLOT14_OP)
4022 return r_type - R_XTENSA_SLOT0_OP;
4023 if (r_type >= R_XTENSA_SLOT0_ALT && r_type <= R_XTENSA_SLOT14_ALT)
4024 return r_type - R_XTENSA_SLOT0_ALT;
4028 return XTENSA_UNDEFINED;
4032 /* Get the opcode for a relocation. */
4034 static xtensa_opcode
4035 get_relocation_opcode (bfd *abfd,
4038 Elf_Internal_Rela *irel)
4040 static xtensa_insnbuf ibuff = NULL;
4041 static xtensa_insnbuf sbuff = NULL;
4042 xtensa_isa isa = xtensa_default_isa;
4046 if (contents == NULL)
4047 return XTENSA_UNDEFINED;
4049 if (bfd_get_section_limit (abfd, sec) <= irel->r_offset)
4050 return XTENSA_UNDEFINED;
4054 ibuff = xtensa_insnbuf_alloc (isa);
4055 sbuff = xtensa_insnbuf_alloc (isa);
4058 /* Decode the instruction. */
4059 xtensa_insnbuf_from_chars (isa, ibuff, &contents[irel->r_offset],
4060 sec->size - irel->r_offset);
4061 fmt = xtensa_format_decode (isa, ibuff);
4062 slot = get_relocation_slot (ELF32_R_TYPE (irel->r_info));
4063 if (slot == XTENSA_UNDEFINED)
4064 return XTENSA_UNDEFINED;
4065 xtensa_format_get_slot (isa, fmt, slot, ibuff, sbuff);
4066 return xtensa_opcode_decode (isa, fmt, slot, sbuff);
4071 is_l32r_relocation (bfd *abfd,
4074 Elf_Internal_Rela *irel)
4076 xtensa_opcode opcode;
4077 if (!is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
4079 opcode = get_relocation_opcode (abfd, sec, contents, irel);
4080 return (opcode == get_l32r_opcode ());
4084 static bfd_size_type
4085 get_asm_simplify_size (bfd_byte *contents,
4086 bfd_size_type content_len,
4087 bfd_size_type offset)
4089 bfd_size_type insnlen, size = 0;
4091 /* Decode the size of the next two instructions. */
4092 insnlen = insn_decode_len (contents, content_len, offset);
4098 insnlen = insn_decode_len (contents, content_len, offset + size);
4108 is_alt_relocation (int r_type)
4110 return (r_type >= R_XTENSA_SLOT0_ALT
4111 && r_type <= R_XTENSA_SLOT14_ALT);
4116 is_operand_relocation (int r_type)
4126 if (r_type >= R_XTENSA_SLOT0_OP && r_type <= R_XTENSA_SLOT14_OP)
4128 if (r_type >= R_XTENSA_SLOT0_ALT && r_type <= R_XTENSA_SLOT14_ALT)
4137 #define MIN_INSN_LENGTH 2
4139 /* Return 0 if it fails to decode. */
4142 insn_decode_len (bfd_byte *contents,
4143 bfd_size_type content_len,
4144 bfd_size_type offset)
4147 xtensa_isa isa = xtensa_default_isa;
4149 static xtensa_insnbuf ibuff = NULL;
4151 if (offset + MIN_INSN_LENGTH > content_len)
4155 ibuff = xtensa_insnbuf_alloc (isa);
4156 xtensa_insnbuf_from_chars (isa, ibuff, &contents[offset],
4157 content_len - offset);
4158 fmt = xtensa_format_decode (isa, ibuff);
4159 if (fmt == XTENSA_UNDEFINED)
4161 insn_len = xtensa_format_length (isa, fmt);
4162 if (insn_len == XTENSA_UNDEFINED)
4168 /* Decode the opcode for a single slot instruction.
4169 Return 0 if it fails to decode or the instruction is multi-slot. */
4172 insn_decode_opcode (bfd_byte *contents,
4173 bfd_size_type content_len,
4174 bfd_size_type offset,
4177 xtensa_isa isa = xtensa_default_isa;
4179 static xtensa_insnbuf insnbuf = NULL;
4180 static xtensa_insnbuf slotbuf = NULL;
4182 if (offset + MIN_INSN_LENGTH > content_len)
4183 return XTENSA_UNDEFINED;
4185 if (insnbuf == NULL)
4187 insnbuf = xtensa_insnbuf_alloc (isa);
4188 slotbuf = xtensa_insnbuf_alloc (isa);
4191 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4192 content_len - offset);
4193 fmt = xtensa_format_decode (isa, insnbuf);
4194 if (fmt == XTENSA_UNDEFINED)
4195 return XTENSA_UNDEFINED;
4197 if (slot >= xtensa_format_num_slots (isa, fmt))
4198 return XTENSA_UNDEFINED;
4200 xtensa_format_get_slot (isa, fmt, slot, insnbuf, slotbuf);
4201 return xtensa_opcode_decode (isa, fmt, slot, slotbuf);
4205 /* The offset is the offset in the contents.
4206 The address is the address of that offset. */
4209 check_branch_target_aligned (bfd_byte *contents,
4210 bfd_size_type content_length,
4214 bfd_size_type insn_len = insn_decode_len (contents, content_length, offset);
4217 return check_branch_target_aligned_address (address, insn_len);
4222 check_loop_aligned (bfd_byte *contents,
4223 bfd_size_type content_length,
4227 bfd_size_type loop_len, insn_len;
4228 xtensa_opcode opcode;
4230 opcode = insn_decode_opcode (contents, content_length, offset, 0);
4231 if (opcode == XTENSA_UNDEFINED
4232 || xtensa_opcode_is_loop (xtensa_default_isa, opcode) != 1)
4238 loop_len = insn_decode_len (contents, content_length, offset);
4239 insn_len = insn_decode_len (contents, content_length, offset + loop_len);
4240 if (loop_len == 0 || insn_len == 0)
4246 return check_branch_target_aligned_address (address + loop_len, insn_len);
4251 check_branch_target_aligned_address (bfd_vma addr, int len)
4254 return (addr % 8 == 0);
4255 return ((addr >> 2) == ((addr + len - 1) >> 2));
4259 /* Instruction widening and narrowing. */
4261 /* When FLIX is available we need to access certain instructions only
4262 when they are 16-bit or 24-bit instructions. This table caches
4263 information about such instructions by walking through all the
4264 opcodes and finding the smallest single-slot format into which each
4267 static xtensa_format *op_single_fmt_table = NULL;
4271 init_op_single_format_table (void)
4273 xtensa_isa isa = xtensa_default_isa;
4274 xtensa_insnbuf ibuf;
4275 xtensa_opcode opcode;
4279 if (op_single_fmt_table)
4282 ibuf = xtensa_insnbuf_alloc (isa);
4283 num_opcodes = xtensa_isa_num_opcodes (isa);
4285 op_single_fmt_table = (xtensa_format *)
4286 bfd_malloc (sizeof (xtensa_format) * num_opcodes);
4287 for (opcode = 0; opcode < num_opcodes; opcode++)
4289 op_single_fmt_table[opcode] = XTENSA_UNDEFINED;
4290 for (fmt = 0; fmt < xtensa_isa_num_formats (isa); fmt++)
4292 if (xtensa_format_num_slots (isa, fmt) == 1
4293 && xtensa_opcode_encode (isa, fmt, 0, ibuf, opcode) == 0)
4295 xtensa_opcode old_fmt = op_single_fmt_table[opcode];
4296 int fmt_length = xtensa_format_length (isa, fmt);
4297 if (old_fmt == XTENSA_UNDEFINED
4298 || fmt_length < xtensa_format_length (isa, old_fmt))
4299 op_single_fmt_table[opcode] = fmt;
4303 xtensa_insnbuf_free (isa, ibuf);
4307 static xtensa_format
4308 get_single_format (xtensa_opcode opcode)
4310 init_op_single_format_table ();
4311 return op_single_fmt_table[opcode];
4315 /* For the set of narrowable instructions we do NOT include the
4316 narrowings beqz -> beqz.n or bnez -> bnez.n because of complexities
4317 involved during linker relaxation that may require these to
4318 re-expand in some conditions. Also, the narrowing "or" -> mov.n
4319 requires special case code to ensure it only works when op1 == op2. */
4327 struct string_pair narrowable[] =
4330 { "addi", "addi.n" },
4331 { "addmi", "addi.n" },
4332 { "l32i", "l32i.n" },
4333 { "movi", "movi.n" },
4335 { "retw", "retw.n" },
4336 { "s32i", "s32i.n" },
4337 { "or", "mov.n" } /* special case only when op1 == op2 */
4340 struct string_pair widenable[] =
4343 { "addi", "addi.n" },
4344 { "addmi", "addi.n" },
4345 { "beqz", "beqz.n" },
4346 { "bnez", "bnez.n" },
4347 { "l32i", "l32i.n" },
4348 { "movi", "movi.n" },
4350 { "retw", "retw.n" },
4351 { "s32i", "s32i.n" },
4352 { "or", "mov.n" } /* special case only when op1 == op2 */
4356 /* Check if an instruction can be "narrowed", i.e., changed from a standard
4357 3-byte instruction to a 2-byte "density" instruction. If it is valid,
4358 return the instruction buffer holding the narrow instruction. Otherwise,
4359 return 0. The set of valid narrowing are specified by a string table
4360 but require some special case operand checks in some cases. */
4362 static xtensa_insnbuf
4363 can_narrow_instruction (xtensa_insnbuf slotbuf,
4365 xtensa_opcode opcode)
4367 xtensa_isa isa = xtensa_default_isa;
4368 xtensa_format o_fmt;
4371 static xtensa_insnbuf o_insnbuf = NULL;
4372 static xtensa_insnbuf o_slotbuf = NULL;
4374 if (o_insnbuf == NULL)
4376 o_insnbuf = xtensa_insnbuf_alloc (isa);
4377 o_slotbuf = xtensa_insnbuf_alloc (isa);
4380 for (opi = 0; opi < (sizeof (narrowable)/sizeof (struct string_pair)); opi++)
4382 bfd_boolean is_or = (strcmp ("or", narrowable[opi].wide) == 0);
4384 if (opcode == xtensa_opcode_lookup (isa, narrowable[opi].wide))
4386 uint32 value, newval;
4387 int i, operand_count, o_operand_count;
4388 xtensa_opcode o_opcode;
4390 /* Address does not matter in this case. We might need to
4391 fix it to handle branches/jumps. */
4392 bfd_vma self_address = 0;
4394 o_opcode = xtensa_opcode_lookup (isa, narrowable[opi].narrow);
4395 if (o_opcode == XTENSA_UNDEFINED)
4397 o_fmt = get_single_format (o_opcode);
4398 if (o_fmt == XTENSA_UNDEFINED)
4401 if (xtensa_format_length (isa, fmt) != 3
4402 || xtensa_format_length (isa, o_fmt) != 2)
4405 xtensa_format_encode (isa, o_fmt, o_insnbuf);
4406 operand_count = xtensa_opcode_num_operands (isa, opcode);
4407 o_operand_count = xtensa_opcode_num_operands (isa, o_opcode);
4409 if (xtensa_opcode_encode (isa, o_fmt, 0, o_slotbuf, o_opcode) != 0)
4414 if (xtensa_opcode_num_operands (isa, o_opcode) != operand_count)
4419 uint32 rawval0, rawval1, rawval2;
4421 if (o_operand_count + 1 != operand_count
4422 || xtensa_operand_get_field (isa, opcode, 0,
4423 fmt, 0, slotbuf, &rawval0) != 0
4424 || xtensa_operand_get_field (isa, opcode, 1,
4425 fmt, 0, slotbuf, &rawval1) != 0
4426 || xtensa_operand_get_field (isa, opcode, 2,
4427 fmt, 0, slotbuf, &rawval2) != 0
4428 || rawval1 != rawval2
4429 || rawval0 == rawval1 /* it is a nop */)
4433 for (i = 0; i < o_operand_count; ++i)
4435 if (xtensa_operand_get_field (isa, opcode, i, fmt, 0,
4437 || xtensa_operand_decode (isa, opcode, i, &value))
4440 /* PC-relative branches need adjustment, but
4441 the PC-rel operand will always have a relocation. */
4443 if (xtensa_operand_do_reloc (isa, o_opcode, i, &newval,
4445 || xtensa_operand_encode (isa, o_opcode, i, &newval)
4446 || xtensa_operand_set_field (isa, o_opcode, i, o_fmt, 0,
4451 if (xtensa_format_set_slot (isa, o_fmt, 0, o_insnbuf, o_slotbuf))
4461 /* Attempt to narrow an instruction. If the narrowing is valid, perform
4462 the action in-place directly into the contents and return TRUE. Otherwise,
4463 the return value is FALSE and the contents are not modified. */
4466 narrow_instruction (bfd_byte *contents,
4467 bfd_size_type content_length,
4468 bfd_size_type offset)
4470 xtensa_opcode opcode;
4471 bfd_size_type insn_len;
4472 xtensa_isa isa = xtensa_default_isa;
4474 xtensa_insnbuf o_insnbuf;
4476 static xtensa_insnbuf insnbuf = NULL;
4477 static xtensa_insnbuf slotbuf = NULL;
4479 if (insnbuf == NULL)
4481 insnbuf = xtensa_insnbuf_alloc (isa);
4482 slotbuf = xtensa_insnbuf_alloc (isa);
4485 BFD_ASSERT (offset < content_length);
4487 if (content_length < 2)
4490 /* We will hand-code a few of these for a little while.
4491 These have all been specified in the assembler aleady. */
4492 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4493 content_length - offset);
4494 fmt = xtensa_format_decode (isa, insnbuf);
4495 if (xtensa_format_num_slots (isa, fmt) != 1)
4498 if (xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf) != 0)
4501 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4502 if (opcode == XTENSA_UNDEFINED)
4504 insn_len = xtensa_format_length (isa, fmt);
4505 if (insn_len > content_length)
4508 o_insnbuf = can_narrow_instruction (slotbuf, fmt, opcode);
4511 xtensa_insnbuf_to_chars (isa, o_insnbuf, contents + offset,
4512 content_length - offset);
4520 /* Check if an instruction can be "widened", i.e., changed from a 2-byte
4521 "density" instruction to a standard 3-byte instruction. If it is valid,
4522 return the instruction buffer holding the wide instruction. Otherwise,
4523 return 0. The set of valid widenings are specified by a string table
4524 but require some special case operand checks in some cases. */
4526 static xtensa_insnbuf
4527 can_widen_instruction (xtensa_insnbuf slotbuf,
4529 xtensa_opcode opcode)
4531 xtensa_isa isa = xtensa_default_isa;
4532 xtensa_format o_fmt;
4535 static xtensa_insnbuf o_insnbuf = NULL;
4536 static xtensa_insnbuf o_slotbuf = NULL;
4538 if (o_insnbuf == NULL)
4540 o_insnbuf = xtensa_insnbuf_alloc (isa);
4541 o_slotbuf = xtensa_insnbuf_alloc (isa);
4544 for (opi = 0; opi < (sizeof (widenable)/sizeof (struct string_pair)); opi++)
4546 bfd_boolean is_or = (strcmp ("or", widenable[opi].wide) == 0);
4547 bfd_boolean is_branch = (strcmp ("beqz", widenable[opi].wide) == 0
4548 || strcmp ("bnez", widenable[opi].wide) == 0);
4550 if (opcode == xtensa_opcode_lookup (isa, widenable[opi].narrow))
4552 uint32 value, newval;
4553 int i, operand_count, o_operand_count, check_operand_count;
4554 xtensa_opcode o_opcode;
4556 /* Address does not matter in this case. We might need to fix it
4557 to handle branches/jumps. */
4558 bfd_vma self_address = 0;
4560 o_opcode = xtensa_opcode_lookup (isa, widenable[opi].wide);
4561 if (o_opcode == XTENSA_UNDEFINED)
4563 o_fmt = get_single_format (o_opcode);
4564 if (o_fmt == XTENSA_UNDEFINED)
4567 if (xtensa_format_length (isa, fmt) != 2
4568 || xtensa_format_length (isa, o_fmt) != 3)
4571 xtensa_format_encode (isa, o_fmt, o_insnbuf);
4572 operand_count = xtensa_opcode_num_operands (isa, opcode);
4573 o_operand_count = xtensa_opcode_num_operands (isa, o_opcode);
4574 check_operand_count = o_operand_count;
4576 if (xtensa_opcode_encode (isa, o_fmt, 0, o_slotbuf, o_opcode) != 0)
4581 if (xtensa_opcode_num_operands (isa, o_opcode) != operand_count)
4586 uint32 rawval0, rawval1;
4588 if (o_operand_count != operand_count + 1
4589 || xtensa_operand_get_field (isa, opcode, 0,
4590 fmt, 0, slotbuf, &rawval0) != 0
4591 || xtensa_operand_get_field (isa, opcode, 1,
4592 fmt, 0, slotbuf, &rawval1) != 0
4593 || rawval0 == rawval1 /* it is a nop */)
4597 check_operand_count--;
4599 for (i = 0; i < check_operand_count; i++)
4602 if (is_or && i == o_operand_count - 1)
4604 if (xtensa_operand_get_field (isa, opcode, new_i, fmt, 0,
4606 || xtensa_operand_decode (isa, opcode, new_i, &value))
4609 /* PC-relative branches need adjustment, but
4610 the PC-rel operand will always have a relocation. */
4612 if (xtensa_operand_do_reloc (isa, o_opcode, i, &newval,
4614 || xtensa_operand_encode (isa, o_opcode, i, &newval)
4615 || xtensa_operand_set_field (isa, o_opcode, i, o_fmt, 0,
4620 if (xtensa_format_set_slot (isa, o_fmt, 0, o_insnbuf, o_slotbuf))
4630 /* Attempt to widen an instruction. If the widening is valid, perform
4631 the action in-place directly into the contents and return TRUE. Otherwise,
4632 the return value is FALSE and the contents are not modified. */
4635 widen_instruction (bfd_byte *contents,
4636 bfd_size_type content_length,
4637 bfd_size_type offset)
4639 xtensa_opcode opcode;
4640 bfd_size_type insn_len;
4641 xtensa_isa isa = xtensa_default_isa;
4643 xtensa_insnbuf o_insnbuf;
4645 static xtensa_insnbuf insnbuf = NULL;
4646 static xtensa_insnbuf slotbuf = NULL;
4648 if (insnbuf == NULL)
4650 insnbuf = xtensa_insnbuf_alloc (isa);
4651 slotbuf = xtensa_insnbuf_alloc (isa);
4654 BFD_ASSERT (offset < content_length);
4656 if (content_length < 2)
4659 /* We will hand-code a few of these for a little while.
4660 These have all been specified in the assembler aleady. */
4661 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4662 content_length - offset);
4663 fmt = xtensa_format_decode (isa, insnbuf);
4664 if (xtensa_format_num_slots (isa, fmt) != 1)
4667 if (xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf) != 0)
4670 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4671 if (opcode == XTENSA_UNDEFINED)
4673 insn_len = xtensa_format_length (isa, fmt);
4674 if (insn_len > content_length)
4677 o_insnbuf = can_widen_instruction (slotbuf, fmt, opcode);
4680 xtensa_insnbuf_to_chars (isa, o_insnbuf, contents + offset,
4681 content_length - offset);
4688 /* Code for transforming CALLs at link-time. */
4690 static bfd_reloc_status_type
4691 elf_xtensa_do_asm_simplify (bfd_byte *contents,
4693 bfd_vma content_length,
4694 char **error_message)
4696 static xtensa_insnbuf insnbuf = NULL;
4697 static xtensa_insnbuf slotbuf = NULL;
4698 xtensa_format core_format = XTENSA_UNDEFINED;
4699 xtensa_opcode opcode;
4700 xtensa_opcode direct_call_opcode;
4701 xtensa_isa isa = xtensa_default_isa;
4702 bfd_byte *chbuf = contents + address;
4705 if (insnbuf == NULL)
4707 insnbuf = xtensa_insnbuf_alloc (isa);
4708 slotbuf = xtensa_insnbuf_alloc (isa);
4711 if (content_length < address)
4713 *error_message = _("Attempt to convert L32R/CALLX to CALL failed");
4714 return bfd_reloc_other;
4717 opcode = get_expanded_call_opcode (chbuf, content_length - address, 0);
4718 direct_call_opcode = swap_callx_for_call_opcode (opcode);
4719 if (direct_call_opcode == XTENSA_UNDEFINED)
4721 *error_message = _("Attempt to convert L32R/CALLX to CALL failed");
4722 return bfd_reloc_other;
4725 /* Assemble a NOP ("or a1, a1, a1") into the 0 byte offset. */
4726 core_format = xtensa_format_lookup (isa, "x24");
4727 opcode = xtensa_opcode_lookup (isa, "or");
4728 xtensa_opcode_encode (isa, core_format, 0, slotbuf, opcode);
4729 for (opn = 0; opn < 3; opn++)
4732 xtensa_operand_encode (isa, opcode, opn, ®no);
4733 xtensa_operand_set_field (isa, opcode, opn, core_format, 0,
4736 xtensa_format_encode (isa, core_format, insnbuf);
4737 xtensa_format_set_slot (isa, core_format, 0, insnbuf, slotbuf);
4738 xtensa_insnbuf_to_chars (isa, insnbuf, chbuf, content_length - address);
4740 /* Assemble a CALL ("callN 0") into the 3 byte offset. */
4741 xtensa_opcode_encode (isa, core_format, 0, slotbuf, direct_call_opcode);
4742 xtensa_operand_set_field (isa, opcode, 0, core_format, 0, slotbuf, 0);
4744 xtensa_format_encode (isa, core_format, insnbuf);
4745 xtensa_format_set_slot (isa, core_format, 0, insnbuf, slotbuf);
4746 xtensa_insnbuf_to_chars (isa, insnbuf, chbuf + 3,
4747 content_length - address - 3);
4749 return bfd_reloc_ok;
4753 static bfd_reloc_status_type
4754 contract_asm_expansion (bfd_byte *contents,
4755 bfd_vma content_length,
4756 Elf_Internal_Rela *irel,
4757 char **error_message)
4759 bfd_reloc_status_type retval =
4760 elf_xtensa_do_asm_simplify (contents, irel->r_offset, content_length,
4763 if (retval != bfd_reloc_ok)
4764 return bfd_reloc_dangerous;
4766 /* Update the irel->r_offset field so that the right immediate and
4767 the right instruction are modified during the relocation. */
4768 irel->r_offset += 3;
4769 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info), R_XTENSA_SLOT0_OP);
4770 return bfd_reloc_ok;
4774 static xtensa_opcode
4775 swap_callx_for_call_opcode (xtensa_opcode opcode)
4777 init_call_opcodes ();
4779 if (opcode == callx0_op) return call0_op;
4780 if (opcode == callx4_op) return call4_op;
4781 if (opcode == callx8_op) return call8_op;
4782 if (opcode == callx12_op) return call12_op;
4784 /* Return XTENSA_UNDEFINED if the opcode is not an indirect call. */
4785 return XTENSA_UNDEFINED;
4789 /* Check if "buf" is pointing to a "L32R aN; CALLX aN" or "CONST16 aN;
4790 CONST16 aN; CALLX aN" sequence, and if so, return the CALLX opcode.
4791 If not, return XTENSA_UNDEFINED. */
4793 #define L32R_TARGET_REG_OPERAND 0
4794 #define CONST16_TARGET_REG_OPERAND 0
4795 #define CALLN_SOURCE_OPERAND 0
4797 static xtensa_opcode
4798 get_expanded_call_opcode (bfd_byte *buf, int bufsize, bfd_boolean *p_uses_l32r)
4800 static xtensa_insnbuf insnbuf = NULL;
4801 static xtensa_insnbuf slotbuf = NULL;
4803 xtensa_opcode opcode;
4804 xtensa_isa isa = xtensa_default_isa;
4805 uint32 regno, const16_regno, call_regno;
4808 if (insnbuf == NULL)
4810 insnbuf = xtensa_insnbuf_alloc (isa);
4811 slotbuf = xtensa_insnbuf_alloc (isa);
4814 xtensa_insnbuf_from_chars (isa, insnbuf, buf, bufsize);
4815 fmt = xtensa_format_decode (isa, insnbuf);
4816 if (fmt == XTENSA_UNDEFINED
4817 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4818 return XTENSA_UNDEFINED;
4820 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4821 if (opcode == XTENSA_UNDEFINED)
4822 return XTENSA_UNDEFINED;
4824 if (opcode == get_l32r_opcode ())
4827 *p_uses_l32r = TRUE;
4828 if (xtensa_operand_get_field (isa, opcode, L32R_TARGET_REG_OPERAND,
4829 fmt, 0, slotbuf, ®no)
4830 || xtensa_operand_decode (isa, opcode, L32R_TARGET_REG_OPERAND,
4832 return XTENSA_UNDEFINED;
4834 else if (opcode == get_const16_opcode ())
4837 *p_uses_l32r = FALSE;
4838 if (xtensa_operand_get_field (isa, opcode, CONST16_TARGET_REG_OPERAND,
4839 fmt, 0, slotbuf, ®no)
4840 || xtensa_operand_decode (isa, opcode, CONST16_TARGET_REG_OPERAND,
4842 return XTENSA_UNDEFINED;
4844 /* Check that the next instruction is also CONST16. */
4845 offset += xtensa_format_length (isa, fmt);
4846 xtensa_insnbuf_from_chars (isa, insnbuf, buf + offset, bufsize - offset);
4847 fmt = xtensa_format_decode (isa, insnbuf);
4848 if (fmt == XTENSA_UNDEFINED
4849 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4850 return XTENSA_UNDEFINED;
4851 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4852 if (opcode != get_const16_opcode ())
4853 return XTENSA_UNDEFINED;
4855 if (xtensa_operand_get_field (isa, opcode, CONST16_TARGET_REG_OPERAND,
4856 fmt, 0, slotbuf, &const16_regno)
4857 || xtensa_operand_decode (isa, opcode, CONST16_TARGET_REG_OPERAND,
4859 || const16_regno != regno)
4860 return XTENSA_UNDEFINED;
4863 return XTENSA_UNDEFINED;
4865 /* Next instruction should be an CALLXn with operand 0 == regno. */
4866 offset += xtensa_format_length (isa, fmt);
4867 xtensa_insnbuf_from_chars (isa, insnbuf, buf + offset, bufsize - offset);
4868 fmt = xtensa_format_decode (isa, insnbuf);
4869 if (fmt == XTENSA_UNDEFINED
4870 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4871 return XTENSA_UNDEFINED;
4872 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4873 if (opcode == XTENSA_UNDEFINED
4874 || !is_indirect_call_opcode (opcode))
4875 return XTENSA_UNDEFINED;
4877 if (xtensa_operand_get_field (isa, opcode, CALLN_SOURCE_OPERAND,
4878 fmt, 0, slotbuf, &call_regno)
4879 || xtensa_operand_decode (isa, opcode, CALLN_SOURCE_OPERAND,
4881 return XTENSA_UNDEFINED;
4883 if (call_regno != regno)
4884 return XTENSA_UNDEFINED;
4890 /* Data structures used during relaxation. */
4892 /* r_reloc: relocation values. */
4894 /* Through the relaxation process, we need to keep track of the values
4895 that will result from evaluating relocations. The standard ELF
4896 relocation structure is not sufficient for this purpose because we're
4897 operating on multiple input files at once, so we need to know which
4898 input file a relocation refers to. The r_reloc structure thus
4899 records both the input file (bfd) and ELF relocation.
