1 /* Xtensa-specific support for 32-bit ELF.
2 Copyright 2003, 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
4 This file is part of BFD, the Binary File Descriptor library.
6 This program is free software; you can redistribute it and/or
7 modify it under the terms of the GNU General Public License as
8 published by the Free Software Foundation; either version 3 of the
9 License, or (at your option) any later version.
11 This program is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
30 #include "elf/xtensa.h"
31 #include "xtensa-isa.h"
32 #include "xtensa-config.h"
34 #define XTENSA_NO_NOP_REMOVAL 0
36 /* Local helper functions. */
38 static bfd_boolean add_extra_plt_sections (struct bfd_link_info *, int);
39 static char *vsprint_msg (const char *, const char *, int, ...) ATTRIBUTE_PRINTF(2,4);
40 static bfd_reloc_status_type bfd_elf_xtensa_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_boolean do_fix_for_relocatable_link
43 (Elf_Internal_Rela *, bfd *, asection *, bfd_byte *);
44 static void do_fix_for_final_link
45 (Elf_Internal_Rela *, bfd *, asection *, bfd_byte *, bfd_vma *);
47 /* Local functions to handle Xtensa configurability. */
49 static bfd_boolean is_indirect_call_opcode (xtensa_opcode);
50 static bfd_boolean is_direct_call_opcode (xtensa_opcode);
51 static bfd_boolean is_windowed_call_opcode (xtensa_opcode);
52 static xtensa_opcode get_const16_opcode (void);
53 static xtensa_opcode get_l32r_opcode (void);
54 static bfd_vma l32r_offset (bfd_vma, bfd_vma);
55 static int get_relocation_opnd (xtensa_opcode, int);
56 static int get_relocation_slot (int);
57 static xtensa_opcode get_relocation_opcode
58 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *);
59 static bfd_boolean is_l32r_relocation
60 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *);
61 static bfd_boolean is_alt_relocation (int);
62 static bfd_boolean is_operand_relocation (int);
63 static bfd_size_type insn_decode_len
64 (bfd_byte *, bfd_size_type, bfd_size_type);
65 static xtensa_opcode insn_decode_opcode
66 (bfd_byte *, bfd_size_type, bfd_size_type, int);
67 static bfd_boolean check_branch_target_aligned
68 (bfd_byte *, bfd_size_type, bfd_vma, bfd_vma);
69 static bfd_boolean check_loop_aligned
70 (bfd_byte *, bfd_size_type, bfd_vma, bfd_vma);
71 static bfd_boolean check_branch_target_aligned_address (bfd_vma, int);
72 static bfd_size_type get_asm_simplify_size
73 (bfd_byte *, bfd_size_type, bfd_size_type);
75 /* Functions for link-time code simplifications. */
77 static bfd_reloc_status_type elf_xtensa_do_asm_simplify
78 (bfd_byte *, bfd_vma, bfd_vma, char **);
79 static bfd_reloc_status_type contract_asm_expansion
80 (bfd_byte *, bfd_vma, Elf_Internal_Rela *, char **);
81 static xtensa_opcode swap_callx_for_call_opcode (xtensa_opcode);
82 static xtensa_opcode get_expanded_call_opcode (bfd_byte *, int, bfd_boolean *);
84 /* Access to internal relocations, section contents and symbols. */
86 static Elf_Internal_Rela *retrieve_internal_relocs
87 (bfd *, asection *, bfd_boolean);
88 static void pin_internal_relocs (asection *, Elf_Internal_Rela *);
89 static void release_internal_relocs (asection *, Elf_Internal_Rela *);
90 static bfd_byte *retrieve_contents (bfd *, asection *, bfd_boolean);
91 static void pin_contents (asection *, bfd_byte *);
92 static void release_contents (asection *, bfd_byte *);
93 static Elf_Internal_Sym *retrieve_local_syms (bfd *);
95 /* Miscellaneous utility functions. */
97 static asection *elf_xtensa_get_plt_section (struct bfd_link_info *, int);
98 static asection *elf_xtensa_get_gotplt_section (struct bfd_link_info *, int);
99 static asection *get_elf_r_symndx_section (bfd *, unsigned long);
100 static struct elf_link_hash_entry *get_elf_r_symndx_hash_entry
101 (bfd *, unsigned long);
102 static bfd_vma get_elf_r_symndx_offset (bfd *, unsigned long);
103 static bfd_boolean is_reloc_sym_weak (bfd *, Elf_Internal_Rela *);
104 static bfd_boolean pcrel_reloc_fits (xtensa_opcode, int, bfd_vma, bfd_vma);
105 static bfd_boolean xtensa_is_property_section (asection *);
106 static bfd_boolean xtensa_is_insntable_section (asection *);
107 static bfd_boolean xtensa_is_littable_section (asection *);
108 static bfd_boolean xtensa_is_proptable_section (asection *);
109 static int internal_reloc_compare (const void *, const void *);
110 static int internal_reloc_matches (const void *, const void *);
111 static asection *xtensa_get_property_section (asection *, const char *);
112 extern asection *xtensa_make_property_section (asection *, const char *);
113 static flagword xtensa_get_property_predef_flags (asection *);
115 /* Other functions called directly by the linker. */
117 typedef void (*deps_callback_t)
118 (asection *, bfd_vma, asection *, bfd_vma, void *);
119 extern bfd_boolean xtensa_callback_required_dependence
120 (bfd *, asection *, struct bfd_link_info *, deps_callback_t, void *);
123 /* Globally visible flag for choosing size optimization of NOP removal
124 instead of branch-target-aware minimization for NOP removal.
125 When nonzero, narrow all instructions and remove all NOPs possible
126 around longcall expansions. */
128 int elf32xtensa_size_opt;
131 /* The "new_section_hook" is used to set up a per-section
132 "xtensa_relax_info" data structure with additional information used
133 during relaxation. */
135 typedef struct xtensa_relax_info_struct xtensa_relax_info;
138 /* The GNU tools do not easily allow extending interfaces to pass around
139 the pointer to the Xtensa ISA information, so instead we add a global
140 variable here (in BFD) that can be used by any of the tools that need
143 xtensa_isa xtensa_default_isa;
146 /* When this is true, relocations may have been modified to refer to
147 symbols from other input files. The per-section list of "fix"
148 records needs to be checked when resolving relocations. */
150 static bfd_boolean relaxing_section = FALSE;
152 /* When this is true, during final links, literals that cannot be
153 coalesced and their relocations may be moved to other sections. */
155 int elf32xtensa_no_literal_movement = 1;
158 static reloc_howto_type elf_howto_table[] =
160 HOWTO (R_XTENSA_NONE, 0, 0, 0, FALSE, 0, complain_overflow_dont,
161 bfd_elf_xtensa_reloc, "R_XTENSA_NONE",
163 HOWTO (R_XTENSA_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
164 bfd_elf_xtensa_reloc, "R_XTENSA_32",
165 TRUE, 0xffffffff, 0xffffffff, FALSE),
167 /* Replace a 32-bit value with a value from the runtime linker (only
168 used by linker-generated stub functions). The r_addend value is
169 special: 1 means to substitute a pointer to the runtime linker's
170 dynamic resolver function; 2 means to substitute the link map for
171 the shared object. */
172 HOWTO (R_XTENSA_RTLD, 0, 2, 32, FALSE, 0, complain_overflow_dont,
173 NULL, "R_XTENSA_RTLD", FALSE, 0, 0, FALSE),
175 HOWTO (R_XTENSA_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
176 bfd_elf_generic_reloc, "R_XTENSA_GLOB_DAT",
177 FALSE, 0, 0xffffffff, FALSE),
178 HOWTO (R_XTENSA_JMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
179 bfd_elf_generic_reloc, "R_XTENSA_JMP_SLOT",
180 FALSE, 0, 0xffffffff, FALSE),
181 HOWTO (R_XTENSA_RELATIVE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
182 bfd_elf_generic_reloc, "R_XTENSA_RELATIVE",
183 FALSE, 0, 0xffffffff, FALSE),
184 HOWTO (R_XTENSA_PLT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
185 bfd_elf_xtensa_reloc, "R_XTENSA_PLT",
186 FALSE, 0, 0xffffffff, FALSE),
190 /* Old relocations for backward compatibility. */
191 HOWTO (R_XTENSA_OP0, 0, 0, 0, TRUE, 0, complain_overflow_dont,
192 bfd_elf_xtensa_reloc, "R_XTENSA_OP0", FALSE, 0, 0, TRUE),
193 HOWTO (R_XTENSA_OP1, 0, 0, 0, TRUE, 0, complain_overflow_dont,
194 bfd_elf_xtensa_reloc, "R_XTENSA_OP1", FALSE, 0, 0, TRUE),
195 HOWTO (R_XTENSA_OP2, 0, 0, 0, TRUE, 0, complain_overflow_dont,
196 bfd_elf_xtensa_reloc, "R_XTENSA_OP2", FALSE, 0, 0, TRUE),
198 /* Assembly auto-expansion. */
199 HOWTO (R_XTENSA_ASM_EXPAND, 0, 0, 0, TRUE, 0, complain_overflow_dont,
200 bfd_elf_xtensa_reloc, "R_XTENSA_ASM_EXPAND", FALSE, 0, 0, TRUE),
201 /* Relax assembly auto-expansion. */
202 HOWTO (R_XTENSA_ASM_SIMPLIFY, 0, 0, 0, TRUE, 0, complain_overflow_dont,
203 bfd_elf_xtensa_reloc, "R_XTENSA_ASM_SIMPLIFY", FALSE, 0, 0, TRUE),
207 HOWTO (R_XTENSA_32_PCREL, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
208 bfd_elf_xtensa_reloc, "R_XTENSA_32_PCREL",
209 FALSE, 0, 0xffffffff, TRUE),
211 /* GNU extension to record C++ vtable hierarchy. */
212 HOWTO (R_XTENSA_GNU_VTINHERIT, 0, 2, 0, FALSE, 0, complain_overflow_dont,
213 NULL, "R_XTENSA_GNU_VTINHERIT",
215 /* GNU extension to record C++ vtable member usage. */
216 HOWTO (R_XTENSA_GNU_VTENTRY, 0, 2, 0, FALSE, 0, complain_overflow_dont,
217 _bfd_elf_rel_vtable_reloc_fn, "R_XTENSA_GNU_VTENTRY",
220 /* Relocations for supporting difference of symbols. */
221 HOWTO (R_XTENSA_DIFF8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
222 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF8", FALSE, 0, 0xff, FALSE),
223 HOWTO (R_XTENSA_DIFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
224 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF16", FALSE, 0, 0xffff, FALSE),
225 HOWTO (R_XTENSA_DIFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
226 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF32", FALSE, 0, 0xffffffff, FALSE),
228 /* General immediate operand relocations. */
229 HOWTO (R_XTENSA_SLOT0_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
230 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT0_OP", FALSE, 0, 0, TRUE),
231 HOWTO (R_XTENSA_SLOT1_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
232 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT1_OP", FALSE, 0, 0, TRUE),
233 HOWTO (R_XTENSA_SLOT2_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
234 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT2_OP", FALSE, 0, 0, TRUE),
235 HOWTO (R_XTENSA_SLOT3_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
236 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT3_OP", FALSE, 0, 0, TRUE),
237 HOWTO (R_XTENSA_SLOT4_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
238 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT4_OP", FALSE, 0, 0, TRUE),
239 HOWTO (R_XTENSA_SLOT5_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
240 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT5_OP", FALSE, 0, 0, TRUE),
241 HOWTO (R_XTENSA_SLOT6_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
242 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT6_OP", FALSE, 0, 0, TRUE),
243 HOWTO (R_XTENSA_SLOT7_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
244 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT7_OP", FALSE, 0, 0, TRUE),
245 HOWTO (R_XTENSA_SLOT8_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
246 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT8_OP", FALSE, 0, 0, TRUE),
247 HOWTO (R_XTENSA_SLOT9_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
248 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT9_OP", FALSE, 0, 0, TRUE),
249 HOWTO (R_XTENSA_SLOT10_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
250 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT10_OP", FALSE, 0, 0, TRUE),
251 HOWTO (R_XTENSA_SLOT11_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
252 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT11_OP", FALSE, 0, 0, TRUE),
253 HOWTO (R_XTENSA_SLOT12_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
254 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT12_OP", FALSE, 0, 0, TRUE),
255 HOWTO (R_XTENSA_SLOT13_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
256 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT13_OP", FALSE, 0, 0, TRUE),
257 HOWTO (R_XTENSA_SLOT14_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
258 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT14_OP", FALSE, 0, 0, TRUE),
260 /* "Alternate" relocations. The meaning of these is opcode-specific. */
261 HOWTO (R_XTENSA_SLOT0_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
262 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT0_ALT", FALSE, 0, 0, TRUE),
263 HOWTO (R_XTENSA_SLOT1_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
264 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT1_ALT", FALSE, 0, 0, TRUE),
265 HOWTO (R_XTENSA_SLOT2_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
266 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT2_ALT", FALSE, 0, 0, TRUE),
267 HOWTO (R_XTENSA_SLOT3_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
268 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT3_ALT", FALSE, 0, 0, TRUE),
269 HOWTO (R_XTENSA_SLOT4_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
270 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT4_ALT", FALSE, 0, 0, TRUE),
271 HOWTO (R_XTENSA_SLOT5_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
272 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT5_ALT", FALSE, 0, 0, TRUE),
273 HOWTO (R_XTENSA_SLOT6_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
274 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT6_ALT", FALSE, 0, 0, TRUE),
275 HOWTO (R_XTENSA_SLOT7_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
276 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT7_ALT", FALSE, 0, 0, TRUE),
277 HOWTO (R_XTENSA_SLOT8_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
278 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT8_ALT", FALSE, 0, 0, TRUE),
279 HOWTO (R_XTENSA_SLOT9_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
280 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT9_ALT", FALSE, 0, 0, TRUE),
281 HOWTO (R_XTENSA_SLOT10_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
282 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT10_ALT", FALSE, 0, 0, TRUE),
283 HOWTO (R_XTENSA_SLOT11_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
284 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT11_ALT", FALSE, 0, 0, TRUE),
285 HOWTO (R_XTENSA_SLOT12_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
286 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT12_ALT", FALSE, 0, 0, TRUE),
287 HOWTO (R_XTENSA_SLOT13_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
288 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT13_ALT", FALSE, 0, 0, TRUE),
289 HOWTO (R_XTENSA_SLOT14_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
290 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT14_ALT", FALSE, 0, 0, TRUE),
292 /* TLS relocations. */
293 HOWTO (R_XTENSA_TLSDESC_FN, 0, 2, 32, FALSE, 0, complain_overflow_dont,
294 bfd_elf_xtensa_reloc, "R_XTENSA_TLSDESC_FN",
295 FALSE, 0, 0xffffffff, FALSE),
296 HOWTO (R_XTENSA_TLSDESC_ARG, 0, 2, 32, FALSE, 0, complain_overflow_dont,
297 bfd_elf_xtensa_reloc, "R_XTENSA_TLSDESC_ARG",
298 FALSE, 0, 0xffffffff, FALSE),
299 HOWTO (R_XTENSA_TLS_DTPOFF, 0, 2, 32, FALSE, 0, complain_overflow_dont,
300 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_DTPOFF",
301 FALSE, 0, 0xffffffff, FALSE),
302 HOWTO (R_XTENSA_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_dont,
303 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_TPOFF",
304 FALSE, 0, 0xffffffff, FALSE),
305 HOWTO (R_XTENSA_TLS_FUNC, 0, 0, 0, FALSE, 0, complain_overflow_dont,
306 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_FUNC",
308 HOWTO (R_XTENSA_TLS_ARG, 0, 0, 0, FALSE, 0, complain_overflow_dont,
309 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_ARG",
311 HOWTO (R_XTENSA_TLS_CALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
312 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_CALL",
318 fprintf (stderr, "Xtensa bfd reloc lookup %d (%s)\n", code, str)
323 static reloc_howto_type *
324 elf_xtensa_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
325 bfd_reloc_code_real_type code)
330 TRACE ("BFD_RELOC_NONE");
331 return &elf_howto_table[(unsigned) R_XTENSA_NONE ];
334 TRACE ("BFD_RELOC_32");
335 return &elf_howto_table[(unsigned) R_XTENSA_32 ];
337 case BFD_RELOC_32_PCREL:
338 TRACE ("BFD_RELOC_32_PCREL");
339 return &elf_howto_table[(unsigned) R_XTENSA_32_PCREL ];
341 case BFD_RELOC_XTENSA_DIFF8:
342 TRACE ("BFD_RELOC_XTENSA_DIFF8");
343 return &elf_howto_table[(unsigned) R_XTENSA_DIFF8 ];
345 case BFD_RELOC_XTENSA_DIFF16:
346 TRACE ("BFD_RELOC_XTENSA_DIFF16");
347 return &elf_howto_table[(unsigned) R_XTENSA_DIFF16 ];
349 case BFD_RELOC_XTENSA_DIFF32:
350 TRACE ("BFD_RELOC_XTENSA_DIFF32");
351 return &elf_howto_table[(unsigned) R_XTENSA_DIFF32 ];
353 case BFD_RELOC_XTENSA_RTLD:
354 TRACE ("BFD_RELOC_XTENSA_RTLD");
355 return &elf_howto_table[(unsigned) R_XTENSA_RTLD ];
357 case BFD_RELOC_XTENSA_GLOB_DAT:
358 TRACE ("BFD_RELOC_XTENSA_GLOB_DAT");
359 return &elf_howto_table[(unsigned) R_XTENSA_GLOB_DAT ];
361 case BFD_RELOC_XTENSA_JMP_SLOT:
362 TRACE ("BFD_RELOC_XTENSA_JMP_SLOT");
363 return &elf_howto_table[(unsigned) R_XTENSA_JMP_SLOT ];
365 case BFD_RELOC_XTENSA_RELATIVE:
366 TRACE ("BFD_RELOC_XTENSA_RELATIVE");
367 return &elf_howto_table[(unsigned) R_XTENSA_RELATIVE ];
369 case BFD_RELOC_XTENSA_PLT:
370 TRACE ("BFD_RELOC_XTENSA_PLT");
371 return &elf_howto_table[(unsigned) R_XTENSA_PLT ];
373 case BFD_RELOC_XTENSA_OP0:
374 TRACE ("BFD_RELOC_XTENSA_OP0");
375 return &elf_howto_table[(unsigned) R_XTENSA_OP0 ];
377 case BFD_RELOC_XTENSA_OP1:
378 TRACE ("BFD_RELOC_XTENSA_OP1");
379 return &elf_howto_table[(unsigned) R_XTENSA_OP1 ];
381 case BFD_RELOC_XTENSA_OP2:
382 TRACE ("BFD_RELOC_XTENSA_OP2");
383 return &elf_howto_table[(unsigned) R_XTENSA_OP2 ];
385 case BFD_RELOC_XTENSA_ASM_EXPAND:
386 TRACE ("BFD_RELOC_XTENSA_ASM_EXPAND");
387 return &elf_howto_table[(unsigned) R_XTENSA_ASM_EXPAND ];
389 case BFD_RELOC_XTENSA_ASM_SIMPLIFY:
390 TRACE ("BFD_RELOC_XTENSA_ASM_SIMPLIFY");
391 return &elf_howto_table[(unsigned) R_XTENSA_ASM_SIMPLIFY ];
393 case BFD_RELOC_VTABLE_INHERIT:
394 TRACE ("BFD_RELOC_VTABLE_INHERIT");
395 return &elf_howto_table[(unsigned) R_XTENSA_GNU_VTINHERIT ];
397 case BFD_RELOC_VTABLE_ENTRY:
398 TRACE ("BFD_RELOC_VTABLE_ENTRY");
399 return &elf_howto_table[(unsigned) R_XTENSA_GNU_VTENTRY ];
401 case BFD_RELOC_XTENSA_TLSDESC_FN:
402 TRACE ("BFD_RELOC_XTENSA_TLSDESC_FN");
403 return &elf_howto_table[(unsigned) R_XTENSA_TLSDESC_FN ];
405 case BFD_RELOC_XTENSA_TLSDESC_ARG:
406 TRACE ("BFD_RELOC_XTENSA_TLSDESC_ARG");
407 return &elf_howto_table[(unsigned) R_XTENSA_TLSDESC_ARG ];
409 case BFD_RELOC_XTENSA_TLS_DTPOFF:
410 TRACE ("BFD_RELOC_XTENSA_TLS_DTPOFF");
411 return &elf_howto_table[(unsigned) R_XTENSA_TLS_DTPOFF ];
413 case BFD_RELOC_XTENSA_TLS_TPOFF:
414 TRACE ("BFD_RELOC_XTENSA_TLS_TPOFF");
415 return &elf_howto_table[(unsigned) R_XTENSA_TLS_TPOFF ];
417 case BFD_RELOC_XTENSA_TLS_FUNC:
418 TRACE ("BFD_RELOC_XTENSA_TLS_FUNC");
419 return &elf_howto_table[(unsigned) R_XTENSA_TLS_FUNC ];
421 case BFD_RELOC_XTENSA_TLS_ARG:
422 TRACE ("BFD_RELOC_XTENSA_TLS_ARG");
423 return &elf_howto_table[(unsigned) R_XTENSA_TLS_ARG ];
425 case BFD_RELOC_XTENSA_TLS_CALL:
426 TRACE ("BFD_RELOC_XTENSA_TLS_CALL");
427 return &elf_howto_table[(unsigned) R_XTENSA_TLS_CALL ];
430 if (code >= BFD_RELOC_XTENSA_SLOT0_OP
431 && code <= BFD_RELOC_XTENSA_SLOT14_OP)
433 unsigned n = (R_XTENSA_SLOT0_OP +
434 (code - BFD_RELOC_XTENSA_SLOT0_OP));
435 return &elf_howto_table[n];
438 if (code >= BFD_RELOC_XTENSA_SLOT0_ALT
439 && code <= BFD_RELOC_XTENSA_SLOT14_ALT)
441 unsigned n = (R_XTENSA_SLOT0_ALT +
442 (code - BFD_RELOC_XTENSA_SLOT0_ALT));
443 return &elf_howto_table[n];
453 static reloc_howto_type *
454 elf_xtensa_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
459 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
460 if (elf_howto_table[i].name != NULL
461 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
462 return &elf_howto_table[i];
468 /* Given an ELF "rela" relocation, find the corresponding howto and record
469 it in the BFD internal arelent representation of the relocation. */
472 elf_xtensa_info_to_howto_rela (bfd *abfd ATTRIBUTE_UNUSED,
474 Elf_Internal_Rela *dst)
476 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
478 BFD_ASSERT (r_type < (unsigned int) R_XTENSA_max);
479 cache_ptr->howto = &elf_howto_table[r_type];
483 /* Functions for the Xtensa ELF linker. */
485 /* The name of the dynamic interpreter. This is put in the .interp
488 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so"
490 /* The size in bytes of an entry in the procedure linkage table.
491 (This does _not_ include the space for the literals associated with
494 #define PLT_ENTRY_SIZE 16
496 /* For _really_ large PLTs, we may need to alternate between literals
497 and code to keep the literals within the 256K range of the L32R
498 instructions in the code. It's unlikely that anyone would ever need
499 such a big PLT, but an arbitrary limit on the PLT size would be bad.
500 Thus, we split the PLT into chunks. Since there's very little
501 overhead (2 extra literals) for each chunk, the chunk size is kept
502 small so that the code for handling multiple chunks get used and
503 tested regularly. With 254 entries, there are 1K of literals for
504 each chunk, and that seems like a nice round number. */
506 #define PLT_ENTRIES_PER_CHUNK 254
508 /* PLT entries are actually used as stub functions for lazy symbol
509 resolution. Once the symbol is resolved, the stub function is never
510 invoked. Note: the 32-byte frame size used here cannot be changed
511 without a corresponding change in the runtime linker. */
513 static const bfd_byte elf_xtensa_be_plt_entry[PLT_ENTRY_SIZE] =
515 0x6c, 0x10, 0x04, /* entry sp, 32 */
516 0x18, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
517 0x1a, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
518 0x1b, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
519 0x0a, 0x80, 0x00, /* jx a8 */
523 static const bfd_byte elf_xtensa_le_plt_entry[PLT_ENTRY_SIZE] =
525 0x36, 0x41, 0x00, /* entry sp, 32 */
526 0x81, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
527 0xa1, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
528 0xb1, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
529 0xa0, 0x08, 0x00, /* jx a8 */
533 /* The size of the thread control block. */
536 struct elf_xtensa_link_hash_entry
538 struct elf_link_hash_entry elf;
540 bfd_signed_vma tlsfunc_refcount;
542 #define GOT_UNKNOWN 0
544 #define GOT_TLS_GD 2 /* global or local dynamic */
545 #define GOT_TLS_IE 4 /* initial or local exec */
546 #define GOT_TLS_ANY (GOT_TLS_GD | GOT_TLS_IE)
547 unsigned char tls_type;
550 #define elf_xtensa_hash_entry(ent) ((struct elf_xtensa_link_hash_entry *)(ent))
552 struct elf_xtensa_obj_tdata
554 struct elf_obj_tdata root;
556 /* tls_type for each local got entry. */
557 char *local_got_tls_type;
559 bfd_signed_vma *local_tlsfunc_refcounts;
562 #define elf_xtensa_tdata(abfd) \
563 ((struct elf_xtensa_obj_tdata *) (abfd)->tdata.any)
565 #define elf_xtensa_local_got_tls_type(abfd) \
566 (elf_xtensa_tdata (abfd)->local_got_tls_type)
568 #define elf_xtensa_local_tlsfunc_refcounts(abfd) \
569 (elf_xtensa_tdata (abfd)->local_tlsfunc_refcounts)
571 #define is_xtensa_elf(bfd) \
572 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
573 && elf_tdata (bfd) != NULL \
574 && elf_object_id (bfd) == XTENSA_ELF_TDATA)
577 elf_xtensa_mkobject (bfd *abfd)
579 return bfd_elf_allocate_object (abfd, sizeof (struct elf_xtensa_obj_tdata),
583 /* Xtensa ELF linker hash table. */
585 struct elf_xtensa_link_hash_table
587 struct elf_link_hash_table elf;
589 /* Short-cuts to get to dynamic linker sections. */
596 asection *spltlittbl;
598 /* Total count of PLT relocations seen during check_relocs.