4901 For efficiency, an r_reloc also contains a "target_offset" field to
4902 cache the target-section-relative offset value that is represented by
4905 The r_reloc also contains a virtual offset that allows multiple
4906 inserted literals to be placed at the same "address" with
4907 different offsets. */
4909 typedef struct r_reloc_struct r_reloc;
4911 struct r_reloc_struct
4914 Elf_Internal_Rela rela;
4915 bfd_vma target_offset;
4916 bfd_vma virtual_offset;
4920 /* The r_reloc structure is included by value in literal_value, but not
4921 every literal_value has an associated relocation -- some are simple
4922 constants. In such cases, we set all the fields in the r_reloc
4923 struct to zero. The r_reloc_is_const function should be used to
4924 detect this case. */
4927 r_reloc_is_const (const r_reloc *r_rel)
4929 return (r_rel->abfd == NULL);
4934 r_reloc_get_target_offset (const r_reloc *r_rel)
4936 bfd_vma target_offset;
4937 unsigned long r_symndx;
4939 BFD_ASSERT (!r_reloc_is_const (r_rel));
4940 r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4941 target_offset = get_elf_r_symndx_offset (r_rel->abfd, r_symndx);
4942 return (target_offset + r_rel->rela.r_addend);
4946 static struct elf_link_hash_entry *
4947 r_reloc_get_hash_entry (const r_reloc *r_rel)
4949 unsigned long r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4950 return get_elf_r_symndx_hash_entry (r_rel->abfd, r_symndx);
4955 r_reloc_get_section (const r_reloc *r_rel)
4957 unsigned long r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4958 return get_elf_r_symndx_section (r_rel->abfd, r_symndx);
4963 r_reloc_is_defined (const r_reloc *r_rel)
4969 sec = r_reloc_get_section (r_rel);
4970 if (sec == bfd_abs_section_ptr
4971 || sec == bfd_com_section_ptr
4972 || sec == bfd_und_section_ptr)
4979 r_reloc_init (r_reloc *r_rel,
4981 Elf_Internal_Rela *irel,
4983 bfd_size_type content_length)
4986 reloc_howto_type *howto;
4990 r_rel->rela = *irel;
4992 r_rel->target_offset = r_reloc_get_target_offset (r_rel);
4993 r_rel->virtual_offset = 0;
4994 r_type = ELF32_R_TYPE (r_rel->rela.r_info);
4995 howto = &elf_howto_table[r_type];
4996 if (howto->partial_inplace)
4998 bfd_vma inplace_val;
4999 BFD_ASSERT (r_rel->rela.r_offset < content_length);
5001 inplace_val = bfd_get_32 (abfd, &contents[r_rel->rela.r_offset]);
5002 r_rel->target_offset += inplace_val;
5006 memset (r_rel, 0, sizeof (r_reloc));
5013 print_r_reloc (FILE *fp, const r_reloc *r_rel)
5015 if (r_reloc_is_defined (r_rel))
5017 asection *sec = r_reloc_get_section (r_rel);
5018 fprintf (fp, " %s(%s + ", sec->owner->filename, sec->name);
5020 else if (r_reloc_get_hash_entry (r_rel))
5021 fprintf (fp, " %s + ", r_reloc_get_hash_entry (r_rel)->root.root.string);
5023 fprintf (fp, " ?? + ");
5025 fprintf_vma (fp, r_rel->target_offset);
5026 if (r_rel->virtual_offset)
5028 fprintf (fp, " + ");
5029 fprintf_vma (fp, r_rel->virtual_offset);
5038 /* source_reloc: relocations that reference literals. */
5040 /* To determine whether literals can be coalesced, we need to first
5041 record all the relocations that reference the literals. The
5042 source_reloc structure below is used for this purpose. The
5043 source_reloc entries are kept in a per-literal-section array, sorted
5044 by offset within the literal section (i.e., target offset).
5046 The source_sec and r_rel.rela.r_offset fields identify the source of
5047 the relocation. The r_rel field records the relocation value, i.e.,
5048 the offset of the literal being referenced. The opnd field is needed
5049 to determine the range of the immediate field to which the relocation
5050 applies, so we can determine whether another literal with the same
5051 value is within range. The is_null field is true when the relocation
5052 is being removed (e.g., when an L32R is being removed due to a CALLX
5053 that is converted to a direct CALL). */
5055 typedef struct source_reloc_struct source_reloc;
5057 struct source_reloc_struct
5059 asection *source_sec;
5061 xtensa_opcode opcode;
5063 bfd_boolean is_null;
5064 bfd_boolean is_abs_literal;
5069 init_source_reloc (source_reloc *reloc,
5070 asection *source_sec,
5071 const r_reloc *r_rel,
5072 xtensa_opcode opcode,
5074 bfd_boolean is_abs_literal)
5076 reloc->source_sec = source_sec;
5077 reloc->r_rel = *r_rel;
5078 reloc->opcode = opcode;
5080 reloc->is_null = FALSE;
5081 reloc->is_abs_literal = is_abs_literal;
5085 /* Find the source_reloc for a particular source offset and relocation
5086 type. Note that the array is sorted by _target_ offset, so this is
5087 just a linear search. */
5089 static source_reloc *
5090 find_source_reloc (source_reloc *src_relocs,
5093 Elf_Internal_Rela *irel)
5097 for (i = 0; i < src_count; i++)
5099 if (src_relocs[i].source_sec == sec
5100 && src_relocs[i].r_rel.rela.r_offset == irel->r_offset
5101 && (ELF32_R_TYPE (src_relocs[i].r_rel.rela.r_info)
5102 == ELF32_R_TYPE (irel->r_info)))
5103 return &src_relocs[i];
5111 source_reloc_compare (const void *ap, const void *bp)
5113 const source_reloc *a = (const source_reloc *) ap;
5114 const source_reloc *b = (const source_reloc *) bp;
5116 if (a->r_rel.target_offset != b->r_rel.target_offset)
5117 return (a->r_rel.target_offset - b->r_rel.target_offset);
5119 /* We don't need to sort on these criteria for correctness,
5120 but enforcing a more strict ordering prevents unstable qsort
5121 from behaving differently with different implementations.
5122 Without the code below we get correct but different results
5123 on Solaris 2.7 and 2.8. We would like to always produce the
5124 same results no matter the host. */
5126 if ((!a->is_null) - (!b->is_null))
5127 return ((!a->is_null) - (!b->is_null));
5128 return internal_reloc_compare (&a->r_rel.rela, &b->r_rel.rela);
5132 /* Literal values and value hash tables. */
5134 /* Literals with the same value can be coalesced. The literal_value
5135 structure records the value of a literal: the "r_rel" field holds the
5136 information from the relocation on the literal (if there is one) and
5137 the "value" field holds the contents of the literal word itself.
5139 The value_map structure records a literal value along with the
5140 location of a literal holding that value. The value_map hash table
5141 is indexed by the literal value, so that we can quickly check if a
5142 particular literal value has been seen before and is thus a candidate
5145 typedef struct literal_value_struct literal_value;
5146 typedef struct value_map_struct value_map;
5147 typedef struct value_map_hash_table_struct value_map_hash_table;
5149 struct literal_value_struct
5152 unsigned long value;
5153 bfd_boolean is_abs_literal;
5156 struct value_map_struct
5158 literal_value val; /* The literal value. */
5159 r_reloc loc; /* Location of the literal. */
5163 struct value_map_hash_table_struct
5165 unsigned bucket_count;
5166 value_map **buckets;
5168 bfd_boolean has_last_loc;
5174 init_literal_value (literal_value *lit,
5175 const r_reloc *r_rel,
5176 unsigned long value,
5177 bfd_boolean is_abs_literal)
5179 lit->r_rel = *r_rel;
5181 lit->is_abs_literal = is_abs_literal;
5186 literal_value_equal (const literal_value *src1,
5187 const literal_value *src2,
5188 bfd_boolean final_static_link)
5190 struct elf_link_hash_entry *h1, *h2;
5192 if (r_reloc_is_const (&src1->r_rel) != r_reloc_is_const (&src2->r_rel))
5195 if (r_reloc_is_const (&src1->r_rel))
5196 return (src1->value == src2->value);
5198 if (ELF32_R_TYPE (src1->r_rel.rela.r_info)
5199 != ELF32_R_TYPE (src2->r_rel.rela.r_info))
5202 if (src1->r_rel.target_offset != src2->r_rel.target_offset)
5205 if (src1->r_rel.virtual_offset != src2->r_rel.virtual_offset)
5208 if (src1->value != src2->value)
5211 /* Now check for the same section (if defined) or the same elf_hash
5212 (if undefined or weak). */
5213 h1 = r_reloc_get_hash_entry (&src1->r_rel);
5214 h2 = r_reloc_get_hash_entry (&src2->r_rel);
5215 if (r_reloc_is_defined (&src1->r_rel)
5216 && (final_static_link
5217 || ((!h1 || h1->root.type != bfd_link_hash_defweak)
5218 && (!h2 || h2->root.type != bfd_link_hash_defweak))))
5220 if (r_reloc_get_section (&src1->r_rel)
5221 != r_reloc_get_section (&src2->r_rel))
5226 /* Require that the hash entries (i.e., symbols) be identical. */
5227 if (h1 != h2 || h1 == 0)
5231 if (src1->is_abs_literal != src2->is_abs_literal)
5238 /* Must be power of 2. */
5239 #define INITIAL_HASH_RELOC_BUCKET_COUNT 1024
5241 static value_map_hash_table *
5242 value_map_hash_table_init (void)
5244 value_map_hash_table *values;
5246 values = (value_map_hash_table *)
5247 bfd_zmalloc (sizeof (value_map_hash_table));
5248 values->bucket_count = INITIAL_HASH_RELOC_BUCKET_COUNT;
5250 values->buckets = (value_map **)
5251 bfd_zmalloc (sizeof (value_map *) * values->bucket_count);
5252 if (values->buckets == NULL)
5257 values->has_last_loc = FALSE;
5264 value_map_hash_table_delete (value_map_hash_table *table)
5266 free (table->buckets);
5272 hash_bfd_vma (bfd_vma val)
5274 return (val >> 2) + (val >> 10);
5279 literal_value_hash (const literal_value *src)
5283 hash_val = hash_bfd_vma (src->value);
5284 if (!r_reloc_is_const (&src->r_rel))
5288 hash_val += hash_bfd_vma (src->is_abs_literal * 1000);
5289 hash_val += hash_bfd_vma (src->r_rel.target_offset);
5290 hash_val += hash_bfd_vma (src->r_rel.virtual_offset);
5292 /* Now check for the same section and the same elf_hash. */
5293 if (r_reloc_is_defined (&src->r_rel))
5294 sec_or_hash = r_reloc_get_section (&src->r_rel);
5296 sec_or_hash = r_reloc_get_hash_entry (&src->r_rel);
5297 hash_val += hash_bfd_vma ((bfd_vma) (size_t) sec_or_hash);
5303 /* Check if the specified literal_value has been seen before. */
5306 value_map_get_cached_value (value_map_hash_table *map,
5307 const literal_value *val,
5308 bfd_boolean final_static_link)
5314 idx = literal_value_hash (val);
5315 idx = idx & (map->bucket_count - 1);
5316 bucket = map->buckets[idx];
5317 for (map_e = bucket; map_e; map_e = map_e->next)
5319 if (literal_value_equal (&map_e->val, val, final_static_link))
5326 /* Record a new literal value. It is illegal to call this if VALUE
5327 already has an entry here. */
5330 add_value_map (value_map_hash_table *map,
5331 const literal_value *val,
5333 bfd_boolean final_static_link)
5335 value_map **bucket_p;
5338 value_map *val_e = (value_map *) bfd_zmalloc (sizeof (value_map));
5341 bfd_set_error (bfd_error_no_memory);
5345 BFD_ASSERT (!value_map_get_cached_value (map, val, final_static_link));
5349 idx = literal_value_hash (val);
5350 idx = idx & (map->bucket_count - 1);
5351 bucket_p = &map->buckets[idx];
5353 val_e->next = *bucket_p;
5356 /* FIXME: Consider resizing the hash table if we get too many entries. */
5362 /* Lists of text actions (ta_) for narrowing, widening, longcall
5363 conversion, space fill, code & literal removal, etc. */
5365 /* The following text actions are generated:
5367 "ta_remove_insn" remove an instruction or instructions
5368 "ta_remove_longcall" convert longcall to call
5369 "ta_convert_longcall" convert longcall to nop/call
5370 "ta_narrow_insn" narrow a wide instruction
5371 "ta_widen" widen a narrow instruction
5372 "ta_fill" add fill or remove fill
5373 removed < 0 is a fill; branches to the fill address will be
5374 changed to address + fill size (e.g., address - removed)
5375 removed >= 0 branches to the fill address will stay unchanged
5376 "ta_remove_literal" remove a literal; this action is
5377 indicated when a literal is removed
5379 "ta_add_literal" insert a new literal; this action is
5380 indicated when a literal has been moved.
5381 It may use a virtual_offset because
5382 multiple literals can be placed at the
5385 For each of these text actions, we also record the number of bytes
5386 removed by performing the text action. In the case of a "ta_widen"
5387 or a "ta_fill" that adds space, the removed_bytes will be negative. */
5389 typedef struct text_action_struct text_action;
5390 typedef struct text_action_list_struct text_action_list;
5391 typedef enum text_action_enum_t text_action_t;
5393 enum text_action_enum_t
5396 ta_remove_insn, /* removed = -size */
5397 ta_remove_longcall, /* removed = -size */
5398 ta_convert_longcall, /* removed = 0 */
5399 ta_narrow_insn, /* removed = -1 */
5400 ta_widen_insn, /* removed = +1 */
5401 ta_fill, /* removed = +size */
5407 /* Structure for a text action record. */
5408 struct text_action_struct
5410 text_action_t action;
5411 asection *sec; /* Optional */
5413 bfd_vma virtual_offset; /* Zero except for adding literals. */
5415 literal_value value; /* Only valid when adding literals. */
5421 /* List of all of the actions taken on a text section. */
5422 struct text_action_list_struct
5428 static text_action *
5429 find_fill_action (text_action_list *l, asection *sec, bfd_vma offset)
5433 /* It is not necessary to fill at the end of a section. */
5434 if (sec->size == offset)
5437 for (m_p = &l->head; *m_p && (*m_p)->offset <= offset; m_p = &(*m_p)->next)
5439 text_action *t = *m_p;
5440 /* When the action is another fill at the same address,
5441 just increase the size. */
5442 if (t->offset == offset && t->action == ta_fill)
5450 compute_removed_action_diff (const text_action *ta,
5454 int removable_space)
5457 int current_removed = 0;
5460 current_removed = ta->removed_bytes;
5462 BFD_ASSERT (ta == NULL || ta->offset == offset);
5463 BFD_ASSERT (ta == NULL || ta->action == ta_fill);
5465 /* It is not necessary to fill at the end of a section. Clean this up. */
5466 if (sec->size == offset)
5467 new_removed = removable_space - 0;
5471 int added = -removed - current_removed;
5472 /* Ignore multiples of the section alignment. */
5473 added = ((1 << sec->alignment_power) - 1) & added;
5474 new_removed = (-added);
5476 /* Modify for removable. */
5477 space = removable_space - new_removed;
5478 new_removed = (removable_space
5479 - (((1 << sec->alignment_power) - 1) & space));
5481 return (new_removed - current_removed);
5486 adjust_fill_action (text_action *ta, int fill_diff)
5488 ta->removed_bytes += fill_diff;
5492 /* Add a modification action to the text. For the case of adding or
5493 removing space, modify any current fill and assume that
5494 "unreachable_space" bytes can be freely contracted. Note that a
5495 negative removed value is a fill. */
5498 text_action_add (text_action_list *l,
5499 text_action_t action,
5507 /* It is not necessary to fill at the end of a section. */
5508 if (action == ta_fill && sec->size == offset)
5511 /* It is not necessary to fill 0 bytes. */
5512 if (action == ta_fill && removed == 0)
5515 for (m_p = &l->head; *m_p && (*m_p)->offset <= offset; m_p = &(*m_p)->next)
5517 text_action *t = *m_p;
5519 if (action == ta_fill)
5521 /* When the action is another fill at the same address,
5522 just increase the size. */
5523 if (t->offset == offset && t->action == ta_fill)
5525 t->removed_bytes += removed;
5528 /* Fills need to happen before widens so that we don't
5529 insert fill bytes into the instruction stream. */
5530 if (t->offset == offset && t->action == ta_widen_insn)
5535 /* Create a new record and fill it up. */
5536 ta = (text_action *) bfd_zmalloc (sizeof (text_action));
5537 ta->action = action;
5539 ta->offset = offset;
5540 ta->removed_bytes = removed;
5547 text_action_add_literal (text_action_list *l,
5548 text_action_t action,
5550 const literal_value *value,
5555 asection *sec = r_reloc_get_section (loc);
5556 bfd_vma offset = loc->target_offset;
5557 bfd_vma virtual_offset = loc->virtual_offset;
5559 BFD_ASSERT (action == ta_add_literal);
5561 for (m_p = &l->head; *m_p != NULL; m_p = &(*m_p)->next)
5563 if ((*m_p)->offset > offset
5564 && ((*m_p)->offset != offset
5565 || (*m_p)->virtual_offset > virtual_offset))
5569 /* Create a new record and fill it up. */
5570 ta = (text_action *) bfd_zmalloc (sizeof (text_action));
5571 ta->action = action;
5573 ta->offset = offset;
5574 ta->virtual_offset = virtual_offset;
5576 ta->removed_bytes = removed;
5582 /* Find the total offset adjustment for the relaxations specified by
5583 text_actions, beginning from a particular starting action. This is
5584 typically used from offset_with_removed_text to search an entire list of
5585 actions, but it may also be called directly when adjusting adjacent offsets
5586 so that each search may begin where the previous one left off. */
5589 removed_by_actions (text_action **p_start_action,
5591 bfd_boolean before_fill)
5596 r = *p_start_action;
5599 if (r->offset > offset)
5602 if (r->offset == offset
5603 && (before_fill || r->action != ta_fill || r->removed_bytes >= 0))
5606 removed += r->removed_bytes;
5611 *p_start_action = r;
5617 offset_with_removed_text (text_action_list *action_list, bfd_vma offset)
5619 text_action *r = action_list->head;
5620 return offset - removed_by_actions (&r, offset, FALSE);
5625 action_list_count (text_action_list *action_list)
5627 text_action *r = action_list->head;
5629 for (r = action_list->head; r != NULL; r = r->next)
5637 /* The find_insn_action routine will only find non-fill actions. */
5639 static text_action *
5640 find_insn_action (text_action_list *action_list, bfd_vma offset)
5643 for (t = action_list->head; t; t = t->next)
5645 if (t->offset == offset)
5652 case ta_remove_insn:
5653 case ta_remove_longcall:
5654 case ta_convert_longcall:
5655 case ta_narrow_insn:
5658 case ta_remove_literal:
5659 case ta_add_literal:
5672 print_action_list (FILE *fp, text_action_list *action_list)
5676 fprintf (fp, "Text Action\n");
5677 for (r = action_list->head; r != NULL; r = r->next)
5679 const char *t = "unknown";
5682 case ta_remove_insn:
5683 t = "remove_insn"; break;
5684 case ta_remove_longcall:
5685 t = "remove_longcall"; break;
5686 case ta_convert_longcall:
5687 t = "convert_longcall"; break;
5688 case ta_narrow_insn:
5689 t = "narrow_insn"; break;
5691 t = "widen_insn"; break;
5696 case ta_remove_literal:
5697 t = "remove_literal"; break;
5698 case ta_add_literal:
5699 t = "add_literal"; break;
5702 fprintf (fp, "%s: %s[0x%lx] \"%s\" %d\n",
5703 r->sec->owner->filename,
5704 r->sec->name, (unsigned long) r->offset, t, r->removed_bytes);
5711 /* Lists of literals being coalesced or removed. */
5713 /* In the usual case, the literal identified by "from" is being
5714 coalesced with another literal identified by "to". If the literal is
5715 unused and is being removed altogether, "to.abfd" will be NULL.
5716 The removed_literal entries are kept on a per-section list, sorted
5717 by the "from" offset field. */
5719 typedef struct removed_literal_struct removed_literal;
5720 typedef struct removed_literal_list_struct removed_literal_list;
5722 struct removed_literal_struct
5726 removed_literal *next;
5729 struct removed_literal_list_struct
5731 removed_literal *head;
5732 removed_literal *tail;
5736 /* Record that the literal at "from" is being removed. If "to" is not
5737 NULL, the "from" literal is being coalesced with the "to" literal. */
5740 add_removed_literal (removed_literal_list *removed_list,
5741 const r_reloc *from,
5744 removed_literal *r, *new_r, *next_r;
5746 new_r = (removed_literal *) bfd_zmalloc (sizeof (removed_literal));
5748 new_r->from = *from;
5752 new_r->to.abfd = NULL;
5755 r = removed_list->head;
5758 removed_list->head = new_r;
5759 removed_list->tail = new_r;
5761 /* Special check for common case of append. */
5762 else if (removed_list->tail->from.target_offset < from->target_offset)
5764 removed_list->tail->next = new_r;
5765 removed_list->tail = new_r;
5769 while (r->from.target_offset < from->target_offset && r->next)
5775 new_r->next = next_r;
5777 removed_list->tail = new_r;
5782 /* Check if the list of removed literals contains an entry for the
5783 given address. Return the entry if found. */
5785 static removed_literal *
5786 find_removed_literal (removed_literal_list *removed_list, bfd_vma addr)
5788 removed_literal *r = removed_list->head;
5789 while (r && r->from.target_offset < addr)
5791 if (r && r->from.target_offset == addr)
5800 print_removed_literals (FILE *fp, removed_literal_list *removed_list)
5803 r = removed_list->head;
5805 fprintf (fp, "Removed Literals\n");
5806 for (; r != NULL; r = r->next)
5808 print_r_reloc (fp, &r->from);
5809 fprintf (fp, " => ");
5810 if (r->to.abfd == NULL)
5811 fprintf (fp, "REMOVED");
5813 print_r_reloc (fp, &r->to);
5821 /* Per-section data for relaxation. */
5823 typedef struct reloc_bfd_fix_struct reloc_bfd_fix;
5825 struct xtensa_relax_info_struct
5827 bfd_boolean is_relaxable_literal_section;
5828 bfd_boolean is_relaxable_asm_section;
5829 int visited; /* Number of times visited. */
5831 source_reloc *src_relocs; /* Array[src_count]. */
5833 int src_next; /* Next src_relocs entry to assign. */
5835 removed_literal_list removed_list;
5836 text_action_list action_list;
5838 reloc_bfd_fix *fix_list;
5839 reloc_bfd_fix *fix_array;
5840 unsigned fix_array_count;
5842 /* Support for expanding the reloc array that is stored
5843 in the section structure. If the relocations have been
5844 reallocated, the newly allocated relocations will be referenced
5845 here along with the actual size allocated. The relocation
5846 count will always be found in the section structure. */
5847 Elf_Internal_Rela *allocated_relocs;
5848 unsigned relocs_count;
5849 unsigned allocated_relocs_count;
5852 struct elf_xtensa_section_data
5854 struct bfd_elf_section_data elf;
5855 xtensa_relax_info relax_info;
5860 elf_xtensa_new_section_hook (bfd *abfd, asection *sec)
5862 if (!sec->used_by_bfd)
5864 struct elf_xtensa_section_data *sdata;
5865 bfd_size_type amt = sizeof (*sdata);
5867 sdata = bfd_zalloc (abfd, amt);
5870 sec->used_by_bfd = sdata;
5873 return _bfd_elf_new_section_hook (abfd, sec);
5877 static xtensa_relax_info *
5878 get_xtensa_relax_info (asection *sec)
5880 struct elf_xtensa_section_data *section_data;
5882 /* No info available if no section or if it is an output section. */
5883 if (!sec || sec == sec->output_section)
5886 section_data = (struct elf_xtensa_section_data *) elf_section_data (sec);
5887 return §ion_data->relax_info;
5892 init_xtensa_relax_info (asection *sec)
5894 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
5896 relax_info->is_relaxable_literal_section = FALSE;
5897 relax_info->is_relaxable_asm_section = FALSE;
5898 relax_info->visited = 0;
5900 relax_info->src_relocs = NULL;
5901 relax_info->src_count = 0;
5902 relax_info->src_next = 0;
5904 relax_info->removed_list.head = NULL;
5905 relax_info->removed_list.tail = NULL;
5907 relax_info->action_list.head = NULL;
5909 relax_info->fix_list = NULL;
5910 relax_info->fix_array = NULL;
5911 relax_info->fix_array_count = 0;
5913 relax_info->allocated_relocs = NULL;
5914 relax_info->relocs_count = 0;
5915 relax_info->allocated_relocs_count = 0;
5919 /* Coalescing literals may require a relocation to refer to a section in
5920 a different input file, but the standard relocation information
5921 cannot express that. Instead, the reloc_bfd_fix structures are used
5922 to "fix" the relocations that refer to sections in other input files.
5923 These structures are kept on per-section lists. The "src_type" field
5924 records the relocation type in case there are multiple relocations on
5925 the same location. FIXME: This is ugly; an alternative might be to
5926 add new symbols with the "owner" field to some other input file. */
5928 struct reloc_bfd_fix_struct
5932 unsigned src_type; /* Relocation type. */
5934 asection *target_sec;
5935 bfd_vma target_offset;
5936 bfd_boolean translated;
5938 reloc_bfd_fix *next;
5942 static reloc_bfd_fix *
5943 reloc_bfd_fix_init (asection *src_sec,
5946 asection *target_sec,
5947 bfd_vma target_offset,
5948 bfd_boolean translated)
5952 fix = (reloc_bfd_fix *) bfd_malloc (sizeof (reloc_bfd_fix));
5953 fix->src_sec = src_sec;
5954 fix->src_offset = src_offset;
5955 fix->src_type = src_type;
5956 fix->target_sec = target_sec;
5957 fix->target_offset = target_offset;
5958 fix->translated = translated;
5965 add_fix (asection *src_sec, reloc_bfd_fix *fix)
5967 xtensa_relax_info *relax_info;
5969 relax_info = get_xtensa_relax_info (src_sec);
5970 fix->next = relax_info->fix_list;
5971 relax_info->fix_list = fix;
5976 fix_compare (const void *ap, const void *bp)
5978 const reloc_bfd_fix *a = (const reloc_bfd_fix *) ap;
5979 const reloc_bfd_fix *b = (const reloc_bfd_fix *) bp;
5981 if (a->src_offset != b->src_offset)
5982 return (a->src_offset - b->src_offset);
5983 return (a->src_type - b->src_type);
5988 cache_fix_array (asection *sec)
5990 unsigned i, count = 0;
5992 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
5994 if (relax_info == NULL)
5996 if (relax_info->fix_list == NULL)
5999 for (r = relax_info->fix_list; r != NULL; r = r->next)
6002 relax_info->fix_array =
6003 (reloc_bfd_fix *) bfd_malloc (sizeof (reloc_bfd_fix) * count);
6004 relax_info->fix_array_count = count;
6006 r = relax_info->fix_list;
6007 for (i = 0; i < count; i++, r = r->next)
6009 relax_info->fix_array[count - 1 - i] = *r;
6010 relax_info->fix_array[count - 1 - i].next = NULL;
6013 qsort (relax_info->fix_array, relax_info->fix_array_count,
6014 sizeof (reloc_bfd_fix), fix_compare);
6018 static reloc_bfd_fix *
6019 get_bfd_fix (asection *sec, bfd_vma offset, unsigned type)
6021 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
6025 if (relax_info == NULL)
6027 if (relax_info->fix_list == NULL)
6030 if (relax_info->fix_array == NULL)
6031 cache_fix_array (sec);
6033 key.src_offset = offset;
6034 key.src_type = type;
6035 rv = bsearch (&key, relax_info->fix_array, relax_info->fix_array_count,
6036 sizeof (reloc_bfd_fix), fix_compare);
6041 /* Section caching. */
6043 typedef struct section_cache_struct section_cache_t;
6045 struct section_cache_struct
6049 bfd_byte *contents; /* Cache of the section contents. */
6050 bfd_size_type content_length;
6052 property_table_entry *ptbl; /* Cache of the section property table. */
6055 Elf_Internal_Rela *relocs; /* Cache of the section relocations. */
6056 unsigned reloc_count;
6061 init_section_cache (section_cache_t *sec_cache)
6063 memset (sec_cache, 0, sizeof (*sec_cache));
6068 free_section_cache (section_cache_t *sec_cache)
6072 release_contents (sec_cache->sec, sec_cache->contents);
6073 release_internal_relocs (sec_cache->sec, sec_cache->relocs);
6074 if (sec_cache->ptbl)
6075 free (sec_cache->ptbl);
6081 section_cache_section (section_cache_t *sec_cache,
6083 struct bfd_link_info *link_info)
6086 property_table_entry *prop_table = NULL;
6088 bfd_byte *contents = NULL;
6089 Elf_Internal_Rela *internal_relocs = NULL;
6090 bfd_size_type sec_size;
6094 if (sec == sec_cache->sec)
6098 sec_size = bfd_get_section_limit (abfd, sec);
6100 /* Get the contents. */
6101 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
6102 if (contents == NULL && sec_size != 0)
6105 /* Get the relocations. */
6106 internal_relocs = retrieve_internal_relocs (abfd, sec,
6107 link_info->keep_memory);
6109 /* Get the entry table. */
6110 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
6111 XTENSA_PROP_SEC_NAME, FALSE);
6115 /* Fill in the new section cache. */
6116 free_section_cache (sec_cache);
6117 init_section_cache (sec_cache);
6119 sec_cache->sec = sec;
6120 sec_cache->contents = contents;
6121 sec_cache->content_length = sec_size;
6122 sec_cache->relocs = internal_relocs;
6123 sec_cache->reloc_count = sec->reloc_count;
6124 sec_cache->pte_count = ptblsize;
6125 sec_cache->ptbl = prop_table;
6130 release_contents (sec, contents);
6131 release_internal_relocs (sec, internal_relocs);
6138 /* Extended basic blocks. */
6140 /* An ebb_struct represents an Extended Basic Block. Within this
6141 range, we guarantee that all instructions are decodable, the
6142 property table entries are contiguous, and no property table
6143 specifies a segment that cannot have instructions moved. This
6144 structure contains caches of the contents, property table and
6145 relocations for the specified section for easy use. The range is
6146 specified by ranges of indices for the byte offset, property table
6147 offsets and relocation offsets. These must be consistent. */
6149 typedef struct ebb_struct ebb_t;
6155 bfd_byte *contents; /* Cache of the section contents. */
6156 bfd_size_type content_length;
6158 property_table_entry *ptbl; /* Cache of the section property table. */
6161 Elf_Internal_Rela *relocs; /* Cache of the section relocations. */
6162 unsigned reloc_count;
6164 bfd_vma start_offset; /* Offset in section. */
6165 unsigned start_ptbl_idx; /* Offset in the property table. */
6166 unsigned start_reloc_idx; /* Offset in the relocations. */
6169 unsigned end_ptbl_idx;
6170 unsigned end_reloc_idx;
6172 bfd_boolean ends_section; /* Is this the last ebb in a section? */
6174 /* The unreachable property table at the end of this set of blocks;
6175 NULL if the end is not an unreachable block. */
6176 property_table_entry *ends_unreachable;
6180 enum ebb_target_enum
6183 EBB_DESIRE_TGT_ALIGN,
6184 EBB_REQUIRE_TGT_ALIGN,
6185 EBB_REQUIRE_LOOP_ALIGN,
6190 /* proposed_action_struct is similar to the text_action_struct except
6191 that is represents a potential transformation, not one that will
6192 occur. We build a list of these for an extended basic block
6193 and use them to compute the actual actions desired. We must be
6194 careful that the entire set of actual actions we perform do not
6195 break any relocations that would fit if the actions were not
6198 typedef struct proposed_action_struct proposed_action;
6200 struct proposed_action_struct
6202 enum ebb_target_enum align_type; /* for the target alignment */
6203 bfd_vma alignment_pow;
6204 text_action_t action;
6207 bfd_boolean do_action; /* If false, then we will not perform the action. */
6211 /* The ebb_constraint_struct keeps a set of proposed actions for an
6212 extended basic block. */
6214 typedef struct ebb_constraint_struct ebb_constraint;
6216 struct ebb_constraint_struct
6219 bfd_boolean start_movable;
6221 /* Bytes of extra space at the beginning if movable. */
6222 int start_extra_space;
6224 enum ebb_target_enum start_align;
6226 bfd_boolean end_movable;
6228 /* Bytes of extra space at the end if movable. */
6229 int end_extra_space;
6231 unsigned action_count;
6232 unsigned action_allocated;
6234 /* Array of proposed actions. */
6235 proposed_action *actions;
6237 /* Action alignments -- one for each proposed action. */
6238 enum ebb_target_enum *action_aligns;
6243 init_ebb_constraint (ebb_constraint *c)
6245 memset (c, 0, sizeof (ebb_constraint));
6250 free_ebb_constraint (ebb_constraint *c)
6258 init_ebb (ebb_t *ebb,
6261 bfd_size_type content_length,
6262 property_table_entry *prop_table,
6264 Elf_Internal_Rela *internal_relocs,
6265 unsigned reloc_count)
6267 memset (ebb, 0, sizeof (ebb_t));
6269 ebb->contents = contents;
6270 ebb->content_length = content_length;
6271 ebb->ptbl = prop_table;
6272 ebb->pte_count = ptblsize;
6273 ebb->relocs = internal_relocs;
6274 ebb->reloc_count = reloc_count;
6275 ebb->start_offset = 0;
6276 ebb->end_offset = ebb->content_length - 1;
6277 ebb->start_ptbl_idx = 0;
6278 ebb->end_ptbl_idx = ptblsize;
6279 ebb->start_reloc_idx = 0;
6280 ebb->end_reloc_idx = reloc_count;
6284 /* Extend the ebb to all decodable contiguous sections. The algorithm
6285 for building a basic block around an instruction is to push it
6286 forward until we hit the end of a section, an unreachable block or
6287 a block that cannot be transformed. Then we push it backwards
6288 searching for similar conditions. */
6290 static bfd_boolean extend_ebb_bounds_forward (ebb_t *);
6291 static bfd_boolean extend_ebb_bounds_backward (ebb_t *);
6292 static bfd_size_type insn_block_decodable_len
6293 (bfd_byte *, bfd_size_type, bfd_vma, bfd_size_type);
6296 extend_ebb_bounds (ebb_t *ebb)
6298 if (!extend_ebb_bounds_forward (ebb))
6300 if (!extend_ebb_bounds_backward (ebb))
6307 extend_ebb_bounds_forward (ebb_t *ebb)
6309 property_table_entry *the_entry, *new_entry;
6311 the_entry = &ebb->ptbl[ebb->end_ptbl_idx];
6313 /* Stop when (1) we cannot decode an instruction, (2) we are at
6314 the end of the property tables, (3) we hit a non-contiguous property
6315 table entry, (4) we hit a NO_TRANSFORM region. */
6320 bfd_size_type insn_block_len;
6322 entry_end = the_entry->address - ebb->sec->vma + the_entry->size;
6324 insn_block_decodable_len (ebb->contents, ebb->content_length,
6326 entry_end - ebb->end_offset);
6327 if (insn_block_len != (entry_end - ebb->end_offset))
6329 (*_bfd_error_handler)
6330 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
6331 ebb->sec->owner, ebb->sec, ebb->end_offset + insn_block_len);
6334 ebb->end_offset += insn_block_len;
6336 if (ebb->end_offset == ebb->sec->size)
6337 ebb->ends_section = TRUE;
6339 /* Update the reloc counter. */
6340 while (ebb->end_reloc_idx + 1 < ebb->reloc_count
6341 && (ebb->relocs[ebb->end_reloc_idx + 1].r_offset
6344 ebb->end_reloc_idx++;
6347 if (ebb->end_ptbl_idx + 1 == ebb->pte_count)
6350 new_entry = &ebb->ptbl[ebb->end_ptbl_idx + 1];
6351 if (((new_entry->flags & XTENSA_PROP_INSN) == 0)
6352 || ((new_entry->flags & XTENSA_PROP_NO_TRANSFORM) != 0)
6353 || ((the_entry->flags & XTENSA_PROP_ALIGN) != 0))
6356 if (the_entry->address + the_entry->size != new_entry->address)
6359 the_entry = new_entry;
6360 ebb->end_ptbl_idx++;
6363 /* Quick check for an unreachable or end of file just at the end. */
6364 if (ebb->end_ptbl_idx + 1 == ebb->pte_count)
6366 if (ebb->end_offset == ebb->content_length)
6367 ebb->ends_section = TRUE;
6371 new_entry = &ebb->ptbl[ebb->end_ptbl_idx + 1];
6372 if ((new_entry->flags & XTENSA_PROP_UNREACHABLE) != 0
6373 && the_entry->address + the_entry->size == new_entry->address)
6374 ebb->ends_unreachable = new_entry;
6377 /* Any other ending requires exact alignment. */
6383 extend_ebb_bounds_backward (ebb_t *ebb)
6385 property_table_entry *the_entry, *new_entry;
6387 the_entry = &ebb->ptbl[ebb->start_ptbl_idx];
6389 /* Stop when (1) we cannot decode the instructions in the current entry.
6390 (2) we are at the beginning of the property tables, (3) we hit a
6391 non-contiguous property table entry, (4) we hit a NO_TRANSFORM region. */
6395 bfd_vma block_begin;
6396 bfd_size_type insn_block_len;
6398 block_begin = the_entry->address - ebb->sec->vma;
6400 insn_block_decodable_len (ebb->contents, ebb->content_length,
6402 ebb->start_offset - block_begin);
6403 if (insn_block_len != ebb->start_offset - block_begin)
6405 (*_bfd_error_handler)
6406 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
6407 ebb->sec->owner, ebb->sec, ebb->end_offset + insn_block_len);
6410 ebb->start_offset -= insn_block_len;
6412 /* Update the reloc counter. */
6413 while (ebb->start_reloc_idx > 0
6414 && (ebb->relocs[ebb->start_reloc_idx - 1].r_offset
6415 >= ebb->start_offset))
6417 ebb->start_reloc_idx--;
6420 if (ebb->start_ptbl_idx == 0)
6423 new_entry = &ebb->ptbl[ebb->start_ptbl_idx - 1];
6424 if ((new_entry->flags & XTENSA_PROP_INSN) == 0
6425 || ((new_entry->flags & XTENSA_PROP_NO_TRANSFORM) != 0)
6426 || ((new_entry->flags & XTENSA_PROP_ALIGN) != 0))
6428 if (new_entry->address + new_entry->size != the_entry->address)
6431 the_entry = new_entry;
6432 ebb->start_ptbl_idx--;
6438 static bfd_size_type
6439 insn_block_decodable_len (bfd_byte *contents,
6440 bfd_size_type content_len,
6441 bfd_vma block_offset,
6442 bfd_size_type block_len)
6444 bfd_vma offset = block_offset;
6446 while (offset < block_offset + block_len)
6448 bfd_size_type insn_len = 0;
6450 insn_len = insn_decode_len (contents, content_len, offset);
6452 return (offset - block_offset);
6455 return (offset - block_offset);
6460 ebb_propose_action (ebb_constraint *c,
6461 enum ebb_target_enum align_type,
6462 bfd_vma alignment_pow,
6463 text_action_t action,
6466 bfd_boolean do_action)
6468 proposed_action *act;
6470 if (c->action_allocated <= c->action_count)
6472 unsigned new_allocated, i;
6473 proposed_action *new_actions;
6475 new_allocated = (c->action_count + 2) * 2;
6476 new_actions = (proposed_action *)
6477 bfd_zmalloc (sizeof (proposed_action) * new_allocated);
6479 for (i = 0; i < c->action_count; i++)
6480 new_actions[i] = c->actions[i];
6483 c->actions = new_actions;
6484 c->action_allocated = new_allocated;
6487 act = &c->actions[c->action_count];
6488 act->align_type = align_type;
6489 act->alignment_pow = alignment_pow;
6490 act->action = action;
6491 act->offset = offset;
6492 act->removed_bytes = removed_bytes;
6493 act->do_action = do_action;
6499 /* Access to internal relocations, section contents and symbols. */
6501 /* During relaxation, we need to modify relocations, section contents,
6502 and symbol definitions, and we need to keep the original values from
6503 being reloaded from the input files, i.e., we need to "pin" the
6504 modified values in memory. We also want to continue to observe the
6505 setting of the "keep-memory" flag. The following functions wrap the
6506 standard BFD functions to take care of this for us. */
6508 static Elf_Internal_Rela *
6509 retrieve_internal_relocs (bfd *abfd, asection *sec, bfd_boolean keep_memory)
6511 Elf_Internal_Rela *internal_relocs;
6513 if ((sec->flags & SEC_LINKER_CREATED) != 0)
6516 internal_relocs = elf_section_data (sec)->relocs;
6517 if (internal_relocs == NULL)
6518 internal_relocs = (_bfd_elf_link_read_relocs
6519 (abfd, sec, NULL, NULL, keep_memory));
6520 return internal_relocs;
6525 pin_internal_relocs (asection *sec, Elf_Internal_Rela *internal_relocs)
6527 elf_section_data (sec)->relocs = internal_relocs;
6532 release_internal_relocs (asection *sec, Elf_Internal_Rela *internal_relocs)
6535 && elf_section_data (sec)->relocs != internal_relocs)
6536 free (internal_relocs);
6541 retrieve_contents (bfd *abfd, asection *sec, bfd_boolean keep_memory)
6544 bfd_size_type sec_size;
6546 sec_size = bfd_get_section_limit (abfd, sec);
6547 contents = elf_section_data (sec)->this_hdr.contents;
6549 if (contents == NULL && sec_size != 0)
6551 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
6558 elf_section_data (sec)->this_hdr.contents = contents;
6565 pin_contents (asection *sec, bfd_byte *contents)
6567 elf_section_data (sec)->this_hdr.contents = contents;
6572 release_contents (asection *sec, bfd_byte *contents)
6574 if (contents && elf_section_data (sec)->this_hdr.contents != contents)
6579 static Elf_Internal_Sym *
6580 retrieve_local_syms (bfd *input_bfd)
6582 Elf_Internal_Shdr *symtab_hdr;
6583 Elf_Internal_Sym *isymbuf;
6586 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6587 locsymcount = symtab_hdr->sh_info;
6589 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6590 if (isymbuf == NULL && locsymcount != 0)
6591 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
6594 /* Save the symbols for this input file so they won't be read again. */
6595 if (isymbuf && isymbuf != (Elf_Internal_Sym *) symtab_hdr->contents)
6596 symtab_hdr->contents = (unsigned char *) isymbuf;
6602 /* Code for link-time relaxation. */
6604 /* Initialization for relaxation: */
6605 static bfd_boolean analyze_relocations (struct bfd_link_info *);
6606 static bfd_boolean find_relaxable_sections
6607 (bfd *, asection *, struct bfd_link_info *, bfd_boolean *);
6608 static bfd_boolean collect_source_relocs
6609 (bfd *, asection *, struct bfd_link_info *);
6610 static bfd_boolean is_resolvable_asm_expansion
6611 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *, struct bfd_link_info *,
6613 static Elf_Internal_Rela *find_associated_l32r_irel
6614 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Rela *);
6615 static bfd_boolean compute_text_actions
6616 (bfd *, asection *, struct bfd_link_info *);
6617 static bfd_boolean compute_ebb_proposed_actions (ebb_constraint *);
6618 static bfd_boolean compute_ebb_actions (ebb_constraint *);
6619 static bfd_boolean check_section_ebb_pcrels_fit
6620 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *, const ebb_constraint *,
6621 const xtensa_opcode *);
6622 static bfd_boolean check_section_ebb_reduces (const ebb_constraint *);
6623 static void text_action_add_proposed
6624 (text_action_list *, const ebb_constraint *, asection *);
6625 static int compute_fill_extra_space (property_table_entry *);
6628 static bfd_boolean compute_removed_literals
6629 (bfd *, asection *, struct bfd_link_info *, value_map_hash_table *);
6630 static Elf_Internal_Rela *get_irel_at_offset
6631 (asection *, Elf_Internal_Rela *, bfd_vma);
6632 static bfd_boolean is_removable_literal
6633 (const source_reloc *, int, const source_reloc *, int, asection *,
6634 property_table_entry *, int);
6635 static bfd_boolean remove_dead_literal
6636 (bfd *, asection *, struct bfd_link_info *, Elf_Internal_Rela *,
6637 Elf_Internal_Rela *, source_reloc *, property_table_entry *, int);
6638 static bfd_boolean identify_literal_placement
6639 (bfd *, asection *, bfd_byte *, struct bfd_link_info *,
6640 value_map_hash_table *, bfd_boolean *, Elf_Internal_Rela *, int,
6641 source_reloc *, property_table_entry *, int, section_cache_t *,
6643 static bfd_boolean relocations_reach (source_reloc *, int, const r_reloc *);
6644 static bfd_boolean coalesce_shared_literal
6645 (asection *, source_reloc *, property_table_entry *, int, value_map *);
6646 static bfd_boolean move_shared_literal
6647 (asection *, struct bfd_link_info *, source_reloc *, property_table_entry *,
6648 int, const r_reloc *, const literal_value *, section_cache_t *);
6651 static bfd_boolean relax_section (bfd *, asection *, struct bfd_link_info *);
6652 static bfd_boolean translate_section_fixes (asection *);
6653 static bfd_boolean translate_reloc_bfd_fix (reloc_bfd_fix *);
6654 static asection *translate_reloc (const r_reloc *, r_reloc *, asection *);
6655 static void shrink_dynamic_reloc_sections
6656 (struct bfd_link_info *, bfd *, asection *, Elf_Internal_Rela *);
6657 static bfd_boolean move_literal
6658 (bfd *, struct bfd_link_info *, asection *, bfd_vma, bfd_byte *,
6659 xtensa_relax_info *, Elf_Internal_Rela **, const literal_value *);
6660 static bfd_boolean relax_property_section
6661 (bfd *, asection *, struct bfd_link_info *);
6664 static bfd_boolean relax_section_symbols (bfd *, asection *);
6668 elf_xtensa_relax_section (bfd *abfd,
6670 struct bfd_link_info *link_info,
6673 static value_map_hash_table *values = NULL;
6674 static bfd_boolean relocations_analyzed = FALSE;
6675 xtensa_relax_info *relax_info;
6677 if (!relocations_analyzed)
6679 /* Do some overall initialization for relaxation. */
6680 values = value_map_hash_table_init ();
6683 relaxing_section = TRUE;
6684 if (!analyze_relocations (link_info))
6686 relocations_analyzed = TRUE;
6690 /* Don't mess with linker-created sections. */
6691 if ((sec->flags & SEC_LINKER_CREATED) != 0)
6694 relax_info = get_xtensa_relax_info (sec);
6695 BFD_ASSERT (relax_info != NULL);
6697 switch (relax_info->visited)
6700 /* Note: It would be nice to fold this pass into
6701 analyze_relocations, but it is important for this step that the
6702 sections be examined in link order. */
6703 if (!compute_removed_literals (abfd, sec, link_info, values))
6710 value_map_hash_table_delete (values);
6712 if (!relax_section (abfd, sec, link_info))
6718 if (!relax_section_symbols (abfd, sec))
6723 relax_info->visited++;
6728 /* Initialization for relaxation. */
6730 /* This function is called once at the start of relaxation. It scans
6731 all the input sections and marks the ones that are relaxable (i.e.,
6732 literal sections with L32R relocations against them), and then
6733 collects source_reloc information for all the relocations against
6734 those relaxable sections. During this process, it also detects
6735 longcalls, i.e., calls relaxed by the assembler into indirect
6736 calls, that can be optimized back into direct calls. Within each
6737 extended basic block (ebb) containing an optimized longcall, it
6738 computes a set of "text actions" that can be performed to remove
6739 the L32R associated with the longcall while optionally preserving
6740 branch target alignments. */
6743 analyze_relocations (struct bfd_link_info *link_info)
6747 bfd_boolean is_relaxable = FALSE;
6749 /* Initialize the per-section relaxation info. */
6750 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6751 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6753 init_xtensa_relax_info (sec);
6756 /* Mark relaxable sections (and count relocations against each one). */
6757 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6758 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6760 if (!find_relaxable_sections (abfd, sec, link_info, &is_relaxable))
6764 /* Bail out if there are no relaxable sections. */
6768 /* Allocate space for source_relocs. */
6769 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6770 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6772 xtensa_relax_info *relax_info;
6774 relax_info = get_xtensa_relax_info (sec);
6775 if (relax_info->is_relaxable_literal_section
6776 || relax_info->is_relaxable_asm_section)
6778 relax_info->src_relocs = (source_reloc *)
6779 bfd_malloc (relax_info->src_count * sizeof (source_reloc));
6782 relax_info->src_count = 0;
6785 /* Collect info on relocations against each relaxable section. */
6786 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6787 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6789 if (!collect_source_relocs (abfd, sec, link_info))
6793 /* Compute the text actions. */
6794 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6795 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6797 if (!compute_text_actions (abfd, sec, link_info))
6805 /* Find all the sections that might be relaxed. The motivation for
6806 this pass is that collect_source_relocs() needs to record _all_ the
6807 relocations that target each relaxable section. That is expensive
6808 and unnecessary unless the target section is actually going to be
6809 relaxed. This pass identifies all such sections by checking if
6810 they have L32Rs pointing to them. In the process, the total number
6811 of relocations targeting each section is also counted so that we
6812 know how much space to allocate for source_relocs against each
6813 relaxable literal section. */
6816 find_relaxable_sections (bfd *abfd,
6818 struct bfd_link_info *link_info,
6819 bfd_boolean *is_relaxable_p)
6821 Elf_Internal_Rela *internal_relocs;
6823 bfd_boolean ok = TRUE;
6825 xtensa_relax_info *source_relax_info;
6826 bfd_boolean is_l32r_reloc;
6828 internal_relocs = retrieve_internal_relocs (abfd, sec,
6829 link_info->keep_memory);
6830 if (internal_relocs == NULL)
6833 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
6834 if (contents == NULL && sec->size != 0)
6840 source_relax_info = get_xtensa_relax_info (sec);
6841 for (i = 0; i < sec->reloc_count; i++)
6843 Elf_Internal_Rela *irel = &internal_relocs[i];
6845 asection *target_sec;
6846 xtensa_relax_info *target_relax_info;
6848 /* If this section has not already been marked as "relaxable", and
6849 if it contains any ASM_EXPAND relocations (marking expanded
6850 longcalls) that can be optimized into direct calls, then mark
6851 the section as "relaxable". */
6852 if (source_relax_info
6853 && !source_relax_info->is_relaxable_asm_section
6854 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_ASM_EXPAND)
6856 bfd_boolean is_reachable = FALSE;
6857 if (is_resolvable_asm_expansion (abfd, sec, contents, irel,
6858 link_info, &is_reachable)
6861 source_relax_info->is_relaxable_asm_section = TRUE;
6862 *is_relaxable_p = TRUE;
6866 r_reloc_init (&r_rel, abfd, irel, contents,
6867 bfd_get_section_limit (abfd, sec));
6869 target_sec = r_reloc_get_section (&r_rel);
6870 target_relax_info = get_xtensa_relax_info (target_sec);
6871 if (!target_relax_info)
6874 /* Count PC-relative operand relocations against the target section.