599 The actual PLT code must be split into multiple sections and all
600 the sections have to be created before size_dynamic_sections,
601 where we figure out the exact number of PLT entries that will be
602 needed. It is OK if this count is an overestimate, e.g., some
603 relocations may be removed by GC. */
606 struct elf_xtensa_link_hash_entry *tlsbase;
609 /* Get the Xtensa ELF linker hash table from a link_info structure. */
611 #define elf_xtensa_hash_table(p) \
612 ((struct elf_xtensa_link_hash_table *) ((p)->hash))
614 /* Create an entry in an Xtensa ELF linker hash table. */
616 static struct bfd_hash_entry *
617 elf_xtensa_link_hash_newfunc (struct bfd_hash_entry *entry,
618 struct bfd_hash_table *table,
621 /* Allocate the structure if it has not already been allocated by a
625 entry = bfd_hash_allocate (table,
626 sizeof (struct elf_xtensa_link_hash_entry));
631 /* Call the allocation method of the superclass. */
632 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
635 struct elf_xtensa_link_hash_entry *eh = elf_xtensa_hash_entry (entry);
636 eh->tlsfunc_refcount = 0;
637 eh->tls_type = GOT_UNKNOWN;
643 /* Create an Xtensa ELF linker hash table. */
645 static struct bfd_link_hash_table *
646 elf_xtensa_link_hash_table_create (bfd *abfd)
648 struct elf_link_hash_entry *tlsbase;
649 struct elf_xtensa_link_hash_table *ret;
650 bfd_size_type amt = sizeof (struct elf_xtensa_link_hash_table);
652 ret = bfd_malloc (amt);
656 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
657 elf_xtensa_link_hash_newfunc,
658 sizeof (struct elf_xtensa_link_hash_entry)))
670 ret->spltlittbl = NULL;
672 ret->plt_reloc_count = 0;
674 /* Create a hash entry for "_TLS_MODULE_BASE_" to speed up checking
676 tlsbase = elf_link_hash_lookup (&ret->elf, "_TLS_MODULE_BASE_",
678 tlsbase->root.type = bfd_link_hash_new;
679 tlsbase->root.u.undef.abfd = NULL;
680 tlsbase->non_elf = 0;
681 ret->tlsbase = elf_xtensa_hash_entry (tlsbase);
682 ret->tlsbase->tls_type = GOT_UNKNOWN;
684 return &ret->elf.root;
687 /* Copy the extra info we tack onto an elf_link_hash_entry. */
690 elf_xtensa_copy_indirect_symbol (struct bfd_link_info *info,
691 struct elf_link_hash_entry *dir,
692 struct elf_link_hash_entry *ind)
694 struct elf_xtensa_link_hash_entry *edir, *eind;
696 edir = elf_xtensa_hash_entry (dir);
697 eind = elf_xtensa_hash_entry (ind);
699 if (ind->root.type == bfd_link_hash_indirect)
701 edir->tlsfunc_refcount += eind->tlsfunc_refcount;
702 eind->tlsfunc_refcount = 0;
704 if (dir->got.refcount <= 0)
706 edir->tls_type = eind->tls_type;
707 eind->tls_type = GOT_UNKNOWN;
711 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
714 static inline bfd_boolean
715 elf_xtensa_dynamic_symbol_p (struct elf_link_hash_entry *h,
716 struct bfd_link_info *info)
718 /* Check if we should do dynamic things to this symbol. The
719 "ignore_protected" argument need not be set, because Xtensa code
720 does not require special handling of STV_PROTECTED to make function
721 pointer comparisons work properly. The PLT addresses are never
722 used for function pointers. */
724 return _bfd_elf_dynamic_symbol_p (h, info, 0);
729 property_table_compare (const void *ap, const void *bp)
731 const property_table_entry *a = (const property_table_entry *) ap;
732 const property_table_entry *b = (const property_table_entry *) bp;
734 if (a->address == b->address)
736 if (a->size != b->size)
737 return (a->size - b->size);
739 if ((a->flags & XTENSA_PROP_ALIGN) != (b->flags & XTENSA_PROP_ALIGN))
740 return ((b->flags & XTENSA_PROP_ALIGN)
741 - (a->flags & XTENSA_PROP_ALIGN));
743 if ((a->flags & XTENSA_PROP_ALIGN)
744 && (GET_XTENSA_PROP_ALIGNMENT (a->flags)
745 != GET_XTENSA_PROP_ALIGNMENT (b->flags)))
746 return (GET_XTENSA_PROP_ALIGNMENT (a->flags)
747 - GET_XTENSA_PROP_ALIGNMENT (b->flags));
749 if ((a->flags & XTENSA_PROP_UNREACHABLE)
750 != (b->flags & XTENSA_PROP_UNREACHABLE))
751 return ((b->flags & XTENSA_PROP_UNREACHABLE)
752 - (a->flags & XTENSA_PROP_UNREACHABLE));
754 return (a->flags - b->flags);
757 return (a->address - b->address);
762 property_table_matches (const void *ap, const void *bp)
764 const property_table_entry *a = (const property_table_entry *) ap;
765 const property_table_entry *b = (const property_table_entry *) bp;
767 /* Check if one entry overlaps with the other. */
768 if ((b->address >= a->address && b->address < (a->address + a->size))
769 || (a->address >= b->address && a->address < (b->address + b->size)))
772 return (a->address - b->address);
776 /* Get the literal table or property table entries for the given
777 section. Sets TABLE_P and returns the number of entries. On
778 error, returns a negative value. */
781 xtensa_read_table_entries (bfd *abfd,
783 property_table_entry **table_p,
784 const char *sec_name,
785 bfd_boolean output_addr)
787 asection *table_section;
788 bfd_size_type table_size = 0;
789 bfd_byte *table_data;
790 property_table_entry *blocks;
791 int blk, block_count;
792 bfd_size_type num_records;
793 Elf_Internal_Rela *internal_relocs, *irel, *rel_end;
794 bfd_vma section_addr, off;
795 flagword predef_flags;
796 bfd_size_type table_entry_size, section_limit;
799 || !(section->flags & SEC_ALLOC)
800 || (section->flags & SEC_DEBUGGING))
806 table_section = xtensa_get_property_section (section, sec_name);
808 table_size = table_section->size;
816 predef_flags = xtensa_get_property_predef_flags (table_section);
817 table_entry_size = 12;
819 table_entry_size -= 4;
821 num_records = table_size / table_entry_size;
822 table_data = retrieve_contents (abfd, table_section, TRUE);
823 blocks = (property_table_entry *)
824 bfd_malloc (num_records * sizeof (property_table_entry));
828 section_addr = section->output_section->vma + section->output_offset;
830 section_addr = section->vma;
832 internal_relocs = retrieve_internal_relocs (abfd, table_section, TRUE);
833 if (internal_relocs && !table_section->reloc_done)
835 qsort (internal_relocs, table_section->reloc_count,
836 sizeof (Elf_Internal_Rela), internal_reloc_compare);
837 irel = internal_relocs;
842 section_limit = bfd_get_section_limit (abfd, section);
843 rel_end = internal_relocs + table_section->reloc_count;
845 for (off = 0; off < table_size; off += table_entry_size)
847 bfd_vma address = bfd_get_32 (abfd, table_data + off);
849 /* Skip any relocations before the current offset. This should help
850 avoid confusion caused by unexpected relocations for the preceding
853 (irel->r_offset < off
854 || (irel->r_offset == off
855 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_NONE)))
862 if (irel && irel->r_offset == off)
865 unsigned long r_symndx = ELF32_R_SYM (irel->r_info);
866 BFD_ASSERT (ELF32_R_TYPE (irel->r_info) == R_XTENSA_32);
868 if (get_elf_r_symndx_section (abfd, r_symndx) != section)
871 sym_off = get_elf_r_symndx_offset (abfd, r_symndx);
872 BFD_ASSERT (sym_off == 0);
873 address += (section_addr + sym_off + irel->r_addend);
877 if (address < section_addr
878 || address >= section_addr + section_limit)
882 blocks[block_count].address = address;
883 blocks[block_count].size = bfd_get_32 (abfd, table_data + off + 4);
885 blocks[block_count].flags = predef_flags;
887 blocks[block_count].flags = bfd_get_32 (abfd, table_data + off + 8);
891 release_contents (table_section, table_data);
892 release_internal_relocs (table_section, internal_relocs);
896 /* Now sort them into address order for easy reference. */
897 qsort (blocks, block_count, sizeof (property_table_entry),
898 property_table_compare);
900 /* Check that the table contents are valid. Problems may occur,
901 for example, if an unrelocated object file is stripped. */
902 for (blk = 1; blk < block_count; blk++)
904 /* The only circumstance where two entries may legitimately
905 have the same address is when one of them is a zero-size
906 placeholder to mark a place where fill can be inserted.
907 The zero-size entry should come first. */
908 if (blocks[blk - 1].address == blocks[blk].address &&
909 blocks[blk - 1].size != 0)
911 (*_bfd_error_handler) (_("%B(%A): invalid property table"),
913 bfd_set_error (bfd_error_bad_value);
925 static property_table_entry *
926 elf_xtensa_find_property_entry (property_table_entry *property_table,
927 int property_table_size,
930 property_table_entry entry;
931 property_table_entry *rv;
933 if (property_table_size == 0)
936 entry.address = addr;
940 rv = bsearch (&entry, property_table, property_table_size,
941 sizeof (property_table_entry), property_table_matches);
947 elf_xtensa_in_literal_pool (property_table_entry *lit_table,
951 if (elf_xtensa_find_property_entry (lit_table, lit_table_size, addr))
958 /* Look through the relocs for a section during the first phase, and
959 calculate needed space in the dynamic reloc sections. */
962 elf_xtensa_check_relocs (bfd *abfd,
963 struct bfd_link_info *info,
965 const Elf_Internal_Rela *relocs)
967 struct elf_xtensa_link_hash_table *htab;
968 Elf_Internal_Shdr *symtab_hdr;
969 struct elf_link_hash_entry **sym_hashes;
970 const Elf_Internal_Rela *rel;
971 const Elf_Internal_Rela *rel_end;
973 if (info->relocatable || (sec->flags & SEC_ALLOC) == 0)
976 BFD_ASSERT (is_xtensa_elf (abfd));
978 htab = elf_xtensa_hash_table (info);
979 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
980 sym_hashes = elf_sym_hashes (abfd);
982 rel_end = relocs + sec->reloc_count;
983 for (rel = relocs; rel < rel_end; rel++)
986 unsigned long r_symndx;
987 struct elf_link_hash_entry *h = NULL;
988 struct elf_xtensa_link_hash_entry *eh;
989 int tls_type, old_tls_type;
990 bfd_boolean is_got = FALSE;
991 bfd_boolean is_plt = FALSE;
992 bfd_boolean is_tlsfunc = FALSE;
994 r_symndx = ELF32_R_SYM (rel->r_info);
995 r_type = ELF32_R_TYPE (rel->r_info);
997 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
999 (*_bfd_error_handler) (_("%B: bad symbol index: %d"),
1004 if (r_symndx >= symtab_hdr->sh_info)
1006 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1007 while (h->root.type == bfd_link_hash_indirect
1008 || h->root.type == bfd_link_hash_warning)
1009 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1011 eh = elf_xtensa_hash_entry (h);
1015 case R_XTENSA_TLSDESC_FN:
1018 tls_type = GOT_TLS_GD;
1023 tls_type = GOT_TLS_IE;
1026 case R_XTENSA_TLSDESC_ARG:
1029 tls_type = GOT_TLS_GD;
1034 tls_type = GOT_TLS_IE;
1035 if (h && elf_xtensa_hash_entry (h) != htab->tlsbase)
1040 case R_XTENSA_TLS_DTPOFF:
1042 tls_type = GOT_TLS_GD;
1044 tls_type = GOT_TLS_IE;
1047 case R_XTENSA_TLS_TPOFF:
1048 tls_type = GOT_TLS_IE;
1050 info->flags |= DF_STATIC_TLS;
1051 if (info->shared || h)
1056 tls_type = GOT_NORMAL;
1061 tls_type = GOT_NORMAL;
1065 case R_XTENSA_GNU_VTINHERIT:
1066 /* This relocation describes the C++ object vtable hierarchy.
1067 Reconstruct it for later use during GC. */
1068 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1072 case R_XTENSA_GNU_VTENTRY:
1073 /* This relocation describes which C++ vtable entries are actually
1074 used. Record for later use during GC. */
1075 BFD_ASSERT (h != NULL);
1077 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1082 /* Nothing to do for any other relocations. */
1090 if (h->plt.refcount <= 0)
1093 h->plt.refcount = 1;
1096 h->plt.refcount += 1;
1098 /* Keep track of the total PLT relocation count even if we
1099 don't yet know whether the dynamic sections will be
1101 htab->plt_reloc_count += 1;
1103 if (elf_hash_table (info)->dynamic_sections_created)
1105 if (! add_extra_plt_sections (info, htab->plt_reloc_count))
1111 if (h->got.refcount <= 0)
1112 h->got.refcount = 1;
1114 h->got.refcount += 1;
1118 eh->tlsfunc_refcount += 1;
1120 old_tls_type = eh->tls_type;
1124 /* Allocate storage the first time. */
1125 if (elf_local_got_refcounts (abfd) == NULL)
1127 bfd_size_type size = symtab_hdr->sh_info;
1130 mem = bfd_zalloc (abfd, size * sizeof (bfd_signed_vma));
1133 elf_local_got_refcounts (abfd) = (bfd_signed_vma *) mem;
1135 mem = bfd_zalloc (abfd, size);
1138 elf_xtensa_local_got_tls_type (abfd) = (char *) mem;
1140 mem = bfd_zalloc (abfd, size * sizeof (bfd_signed_vma));
1143 elf_xtensa_local_tlsfunc_refcounts (abfd)
1144 = (bfd_signed_vma *) mem;
1147 /* This is a global offset table entry for a local symbol. */
1148 if (is_got || is_plt)
1149 elf_local_got_refcounts (abfd) [r_symndx] += 1;
1152 elf_xtensa_local_tlsfunc_refcounts (abfd) [r_symndx] += 1;
1154 old_tls_type = elf_xtensa_local_got_tls_type (abfd) [r_symndx];
1157 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_IE))
1158 tls_type |= old_tls_type;
1159 /* If a TLS symbol is accessed using IE at least once,
1160 there is no point to use a dynamic model for it. */
1161 else if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
1162 && ((old_tls_type & GOT_TLS_GD) == 0
1163 || (tls_type & GOT_TLS_IE) == 0))
1165 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_GD))
1166 tls_type = old_tls_type;
1167 else if ((old_tls_type & GOT_TLS_GD) && (tls_type & GOT_TLS_GD))
1168 tls_type |= old_tls_type;
1171 (*_bfd_error_handler)
1172 (_("%B: `%s' accessed both as normal and thread local symbol"),
1174 h ? h->root.root.string : "<local>");
1179 if (old_tls_type != tls_type)
1182 eh->tls_type = tls_type;
1184 elf_xtensa_local_got_tls_type (abfd) [r_symndx] = tls_type;
1193 elf_xtensa_make_sym_local (struct bfd_link_info *info,
1194 struct elf_link_hash_entry *h)
1198 if (h->plt.refcount > 0)
1200 /* For shared objects, there's no need for PLT entries for local
1201 symbols (use RELATIVE relocs instead of JMP_SLOT relocs). */
1202 if (h->got.refcount < 0)
1203 h->got.refcount = 0;
1204 h->got.refcount += h->plt.refcount;
1205 h->plt.refcount = 0;
1210 /* Don't need any dynamic relocations at all. */
1211 h->plt.refcount = 0;
1212 h->got.refcount = 0;
1218 elf_xtensa_hide_symbol (struct bfd_link_info *info,
1219 struct elf_link_hash_entry *h,
1220 bfd_boolean force_local)
1222 /* For a shared link, move the plt refcount to the got refcount to leave
1223 space for RELATIVE relocs. */
1224 elf_xtensa_make_sym_local (info, h);
1226 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
1230 /* Return the section that should be marked against GC for a given
1234 elf_xtensa_gc_mark_hook (asection *sec,
1235 struct bfd_link_info *info,
1236 Elf_Internal_Rela *rel,
1237 struct elf_link_hash_entry *h,
1238 Elf_Internal_Sym *sym)
1240 /* Property sections are marked "KEEP" in the linker scripts, but they
1241 should not cause other sections to be marked. (This approach relies
1242 on elf_xtensa_discard_info to remove property table entries that
1243 describe discarded sections. Alternatively, it might be more
1244 efficient to avoid using "KEEP" in the linker scripts and instead use
1245 the gc_mark_extra_sections hook to mark only the property sections
1246 that describe marked sections. That alternative does not work well
1247 with the current property table sections, which do not correspond
1248 one-to-one with the sections they describe, but that should be fixed
1250 if (xtensa_is_property_section (sec))
1254 switch (ELF32_R_TYPE (rel->r_info))
1256 case R_XTENSA_GNU_VTINHERIT:
1257 case R_XTENSA_GNU_VTENTRY:
1261 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1265 /* Update the GOT & PLT entry reference counts
1266 for the section being removed. */
1269 elf_xtensa_gc_sweep_hook (bfd *abfd,
1270 struct bfd_link_info *info,
1272 const Elf_Internal_Rela *relocs)
1274 Elf_Internal_Shdr *symtab_hdr;
1275 struct elf_link_hash_entry **sym_hashes;
1276 const Elf_Internal_Rela *rel, *relend;
1277 struct elf_xtensa_link_hash_table *htab;
1279 htab = elf_xtensa_hash_table (info);
1281 if (info->relocatable)
1284 if ((sec->flags & SEC_ALLOC) == 0)
1287 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1288 sym_hashes = elf_sym_hashes (abfd);
1290 relend = relocs + sec->reloc_count;
1291 for (rel = relocs; rel < relend; rel++)
1293 unsigned long r_symndx;
1294 unsigned int r_type;
1295 struct elf_link_hash_entry *h = NULL;
1296 struct elf_xtensa_link_hash_entry *eh;
1297 bfd_boolean is_got = FALSE;
1298 bfd_boolean is_plt = FALSE;
1299 bfd_boolean is_tlsfunc = FALSE;
1301 r_symndx = ELF32_R_SYM (rel->r_info);
1302 if (r_symndx >= symtab_hdr->sh_info)
1304 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1305 while (h->root.type == bfd_link_hash_indirect
1306 || h->root.type == bfd_link_hash_warning)
1307 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1309 eh = elf_xtensa_hash_entry (h);
1311 r_type = ELF32_R_TYPE (rel->r_info);
1314 case R_XTENSA_TLSDESC_FN:
1322 case R_XTENSA_TLSDESC_ARG:
1327 if (h && elf_xtensa_hash_entry (h) != htab->tlsbase)
1332 case R_XTENSA_TLS_TPOFF:
1333 if (info->shared || h)
1353 if (h->plt.refcount > 0)
1358 if (h->got.refcount > 0)
1363 if (eh->tlsfunc_refcount > 0)
1364 eh->tlsfunc_refcount--;
1369 if (is_got || is_plt)
1371 bfd_signed_vma *got_refcount
1372 = &elf_local_got_refcounts (abfd) [r_symndx];
1373 if (*got_refcount > 0)
1378 bfd_signed_vma *tlsfunc_refcount
1379 = &elf_xtensa_local_tlsfunc_refcounts (abfd) [r_symndx];
1380 if (*tlsfunc_refcount > 0)
1381 *tlsfunc_refcount -= 1;
1390 /* Create all the dynamic sections. */
1393 elf_xtensa_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
1395 struct elf_xtensa_link_hash_table *htab;
1396 flagword flags, noalloc_flags;
1398 htab = elf_xtensa_hash_table (info);
1400 /* First do all the standard stuff. */
1401 if (! _bfd_elf_create_dynamic_sections (dynobj, info))
1403 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
1404 htab->srelplt = bfd_get_section_by_name (dynobj, ".rela.plt");
1405 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
1406 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1408 /* Create any extra PLT sections in case check_relocs has already
1409 been called on all the non-dynamic input files. */
1410 if (! add_extra_plt_sections (info, htab->plt_reloc_count))
1413 noalloc_flags = (SEC_HAS_CONTENTS | SEC_IN_MEMORY
1414 | SEC_LINKER_CREATED | SEC_READONLY);
1415 flags = noalloc_flags | SEC_ALLOC | SEC_LOAD;
1417 /* Mark the ".got.plt" section READONLY. */
1418 if (htab->sgotplt == NULL
1419 || ! bfd_set_section_flags (dynobj, htab->sgotplt, flags))
1422 /* Create ".rela.got". */
1423 htab->srelgot = bfd_make_section_with_flags (dynobj, ".rela.got", flags);
1424 if (htab->srelgot == NULL
1425 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 2))
1428 /* Create ".got.loc" (literal tables for use by dynamic linker). */
1429 htab->sgotloc = bfd_make_section_with_flags (dynobj, ".got.loc", flags);
1430 if (htab->sgotloc == NULL
1431 || ! bfd_set_section_alignment (dynobj, htab->sgotloc, 2))
1434 /* Create ".xt.lit.plt" (literal table for ".got.plt*"). */
1435 htab->spltlittbl = bfd_make_section_with_flags (dynobj, ".xt.lit.plt",
1437 if (htab->spltlittbl == NULL
1438 || ! bfd_set_section_alignment (dynobj, htab->spltlittbl, 2))
1446 add_extra_plt_sections (struct bfd_link_info *info, int count)
1448 bfd *dynobj = elf_hash_table (info)->dynobj;
1451 /* Iterate over all chunks except 0 which uses the standard ".plt" and
1452 ".got.plt" sections. */
1453 for (chunk = count / PLT_ENTRIES_PER_CHUNK; chunk > 0; chunk--)
1459 /* Stop when we find a section has already been created. */
1460 if (elf_xtensa_get_plt_section (info, chunk))
1463 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1464 | SEC_LINKER_CREATED | SEC_READONLY);
1466 sname = (char *) bfd_malloc (10);
1467 sprintf (sname, ".plt.%u", chunk);
1468 s = bfd_make_section_with_flags (dynobj, sname, flags | SEC_CODE);
1470 || ! bfd_set_section_alignment (dynobj, s, 2))
1473 sname = (char *) bfd_malloc (14);
1474 sprintf (sname, ".got.plt.%u", chunk);
1475 s = bfd_make_section_with_flags (dynobj, sname, flags);
1477 || ! bfd_set_section_alignment (dynobj, s, 2))
1485 /* Adjust a symbol defined by a dynamic object and referenced by a
1486 regular object. The current definition is in some section of the
1487 dynamic object, but we're not including those sections. We have to
1488 change the definition to something the rest of the link can
1492 elf_xtensa_adjust_dynamic_symbol (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1493 struct elf_link_hash_entry *h)
1495 /* If this is a weak symbol, and there is a real definition, the
1496 processor independent code will have arranged for us to see the
1497 real definition first, and we can just use the same value. */
1500 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1501 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1502 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1503 h->root.u.def.value = h->u.weakdef->root.u.def.value;
1507 /* This is a reference to a symbol defined by a dynamic object. The
1508 reference must go through the GOT, so there's no need for COPY relocs,
1516 elf_xtensa_allocate_dynrelocs (struct elf_link_hash_entry *h, void *arg)
1518 struct bfd_link_info *info;
1519 struct elf_xtensa_link_hash_table *htab;
1520 struct elf_xtensa_link_hash_entry *eh = elf_xtensa_hash_entry (h);
1522 if (h->root.type == bfd_link_hash_indirect)
1525 if (h->root.type == bfd_link_hash_warning)
1526 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1528 info = (struct bfd_link_info *) arg;
1529 htab = elf_xtensa_hash_table (info);
1531 /* If we saw any use of an IE model for this symbol, we can then optimize
1532 away GOT entries for any TLSDESC_FN relocs. */
1533 if ((eh->tls_type & GOT_TLS_IE) != 0)
1535 BFD_ASSERT (h->got.refcount >= eh->tlsfunc_refcount);
1536 h->got.refcount -= eh->tlsfunc_refcount;
1539 if (! elf_xtensa_dynamic_symbol_p (h, info))
1540 elf_xtensa_make_sym_local (info, h);
1542 if (h->plt.refcount > 0)
1543 htab->srelplt->size += (h->plt.refcount * sizeof (Elf32_External_Rela));
1545 if (h->got.refcount > 0)
1546 htab->srelgot->size += (h->got.refcount * sizeof (Elf32_External_Rela));
1553 elf_xtensa_allocate_local_got_size (struct bfd_link_info *info)
1555 struct elf_xtensa_link_hash_table *htab;
1558 htab = elf_xtensa_hash_table (info);
1560 for (i = info->input_bfds; i; i = i->link_next)
1562 bfd_signed_vma *local_got_refcounts;
1563 bfd_size_type j, cnt;
1564 Elf_Internal_Shdr *symtab_hdr;
1566 local_got_refcounts = elf_local_got_refcounts (i);
1567 if (!local_got_refcounts)
1570 symtab_hdr = &elf_tdata (i)->symtab_hdr;
1571 cnt = symtab_hdr->sh_info;
1573 for (j = 0; j < cnt; ++j)
1575 /* If we saw any use of an IE model for this symbol, we can
1576 then optimize away GOT entries for any TLSDESC_FN relocs. */
1577 if ((elf_xtensa_local_got_tls_type (i) [j] & GOT_TLS_IE) != 0)
1579 bfd_signed_vma *tlsfunc_refcount
1580 = &elf_xtensa_local_tlsfunc_refcounts (i) [j];
1581 BFD_ASSERT (local_got_refcounts[j] >= *tlsfunc_refcount);
1582 local_got_refcounts[j] -= *tlsfunc_refcount;
1585 if (local_got_refcounts[j] > 0)
1586 htab->srelgot->size += (local_got_refcounts[j]
1587 * sizeof (Elf32_External_Rela));
1593 /* Set the sizes of the dynamic sections. */
1596 elf_xtensa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1597 struct bfd_link_info *info)
1599 struct elf_xtensa_link_hash_table *htab;
1601 asection *s, *srelplt, *splt, *sgotplt, *srelgot, *spltlittbl, *sgotloc;
1602 bfd_boolean relplt, relgot;
1603 int plt_entries, plt_chunks, chunk;
1608 htab = elf_xtensa_hash_table (info);
1609 dynobj = elf_hash_table (info)->dynobj;
1612 srelgot = htab->srelgot;
1613 srelplt = htab->srelplt;
1615 if (elf_hash_table (info)->dynamic_sections_created)
1617 BFD_ASSERT (htab->srelgot != NULL
1618 && htab->srelplt != NULL
1619 && htab->sgot != NULL
1620 && htab->spltlittbl != NULL
1621 && htab->sgotloc != NULL);
1623 /* Set the contents of the .interp section to the interpreter. */
1624 if (info->executable)
1626 s = bfd_get_section_by_name (dynobj, ".interp");
1629 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1630 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1633 /* Allocate room for one word in ".got". */
1634 htab->sgot->size = 4;
1636 /* Allocate space in ".rela.got" for literals that reference global
1637 symbols and space in ".rela.plt" for literals that have PLT
1639 elf_link_hash_traverse (elf_hash_table (info),
1640 elf_xtensa_allocate_dynrelocs,
1643 /* If we are generating a shared object, we also need space in
1644 ".rela.got" for R_XTENSA_RELATIVE relocs for literals that
1645 reference local symbols. */
1647 elf_xtensa_allocate_local_got_size (info);
1649 /* Allocate space in ".plt" to match the size of ".rela.plt". For
1650 each PLT entry, we need the PLT code plus a 4-byte literal.
1651 For each chunk of ".plt", we also need two more 4-byte
1652 literals, two corresponding entries in ".rela.got", and an
1653 8-byte entry in ".xt.lit.plt". */
1654 spltlittbl = htab->spltlittbl;
1655 plt_entries = srelplt->size / sizeof (Elf32_External_Rela);
1657 (plt_entries + PLT_ENTRIES_PER_CHUNK - 1) / PLT_ENTRIES_PER_CHUNK;
1659 /* Iterate over all the PLT chunks, including any extra sections
1660 created earlier because the initial count of PLT relocations
1661 was an overestimate. */
1663 (splt = elf_xtensa_get_plt_section (info, chunk)) != NULL;
1668 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
1669 BFD_ASSERT (sgotplt != NULL);
1671 if (chunk < plt_chunks - 1)
1672 chunk_entries = PLT_ENTRIES_PER_CHUNK;
1673 else if (chunk == plt_chunks - 1)
1674 chunk_entries = plt_entries - (chunk * PLT_ENTRIES_PER_CHUNK);
1678 if (chunk_entries != 0)
1680 sgotplt->size = 4 * (chunk_entries + 2);
1681 splt->size = PLT_ENTRY_SIZE * chunk_entries;
1682 srelgot->size += 2 * sizeof (Elf32_External_Rela);
1683 spltlittbl->size += 8;
1692 /* Allocate space in ".got.loc" to match the total size of all the
1694 sgotloc = htab->sgotloc;
1695 sgotloc->size = spltlittbl->size;
1696 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
1698 if (abfd->flags & DYNAMIC)
1700 for (s = abfd->sections; s != NULL; s = s->next)
1702 if (! elf_discarded_section (s)
1703 && xtensa_is_littable_section (s)
1705 sgotloc->size += s->size;
1710 /* Allocate memory for dynamic sections. */
1713 for (s = dynobj->sections; s != NULL; s = s->next)
1717 if ((s->flags & SEC_LINKER_CREATED) == 0)
1720 /* It's OK to base decisions on the section name, because none
1721 of the dynobj section names depend upon the input files. */
1722 name = bfd_get_section_name (dynobj, s);
1724 if (CONST_STRNEQ (name, ".rela"))
1728 if (strcmp (name, ".rela.plt") == 0)
1730 else if (strcmp (name, ".rela.got") == 0)
1733 /* We use the reloc_count field as a counter if we need
1734 to copy relocs into the output file. */
1738 else if (! CONST_STRNEQ (name, ".plt.")