6875 Note: The conditions tested here must match the conditions under
6876 which init_source_reloc is called in collect_source_relocs(). */
6877 is_l32r_reloc = FALSE;
6878 if (is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
6880 xtensa_opcode opcode =
6881 get_relocation_opcode (abfd, sec, contents, irel);
6882 if (opcode != XTENSA_UNDEFINED)
6884 is_l32r_reloc = (opcode == get_l32r_opcode ());
6885 if (!is_alt_relocation (ELF32_R_TYPE (irel->r_info))
6887 target_relax_info->src_count++;
6891 if (is_l32r_reloc && r_reloc_is_defined (&r_rel))
6893 /* Mark the target section as relaxable. */
6894 target_relax_info->is_relaxable_literal_section = TRUE;
6895 *is_relaxable_p = TRUE;
6900 release_contents (sec, contents);
6901 release_internal_relocs (sec, internal_relocs);
6906 /* Record _all_ the relocations that point to relaxable sections, and
6907 get rid of ASM_EXPAND relocs by either converting them to
6908 ASM_SIMPLIFY or by removing them. */
6911 collect_source_relocs (bfd *abfd,
6913 struct bfd_link_info *link_info)
6915 Elf_Internal_Rela *internal_relocs;
6917 bfd_boolean ok = TRUE;
6919 bfd_size_type sec_size;
6921 internal_relocs = retrieve_internal_relocs (abfd, sec,
6922 link_info->keep_memory);
6923 if (internal_relocs == NULL)
6926 sec_size = bfd_get_section_limit (abfd, sec);
6927 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
6928 if (contents == NULL && sec_size != 0)
6934 /* Record relocations against relaxable literal sections. */
6935 for (i = 0; i < sec->reloc_count; i++)
6937 Elf_Internal_Rela *irel = &internal_relocs[i];
6939 asection *target_sec;
6940 xtensa_relax_info *target_relax_info;
6942 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
6944 target_sec = r_reloc_get_section (&r_rel);
6945 target_relax_info = get_xtensa_relax_info (target_sec);
6947 if (target_relax_info
6948 && (target_relax_info->is_relaxable_literal_section
6949 || target_relax_info->is_relaxable_asm_section))
6951 xtensa_opcode opcode = XTENSA_UNDEFINED;
6953 bfd_boolean is_abs_literal = FALSE;
6955 if (is_alt_relocation (ELF32_R_TYPE (irel->r_info)))
6957 /* None of the current alternate relocs are PC-relative,
6958 and only PC-relative relocs matter here. However, we
6959 still need to record the opcode for literal
6961 opcode = get_relocation_opcode (abfd, sec, contents, irel);
6962 if (opcode == get_l32r_opcode ())
6964 is_abs_literal = TRUE;
6968 opcode = XTENSA_UNDEFINED;
6970 else if (is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
6972 opcode = get_relocation_opcode (abfd, sec, contents, irel);
6973 opnd = get_relocation_opnd (opcode, ELF32_R_TYPE (irel->r_info));
6976 if (opcode != XTENSA_UNDEFINED)
6978 int src_next = target_relax_info->src_next++;
6979 source_reloc *s_reloc = &target_relax_info->src_relocs[src_next];
6981 init_source_reloc (s_reloc, sec, &r_rel, opcode, opnd,
6987 /* Now get rid of ASM_EXPAND relocations. At this point, the
6988 src_relocs array for the target literal section may still be
6989 incomplete, but it must at least contain the entries for the L32R
6990 relocations associated with ASM_EXPANDs because they were just
6991 added in the preceding loop over the relocations. */
6993 for (i = 0; i < sec->reloc_count; i++)
6995 Elf_Internal_Rela *irel = &internal_relocs[i];
6996 bfd_boolean is_reachable;
6998 if (!is_resolvable_asm_expansion (abfd, sec, contents, irel, link_info,
7004 Elf_Internal_Rela *l32r_irel;
7006 asection *target_sec;
7007 xtensa_relax_info *target_relax_info;
7009 /* Mark the source_reloc for the L32R so that it will be
7010 removed in compute_removed_literals(), along with the
7011 associated literal. */
7012 l32r_irel = find_associated_l32r_irel (abfd, sec, contents,
7013 irel, internal_relocs);
7014 if (l32r_irel == NULL)
7017 r_reloc_init (&r_rel, abfd, l32r_irel, contents, sec_size);
7019 target_sec = r_reloc_get_section (&r_rel);
7020 target_relax_info = get_xtensa_relax_info (target_sec);
7022 if (target_relax_info
7023 && (target_relax_info->is_relaxable_literal_section
7024 || target_relax_info->is_relaxable_asm_section))
7026 source_reloc *s_reloc;
7028 /* Search the source_relocs for the entry corresponding to
7029 the l32r_irel. Note: The src_relocs array is not yet
7030 sorted, but it wouldn't matter anyway because we're
7031 searching by source offset instead of target offset. */
7032 s_reloc = find_source_reloc (target_relax_info->src_relocs,
7033 target_relax_info->src_next,
7035 BFD_ASSERT (s_reloc);
7036 s_reloc->is_null = TRUE;
7039 /* Convert this reloc to ASM_SIMPLIFY. */
7040 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7041 R_XTENSA_ASM_SIMPLIFY);
7042 l32r_irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
7044 pin_internal_relocs (sec, internal_relocs);
7048 /* It is resolvable but doesn't reach. We resolve now
7049 by eliminating the relocation -- the call will remain
7050 expanded into L32R/CALLX. */
7051 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
7052 pin_internal_relocs (sec, internal_relocs);
7057 release_contents (sec, contents);
7058 release_internal_relocs (sec, internal_relocs);
7063 /* Return TRUE if the asm expansion can be resolved. Generally it can
7064 be resolved on a final link or when a partial link locates it in the
7065 same section as the target. Set "is_reachable" flag if the target of
7066 the call is within the range of a direct call, given the current VMA
7067 for this section and the target section. */
7070 is_resolvable_asm_expansion (bfd *abfd,
7073 Elf_Internal_Rela *irel,
7074 struct bfd_link_info *link_info,
7075 bfd_boolean *is_reachable_p)
7077 asection *target_sec;
7078 bfd_vma target_offset;
7080 xtensa_opcode opcode, direct_call_opcode;
7081 bfd_vma self_address;
7082 bfd_vma dest_address;
7083 bfd_boolean uses_l32r;
7084 bfd_size_type sec_size;
7086 *is_reachable_p = FALSE;
7088 if (contents == NULL)
7091 if (ELF32_R_TYPE (irel->r_info) != R_XTENSA_ASM_EXPAND)
7094 sec_size = bfd_get_section_limit (abfd, sec);
7095 opcode = get_expanded_call_opcode (contents + irel->r_offset,
7096 sec_size - irel->r_offset, &uses_l32r);
7097 /* Optimization of longcalls that use CONST16 is not yet implemented. */
7101 direct_call_opcode = swap_callx_for_call_opcode (opcode);
7102 if (direct_call_opcode == XTENSA_UNDEFINED)
7105 /* Check and see that the target resolves. */
7106 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
7107 if (!r_reloc_is_defined (&r_rel))
7110 target_sec = r_reloc_get_section (&r_rel);
7111 target_offset = r_rel.target_offset;
7113 /* If the target is in a shared library, then it doesn't reach. This
7114 isn't supposed to come up because the compiler should never generate
7115 non-PIC calls on systems that use shared libraries, but the linker
7116 shouldn't crash regardless. */
7117 if (!target_sec->output_section)
7120 /* For relocatable sections, we can only simplify when the output
7121 section of the target is the same as the output section of the
7123 if (link_info->relocatable
7124 && (target_sec->output_section != sec->output_section
7125 || is_reloc_sym_weak (abfd, irel)))
7128 self_address = (sec->output_section->vma
7129 + sec->output_offset + irel->r_offset + 3);
7130 dest_address = (target_sec->output_section->vma
7131 + target_sec->output_offset + target_offset);
7133 *is_reachable_p = pcrel_reloc_fits (direct_call_opcode, 0,
7134 self_address, dest_address);
7136 if ((self_address >> CALL_SEGMENT_BITS) !=
7137 (dest_address >> CALL_SEGMENT_BITS))
7144 static Elf_Internal_Rela *
7145 find_associated_l32r_irel (bfd *abfd,
7148 Elf_Internal_Rela *other_irel,
7149 Elf_Internal_Rela *internal_relocs)
7153 for (i = 0; i < sec->reloc_count; i++)
7155 Elf_Internal_Rela *irel = &internal_relocs[i];
7157 if (irel == other_irel)
7159 if (irel->r_offset != other_irel->r_offset)
7161 if (is_l32r_relocation (abfd, sec, contents, irel))
7169 static xtensa_opcode *
7170 build_reloc_opcodes (bfd *abfd,
7173 Elf_Internal_Rela *internal_relocs)
7176 xtensa_opcode *reloc_opcodes =
7177 (xtensa_opcode *) bfd_malloc (sizeof (xtensa_opcode) * sec->reloc_count);
7178 for (i = 0; i < sec->reloc_count; i++)
7180 Elf_Internal_Rela *irel = &internal_relocs[i];
7181 reloc_opcodes[i] = get_relocation_opcode (abfd, sec, contents, irel);
7183 return reloc_opcodes;
7187 /* The compute_text_actions function will build a list of potential
7188 transformation actions for code in the extended basic block of each
7189 longcall that is optimized to a direct call. From this list we
7190 generate a set of actions to actually perform that optimizes for
7191 space and, if not using size_opt, maintains branch target
7194 These actions to be performed are placed on a per-section list.
7195 The actual changes are performed by relax_section() in the second
7199 compute_text_actions (bfd *abfd,
7201 struct bfd_link_info *link_info)
7203 xtensa_opcode *reloc_opcodes = NULL;
7204 xtensa_relax_info *relax_info;
7206 Elf_Internal_Rela *internal_relocs;
7207 bfd_boolean ok = TRUE;
7209 property_table_entry *prop_table = 0;
7211 bfd_size_type sec_size;
7213 relax_info = get_xtensa_relax_info (sec);
7214 BFD_ASSERT (relax_info);
7215 BFD_ASSERT (relax_info->src_next == relax_info->src_count);
7217 /* Do nothing if the section contains no optimized longcalls. */
7218 if (!relax_info->is_relaxable_asm_section)
7221 internal_relocs = retrieve_internal_relocs (abfd, sec,
7222 link_info->keep_memory);
7224 if (internal_relocs)
7225 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
7226 internal_reloc_compare);
7228 sec_size = bfd_get_section_limit (abfd, sec);
7229 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
7230 if (contents == NULL && sec_size != 0)
7236 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
7237 XTENSA_PROP_SEC_NAME, FALSE);
7244 for (i = 0; i < sec->reloc_count; i++)
7246 Elf_Internal_Rela *irel = &internal_relocs[i];
7248 property_table_entry *the_entry;
7251 ebb_constraint ebb_table;
7252 bfd_size_type simplify_size;
7254 if (irel && ELF32_R_TYPE (irel->r_info) != R_XTENSA_ASM_SIMPLIFY)
7256 r_offset = irel->r_offset;
7258 simplify_size = get_asm_simplify_size (contents, sec_size, r_offset);
7259 if (simplify_size == 0)
7261 (*_bfd_error_handler)
7262 (_("%B(%A+0x%lx): could not decode instruction for XTENSA_ASM_SIMPLIFY relocation; possible configuration mismatch"),
7263 sec->owner, sec, r_offset);
7267 /* If the instruction table is not around, then don't do this
7269 the_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
7270 sec->vma + irel->r_offset);
7271 if (the_entry == NULL || XTENSA_NO_NOP_REMOVAL)
7273 text_action_add (&relax_info->action_list,
7274 ta_convert_longcall, sec, r_offset,
7279 /* If the next longcall happens to be at the same address as an
7280 unreachable section of size 0, then skip forward. */
7281 ptbl_idx = the_entry - prop_table;
7282 while ((the_entry->flags & XTENSA_PROP_UNREACHABLE)
7283 && the_entry->size == 0
7284 && ptbl_idx + 1 < ptblsize
7285 && (prop_table[ptbl_idx + 1].address
7286 == prop_table[ptbl_idx].address))
7292 if (the_entry->flags & XTENSA_PROP_NO_TRANSFORM)
7293 /* NO_REORDER is OK */
7296 init_ebb_constraint (&ebb_table);
7297 ebb = &ebb_table.ebb;
7298 init_ebb (ebb, sec, contents, sec_size, prop_table, ptblsize,
7299 internal_relocs, sec->reloc_count);
7300 ebb->start_offset = r_offset + simplify_size;
7301 ebb->end_offset = r_offset + simplify_size;
7302 ebb->start_ptbl_idx = ptbl_idx;
7303 ebb->end_ptbl_idx = ptbl_idx;
7304 ebb->start_reloc_idx = i;
7305 ebb->end_reloc_idx = i;
7307 /* Precompute the opcode for each relocation. */
7308 if (reloc_opcodes == NULL)
7309 reloc_opcodes = build_reloc_opcodes (abfd, sec, contents,
7312 if (!extend_ebb_bounds (ebb)
7313 || !compute_ebb_proposed_actions (&ebb_table)
7314 || !compute_ebb_actions (&ebb_table)
7315 || !check_section_ebb_pcrels_fit (abfd, sec, contents,
7316 internal_relocs, &ebb_table,
7318 || !check_section_ebb_reduces (&ebb_table))
7320 /* If anything goes wrong or we get unlucky and something does
7321 not fit, with our plan because of expansion between
7322 critical branches, just convert to a NOP. */
7324 text_action_add (&relax_info->action_list,
7325 ta_convert_longcall, sec, r_offset, 0);
7326 i = ebb_table.ebb.end_reloc_idx;
7327 free_ebb_constraint (&ebb_table);
7331 text_action_add_proposed (&relax_info->action_list, &ebb_table, sec);
7333 /* Update the index so we do not go looking at the relocations
7334 we have already processed. */
7335 i = ebb_table.ebb.end_reloc_idx;
7336 free_ebb_constraint (&ebb_table);
7340 if (relax_info->action_list.head)
7341 print_action_list (stderr, &relax_info->action_list);
7345 release_contents (sec, contents);
7346 release_internal_relocs (sec, internal_relocs);
7350 free (reloc_opcodes);
7356 /* Do not widen an instruction if it is preceeded by a
7357 loop opcode. It might cause misalignment. */
7360 prev_instr_is_a_loop (bfd_byte *contents,
7361 bfd_size_type content_length,
7362 bfd_size_type offset)
7364 xtensa_opcode prev_opcode;
7368 prev_opcode = insn_decode_opcode (contents, content_length, offset-3, 0);
7369 return (xtensa_opcode_is_loop (xtensa_default_isa, prev_opcode) == 1);
7373 /* Find all of the possible actions for an extended basic block. */
7376 compute_ebb_proposed_actions (ebb_constraint *ebb_table)
7378 const ebb_t *ebb = &ebb_table->ebb;
7379 unsigned rel_idx = ebb->start_reloc_idx;
7380 property_table_entry *entry, *start_entry, *end_entry;
7382 xtensa_isa isa = xtensa_default_isa;
7384 static xtensa_insnbuf insnbuf = NULL;
7385 static xtensa_insnbuf slotbuf = NULL;
7387 if (insnbuf == NULL)
7389 insnbuf = xtensa_insnbuf_alloc (isa);
7390 slotbuf = xtensa_insnbuf_alloc (isa);
7393 start_entry = &ebb->ptbl[ebb->start_ptbl_idx];
7394 end_entry = &ebb->ptbl[ebb->end_ptbl_idx];
7396 for (entry = start_entry; entry <= end_entry; entry++)
7398 bfd_vma start_offset, end_offset;
7399 bfd_size_type insn_len;
7401 start_offset = entry->address - ebb->sec->vma;
7402 end_offset = entry->address + entry->size - ebb->sec->vma;
7404 if (entry == start_entry)
7405 start_offset = ebb->start_offset;
7406 if (entry == end_entry)
7407 end_offset = ebb->end_offset;
7408 offset = start_offset;
7410 if (offset == entry->address - ebb->sec->vma
7411 && (entry->flags & XTENSA_PROP_INSN_BRANCH_TARGET) != 0)
7413 enum ebb_target_enum align_type = EBB_DESIRE_TGT_ALIGN;
7414 BFD_ASSERT (offset != end_offset);
7415 if (offset == end_offset)
7418 insn_len = insn_decode_len (ebb->contents, ebb->content_length,
7423 if (check_branch_target_aligned_address (offset, insn_len))
7424 align_type = EBB_REQUIRE_TGT_ALIGN;
7426 ebb_propose_action (ebb_table, align_type, 0,
7427 ta_none, offset, 0, TRUE);
7430 while (offset != end_offset)
7432 Elf_Internal_Rela *irel;
7433 xtensa_opcode opcode;
7435 while (rel_idx < ebb->end_reloc_idx
7436 && (ebb->relocs[rel_idx].r_offset < offset
7437 || (ebb->relocs[rel_idx].r_offset == offset
7438 && (ELF32_R_TYPE (ebb->relocs[rel_idx].r_info)
7439 != R_XTENSA_ASM_SIMPLIFY))))
7442 /* Check for longcall. */
7443 irel = &ebb->relocs[rel_idx];
7444 if (irel->r_offset == offset
7445 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_ASM_SIMPLIFY)
7447 bfd_size_type simplify_size;
7449 simplify_size = get_asm_simplify_size (ebb->contents,
7450 ebb->content_length,
7452 if (simplify_size == 0)
7455 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7456 ta_convert_longcall, offset, 0, TRUE);
7458 offset += simplify_size;
7462 if (offset + MIN_INSN_LENGTH > ebb->content_length)
7464 xtensa_insnbuf_from_chars (isa, insnbuf, &ebb->contents[offset],
7465 ebb->content_length - offset);
7466 fmt = xtensa_format_decode (isa, insnbuf);
7467 if (fmt == XTENSA_UNDEFINED)
7469 insn_len = xtensa_format_length (isa, fmt);
7470 if (insn_len == (bfd_size_type) XTENSA_UNDEFINED)
7473 if (xtensa_format_num_slots (isa, fmt) != 1)
7479 xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf);
7480 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
7481 if (opcode == XTENSA_UNDEFINED)
7484 if ((entry->flags & XTENSA_PROP_INSN_NO_DENSITY) == 0
7485 && (entry->flags & XTENSA_PROP_NO_TRANSFORM) == 0
7486 && can_narrow_instruction (slotbuf, fmt, opcode) != 0)
7488 /* Add an instruction narrow action. */
7489 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7490 ta_narrow_insn, offset, 0, FALSE);
7492 else if ((entry->flags & XTENSA_PROP_NO_TRANSFORM) == 0
7493 && can_widen_instruction (slotbuf, fmt, opcode) != 0
7494 && ! prev_instr_is_a_loop (ebb->contents,
7495 ebb->content_length, offset))
7497 /* Add an instruction widen action. */
7498 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7499 ta_widen_insn, offset, 0, FALSE);
7501 else if (xtensa_opcode_is_loop (xtensa_default_isa, opcode) == 1)
7503 /* Check for branch targets. */
7504 ebb_propose_action (ebb_table, EBB_REQUIRE_LOOP_ALIGN, 0,
7505 ta_none, offset, 0, TRUE);
7512 if (ebb->ends_unreachable)
7514 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7515 ta_fill, ebb->end_offset, 0, TRUE);
7521 (*_bfd_error_handler)
7522 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
7523 ebb->sec->owner, ebb->sec, offset);
7528 /* After all of the information has collected about the
7529 transformations possible in an EBB, compute the appropriate actions
7530 here in compute_ebb_actions. We still must check later to make
7531 sure that the actions do not break any relocations. The algorithm
7532 used here is pretty greedy. Basically, it removes as many no-ops
7533 as possible so that the end of the EBB has the same alignment
7534 characteristics as the original. First, it uses narrowing, then
7535 fill space at the end of the EBB, and finally widenings. If that
7536 does not work, it tries again with one fewer no-op removed. The
7537 optimization will only be performed if all of the branch targets
7538 that were aligned before transformation are also aligned after the
7541 When the size_opt flag is set, ignore the branch target alignments,
7542 narrow all wide instructions, and remove all no-ops unless the end
7543 of the EBB prevents it. */
7546 compute_ebb_actions (ebb_constraint *ebb_table)
7550 int removed_bytes = 0;
7551 ebb_t *ebb = &ebb_table->ebb;
7552 unsigned seg_idx_start = 0;
7553 unsigned seg_idx_end = 0;
7555 /* We perform this like the assembler relaxation algorithm: Start by
7556 assuming all instructions are narrow and all no-ops removed; then
7559 /* For each segment of this that has a solid constraint, check to
7560 see if there are any combinations that will keep the constraint.