1739 && ! CONST_STRNEQ (name, ".got.plt.")
1740 && strcmp (name, ".got") != 0
1741 && strcmp (name, ".plt") != 0
1742 && strcmp (name, ".got.plt") != 0
1743 && strcmp (name, ".xt.lit.plt") != 0
1744 && strcmp (name, ".got.loc") != 0)
1746 /* It's not one of our sections, so don't allocate space. */
1752 /* If we don't need this section, strip it from the output
1753 file. We must create the ".plt*" and ".got.plt*"
1754 sections in create_dynamic_sections and/or check_relocs
1755 based on a conservative estimate of the PLT relocation
1756 count, because the sections must be created before the
1757 linker maps input sections to output sections. The
1758 linker does that before size_dynamic_sections, where we
1759 compute the exact size of the PLT, so there may be more
1760 of these sections than are actually needed. */
1761 s->flags |= SEC_EXCLUDE;
1763 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
1765 /* Allocate memory for the section contents. */
1766 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1767 if (s->contents == NULL)
1772 if (elf_hash_table (info)->dynamic_sections_created)
1774 /* Add the special XTENSA_RTLD relocations now. The offsets won't be
1775 known until finish_dynamic_sections, but we need to get the relocs
1776 in place before they are sorted. */
1777 for (chunk = 0; chunk < plt_chunks; chunk++)
1779 Elf_Internal_Rela irela;
1783 irela.r_info = ELF32_R_INFO (0, R_XTENSA_RTLD);
1786 loc = (srelgot->contents
1787 + srelgot->reloc_count * sizeof (Elf32_External_Rela));
1788 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
1789 bfd_elf32_swap_reloca_out (output_bfd, &irela,
1790 loc + sizeof (Elf32_External_Rela));
1791 srelgot->reloc_count += 2;
1794 /* Add some entries to the .dynamic section. We fill in the
1795 values later, in elf_xtensa_finish_dynamic_sections, but we
1796 must add the entries now so that we get the correct size for
1797 the .dynamic section. The DT_DEBUG entry is filled in by the
1798 dynamic linker and used by the debugger. */
1799 #define add_dynamic_entry(TAG, VAL) \
1800 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1802 if (info->executable)
1804 if (!add_dynamic_entry (DT_DEBUG, 0))
1810 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
1811 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1812 || !add_dynamic_entry (DT_JMPREL, 0))
1818 if (!add_dynamic_entry (DT_RELA, 0)
1819 || !add_dynamic_entry (DT_RELASZ, 0)
1820 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1824 if (!add_dynamic_entry (DT_PLTGOT, 0)
1825 || !add_dynamic_entry (DT_XTENSA_GOT_LOC_OFF, 0)
1826 || !add_dynamic_entry (DT_XTENSA_GOT_LOC_SZ, 0))
1829 #undef add_dynamic_entry
1835 elf_xtensa_always_size_sections (bfd *output_bfd,
1836 struct bfd_link_info *info)
1838 struct elf_xtensa_link_hash_table *htab;
1841 htab = elf_xtensa_hash_table (info);
1842 tls_sec = htab->elf.tls_sec;
1844 if (tls_sec && (htab->tlsbase->tls_type & GOT_TLS_ANY) != 0)
1846 struct elf_link_hash_entry *tlsbase = &htab->tlsbase->elf;
1847 struct bfd_link_hash_entry *bh = &tlsbase->root;
1848 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
1850 tlsbase->type = STT_TLS;
1851 if (!(_bfd_generic_link_add_one_symbol
1852 (info, output_bfd, "_TLS_MODULE_BASE_", BSF_LOCAL,
1853 tls_sec, 0, NULL, FALSE,
1854 bed->collect, &bh)))
1856 tlsbase->def_regular = 1;
1857 tlsbase->other = STV_HIDDEN;
1858 (*bed->elf_backend_hide_symbol) (info, tlsbase, TRUE);
1865 /* Return the base VMA address which should be subtracted from real addresses
1866 when resolving @dtpoff relocation.
1867 This is PT_TLS segment p_vaddr. */
1870 dtpoff_base (struct bfd_link_info *info)
1872 /* If tls_sec is NULL, we should have signalled an error already. */
1873 if (elf_hash_table (info)->tls_sec == NULL)
1875 return elf_hash_table (info)->tls_sec->vma;
1878 /* Return the relocation value for @tpoff relocation
1879 if STT_TLS virtual address is ADDRESS. */
1882 tpoff (struct bfd_link_info *info, bfd_vma address)
1884 struct elf_link_hash_table *htab = elf_hash_table (info);
1887 /* If tls_sec is NULL, we should have signalled an error already. */
1888 if (htab->tls_sec == NULL)
1890 base = align_power ((bfd_vma) TCB_SIZE, htab->tls_sec->alignment_power);
1891 return address - htab->tls_sec->vma + base;
1894 /* Perform the specified relocation. The instruction at (contents + address)
1895 is modified to set one operand to represent the value in "relocation". The
1896 operand position is determined by the relocation type recorded in the
1899 #define CALL_SEGMENT_BITS (30)
1900 #define CALL_SEGMENT_SIZE (1 << CALL_SEGMENT_BITS)
1902 static bfd_reloc_status_type
1903 elf_xtensa_do_reloc (reloc_howto_type *howto,
1905 asection *input_section,
1909 bfd_boolean is_weak_undef,
1910 char **error_message)
1913 xtensa_opcode opcode;
1914 xtensa_isa isa = xtensa_default_isa;
1915 static xtensa_insnbuf ibuff = NULL;
1916 static xtensa_insnbuf sbuff = NULL;
1917 bfd_vma self_address;
1918 bfd_size_type input_size;
1924 ibuff = xtensa_insnbuf_alloc (isa);
1925 sbuff = xtensa_insnbuf_alloc (isa);
1928 input_size = bfd_get_section_limit (abfd, input_section);
1930 /* Calculate the PC address for this instruction. */
1931 self_address = (input_section->output_section->vma
1932 + input_section->output_offset
1935 switch (howto->type)
1938 case R_XTENSA_DIFF8:
1939 case R_XTENSA_DIFF16:
1940 case R_XTENSA_DIFF32:
1941 case R_XTENSA_TLS_FUNC:
1942 case R_XTENSA_TLS_ARG:
1943 case R_XTENSA_TLS_CALL:
1944 return bfd_reloc_ok;
1946 case R_XTENSA_ASM_EXPAND:
1949 /* Check for windowed CALL across a 1GB boundary. */
1950 xtensa_opcode opcode =
1951 get_expanded_call_opcode (contents + address,
1952 input_size - address, 0);
1953 if (is_windowed_call_opcode (opcode))
1955 if ((self_address >> CALL_SEGMENT_BITS)
1956 != (relocation >> CALL_SEGMENT_BITS))
1958 *error_message = "windowed longcall crosses 1GB boundary; "
1960 return bfd_reloc_dangerous;
1964 return bfd_reloc_ok;
1966 case R_XTENSA_ASM_SIMPLIFY:
1968 /* Convert the L32R/CALLX to CALL. */
1969 bfd_reloc_status_type retval =
1970 elf_xtensa_do_asm_simplify (contents, address, input_size,
1972 if (retval != bfd_reloc_ok)
1973 return bfd_reloc_dangerous;
1975 /* The CALL needs to be relocated. Continue below for that part. */
1978 howto = &elf_howto_table[(unsigned) R_XTENSA_SLOT0_OP ];
1985 x = bfd_get_32 (abfd, contents + address);
1987 bfd_put_32 (abfd, x, contents + address);
1989 return bfd_reloc_ok;
1991 case R_XTENSA_32_PCREL:
1992 bfd_put_32 (abfd, relocation - self_address, contents + address);
1993 return bfd_reloc_ok;
1996 case R_XTENSA_TLSDESC_FN:
1997 case R_XTENSA_TLSDESC_ARG:
1998 case R_XTENSA_TLS_DTPOFF:
1999 case R_XTENSA_TLS_TPOFF:
2000 bfd_put_32 (abfd, relocation, contents + address);
2001 return bfd_reloc_ok;
2004 /* Only instruction slot-specific relocations handled below.... */
2005 slot = get_relocation_slot (howto->type);
2006 if (slot == XTENSA_UNDEFINED)
2008 *error_message = "unexpected relocation";
2009 return bfd_reloc_dangerous;
2012 /* Read the instruction into a buffer and decode the opcode. */
2013 xtensa_insnbuf_from_chars (isa, ibuff, contents + address,
2014 input_size - address);
2015 fmt = xtensa_format_decode (isa, ibuff);
2016 if (fmt == XTENSA_UNDEFINED)
2018 *error_message = "cannot decode instruction format";
2019 return bfd_reloc_dangerous;
2022 xtensa_format_get_slot (isa, fmt, slot, ibuff, sbuff);
2024 opcode = xtensa_opcode_decode (isa, fmt, slot, sbuff);
2025 if (opcode == XTENSA_UNDEFINED)
2027 *error_message = "cannot decode instruction opcode";
2028 return bfd_reloc_dangerous;
2031 /* Check for opcode-specific "alternate" relocations. */
2032 if (is_alt_relocation (howto->type))
2034 if (opcode == get_l32r_opcode ())
2036 /* Handle the special-case of non-PC-relative L32R instructions. */
2037 bfd *output_bfd = input_section->output_section->owner;
2038 asection *lit4_sec = bfd_get_section_by_name (output_bfd, ".lit4");
2041 *error_message = "relocation references missing .lit4 section";
2042 return bfd_reloc_dangerous;
2044 self_address = ((lit4_sec->vma & ~0xfff)
2045 + 0x40000 - 3); /* -3 to compensate for do_reloc */
2046 newval = relocation;
2049 else if (opcode == get_const16_opcode ())
2051 /* ALT used for high 16 bits. */
2052 newval = relocation >> 16;
2057 /* No other "alternate" relocations currently defined. */
2058 *error_message = "unexpected relocation";
2059 return bfd_reloc_dangerous;
2062 else /* Not an "alternate" relocation.... */
2064 if (opcode == get_const16_opcode ())
2066 newval = relocation & 0xffff;
2071 /* ...normal PC-relative relocation.... */
2073 /* Determine which operand is being relocated. */
2074 opnd = get_relocation_opnd (opcode, howto->type);
2075 if (opnd == XTENSA_UNDEFINED)
2077 *error_message = "unexpected relocation";
2078 return bfd_reloc_dangerous;
2081 if (!howto->pc_relative)
2083 *error_message = "expected PC-relative relocation";
2084 return bfd_reloc_dangerous;
2087 newval = relocation;
2091 /* Apply the relocation. */
2092 if (xtensa_operand_do_reloc (isa, opcode, opnd, &newval, self_address)
2093 || xtensa_operand_encode (isa, opcode, opnd, &newval)
2094 || xtensa_operand_set_field (isa, opcode, opnd, fmt, slot,
2097 const char *opname = xtensa_opcode_name (isa, opcode);
2100 msg = "cannot encode";
2101 if (is_direct_call_opcode (opcode))
2103 if ((relocation & 0x3) != 0)
2104 msg = "misaligned call target";
2106 msg = "call target out of range";
2108 else if (opcode == get_l32r_opcode ())
2110 if ((relocation & 0x3) != 0)
2111 msg = "misaligned literal target";
2112 else if (is_alt_relocation (howto->type))
2113 msg = "literal target out of range (too many literals)";
2114 else if (self_address > relocation)
2115 msg = "literal target out of range (try using text-section-literals)";
2117 msg = "literal placed after use";
2120 *error_message = vsprint_msg (opname, ": %s", strlen (msg) + 2, msg);
2121 return bfd_reloc_dangerous;
2124 /* Check for calls across 1GB boundaries. */
2125 if (is_direct_call_opcode (opcode)
2126 && is_windowed_call_opcode (opcode))
2128 if ((self_address >> CALL_SEGMENT_BITS)
2129 != (relocation >> CALL_SEGMENT_BITS))
2132 "windowed call crosses 1GB boundary; return may fail";
2133 return bfd_reloc_dangerous;
2137 /* Write the modified instruction back out of the buffer. */
2138 xtensa_format_set_slot (isa, fmt, slot, ibuff, sbuff);
2139 xtensa_insnbuf_to_chars (isa, ibuff, contents + address,
2140 input_size - address);
2141 return bfd_reloc_ok;
2146 vsprint_msg (const char *origmsg, const char *fmt, int arglen, ...)
2148 /* To reduce the size of the memory leak,
2149 we only use a single message buffer. */
2150 static bfd_size_type alloc_size = 0;
2151 static char *message = NULL;
2152 bfd_size_type orig_len, len = 0;
2153 bfd_boolean is_append;
2155 VA_OPEN (ap, arglen);
2156 VA_FIXEDARG (ap, const char *, origmsg);
2158 is_append = (origmsg == message);
2160 orig_len = strlen (origmsg);
2161 len = orig_len + strlen (fmt) + arglen + 20;
2162 if (len > alloc_size)
2164 message = (char *) bfd_realloc_or_free (message, len);
2167 if (message != NULL)
2170 memcpy (message, origmsg, orig_len);
2171 vsprintf (message + orig_len, fmt, ap);
2178 /* This function is registered as the "special_function" in the
2179 Xtensa howto for handling simplify operations.
2180 bfd_perform_relocation / bfd_install_relocation use it to
2181 perform (install) the specified relocation. Since this replaces the code
2182 in bfd_perform_relocation, it is basically an Xtensa-specific,
2183 stripped-down version of bfd_perform_relocation. */
2185 static bfd_reloc_status_type
2186 bfd_elf_xtensa_reloc (bfd *abfd,
2187 arelent *reloc_entry,
2190 asection *input_section,
2192 char **error_message)
2195 bfd_reloc_status_type flag;
2196 bfd_size_type octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2197 bfd_vma output_base = 0;
2198 reloc_howto_type *howto = reloc_entry->howto;
2199 asection *reloc_target_output_section;
2200 bfd_boolean is_weak_undef;
2202 if (!xtensa_default_isa)
2203 xtensa_default_isa = xtensa_isa_init (0, 0);
2205 /* ELF relocs are against symbols. If we are producing relocatable
2206 output, and the reloc is against an external symbol, the resulting
2207 reloc will also be against the same symbol. In such a case, we
2208 don't want to change anything about the way the reloc is handled,
2209 since it will all be done at final link time. This test is similar
2210 to what bfd_elf_generic_reloc does except that it lets relocs with
2211 howto->partial_inplace go through even if the addend is non-zero.
2212 (The real problem is that partial_inplace is set for XTENSA_32
2213 relocs to begin with, but that's a long story and there's little we
2214 can do about it now....) */
2216 if (output_bfd && (symbol->flags & BSF_SECTION_SYM) == 0)
2218 reloc_entry->address += input_section->output_offset;
2219 return bfd_reloc_ok;
2222 /* Is the address of the relocation really within the section? */
2223 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
2224 return bfd_reloc_outofrange;
2226 /* Work out which section the relocation is targeted at and the
2227 initial relocation command value. */
2229 /* Get symbol value. (Common symbols are special.) */
2230 if (bfd_is_com_section (symbol->section))
2233 relocation = symbol->value;
2235 reloc_target_output_section = symbol->section->output_section;
2237 /* Convert input-section-relative symbol value to absolute. */
2238 if ((output_bfd && !howto->partial_inplace)
2239 || reloc_target_output_section == NULL)
2242 output_base = reloc_target_output_section->vma;
2244 relocation += output_base + symbol->section->output_offset;
2246 /* Add in supplied addend. */
2247 relocation += reloc_entry->addend;
2249 /* Here the variable relocation holds the final address of the
2250 symbol we are relocating against, plus any addend. */
2253 if (!howto->partial_inplace)
2255 /* This is a partial relocation, and we want to apply the relocation
2256 to the reloc entry rather than the raw data. Everything except
2257 relocations against section symbols has already been handled
2260 BFD_ASSERT (symbol->flags & BSF_SECTION_SYM);
2261 reloc_entry->addend = relocation;
2262 reloc_entry->address += input_section->output_offset;
2263 return bfd_reloc_ok;
2267 reloc_entry->address += input_section->output_offset;
2268 reloc_entry->addend = 0;
2272 is_weak_undef = (bfd_is_und_section (symbol->section)
2273 && (symbol->flags & BSF_WEAK) != 0);
2274 flag = elf_xtensa_do_reloc (howto, abfd, input_section, relocation,
2275 (bfd_byte *) data, (bfd_vma) octets,
2276 is_weak_undef, error_message);
2278 if (flag == bfd_reloc_dangerous)
2280 /* Add the symbol name to the error message. */
2281 if (! *error_message)
2282 *error_message = "";
2283 *error_message = vsprint_msg (*error_message, ": (%s + 0x%lx)",
2284 strlen (symbol->name) + 17,
2286 (unsigned long) reloc_entry->addend);
2293 /* Set up an entry in the procedure linkage table. */
2296 elf_xtensa_create_plt_entry (struct bfd_link_info *info,
2298 unsigned reloc_index)
2300 asection *splt, *sgotplt;
2301 bfd_vma plt_base, got_base;
2302 bfd_vma code_offset, lit_offset;
2305 chunk = reloc_index / PLT_ENTRIES_PER_CHUNK;
2306 splt = elf_xtensa_get_plt_section (info, chunk);
2307 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
2308 BFD_ASSERT (splt != NULL && sgotplt != NULL);
2310 plt_base = splt->output_section->vma + splt->output_offset;
2311 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2313 lit_offset = 8 + (reloc_index % PLT_ENTRIES_PER_CHUNK) * 4;
2314 code_offset = (reloc_index % PLT_ENTRIES_PER_CHUNK) * PLT_ENTRY_SIZE;
2316 /* Fill in the literal entry. This is the offset of the dynamic
2317 relocation entry. */
2318 bfd_put_32 (output_bfd, reloc_index * sizeof (Elf32_External_Rela),
2319 sgotplt->contents + lit_offset);
2321 /* Fill in the entry in the procedure linkage table. */
2322 memcpy (splt->contents + code_offset,
2323 (bfd_big_endian (output_bfd)
2324 ? elf_xtensa_be_plt_entry
2325 : elf_xtensa_le_plt_entry),
2327 bfd_put_16 (output_bfd, l32r_offset (got_base + 0,
2328 plt_base + code_offset + 3),
2329 splt->contents + code_offset + 4);
2330 bfd_put_16 (output_bfd, l32r_offset (got_base + 4,
2331 plt_base + code_offset + 6),
2332 splt->contents + code_offset + 7);
2333 bfd_put_16 (output_bfd, l32r_offset (got_base + lit_offset,
2334 plt_base + code_offset + 9),
2335 splt->contents + code_offset + 10);
2337 return plt_base + code_offset;
2341 static bfd_boolean get_indirect_call_dest_reg (xtensa_opcode, unsigned *);
2344 replace_tls_insn (Elf_Internal_Rela *rel,
2346 asection *input_section,
2348 bfd_boolean is_ld_model,
2349 char **error_message)
2351 static xtensa_insnbuf ibuff = NULL;
2352 static xtensa_insnbuf sbuff = NULL;
2353 xtensa_isa isa = xtensa_default_isa;
2355 xtensa_opcode old_op, new_op;
2356 bfd_size_type input_size;
2358 unsigned dest_reg, src_reg;
2362 ibuff = xtensa_insnbuf_alloc (isa);
2363 sbuff = xtensa_insnbuf_alloc (isa);
2366 input_size = bfd_get_section_limit (abfd, input_section);
2368 /* Read the instruction into a buffer and decode the opcode. */
2369 xtensa_insnbuf_from_chars (isa, ibuff, contents + rel->r_offset,
2370 input_size - rel->r_offset);
2371 fmt = xtensa_format_decode (isa, ibuff);
2372 if (fmt == XTENSA_UNDEFINED)
2374 *error_message = "cannot decode instruction format";
2378 BFD_ASSERT (xtensa_format_num_slots (isa, fmt) == 1);
2379 xtensa_format_get_slot (isa, fmt, 0, ibuff, sbuff);
2381 old_op = xtensa_opcode_decode (isa, fmt, 0, sbuff);
2382 if (old_op == XTENSA_UNDEFINED)
2384 *error_message = "cannot decode instruction opcode";
2388 r_type = ELF32_R_TYPE (rel->r_info);
2391 case R_XTENSA_TLS_FUNC:
2392 case R_XTENSA_TLS_ARG:
2393 if (old_op != get_l32r_opcode ()
2394 || xtensa_operand_get_field (isa, old_op, 0, fmt, 0,
2395 sbuff, &dest_reg) != 0)
2397 *error_message = "cannot extract L32R destination for TLS access";
2402 case R_XTENSA_TLS_CALL:
2403 if (! get_indirect_call_dest_reg (old_op, &dest_reg)
2404 || xtensa_operand_get_field (isa, old_op, 0, fmt, 0,
2405 sbuff, &src_reg) != 0)
2407 *error_message = "cannot extract CALLXn operands for TLS access";
2420 case R_XTENSA_TLS_FUNC:
2421 case R_XTENSA_TLS_ARG:
2422 /* Change the instruction to a NOP (or "OR a1, a1, a1" for older
2423 versions of Xtensa). */
2424 new_op = xtensa_opcode_lookup (isa, "nop");
2425 if (new_op == XTENSA_UNDEFINED)
2427 new_op = xtensa_opcode_lookup (isa, "or");
2428 if (new_op == XTENSA_UNDEFINED
2429 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2430 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2432 || xtensa_operand_set_field (isa, new_op, 1, fmt, 0,
2434 || xtensa_operand_set_field (isa, new_op, 2, fmt, 0,
2437 *error_message = "cannot encode OR for TLS access";
2443 if (xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0)
2445 *error_message = "cannot encode NOP for TLS access";
2451 case R_XTENSA_TLS_CALL:
2452 /* Read THREADPTR into the CALLX's return value register. */
2453 new_op = xtensa_opcode_lookup (isa, "rur.threadptr");
2454 if (new_op == XTENSA_UNDEFINED
2455 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2456 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2457 sbuff, dest_reg + 2) != 0)
2459 *error_message = "cannot encode RUR.THREADPTR for TLS access";
2469 case R_XTENSA_TLS_FUNC:
2470 new_op = xtensa_opcode_lookup (isa, "rur.threadptr");
2471 if (new_op == XTENSA_UNDEFINED
2472 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2473 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2474 sbuff, dest_reg) != 0)
2476 *error_message = "cannot encode RUR.THREADPTR for TLS access";
2481 case R_XTENSA_TLS_ARG:
2482 /* Nothing to do. Keep the original L32R instruction. */
2485 case R_XTENSA_TLS_CALL:
2486 /* Add the CALLX's src register (holding the THREADPTR value)
2487 to the first argument register (holding the offset) and put
2488 the result in the CALLX's return value register. */
2489 new_op = xtensa_opcode_lookup (isa, "add");
2490 if (new_op == XTENSA_UNDEFINED
2491 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2492 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2493 sbuff, dest_reg + 2) != 0
2494 || xtensa_operand_set_field (isa, new_op, 1, fmt, 0,
2495 sbuff, dest_reg + 2) != 0
2496 || xtensa_operand_set_field (isa, new_op, 2, fmt, 0,
2497 sbuff, src_reg) != 0)
2499 *error_message = "cannot encode ADD for TLS access";
2506 xtensa_format_set_slot (isa, fmt, 0, ibuff, sbuff);
2507 xtensa_insnbuf_to_chars (isa, ibuff, contents + rel->r_offset,
2508 input_size - rel->r_offset);
2514 #define IS_XTENSA_TLS_RELOC(R_TYPE) \
2515 ((R_TYPE) == R_XTENSA_TLSDESC_FN \
2516 || (R_TYPE) == R_XTENSA_TLSDESC_ARG \
2517 || (R_TYPE) == R_XTENSA_TLS_DTPOFF \
2518 || (R_TYPE) == R_XTENSA_TLS_TPOFF \
2519 || (R_TYPE) == R_XTENSA_TLS_FUNC \
2520 || (R_TYPE) == R_XTENSA_TLS_ARG \
2521 || (R_TYPE) == R_XTENSA_TLS_CALL)
2523 /* Relocate an Xtensa ELF section. This is invoked by the linker for
2524 both relocatable and final links. */
2527 elf_xtensa_relocate_section (bfd *output_bfd,
2528 struct bfd_link_info *info,
2530 asection *input_section,
2532 Elf_Internal_Rela *relocs,
2533 Elf_Internal_Sym *local_syms,
2534 asection **local_sections)
2536 struct elf_xtensa_link_hash_table *htab;
2537 Elf_Internal_Shdr *symtab_hdr;
2538 Elf_Internal_Rela *rel;
2539 Elf_Internal_Rela *relend;
2540 struct elf_link_hash_entry **sym_hashes;
2541 property_table_entry *lit_table = 0;
2543 char *local_got_tls_types;
2544 char *error_message = NULL;
2545 bfd_size_type input_size;
2548 if (!xtensa_default_isa)
2549 xtensa_default_isa = xtensa_isa_init (0, 0);
2551 BFD_ASSERT (is_xtensa_elf (input_bfd));
2553 htab = elf_xtensa_hash_table (info);
2554 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2555 sym_hashes = elf_sym_hashes (input_bfd);
2556 local_got_tls_types = elf_xtensa_local_got_tls_type (input_bfd);
2558 if (elf_hash_table (info)->dynamic_sections_created)
2560 ltblsize = xtensa_read_table_entries (input_bfd, input_section,
2561 &lit_table, XTENSA_LIT_SEC_NAME,
2567 input_size = bfd_get_section_limit (input_bfd, input_section);
2570 relend = relocs + input_section->reloc_count;
2571 for (; rel < relend; rel++)
2574 reloc_howto_type *howto;
2575 unsigned long r_symndx;
2576 struct elf_link_hash_entry *h;
2577 Elf_Internal_Sym *sym;
2582 bfd_reloc_status_type r;
2583 bfd_boolean is_weak_undef;
2584 bfd_boolean unresolved_reloc;
2586 bfd_boolean dynamic_symbol;
2588 r_type = ELF32_R_TYPE (rel->r_info);
2589 if (r_type == (int) R_XTENSA_GNU_VTINHERIT
2590 || r_type == (int) R_XTENSA_GNU_VTENTRY)
2593 if (r_type < 0 || r_type >= (int) R_XTENSA_max)
2595 bfd_set_error (bfd_error_bad_value);
2598 howto = &elf_howto_table[r_type];
2600 r_symndx = ELF32_R_SYM (rel->r_info);
2605 is_weak_undef = FALSE;
2606 unresolved_reloc = FALSE;
2609 if (howto->partial_inplace && !info->relocatable)
2611 /* Because R_XTENSA_32 was made partial_inplace to fix some
2612 problems with DWARF info in partial links, there may be
2613 an addend stored in the contents. Take it out of there
2614 and move it back into the addend field of the reloc. */
2615 rel->r_addend += bfd_get_32 (input_bfd, contents + rel->r_offset);
2616 bfd_put_32 (input_bfd, 0, contents + rel->r_offset);
2619 if (r_symndx < symtab_hdr->sh_info)
2621 sym = local_syms + r_symndx;
2622 sym_type = ELF32_ST_TYPE (sym->st_info);
2623 sec = local_sections[r_symndx];
2624 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2628 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2629 r_symndx, symtab_hdr, sym_hashes,
2631 unresolved_reloc, warned);
2634 && !unresolved_reloc
2635 && h->root.type == bfd_link_hash_undefweak)
2636 is_weak_undef = TRUE;
2641 if (sec != NULL && elf_discarded_section (sec))
2643 /* For relocs against symbols from removed linkonce sections,
2644 or sections discarded by a linker script, we just want the
2645 section contents zeroed. Avoid any special processing. */
2646 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
2652 if (info->relocatable)
2654 /* This is a relocatable link.
2655 1) If the reloc is against a section symbol, adjust
2656 according to the output section.
2657 2) If there is a new target for this relocation,
2658 the new target will be in the same output section.