7562 for (seg_idx_end = 0; seg_idx_end < ebb_table->action_count; seg_idx_end++)
7564 bfd_boolean requires_text_end_align = FALSE;
7565 unsigned longcall_count = 0;
7566 unsigned longcall_convert_count = 0;
7567 unsigned narrowable_count = 0;
7568 unsigned narrowable_convert_count = 0;
7569 unsigned widenable_count = 0;
7570 unsigned widenable_convert_count = 0;
7572 proposed_action *action = NULL;
7573 int align = (1 << ebb_table->ebb.sec->alignment_power);
7575 seg_idx_start = seg_idx_end;
7577 for (i = seg_idx_start; i < ebb_table->action_count; i++)
7579 action = &ebb_table->actions[i];
7580 if (action->action == ta_convert_longcall)
7582 if (action->action == ta_narrow_insn)
7584 if (action->action == ta_widen_insn)
7586 if (action->action == ta_fill)
7588 if (action->align_type == EBB_REQUIRE_LOOP_ALIGN)
7590 if (action->align_type == EBB_REQUIRE_TGT_ALIGN
7591 && !elf32xtensa_size_opt)
7596 if (seg_idx_end == ebb_table->action_count && !ebb->ends_unreachable)
7597 requires_text_end_align = TRUE;
7599 if (elf32xtensa_size_opt && !requires_text_end_align
7600 && action->align_type != EBB_REQUIRE_LOOP_ALIGN
7601 && action->align_type != EBB_REQUIRE_TGT_ALIGN)
7603 longcall_convert_count = longcall_count;
7604 narrowable_convert_count = narrowable_count;
7605 widenable_convert_count = 0;
7609 /* There is a constraint. Convert the max number of longcalls. */
7610 narrowable_convert_count = 0;
7611 longcall_convert_count = 0;
7612 widenable_convert_count = 0;
7614 for (j = 0; j < longcall_count; j++)
7616 int removed = (longcall_count - j) * 3 & (align - 1);
7617 unsigned desire_narrow = (align - removed) & (align - 1);
7618 unsigned desire_widen = removed;
7619 if (desire_narrow <= narrowable_count)
7621 narrowable_convert_count = desire_narrow;
7622 narrowable_convert_count +=
7623 (align * ((narrowable_count - narrowable_convert_count)
7625 longcall_convert_count = (longcall_count - j);
7626 widenable_convert_count = 0;
7629 if (desire_widen <= widenable_count && !elf32xtensa_size_opt)
7631 narrowable_convert_count = 0;
7632 longcall_convert_count = longcall_count - j;
7633 widenable_convert_count = desire_widen;
7639 /* Now the number of conversions are saved. Do them. */
7640 for (i = seg_idx_start; i < seg_idx_end; i++)
7642 action = &ebb_table->actions[i];
7643 switch (action->action)
7645 case ta_convert_longcall:
7646 if (longcall_convert_count != 0)
7648 action->action = ta_remove_longcall;
7649 action->do_action = TRUE;
7650 action->removed_bytes += 3;
7651 longcall_convert_count--;
7654 case ta_narrow_insn:
7655 if (narrowable_convert_count != 0)
7657 action->do_action = TRUE;
7658 action->removed_bytes += 1;
7659 narrowable_convert_count--;
7663 if (widenable_convert_count != 0)
7665 action->do_action = TRUE;
7666 action->removed_bytes -= 1;
7667 widenable_convert_count--;
7676 /* Now we move on to some local opts. Try to remove each of the
7677 remaining longcalls. */
7679 if (ebb_table->ebb.ends_section || ebb_table->ebb.ends_unreachable)
7682 for (i = 0; i < ebb_table->action_count; i++)
7684 int old_removed_bytes = removed_bytes;
7685 proposed_action *action = &ebb_table->actions[i];
7687 if (action->do_action && action->action == ta_convert_longcall)
7689 bfd_boolean bad_alignment = FALSE;
7691 for (j = i + 1; j < ebb_table->action_count; j++)
7693 proposed_action *new_action = &ebb_table->actions[j];
7694 bfd_vma offset = new_action->offset;
7695 if (new_action->align_type == EBB_REQUIRE_TGT_ALIGN)
7697 if (!check_branch_target_aligned
7698 (ebb_table->ebb.contents,
7699 ebb_table->ebb.content_length,
7700 offset, offset - removed_bytes))
7702 bad_alignment = TRUE;
7706 if (new_action->align_type == EBB_REQUIRE_LOOP_ALIGN)
7708 if (!check_loop_aligned (ebb_table->ebb.contents,
7709 ebb_table->ebb.content_length,
7711 offset - removed_bytes))
7713 bad_alignment = TRUE;
7717 if (new_action->action == ta_narrow_insn
7718 && !new_action->do_action
7719 && ebb_table->ebb.sec->alignment_power == 2)
7721 /* Narrow an instruction and we are done. */
7722 new_action->do_action = TRUE;
7723 new_action->removed_bytes += 1;
7724 bad_alignment = FALSE;
7727 if (new_action->action == ta_widen_insn
7728 && new_action->do_action
7729 && ebb_table->ebb.sec->alignment_power == 2)
7731 /* Narrow an instruction and we are done. */
7732 new_action->do_action = FALSE;
7733 new_action->removed_bytes += 1;
7734 bad_alignment = FALSE;
7737 if (new_action->do_action)
7738 removed_bytes += new_action->removed_bytes;
7742 action->removed_bytes += 3;
7743 action->action = ta_remove_longcall;
7744 action->do_action = TRUE;
7747 removed_bytes = old_removed_bytes;
7748 if (action->do_action)
7749 removed_bytes += action->removed_bytes;
7754 for (i = 0; i < ebb_table->action_count; ++i)
7756 proposed_action *action = &ebb_table->actions[i];
7757 if (action->do_action)
7758 removed_bytes += action->removed_bytes;
7761 if ((removed_bytes % (1 << ebb_table->ebb.sec->alignment_power)) != 0
7762 && ebb->ends_unreachable)
7764 proposed_action *action;
7768 BFD_ASSERT (ebb_table->action_count != 0);
7769 action = &ebb_table->actions[ebb_table->action_count - 1];
7770 BFD_ASSERT (action->action == ta_fill);
7771 BFD_ASSERT (ebb->ends_unreachable->flags & XTENSA_PROP_UNREACHABLE);
7773 extra_space = compute_fill_extra_space (ebb->ends_unreachable);
7774 br = action->removed_bytes + removed_bytes + extra_space;
7775 br = br & ((1 << ebb->sec->alignment_power ) - 1);
7777 action->removed_bytes = extra_space - br;
7783 /* The xlate_map is a sorted array of address mappings designed to
7784 answer the offset_with_removed_text() query with a binary search instead
7785 of a linear search through the section's action_list. */
7787 typedef struct xlate_map_entry xlate_map_entry_t;
7788 typedef struct xlate_map xlate_map_t;
7790 struct xlate_map_entry
7792 unsigned orig_address;
7793 unsigned new_address;
7799 unsigned entry_count;
7800 xlate_map_entry_t *entry;
7805 xlate_compare (const void *a_v, const void *b_v)
7807 const xlate_map_entry_t *a = (const xlate_map_entry_t *) a_v;
7808 const xlate_map_entry_t *b = (const xlate_map_entry_t *) b_v;
7809 if (a->orig_address < b->orig_address)
7811 if (a->orig_address > (b->orig_address + b->size - 1))
7818 xlate_offset_with_removed_text (const xlate_map_t *map,
7819 text_action_list *action_list,
7823 xlate_map_entry_t *e;
7826 return offset_with_removed_text (action_list, offset);
7828 if (map->entry_count == 0)
7831 r = bsearch (&offset, map->entry, map->entry_count,
7832 sizeof (xlate_map_entry_t), &xlate_compare);
7833 e = (xlate_map_entry_t *) r;
7835 BFD_ASSERT (e != NULL);
7838 return e->new_address - e->orig_address + offset;
7842 /* Build a binary searchable offset translation map from a section's
7845 static xlate_map_t *
7846 build_xlate_map (asection *sec, xtensa_relax_info *relax_info)
7848 xlate_map_t *map = (xlate_map_t *) bfd_malloc (sizeof (xlate_map_t));
7849 text_action_list *action_list = &relax_info->action_list;
7850 unsigned num_actions = 0;
7853 xlate_map_entry_t *current_entry;
7858 num_actions = action_list_count (action_list);
7859 map->entry = (xlate_map_entry_t *)
7860 bfd_malloc (sizeof (xlate_map_entry_t) * (num_actions + 1));
7861 if (map->entry == NULL)
7866 map->entry_count = 0;
7869 current_entry = &map->entry[0];
7871 current_entry->orig_address = 0;
7872 current_entry->new_address = 0;
7873 current_entry->size = 0;
7875 for (r = action_list->head; r != NULL; r = r->next)
7877 unsigned orig_size = 0;
7881 case ta_remove_insn:
7882 case ta_convert_longcall:
7883 case ta_remove_literal:
7884 case ta_add_literal:
7886 case ta_remove_longcall:
7889 case ta_narrow_insn:
7898 current_entry->size =
7899 r->offset + orig_size - current_entry->orig_address;
7900 if (current_entry->size != 0)
7905 current_entry->orig_address = r->offset + orig_size;
7906 removed += r->removed_bytes;
7907 current_entry->new_address = r->offset + orig_size - removed;
7908 current_entry->size = 0;
7911 current_entry->size = (bfd_get_section_limit (sec->owner, sec)
7912 - current_entry->orig_address);
7913 if (current_entry->size != 0)
7920 /* Free an offset translation map. */
7923 free_xlate_map (xlate_map_t *map)
7925 if (map && map->entry)
7932 /* Use check_section_ebb_pcrels_fit to make sure that all of the
7933 relocations in a section will fit if a proposed set of actions
7937 check_section_ebb_pcrels_fit (bfd *abfd,
7940 Elf_Internal_Rela *internal_relocs,
7941 const ebb_constraint *constraint,
7942 const xtensa_opcode *reloc_opcodes)
7945 Elf_Internal_Rela *irel;
7946 xlate_map_t *xmap = NULL;
7947 bfd_boolean ok = TRUE;
7948 xtensa_relax_info *relax_info;
7950 relax_info = get_xtensa_relax_info (sec);
7952 if (relax_info && sec->reloc_count > 100)
7954 xmap = build_xlate_map (sec, relax_info);
7955 /* NULL indicates out of memory, but the slow version
7956 can still be used. */
7959 for (i = 0; i < sec->reloc_count; i++)
7962 bfd_vma orig_self_offset, orig_target_offset;
7963 bfd_vma self_offset, target_offset;
7965 reloc_howto_type *howto;
7966 int self_removed_bytes, target_removed_bytes;
7968 irel = &internal_relocs[i];
7969 r_type = ELF32_R_TYPE (irel->r_info);
7971 howto = &elf_howto_table[r_type];
7972 /* We maintain the required invariant: PC-relative relocations
7973 that fit before linking must fit after linking. Thus we only
7974 need to deal with relocations to the same section that are
7976 if (r_type == R_XTENSA_ASM_SIMPLIFY
7977 || r_type == R_XTENSA_32_PCREL
7978 || !howto->pc_relative)
7981 r_reloc_init (&r_rel, abfd, irel, contents,
7982 bfd_get_section_limit (abfd, sec));
7984 if (r_reloc_get_section (&r_rel) != sec)
7987 orig_self_offset = irel->r_offset;
7988 orig_target_offset = r_rel.target_offset;
7990 self_offset = orig_self_offset;
7991 target_offset = orig_target_offset;
7996 xlate_offset_with_removed_text (xmap, &relax_info->action_list,
7999 xlate_offset_with_removed_text (xmap, &relax_info->action_list,
8000 orig_target_offset);
8003 self_removed_bytes = 0;
8004 target_removed_bytes = 0;
8006 for (j = 0; j < constraint->action_count; ++j)
8008 proposed_action *action = &constraint->actions[j];
8009 bfd_vma offset = action->offset;
8010 int removed_bytes = action->removed_bytes;
8011 if (offset < orig_self_offset
8012 || (offset == orig_self_offset && action->action == ta_fill
8013 && action->removed_bytes < 0))
8014 self_removed_bytes += removed_bytes;
8015 if (offset < orig_target_offset
8016 || (offset == orig_target_offset && action->action == ta_fill
8017 && action->removed_bytes < 0))
8018 target_removed_bytes += removed_bytes;
8020 self_offset -= self_removed_bytes;
8021 target_offset -= target_removed_bytes;
8023 /* Try to encode it. Get the operand and check. */
8024 if (is_alt_relocation (ELF32_R_TYPE (irel->r_info)))
8026 /* None of the current alternate relocs are PC-relative,
8027 and only PC-relative relocs matter here. */
8031 xtensa_opcode opcode;
8035 opcode = reloc_opcodes[i];
8037 opcode = get_relocation_opcode (abfd, sec, contents, irel);
8038 if (opcode == XTENSA_UNDEFINED)
8044 opnum = get_relocation_opnd (opcode, ELF32_R_TYPE (irel->r_info));
8045 if (opnum == XTENSA_UNDEFINED)
8051 if (!pcrel_reloc_fits (opcode, opnum, self_offset, target_offset))
8060 free_xlate_map (xmap);
8067 check_section_ebb_reduces (const ebb_constraint *constraint)
8072 for (i = 0; i < constraint->action_count; i++)
8074 const proposed_action *action = &constraint->actions[i];
8075 if (action->do_action)
8076 removed += action->removed_bytes;
8086 text_action_add_proposed (text_action_list *l,
8087 const ebb_constraint *ebb_table,
8092 for (i = 0; i < ebb_table->action_count; i++)
8094 proposed_action *action = &ebb_table->actions[i];
8096 if (!action->do_action)
8098 switch (action->action)
8100 case ta_remove_insn:
8101 case ta_remove_longcall:
8102 case ta_convert_longcall:
8103 case ta_narrow_insn:
8106 case ta_remove_literal:
8107 text_action_add (l, action->action, sec, action->offset,
8108 action->removed_bytes);
8121 compute_fill_extra_space (property_table_entry *entry)
8123 int fill_extra_space;
8128 if ((entry->flags & XTENSA_PROP_UNREACHABLE) == 0)
8131 fill_extra_space = entry->size;
8132 if ((entry->flags & XTENSA_PROP_ALIGN) != 0)
8134 /* Fill bytes for alignment:
8135 (2**n)-1 - (addr + (2**n)-1) & (2**n -1) */
8136 int pow = GET_XTENSA_PROP_ALIGNMENT (entry->flags);
8137 int nsm = (1 << pow) - 1;
8138 bfd_vma addr = entry->address + entry->size;
8139 bfd_vma align_fill = nsm - ((addr + nsm) & nsm);
8140 fill_extra_space += align_fill;
8142 return fill_extra_space;
8146 /* First relaxation pass. */
8148 /* If the section contains relaxable literals, check each literal to
8149 see if it has the same value as another literal that has already
8150 been seen, either in the current section or a previous one. If so,
8151 add an entry to the per-section list of removed literals. The
8152 actual changes are deferred until the next pass. */
8155 compute_removed_literals (bfd *abfd,
8157 struct bfd_link_info *link_info,
8158 value_map_hash_table *values)
8160 xtensa_relax_info *relax_info;
8162 Elf_Internal_Rela *internal_relocs;
8163 source_reloc *src_relocs, *rel;
8164 bfd_boolean ok = TRUE;
8165 property_table_entry *prop_table = NULL;
8168 bfd_boolean last_loc_is_prev = FALSE;
8169 bfd_vma last_target_offset = 0;
8170 section_cache_t target_sec_cache;
8171 bfd_size_type sec_size;
8173 init_section_cache (&target_sec_cache);
8175 /* Do nothing if it is not a relaxable literal section. */
8176 relax_info = get_xtensa_relax_info (sec);
8177 BFD_ASSERT (relax_info);
8178 if (!relax_info->is_relaxable_literal_section)
8181 internal_relocs = retrieve_internal_relocs (abfd, sec,
8182 link_info->keep_memory);
8184 sec_size = bfd_get_section_limit (abfd, sec);
8185 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
8186 if (contents == NULL && sec_size != 0)
8192 /* Sort the source_relocs by target offset. */
8193 src_relocs = relax_info->src_relocs;
8194 qsort (src_relocs, relax_info->src_count,
8195 sizeof (source_reloc), source_reloc_compare);
8196 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
8197 internal_reloc_compare);
8199 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
8200 XTENSA_PROP_SEC_NAME, FALSE);
8208 for (i = 0; i < relax_info->src_count; i++)
8210 Elf_Internal_Rela *irel = NULL;
8212 rel = &src_relocs[i];
8213 if (get_l32r_opcode () != rel->opcode)
8215 irel = get_irel_at_offset (sec, internal_relocs,
8216 rel->r_rel.target_offset);
8218 /* If the relocation on this is not a simple R_XTENSA_32 or
8219 R_XTENSA_PLT then do not consider it. This may happen when
8220 the difference of two symbols is used in a literal. */
8221 if (irel && (ELF32_R_TYPE (irel->r_info) != R_XTENSA_32
8222 && ELF32_R_TYPE (irel->r_info) != R_XTENSA_PLT))
8225 /* If the target_offset for this relocation is the same as the
8226 previous relocation, then we've already considered whether the
8227 literal can be coalesced. Skip to the next one.... */
8228 if (i != 0 && prev_i != -1
8229 && src_relocs[i-1].r_rel.target_offset == rel->r_rel.target_offset)
8233 if (last_loc_is_prev &&
8234 last_target_offset + 4 != rel->r_rel.target_offset)
8235 last_loc_is_prev = FALSE;
8237 /* Check if the relocation was from an L32R that is being removed
8238 because a CALLX was converted to a direct CALL, and check if
8239 there are no other relocations to the literal. */
8240 if (is_removable_literal (rel, i, src_relocs, relax_info->src_count,
8241 sec, prop_table, ptblsize))
8243 if (!remove_dead_literal (abfd, sec, link_info, internal_relocs,
8244 irel, rel, prop_table, ptblsize))
8249 last_target_offset = rel->r_rel.target_offset;
8253 if (!identify_literal_placement (abfd, sec, contents, link_info,
8255 &last_loc_is_prev, irel,
8256 relax_info->src_count - i, rel,
8257 prop_table, ptblsize,
8258 &target_sec_cache, rel->is_abs_literal))
8263 last_target_offset = rel->r_rel.target_offset;
8267 print_removed_literals (stderr, &relax_info->removed_list);
8268 print_action_list (stderr, &relax_info->action_list);
8274 free_section_cache (&target_sec_cache);
8276 release_contents (sec, contents);
8277 release_internal_relocs (sec, internal_relocs);
8282 static Elf_Internal_Rela *
8283 get_irel_at_offset (asection *sec,
8284 Elf_Internal_Rela *internal_relocs,
8288 Elf_Internal_Rela *irel;
8290 Elf_Internal_Rela key;
8292 if (!internal_relocs)
8295 key.r_offset = offset;
8296 irel = bsearch (&key, internal_relocs, sec->reloc_count,
8297 sizeof (Elf_Internal_Rela), internal_reloc_matches);
8301 /* bsearch does not guarantee which will be returned if there are
8302 multiple matches. We need the first that is not an alignment. */
8303 i = irel - internal_relocs;
8306 if (internal_relocs[i-1].r_offset != offset)
8310 for ( ; i < sec->reloc_count; i++)
8312 irel = &internal_relocs[i];
8313 r_type = ELF32_R_TYPE (irel->r_info);
8314 if (irel->r_offset == offset && r_type != R_XTENSA_NONE)
8323 is_removable_literal (const source_reloc *rel,
8325 const source_reloc *src_relocs,
8328 property_table_entry *prop_table,
8331 const source_reloc *curr_rel;
8332 property_table_entry *entry;
8337 entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8338 sec->vma + rel->r_rel.target_offset);
8339 if (entry && (entry->flags & XTENSA_PROP_NO_TRANSFORM))
8342 for (++i; i < src_count; ++i)
8344 curr_rel = &src_relocs[i];
8345 /* If all others have the same target offset.... */
8346 if (curr_rel->r_rel.target_offset != rel->r_rel.target_offset)
8349 if (!curr_rel->is_null
8350 && !xtensa_is_property_section (curr_rel->source_sec)
8351 && !(curr_rel->source_sec->flags & SEC_DEBUGGING))
8359 remove_dead_literal (bfd *abfd,
8361 struct bfd_link_info *link_info,
8362 Elf_Internal_Rela *internal_relocs,
8363 Elf_Internal_Rela *irel,
8365 property_table_entry *prop_table,
8368 property_table_entry *entry;
8369 xtensa_relax_info *relax_info;
8371 relax_info = get_xtensa_relax_info (sec);
8375 entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8376 sec->vma + rel->r_rel.target_offset);
8378 /* Mark the unused literal so that it will be removed. */
8379 add_removed_literal (&relax_info->removed_list, &rel->r_rel, NULL);
8381 text_action_add (&relax_info->action_list,
8382 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
8384 /* If the section is 4-byte aligned, do not add fill. */
8385 if (sec->alignment_power > 2)
8387 int fill_extra_space;
8388 bfd_vma entry_sec_offset;
8390 property_table_entry *the_add_entry;
8394 entry_sec_offset = entry->address - sec->vma + entry->size;
8396 entry_sec_offset = rel->r_rel.target_offset + 4;
8398 /* If the literal range is at the end of the section,
8400 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8402 fill_extra_space = compute_fill_extra_space (the_add_entry);
8404 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
8405 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
8406 -4, fill_extra_space);
8408 adjust_fill_action (fa, removed_diff);
8410 text_action_add (&relax_info->action_list,
8411 ta_fill, sec, entry_sec_offset, removed_diff);
8414 /* Zero out the relocation on this literal location. */
8417 if (elf_hash_table (link_info)->dynamic_sections_created)
8418 shrink_dynamic_reloc_sections (link_info, abfd, sec, irel);
8420 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
8421 pin_internal_relocs (sec, internal_relocs);
8424 /* Do not modify "last_loc_is_prev". */
8430 identify_literal_placement (bfd *abfd,
8433 struct bfd_link_info *link_info,
8434 value_map_hash_table *values,
8435 bfd_boolean *last_loc_is_prev_p,
8436 Elf_Internal_Rela *irel,
8437 int remaining_src_rels,
8439 property_table_entry *prop_table,
8441 section_cache_t *target_sec_cache,
8442 bfd_boolean is_abs_literal)
8446 xtensa_relax_info *relax_info;
8447 bfd_boolean literal_placed = FALSE;
8449 unsigned long value;
8450 bfd_boolean final_static_link;
8451 bfd_size_type sec_size;
8453 relax_info = get_xtensa_relax_info (sec);
8457 sec_size = bfd_get_section_limit (abfd, sec);
8460 (!link_info->relocatable
8461 && !elf_hash_table (link_info)->dynamic_sections_created);
8463 /* The placement algorithm first checks to see if the literal is
8464 already in the value map. If so and the value map is reachable
8465 from all uses, then the literal is moved to that location. If
8466 not, then we identify the last location where a fresh literal was
8467 placed. If the literal can be safely moved there, then we do so.