2659 We adjust the relocation by the output section
2662 if (relaxing_section)
2664 /* Check if this references a section in another input file. */
2665 if (!do_fix_for_relocatable_link (rel, input_bfd, input_section,
2670 if (r_type == R_XTENSA_ASM_SIMPLIFY)
2672 char *error_message = NULL;
2673 /* Convert ASM_SIMPLIFY into the simpler relocation
2674 so that they never escape a relaxing link. */
2675 r = contract_asm_expansion (contents, input_size, rel,
2677 if (r != bfd_reloc_ok)
2679 if (!((*info->callbacks->reloc_dangerous)
2680 (info, error_message, input_bfd, input_section,
2684 r_type = ELF32_R_TYPE (rel->r_info);
2687 /* This is a relocatable link, so we don't have to change
2688 anything unless the reloc is against a section symbol,
2689 in which case we have to adjust according to where the
2690 section symbol winds up in the output section. */
2691 if (r_symndx < symtab_hdr->sh_info)
2693 sym = local_syms + r_symndx;
2694 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
2696 sec = local_sections[r_symndx];
2697 rel->r_addend += sec->output_offset + sym->st_value;
2701 /* If there is an addend with a partial_inplace howto,
2702 then move the addend to the contents. This is a hack
2703 to work around problems with DWARF in relocatable links
2704 with some previous version of BFD. Now we can't easily get
2705 rid of the hack without breaking backward compatibility.... */
2708 howto = &elf_howto_table[r_type];
2709 if (howto->partial_inplace)
2711 r = elf_xtensa_do_reloc (howto, input_bfd, input_section,
2712 rel->r_addend, contents,
2713 rel->r_offset, FALSE,
2715 if (r != bfd_reloc_ok)
2717 if (!((*info->callbacks->reloc_dangerous)
2718 (info, error_message, input_bfd, input_section,
2726 /* Done with work for relocatable link; continue with next reloc. */
2730 /* This is a final link. */
2732 if (relaxing_section)
2734 /* Check if this references a section in another input file. */
2735 do_fix_for_final_link (rel, input_bfd, input_section, contents,
2739 /* Sanity check the address. */
2740 if (rel->r_offset >= input_size
2741 && ELF32_R_TYPE (rel->r_info) != R_XTENSA_NONE)
2743 (*_bfd_error_handler)
2744 (_("%B(%A+0x%lx): relocation offset out of range (size=0x%x)"),
2745 input_bfd, input_section, rel->r_offset, input_size);
2746 bfd_set_error (bfd_error_bad_value);
2751 name = h->root.root.string;
2754 name = (bfd_elf_string_from_elf_section
2755 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2756 if (name == NULL || *name == '\0')
2757 name = bfd_section_name (input_bfd, sec);
2761 && r_type != R_XTENSA_NONE
2763 || h->root.type == bfd_link_hash_defined
2764 || h->root.type == bfd_link_hash_defweak)
2765 && IS_XTENSA_TLS_RELOC (r_type) != (sym_type == STT_TLS))
2767 (*_bfd_error_handler)
2768 ((sym_type == STT_TLS
2769 ? _("%B(%A+0x%lx): %s used with TLS symbol %s")
2770 : _("%B(%A+0x%lx): %s used with non-TLS symbol %s")),
2773 (long) rel->r_offset,
2778 dynamic_symbol = elf_xtensa_dynamic_symbol_p (h, info);
2780 tls_type = GOT_UNKNOWN;
2782 tls_type = elf_xtensa_hash_entry (h)->tls_type;
2783 else if (local_got_tls_types)
2784 tls_type = local_got_tls_types [r_symndx];
2790 if (elf_hash_table (info)->dynamic_sections_created
2791 && (input_section->flags & SEC_ALLOC) != 0
2792 && (dynamic_symbol || info->shared))
2794 Elf_Internal_Rela outrel;
2798 if (dynamic_symbol && r_type == R_XTENSA_PLT)
2799 srel = htab->srelplt;
2801 srel = htab->srelgot;
2803 BFD_ASSERT (srel != NULL);
2806 _bfd_elf_section_offset (output_bfd, info,
2807 input_section, rel->r_offset);
2809 if ((outrel.r_offset | 1) == (bfd_vma) -1)
2810 memset (&outrel, 0, sizeof outrel);
2813 outrel.r_offset += (input_section->output_section->vma
2814 + input_section->output_offset);
2816 /* Complain if the relocation is in a read-only section
2817 and not in a literal pool. */
2818 if ((input_section->flags & SEC_READONLY) != 0
2819 && !elf_xtensa_in_literal_pool (lit_table, ltblsize,
2823 _("dynamic relocation in read-only section");
2824 if (!((*info->callbacks->reloc_dangerous)
2825 (info, error_message, input_bfd, input_section,
2832 outrel.r_addend = rel->r_addend;
2835 if (r_type == R_XTENSA_32)
2838 ELF32_R_INFO (h->dynindx, R_XTENSA_GLOB_DAT);
2841 else /* r_type == R_XTENSA_PLT */
2844 ELF32_R_INFO (h->dynindx, R_XTENSA_JMP_SLOT);
2846 /* Create the PLT entry and set the initial
2847 contents of the literal entry to the address of
2850 elf_xtensa_create_plt_entry (info, output_bfd,
2853 unresolved_reloc = FALSE;
2857 /* Generate a RELATIVE relocation. */
2858 outrel.r_info = ELF32_R_INFO (0, R_XTENSA_RELATIVE);
2859 outrel.r_addend = 0;
2863 loc = (srel->contents
2864 + srel->reloc_count++ * sizeof (Elf32_External_Rela));
2865 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2866 BFD_ASSERT (sizeof (Elf32_External_Rela) * srel->reloc_count
2869 else if (r_type == R_XTENSA_ASM_EXPAND && dynamic_symbol)
2871 /* This should only happen for non-PIC code, which is not
2872 supposed to be used on systems with dynamic linking.
2873 Just ignore these relocations. */
2878 case R_XTENSA_TLS_TPOFF:
2879 /* Switch to LE model for local symbols in an executable. */
2880 if (! info->shared && ! dynamic_symbol)
2882 relocation = tpoff (info, relocation);
2887 case R_XTENSA_TLSDESC_FN:
2888 case R_XTENSA_TLSDESC_ARG:
2890 if (r_type == R_XTENSA_TLSDESC_FN)
2892 if (! info->shared || (tls_type & GOT_TLS_IE) != 0)
2893 r_type = R_XTENSA_NONE;
2895 else if (r_type == R_XTENSA_TLSDESC_ARG)
2899 if ((tls_type & GOT_TLS_IE) != 0)
2900 r_type = R_XTENSA_TLS_TPOFF;
2904 r_type = R_XTENSA_TLS_TPOFF;
2905 if (! dynamic_symbol)
2907 relocation = tpoff (info, relocation);
2913 if (r_type == R_XTENSA_NONE)
2914 /* Nothing to do here; skip to the next reloc. */
2917 if (! elf_hash_table (info)->dynamic_sections_created)
2920 _("TLS relocation invalid without dynamic sections");
2921 if (!((*info->callbacks->reloc_dangerous)
2922 (info, error_message, input_bfd, input_section,
2928 Elf_Internal_Rela outrel;
2930 asection *srel = htab->srelgot;
2933 outrel.r_offset = (input_section->output_section->vma
2934 + input_section->output_offset
2937 /* Complain if the relocation is in a read-only section
2938 and not in a literal pool. */
2939 if ((input_section->flags & SEC_READONLY) != 0
2940 && ! elf_xtensa_in_literal_pool (lit_table, ltblsize,
2944 _("dynamic relocation in read-only section");
2945 if (!((*info->callbacks->reloc_dangerous)
2946 (info, error_message, input_bfd, input_section,
2951 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2953 outrel.r_addend = relocation - dtpoff_base (info);
2955 outrel.r_addend = 0;
2958 outrel.r_info = ELF32_R_INFO (indx, r_type);
2960 unresolved_reloc = FALSE;
2963 loc = (srel->contents
2964 + srel->reloc_count++ * sizeof (Elf32_External_Rela));
2965 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2966 BFD_ASSERT (sizeof (Elf32_External_Rela) * srel->reloc_count
2972 case R_XTENSA_TLS_DTPOFF:
2974 /* Switch from LD model to LE model. */
2975 relocation = tpoff (info, relocation);
2977 relocation -= dtpoff_base (info);
2980 case R_XTENSA_TLS_FUNC:
2981 case R_XTENSA_TLS_ARG:
2982 case R_XTENSA_TLS_CALL:
2983 /* Check if optimizing to IE or LE model. */
2984 if ((tls_type & GOT_TLS_IE) != 0)
2986 bfd_boolean is_ld_model =
2987 (h && elf_xtensa_hash_entry (h) == htab->tlsbase);
2988 if (! replace_tls_insn (rel, input_bfd, input_section, contents,
2989 is_ld_model, &error_message))
2991 if (!((*info->callbacks->reloc_dangerous)
2992 (info, error_message, input_bfd, input_section,
2997 if (r_type != R_XTENSA_TLS_ARG || is_ld_model)
2999 /* Skip subsequent relocations on the same instruction. */
3000 while (rel + 1 < relend && rel[1].r_offset == rel->r_offset)
3007 if (elf_hash_table (info)->dynamic_sections_created
3008 && dynamic_symbol && (is_operand_relocation (r_type)
3009 || r_type == R_XTENSA_32_PCREL))
3012 vsprint_msg ("invalid relocation for dynamic symbol", ": %s",
3013 strlen (name) + 2, name);
3014 if (!((*info->callbacks->reloc_dangerous)
3015 (info, error_message, input_bfd, input_section,
3023 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3024 because such sections are not SEC_ALLOC and thus ld.so will
3025 not process them. */
3026 if (unresolved_reloc
3027 && !((input_section->flags & SEC_DEBUGGING) != 0
3030 (*_bfd_error_handler)
3031 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
3034 (long) rel->r_offset,
3040 /* TLS optimizations may have changed r_type; update "howto". */
3041 howto = &elf_howto_table[r_type];
3043 /* There's no point in calling bfd_perform_relocation here.
3044 Just go directly to our "special function". */
3045 r = elf_xtensa_do_reloc (howto, input_bfd, input_section,
3046 relocation + rel->r_addend,
3047 contents, rel->r_offset, is_weak_undef,
3050 if (r != bfd_reloc_ok && !warned)
3052 BFD_ASSERT (r == bfd_reloc_dangerous || r == bfd_reloc_other);
3053 BFD_ASSERT (error_message != NULL);
3055 if (rel->r_addend == 0)
3056 error_message = vsprint_msg (error_message, ": %s",
3057 strlen (name) + 2, name);
3059 error_message = vsprint_msg (error_message, ": (%s+0x%x)",
3061 name, (int) rel->r_addend);
3063 if (!((*info->callbacks->reloc_dangerous)
3064 (info, error_message, input_bfd, input_section,
3073 input_section->reloc_done = TRUE;
3079 /* Finish up dynamic symbol handling. There's not much to do here since
3080 the PLT and GOT entries are all set up by relocate_section. */
3083 elf_xtensa_finish_dynamic_symbol (bfd *output_bfd ATTRIBUTE_UNUSED,
3084 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3085 struct elf_link_hash_entry *h,
3086 Elf_Internal_Sym *sym)
3088 if (h->needs_plt && !h->def_regular)
3090 /* Mark the symbol as undefined, rather than as defined in
3091 the .plt section. Leave the value alone. */
3092 sym->st_shndx = SHN_UNDEF;
3093 /* If the symbol is weak, we do need to clear the value.
3094 Otherwise, the PLT entry would provide a definition for
3095 the symbol even if the symbol wasn't defined anywhere,
3096 and so the symbol would never be NULL. */
3097 if (!h->ref_regular_nonweak)
3101 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3102 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
3103 || h == elf_hash_table (info)->hgot)
3104 sym->st_shndx = SHN_ABS;
3110 /* Combine adjacent literal table entries in the output. Adjacent
3111 entries within each input section may have been removed during
3112 relaxation, but we repeat the process here, even though it's too late
3113 to shrink the output section, because it's important to minimize the
3114 number of literal table entries to reduce the start-up work for the
3115 runtime linker. Returns the number of remaining table entries or -1
3119 elf_xtensa_combine_prop_entries (bfd *output_bfd,
3124 property_table_entry *table;
3125 bfd_size_type section_size, sgotloc_size;
3129 section_size = sxtlit->size;
3130 BFD_ASSERT (section_size % 8 == 0);
3131 num = section_size / 8;
3133 sgotloc_size = sgotloc->size;
3134 if (sgotloc_size != section_size)
3136 (*_bfd_error_handler)
3137 (_("internal inconsistency in size of .got.loc section"));
3141 table = bfd_malloc (num * sizeof (property_table_entry));
3145 /* The ".xt.lit.plt" section has the SEC_IN_MEMORY flag set and this
3146 propagates to the output section, where it doesn't really apply and
3147 where it breaks the following call to bfd_malloc_and_get_section. */
3148 sxtlit->flags &= ~SEC_IN_MEMORY;
3150 if (!bfd_malloc_and_get_section (output_bfd, sxtlit, &contents))
3158 /* There should never be any relocations left at this point, so this
3159 is quite a bit easier than what is done during relaxation. */
3161 /* Copy the raw contents into a property table array and sort it. */
3163 for (n = 0; n < num; n++)
3165 table[n].address = bfd_get_32 (output_bfd, &contents[offset]);
3166 table[n].size = bfd_get_32 (output_bfd, &contents[offset + 4]);
3169 qsort (table, num, sizeof (property_table_entry), property_table_compare);
3171 for (n = 0; n < num; n++)
3173 bfd_boolean remove = FALSE;
3175 if (table[n].size == 0)
3178 (table[n-1].address + table[n-1].size == table[n].address))
3180 table[n-1].size += table[n].size;
3186 for (m = n; m < num - 1; m++)
3188 table[m].address = table[m+1].address;
3189 table[m].size = table[m+1].size;
3197 /* Copy the data back to the raw contents. */
3199 for (n = 0; n < num; n++)
3201 bfd_put_32 (output_bfd, table[n].address, &contents[offset]);
3202 bfd_put_32 (output_bfd, table[n].size, &contents[offset + 4]);
3206 /* Clear the removed bytes. */
3207 if ((bfd_size_type) (num * 8) < section_size)
3208 memset (&contents[num * 8], 0, section_size - num * 8);
3210 if (! bfd_set_section_contents (output_bfd, sxtlit, contents, 0,
3214 /* Copy the contents to ".got.loc". */
3215 memcpy (sgotloc->contents, contents, section_size);
3223 /* Finish up the dynamic sections. */
3226 elf_xtensa_finish_dynamic_sections (bfd *output_bfd,
3227 struct bfd_link_info *info)
3229 struct elf_xtensa_link_hash_table *htab;
3231 asection *sdyn, *srelplt, *sgot, *sxtlit, *sgotloc;
3232 Elf32_External_Dyn *dyncon, *dynconend;
3233 int num_xtlit_entries = 0;
3235 if (! elf_hash_table (info)->dynamic_sections_created)
3238 htab = elf_xtensa_hash_table (info);
3239 dynobj = elf_hash_table (info)->dynobj;
3240 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3241 BFD_ASSERT (sdyn != NULL);
3243 /* Set the first entry in the global offset table to the address of
3244 the dynamic section. */
3248 BFD_ASSERT (sgot->size == 4);
3250 bfd_put_32 (output_bfd, 0, sgot->contents);
3252 bfd_put_32 (output_bfd,
3253 sdyn->output_section->vma + sdyn->output_offset,
3257 srelplt = htab->srelplt;
3258 if (srelplt && srelplt->size != 0)
3260 asection *sgotplt, *srelgot, *spltlittbl;
3261 int chunk, plt_chunks, plt_entries;
3262 Elf_Internal_Rela irela;
3264 unsigned rtld_reloc;
3266 srelgot = htab->srelgot;
3267 spltlittbl = htab->spltlittbl;
3268 BFD_ASSERT (srelgot != NULL && spltlittbl != NULL);
3270 /* Find the first XTENSA_RTLD relocation. Presumably the rest
3271 of them follow immediately after.... */
3272 for (rtld_reloc = 0; rtld_reloc < srelgot->reloc_count; rtld_reloc++)
3274 loc = srelgot->contents + rtld_reloc * sizeof (Elf32_External_Rela);
3275 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3276 if (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD)
3279 BFD_ASSERT (rtld_reloc < srelgot->reloc_count);
3281 plt_entries = srelplt->size / sizeof (Elf32_External_Rela);
3283 (plt_entries + PLT_ENTRIES_PER_CHUNK - 1) / PLT_ENTRIES_PER_CHUNK;
3285 for (chunk = 0; chunk < plt_chunks; chunk++)
3287 int chunk_entries = 0;
3289 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
3290 BFD_ASSERT (sgotplt != NULL);
3292 /* Emit special RTLD relocations for the first two entries in
3293 each chunk of the .got.plt section. */
3295 loc = srelgot->contents + rtld_reloc * sizeof (Elf32_External_Rela);
3296 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3297 BFD_ASSERT (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD);
3298 irela.r_offset = (sgotplt->output_section->vma
3299 + sgotplt->output_offset);
3300 irela.r_addend = 1; /* tell rtld to set value to resolver function */
3301 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
3303 BFD_ASSERT (rtld_reloc <= srelgot->reloc_count);
3305 /* Next literal immediately follows the first. */
3306 loc += sizeof (Elf32_External_Rela);
3307 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3308 BFD_ASSERT (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD);
3309 irela.r_offset = (sgotplt->output_section->vma
3310 + sgotplt->output_offset + 4);
3311 /* Tell rtld to set value to object's link map. */
3313 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
3315 BFD_ASSERT (rtld_reloc <= srelgot->reloc_count);
3317 /* Fill in the literal table. */
3318 if (chunk < plt_chunks - 1)
3319 chunk_entries = PLT_ENTRIES_PER_CHUNK;
3321 chunk_entries = plt_entries - (chunk * PLT_ENTRIES_PER_CHUNK);
3323 BFD_ASSERT ((unsigned) (chunk + 1) * 8 <= spltlittbl->size);
3324 bfd_put_32 (output_bfd,
3325 sgotplt->output_section->vma + sgotplt->output_offset,
3326 spltlittbl->contents + (chunk * 8) + 0);
3327 bfd_put_32 (output_bfd,
3328 8 + (chunk_entries * 4),
3329 spltlittbl->contents + (chunk * 8) + 4);
3332 /* All the dynamic relocations have been emitted at this point.
3333 Make sure the relocation sections are the correct size. */
3334 if (srelgot->size != (sizeof (Elf32_External_Rela)
3335 * srelgot->reloc_count)
3336 || srelplt->size != (sizeof (Elf32_External_Rela)
3337 * srelplt->reloc_count))
3340 /* The .xt.lit.plt section has just been modified. This must
3341 happen before the code below which combines adjacent literal
3342 table entries, and the .xt.lit.plt contents have to be forced to
3344 if (! bfd_set_section_contents (output_bfd,
3345 spltlittbl->output_section,
3346 spltlittbl->contents,
3347 spltlittbl->output_offset,
3350 /* Clear SEC_HAS_CONTENTS so the contents won't be output again. */
3351 spltlittbl->flags &= ~SEC_HAS_CONTENTS;
3354 /* Combine adjacent literal table entries. */
3355 BFD_ASSERT (! info->relocatable);
3356 sxtlit = bfd_get_section_by_name (output_bfd, ".xt.lit");
3357 sgotloc = htab->sgotloc;
3358 BFD_ASSERT (sgotloc);
3362 elf_xtensa_combine_prop_entries (output_bfd, sxtlit, sgotloc);
3363 if (num_xtlit_entries < 0)
3367 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3368 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3369 for (; dyncon < dynconend; dyncon++)
3371 Elf_Internal_Dyn dyn;
3373 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3380 case DT_XTENSA_GOT_LOC_SZ:
3381 dyn.d_un.d_val = num_xtlit_entries;
3384 case DT_XTENSA_GOT_LOC_OFF:
3385 dyn.d_un.d_ptr = htab->sgotloc->output_section->vma;
3389 dyn.d_un.d_ptr = htab->sgot->output_section->vma;
3393 dyn.d_un.d_ptr = htab->srelplt->output_section->vma;
3397 dyn.d_un.d_val = htab->srelplt->output_section->size;
3401 /* Adjust RELASZ to not include JMPREL. This matches what
3402 glibc expects and what is done for several other ELF
3403 targets (e.g., i386, alpha), but the "correct" behavior
3404 seems to be unresolved. Since the linker script arranges
3405 for .rela.plt to follow all other relocation sections, we
3406 don't have to worry about changing the DT_RELA entry. */
3408 dyn.d_un.d_val -= htab->srelplt->output_section->size;
3412 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3419 /* Functions for dealing with the e_flags field. */
3421 /* Merge backend specific data from an object file to the output
3422 object file when linking. */
3425 elf_xtensa_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
3427 unsigned out_mach, in_mach;
3428 flagword out_flag, in_flag;
3430 /* Check if we have the same endianess. */
3431 if (!_bfd_generic_verify_endian_match (ibfd, obfd))
3434 /* Don't even pretend to support mixed-format linking. */
3435 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3436 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
3439 out_flag = elf_elfheader (obfd)->e_flags;
3440 in_flag = elf_elfheader (ibfd)->e_flags;
3442 out_mach = out_flag & EF_XTENSA_MACH;
3443 in_mach = in_flag & EF_XTENSA_MACH;
3444 if (out_mach != in_mach)
3446 (*_bfd_error_handler)
3447 (_("%B: incompatible machine type. Output is 0x%x. Input is 0x%x"),
3448 ibfd, out_mach, in_mach);
3449 bfd_set_error (bfd_error_wrong_format);
3453 if (! elf_flags_init (obfd))
3455 elf_flags_init (obfd) = TRUE;
3456 elf_elfheader (obfd)->e_flags = in_flag;
3458 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
3459 && bfd_get_arch_info (obfd)->the_default)
3460 return bfd_set_arch_mach (obfd, bfd_get_arch (ibfd),
3461 bfd_get_mach (ibfd));
3466 if ((out_flag & EF_XTENSA_XT_INSN) != (in_flag & EF_XTENSA_XT_INSN))
3467 elf_elfheader (obfd)->e_flags &= (~ EF_XTENSA_XT_INSN);
3469 if ((out_flag & EF_XTENSA_XT_LIT) != (in_flag & EF_XTENSA_XT_LIT))
3470 elf_elfheader (obfd)->e_flags &= (~ EF_XTENSA_XT_LIT);
3477 elf_xtensa_set_private_flags (bfd *abfd, flagword flags)
3479 BFD_ASSERT (!elf_flags_init (abfd)
3480 || elf_elfheader (abfd)->e_flags == flags);
3482 elf_elfheader (abfd)->e_flags |= flags;
3483 elf_flags_init (abfd) = TRUE;
3490 elf_xtensa_print_private_bfd_data (bfd *abfd, void *farg)
3492 FILE *f = (FILE *) farg;
3493 flagword e_flags = elf_elfheader (abfd)->e_flags;
3495 fprintf (f, "\nXtensa header:\n");
3496 if ((e_flags & EF_XTENSA_MACH) == E_XTENSA_MACH)
3497 fprintf (f, "\nMachine = Base\n");
3499 fprintf (f, "\nMachine Id = 0x%x\n", e_flags & EF_XTENSA_MACH);
3501 fprintf (f, "Insn tables = %s\n",
3502 (e_flags & EF_XTENSA_XT_INSN) ? "true" : "false");
3504 fprintf (f, "Literal tables = %s\n",
3505 (e_flags & EF_XTENSA_XT_LIT) ? "true" : "false");
3507 return _bfd_elf_print_private_bfd_data (abfd, farg);
3511 /* Set the right machine number for an Xtensa ELF file. */
3514 elf_xtensa_object_p (bfd *abfd)
3517 unsigned long arch = elf_elfheader (abfd)->e_flags & EF_XTENSA_MACH;
3522 mach = bfd_mach_xtensa;
3528 (void) bfd_default_set_arch_mach (abfd, bfd_arch_xtensa, mach);
3533 /* The final processing done just before writing out an Xtensa ELF object
3534 file. This gets the Xtensa architecture right based on the machine
3538 elf_xtensa_final_write_processing (bfd *abfd,
3539 bfd_boolean linker ATTRIBUTE_UNUSED)
3544 switch (mach = bfd_get_mach (abfd))
3546 case bfd_mach_xtensa:
3547 val = E_XTENSA_MACH;
3553 elf_elfheader (abfd)->e_flags &= (~ EF_XTENSA_MACH);
3554 elf_elfheader (abfd)->e_flags |= val;
3558 static enum elf_reloc_type_class
3559 elf_xtensa_reloc_type_class (const Elf_Internal_Rela *rela)
3561 switch ((int) ELF32_R_TYPE (rela->r_info))
3563 case R_XTENSA_RELATIVE:
3564 return reloc_class_relative;
3565 case R_XTENSA_JMP_SLOT:
3566 return reloc_class_plt;
3568 return reloc_class_normal;
3574 elf_xtensa_discard_info_for_section (bfd *abfd,
3575 struct elf_reloc_cookie *cookie,
3576 struct bfd_link_info *info,
3580 bfd_vma offset, actual_offset;
3581 bfd_size_type removed_bytes = 0;
3582 bfd_size_type entry_size;
3584 if (sec->output_section
3585 && bfd_is_abs_section (sec->output_section))
3588 if (xtensa_is_proptable_section (sec))
3593 if (sec->size == 0 || sec->size % entry_size != 0)
3596 contents = retrieve_contents (abfd, sec, info->keep_memory);
3600 cookie->rels = retrieve_internal_relocs (abfd, sec, info->keep_memory);
3603 release_contents (sec, contents);
3607 /* Sort the relocations. They should already be in order when
3608 relaxation is enabled, but it might not be. */
3609 qsort (cookie->rels, sec->reloc_count, sizeof (Elf_Internal_Rela),
3610 internal_reloc_compare);
3612 cookie->rel = cookie->rels;
3613 cookie->relend = cookie->rels + sec->reloc_count;
3615 for (offset = 0; offset < sec->size; offset += entry_size)
3617 actual_offset = offset - removed_bytes;
3619 /* The ...symbol_deleted_p function will skip over relocs but it
3620 won't adjust their offsets, so do that here. */
3621 while (cookie->rel < cookie->relend
3622 && cookie->rel->r_offset < offset)
3624 cookie->rel->r_offset -= removed_bytes;
3628 while (cookie->rel < cookie->relend
3629 && cookie->rel->r_offset == offset)
3631 if (bfd_elf_reloc_symbol_deleted_p (offset, cookie))
3633 /* Remove the table entry. (If the reloc type is NONE, then
3634 the entry has already been merged with another and deleted
3635 during relaxation.) */
3636 if (ELF32_R_TYPE (cookie->rel->r_info) != R_XTENSA_NONE)
3638 /* Shift the contents up. */
3639 if (offset + entry_size < sec->size)
3640 memmove (&contents[actual_offset],
3641 &contents[actual_offset + entry_size],
3642 sec->size - offset - entry_size);
3643 removed_bytes += entry_size;
3646 /* Remove this relocation. */
3647 cookie->rel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
3650 /* Adjust the relocation offset for previous removals. This
3651 should not be done before calling ...symbol_deleted_p
3652 because it might mess up the offset comparisons there.
3653 Make sure the offset doesn't underflow in the case where
3654 the first entry is removed. */
3655 if (cookie->rel->r_offset >= removed_bytes)
3656 cookie->rel->r_offset -= removed_bytes;
3658 cookie->rel->r_offset = 0;
3664 if (removed_bytes != 0)
3666 /* Adjust any remaining relocs (shouldn't be any). */
3667 for (; cookie->rel < cookie->relend; cookie->rel++)
3669 if (cookie->rel->r_offset >= removed_bytes)
3670 cookie->rel->r_offset -= removed_bytes;
3672 cookie->rel->r_offset = 0;
3675 /* Clear the removed bytes. */
3676 memset (&contents[sec->size - removed_bytes], 0, removed_bytes);
3678 pin_contents (sec, contents);
3679 pin_internal_relocs (sec, cookie->rels);
3682 if (sec->rawsize == 0)
3683 sec->rawsize = sec->size;
3684 sec->size -= removed_bytes;
3686 if (xtensa_is_littable_section (sec))
3688 asection *sgotloc = elf_xtensa_hash_table (info)->sgotloc;
3690 sgotloc->size -= removed_bytes;
3695 release_contents (sec, contents);
3696 release_internal_relocs (sec, cookie->rels);
3699 return (removed_bytes != 0);
3704 elf_xtensa_discard_info (bfd *abfd,
3705 struct elf_reloc_cookie *cookie,
3706 struct bfd_link_info *info)
3709 bfd_boolean changed = FALSE;
3711 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3713 if (xtensa_is_property_section (sec))
3715 if (elf_xtensa_discard_info_for_section (abfd, cookie, info, sec))
3725 elf_xtensa_ignore_discarded_relocs (asection *sec)
3727 return xtensa_is_property_section (sec);
3732 elf_xtensa_action_discarded (asection *sec)
3734 if (strcmp (".xt_except_table", sec->name) == 0)
3737 if (strcmp (".xt_except_desc", sec->name) == 0)
3740 return _bfd_elf_default_action_discarded (sec);
3744 /* Support for core dump NOTE sections. */
3747 elf_xtensa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3752 /* The size for Xtensa is variable, so don't try to recognize the format
3753 based on the size. Just assume this is GNU/Linux. */
3756 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
3759 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
3763 size = note->descsz - offset - 4;
3765 /* Make a ".reg/999" section. */
3766 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3767 size, note->descpos + offset);
3772 elf_xtensa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3774 switch (note->descsz)
3779 case 128: /* GNU/Linux elf_prpsinfo */
3780 elf_tdata (abfd)->core_program
3781 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
3782 elf_tdata (abfd)->core_command
3783 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
3786 /* Note that for some reason, a spurious space is tacked
3787 onto the end of the args in some (at least one anyway)
3788 implementations, so strip it off if it exists. */
3791 char *command = elf_tdata (abfd)->core_command;
3792 int n = strlen (command);
3794 if (0 < n && command[n - 1] == ' ')
3795 command[n - 1] = '\0';
3802 /* Generic Xtensa configurability stuff. */
3804 static xtensa_opcode callx0_op = XTENSA_UNDEFINED;
3805 static xtensa_opcode callx4_op = XTENSA_UNDEFINED;
3806 static xtensa_opcode callx8_op = XTENSA_UNDEFINED;
3807 static xtensa_opcode callx12_op = XTENSA_UNDEFINED;
3808 static xtensa_opcode call0_op = XTENSA_UNDEFINED;
3809 static xtensa_opcode call4_op = XTENSA_UNDEFINED;
3810 static xtensa_opcode call8_op = XTENSA_UNDEFINED;
3811 static xtensa_opcode call12_op = XTENSA_UNDEFINED;
3814 init_call_opcodes (void)
3816 if (callx0_op == XTENSA_UNDEFINED)
3818 callx0_op = xtensa_opcode_lookup (xtensa_default_isa, "callx0");
3819 callx4_op = xtensa_opcode_lookup (xtensa_default_isa, "callx4");
3820 callx8_op = xtensa_opcode_lookup (xtensa_default_isa, "callx8");
3821 callx12_op = xtensa_opcode_lookup (xtensa_default_isa, "callx12");
3822 call0_op = xtensa_opcode_lookup (xtensa_default_isa, "call0");
3823 call4_op = xtensa_opcode_lookup (xtensa_default_isa, "call4");
3824 call8_op = xtensa_opcode_lookup (xtensa_default_isa, "call8");
3825 call12_op = xtensa_opcode_lookup (xtensa_default_isa, "call12");
3831 is_indirect_call_opcode (xtensa_opcode opcode)
3833 init_call_opcodes ();
3834 return (opcode == callx0_op
3835 || opcode == callx4_op
3836 || opcode == callx8_op
3837 || opcode == callx12_op);
3842 is_direct_call_opcode (xtensa_opcode opcode)
3844 init_call_opcodes ();
3845 return (opcode == call0_op
3846 || opcode == call4_op
3847 || opcode == call8_op
3848 || opcode == call12_op);
3853 is_windowed_call_opcode (xtensa_opcode opcode)
3855 init_call_opcodes ();
3856 return (opcode == call4_op
3857 || opcode == call8_op
3858 || opcode == call12_op
3859 || opcode == callx4_op
3860 || opcode == callx8_op
3861 || opcode == callx12_op);
3866 get_indirect_call_dest_reg (xtensa_opcode opcode, unsigned *pdst)
3868 unsigned dst = (unsigned) -1;
3870 init_call_opcodes ();
3871 if (opcode == callx0_op)
3873 else if (opcode == callx4_op)
3875 else if (opcode == callx8_op)
3877 else if (opcode == callx12_op)
3880 if (dst == (unsigned) -1)
3888 static xtensa_opcode
3889 get_const16_opcode (void)
3891 static bfd_boolean done_lookup = FALSE;
3892 static xtensa_opcode const16_opcode = XTENSA_UNDEFINED;
3895 const16_opcode = xtensa_opcode_lookup (xtensa_default_isa, "const16");
3898 return const16_opcode;
3902 static xtensa_opcode
3903 get_l32r_opcode (void)
3905 static xtensa_opcode l32r_opcode = XTENSA_UNDEFINED;
3906 static bfd_boolean done_lookup = FALSE;
3910 l32r_opcode = xtensa_opcode_lookup (xtensa_default_isa, "l32r");
3918 l32r_offset (bfd_vma addr, bfd_vma pc)
3922 offset = addr - ((pc+3) & -4);
3923 BFD_ASSERT ((offset & ((1 << 2) - 1)) == 0);
3924 offset = (signed int) offset >> 2;
3925 BFD_ASSERT ((signed int) offset >> 16 == -1);
3931 get_relocation_opnd (xtensa_opcode opcode, int r_type)
3933 xtensa_isa isa = xtensa_default_isa;
3934 int last_immed, last_opnd, opi;
3936 if (opcode == XTENSA_UNDEFINED)
3937 return XTENSA_UNDEFINED;
3939 /* Find the last visible PC-relative immediate operand for the opcode.
3940 If there are no PC-relative immediates, then choose the last visible
3941 immediate; otherwise, fail and return XTENSA_UNDEFINED. */
3942 last_immed = XTENSA_UNDEFINED;
3943 last_opnd = xtensa_opcode_num_operands (isa, opcode);
3944 for (opi = last_opnd - 1; opi >= 0; opi--)
3946 if (xtensa_operand_is_visible (isa, opcode, opi) == 0)
3948 if (xtensa_operand_is_PCrelative (isa, opcode, opi) == 1)
3953 if (last_immed == XTENSA_UNDEFINED
3954 && xtensa_operand_is_register (isa, opcode, opi) == 0)
3958 return XTENSA_UNDEFINED;
3960 /* If the operand number was specified in an old-style relocation,
3961 check for consistency with the operand computed above. */
3962 if (r_type >= R_XTENSA_OP0 && r_type <= R_XTENSA_OP2)
3964 int reloc_opnd = r_type - R_XTENSA_OP0;
3965 if (reloc_opnd != last_immed)
3966 return XTENSA_UNDEFINED;
3974 get_relocation_slot (int r_type)
3984 if (r_type >= R_XTENSA_SLOT0_OP && r_type <= R_XTENSA_SLOT14_OP)
3985 return r_type - R_XTENSA_SLOT0_OP;
3986 if (r_type >= R_XTENSA_SLOT0_ALT && r_type <= R_XTENSA_SLOT14_ALT)
3987 return r_type - R_XTENSA_SLOT0_ALT;
3991 return XTENSA_UNDEFINED;
3995 /* Get the opcode for a relocation. */
3997 static xtensa_opcode
3998 get_relocation_opcode (bfd *abfd,
4001 Elf_Internal_Rela *irel)
4003 static xtensa_insnbuf ibuff = NULL;
4004 static xtensa_insnbuf sbuff = NULL;
4005 xtensa_isa isa = xtensa_default_isa;
4009 if (contents == NULL)
4010 return XTENSA_UNDEFINED;
4012 if (bfd_get_section_limit (abfd, sec) <= irel->r_offset)
4013 return XTENSA_UNDEFINED;
4017 ibuff = xtensa_insnbuf_alloc (isa);
4018 sbuff = xtensa_insnbuf_alloc (isa);
4021 /* Decode the instruction. */
4022 xtensa_insnbuf_from_chars (isa, ibuff, &contents[irel->r_offset],
4023 sec->size - irel->r_offset);
4024 fmt = xtensa_format_decode (isa, ibuff);
4025 slot = get_relocation_slot (ELF32_R_TYPE (irel->r_info));
4026 if (slot == XTENSA_UNDEFINED)
4027 return XTENSA_UNDEFINED;
4028 xtensa_format_get_slot (isa, fmt, slot, ibuff, sbuff);
4029 return xtensa_opcode_decode (isa, fmt, slot, sbuff);
4034 is_l32r_relocation (bfd *abfd,
4037 Elf_Internal_Rela *irel)
4039 xtensa_opcode opcode;
4040 if (!is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
4042 opcode = get_relocation_opcode (abfd, sec, contents, irel);
4043 return (opcode == get_l32r_opcode ());
4047 static bfd_size_type
4048 get_asm_simplify_size (bfd_byte *contents,
4049 bfd_size_type content_len,
4050 bfd_size_type offset)
4052 bfd_size_type insnlen, size = 0;
4054 /* Decode the size of the next two instructions. */
4055 insnlen = insn_decode_len (contents, content_len, offset);
4061 insnlen = insn_decode_len (contents, content_len, offset + size);
4071 is_alt_relocation (int r_type)
4073 return (r_type >= R_XTENSA_SLOT0_ALT
4074 && r_type <= R_XTENSA_SLOT14_ALT);
4079 is_operand_relocation (int r_type)
4089 if (r_type >= R_XTENSA_SLOT0_OP && r_type <= R_XTENSA_SLOT14_OP)
4091 if (r_type >= R_XTENSA_SLOT0_ALT && r_type <= R_XTENSA_SLOT14_ALT)
4100 #define MIN_INSN_LENGTH 2
4102 /* Return 0 if it fails to decode. */
4105 insn_decode_len (bfd_byte *contents,
4106 bfd_size_type content_len,
4107 bfd_size_type offset)
4110 xtensa_isa isa = xtensa_default_isa;
4112 static xtensa_insnbuf ibuff = NULL;
4114 if (offset + MIN_INSN_LENGTH > content_len)
4118 ibuff = xtensa_insnbuf_alloc (isa);
4119 xtensa_insnbuf_from_chars (isa, ibuff, &contents[offset],
4120 content_len - offset);
4121 fmt = xtensa_format_decode (isa, ibuff);
4122 if (fmt == XTENSA_UNDEFINED)
4124 insn_len = xtensa_format_length (isa, fmt);
4125 if (insn_len == XTENSA_UNDEFINED)
4131 /* Decode the opcode for a single slot instruction.
4132 Return 0 if it fails to decode or the instruction is multi-slot. */
4135 insn_decode_opcode (bfd_byte *contents,
4136 bfd_size_type content_len,
4137 bfd_size_type offset,
4140 xtensa_isa isa = xtensa_default_isa;
4142 static xtensa_insnbuf insnbuf = NULL;
4143 static xtensa_insnbuf slotbuf = NULL;
4145 if (offset + MIN_INSN_LENGTH > content_len)
4146 return XTENSA_UNDEFINED;
4148 if (insnbuf == NULL)
4150 insnbuf = xtensa_insnbuf_alloc (isa);
4151 slotbuf = xtensa_insnbuf_alloc (isa);
4154 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4155 content_len - offset);
4156 fmt = xtensa_format_decode (isa, insnbuf);
4157 if (fmt == XTENSA_UNDEFINED)
4158 return XTENSA_UNDEFINED;
4160 if (slot >= xtensa_format_num_slots (isa, fmt))
4161 return XTENSA_UNDEFINED;
4163 xtensa_format_get_slot (isa, fmt, slot, insnbuf, slotbuf);
4164 return xtensa_opcode_decode (isa, fmt, slot, slotbuf);
4168 /* The offset is the offset in the contents.
4169 The address is the address of that offset. */
4172 check_branch_target_aligned (bfd_byte *contents,
4173 bfd_size_type content_length,
4177 bfd_size_type insn_len = insn_decode_len (contents, content_length, offset);
4180 return check_branch_target_aligned_address (address, insn_len);
4185 check_loop_aligned (bfd_byte *contents,
4186 bfd_size_type content_length,
4190 bfd_size_type loop_len, insn_len;
4191 xtensa_opcode opcode;
4193 opcode = insn_decode_opcode (contents, content_length, offset, 0);
4194 if (opcode == XTENSA_UNDEFINED
4195 || xtensa_opcode_is_loop (xtensa_default_isa, opcode) != 1)
4201 loop_len = insn_decode_len (contents, content_length, offset);
4202 insn_len = insn_decode_len (contents, content_length, offset + loop_len);
4203 if (loop_len == 0 || insn_len == 0)
4209 return check_branch_target_aligned_address (address + loop_len, insn_len);
4214 check_branch_target_aligned_address (bfd_vma addr, int len)
4217 return (addr % 8 == 0);
4218 return ((addr >> 2) == ((addr + len - 1) >> 2));
4222 /* Instruction widening and narrowing. */
4224 /* When FLIX is available we need to access certain instructions only
4225 when they are 16-bit or 24-bit instructions. This table caches
4226 information about such instructions by walking through all the
4227 opcodes and finding the smallest single-slot format into which each
4230 static xtensa_format *op_single_fmt_table = NULL;
4234 init_op_single_format_table (void)
4236 xtensa_isa isa = xtensa_default_isa;
4237 xtensa_insnbuf ibuf;
4238 xtensa_opcode opcode;
4242 if (op_single_fmt_table)
4245 ibuf = xtensa_insnbuf_alloc (isa);
4246 num_opcodes = xtensa_isa_num_opcodes (isa);
4248 op_single_fmt_table = (xtensa_format *)
4249 bfd_malloc (sizeof (xtensa_format) * num_opcodes);
4250 for (opcode = 0; opcode < num_opcodes; opcode++)
4252 op_single_fmt_table[opcode] = XTENSA_UNDEFINED;
4253 for (fmt = 0; fmt < xtensa_isa_num_formats (isa); fmt++)
4255 if (xtensa_format_num_slots (isa, fmt) == 1
4256 && xtensa_opcode_encode (isa, fmt, 0, ibuf, opcode) == 0)
4258 xtensa_opcode old_fmt = op_single_fmt_table[opcode];
4259 int fmt_length = xtensa_format_length (isa, fmt);
4260 if (old_fmt == XTENSA_UNDEFINED
4261 || fmt_length < xtensa_format_length (isa, old_fmt))
4262 op_single_fmt_table[opcode] = fmt;
4266 xtensa_insnbuf_free (isa, ibuf);
4270 static xtensa_format
4271 get_single_format (xtensa_opcode opcode)
4273 init_op_single_format_table ();
4274 return op_single_fmt_table[opcode];
4278 /* For the set of narrowable instructions we do NOT include the
4279 narrowings beqz -> beqz.n or bnez -> bnez.n because of complexities
4280 involved during linker relaxation that may require these to
4281 re-expand in some conditions. Also, the narrowing "or" -> mov.n
4282 requires special case code to ensure it only works when op1 == op2. */
4290 struct string_pair narrowable[] =
4293 { "addi", "addi.n" },
4294 { "addmi", "addi.n" },
4295 { "l32i", "l32i.n" },
4296 { "movi", "movi.n" },
4298 { "retw", "retw.n" },
4299 { "s32i", "s32i.n" },
4300 { "or", "mov.n" } /* special case only when op1 == op2 */
4303 struct string_pair widenable[] =
4306 { "addi", "addi.n" },
4307 { "addmi", "addi.n" },
4308 { "beqz", "beqz.n" },
4309 { "bnez", "bnez.n" },
4310 { "l32i", "l32i.n" },
4311 { "movi", "movi.n" },
4313 { "retw", "retw.n" },
4314 { "s32i", "s32i.n" },
4315 { "or", "mov.n" } /* special case only when op1 == op2 */
4319 /* Check if an instruction can be "narrowed", i.e., changed from a standard
4320 3-byte instruction to a 2-byte "density" instruction. If it is valid,
4321 return the instruction buffer holding the narrow instruction. Otherwise,
4322 return 0. The set of valid narrowing are specified by a string table
4323 but require some special case operand checks in some cases. */
4325 static xtensa_insnbuf
4326 can_narrow_instruction (xtensa_insnbuf slotbuf,
4328 xtensa_opcode opcode)
4330 xtensa_isa isa = xtensa_default_isa;
4331 xtensa_format o_fmt;
4334 static xtensa_insnbuf o_insnbuf = NULL;
4335 static xtensa_insnbuf o_slotbuf = NULL;
4337 if (o_insnbuf == NULL)
4339 o_insnbuf = xtensa_insnbuf_alloc (isa);
4340 o_slotbuf = xtensa_insnbuf_alloc (isa);
4343 for (opi = 0; opi < (sizeof (narrowable)/sizeof (struct string_pair)); opi++)
4345 bfd_boolean is_or = (strcmp ("or", narrowable[opi].wide) == 0);
4347 if (opcode == xtensa_opcode_lookup (isa, narrowable[opi].wide))
4349 uint32 value, newval;
4350 int i, operand_count, o_operand_count;
4351 xtensa_opcode o_opcode;
4353 /* Address does not matter in this case. We might need to
4354 fix it to handle branches/jumps. */
4355 bfd_vma self_address = 0;
4357 o_opcode = xtensa_opcode_lookup (isa, narrowable[opi].narrow);
4358 if (o_opcode == XTENSA_UNDEFINED)
4360 o_fmt = get_single_format (o_opcode);
4361 if (o_fmt == XTENSA_UNDEFINED)
4364 if (xtensa_format_length (isa, fmt) != 3
4365 || xtensa_format_length (isa, o_fmt) != 2)
4368 xtensa_format_encode (isa, o_fmt, o_insnbuf);
4369 operand_count = xtensa_opcode_num_operands (isa, opcode);
4370 o_operand_count = xtensa_opcode_num_operands (isa, o_opcode);
4372 if (xtensa_opcode_encode (isa, o_fmt, 0, o_slotbuf, o_opcode) != 0)
4377 if (xtensa_opcode_num_operands (isa, o_opcode) != operand_count)
4382 uint32 rawval0, rawval1, rawval2;
4384 if (o_operand_count + 1 != operand_count
4385 || xtensa_operand_get_field (isa, opcode, 0,
4386 fmt, 0, slotbuf, &rawval0) != 0
4387 || xtensa_operand_get_field (isa, opcode, 1,
4388 fmt, 0, slotbuf, &rawval1) != 0
4389 || xtensa_operand_get_field (isa, opcode, 2,
4390 fmt, 0, slotbuf, &rawval2) != 0
4391 || rawval1 != rawval2
4392 || rawval0 == rawval1 /* it is a nop */)
4396 for (i = 0; i < o_operand_count; ++i)
4398 if (xtensa_operand_get_field (isa, opcode, i, fmt, 0,
4400 || xtensa_operand_decode (isa, opcode, i, &value))
4403 /* PC-relative branches need adjustment, but
4404 the PC-rel operand will always have a relocation. */
4406 if (xtensa_operand_do_reloc (isa, o_opcode, i, &newval,
4408 || xtensa_operand_encode (isa, o_opcode, i, &newval)
4409 || xtensa_operand_set_field (isa, o_opcode, i, o_fmt, 0,
4414 if (xtensa_format_set_slot (isa, o_fmt, 0, o_insnbuf, o_slotbuf))
4424 /* Attempt to narrow an instruction. If the narrowing is valid, perform
4425 the action in-place directly into the contents and return TRUE. Otherwise,
4426 the return value is FALSE and the contents are not modified. */
4429 narrow_instruction (bfd_byte *contents,
4430 bfd_size_type content_length,
4431 bfd_size_type offset)
4433 xtensa_opcode opcode;
4434 bfd_size_type insn_len;
4435 xtensa_isa isa = xtensa_default_isa;
4437 xtensa_insnbuf o_insnbuf;
4439 static xtensa_insnbuf insnbuf = NULL;
4440 static xtensa_insnbuf slotbuf = NULL;
4442 if (insnbuf == NULL)
4444 insnbuf = xtensa_insnbuf_alloc (isa);
4445 slotbuf = xtensa_insnbuf_alloc (isa);
4448 BFD_ASSERT (offset < content_length);
4450 if (content_length < 2)
4453 /* We will hand-code a few of these for a little while.
4454 These have all been specified in the assembler aleady. */
4455 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4456 content_length - offset);
4457 fmt = xtensa_format_decode (isa, insnbuf);
4458 if (xtensa_format_num_slots (isa, fmt) != 1)
4461 if (xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf) != 0)
4464 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4465 if (opcode == XTENSA_UNDEFINED)
4467 insn_len = xtensa_format_length (isa, fmt);
4468 if (insn_len > content_length)
4471 o_insnbuf = can_narrow_instruction (slotbuf, fmt, opcode);
4474 xtensa_insnbuf_to_chars (isa, o_insnbuf, contents + offset,
4475 content_length - offset);
4483 /* Check if an instruction can be "widened", i.e., changed from a 2-byte
4484 "density" instruction to a standard 3-byte instruction. If it is valid,
4485 return the instruction buffer holding the wide instruction. Otherwise,
4486 return 0. The set of valid widenings are specified by a string table
4487 but require some special case operand checks in some cases. */
4489 static xtensa_insnbuf
4490 can_widen_instruction (xtensa_insnbuf slotbuf,
4492 xtensa_opcode opcode)
4494 xtensa_isa isa = xtensa_default_isa;
4495 xtensa_format o_fmt;
4498 static xtensa_insnbuf o_insnbuf = NULL;
4499 static xtensa_insnbuf o_slotbuf = NULL;
4501 if (o_insnbuf == NULL)
4503 o_insnbuf = xtensa_insnbuf_alloc (isa);
4504 o_slotbuf = xtensa_insnbuf_alloc (isa);
4507 for (opi = 0; opi < (sizeof (widenable)/sizeof (struct string_pair)); opi++)
4509 bfd_boolean is_or = (strcmp ("or", widenable[opi].wide) == 0);
4510 bfd_boolean is_branch = (strcmp ("beqz", widenable[opi].wide) == 0
4511 || strcmp ("bnez", widenable[opi].wide) == 0);
4513 if (opcode == xtensa_opcode_lookup (isa, widenable[opi].narrow))
4515 uint32 value, newval;
4516 int i, operand_count, o_operand_count, check_operand_count;
4517 xtensa_opcode o_opcode;
4519 /* Address does not matter in this case. We might need to fix it
4520 to handle branches/jumps. */
4521 bfd_vma self_address = 0;
4523 o_opcode = xtensa_opcode_lookup (isa, widenable[opi].wide);
4524 if (o_opcode == XTENSA_UNDEFINED)
4526 o_fmt = get_single_format (o_opcode);
4527 if (o_fmt == XTENSA_UNDEFINED)
4530 if (xtensa_format_length (isa, fmt) != 2
4531 || xtensa_format_length (isa, o_fmt) != 3)
4534 xtensa_format_encode (isa, o_fmt, o_insnbuf);
4535 operand_count = xtensa_opcode_num_operands (isa, opcode);
4536 o_operand_count = xtensa_opcode_num_operands (isa, o_opcode);
4537 check_operand_count = o_operand_count;
4539 if (xtensa_opcode_encode (isa, o_fmt, 0, o_slotbuf, o_opcode) != 0)
4544 if (xtensa_opcode_num_operands (isa, o_opcode) != operand_count)
4549 uint32 rawval0, rawval1;
4551 if (o_operand_count != operand_count + 1
4552 || xtensa_operand_get_field (isa, opcode, 0,
4553 fmt, 0, slotbuf, &rawval0) != 0
4554 || xtensa_operand_get_field (isa, opcode, 1,
4555 fmt, 0, slotbuf, &rawval1) != 0
4556 || rawval0 == rawval1 /* it is a nop */)
4560 check_operand_count--;
4562 for (i = 0; i < check_operand_count; i++)
4565 if (is_or && i == o_operand_count - 1)
4567 if (xtensa_operand_get_field (isa, opcode, new_i, fmt, 0,
4569 || xtensa_operand_decode (isa, opcode, new_i, &value))
4572 /* PC-relative branches need adjustment, but
4573 the PC-rel operand will always have a relocation. */
4575 if (xtensa_operand_do_reloc (isa, o_opcode, i, &newval,
4577 || xtensa_operand_encode (isa, o_opcode, i, &newval)
4578 || xtensa_operand_set_field (isa, o_opcode, i, o_fmt, 0,
4583 if (xtensa_format_set_slot (isa, o_fmt, 0, o_insnbuf, o_slotbuf))
4593 /* Attempt to widen an instruction. If the widening is valid, perform
4594 the action in-place directly into the contents and return TRUE. Otherwise,
4595 the return value is FALSE and the contents are not modified. */
4598 widen_instruction (bfd_byte *contents,
4599 bfd_size_type content_length,
4600 bfd_size_type offset)
4602 xtensa_opcode opcode;
4603 bfd_size_type insn_len;
4604 xtensa_isa isa = xtensa_default_isa;
4606 xtensa_insnbuf o_insnbuf;
4608 static xtensa_insnbuf insnbuf = NULL;
4609 static xtensa_insnbuf slotbuf = NULL;
4611 if (insnbuf == NULL)
4613 insnbuf = xtensa_insnbuf_alloc (isa);
4614 slotbuf = xtensa_insnbuf_alloc (isa);
4617 BFD_ASSERT (offset < content_length);
4619 if (content_length < 2)
4622 /* We will hand-code a few of these for a little while.