8468 If not, then we assume that the literal is not to move and leave
8469 the literal where it is, marking it as the last literal
8472 /* Find the literal value. */
8474 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
8477 BFD_ASSERT (rel->r_rel.target_offset < sec_size);
8478 value = bfd_get_32 (abfd, contents + rel->r_rel.target_offset);
8480 init_literal_value (&val, &r_rel, value, is_abs_literal);
8482 /* Check if we've seen another literal with the same value that
8483 is in the same output section. */
8484 val_map = value_map_get_cached_value (values, &val, final_static_link);
8487 && (r_reloc_get_section (&val_map->loc)->output_section
8488 == sec->output_section)
8489 && relocations_reach (rel, remaining_src_rels, &val_map->loc)
8490 && coalesce_shared_literal (sec, rel, prop_table, ptblsize, val_map))
8492 /* No change to last_loc_is_prev. */
8493 literal_placed = TRUE;
8496 /* For relocatable links, do not try to move literals. To do it
8497 correctly might increase the number of relocations in an input
8498 section making the default relocatable linking fail. */
8499 if (!link_info->relocatable && !literal_placed
8500 && values->has_last_loc && !(*last_loc_is_prev_p))
8502 asection *target_sec = r_reloc_get_section (&values->last_loc);
8503 if (target_sec && target_sec->output_section == sec->output_section)
8505 /* Increment the virtual offset. */
8506 r_reloc try_loc = values->last_loc;
8507 try_loc.virtual_offset += 4;
8509 /* There is a last loc that was in the same output section. */
8510 if (relocations_reach (rel, remaining_src_rels, &try_loc)
8511 && move_shared_literal (sec, link_info, rel,
8512 prop_table, ptblsize,
8513 &try_loc, &val, target_sec_cache))
8515 values->last_loc.virtual_offset += 4;
8516 literal_placed = TRUE;
8518 val_map = add_value_map (values, &val, &try_loc,
8521 val_map->loc = try_loc;
8526 if (!literal_placed)
8528 /* Nothing worked, leave the literal alone but update the last loc. */
8529 values->has_last_loc = TRUE;
8530 values->last_loc = rel->r_rel;
8532 val_map = add_value_map (values, &val, &rel->r_rel, final_static_link);
8534 val_map->loc = rel->r_rel;
8535 *last_loc_is_prev_p = TRUE;
8542 /* Check if the original relocations (presumably on L32R instructions)
8543 identified by reloc[0..N] can be changed to reference the literal
8544 identified by r_rel. If r_rel is out of range for any of the
8545 original relocations, then we don't want to coalesce the original
8546 literal with the one at r_rel. We only check reloc[0..N], where the
8547 offsets are all the same as for reloc[0] (i.e., they're all
8548 referencing the same literal) and where N is also bounded by the
8549 number of remaining entries in the "reloc" array. The "reloc" array
8550 is sorted by target offset so we know all the entries for the same
8551 literal will be contiguous. */
8554 relocations_reach (source_reloc *reloc,
8555 int remaining_relocs,
8556 const r_reloc *r_rel)
8558 bfd_vma from_offset, source_address, dest_address;
8562 if (!r_reloc_is_defined (r_rel))
8565 sec = r_reloc_get_section (r_rel);
8566 from_offset = reloc[0].r_rel.target_offset;
8568 for (i = 0; i < remaining_relocs; i++)
8570 if (reloc[i].r_rel.target_offset != from_offset)
8573 /* Ignore relocations that have been removed. */
8574 if (reloc[i].is_null)
8577 /* The original and new output section for these must be the same
8578 in order to coalesce. */
8579 if (r_reloc_get_section (&reloc[i].r_rel)->output_section
8580 != sec->output_section)
8583 /* Absolute literals in the same output section can always be
8585 if (reloc[i].is_abs_literal)
8588 /* A literal with no PC-relative relocations can be moved anywhere. */
8589 if (reloc[i].opnd != -1)
8591 /* Otherwise, check to see that it fits. */
8592 source_address = (reloc[i].source_sec->output_section->vma
8593 + reloc[i].source_sec->output_offset
8594 + reloc[i].r_rel.rela.r_offset);
8595 dest_address = (sec->output_section->vma
8596 + sec->output_offset
8597 + r_rel->target_offset);
8599 if (!pcrel_reloc_fits (reloc[i].opcode, reloc[i].opnd,
8600 source_address, dest_address))
8609 /* Move a literal to another literal location because it is
8610 the same as the other literal value. */
8613 coalesce_shared_literal (asection *sec,
8615 property_table_entry *prop_table,
8619 property_table_entry *entry;
8621 property_table_entry *the_add_entry;
8623 xtensa_relax_info *relax_info;
8625 relax_info = get_xtensa_relax_info (sec);
8629 entry = elf_xtensa_find_property_entry
8630 (prop_table, ptblsize, sec->vma + rel->r_rel.target_offset);
8631 if (entry && (entry->flags & XTENSA_PROP_NO_TRANSFORM))
8634 /* Mark that the literal will be coalesced. */
8635 add_removed_literal (&relax_info->removed_list, &rel->r_rel, &val_map->loc);
8637 text_action_add (&relax_info->action_list,
8638 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
8640 /* If the section is 4-byte aligned, do not add fill. */
8641 if (sec->alignment_power > 2)
8643 int fill_extra_space;
8644 bfd_vma entry_sec_offset;
8647 entry_sec_offset = entry->address - sec->vma + entry->size;
8649 entry_sec_offset = rel->r_rel.target_offset + 4;
8651 /* If the literal range is at the end of the section,
8653 fill_extra_space = 0;
8654 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8656 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
8657 fill_extra_space = the_add_entry->size;
8659 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
8660 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
8661 -4, fill_extra_space);
8663 adjust_fill_action (fa, removed_diff);
8665 text_action_add (&relax_info->action_list,
8666 ta_fill, sec, entry_sec_offset, removed_diff);
8673 /* Move a literal to another location. This may actually increase the
8674 total amount of space used because of alignments so we need to do
8675 this carefully. Also, it may make a branch go out of range. */
8678 move_shared_literal (asection *sec,
8679 struct bfd_link_info *link_info,
8681 property_table_entry *prop_table,
8683 const r_reloc *target_loc,
8684 const literal_value *lit_value,
8685 section_cache_t *target_sec_cache)
8687 property_table_entry *the_add_entry, *src_entry, *target_entry = NULL;
8688 text_action *fa, *target_fa;
8690 xtensa_relax_info *relax_info, *target_relax_info;
8691 asection *target_sec;
8693 ebb_constraint ebb_table;
8694 bfd_boolean relocs_fit;
8696 /* If this routine always returns FALSE, the literals that cannot be
8697 coalesced will not be moved. */
8698 if (elf32xtensa_no_literal_movement)
8701 relax_info = get_xtensa_relax_info (sec);
8705 target_sec = r_reloc_get_section (target_loc);
8706 target_relax_info = get_xtensa_relax_info (target_sec);
8708 /* Literals to undefined sections may not be moved because they
8709 must report an error. */
8710 if (bfd_is_und_section (target_sec))
8713 src_entry = elf_xtensa_find_property_entry
8714 (prop_table, ptblsize, sec->vma + rel->r_rel.target_offset);
8716 if (!section_cache_section (target_sec_cache, target_sec, link_info))
8719 target_entry = elf_xtensa_find_property_entry
8720 (target_sec_cache->ptbl, target_sec_cache->pte_count,
8721 target_sec->vma + target_loc->target_offset);
8726 /* Make sure that we have not broken any branches. */
8729 init_ebb_constraint (&ebb_table);
8730 ebb = &ebb_table.ebb;
8731 init_ebb (ebb, target_sec_cache->sec, target_sec_cache->contents,
8732 target_sec_cache->content_length,
8733 target_sec_cache->ptbl, target_sec_cache->pte_count,
8734 target_sec_cache->relocs, target_sec_cache->reloc_count);
8736 /* Propose to add 4 bytes + worst-case alignment size increase to
8738 ebb_propose_action (&ebb_table, EBB_NO_ALIGN, 0,
8739 ta_fill, target_loc->target_offset,
8740 -4 - (1 << target_sec->alignment_power), TRUE);
8742 /* Check all of the PC-relative relocations to make sure they still fit. */
8743 relocs_fit = check_section_ebb_pcrels_fit (target_sec->owner, target_sec,
8744 target_sec_cache->contents,
8745 target_sec_cache->relocs,
8751 text_action_add_literal (&target_relax_info->action_list,
8752 ta_add_literal, target_loc, lit_value, -4);
8754 if (target_sec->alignment_power > 2 && target_entry != src_entry)
8756 /* May need to add or remove some fill to maintain alignment. */
8757 int fill_extra_space;
8758 bfd_vma entry_sec_offset;
8761 target_entry->address - target_sec->vma + target_entry->size;
8763 /* If the literal range is at the end of the section,
8765 fill_extra_space = 0;
8767 elf_xtensa_find_property_entry (target_sec_cache->ptbl,
8768 target_sec_cache->pte_count,
8770 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
8771 fill_extra_space = the_add_entry->size;
8773 target_fa = find_fill_action (&target_relax_info->action_list,
8774 target_sec, entry_sec_offset);
8775 removed_diff = compute_removed_action_diff (target_fa, target_sec,
8776 entry_sec_offset, 4,
8779 adjust_fill_action (target_fa, removed_diff);
8781 text_action_add (&target_relax_info->action_list,
8782 ta_fill, target_sec, entry_sec_offset, removed_diff);
8785 /* Mark that the literal will be moved to the new location. */
8786 add_removed_literal (&relax_info->removed_list, &rel->r_rel, target_loc);
8788 /* Remove the literal. */
8789 text_action_add (&relax_info->action_list,
8790 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
8792 /* If the section is 4-byte aligned, do not add fill. */
8793 if (sec->alignment_power > 2 && target_entry != src_entry)
8795 int fill_extra_space;
8796 bfd_vma entry_sec_offset;
8799 entry_sec_offset = src_entry->address - sec->vma + src_entry->size;
8801 entry_sec_offset = rel->r_rel.target_offset+4;
8803 /* If the literal range is at the end of the section,
8805 fill_extra_space = 0;
8806 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8808 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
8809 fill_extra_space = the_add_entry->size;
8811 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
8812 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
8813 -4, fill_extra_space);
8815 adjust_fill_action (fa, removed_diff);
8817 text_action_add (&relax_info->action_list,
8818 ta_fill, sec, entry_sec_offset, removed_diff);
8825 /* Second relaxation pass. */
8827 /* Modify all of the relocations to point to the right spot, and if this
8828 is a relaxable section, delete the unwanted literals and fix the
8832 relax_section (bfd *abfd, asection *sec, struct bfd_link_info *link_info)
8834 Elf_Internal_Rela *internal_relocs;
8835 xtensa_relax_info *relax_info;
8837 bfd_boolean ok = TRUE;
8839 bfd_boolean rv = FALSE;
8840 bfd_boolean virtual_action;
8841 bfd_size_type sec_size;
8843 sec_size = bfd_get_section_limit (abfd, sec);
8844 relax_info = get_xtensa_relax_info (sec);
8845 BFD_ASSERT (relax_info);
8847 /* First translate any of the fixes that have been added already. */
8848 translate_section_fixes (sec);
8850 /* Handle property sections (e.g., literal tables) specially. */
8851 if (xtensa_is_property_section (sec))
8853 BFD_ASSERT (!relax_info->is_relaxable_literal_section);
8854 return relax_property_section (abfd, sec, link_info);
8857 internal_relocs = retrieve_internal_relocs (abfd, sec,
8858 link_info->keep_memory);
8859 if (!internal_relocs && !relax_info->action_list.head)
8862 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
8863 if (contents == NULL && sec_size != 0)
8869 if (internal_relocs)
8871 for (i = 0; i < sec->reloc_count; i++)
8873 Elf_Internal_Rela *irel;
8874 xtensa_relax_info *target_relax_info;
8875 bfd_vma source_offset, old_source_offset;
8878 asection *target_sec;
8880 /* Locally change the source address.
8881 Translate the target to the new target address.
8882 If it points to this section and has been removed,
8886 irel = &internal_relocs[i];
8887 source_offset = irel->r_offset;
8888 old_source_offset = source_offset;
8890 r_type = ELF32_R_TYPE (irel->r_info);
8891 r_reloc_init (&r_rel, abfd, irel, contents,
8892 bfd_get_section_limit (abfd, sec));
8894 /* If this section could have changed then we may need to
8895 change the relocation's offset. */
8897 if (relax_info->is_relaxable_literal_section
8898 || relax_info->is_relaxable_asm_section)
8900 pin_internal_relocs (sec, internal_relocs);
8902 if (r_type != R_XTENSA_NONE
8903 && find_removed_literal (&relax_info->removed_list,
8906 /* Remove this relocation. */
8907 if (elf_hash_table (link_info)->dynamic_sections_created)
8908 shrink_dynamic_reloc_sections (link_info, abfd, sec, irel);
8909 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
8910 irel->r_offset = offset_with_removed_text
8911 (&relax_info->action_list, irel->r_offset);
8915 if (r_type == R_XTENSA_ASM_SIMPLIFY)
8917 text_action *action =
8918 find_insn_action (&relax_info->action_list,
8920 if (action && (action->action == ta_convert_longcall
8921 || action->action == ta_remove_longcall))
8923 bfd_reloc_status_type retval;
8924 char *error_message = NULL;
8926 retval = contract_asm_expansion (contents, sec_size,
8927 irel, &error_message);
8928 if (retval != bfd_reloc_ok)
8930 (*link_info->callbacks->reloc_dangerous)
8931 (link_info, error_message, abfd, sec,
8935 /* Update the action so that the code that moves
8936 the contents will do the right thing. */
8937 if (action->action == ta_remove_longcall)
8938 action->action = ta_remove_insn;
8940 action->action = ta_none;
8941 /* Refresh the info in the r_rel. */
8942 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
8943 r_type = ELF32_R_TYPE (irel->r_info);
8947 source_offset = offset_with_removed_text
8948 (&relax_info->action_list, irel->r_offset);
8949 irel->r_offset = source_offset;
8952 /* If the target section could have changed then
8953 we may need to change the relocation's target offset. */
8955 target_sec = r_reloc_get_section (&r_rel);
8957 /* For a reference to a discarded section from a DWARF section,
8958 i.e., where action_discarded is PRETEND, the symbol will
8959 eventually be modified to refer to the kept section (at least if
8960 the kept and discarded sections are the same size). Anticipate
8961 that here and adjust things accordingly. */
8962 if (! elf_xtensa_ignore_discarded_relocs (sec)
8963 && elf_xtensa_action_discarded (sec) == PRETEND
8964 && sec->sec_info_type != SEC_INFO_TYPE_STABS
8965 && target_sec != NULL
8966 && discarded_section (target_sec))
8968 /* It would be natural to call _bfd_elf_check_kept_section
8969 here, but it's not exported from elflink.c. It's also a
8970 fairly expensive check. Adjusting the relocations to the
8971 discarded section is fairly harmless; it will only adjust
8972 some addends and difference values. If it turns out that
8973 _bfd_elf_check_kept_section fails later, it won't matter,
8974 so just compare the section names to find the right group
8976 asection *kept = target_sec->kept_section;
8979 if ((kept->flags & SEC_GROUP) != 0)
8981 asection *first = elf_next_in_group (kept);
8982 asection *s = first;
8987 if (strcmp (s->name, target_sec->name) == 0)
8992 s = elf_next_in_group (s);
8999 && ((target_sec->rawsize != 0
9000 ? target_sec->rawsize : target_sec->size)
9001 == (kept->rawsize != 0 ? kept->rawsize : kept->size)))
9005 target_relax_info = get_xtensa_relax_info (target_sec);
9006 if (target_relax_info
9007 && (target_relax_info->is_relaxable_literal_section
9008 || target_relax_info->is_relaxable_asm_section))
9011 target_sec = translate_reloc (&r_rel, &new_reloc, target_sec);
9013 if (r_type == R_XTENSA_DIFF8
9014 || r_type == R_XTENSA_DIFF16
9015 || r_type == R_XTENSA_DIFF32)
9017 bfd_vma diff_value = 0, new_end_offset, diff_mask = 0;
9019 if (bfd_get_section_limit (abfd, sec) < old_source_offset)
9021 (*link_info->callbacks->reloc_dangerous)
9022 (link_info, _("invalid relocation address"),
9023 abfd, sec, old_source_offset);
9029 case R_XTENSA_DIFF8:
9031 bfd_get_8 (abfd, &contents[old_source_offset]);
9033 case R_XTENSA_DIFF16:
9035 bfd_get_16 (abfd, &contents[old_source_offset]);
9037 case R_XTENSA_DIFF32:
9039 bfd_get_32 (abfd, &contents[old_source_offset]);
9043 new_end_offset = offset_with_removed_text
9044 (&target_relax_info->action_list,
9045 r_rel.target_offset + diff_value);
9046 diff_value = new_end_offset - new_reloc.target_offset;
9050 case R_XTENSA_DIFF8:
9052 bfd_put_8 (abfd, diff_value,
9053 &contents[old_source_offset]);
9055 case R_XTENSA_DIFF16:
9057 bfd_put_16 (abfd, diff_value,
9058 &contents[old_source_offset]);
9060 case R_XTENSA_DIFF32:
9061 diff_mask = 0xffffffff;
9062 bfd_put_32 (abfd, diff_value,
9063 &contents[old_source_offset]);
9067 /* Check for overflow. */
9068 if ((diff_value & ~diff_mask) != 0)
9070 (*link_info->callbacks->reloc_dangerous)
9071 (link_info, _("overflow after relaxation"),
9072 abfd, sec, old_source_offset);
9076 pin_contents (sec, contents);
9079 /* If the relocation still references a section in the same
9080 input file, modify the relocation directly instead of
9081 adding a "fix" record. */
9082 if (target_sec->owner == abfd)
9084 unsigned r_symndx = ELF32_R_SYM (new_reloc.rela.r_info);
9085 irel->r_info = ELF32_R_INFO (r_symndx, r_type);
9086 irel->r_addend = new_reloc.rela.r_addend;
9087 pin_internal_relocs (sec, internal_relocs);
9091 bfd_vma addend_displacement;
9094 addend_displacement =
9095 new_reloc.target_offset + new_reloc.virtual_offset;
9096 fix = reloc_bfd_fix_init (sec, source_offset, r_type,
9098 addend_displacement, TRUE);
9105 if ((relax_info->is_relaxable_literal_section
9106 || relax_info->is_relaxable_asm_section)
9107 && relax_info->action_list.head)
9109 /* Walk through the planned actions and build up a table
9110 of move, copy and fill records. Use the move, copy and
9111 fill records to perform the actions once. */
9114 bfd_size_type final_size, copy_size, orig_insn_size;
9115 bfd_byte *scratch = NULL;
9116 bfd_byte *dup_contents = NULL;
9117 bfd_size_type orig_size = sec->size;
9118 bfd_vma orig_dot = 0;
9119 bfd_vma orig_dot_copied = 0; /* Byte copied already from
9120 orig dot in physical memory. */
9121 bfd_vma orig_dot_vo = 0; /* Virtual offset from orig_dot. */
9122 bfd_vma dup_dot = 0;
9124 text_action *action = relax_info->action_list.head;
9126 final_size = sec->size;
9127 for (action = relax_info->action_list.head; action;
9128 action = action->next)
9130 final_size -= action->removed_bytes;
9133 scratch = (bfd_byte *) bfd_zmalloc (final_size);
9134 dup_contents = (bfd_byte *) bfd_zmalloc (final_size);
9136 /* The dot is the current fill location. */
9138 print_action_list (stderr, &relax_info->action_list);
9141 for (action = relax_info->action_list.head; action;
9142 action = action->next)
9144 virtual_action = FALSE;
9145 if (action->offset > orig_dot)
9147 orig_dot += orig_dot_copied;
9148 orig_dot_copied = 0;
9150 /* Out of the virtual world. */
9153 if (action->offset > orig_dot)
9155 copy_size = action->offset - orig_dot;
9156 memmove (&dup_contents[dup_dot], &contents[orig_dot], copy_size);
9157 orig_dot += copy_size;
9158 dup_dot += copy_size;
9159 BFD_ASSERT (action->offset == orig_dot);
9161 else if (action->offset < orig_dot)
9163 if (action->action == ta_fill
9164 && action->offset - action->removed_bytes == orig_dot)
9166 /* This is OK because the fill only effects the dup_dot. */
9168 else if (action->action == ta_add_literal)
9170 /* TBD. Might need to handle this. */
9173 if (action->offset == orig_dot)
9175 if (action->virtual_offset > orig_dot_vo)
9177 if (orig_dot_vo == 0)
9179 /* Need to copy virtual_offset bytes. Probably four. */
9180 copy_size = action->virtual_offset - orig_dot_vo;
9181 memmove (&dup_contents[dup_dot],
9182 &contents[orig_dot], copy_size);