4623 These have all been specified in the assembler aleady. */
4624 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4625 content_length - offset);
4626 fmt = xtensa_format_decode (isa, insnbuf);
4627 if (xtensa_format_num_slots (isa, fmt) != 1)
4630 if (xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf) != 0)
4633 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4634 if (opcode == XTENSA_UNDEFINED)
4636 insn_len = xtensa_format_length (isa, fmt);
4637 if (insn_len > content_length)
4640 o_insnbuf = can_widen_instruction (slotbuf, fmt, opcode);
4643 xtensa_insnbuf_to_chars (isa, o_insnbuf, contents + offset,
4644 content_length - offset);
4651 /* Code for transforming CALLs at link-time. */
4653 static bfd_reloc_status_type
4654 elf_xtensa_do_asm_simplify (bfd_byte *contents,
4656 bfd_vma content_length,
4657 char **error_message)
4659 static xtensa_insnbuf insnbuf = NULL;
4660 static xtensa_insnbuf slotbuf = NULL;
4661 xtensa_format core_format = XTENSA_UNDEFINED;
4662 xtensa_opcode opcode;
4663 xtensa_opcode direct_call_opcode;
4664 xtensa_isa isa = xtensa_default_isa;
4665 bfd_byte *chbuf = contents + address;
4668 if (insnbuf == NULL)
4670 insnbuf = xtensa_insnbuf_alloc (isa);
4671 slotbuf = xtensa_insnbuf_alloc (isa);
4674 if (content_length < address)
4676 *error_message = _("Attempt to convert L32R/CALLX to CALL failed");
4677 return bfd_reloc_other;
4680 opcode = get_expanded_call_opcode (chbuf, content_length - address, 0);
4681 direct_call_opcode = swap_callx_for_call_opcode (opcode);
4682 if (direct_call_opcode == XTENSA_UNDEFINED)
4684 *error_message = _("Attempt to convert L32R/CALLX to CALL failed");
4685 return bfd_reloc_other;
4688 /* Assemble a NOP ("or a1, a1, a1") into the 0 byte offset. */
4689 core_format = xtensa_format_lookup (isa, "x24");
4690 opcode = xtensa_opcode_lookup (isa, "or");
4691 xtensa_opcode_encode (isa, core_format, 0, slotbuf, opcode);
4692 for (opn = 0; opn < 3; opn++)
4695 xtensa_operand_encode (isa, opcode, opn, ®no);
4696 xtensa_operand_set_field (isa, opcode, opn, core_format, 0,
4699 xtensa_format_encode (isa, core_format, insnbuf);
4700 xtensa_format_set_slot (isa, core_format, 0, insnbuf, slotbuf);
4701 xtensa_insnbuf_to_chars (isa, insnbuf, chbuf, content_length - address);
4703 /* Assemble a CALL ("callN 0") into the 3 byte offset. */
4704 xtensa_opcode_encode (isa, core_format, 0, slotbuf, direct_call_opcode);
4705 xtensa_operand_set_field (isa, opcode, 0, core_format, 0, slotbuf, 0);
4707 xtensa_format_encode (isa, core_format, insnbuf);
4708 xtensa_format_set_slot (isa, core_format, 0, insnbuf, slotbuf);
4709 xtensa_insnbuf_to_chars (isa, insnbuf, chbuf + 3,
4710 content_length - address - 3);
4712 return bfd_reloc_ok;
4716 static bfd_reloc_status_type
4717 contract_asm_expansion (bfd_byte *contents,
4718 bfd_vma content_length,
4719 Elf_Internal_Rela *irel,
4720 char **error_message)
4722 bfd_reloc_status_type retval =
4723 elf_xtensa_do_asm_simplify (contents, irel->r_offset, content_length,
4726 if (retval != bfd_reloc_ok)
4727 return bfd_reloc_dangerous;
4729 /* Update the irel->r_offset field so that the right immediate and
4730 the right instruction are modified during the relocation. */
4731 irel->r_offset += 3;
4732 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info), R_XTENSA_SLOT0_OP);
4733 return bfd_reloc_ok;
4737 static xtensa_opcode
4738 swap_callx_for_call_opcode (xtensa_opcode opcode)
4740 init_call_opcodes ();
4742 if (opcode == callx0_op) return call0_op;
4743 if (opcode == callx4_op) return call4_op;
4744 if (opcode == callx8_op) return call8_op;
4745 if (opcode == callx12_op) return call12_op;
4747 /* Return XTENSA_UNDEFINED if the opcode is not an indirect call. */
4748 return XTENSA_UNDEFINED;
4752 /* Check if "buf" is pointing to a "L32R aN; CALLX aN" or "CONST16 aN;
4753 CONST16 aN; CALLX aN" sequence, and if so, return the CALLX opcode.
4754 If not, return XTENSA_UNDEFINED. */
4756 #define L32R_TARGET_REG_OPERAND 0
4757 #define CONST16_TARGET_REG_OPERAND 0
4758 #define CALLN_SOURCE_OPERAND 0
4760 static xtensa_opcode
4761 get_expanded_call_opcode (bfd_byte *buf, int bufsize, bfd_boolean *p_uses_l32r)
4763 static xtensa_insnbuf insnbuf = NULL;
4764 static xtensa_insnbuf slotbuf = NULL;
4766 xtensa_opcode opcode;
4767 xtensa_isa isa = xtensa_default_isa;
4768 uint32 regno, const16_regno, call_regno;
4771 if (insnbuf == NULL)
4773 insnbuf = xtensa_insnbuf_alloc (isa);
4774 slotbuf = xtensa_insnbuf_alloc (isa);
4777 xtensa_insnbuf_from_chars (isa, insnbuf, buf, bufsize);
4778 fmt = xtensa_format_decode (isa, insnbuf);
4779 if (fmt == XTENSA_UNDEFINED
4780 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4781 return XTENSA_UNDEFINED;
4783 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4784 if (opcode == XTENSA_UNDEFINED)
4785 return XTENSA_UNDEFINED;
4787 if (opcode == get_l32r_opcode ())
4790 *p_uses_l32r = TRUE;
4791 if (xtensa_operand_get_field (isa, opcode, L32R_TARGET_REG_OPERAND,
4792 fmt, 0, slotbuf, ®no)
4793 || xtensa_operand_decode (isa, opcode, L32R_TARGET_REG_OPERAND,
4795 return XTENSA_UNDEFINED;
4797 else if (opcode == get_const16_opcode ())
4800 *p_uses_l32r = FALSE;
4801 if (xtensa_operand_get_field (isa, opcode, CONST16_TARGET_REG_OPERAND,
4802 fmt, 0, slotbuf, ®no)
4803 || xtensa_operand_decode (isa, opcode, CONST16_TARGET_REG_OPERAND,
4805 return XTENSA_UNDEFINED;
4807 /* Check that the next instruction is also CONST16. */
4808 offset += xtensa_format_length (isa, fmt);
4809 xtensa_insnbuf_from_chars (isa, insnbuf, buf + offset, bufsize - offset);
4810 fmt = xtensa_format_decode (isa, insnbuf);
4811 if (fmt == XTENSA_UNDEFINED
4812 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4813 return XTENSA_UNDEFINED;
4814 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4815 if (opcode != get_const16_opcode ())
4816 return XTENSA_UNDEFINED;
4818 if (xtensa_operand_get_field (isa, opcode, CONST16_TARGET_REG_OPERAND,
4819 fmt, 0, slotbuf, &const16_regno)
4820 || xtensa_operand_decode (isa, opcode, CONST16_TARGET_REG_OPERAND,
4822 || const16_regno != regno)
4823 return XTENSA_UNDEFINED;
4826 return XTENSA_UNDEFINED;
4828 /* Next instruction should be an CALLXn with operand 0 == regno. */
4829 offset += xtensa_format_length (isa, fmt);
4830 xtensa_insnbuf_from_chars (isa, insnbuf, buf + offset, bufsize - offset);
4831 fmt = xtensa_format_decode (isa, insnbuf);
4832 if (fmt == XTENSA_UNDEFINED
4833 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4834 return XTENSA_UNDEFINED;
4835 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4836 if (opcode == XTENSA_UNDEFINED
4837 || !is_indirect_call_opcode (opcode))
4838 return XTENSA_UNDEFINED;
4840 if (xtensa_operand_get_field (isa, opcode, CALLN_SOURCE_OPERAND,
4841 fmt, 0, slotbuf, &call_regno)
4842 || xtensa_operand_decode (isa, opcode, CALLN_SOURCE_OPERAND,
4844 return XTENSA_UNDEFINED;
4846 if (call_regno != regno)
4847 return XTENSA_UNDEFINED;
4853 /* Data structures used during relaxation. */
4855 /* r_reloc: relocation values. */
4857 /* Through the relaxation process, we need to keep track of the values
4858 that will result from evaluating relocations. The standard ELF
4859 relocation structure is not sufficient for this purpose because we're
4860 operating on multiple input files at once, so we need to know which
4861 input file a relocation refers to. The r_reloc structure thus
4862 records both the input file (bfd) and ELF relocation.
4864 For efficiency, an r_reloc also contains a "target_offset" field to
4865 cache the target-section-relative offset value that is represented by
4868 The r_reloc also contains a virtual offset that allows multiple
4869 inserted literals to be placed at the same "address" with
4870 different offsets. */
4872 typedef struct r_reloc_struct r_reloc;
4874 struct r_reloc_struct
4877 Elf_Internal_Rela rela;
4878 bfd_vma target_offset;
4879 bfd_vma virtual_offset;
4883 /* The r_reloc structure is included by value in literal_value, but not
4884 every literal_value has an associated relocation -- some are simple
4885 constants. In such cases, we set all the fields in the r_reloc
4886 struct to zero. The r_reloc_is_const function should be used to
4887 detect this case. */
4890 r_reloc_is_const (const r_reloc *r_rel)
4892 return (r_rel->abfd == NULL);
4897 r_reloc_get_target_offset (const r_reloc *r_rel)
4899 bfd_vma target_offset;
4900 unsigned long r_symndx;
4902 BFD_ASSERT (!r_reloc_is_const (r_rel));
4903 r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4904 target_offset = get_elf_r_symndx_offset (r_rel->abfd, r_symndx);
4905 return (target_offset + r_rel->rela.r_addend);
4909 static struct elf_link_hash_entry *
4910 r_reloc_get_hash_entry (const r_reloc *r_rel)
4912 unsigned long r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4913 return get_elf_r_symndx_hash_entry (r_rel->abfd, r_symndx);
4918 r_reloc_get_section (const r_reloc *r_rel)
4920 unsigned long r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4921 return get_elf_r_symndx_section (r_rel->abfd, r_symndx);
4926 r_reloc_is_defined (const r_reloc *r_rel)
4932 sec = r_reloc_get_section (r_rel);
4933 if (sec == bfd_abs_section_ptr
4934 || sec == bfd_com_section_ptr
4935 || sec == bfd_und_section_ptr)
4942 r_reloc_init (r_reloc *r_rel,
4944 Elf_Internal_Rela *irel,
4946 bfd_size_type content_length)
4949 reloc_howto_type *howto;
4953 r_rel->rela = *irel;
4955 r_rel->target_offset = r_reloc_get_target_offset (r_rel);
4956 r_rel->virtual_offset = 0;
4957 r_type = ELF32_R_TYPE (r_rel->rela.r_info);
4958 howto = &elf_howto_table[r_type];
4959 if (howto->partial_inplace)
4961 bfd_vma inplace_val;
4962 BFD_ASSERT (r_rel->rela.r_offset < content_length);
4964 inplace_val = bfd_get_32 (abfd, &contents[r_rel->rela.r_offset]);
4965 r_rel->target_offset += inplace_val;
4969 memset (r_rel, 0, sizeof (r_reloc));
4976 print_r_reloc (FILE *fp, const r_reloc *r_rel)
4978 if (r_reloc_is_defined (r_rel))
4980 asection *sec = r_reloc_get_section (r_rel);
4981 fprintf (fp, " %s(%s + ", sec->owner->filename, sec->name);
4983 else if (r_reloc_get_hash_entry (r_rel))
4984 fprintf (fp, " %s + ", r_reloc_get_hash_entry (r_rel)->root.root.string);
4986 fprintf (fp, " ?? + ");
4988 fprintf_vma (fp, r_rel->target_offset);
4989 if (r_rel->virtual_offset)
4991 fprintf (fp, " + ");
4992 fprintf_vma (fp, r_rel->virtual_offset);
5001 /* source_reloc: relocations that reference literals. */
5003 /* To determine whether literals can be coalesced, we need to first
5004 record all the relocations that reference the literals. The
5005 source_reloc structure below is used for this purpose. The
5006 source_reloc entries are kept in a per-literal-section array, sorted
5007 by offset within the literal section (i.e., target offset).
5009 The source_sec and r_rel.rela.r_offset fields identify the source of
5010 the relocation. The r_rel field records the relocation value, i.e.,
5011 the offset of the literal being referenced. The opnd field is needed
5012 to determine the range of the immediate field to which the relocation
5013 applies, so we can determine whether another literal with the same
5014 value is within range. The is_null field is true when the relocation
5015 is being removed (e.g., when an L32R is being removed due to a CALLX
5016 that is converted to a direct CALL). */
5018 typedef struct source_reloc_struct source_reloc;
5020 struct source_reloc_struct
5022 asection *source_sec;
5024 xtensa_opcode opcode;
5026 bfd_boolean is_null;
5027 bfd_boolean is_abs_literal;
5032 init_source_reloc (source_reloc *reloc,
5033 asection *source_sec,
5034 const r_reloc *r_rel,
5035 xtensa_opcode opcode,
5037 bfd_boolean is_abs_literal)
5039 reloc->source_sec = source_sec;
5040 reloc->r_rel = *r_rel;
5041 reloc->opcode = opcode;
5043 reloc->is_null = FALSE;
5044 reloc->is_abs_literal = is_abs_literal;
5048 /* Find the source_reloc for a particular source offset and relocation
5049 type. Note that the array is sorted by _target_ offset, so this is
5050 just a linear search. */
5052 static source_reloc *
5053 find_source_reloc (source_reloc *src_relocs,
5056 Elf_Internal_Rela *irel)
5060 for (i = 0; i < src_count; i++)
5062 if (src_relocs[i].source_sec == sec
5063 && src_relocs[i].r_rel.rela.r_offset == irel->r_offset
5064 && (ELF32_R_TYPE (src_relocs[i].r_rel.rela.r_info)
5065 == ELF32_R_TYPE (irel->r_info)))
5066 return &src_relocs[i];
5074 source_reloc_compare (const void *ap, const void *bp)
5076 const source_reloc *a = (const source_reloc *) ap;
5077 const source_reloc *b = (const source_reloc *) bp;
5079 if (a->r_rel.target_offset != b->r_rel.target_offset)
5080 return (a->r_rel.target_offset - b->r_rel.target_offset);
5082 /* We don't need to sort on these criteria for correctness,
5083 but enforcing a more strict ordering prevents unstable qsort
5084 from behaving differently with different implementations.
5085 Without the code below we get correct but different results
5086 on Solaris 2.7 and 2.8. We would like to always produce the
5087 same results no matter the host. */
5089 if ((!a->is_null) - (!b->is_null))
5090 return ((!a->is_null) - (!b->is_null));
5091 return internal_reloc_compare (&a->r_rel.rela, &b->r_rel.rela);
5095 /* Literal values and value hash tables. */
5097 /* Literals with the same value can be coalesced. The literal_value
5098 structure records the value of a literal: the "r_rel" field holds the
5099 information from the relocation on the literal (if there is one) and
5100 the "value" field holds the contents of the literal word itself.
5102 The value_map structure records a literal value along with the
5103 location of a literal holding that value. The value_map hash table
5104 is indexed by the literal value, so that we can quickly check if a
5105 particular literal value has been seen before and is thus a candidate
5108 typedef struct literal_value_struct literal_value;
5109 typedef struct value_map_struct value_map;
5110 typedef struct value_map_hash_table_struct value_map_hash_table;
5112 struct literal_value_struct
5115 unsigned long value;
5116 bfd_boolean is_abs_literal;
5119 struct value_map_struct
5121 literal_value val; /* The literal value. */
5122 r_reloc loc; /* Location of the literal. */
5126 struct value_map_hash_table_struct
5128 unsigned bucket_count;
5129 value_map **buckets;
5131 bfd_boolean has_last_loc;
5137 init_literal_value (literal_value *lit,
5138 const r_reloc *r_rel,
5139 unsigned long value,
5140 bfd_boolean is_abs_literal)
5142 lit->r_rel = *r_rel;
5144 lit->is_abs_literal = is_abs_literal;
5149 literal_value_equal (const literal_value *src1,
5150 const literal_value *src2,
5151 bfd_boolean final_static_link)
5153 struct elf_link_hash_entry *h1, *h2;
5155 if (r_reloc_is_const (&src1->r_rel) != r_reloc_is_const (&src2->r_rel))
5158 if (r_reloc_is_const (&src1->r_rel))
5159 return (src1->value == src2->value);
5161 if (ELF32_R_TYPE (src1->r_rel.rela.r_info)
5162 != ELF32_R_TYPE (src2->r_rel.rela.r_info))
5165 if (src1->r_rel.target_offset != src2->r_rel.target_offset)
5168 if (src1->r_rel.virtual_offset != src2->r_rel.virtual_offset)
5171 if (src1->value != src2->value)
5174 /* Now check for the same section (if defined) or the same elf_hash
5175 (if undefined or weak). */
5176 h1 = r_reloc_get_hash_entry (&src1->r_rel);
5177 h2 = r_reloc_get_hash_entry (&src2->r_rel);
5178 if (r_reloc_is_defined (&src1->r_rel)
5179 && (final_static_link
5180 || ((!h1 || h1->root.type != bfd_link_hash_defweak)
5181 && (!h2 || h2->root.type != bfd_link_hash_defweak))))
5183 if (r_reloc_get_section (&src1->r_rel)
5184 != r_reloc_get_section (&src2->r_rel))
5189 /* Require that the hash entries (i.e., symbols) be identical. */
5190 if (h1 != h2 || h1 == 0)
5194 if (src1->is_abs_literal != src2->is_abs_literal)
5201 /* Must be power of 2. */
5202 #define INITIAL_HASH_RELOC_BUCKET_COUNT 1024
5204 static value_map_hash_table *
5205 value_map_hash_table_init (void)
5207 value_map_hash_table *values;
5209 values = (value_map_hash_table *)
5210 bfd_zmalloc (sizeof (value_map_hash_table));
5211 values->bucket_count = INITIAL_HASH_RELOC_BUCKET_COUNT;
5213 values->buckets = (value_map **)
5214 bfd_zmalloc (sizeof (value_map *) * values->bucket_count);
5215 if (values->buckets == NULL)
5220 values->has_last_loc = FALSE;
5227 value_map_hash_table_delete (value_map_hash_table *table)
5229 free (table->buckets);
5235 hash_bfd_vma (bfd_vma val)
5237 return (val >> 2) + (val >> 10);
5242 literal_value_hash (const literal_value *src)
5246 hash_val = hash_bfd_vma (src->value);
5247 if (!r_reloc_is_const (&src->r_rel))
5251 hash_val += hash_bfd_vma (src->is_abs_literal * 1000);
5252 hash_val += hash_bfd_vma (src->r_rel.target_offset);
5253 hash_val += hash_bfd_vma (src->r_rel.virtual_offset);
5255 /* Now check for the same section and the same elf_hash. */
5256 if (r_reloc_is_defined (&src->r_rel))
5257 sec_or_hash = r_reloc_get_section (&src->r_rel);
5259 sec_or_hash = r_reloc_get_hash_entry (&src->r_rel);
5260 hash_val += hash_bfd_vma ((bfd_vma) (size_t) sec_or_hash);
5266 /* Check if the specified literal_value has been seen before. */
5269 value_map_get_cached_value (value_map_hash_table *map,
5270 const literal_value *val,
5271 bfd_boolean final_static_link)
5277 idx = literal_value_hash (val);
5278 idx = idx & (map->bucket_count - 1);
5279 bucket = map->buckets[idx];
5280 for (map_e = bucket; map_e; map_e = map_e->next)
5282 if (literal_value_equal (&map_e->val, val, final_static_link))
5289 /* Record a new literal value. It is illegal to call this if VALUE
5290 already has an entry here. */
5293 add_value_map (value_map_hash_table *map,
5294 const literal_value *val,
5296 bfd_boolean final_static_link)
5298 value_map **bucket_p;
5301 value_map *val_e = (value_map *) bfd_zmalloc (sizeof (value_map));
5304 bfd_set_error (bfd_error_no_memory);
5308 BFD_ASSERT (!value_map_get_cached_value (map, val, final_static_link));
5312 idx = literal_value_hash (val);
5313 idx = idx & (map->bucket_count - 1);
5314 bucket_p = &map->buckets[idx];
5316 val_e->next = *bucket_p;
5319 /* FIXME: Consider resizing the hash table if we get too many entries. */
5325 /* Lists of text actions (ta_) for narrowing, widening, longcall
5326 conversion, space fill, code & literal removal, etc. */
5328 /* The following text actions are generated:
5330 "ta_remove_insn" remove an instruction or instructions
5331 "ta_remove_longcall" convert longcall to call
5332 "ta_convert_longcall" convert longcall to nop/call
5333 "ta_narrow_insn" narrow a wide instruction
5334 "ta_widen" widen a narrow instruction
5335 "ta_fill" add fill or remove fill
5336 removed < 0 is a fill; branches to the fill address will be
5337 changed to address + fill size (e.g., address - removed)
5338 removed >= 0 branches to the fill address will stay unchanged
5339 "ta_remove_literal" remove a literal; this action is
5340 indicated when a literal is removed
5342 "ta_add_literal" insert a new literal; this action is
5343 indicated when a literal has been moved.
5344 It may use a virtual_offset because
5345 multiple literals can be placed at the
5348 For each of these text actions, we also record the number of bytes
5349 removed by performing the text action. In the case of a "ta_widen"
5350 or a "ta_fill" that adds space, the removed_bytes will be negative. */
5352 typedef struct text_action_struct text_action;
5353 typedef struct text_action_list_struct text_action_list;
5354 typedef enum text_action_enum_t text_action_t;
5356 enum text_action_enum_t
5359 ta_remove_insn, /* removed = -size */
5360 ta_remove_longcall, /* removed = -size */
5361 ta_convert_longcall, /* removed = 0 */
5362 ta_narrow_insn, /* removed = -1 */
5363 ta_widen_insn, /* removed = +1 */
5364 ta_fill, /* removed = +size */
5370 /* Structure for a text action record. */
5371 struct text_action_struct
5373 text_action_t action;
5374 asection *sec; /* Optional */
5376 bfd_vma virtual_offset; /* Zero except for adding literals. */
5378 literal_value value; /* Only valid when adding literals. */
5384 /* List of all of the actions taken on a text section. */
5385 struct text_action_list_struct
5391 static text_action *
5392 find_fill_action (text_action_list *l, asection *sec, bfd_vma offset)
5396 /* It is not necessary to fill at the end of a section. */
5397 if (sec->size == offset)
5400 for (m_p = &l->head; *m_p && (*m_p)->offset <= offset; m_p = &(*m_p)->next)
5402 text_action *t = *m_p;
5403 /* When the action is another fill at the same address,
5404 just increase the size. */
5405 if (t->offset == offset && t->action == ta_fill)
5413 compute_removed_action_diff (const text_action *ta,
5417 int removable_space)
5420 int current_removed = 0;
5423 current_removed = ta->removed_bytes;
5425 BFD_ASSERT (ta == NULL || ta->offset == offset);
5426 BFD_ASSERT (ta == NULL || ta->action == ta_fill);
5428 /* It is not necessary to fill at the end of a section. Clean this up. */
5429 if (sec->size == offset)
5430 new_removed = removable_space - 0;
5434 int added = -removed - current_removed;
5435 /* Ignore multiples of the section alignment. */
5436 added = ((1 << sec->alignment_power) - 1) & added;
5437 new_removed = (-added);
5439 /* Modify for removable. */
5440 space = removable_space - new_removed;
5441 new_removed = (removable_space
5442 - (((1 << sec->alignment_power) - 1) & space));
5444 return (new_removed - current_removed);
5449 adjust_fill_action (text_action *ta, int fill_diff)
5451 ta->removed_bytes += fill_diff;
5455 /* Add a modification action to the text. For the case of adding or
5456 removing space, modify any current fill and assume that
5457 "unreachable_space" bytes can be freely contracted. Note that a
5458 negative removed value is a fill. */
5461 text_action_add (text_action_list *l,
5462 text_action_t action,
5470 /* It is not necessary to fill at the end of a section. */
5471 if (action == ta_fill && sec->size == offset)
5474 /* It is not necessary to fill 0 bytes. */
5475 if (action == ta_fill && removed == 0)
5478 for (m_p = &l->head; *m_p && (*m_p)->offset <= offset; m_p = &(*m_p)->next)
5480 text_action *t = *m_p;
5481 /* When the action is another fill at the same address,
5482 just increase the size. */
5483 if (t->offset == offset && t->action == ta_fill && action == ta_fill)
5485 t->removed_bytes += removed;
5490 /* Create a new record and fill it up. */
5491 ta = (text_action *) bfd_zmalloc (sizeof (text_action));
5492 ta->action = action;
5494 ta->offset = offset;
5495 ta->removed_bytes = removed;
5502 text_action_add_literal (text_action_list *l,
5503 text_action_t action,
5505 const literal_value *value,
5510 asection *sec = r_reloc_get_section (loc);
5511 bfd_vma offset = loc->target_offset;
5512 bfd_vma virtual_offset = loc->virtual_offset;
5514 BFD_ASSERT (action == ta_add_literal);
5516 for (m_p = &l->head; *m_p != NULL; m_p = &(*m_p)->next)
5518 if ((*m_p)->offset > offset
5519 && ((*m_p)->offset != offset
5520 || (*m_p)->virtual_offset > virtual_offset))
5524 /* Create a new record and fill it up. */
5525 ta = (text_action *) bfd_zmalloc (sizeof (text_action));
5526 ta->action = action;
5528 ta->offset = offset;
5529 ta->virtual_offset = virtual_offset;
5531 ta->removed_bytes = removed;
5537 /* Find the total offset adjustment for the relaxations specified by
5538 text_actions, beginning from a particular starting action. This is
5539 typically used from offset_with_removed_text to search an entire list of
5540 actions, but it may also be called directly when adjusting adjacent offsets
5541 so that each search may begin where the previous one left off. */
5544 removed_by_actions (text_action **p_start_action,
5546 bfd_boolean before_fill)
5551 r = *p_start_action;
5554 if (r->offset > offset)
5557 if (r->offset == offset
5558 && (before_fill || r->action != ta_fill || r->removed_bytes >= 0))
5561 removed += r->removed_bytes;
5566 *p_start_action = r;
5572 offset_with_removed_text (text_action_list *action_list, bfd_vma offset)
5574 text_action *r = action_list->head;
5575 return offset - removed_by_actions (&r, offset, FALSE);
5580 action_list_count (text_action_list *action_list)
5582 text_action *r = action_list->head;
5584 for (r = action_list->head; r != NULL; r = r->next)
5592 /* The find_insn_action routine will only find non-fill actions. */
5594 static text_action *
5595 find_insn_action (text_action_list *action_list, bfd_vma offset)
5598 for (t = action_list->head; t; t = t->next)
5600 if (t->offset == offset)
5607 case ta_remove_insn:
5608 case ta_remove_longcall:
5609 case ta_convert_longcall:
5610 case ta_narrow_insn:
5613 case ta_remove_literal:
5614 case ta_add_literal:
5627 print_action_list (FILE *fp, text_action_list *action_list)
5631 fprintf (fp, "Text Action\n");
5632 for (r = action_list->head; r != NULL; r = r->next)
5634 const char *t = "unknown";
5637 case ta_remove_insn:
5638 t = "remove_insn"; break;
5639 case ta_remove_longcall:
5640 t = "remove_longcall"; break;
5641 case ta_convert_longcall:
5642 t = "convert_longcall"; break;
5643 case ta_narrow_insn:
5644 t = "narrow_insn"; break;
5646 t = "widen_insn"; break;
5651 case ta_remove_literal:
5652 t = "remove_literal"; break;
5653 case ta_add_literal:
5654 t = "add_literal"; break;
5657 fprintf (fp, "%s: %s[0x%lx] \"%s\" %d\n",
5658 r->sec->owner->filename,
5659 r->sec->name, r->offset, t, r->removed_bytes);
5666 /* Lists of literals being coalesced or removed. */
5668 /* In the usual case, the literal identified by "from" is being
5669 coalesced with another literal identified by "to". If the literal is
5670 unused and is being removed altogether, "to.abfd" will be NULL.
5671 The removed_literal entries are kept on a per-section list, sorted
5672 by the "from" offset field. */
5674 typedef struct removed_literal_struct removed_literal;
5675 typedef struct removed_literal_list_struct removed_literal_list;
5677 struct removed_literal_struct
5681 removed_literal *next;
5684 struct removed_literal_list_struct
5686 removed_literal *head;
5687 removed_literal *tail;
5691 /* Record that the literal at "from" is being removed. If "to" is not
5692 NULL, the "from" literal is being coalesced with the "to" literal. */
5695 add_removed_literal (removed_literal_list *removed_list,
5696 const r_reloc *from,
5699 removed_literal *r, *new_r, *next_r;
5701 new_r = (removed_literal *) bfd_zmalloc (sizeof (removed_literal));
5703 new_r->from = *from;
5707 new_r->to.abfd = NULL;
5710 r = removed_list->head;
5713 removed_list->head = new_r;
5714 removed_list->tail = new_r;
5716 /* Special check for common case of append. */
5717 else if (removed_list->tail->from.target_offset < from->target_offset)
5719 removed_list->tail->next = new_r;
5720 removed_list->tail = new_r;
5724 while (r->from.target_offset < from->target_offset && r->next)
5730 new_r->next = next_r;
5732 removed_list->tail = new_r;
5737 /* Check if the list of removed literals contains an entry for the
5738 given address. Return the entry if found. */
5740 static removed_literal *
5741 find_removed_literal (removed_literal_list *removed_list, bfd_vma addr)
5743 removed_literal *r = removed_list->head;
5744 while (r && r->from.target_offset < addr)
5746 if (r && r->from.target_offset == addr)
5755 print_removed_literals (FILE *fp, removed_literal_list *removed_list)
5758 r = removed_list->head;
5760 fprintf (fp, "Removed Literals\n");
5761 for (; r != NULL; r = r->next)
5763 print_r_reloc (fp, &r->from);
5764 fprintf (fp, " => ");
5765 if (r->to.abfd == NULL)
5766 fprintf (fp, "REMOVED");
5768 print_r_reloc (fp, &r->to);
5776 /* Per-section data for relaxation. */
5778 typedef struct reloc_bfd_fix_struct reloc_bfd_fix;
5780 struct xtensa_relax_info_struct
5782 bfd_boolean is_relaxable_literal_section;
5783 bfd_boolean is_relaxable_asm_section;
5784 int visited; /* Number of times visited. */
5786 source_reloc *src_relocs; /* Array[src_count]. */
5788 int src_next; /* Next src_relocs entry to assign. */
5790 removed_literal_list removed_list;
5791 text_action_list action_list;
5793 reloc_bfd_fix *fix_list;
5794 reloc_bfd_fix *fix_array;
5795 unsigned fix_array_count;
5797 /* Support for expanding the reloc array that is stored
5798 in the section structure. If the relocations have been
5799 reallocated, the newly allocated relocations will be referenced
5800 here along with the actual size allocated. The relocation
5801 count will always be found in the section structure. */
5802 Elf_Internal_Rela *allocated_relocs;
5803 unsigned relocs_count;
5804 unsigned allocated_relocs_count;
5807 struct elf_xtensa_section_data
5809 struct bfd_elf_section_data elf;
5810 xtensa_relax_info relax_info;
5815 elf_xtensa_new_section_hook (bfd *abfd, asection *sec)
5817 if (!sec->used_by_bfd)
5819 struct elf_xtensa_section_data *sdata;
5820 bfd_size_type amt = sizeof (*sdata);
5822 sdata = bfd_zalloc (abfd, amt);
5825 sec->used_by_bfd = sdata;
5828 return _bfd_elf_new_section_hook (abfd, sec);
5832 static xtensa_relax_info *
5833 get_xtensa_relax_info (asection *sec)
5835 struct elf_xtensa_section_data *section_data;
5837 /* No info available if no section or if it is an output section. */
5838 if (!sec || sec == sec->output_section)
5841 section_data = (struct elf_xtensa_section_data *) elf_section_data (sec);
5842 return §ion_data->relax_info;
5847 init_xtensa_relax_info (asection *sec)
5849 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
5851 relax_info->is_relaxable_literal_section = FALSE;
5852 relax_info->is_relaxable_asm_section = FALSE;
5853 relax_info->visited = 0;
5855 relax_info->src_relocs = NULL;
5856 relax_info->src_count = 0;
5857 relax_info->src_next = 0;
5859 relax_info->removed_list.head = NULL;
5860 relax_info->removed_list.tail = NULL;
5862 relax_info->action_list.head = NULL;
5864 relax_info->fix_list = NULL;
5865 relax_info->fix_array = NULL;
5866 relax_info->fix_array_count = 0;
5868 relax_info->allocated_relocs = NULL;
5869 relax_info->relocs_count = 0;
5870 relax_info->allocated_relocs_count = 0;
5874 /* Coalescing literals may require a relocation to refer to a section in
5875 a different input file, but the standard relocation information
5876 cannot express that. Instead, the reloc_bfd_fix structures are used
5877 to "fix" the relocations that refer to sections in other input files.
5878 These structures are kept on per-section lists. The "src_type" field
5879 records the relocation type in case there are multiple relocations on
5880 the same location. FIXME: This is ugly; an alternative might be to
5881 add new symbols with the "owner" field to some other input file. */
5883 struct reloc_bfd_fix_struct
5887 unsigned src_type; /* Relocation type. */
5889 asection *target_sec;
5890 bfd_vma target_offset;
5891 bfd_boolean translated;
5893 reloc_bfd_fix *next;
5897 static reloc_bfd_fix *
5898 reloc_bfd_fix_init (asection *src_sec,
5901 asection *target_sec,
5902 bfd_vma target_offset,
5903 bfd_boolean translated)
5907 fix = (reloc_bfd_fix *) bfd_malloc (sizeof (reloc_bfd_fix));
5908 fix->src_sec = src_sec;
5909 fix->src_offset = src_offset;
5910 fix->src_type = src_type;
5911 fix->target_sec = target_sec;
5912 fix->target_offset = target_offset;
5913 fix->translated = translated;
5920 add_fix (asection *src_sec, reloc_bfd_fix *fix)
5922 xtensa_relax_info *relax_info;
5924 relax_info = get_xtensa_relax_info (src_sec);
5925 fix->next = relax_info->fix_list;
5926 relax_info->fix_list = fix;
5931 fix_compare (const void *ap, const void *bp)
5933 const reloc_bfd_fix *a = (const reloc_bfd_fix *) ap;
5934 const reloc_bfd_fix *b = (const reloc_bfd_fix *) bp;
5936 if (a->src_offset != b->src_offset)
5937 return (a->src_offset - b->src_offset);
5938 return (a->src_type - b->src_type);
5943 cache_fix_array (asection *sec)
5945 unsigned i, count = 0;
5947 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
5949 if (relax_info == NULL)
5951 if (relax_info->fix_list == NULL)
5954 for (r = relax_info->fix_list; r != NULL; r = r->next)
5957 relax_info->fix_array =
5958 (reloc_bfd_fix *) bfd_malloc (sizeof (reloc_bfd_fix) * count);
5959 relax_info->fix_array_count = count;
5961 r = relax_info->fix_list;
5962 for (i = 0; i < count; i++, r = r->next)
5964 relax_info->fix_array[count - 1 - i] = *r;
5965 relax_info->fix_array[count - 1 - i].next = NULL;
5968 qsort (relax_info->fix_array, relax_info->fix_array_count,
5969 sizeof (reloc_bfd_fix), fix_compare);
5973 static reloc_bfd_fix *
5974 get_bfd_fix (asection *sec, bfd_vma offset, unsigned type)
5976 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
5980 if (relax_info == NULL)
5982 if (relax_info->fix_list == NULL)
5985 if (relax_info->fix_array == NULL)
5986 cache_fix_array (sec);
5988 key.src_offset = offset;
5989 key.src_type = type;
5990 rv = bsearch (&key, relax_info->fix_array, relax_info->fix_array_count,
5991 sizeof (reloc_bfd_fix), fix_compare);
5996 /* Section caching. */
5998 typedef struct section_cache_struct section_cache_t;
6000 struct section_cache_struct
6004 bfd_byte *contents; /* Cache of the section contents. */
6005 bfd_size_type content_length;
6007 property_table_entry *ptbl; /* Cache of the section property table. */
6010 Elf_Internal_Rela *relocs; /* Cache of the section relocations. */
6011 unsigned reloc_count;
6016 init_section_cache (section_cache_t *sec_cache)
6018 memset (sec_cache, 0, sizeof (*sec_cache));
6023 clear_section_cache (section_cache_t *sec_cache)
6027 release_contents (sec_cache->sec, sec_cache->contents);
6028 release_internal_relocs (sec_cache->sec, sec_cache->relocs);
6029 if (sec_cache->ptbl)
6030 free (sec_cache->ptbl);
6031 memset (sec_cache, 0, sizeof (sec_cache));
6037 section_cache_section (section_cache_t *sec_cache,
6039 struct bfd_link_info *link_info)
6042 property_table_entry *prop_table = NULL;
6044 bfd_byte *contents = NULL;
6045 Elf_Internal_Rela *internal_relocs = NULL;
6046 bfd_size_type sec_size;
6050 if (sec == sec_cache->sec)
6054 sec_size = bfd_get_section_limit (abfd, sec);
6056 /* Get the contents. */
6057 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
6058 if (contents == NULL && sec_size != 0)
6061 /* Get the relocations. */
6062 internal_relocs = retrieve_internal_relocs (abfd, sec,
6063 link_info->keep_memory);
6065 /* Get the entry table. */
6066 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
6067 XTENSA_PROP_SEC_NAME, FALSE);
6071 /* Fill in the new section cache. */
6072 clear_section_cache (sec_cache);
6073 memset (sec_cache, 0, sizeof (sec_cache));
6075 sec_cache->sec = sec;
6076 sec_cache->contents = contents;
6077 sec_cache->content_length = sec_size;
6078 sec_cache->relocs = internal_relocs;
6079 sec_cache->reloc_count = sec->reloc_count;
6080 sec_cache->pte_count = ptblsize;
6081 sec_cache->ptbl = prop_table;
6086 release_contents (sec, contents);
6087 release_internal_relocs (sec, internal_relocs);
6094 /* Extended basic blocks. */
6096 /* An ebb_struct represents an Extended Basic Block. Within this
6097 range, we guarantee that all instructions are decodable, the
6098 property table entries are contiguous, and no property table
6099 specifies a segment that cannot have instructions moved. This
6100 structure contains caches of the contents, property table and
6101 relocations for the specified section for easy use. The range is
6102 specified by ranges of indices for the byte offset, property table
6103 offsets and relocation offsets. These must be consistent. */
6105 typedef struct ebb_struct ebb_t;
6111 bfd_byte *contents; /* Cache of the section contents. */
6112 bfd_size_type content_length;
6114 property_table_entry *ptbl; /* Cache of the section property table. */
6117 Elf_Internal_Rela *relocs; /* Cache of the section relocations. */
6118 unsigned reloc_count;
6120 bfd_vma start_offset; /* Offset in section. */
6121 unsigned start_ptbl_idx; /* Offset in the property table. */
6122 unsigned start_reloc_idx; /* Offset in the relocations. */
6125 unsigned end_ptbl_idx;
6126 unsigned end_reloc_idx;
6128 bfd_boolean ends_section; /* Is this the last ebb in a section? */
6130 /* The unreachable property table at the end of this set of blocks;
6131 NULL if the end is not an unreachable block. */
6132 property_table_entry *ends_unreachable;
6136 enum ebb_target_enum
6139 EBB_DESIRE_TGT_ALIGN,
6140 EBB_REQUIRE_TGT_ALIGN,
6141 EBB_REQUIRE_LOOP_ALIGN,
6146 /* proposed_action_struct is similar to the text_action_struct except
6147 that is represents a potential transformation, not one that will
6148 occur. We build a list of these for an extended basic block
6149 and use them to compute the actual actions desired. We must be
6150 careful that the entire set of actual actions we perform do not
6151 break any relocations that would fit if the actions were not
6154 typedef struct proposed_action_struct proposed_action;
6156 struct proposed_action_struct
6158 enum ebb_target_enum align_type; /* for the target alignment */
6159 bfd_vma alignment_pow;
6160 text_action_t action;
6163 bfd_boolean do_action; /* If false, then we will not perform the action. */
6167 /* The ebb_constraint_struct keeps a set of proposed actions for an
6168 extended basic block. */
6170 typedef struct ebb_constraint_struct ebb_constraint;
6172 struct ebb_constraint_struct
6175 bfd_boolean start_movable;
6177 /* Bytes of extra space at the beginning if movable. */
6178 int start_extra_space;
6180 enum ebb_target_enum start_align;
6182 bfd_boolean end_movable;
6184 /* Bytes of extra space at the end if movable. */
6185 int end_extra_space;
6187 unsigned action_count;
6188 unsigned action_allocated;
6190 /* Array of proposed actions. */
6191 proposed_action *actions;
6193 /* Action alignments -- one for each proposed action. */
6194 enum ebb_target_enum *action_aligns;
6199 init_ebb_constraint (ebb_constraint *c)
6201 memset (c, 0, sizeof (ebb_constraint));
6206 free_ebb_constraint (ebb_constraint *c)
6214 init_ebb (ebb_t *ebb,
6217 bfd_size_type content_length,
6218 property_table_entry *prop_table,
6220 Elf_Internal_Rela *internal_relocs,
6221 unsigned reloc_count)
6223 memset (ebb, 0, sizeof (ebb_t));
6225 ebb->contents = contents;
6226 ebb->content_length = content_length;
6227 ebb->ptbl = prop_table;
6228 ebb->pte_count = ptblsize;
6229 ebb->relocs = internal_relocs;
6230 ebb->reloc_count = reloc_count;
6231 ebb->start_offset = 0;
6232 ebb->end_offset = ebb->content_length - 1;
6233 ebb->start_ptbl_idx = 0;
6234 ebb->end_ptbl_idx = ptblsize;
6235 ebb->start_reloc_idx = 0;
6236 ebb->end_reloc_idx = reloc_count;
6240 /* Extend the ebb to all decodable contiguous sections. The algorithm
6241 for building a basic block around an instruction is to push it
6242 forward until we hit the end of a section, an unreachable block or
6243 a block that cannot be transformed. Then we push it backwards
6244 searching for similar conditions. */
6246 static bfd_boolean extend_ebb_bounds_forward (ebb_t *);
6247 static bfd_boolean extend_ebb_bounds_backward (ebb_t *);
6248 static bfd_size_type insn_block_decodable_len
6249 (bfd_byte *, bfd_size_type, bfd_vma, bfd_size_type);
6252 extend_ebb_bounds (ebb_t *ebb)
6254 if (!extend_ebb_bounds_forward (ebb))
6256 if (!extend_ebb_bounds_backward (ebb))
6263 extend_ebb_bounds_forward (ebb_t *ebb)
6265 property_table_entry *the_entry, *new_entry;
6267 the_entry = &ebb->ptbl[ebb->end_ptbl_idx];
6269 /* Stop when (1) we cannot decode an instruction, (2) we are at
6270 the end of the property tables, (3) we hit a non-contiguous property
6271 table entry, (4) we hit a NO_TRANSFORM region. */
6276 bfd_size_type insn_block_len;
6278 entry_end = the_entry->address - ebb->sec->vma + the_entry->size;
6280 insn_block_decodable_len (ebb->contents, ebb->content_length,
6282 entry_end - ebb->end_offset);
6283 if (insn_block_len != (entry_end - ebb->end_offset))
6285 (*_bfd_error_handler)
6286 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
6287 ebb->sec->owner, ebb->sec, ebb->end_offset + insn_block_len);
6290 ebb->end_offset += insn_block_len;
6292 if (ebb->end_offset == ebb->sec->size)
6293 ebb->ends_section = TRUE;
6295 /* Update the reloc counter. */
6296 while (ebb->end_reloc_idx + 1 < ebb->reloc_count
6297 && (ebb->relocs[ebb->end_reloc_idx + 1].r_offset
6300 ebb->end_reloc_idx++;
6303 if (ebb->end_ptbl_idx + 1 == ebb->pte_count)
6306 new_entry = &ebb->ptbl[ebb->end_ptbl_idx + 1];
6307 if (((new_entry->flags & XTENSA_PROP_INSN) == 0)
6308 || ((new_entry->flags & XTENSA_PROP_NO_TRANSFORM) != 0)
6309 || ((the_entry->flags & XTENSA_PROP_ALIGN) != 0))
6312 if (the_entry->address + the_entry->size != new_entry->address)
6315 the_entry = new_entry;
6316 ebb->end_ptbl_idx++;
6319 /* Quick check for an unreachable or end of file just at the end. */
6320 if (ebb->end_ptbl_idx + 1 == ebb->pte_count)
6322 if (ebb->end_offset == ebb->content_length)
6323 ebb->ends_section = TRUE;
6327 new_entry = &ebb->ptbl[ebb->end_ptbl_idx + 1];
6328 if ((new_entry->flags & XTENSA_PROP_UNREACHABLE) != 0
6329 && the_entry->address + the_entry->size == new_entry->address)
6330 ebb->ends_unreachable = new_entry;
6333 /* Any other ending requires exact alignment. */
6339 extend_ebb_bounds_backward (ebb_t *ebb)
6341 property_table_entry *the_entry, *new_entry;
6343 the_entry = &ebb->ptbl[ebb->start_ptbl_idx];
6345 /* Stop when (1) we cannot decode the instructions in the current entry.
6346 (2) we are at the beginning of the property tables, (3) we hit a
6347 non-contiguous property table entry, (4) we hit a NO_TRANSFORM region. */
6351 bfd_vma block_begin;
6352 bfd_size_type insn_block_len;
6354 block_begin = the_entry->address - ebb->sec->vma;
6356 insn_block_decodable_len (ebb->contents, ebb->content_length,
6358 ebb->start_offset - block_begin);
6359 if (insn_block_len != ebb->start_offset - block_begin)
6361 (*_bfd_error_handler)
6362 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
6363 ebb->sec->owner, ebb->sec, ebb->end_offset + insn_block_len);
6366 ebb->start_offset -= insn_block_len;
6368 /* Update the reloc counter. */
6369 while (ebb->start_reloc_idx > 0
6370 && (ebb->relocs[ebb->start_reloc_idx - 1].r_offset
6371 >= ebb->start_offset))
6373 ebb->start_reloc_idx--;
6376 if (ebb->start_ptbl_idx == 0)
6379 new_entry = &ebb->ptbl[ebb->start_ptbl_idx - 1];
6380 if ((new_entry->flags & XTENSA_PROP_INSN) == 0
6381 || ((new_entry->flags & XTENSA_PROP_NO_TRANSFORM) != 0)
6382 || ((new_entry->flags & XTENSA_PROP_ALIGN) != 0))
6384 if (new_entry->address + new_entry->size != the_entry->address)
6387 the_entry = new_entry;
6388 ebb->start_ptbl_idx--;
6394 static bfd_size_type
6395 insn_block_decodable_len (bfd_byte *contents,
6396 bfd_size_type content_len,
6397 bfd_vma block_offset,
6398 bfd_size_type block_len)
6400 bfd_vma offset = block_offset;
6402 while (offset < block_offset + block_len)
6404 bfd_size_type insn_len = 0;
6406 insn_len = insn_decode_len (contents, content_len, offset);
6408 return (offset - block_offset);
6411 return (offset - block_offset);
6416 ebb_propose_action (ebb_constraint *c,
6417 enum ebb_target_enum align_type,
6418 bfd_vma alignment_pow,
6419 text_action_t action,
6422 bfd_boolean do_action)
6424 proposed_action *act;
6426 if (c->action_allocated <= c->action_count)
6428 unsigned new_allocated, i;
6429 proposed_action *new_actions;
6431 new_allocated = (c->action_count + 2) * 2;
6432 new_actions = (proposed_action *)
6433 bfd_zmalloc (sizeof (proposed_action) * new_allocated);
6435 for (i = 0; i < c->action_count; i++)
6436 new_actions[i] = c->actions[i];
6439 c->actions = new_actions;
6440 c->action_allocated = new_allocated;
6443 act = &c->actions[c->action_count];
6444 act->align_type = align_type;
6445 act->alignment_pow = alignment_pow;
6446 act->action = action;
6447 act->offset = offset;
6448 act->removed_bytes = removed_bytes;
6449 act->do_action = do_action;
6455 /* Access to internal relocations, section contents and symbols. */
6457 /* During relaxation, we need to modify relocations, section contents,
6458 and symbol definitions, and we need to keep the original values from
6459 being reloaded from the input files, i.e., we need to "pin" the
6460 modified values in memory. We also want to continue to observe the
6461 setting of the "keep-memory" flag. The following functions wrap the
6462 standard BFD functions to take care of this for us. */
6464 static Elf_Internal_Rela *
6465 retrieve_internal_relocs (bfd *abfd, asection *sec, bfd_boolean keep_memory)
6467 Elf_Internal_Rela *internal_relocs;
6469 if ((sec->flags & SEC_LINKER_CREATED) != 0)
6472 internal_relocs = elf_section_data (sec)->relocs;
6473 if (internal_relocs == NULL)
6474 internal_relocs = (_bfd_elf_link_read_relocs
6475 (abfd, sec, NULL, NULL, keep_memory));
6476 return internal_relocs;
6481 pin_internal_relocs (asection *sec, Elf_Internal_Rela *internal_relocs)
6483 elf_section_data (sec)->relocs = internal_relocs;
6488 release_internal_relocs (asection *sec, Elf_Internal_Rela *internal_relocs)
6491 && elf_section_data (sec)->relocs != internal_relocs)
6492 free (internal_relocs);
6497 retrieve_contents (bfd *abfd, asection *sec, bfd_boolean keep_memory)
6500 bfd_size_type sec_size;
6502 sec_size = bfd_get_section_limit (abfd, sec);
6503 contents = elf_section_data (sec)->this_hdr.contents;
6505 if (contents == NULL && sec_size != 0)
6507 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
6514 elf_section_data (sec)->this_hdr.contents = contents;
6521 pin_contents (asection *sec, bfd_byte *contents)
6523 elf_section_data (sec)->this_hdr.contents = contents;
6528 release_contents (asection *sec, bfd_byte *contents)
6530 if (contents && elf_section_data (sec)->this_hdr.contents != contents)
6535 static Elf_Internal_Sym *
6536 retrieve_local_syms (bfd *input_bfd)
6538 Elf_Internal_Shdr *symtab_hdr;
6539 Elf_Internal_Sym *isymbuf;
6542 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6543 locsymcount = symtab_hdr->sh_info;
6545 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6546 if (isymbuf == NULL && locsymcount != 0)
6547 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
6550 /* Save the symbols for this input file so they won't be read again. */
6551 if (isymbuf && isymbuf != (Elf_Internal_Sym *) symtab_hdr->contents)
6552 symtab_hdr->contents = (unsigned char *) isymbuf;
6558 /* Code for link-time relaxation. */
6560 /* Initialization for relaxation: */
6561 static bfd_boolean analyze_relocations (struct bfd_link_info *);
6562 static bfd_boolean find_relaxable_sections
6563 (bfd *, asection *, struct bfd_link_info *, bfd_boolean *);
6564 static bfd_boolean collect_source_relocs
6565 (bfd *, asection *, struct bfd_link_info *);
6566 static bfd_boolean is_resolvable_asm_expansion
6567 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *, struct bfd_link_info *,
6569 static Elf_Internal_Rela *find_associated_l32r_irel
6570 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Rela *);
6571 static bfd_boolean compute_text_actions
6572 (bfd *, asection *, struct bfd_link_info *);
6573 static bfd_boolean compute_ebb_proposed_actions (ebb_constraint *);
6574 static bfd_boolean compute_ebb_actions (ebb_constraint *);
6575 static bfd_boolean check_section_ebb_pcrels_fit
6576 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *, const ebb_constraint *,
6577 const xtensa_opcode *);
6578 static bfd_boolean check_section_ebb_reduces (const ebb_constraint *);
6579 static void text_action_add_proposed
6580 (text_action_list *, const ebb_constraint *, asection *);
6581 static int compute_fill_extra_space (property_table_entry *);
6584 static bfd_boolean compute_removed_literals
6585 (bfd *, asection *, struct bfd_link_info *, value_map_hash_table *);
6586 static Elf_Internal_Rela *get_irel_at_offset
6587 (asection *, Elf_Internal_Rela *, bfd_vma);
6588 static bfd_boolean is_removable_literal
6589 (const source_reloc *, int, const source_reloc *, int, asection *,
6590 property_table_entry *, int);
6591 static bfd_boolean remove_dead_literal
6592 (bfd *, asection *, struct bfd_link_info *, Elf_Internal_Rela *,
6593 Elf_Internal_Rela *, source_reloc *, property_table_entry *, int);
6594 static bfd_boolean identify_literal_placement
6595 (bfd *, asection *, bfd_byte *, struct bfd_link_info *,
6596 value_map_hash_table *, bfd_boolean *, Elf_Internal_Rela *, int,
6597 source_reloc *, property_table_entry *, int, section_cache_t *,
6599 static bfd_boolean relocations_reach (source_reloc *, int, const r_reloc *);
6600 static bfd_boolean coalesce_shared_literal
6601 (asection *, source_reloc *, property_table_entry *, int, value_map *);
6602 static bfd_boolean move_shared_literal
6603 (asection *, struct bfd_link_info *, source_reloc *, property_table_entry *,
6604 int, const r_reloc *, const literal_value *, section_cache_t *);
6607 static bfd_boolean relax_section (bfd *, asection *, struct bfd_link_info *);
6608 static bfd_boolean translate_section_fixes (asection *);
6609 static bfd_boolean translate_reloc_bfd_fix (reloc_bfd_fix *);
6610 static asection *translate_reloc (const r_reloc *, r_reloc *, asection *);
6611 static void shrink_dynamic_reloc_sections
6612 (struct bfd_link_info *, bfd *, asection *, Elf_Internal_Rela *);
6613 static bfd_boolean move_literal
6614 (bfd *, struct bfd_link_info *, asection *, bfd_vma, bfd_byte *,
6615 xtensa_relax_info *, Elf_Internal_Rela **, const literal_value *);
6616 static bfd_boolean relax_property_section
6617 (bfd *, asection *, struct bfd_link_info *);
6620 static bfd_boolean relax_section_symbols (bfd *, asection *);
6624 elf_xtensa_relax_section (bfd *abfd,
6626 struct bfd_link_info *link_info,
6629 static value_map_hash_table *values = NULL;
6630 static bfd_boolean relocations_analyzed = FALSE;
6631 xtensa_relax_info *relax_info;
6633 if (!relocations_analyzed)
6635 /* Do some overall initialization for relaxation. */
6636 values = value_map_hash_table_init ();
6639 relaxing_section = TRUE;
6640 if (!analyze_relocations (link_info))
6642 relocations_analyzed = TRUE;
6646 /* Don't mess with linker-created sections. */
6647 if ((sec->flags & SEC_LINKER_CREATED) != 0)
6650 relax_info = get_xtensa_relax_info (sec);
6651 BFD_ASSERT (relax_info != NULL);
6653 switch (relax_info->visited)
6656 /* Note: It would be nice to fold this pass into
6657 analyze_relocations, but it is important for this step that the
6658 sections be examined in link order. */
6659 if (!compute_removed_literals (abfd, sec, link_info, values))
6666 value_map_hash_table_delete (values);
6668 if (!relax_section (abfd, sec, link_info))
6674 if (!relax_section_symbols (abfd, sec))
6679 relax_info->visited++;
6684 /* Initialization for relaxation. */
6686 /* This function is called once at the start of relaxation. It scans
6687 all the input sections and marks the ones that are relaxable (i.e.,
6688 literal sections with L32R relocations against them), and then
6689 collects source_reloc information for all the relocations against
6690 those relaxable sections. During this process, it also detects
6691 longcalls, i.e., calls relaxed by the assembler into indirect
6692 calls, that can be optimized back into direct calls. Within each
6693 extended basic block (ebb) containing an optimized longcall, it
6694 computes a set of "text actions" that can be performed to remove
6695 the L32R associated with the longcall while optionally preserving
6696 branch target alignments. */
6699 analyze_relocations (struct bfd_link_info *link_info)
6703 bfd_boolean is_relaxable = FALSE;
6705 /* Initialize the per-section relaxation info. */
6706 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6707 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6709 init_xtensa_relax_info (sec);
6712 /* Mark relaxable sections (and count relocations against each one). */
6713 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6714 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6716 if (!find_relaxable_sections (abfd, sec, link_info, &is_relaxable))
6720 /* Bail out if there are no relaxable sections. */
6724 /* Allocate space for source_relocs. */
6725 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6726 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6728 xtensa_relax_info *relax_info;
6730 relax_info = get_xtensa_relax_info (sec);
6731 if (relax_info->is_relaxable_literal_section
6732 || relax_info->is_relaxable_asm_section)
6734 relax_info->src_relocs = (source_reloc *)
6735 bfd_malloc (relax_info->src_count * sizeof (source_reloc));
6738 relax_info->src_count = 0;
6741 /* Collect info on relocations against each relaxable section. */
6742 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6743 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6745 if (!collect_source_relocs (abfd, sec, link_info))
6749 /* Compute the text actions. */
6750 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6751 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6753 if (!compute_text_actions (abfd, sec, link_info))
6761 /* Find all the sections that might be relaxed. The motivation for
6762 this pass is that collect_source_relocs() needs to record _all_ the
6763 relocations that target each relaxable section. That is expensive
6764 and unnecessary unless the target section is actually going to be
6765 relaxed. This pass identifies all such sections by checking if
6766 they have L32Rs pointing to them. In the process, the total number
6767 of relocations targeting each section is also counted so that we
6768 know how much space to allocate for source_relocs against each
6769 relaxable literal section. */
6772 find_relaxable_sections (bfd *abfd,
6774 struct bfd_link_info *link_info,
6775 bfd_boolean *is_relaxable_p)
6777 Elf_Internal_Rela *internal_relocs;
6779 bfd_boolean ok = TRUE;
6781 xtensa_relax_info *source_relax_info;
6782 bfd_boolean is_l32r_reloc;
6784 internal_relocs = retrieve_internal_relocs (abfd, sec,
6785 link_info->keep_memory);
6786 if (internal_relocs == NULL)
6789 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
6790 if (contents == NULL && sec->size != 0)
6796 source_relax_info = get_xtensa_relax_info (sec);
6797 for (i = 0; i < sec->reloc_count; i++)
6799 Elf_Internal_Rela *irel = &internal_relocs[i];
6801 asection *target_sec;
6802 xtensa_relax_info *target_relax_info;
6804 /* If this section has not already been marked as "relaxable", and
6805 if it contains any ASM_EXPAND relocations (marking expanded
6806 longcalls) that can be optimized into direct calls, then mark
6807 the section as "relaxable". */
6808 if (source_relax_info
6809 && !source_relax_info->is_relaxable_asm_section
6810 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_ASM_EXPAND)
6812 bfd_boolean is_reachable = FALSE;
6813 if (is_resolvable_asm_expansion (abfd, sec, contents, irel,
6814 link_info, &is_reachable)
6817 source_relax_info->is_relaxable_asm_section = TRUE;
6818 *is_relaxable_p = TRUE;
6822 r_reloc_init (&r_rel, abfd, irel, contents,
6823 bfd_get_section_limit (abfd, sec));
6825 target_sec = r_reloc_get_section (&r_rel);
6826 target_relax_info = get_xtensa_relax_info (target_sec);
6827 if (!target_relax_info)
6830 /* Count PC-relative operand relocations against the target section.