9183 orig_dot_copied = copy_size;
9184 dup_dot += copy_size;
9186 virtual_action = TRUE;
9189 BFD_ASSERT (action->virtual_offset <= orig_dot_vo);
9191 switch (action->action)
9193 case ta_remove_literal:
9194 case ta_remove_insn:
9195 BFD_ASSERT (action->removed_bytes >= 0);
9196 orig_dot += action->removed_bytes;
9199 case ta_narrow_insn:
9202 memmove (scratch, &contents[orig_dot], orig_insn_size);
9203 BFD_ASSERT (action->removed_bytes == 1);
9204 rv = narrow_instruction (scratch, final_size, 0);
9206 memmove (&dup_contents[dup_dot], scratch, copy_size);
9207 orig_dot += orig_insn_size;
9208 dup_dot += copy_size;
9212 if (action->removed_bytes >= 0)
9213 orig_dot += action->removed_bytes;
9216 /* Already zeroed in dup_contents. Just bump the
9218 dup_dot += (-action->removed_bytes);
9223 BFD_ASSERT (action->removed_bytes == 0);
9226 case ta_convert_longcall:
9227 case ta_remove_longcall:
9228 /* These will be removed or converted before we get here. */
9235 memmove (scratch, &contents[orig_dot], orig_insn_size);
9236 BFD_ASSERT (action->removed_bytes == -1);
9237 rv = widen_instruction (scratch, final_size, 0);
9239 memmove (&dup_contents[dup_dot], scratch, copy_size);
9240 orig_dot += orig_insn_size;
9241 dup_dot += copy_size;
9244 case ta_add_literal:
9247 BFD_ASSERT (action->removed_bytes == -4);
9248 /* TBD -- place the literal value here and insert
9250 memset (&dup_contents[dup_dot], 0, 4);
9251 pin_internal_relocs (sec, internal_relocs);
9252 pin_contents (sec, contents);
9254 if (!move_literal (abfd, link_info, sec, dup_dot, dup_contents,
9255 relax_info, &internal_relocs, &action->value))
9259 orig_dot_vo += copy_size;
9261 orig_dot += orig_insn_size;
9262 dup_dot += copy_size;
9266 /* Not implemented yet. */
9271 removed += action->removed_bytes;
9272 BFD_ASSERT (dup_dot <= final_size);
9273 BFD_ASSERT (orig_dot <= orig_size);
9276 orig_dot += orig_dot_copied;
9277 orig_dot_copied = 0;
9279 if (orig_dot != orig_size)
9281 copy_size = orig_size - orig_dot;
9282 BFD_ASSERT (orig_size > orig_dot);
9283 BFD_ASSERT (dup_dot + copy_size == final_size);
9284 memmove (&dup_contents[dup_dot], &contents[orig_dot], copy_size);
9285 orig_dot += copy_size;
9286 dup_dot += copy_size;
9288 BFD_ASSERT (orig_size == orig_dot);
9289 BFD_ASSERT (final_size == dup_dot);
9291 /* Move the dup_contents back. */
9292 if (final_size > orig_size)
9294 /* Contents need to be reallocated. Swap the dup_contents into
9296 sec->contents = dup_contents;
9298 contents = dup_contents;
9299 pin_contents (sec, contents);
9303 BFD_ASSERT (final_size <= orig_size);
9304 memset (contents, 0, orig_size);
9305 memcpy (contents, dup_contents, final_size);
9306 free (dup_contents);
9309 pin_contents (sec, contents);
9311 if (sec->rawsize == 0)
9312 sec->rawsize = sec->size;
9313 sec->size = final_size;
9317 release_internal_relocs (sec, internal_relocs);
9318 release_contents (sec, contents);
9324 translate_section_fixes (asection *sec)
9326 xtensa_relax_info *relax_info;
9329 relax_info = get_xtensa_relax_info (sec);
9333 for (r = relax_info->fix_list; r != NULL; r = r->next)
9334 if (!translate_reloc_bfd_fix (r))
9341 /* Translate a fix given the mapping in the relax info for the target
9342 section. If it has already been translated, no work is required. */
9345 translate_reloc_bfd_fix (reloc_bfd_fix *fix)
9347 reloc_bfd_fix new_fix;
9349 xtensa_relax_info *relax_info;
9350 removed_literal *removed;
9351 bfd_vma new_offset, target_offset;
9353 if (fix->translated)
9356 sec = fix->target_sec;
9357 target_offset = fix->target_offset;
9359 relax_info = get_xtensa_relax_info (sec);
9362 fix->translated = TRUE;
9368 /* The fix does not need to be translated if the section cannot change. */
9369 if (!relax_info->is_relaxable_literal_section
9370 && !relax_info->is_relaxable_asm_section)
9372 fix->translated = TRUE;
9376 /* If the literal has been moved and this relocation was on an
9377 opcode, then the relocation should move to the new literal
9378 location. Otherwise, the relocation should move within the
9382 if (is_operand_relocation (fix->src_type))
9384 /* Check if the original relocation is against a literal being
9386 removed = find_removed_literal (&relax_info->removed_list,
9394 /* The fact that there is still a relocation to this literal indicates
9395 that the literal is being coalesced, not simply removed. */
9396 BFD_ASSERT (removed->to.abfd != NULL);
9398 /* This was moved to some other address (possibly another section). */
9399 new_sec = r_reloc_get_section (&removed->to);
9403 relax_info = get_xtensa_relax_info (sec);
9405 (!relax_info->is_relaxable_literal_section
9406 && !relax_info->is_relaxable_asm_section))
9408 target_offset = removed->to.target_offset;
9409 new_fix.target_sec = new_sec;
9410 new_fix.target_offset = target_offset;
9411 new_fix.translated = TRUE;
9416 target_offset = removed->to.target_offset;
9417 new_fix.target_sec = new_sec;
9420 /* The target address may have been moved within its section. */
9421 new_offset = offset_with_removed_text (&relax_info->action_list,
9424 new_fix.target_offset = new_offset;
9425 new_fix.target_offset = new_offset;
9426 new_fix.translated = TRUE;
9432 /* Fix up a relocation to take account of removed literals. */
9435 translate_reloc (const r_reloc *orig_rel, r_reloc *new_rel, asection *sec)
9437 xtensa_relax_info *relax_info;
9438 removed_literal *removed;
9439 bfd_vma target_offset, base_offset;
9442 *new_rel = *orig_rel;
9444 if (!r_reloc_is_defined (orig_rel))
9447 relax_info = get_xtensa_relax_info (sec);
9448 BFD_ASSERT (relax_info && (relax_info->is_relaxable_literal_section
9449 || relax_info->is_relaxable_asm_section));
9451 target_offset = orig_rel->target_offset;
9454 if (is_operand_relocation (ELF32_R_TYPE (orig_rel->rela.r_info)))
9456 /* Check if the original relocation is against a literal being
9458 removed = find_removed_literal (&relax_info->removed_list,
9461 if (removed && removed->to.abfd)
9465 /* The fact that there is still a relocation to this literal indicates
9466 that the literal is being coalesced, not simply removed. */
9467 BFD_ASSERT (removed->to.abfd != NULL);
9469 /* This was moved to some other address
9470 (possibly in another section). */
9471 *new_rel = removed->to;
9472 new_sec = r_reloc_get_section (new_rel);
9476 relax_info = get_xtensa_relax_info (sec);
9478 || (!relax_info->is_relaxable_literal_section
9479 && !relax_info->is_relaxable_asm_section))
9482 target_offset = new_rel->target_offset;
9485 /* Find the base offset of the reloc symbol, excluding any addend from the
9486 reloc or from the section contents (for a partial_inplace reloc). Then
9487 find the adjusted values of the offsets due to relaxation. The base
9488 offset is needed to determine the change to the reloc's addend; the reloc
9489 addend should not be adjusted due to relaxations located before the base
9492 base_offset = r_reloc_get_target_offset (new_rel) - new_rel->rela.r_addend;
9493 act = relax_info->action_list.head;
9494 if (base_offset <= target_offset)
9496 int base_removed = removed_by_actions (&act, base_offset, FALSE);
9497 int addend_removed = removed_by_actions (&act, target_offset, FALSE);
9498 new_rel->target_offset = target_offset - base_removed - addend_removed;
9499 new_rel->rela.r_addend -= addend_removed;
9503 /* Handle a negative addend. The base offset comes first. */
9504 int tgt_removed = removed_by_actions (&act, target_offset, FALSE);
9505 int addend_removed = removed_by_actions (&act, base_offset, FALSE);
9506 new_rel->target_offset = target_offset - tgt_removed;
9507 new_rel->rela.r_addend += addend_removed;
9514 /* For dynamic links, there may be a dynamic relocation for each
9515 literal. The number of dynamic relocations must be computed in
9516 size_dynamic_sections, which occurs before relaxation. When a
9517 literal is removed, this function checks if there is a corresponding
9518 dynamic relocation and shrinks the size of the appropriate dynamic
9519 relocation section accordingly. At this point, the contents of the
9520 dynamic relocation sections have not yet been filled in, so there's
9521 nothing else that needs to be done. */
9524 shrink_dynamic_reloc_sections (struct bfd_link_info *info,
9526 asection *input_section,
9527 Elf_Internal_Rela *rel)
9529 struct elf_xtensa_link_hash_table *htab;
9530 Elf_Internal_Shdr *symtab_hdr;
9531 struct elf_link_hash_entry **sym_hashes;
9532 unsigned long r_symndx;
9534 struct elf_link_hash_entry *h;
9535 bfd_boolean dynamic_symbol;
9537 htab = elf_xtensa_hash_table (info);
9541 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
9542 sym_hashes = elf_sym_hashes (abfd);
9544 r_type = ELF32_R_TYPE (rel->r_info);
9545 r_symndx = ELF32_R_SYM (rel->r_info);
9547 if (r_symndx < symtab_hdr->sh_info)
9550 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
9552 dynamic_symbol = elf_xtensa_dynamic_symbol_p (h, info);
9554 if ((r_type == R_XTENSA_32 || r_type == R_XTENSA_PLT)
9555 && (input_section->flags & SEC_ALLOC) != 0
9556 && (dynamic_symbol || info->shared))
9559 bfd_boolean is_plt = FALSE;
9561 if (dynamic_symbol && r_type == R_XTENSA_PLT)
9563 srel = htab->srelplt;
9567 srel = htab->srelgot;
9569 /* Reduce size of the .rela.* section by one reloc. */
9570 BFD_ASSERT (srel != NULL);
9571 BFD_ASSERT (srel->size >= sizeof (Elf32_External_Rela));
9572 srel->size -= sizeof (Elf32_External_Rela);
9576 asection *splt, *sgotplt, *srelgot;
9577 int reloc_index, chunk;
9579 /* Find the PLT reloc index of the entry being removed. This
9580 is computed from the size of ".rela.plt". It is needed to
9581 figure out which PLT chunk to resize. Usually "last index
9582 = size - 1" since the index starts at zero, but in this
9583 context, the size has just been decremented so there's no
9584 need to subtract one. */
9585 reloc_index = srel->size / sizeof (Elf32_External_Rela);
9587 chunk = reloc_index / PLT_ENTRIES_PER_CHUNK;
9588 splt = elf_xtensa_get_plt_section (info, chunk);
9589 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
9590 BFD_ASSERT (splt != NULL && sgotplt != NULL);
9592 /* Check if an entire PLT chunk has just been eliminated. */
9593 if (reloc_index % PLT_ENTRIES_PER_CHUNK == 0)
9595 /* The two magic GOT entries for that chunk can go away. */
9596 srelgot = htab->srelgot;
9597 BFD_ASSERT (srelgot != NULL);
9598 srelgot->reloc_count -= 2;
9599 srelgot->size -= 2 * sizeof (Elf32_External_Rela);
9602 /* There should be only one entry left (and it will be
9604 BFD_ASSERT (sgotplt->size == 4);
9605 BFD_ASSERT (splt->size == PLT_ENTRY_SIZE);
9608 BFD_ASSERT (sgotplt->size >= 4);
9609 BFD_ASSERT (splt->size >= PLT_ENTRY_SIZE);
9612 splt->size -= PLT_ENTRY_SIZE;
9618 /* Take an r_rel and move it to another section. This usually
9619 requires extending the interal_relocation array and pinning it. If
9620 the original r_rel is from the same BFD, we can complete this here.
9621 Otherwise, we add a fix record to let the final link fix the
9622 appropriate address. Contents and internal relocations for the
9623 section must be pinned after calling this routine. */
9626 move_literal (bfd *abfd,
9627 struct bfd_link_info *link_info,
9631 xtensa_relax_info *relax_info,
9632 Elf_Internal_Rela **internal_relocs_p,
9633 const literal_value *lit)
9635 Elf_Internal_Rela *new_relocs = NULL;
9636 size_t new_relocs_count = 0;
9637 Elf_Internal_Rela this_rela;
9638 const r_reloc *r_rel;
9640 r_rel = &lit->r_rel;
9641 BFD_ASSERT (elf_section_data (sec)->relocs == *internal_relocs_p);
9643 if (r_reloc_is_const (r_rel))
9644 bfd_put_32 (abfd, lit->value, contents + offset);
9652 r_type = ELF32_R_TYPE (r_rel->rela.r_info);
9654 /* This is the difficult case. We have to create a fix up. */
9655 this_rela.r_offset = offset;
9656 this_rela.r_info = ELF32_R_INFO (0, r_type);
9657 this_rela.r_addend =
9658 r_rel->target_offset - r_reloc_get_target_offset (r_rel);
9659 bfd_put_32 (abfd, lit->value, contents + offset);
9661 /* Currently, we cannot move relocations during a relocatable link. */
9662 BFD_ASSERT (!link_info->relocatable);
9663 fix = reloc_bfd_fix_init (sec, offset, r_type,
9664 r_reloc_get_section (r_rel),
9665 r_rel->target_offset + r_rel->virtual_offset,
9667 /* We also need to mark that relocations are needed here. */
9668 sec->flags |= SEC_RELOC;
9670 translate_reloc_bfd_fix (fix);
9671 /* This fix has not yet been translated. */
9674 /* Add the relocation. If we have already allocated our own
9675 space for the relocations and we have room for more, then use
9676 it. Otherwise, allocate new space and move the literals. */
9677 insert_at = sec->reloc_count;
9678 for (i = 0; i < sec->reloc_count; ++i)
9680 if (this_rela.r_offset < (*internal_relocs_p)[i].r_offset)
9687 if (*internal_relocs_p != relax_info->allocated_relocs
9688 || sec->reloc_count + 1 > relax_info->allocated_relocs_count)
9690 BFD_ASSERT (relax_info->allocated_relocs == NULL
9691 || sec->reloc_count == relax_info->relocs_count);
9693 if (relax_info->allocated_relocs_count == 0)
9694 new_relocs_count = (sec->reloc_count + 2) * 2;
9696 new_relocs_count = (relax_info->allocated_relocs_count + 2) * 2;
9698 new_relocs = (Elf_Internal_Rela *)
9699 bfd_zmalloc (sizeof (Elf_Internal_Rela) * (new_relocs_count));
9703 /* We could handle this more quickly by finding the split point. */
9705 memcpy (new_relocs, *internal_relocs_p,
9706 insert_at * sizeof (Elf_Internal_Rela));
9708 new_relocs[insert_at] = this_rela;
9710 if (insert_at != sec->reloc_count)
9711 memcpy (new_relocs + insert_at + 1,
9712 (*internal_relocs_p) + insert_at,
9713 (sec->reloc_count - insert_at)
9714 * sizeof (Elf_Internal_Rela));
9716 if (*internal_relocs_p != relax_info->allocated_relocs)
9718 /* The first time we re-allocate, we can only free the
9719 old relocs if they were allocated with bfd_malloc.
9720 This is not true when keep_memory is in effect. */
9721 if (!link_info->keep_memory)
9722 free (*internal_relocs_p);
9725 free (*internal_relocs_p);
9726 relax_info->allocated_relocs = new_relocs;
9727 relax_info->allocated_relocs_count = new_relocs_count;
9728 elf_section_data (sec)->relocs = new_relocs;
9730 relax_info->relocs_count = sec->reloc_count;
9731 *internal_relocs_p = new_relocs;
9735 if (insert_at != sec->reloc_count)
9738 for (idx = sec->reloc_count; idx > insert_at; idx--)
9739 (*internal_relocs_p)[idx] = (*internal_relocs_p)[idx-1];
9741 (*internal_relocs_p)[insert_at] = this_rela;
9743 if (relax_info->allocated_relocs)
9744 relax_info->relocs_count = sec->reloc_count;
9751 /* This is similar to relax_section except that when a target is moved,
9752 we shift addresses up. We also need to modify the size. This
9753 algorithm does NOT allow for relocations into the middle of the
9754 property sections. */
9757 relax_property_section (bfd *abfd,
9759 struct bfd_link_info *link_info)
9761 Elf_Internal_Rela *internal_relocs;
9764 bfd_boolean ok = TRUE;
9765 bfd_boolean is_full_prop_section;
9766 size_t last_zfill_target_offset = 0;
9767 asection *last_zfill_target_sec = NULL;
9768 bfd_size_type sec_size;
9769 bfd_size_type entry_size;
9771 sec_size = bfd_get_section_limit (abfd, sec);
9772 internal_relocs = retrieve_internal_relocs (abfd, sec,
9773 link_info->keep_memory);
9774 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
9775 if (contents == NULL && sec_size != 0)
9781 is_full_prop_section = xtensa_is_proptable_section (sec);
9782 if (is_full_prop_section)
9787 if (internal_relocs)
9789 for (i = 0; i < sec->reloc_count; i++)
9791 Elf_Internal_Rela *irel;
9792 xtensa_relax_info *target_relax_info;
9794 asection *target_sec;
9796 bfd_byte *size_p, *flags_p;
9798 /* Locally change the source address.
9799 Translate the target to the new target address.
9800 If it points to this section and has been removed, MOVE IT.
9801 Also, don't forget to modify the associated SIZE at
9804 irel = &internal_relocs[i];
9805 r_type = ELF32_R_TYPE (irel->r_info);
9806 if (r_type == R_XTENSA_NONE)
9809 /* Find the literal value. */
9810 r_reloc_init (&val.r_rel, abfd, irel, contents, sec_size);
9811 size_p = &contents[irel->r_offset + 4];
9813 if (is_full_prop_section)
9814 flags_p = &contents[irel->r_offset + 8];
9815 BFD_ASSERT (irel->r_offset + entry_size <= sec_size);
9817 target_sec = r_reloc_get_section (&val.r_rel);
9818 target_relax_info = get_xtensa_relax_info (target_sec);
9820 if (target_relax_info
9821 && (target_relax_info->is_relaxable_literal_section
9822 || target_relax_info->is_relaxable_asm_section ))
9824 /* Translate the relocation's destination. */
9825 bfd_vma old_offset = val.r_rel.target_offset;
9827 long old_size, new_size;
9828 text_action *act = target_relax_info->action_list.head;
9829 new_offset = old_offset -
9830 removed_by_actions (&act, old_offset, FALSE);
9832 /* Assert that we are not out of bounds. */
9833 old_size = bfd_get_32 (abfd, size_p);
9834 new_size = old_size;
9838 /* Only the first zero-sized unreachable entry is
9839 allowed to expand. In this case the new offset
9840 should be the offset before the fill and the new
9841 size is the expansion size. For other zero-sized
9842 entries the resulting size should be zero with an
9843 offset before or after the fill address depending
9844 on whether the expanding unreachable entry
9846 if (last_zfill_target_sec == 0
9847 || last_zfill_target_sec != target_sec
9848 || last_zfill_target_offset != old_offset)
9850 bfd_vma new_end_offset = new_offset;
9852 /* Recompute the new_offset, but this time don't
9853 include any fill inserted by relaxation. */
9854 act = target_relax_info->action_list.head;
9855 new_offset = old_offset -
9856 removed_by_actions (&act, old_offset, TRUE);
9858 /* If it is not unreachable and we have not yet
9859 seen an unreachable at this address, place it
9860 before the fill address. */
9861 if (flags_p && (bfd_get_32 (abfd, flags_p)
9862 & XTENSA_PROP_UNREACHABLE) != 0)
9864 new_size = new_end_offset - new_offset;
9866 last_zfill_target_sec = target_sec;
9867 last_zfill_target_offset = old_offset;
9873 removed_by_actions (&act, old_offset + old_size, TRUE);
9875 if (new_size != old_size)
9877 bfd_put_32 (abfd, new_size, size_p);
9878 pin_contents (sec, contents);
9881 if (new_offset != old_offset)
9883 bfd_vma diff = new_offset - old_offset;
9884 irel->r_addend += diff;
9885 pin_internal_relocs (sec, internal_relocs);
9891 /* Combine adjacent property table entries. This is also done in
9892 finish_dynamic_sections() but at that point it's too late to
9893 reclaim the space in the output section, so we do this twice. */
9895 if (internal_relocs && (!link_info->relocatable
9896 || xtensa_is_littable_section (sec)))
9898 Elf_Internal_Rela *last_irel = NULL;
9899 Elf_Internal_Rela *irel, *next_rel, *rel_end;
9900 int removed_bytes = 0;
9902 flagword predef_flags;
9904 predef_flags = xtensa_get_property_predef_flags (sec);
9906 /* Walk over memory and relocations at the same time.
9907 This REQUIRES that the internal_relocs be sorted by offset. */
9908 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
9909 internal_reloc_compare);
9911 pin_internal_relocs (sec, internal_relocs);
9912 pin_contents (sec, contents);
9914 next_rel = internal_relocs;
9915 rel_end = internal_relocs + sec->reloc_count;
9917 BFD_ASSERT (sec->size % entry_size == 0);
9919 for (offset = 0; offset < sec->size; offset += entry_size)
9921 Elf_Internal_Rela *offset_rel, *extra_rel;
9922 bfd_vma bytes_to_remove, size, actual_offset;
9923 bfd_boolean remove_this_rel;
9926 /* Find the first relocation for the entry at the current offset.
9927 Adjust the offsets of any extra relocations for the previous
9932 for (irel = next_rel; irel < rel_end; irel++)
9934 if ((irel->r_offset == offset
9935 && ELF32_R_TYPE (irel->r_info) != R_XTENSA_NONE)
9936 || irel->r_offset > offset)
9941 irel->r_offset -= removed_bytes;
9945 /* Find the next relocation (if there are any left). */
9949 for (irel = offset_rel + 1; irel < rel_end; irel++)
9951 if (ELF32_R_TYPE (irel->r_info) != R_XTENSA_NONE)
9959 /* Check if there are relocations on the current entry. There
9960 should usually be a relocation on the offset field. If there
9961 are relocations on the size or flags, then we can't optimize
9962 this entry. Also, find the next relocation to examine on the
9966 if (offset_rel->r_offset >= offset + entry_size)
9968 next_rel = offset_rel;
9969 /* There are no relocations on the current entry, but we
9970 might still be able to remove it if the size is zero. */
9973 else if (offset_rel->r_offset > offset
9975 && extra_rel->r_offset < offset + entry_size))
9977 /* There is a relocation on the size or flags, so we can't
9978 do anything with this entry. Continue with the next. */
9979 next_rel = offset_rel;
9984 BFD_ASSERT (offset_rel->r_offset == offset);
9985 offset_rel->r_offset -= removed_bytes;
9986 next_rel = offset_rel + 1;
9992 remove_this_rel = FALSE;
9993 bytes_to_remove = 0;
9994 actual_offset = offset - removed_bytes;
9995 size = bfd_get_32 (abfd, &contents[actual_offset + 4]);
9997 if (is_full_prop_section)
9998 flags = bfd_get_32 (abfd, &contents[actual_offset + 8]);
10000 flags = predef_flags;
10003 && (flags & XTENSA_PROP_ALIGN) == 0
10004 && (flags & XTENSA_PROP_UNREACHABLE) == 0)
10006 /* Always remove entries with zero size and no alignment. */
10007 bytes_to_remove = entry_size;
10009 remove_this_rel = TRUE;
10011 else if (offset_rel
10012 && ELF32_R_TYPE (offset_rel->r_info) == R_XTENSA_32)
10016 flagword old_flags;
10018 bfd_get_32 (abfd, &contents[last_irel->r_offset + 4]);
10019 bfd_vma old_address =
10020 (last_irel->r_addend
10021 + bfd_get_32 (abfd, &contents[last_irel->r_offset]));
10022 bfd_vma new_address =
10023 (offset_rel->r_addend
10024 + bfd_get_32 (abfd, &contents[actual_offset]));
10025 if (is_full_prop_section)
10026 old_flags = bfd_get_32
10027 (abfd, &contents[last_irel->r_offset + 8]);
10029 old_flags = predef_flags;
10031 if ((ELF32_R_SYM (offset_rel->r_info)
10032 == ELF32_R_SYM (last_irel->r_info))
10033 && old_address + old_size == new_address
10034 && old_flags == flags
10035 && (old_flags & XTENSA_PROP_INSN_BRANCH_TARGET) == 0
10036 && (old_flags & XTENSA_PROP_INSN_LOOP_TARGET) == 0)
10038 /* Fix the old size. */
10039 bfd_put_32 (abfd, old_size + size,
10040 &contents[last_irel->r_offset + 4]);
10041 bytes_to_remove = entry_size;
10042 remove_this_rel = TRUE;
10045 last_irel = offset_rel;
10048 last_irel = offset_rel;
10051 if (remove_this_rel)
10053 offset_rel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
10054 offset_rel->r_offset = 0;
10057 if (bytes_to_remove != 0)
10059 removed_bytes += bytes_to_remove;
10060 if (offset + bytes_to_remove < sec->size)
10061 memmove (&contents[actual_offset],
10062 &contents[actual_offset + bytes_to_remove],
10063 sec->size - offset - bytes_to_remove);
10069 /* Fix up any extra relocations on the last entry. */
10070 for (irel = next_rel; irel < rel_end; irel++)
10071 irel->r_offset -= removed_bytes;
10073 /* Clear the removed bytes. */
10074 memset (&contents[sec->size - removed_bytes], 0, removed_bytes);
10076 if (sec->rawsize == 0)
10077 sec->rawsize = sec->size;
10078 sec->size -= removed_bytes;
10080 if (xtensa_is_littable_section (sec))
10082 asection *sgotloc = elf_xtensa_hash_table (link_info)->sgotloc;
10084 sgotloc->size -= removed_bytes;
10090 release_internal_relocs (sec, internal_relocs);
10091 release_contents (sec, contents);
10096 /* Third relaxation pass. */
10098 /* Change symbol values to account for removed literals. */
10101 relax_section_symbols (bfd *abfd, asection *sec)
10103 xtensa_relax_info *relax_info;
10104 unsigned int sec_shndx;
10105 Elf_Internal_Shdr *symtab_hdr;
10106 Elf_Internal_Sym *isymbuf;
10107 unsigned i, num_syms, num_locals;
10109 relax_info = get_xtensa_relax_info (sec);
10110 BFD_ASSERT (relax_info);
10112 if (!relax_info->is_relaxable_literal_section
10113 && !relax_info->is_relaxable_asm_section)
10116 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
10118 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10119 isymbuf = retrieve_local_syms (abfd);
10121 num_syms = symtab_hdr->sh_size / sizeof (Elf32_External_Sym);
10122 num_locals = symtab_hdr->sh_info;
10124 /* Adjust the local symbols defined in this section. */
10125 for (i = 0; i < num_locals; i++)
10127 Elf_Internal_Sym *isym = &isymbuf[i];
10129 if (isym->st_shndx == sec_shndx)
10131 text_action *act = relax_info->action_list.head;
10132 bfd_vma orig_addr = isym->st_value;
10134 isym->st_value -= removed_by_actions (&act, orig_addr, FALSE);
10136 if (ELF32_ST_TYPE (isym->st_info) == STT_FUNC)
10138 removed_by_actions (&act, orig_addr + isym->st_size, FALSE);
10142 /* Now adjust the global symbols defined in this section. */
10143 for (i = 0; i < (num_syms - num_locals); i++)
10145 struct elf_link_hash_entry *sym_hash;
10147 sym_hash = elf_sym_hashes (abfd)[i];
10149 if (sym_hash->root.type == bfd_link_hash_warning)
10150 sym_hash = (struct elf_link_hash_entry *) sym_hash->root.u.i.link;
10152 if ((sym_hash->root.type == bfd_link_hash_defined
10153 || sym_hash->root.type == bfd_link_hash_defweak)
10154 && sym_hash->root.u.def.section == sec)
10156 text_action *act = relax_info->action_list.head;
10157 bfd_vma orig_addr = sym_hash->root.u.def.value;
10159 sym_hash->root.u.def.value -=
10160 removed_by_actions (&act, orig_addr, FALSE);
10162 if (sym_hash->type == STT_FUNC)
10164 removed_by_actions (&act, orig_addr + sym_hash->size, FALSE);
10172 /* "Fix" handling functions, called while performing relocations. */
10175 do_fix_for_relocatable_link (Elf_Internal_Rela *rel,
10177 asection *input_section,
10178 bfd_byte *contents)
10181 asection *sec, *old_sec;
10182 bfd_vma old_offset;
10183 int r_type = ELF32_R_TYPE (rel->r_info);
10184 reloc_bfd_fix *fix;
10186 if (r_type == R_XTENSA_NONE)
10189 fix = get_bfd_fix (input_section, rel->r_offset, r_type);
10193 r_reloc_init (&r_rel, input_bfd, rel, contents,
10194 bfd_get_section_limit (input_bfd, input_section));
10195 old_sec = r_reloc_get_section (&r_rel);
10196 old_offset = r_rel.target_offset;
10198 if (!old_sec || !r_reloc_is_defined (&r_rel))
10200 if (r_type != R_XTENSA_ASM_EXPAND)
10202 (*_bfd_error_handler)
10203 (_("%B(%A+0x%lx): unexpected fix for %s relocation"),
10204 input_bfd, input_section, rel->r_offset,
10205 elf_howto_table[r_type].name);
10208 /* Leave it be. Resolution will happen in a later stage. */
10212 sec = fix->target_sec;
10213 rel->r_addend += ((sec->output_offset + fix->target_offset)
10214 - (old_sec->output_offset + old_offset));
10221 do_fix_for_final_link (Elf_Internal_Rela *rel,
10223 asection *input_section,
10224 bfd_byte *contents,
10225 bfd_vma *relocationp)
10228 int r_type = ELF32_R_TYPE (rel->r_info);
10229 reloc_bfd_fix *fix;
10230 bfd_vma fixup_diff;
10232 if (r_type == R_XTENSA_NONE)
10235 fix = get_bfd_fix (input_section, rel->r_offset, r_type);
10239 sec = fix->target_sec;
10241 fixup_diff = rel->r_addend;
10242 if (elf_howto_table[fix->src_type].partial_inplace)
10244 bfd_vma inplace_val;
10245 BFD_ASSERT (fix->src_offset
10246 < bfd_get_section_limit (input_bfd, input_section));
10247 inplace_val = bfd_get_32 (input_bfd, &contents[fix->src_offset]);
10248 fixup_diff += inplace_val;
10251 *relocationp = (sec->output_section->vma
10252 + sec->output_offset
10253 + fix->target_offset - fixup_diff);
10257 /* Miscellaneous utility functions.... */
10260 elf_xtensa_get_plt_section (struct bfd_link_info *info, int chunk)
10262 struct elf_xtensa_link_hash_table *htab;
10268 htab = elf_xtensa_hash_table (info);
10275 dynobj = elf_hash_table (info)->dynobj;
10276 sprintf (plt_name, ".plt.%u", chunk);
10277 return bfd_get_linker_section (dynobj, plt_name);
10282 elf_xtensa_get_gotplt_section (struct bfd_link_info *info, int chunk)
10284 struct elf_xtensa_link_hash_table *htab;
10290 htab = elf_xtensa_hash_table (info);
10293 return htab->sgotplt;
10296 dynobj = elf_hash_table (info)->dynobj;
10297 sprintf (got_name, ".got.plt.%u", chunk);
10298 return bfd_get_linker_section (dynobj, got_name);
10302 /* Get the input section for a given symbol index.
10304 . a section symbol, return the section;
10305 . a common symbol, return the common section;
10306 . an undefined symbol, return the undefined section;
10307 . an indirect symbol, follow the links;
10308 . an absolute value, return the absolute section. */
10311 get_elf_r_symndx_section (bfd *abfd, unsigned long r_symndx)
10313 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10314 asection *target_sec = NULL;
10315 if (r_symndx < symtab_hdr->sh_info)
10317 Elf_Internal_Sym *isymbuf;
10318 unsigned int section_index;
10320 isymbuf = retrieve_local_syms (abfd);
10321 section_index = isymbuf[r_symndx].st_shndx;
10323 if (section_index == SHN_UNDEF)
10324 target_sec = bfd_und_section_ptr;
10325 else if (section_index == SHN_ABS)
10326 target_sec = bfd_abs_section_ptr;
10327 else if (section_index == SHN_COMMON)
10328 target_sec = bfd_com_section_ptr;
10330 target_sec = bfd_section_from_elf_index (abfd, section_index);
10334 unsigned long indx = r_symndx - symtab_hdr->sh_info;
10335 struct elf_link_hash_entry *h = elf_sym_hashes (abfd)[indx];
10337 while (h->root.type == bfd_link_hash_indirect
10338 || h->root.type == bfd_link_hash_warning)
10339 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10341 switch (h->root.type)
10343 case bfd_link_hash_defined:
10344 case bfd_link_hash_defweak:
10345 target_sec = h->root.u.def.section;
10347 case bfd_link_hash_common:
10348 target_sec = bfd_com_section_ptr;
10350 case bfd_link_hash_undefined:
10351 case bfd_link_hash_undefweak:
10352 target_sec = bfd_und_section_ptr;
10354 default: /* New indirect warning. */
10355 target_sec = bfd_und_section_ptr;
10363 static struct elf_link_hash_entry *
10364 get_elf_r_symndx_hash_entry (bfd *abfd, unsigned long r_symndx)
10366 unsigned long indx;
10367 struct elf_link_hash_entry *h;
10368 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10370 if (r_symndx < symtab_hdr->sh_info)
10373 indx = r_symndx - symtab_hdr->sh_info;
10374 h = elf_sym_hashes (abfd)[indx];
10375 while (h->root.type == bfd_link_hash_indirect
10376 || h->root.type == bfd_link_hash_warning)
10377 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10382 /* Get the section-relative offset for a symbol number. */
10385 get_elf_r_symndx_offset (bfd *abfd, unsigned long r_symndx)
10387 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10388 bfd_vma offset = 0;
10390 if (r_symndx < symtab_hdr->sh_info)
10392 Elf_Internal_Sym *isymbuf;
10393 isymbuf = retrieve_local_syms (abfd);
10394 offset = isymbuf[r_symndx].st_value;
10398 unsigned long indx = r_symndx - symtab_hdr->sh_info;
10399 struct elf_link_hash_entry *h =
10400 elf_sym_hashes (abfd)[indx];
10402 while (h->root.type == bfd_link_hash_indirect
10403 || h->root.type == bfd_link_hash_warning)
10404 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10405 if (h->root.type == bfd_link_hash_defined
10406 || h->root.type == bfd_link_hash_defweak)
10407 offset = h->root.u.def.value;
10414 is_reloc_sym_weak (bfd *abfd, Elf_Internal_Rela *rel)
10416 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
10417 struct elf_link_hash_entry *h;
10419 h = get_elf_r_symndx_hash_entry (abfd, r_symndx);
10420 if (h && h->root.type == bfd_link_hash_defweak)
10427 pcrel_reloc_fits (xtensa_opcode opc,
10429 bfd_vma self_address,
10430 bfd_vma dest_address)
10432 xtensa_isa isa = xtensa_default_isa;
10433 uint32 valp = dest_address;
10434 if (xtensa_operand_do_reloc (isa, opc, opnd, &valp, self_address)
10435 || xtensa_operand_encode (isa, opc, opnd, &valp))
10442 xtensa_is_property_section (asection *sec)
10444 if (xtensa_is_insntable_section (sec)
10445 || xtensa_is_littable_section (sec)
10446 || xtensa_is_proptable_section (sec))
10454 xtensa_is_insntable_section (asection *sec)
10456 if (CONST_STRNEQ (sec->name, XTENSA_INSN_SEC_NAME)
10457 || CONST_STRNEQ (sec->name, ".gnu.linkonce.x."))
10465 xtensa_is_littable_section (asection *sec)
10467 if (CONST_STRNEQ (sec->name, XTENSA_LIT_SEC_NAME)
10468 || CONST_STRNEQ (sec->name, ".gnu.linkonce.p."))
10476 xtensa_is_proptable_section (asection *sec)
10478 if (CONST_STRNEQ (sec->name, XTENSA_PROP_SEC_NAME)
10479 || CONST_STRNEQ (sec->name, ".gnu.linkonce.prop."))
10487 internal_reloc_compare (const void *ap, const void *bp)
10489 const Elf_Internal_Rela *a = (const Elf_Internal_Rela *) ap;
10490 const Elf_Internal_Rela *b = (const Elf_Internal_Rela *) bp;
10492 if (a->r_offset != b->r_offset)
10493 return (a->r_offset - b->r_offset);
10495 /* We don't need to sort on these criteria for correctness,
10496 but enforcing a more strict ordering prevents unstable qsort
10497 from behaving differently with different implementations.
10498 Without the code below we get correct but different results
10499 on Solaris 2.7 and 2.8. We would like to always produce the
10500 same results no matter the host. */
10502 if (a->r_info != b->r_info)
10503 return (a->r_info - b->r_info);
10505 return (a->r_addend - b->r_addend);
10510 internal_reloc_matches (const void *ap, const void *bp)
10512 const Elf_Internal_Rela *a = (const Elf_Internal_Rela *) ap;
10513 const Elf_Internal_Rela *b = (const Elf_Internal_Rela *) bp;
10515 /* Check if one entry overlaps with the other; this shouldn't happen
10516 except when searching for a match. */
10517 return (a->r_offset - b->r_offset);
10521 /* Predicate function used to look up a section in a particular group. */
10524 match_section_group (bfd *abfd ATTRIBUTE_UNUSED, asection *sec, void *inf)
10526 const char *gname = inf;
10527 const char *group_name = elf_group_name (sec);
10529 return (group_name == gname
10530 || (group_name != NULL
10532 && strcmp (group_name, gname) == 0));
10536 static int linkonce_len = sizeof (".gnu.linkonce.") - 1;
10539 xtensa_property_section_name (asection *sec, const char *base_name)
10541 const char *suffix, *group_name;
10542 char *prop_sec_name;
10544 group_name = elf_group_name (sec);
10547 suffix = strrchr (sec->name, '.');
10548 if (suffix == sec->name)
10550 prop_sec_name = (char *) bfd_malloc (strlen (base_name) + 1
10551 + (suffix ? strlen (suffix) : 0));
10552 strcpy (prop_sec_name, base_name);
10554 strcat (prop_sec_name, suffix);
10556 else if (strncmp (sec->name, ".gnu.linkonce.", linkonce_len) == 0)
10558 char *linkonce_kind = 0;
10560 if (strcmp (base_name, XTENSA_INSN_SEC_NAME) == 0)
10561 linkonce_kind = "x.";
10562 else if (strcmp (base_name, XTENSA_LIT_SEC_NAME) == 0)
10563 linkonce_kind = "p.";
10564 else if (strcmp (base_name, XTENSA_PROP_SEC_NAME) == 0)
10565 linkonce_kind = "prop.";
10569 prop_sec_name = (char *) bfd_malloc (strlen (sec->name)
10570 + strlen (linkonce_kind) + 1);
10571 memcpy (prop_sec_name, ".gnu.linkonce.", linkonce_len);
10572 strcpy (prop_sec_name + linkonce_len, linkonce_kind);
10574 suffix = sec->name + linkonce_len;
10575 /* For backward compatibility, replace "t." instead of inserting
10576 the new linkonce_kind (but not for "prop" sections). */
10577 if (CONST_STRNEQ (suffix, "t.") && linkonce_kind[1] == '.')
10579 strcat (prop_sec_name + linkonce_len, suffix);
10582 prop_sec_name = strdup (base_name);
10584 return prop_sec_name;
10589 xtensa_get_property_section (asection *sec, const char *base_name)
10591 char *prop_sec_name;
10592 asection *prop_sec;
10594 prop_sec_name = xtensa_property_section_name (sec, base_name);
10595 prop_sec = bfd_get_section_by_name_if (sec->owner, prop_sec_name,
10596 match_section_group,
10597 (void *) elf_group_name (sec));
10598 free (prop_sec_name);
10604 xtensa_make_property_section (asection *sec, const char *base_name)
10606 char *prop_sec_name;
10607 asection *prop_sec;
10609 /* Check if the section already exists. */
10610 prop_sec_name = xtensa_property_section_name (sec, base_name);
10611 prop_sec = bfd_get_section_by_name_if (sec->owner, prop_sec_name,
10612 match_section_group,
10613 (void *) elf_group_name (sec));
10614 /* If not, create it. */
10617 flagword flags = (SEC_RELOC | SEC_HAS_CONTENTS | SEC_READONLY);
10618 flags |= (bfd_get_section_flags (sec->owner, sec)
10619 & (SEC_LINK_ONCE | SEC_LINK_DUPLICATES));
10621 prop_sec = bfd_make_section_anyway_with_flags
10622 (sec->owner, strdup (prop_sec_name), flags);
10626 elf_group_name (prop_sec) = elf_group_name (sec);
10629 free (prop_sec_name);
10635 xtensa_get_property_predef_flags (asection *sec)
10637 if (xtensa_is_insntable_section (sec))
10638 return (XTENSA_PROP_INSN
10639 | XTENSA_PROP_NO_TRANSFORM
10640 | XTENSA_PROP_INSN_NO_REORDER);
10642 if (xtensa_is_littable_section (sec))
10643 return (XTENSA_PROP_LITERAL
10644 | XTENSA_PROP_NO_TRANSFORM
10645 | XTENSA_PROP_INSN_NO_REORDER);
10651 /* Other functions called directly by the linker. */
10654 xtensa_callback_required_dependence (bfd *abfd,
10656 struct bfd_link_info *link_info,
10657 deps_callback_t callback,
10660 Elf_Internal_Rela *internal_relocs;
10661 bfd_byte *contents;
10663 bfd_boolean ok = TRUE;
10664 bfd_size_type sec_size;
10666 sec_size = bfd_get_section_limit (abfd, sec);
10668 /* ".plt*" sections have no explicit relocations but they contain L32R
10669 instructions that reference the corresponding ".got.plt*" sections. */
10670 if ((sec->flags & SEC_LINKER_CREATED) != 0
10671 && CONST_STRNEQ (sec->name, ".plt"))
10675 /* Find the corresponding ".got.plt*" section. */
10676 if (sec->name[4] == '\0')
10677 sgotplt = bfd_get_linker_section (sec->owner, ".got.plt");
10683 BFD_ASSERT (sec->name[4] == '.');
10684 chunk = strtol (&sec->name[5], NULL, 10);
10686 sprintf (got_name, ".got.plt.%u", chunk);
10687 sgotplt = bfd_get_linker_section (sec->owner, got_name);
10689 BFD_ASSERT (sgotplt);
10691 /* Assume worst-case offsets: L32R at the very end of the ".plt"
10692 section referencing a literal at the very beginning of
10693 ".got.plt". This is very close to the real dependence, anyway. */
10694 (*callback) (sec, sec_size, sgotplt, 0, closure);
10697 /* Only ELF files are supported for Xtensa. Check here to avoid a segfault
10698 when building uclibc, which runs "ld -b binary /dev/null". */
10699 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
10702 internal_relocs = retrieve_internal_relocs (abfd, sec,
10703 link_info->keep_memory);
10704 if (internal_relocs == NULL
10705 || sec->reloc_count == 0)
10708 /* Cache the contents for the duration of this scan. */
10709 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
10710 if (contents == NULL && sec_size != 0)
10716 if (!xtensa_default_isa)
10717 xtensa_default_isa = xtensa_isa_init (0, 0);
10719 for (i = 0; i < sec->reloc_count; i++)
10721 Elf_Internal_Rela *irel = &internal_relocs[i];
10722 if (is_l32r_relocation (abfd, sec, contents, irel))
10725 asection *target_sec;
10726 bfd_vma target_offset;
10728 r_reloc_init (&l32r_rel, abfd, irel, contents, sec_size);
10731 /* L32Rs must be local to the input file. */
10732 if (r_reloc_is_defined (&l32r_rel))
10734 target_sec = r_reloc_get_section (&l32r_rel);
10735 target_offset = l32r_rel.target_offset;
10737 (*callback) (sec, irel->r_offset, target_sec, target_offset,
10743 release_internal_relocs (sec, internal_relocs);
10744 release_contents (sec, contents);
10748 /* The default literal sections should always be marked as "code" (i.e.,
10749 SHF_EXECINSTR). This is particularly important for the Linux kernel
10750 module loader so that the literals are not placed after the text. */
10751 static const struct bfd_elf_special_section elf_xtensa_special_sections[] =
10753 { STRING_COMMA_LEN (".fini.literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
10754 { STRING_COMMA_LEN (".init.literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
10755 { STRING_COMMA_LEN (".literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
10756 { STRING_COMMA_LEN (".xtensa.info"), 0, SHT_NOTE, 0 },
10757 { NULL, 0, 0, 0, 0 }
10760 #define ELF_TARGET_ID XTENSA_ELF_DATA
10762 #define TARGET_LITTLE_SYM bfd_elf32_xtensa_le_vec
10763 #define TARGET_LITTLE_NAME "elf32-xtensa-le"
10764 #define TARGET_BIG_SYM bfd_elf32_xtensa_be_vec
10765 #define TARGET_BIG_NAME "elf32-xtensa-be"
10766 #define ELF_ARCH bfd_arch_xtensa
10768 #define ELF_MACHINE_CODE EM_XTENSA
10769 #define ELF_MACHINE_ALT1 EM_XTENSA_OLD
10772 #define ELF_MAXPAGESIZE (1 << XCHAL_MMU_MIN_PTE_PAGE_SIZE)
10773 #else /* !XCHAL_HAVE_MMU */
10774 #define ELF_MAXPAGESIZE 1
10775 #endif /* !XCHAL_HAVE_MMU */
10776 #endif /* ELF_ARCH */
10778 #define elf_backend_can_gc_sections 1
10779 #define elf_backend_can_refcount 1
10780 #define elf_backend_plt_readonly 1
10781 #define elf_backend_got_header_size 4
10782 #define elf_backend_want_dynbss 0
10783 #define elf_backend_want_got_plt 1
10785 #define elf_info_to_howto elf_xtensa_info_to_howto_rela
10787 #define bfd_elf32_mkobject elf_xtensa_mkobject
10789 #define bfd_elf32_bfd_merge_private_bfd_data elf_xtensa_merge_private_bfd_data
10790 #define bfd_elf32_new_section_hook elf_xtensa_new_section_hook
10791 #define bfd_elf32_bfd_print_private_bfd_data elf_xtensa_print_private_bfd_data
10792 #define bfd_elf32_bfd_relax_section elf_xtensa_relax_section
10793 #define bfd_elf32_bfd_reloc_type_lookup elf_xtensa_reloc_type_lookup
10794 #define bfd_elf32_bfd_reloc_name_lookup \
10795 elf_xtensa_reloc_name_lookup
10796 #define bfd_elf32_bfd_set_private_flags elf_xtensa_set_private_flags
10797 #define bfd_elf32_bfd_link_hash_table_create elf_xtensa_link_hash_table_create
10799 #define elf_backend_adjust_dynamic_symbol elf_xtensa_adjust_dynamic_symbol
10800 #define elf_backend_check_relocs elf_xtensa_check_relocs
10801 #define elf_backend_create_dynamic_sections elf_xtensa_create_dynamic_sections
10802 #define elf_backend_discard_info elf_xtensa_discard_info
10803 #define elf_backend_ignore_discarded_relocs elf_xtensa_ignore_discarded_relocs
10804 #define elf_backend_final_write_processing elf_xtensa_final_write_processing
10805 #define elf_backend_finish_dynamic_sections elf_xtensa_finish_dynamic_sections
10806 #define elf_backend_finish_dynamic_symbol elf_xtensa_finish_dynamic_symbol
10807 #define elf_backend_gc_mark_hook elf_xtensa_gc_mark_hook
10808 #define elf_backend_gc_sweep_hook elf_xtensa_gc_sweep_hook
10809 #define elf_backend_grok_prstatus elf_xtensa_grok_prstatus
10810 #define elf_backend_grok_psinfo elf_xtensa_grok_psinfo
10811 #define elf_backend_hide_symbol elf_xtensa_hide_symbol
10812 #define elf_backend_object_p elf_xtensa_object_p
10813 #define elf_backend_reloc_type_class elf_xtensa_reloc_type_class
10814 #define elf_backend_relocate_section elf_xtensa_relocate_section
10815 #define elf_backend_size_dynamic_sections elf_xtensa_size_dynamic_sections
10816 #define elf_backend_always_size_sections elf_xtensa_always_size_sections
10817 #define elf_backend_omit_section_dynsym \
10818 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
10819 #define elf_backend_special_sections elf_xtensa_special_sections
10820 #define elf_backend_action_discarded elf_xtensa_action_discarded
10821 #define elf_backend_copy_indirect_symbol elf_xtensa_copy_indirect_symbol
10823 #include "elf32-target.h"