6831 Note: The conditions tested here must match the conditions under
6832 which init_source_reloc is called in collect_source_relocs(). */
6833 is_l32r_reloc = FALSE;
6834 if (is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
6836 xtensa_opcode opcode =
6837 get_relocation_opcode (abfd, sec, contents, irel);
6838 if (opcode != XTENSA_UNDEFINED)
6840 is_l32r_reloc = (opcode == get_l32r_opcode ());
6841 if (!is_alt_relocation (ELF32_R_TYPE (irel->r_info))
6843 target_relax_info->src_count++;
6847 if (is_l32r_reloc && r_reloc_is_defined (&r_rel))
6849 /* Mark the target section as relaxable. */
6850 target_relax_info->is_relaxable_literal_section = TRUE;
6851 *is_relaxable_p = TRUE;
6856 release_contents (sec, contents);
6857 release_internal_relocs (sec, internal_relocs);
6862 /* Record _all_ the relocations that point to relaxable sections, and
6863 get rid of ASM_EXPAND relocs by either converting them to
6864 ASM_SIMPLIFY or by removing them. */
6867 collect_source_relocs (bfd *abfd,
6869 struct bfd_link_info *link_info)
6871 Elf_Internal_Rela *internal_relocs;
6873 bfd_boolean ok = TRUE;
6875 bfd_size_type sec_size;
6877 internal_relocs = retrieve_internal_relocs (abfd, sec,
6878 link_info->keep_memory);
6879 if (internal_relocs == NULL)
6882 sec_size = bfd_get_section_limit (abfd, sec);
6883 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
6884 if (contents == NULL && sec_size != 0)
6890 /* Record relocations against relaxable literal sections. */
6891 for (i = 0; i < sec->reloc_count; i++)
6893 Elf_Internal_Rela *irel = &internal_relocs[i];
6895 asection *target_sec;
6896 xtensa_relax_info *target_relax_info;
6898 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
6900 target_sec = r_reloc_get_section (&r_rel);
6901 target_relax_info = get_xtensa_relax_info (target_sec);
6903 if (target_relax_info
6904 && (target_relax_info->is_relaxable_literal_section
6905 || target_relax_info->is_relaxable_asm_section))
6907 xtensa_opcode opcode = XTENSA_UNDEFINED;
6909 bfd_boolean is_abs_literal = FALSE;
6911 if (is_alt_relocation (ELF32_R_TYPE (irel->r_info)))
6913 /* None of the current alternate relocs are PC-relative,
6914 and only PC-relative relocs matter here. However, we
6915 still need to record the opcode for literal
6917 opcode = get_relocation_opcode (abfd, sec, contents, irel);
6918 if (opcode == get_l32r_opcode ())
6920 is_abs_literal = TRUE;
6924 opcode = XTENSA_UNDEFINED;
6926 else if (is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
6928 opcode = get_relocation_opcode (abfd, sec, contents, irel);
6929 opnd = get_relocation_opnd (opcode, ELF32_R_TYPE (irel->r_info));
6932 if (opcode != XTENSA_UNDEFINED)
6934 int src_next = target_relax_info->src_next++;
6935 source_reloc *s_reloc = &target_relax_info->src_relocs[src_next];
6937 init_source_reloc (s_reloc, sec, &r_rel, opcode, opnd,
6943 /* Now get rid of ASM_EXPAND relocations. At this point, the
6944 src_relocs array for the target literal section may still be
6945 incomplete, but it must at least contain the entries for the L32R
6946 relocations associated with ASM_EXPANDs because they were just
6947 added in the preceding loop over the relocations. */
6949 for (i = 0; i < sec->reloc_count; i++)
6951 Elf_Internal_Rela *irel = &internal_relocs[i];
6952 bfd_boolean is_reachable;
6954 if (!is_resolvable_asm_expansion (abfd, sec, contents, irel, link_info,
6960 Elf_Internal_Rela *l32r_irel;
6962 asection *target_sec;
6963 xtensa_relax_info *target_relax_info;
6965 /* Mark the source_reloc for the L32R so that it will be
6966 removed in compute_removed_literals(), along with the
6967 associated literal. */
6968 l32r_irel = find_associated_l32r_irel (abfd, sec, contents,
6969 irel, internal_relocs);
6970 if (l32r_irel == NULL)
6973 r_reloc_init (&r_rel, abfd, l32r_irel, contents, sec_size);
6975 target_sec = r_reloc_get_section (&r_rel);
6976 target_relax_info = get_xtensa_relax_info (target_sec);
6978 if (target_relax_info
6979 && (target_relax_info->is_relaxable_literal_section
6980 || target_relax_info->is_relaxable_asm_section))
6982 source_reloc *s_reloc;
6984 /* Search the source_relocs for the entry corresponding to
6985 the l32r_irel. Note: The src_relocs array is not yet
6986 sorted, but it wouldn't matter anyway because we're
6987 searching by source offset instead of target offset. */
6988 s_reloc = find_source_reloc (target_relax_info->src_relocs,
6989 target_relax_info->src_next,
6991 BFD_ASSERT (s_reloc);
6992 s_reloc->is_null = TRUE;
6995 /* Convert this reloc to ASM_SIMPLIFY. */
6996 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6997 R_XTENSA_ASM_SIMPLIFY);
6998 l32r_irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
7000 pin_internal_relocs (sec, internal_relocs);
7004 /* It is resolvable but doesn't reach. We resolve now
7005 by eliminating the relocation -- the call will remain
7006 expanded into L32R/CALLX. */
7007 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
7008 pin_internal_relocs (sec, internal_relocs);
7013 release_contents (sec, contents);
7014 release_internal_relocs (sec, internal_relocs);
7019 /* Return TRUE if the asm expansion can be resolved. Generally it can
7020 be resolved on a final link or when a partial link locates it in the
7021 same section as the target. Set "is_reachable" flag if the target of
7022 the call is within the range of a direct call, given the current VMA
7023 for this section and the target section. */
7026 is_resolvable_asm_expansion (bfd *abfd,
7029 Elf_Internal_Rela *irel,
7030 struct bfd_link_info *link_info,
7031 bfd_boolean *is_reachable_p)
7033 asection *target_sec;
7034 bfd_vma target_offset;
7036 xtensa_opcode opcode, direct_call_opcode;
7037 bfd_vma self_address;
7038 bfd_vma dest_address;
7039 bfd_boolean uses_l32r;
7040 bfd_size_type sec_size;
7042 *is_reachable_p = FALSE;
7044 if (contents == NULL)
7047 if (ELF32_R_TYPE (irel->r_info) != R_XTENSA_ASM_EXPAND)
7050 sec_size = bfd_get_section_limit (abfd, sec);
7051 opcode = get_expanded_call_opcode (contents + irel->r_offset,
7052 sec_size - irel->r_offset, &uses_l32r);
7053 /* Optimization of longcalls that use CONST16 is not yet implemented. */
7057 direct_call_opcode = swap_callx_for_call_opcode (opcode);
7058 if (direct_call_opcode == XTENSA_UNDEFINED)
7061 /* Check and see that the target resolves. */
7062 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
7063 if (!r_reloc_is_defined (&r_rel))
7066 target_sec = r_reloc_get_section (&r_rel);
7067 target_offset = r_rel.target_offset;
7069 /* If the target is in a shared library, then it doesn't reach. This
7070 isn't supposed to come up because the compiler should never generate
7071 non-PIC calls on systems that use shared libraries, but the linker
7072 shouldn't crash regardless. */
7073 if (!target_sec->output_section)
7076 /* For relocatable sections, we can only simplify when the output
7077 section of the target is the same as the output section of the
7079 if (link_info->relocatable
7080 && (target_sec->output_section != sec->output_section
7081 || is_reloc_sym_weak (abfd, irel)))
7084 self_address = (sec->output_section->vma
7085 + sec->output_offset + irel->r_offset + 3);
7086 dest_address = (target_sec->output_section->vma
7087 + target_sec->output_offset + target_offset);
7089 *is_reachable_p = pcrel_reloc_fits (direct_call_opcode, 0,
7090 self_address, dest_address);
7092 if ((self_address >> CALL_SEGMENT_BITS) !=
7093 (dest_address >> CALL_SEGMENT_BITS))
7100 static Elf_Internal_Rela *
7101 find_associated_l32r_irel (bfd *abfd,
7104 Elf_Internal_Rela *other_irel,
7105 Elf_Internal_Rela *internal_relocs)
7109 for (i = 0; i < sec->reloc_count; i++)
7111 Elf_Internal_Rela *irel = &internal_relocs[i];
7113 if (irel == other_irel)
7115 if (irel->r_offset != other_irel->r_offset)
7117 if (is_l32r_relocation (abfd, sec, contents, irel))
7125 static xtensa_opcode *
7126 build_reloc_opcodes (bfd *abfd,
7129 Elf_Internal_Rela *internal_relocs)
7132 xtensa_opcode *reloc_opcodes =
7133 (xtensa_opcode *) bfd_malloc (sizeof (xtensa_opcode) * sec->reloc_count);
7134 for (i = 0; i < sec->reloc_count; i++)
7136 Elf_Internal_Rela *irel = &internal_relocs[i];
7137 reloc_opcodes[i] = get_relocation_opcode (abfd, sec, contents, irel);
7139 return reloc_opcodes;
7143 /* The compute_text_actions function will build a list of potential
7144 transformation actions for code in the extended basic block of each
7145 longcall that is optimized to a direct call. From this list we
7146 generate a set of actions to actually perform that optimizes for
7147 space and, if not using size_opt, maintains branch target
7150 These actions to be performed are placed on a per-section list.
7151 The actual changes are performed by relax_section() in the second
7155 compute_text_actions (bfd *abfd,
7157 struct bfd_link_info *link_info)
7159 xtensa_opcode *reloc_opcodes = NULL;
7160 xtensa_relax_info *relax_info;
7162 Elf_Internal_Rela *internal_relocs;
7163 bfd_boolean ok = TRUE;
7165 property_table_entry *prop_table = 0;
7167 bfd_size_type sec_size;
7169 relax_info = get_xtensa_relax_info (sec);
7170 BFD_ASSERT (relax_info);
7171 BFD_ASSERT (relax_info->src_next == relax_info->src_count);
7173 /* Do nothing if the section contains no optimized longcalls. */
7174 if (!relax_info->is_relaxable_asm_section)
7177 internal_relocs = retrieve_internal_relocs (abfd, sec,
7178 link_info->keep_memory);
7180 if (internal_relocs)
7181 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
7182 internal_reloc_compare);
7184 sec_size = bfd_get_section_limit (abfd, sec);
7185 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
7186 if (contents == NULL && sec_size != 0)
7192 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
7193 XTENSA_PROP_SEC_NAME, FALSE);
7200 for (i = 0; i < sec->reloc_count; i++)
7202 Elf_Internal_Rela *irel = &internal_relocs[i];
7204 property_table_entry *the_entry;
7207 ebb_constraint ebb_table;
7208 bfd_size_type simplify_size;
7210 if (irel && ELF32_R_TYPE (irel->r_info) != R_XTENSA_ASM_SIMPLIFY)
7212 r_offset = irel->r_offset;
7214 simplify_size = get_asm_simplify_size (contents, sec_size, r_offset);
7215 if (simplify_size == 0)
7217 (*_bfd_error_handler)
7218 (_("%B(%A+0x%lx): could not decode instruction for XTENSA_ASM_SIMPLIFY relocation; possible configuration mismatch"),
7219 sec->owner, sec, r_offset);
7223 /* If the instruction table is not around, then don't do this
7225 the_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
7226 sec->vma + irel->r_offset);
7227 if (the_entry == NULL || XTENSA_NO_NOP_REMOVAL)
7229 text_action_add (&relax_info->action_list,
7230 ta_convert_longcall, sec, r_offset,
7235 /* If the next longcall happens to be at the same address as an
7236 unreachable section of size 0, then skip forward. */
7237 ptbl_idx = the_entry - prop_table;
7238 while ((the_entry->flags & XTENSA_PROP_UNREACHABLE)
7239 && the_entry->size == 0
7240 && ptbl_idx + 1 < ptblsize
7241 && (prop_table[ptbl_idx + 1].address
7242 == prop_table[ptbl_idx].address))
7248 if (the_entry->flags & XTENSA_PROP_NO_TRANSFORM)
7249 /* NO_REORDER is OK */
7252 init_ebb_constraint (&ebb_table);
7253 ebb = &ebb_table.ebb;
7254 init_ebb (ebb, sec, contents, sec_size, prop_table, ptblsize,
7255 internal_relocs, sec->reloc_count);
7256 ebb->start_offset = r_offset + simplify_size;
7257 ebb->end_offset = r_offset + simplify_size;
7258 ebb->start_ptbl_idx = ptbl_idx;
7259 ebb->end_ptbl_idx = ptbl_idx;
7260 ebb->start_reloc_idx = i;
7261 ebb->end_reloc_idx = i;
7263 /* Precompute the opcode for each relocation. */
7264 if (reloc_opcodes == NULL)
7265 reloc_opcodes = build_reloc_opcodes (abfd, sec, contents,
7268 if (!extend_ebb_bounds (ebb)
7269 || !compute_ebb_proposed_actions (&ebb_table)
7270 || !compute_ebb_actions (&ebb_table)
7271 || !check_section_ebb_pcrels_fit (abfd, sec, contents,
7272 internal_relocs, &ebb_table,
7274 || !check_section_ebb_reduces (&ebb_table))
7276 /* If anything goes wrong or we get unlucky and something does
7277 not fit, with our plan because of expansion between
7278 critical branches, just convert to a NOP. */
7280 text_action_add (&relax_info->action_list,
7281 ta_convert_longcall, sec, r_offset, 0);
7282 i = ebb_table.ebb.end_reloc_idx;
7283 free_ebb_constraint (&ebb_table);
7287 text_action_add_proposed (&relax_info->action_list, &ebb_table, sec);
7289 /* Update the index so we do not go looking at the relocations
7290 we have already processed. */
7291 i = ebb_table.ebb.end_reloc_idx;
7292 free_ebb_constraint (&ebb_table);
7296 if (relax_info->action_list.head)
7297 print_action_list (stderr, &relax_info->action_list);
7301 release_contents (sec, contents);
7302 release_internal_relocs (sec, internal_relocs);
7306 free (reloc_opcodes);
7312 /* Do not widen an instruction if it is preceeded by a
7313 loop opcode. It might cause misalignment. */
7316 prev_instr_is_a_loop (bfd_byte *contents,
7317 bfd_size_type content_length,
7318 bfd_size_type offset)
7320 xtensa_opcode prev_opcode;
7324 prev_opcode = insn_decode_opcode (contents, content_length, offset-3, 0);
7325 return (xtensa_opcode_is_loop (xtensa_default_isa, prev_opcode) == 1);
7329 /* Find all of the possible actions for an extended basic block. */
7332 compute_ebb_proposed_actions (ebb_constraint *ebb_table)
7334 const ebb_t *ebb = &ebb_table->ebb;
7335 unsigned rel_idx = ebb->start_reloc_idx;
7336 property_table_entry *entry, *start_entry, *end_entry;
7338 xtensa_isa isa = xtensa_default_isa;
7340 static xtensa_insnbuf insnbuf = NULL;
7341 static xtensa_insnbuf slotbuf = NULL;
7343 if (insnbuf == NULL)
7345 insnbuf = xtensa_insnbuf_alloc (isa);
7346 slotbuf = xtensa_insnbuf_alloc (isa);
7349 start_entry = &ebb->ptbl[ebb->start_ptbl_idx];
7350 end_entry = &ebb->ptbl[ebb->end_ptbl_idx];
7352 for (entry = start_entry; entry <= end_entry; entry++)
7354 bfd_vma start_offset, end_offset;
7355 bfd_size_type insn_len;
7357 start_offset = entry->address - ebb->sec->vma;
7358 end_offset = entry->address + entry->size - ebb->sec->vma;
7360 if (entry == start_entry)
7361 start_offset = ebb->start_offset;
7362 if (entry == end_entry)
7363 end_offset = ebb->end_offset;
7364 offset = start_offset;
7366 if (offset == entry->address - ebb->sec->vma
7367 && (entry->flags & XTENSA_PROP_INSN_BRANCH_TARGET) != 0)
7369 enum ebb_target_enum align_type = EBB_DESIRE_TGT_ALIGN;
7370 BFD_ASSERT (offset != end_offset);
7371 if (offset == end_offset)
7374 insn_len = insn_decode_len (ebb->contents, ebb->content_length,
7379 if (check_branch_target_aligned_address (offset, insn_len))
7380 align_type = EBB_REQUIRE_TGT_ALIGN;
7382 ebb_propose_action (ebb_table, align_type, 0,
7383 ta_none, offset, 0, TRUE);
7386 while (offset != end_offset)
7388 Elf_Internal_Rela *irel;
7389 xtensa_opcode opcode;
7391 while (rel_idx < ebb->end_reloc_idx
7392 && (ebb->relocs[rel_idx].r_offset < offset
7393 || (ebb->relocs[rel_idx].r_offset == offset
7394 && (ELF32_R_TYPE (ebb->relocs[rel_idx].r_info)
7395 != R_XTENSA_ASM_SIMPLIFY))))
7398 /* Check for longcall. */
7399 irel = &ebb->relocs[rel_idx];
7400 if (irel->r_offset == offset
7401 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_ASM_SIMPLIFY)
7403 bfd_size_type simplify_size;
7405 simplify_size = get_asm_simplify_size (ebb->contents,
7406 ebb->content_length,
7408 if (simplify_size == 0)
7411 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7412 ta_convert_longcall, offset, 0, TRUE);
7414 offset += simplify_size;
7418 if (offset + MIN_INSN_LENGTH > ebb->content_length)
7420 xtensa_insnbuf_from_chars (isa, insnbuf, &ebb->contents[offset],
7421 ebb->content_length - offset);
7422 fmt = xtensa_format_decode (isa, insnbuf);
7423 if (fmt == XTENSA_UNDEFINED)
7425 insn_len = xtensa_format_length (isa, fmt);
7426 if (insn_len == (bfd_size_type) XTENSA_UNDEFINED)
7429 if (xtensa_format_num_slots (isa, fmt) != 1)
7435 xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf);
7436 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
7437 if (opcode == XTENSA_UNDEFINED)
7440 if ((entry->flags & XTENSA_PROP_INSN_NO_DENSITY) == 0
7441 && (entry->flags & XTENSA_PROP_NO_TRANSFORM) == 0
7442 && can_narrow_instruction (slotbuf, fmt, opcode) != 0)
7444 /* Add an instruction narrow action. */
7445 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7446 ta_narrow_insn, offset, 0, FALSE);
7448 else if ((entry->flags & XTENSA_PROP_NO_TRANSFORM) == 0
7449 && can_widen_instruction (slotbuf, fmt, opcode) != 0
7450 && ! prev_instr_is_a_loop (ebb->contents,
7451 ebb->content_length, offset))
7453 /* Add an instruction widen action. */
7454 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7455 ta_widen_insn, offset, 0, FALSE);
7457 else if (xtensa_opcode_is_loop (xtensa_default_isa, opcode) == 1)
7459 /* Check for branch targets. */
7460 ebb_propose_action (ebb_table, EBB_REQUIRE_LOOP_ALIGN, 0,
7461 ta_none, offset, 0, TRUE);
7468 if (ebb->ends_unreachable)
7470 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7471 ta_fill, ebb->end_offset, 0, TRUE);
7477 (*_bfd_error_handler)
7478 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
7479 ebb->sec->owner, ebb->sec, offset);
7484 /* After all of the information has collected about the
7485 transformations possible in an EBB, compute the appropriate actions
7486 here in compute_ebb_actions. We still must check later to make
7487 sure that the actions do not break any relocations. The algorithm
7488 used here is pretty greedy. Basically, it removes as many no-ops
7489 as possible so that the end of the EBB has the same alignment
7490 characteristics as the original. First, it uses narrowing, then
7491 fill space at the end of the EBB, and finally widenings. If that
7492 does not work, it tries again with one fewer no-op removed. The
7493 optimization will only be performed if all of the branch targets
7494 that were aligned before transformation are also aligned after the
7497 When the size_opt flag is set, ignore the branch target alignments,
7498 narrow all wide instructions, and remove all no-ops unless the end
7499 of the EBB prevents it. */
7502 compute_ebb_actions (ebb_constraint *ebb_table)
7506 int removed_bytes = 0;
7507 ebb_t *ebb = &ebb_table->ebb;
7508 unsigned seg_idx_start = 0;
7509 unsigned seg_idx_end = 0;
7511 /* We perform this like the assembler relaxation algorithm: Start by
7512 assuming all instructions are narrow and all no-ops removed; then
7515 /* For each segment of this that has a solid constraint, check to
7516 see if there are any combinations that will keep the constraint.
7518 for (seg_idx_end = 0; seg_idx_end < ebb_table->action_count; seg_idx_end++)
7520 bfd_boolean requires_text_end_align = FALSE;
7521 unsigned longcall_count = 0;
7522 unsigned longcall_convert_count = 0;
7523 unsigned narrowable_count = 0;
7524 unsigned narrowable_convert_count = 0;
7525 unsigned widenable_count = 0;
7526 unsigned widenable_convert_count = 0;
7528 proposed_action *action = NULL;
7529 int align = (1 << ebb_table->ebb.sec->alignment_power);
7531 seg_idx_start = seg_idx_end;
7533 for (i = seg_idx_start; i < ebb_table->action_count; i++)
7535 action = &ebb_table->actions[i];
7536 if (action->action == ta_convert_longcall)
7538 if (action->action == ta_narrow_insn)
7540 if (action->action == ta_widen_insn)
7542 if (action->action == ta_fill)
7544 if (action->align_type == EBB_REQUIRE_LOOP_ALIGN)
7546 if (action->align_type == EBB_REQUIRE_TGT_ALIGN
7547 && !elf32xtensa_size_opt)
7552 if (seg_idx_end == ebb_table->action_count && !ebb->ends_unreachable)
7553 requires_text_end_align = TRUE;
7555 if (elf32xtensa_size_opt && !requires_text_end_align
7556 && action->align_type != EBB_REQUIRE_LOOP_ALIGN
7557 && action->align_type != EBB_REQUIRE_TGT_ALIGN)
7559 longcall_convert_count = longcall_count;
7560 narrowable_convert_count = narrowable_count;
7561 widenable_convert_count = 0;
7565 /* There is a constraint. Convert the max number of longcalls. */
7566 narrowable_convert_count = 0;
7567 longcall_convert_count = 0;
7568 widenable_convert_count = 0;
7570 for (j = 0; j < longcall_count; j++)
7572 int removed = (longcall_count - j) * 3 & (align - 1);
7573 unsigned desire_narrow = (align - removed) & (align - 1);
7574 unsigned desire_widen = removed;
7575 if (desire_narrow <= narrowable_count)
7577 narrowable_convert_count = desire_narrow;
7578 narrowable_convert_count +=
7579 (align * ((narrowable_count - narrowable_convert_count)
7581 longcall_convert_count = (longcall_count - j);
7582 widenable_convert_count = 0;
7585 if (desire_widen <= widenable_count && !elf32xtensa_size_opt)
7587 narrowable_convert_count = 0;
7588 longcall_convert_count = longcall_count - j;
7589 widenable_convert_count = desire_widen;
7595 /* Now the number of conversions are saved. Do them. */
7596 for (i = seg_idx_start; i < seg_idx_end; i++)
7598 action = &ebb_table->actions[i];
7599 switch (action->action)
7601 case ta_convert_longcall:
7602 if (longcall_convert_count != 0)
7604 action->action = ta_remove_longcall;
7605 action->do_action = TRUE;
7606 action->removed_bytes += 3;
7607 longcall_convert_count--;
7610 case ta_narrow_insn:
7611 if (narrowable_convert_count != 0)
7613 action->do_action = TRUE;
7614 action->removed_bytes += 1;
7615 narrowable_convert_count--;
7619 if (widenable_convert_count != 0)
7621 action->do_action = TRUE;
7622 action->removed_bytes -= 1;
7623 widenable_convert_count--;
7632 /* Now we move on to some local opts. Try to remove each of the
7633 remaining longcalls. */
7635 if (ebb_table->ebb.ends_section || ebb_table->ebb.ends_unreachable)
7638 for (i = 0; i < ebb_table->action_count; i++)
7640 int old_removed_bytes = removed_bytes;
7641 proposed_action *action = &ebb_table->actions[i];
7643 if (action->do_action && action->action == ta_convert_longcall)
7645 bfd_boolean bad_alignment = FALSE;
7647 for (j = i + 1; j < ebb_table->action_count; j++)
7649 proposed_action *new_action = &ebb_table->actions[j];
7650 bfd_vma offset = new_action->offset;
7651 if (new_action->align_type == EBB_REQUIRE_TGT_ALIGN)
7653 if (!check_branch_target_aligned
7654 (ebb_table->ebb.contents,
7655 ebb_table->ebb.content_length,
7656 offset, offset - removed_bytes))
7658 bad_alignment = TRUE;
7662 if (new_action->align_type == EBB_REQUIRE_LOOP_ALIGN)
7664 if (!check_loop_aligned (ebb_table->ebb.contents,
7665 ebb_table->ebb.content_length,
7667 offset - removed_bytes))
7669 bad_alignment = TRUE;
7673 if (new_action->action == ta_narrow_insn
7674 && !new_action->do_action
7675 && ebb_table->ebb.sec->alignment_power == 2)
7677 /* Narrow an instruction and we are done. */
7678 new_action->do_action = TRUE;
7679 new_action->removed_bytes += 1;
7680 bad_alignment = FALSE;
7683 if (new_action->action == ta_widen_insn
7684 && new_action->do_action
7685 && ebb_table->ebb.sec->alignment_power == 2)
7687 /* Narrow an instruction and we are done. */
7688 new_action->do_action = FALSE;
7689 new_action->removed_bytes += 1;
7690 bad_alignment = FALSE;
7693 if (new_action->do_action)
7694 removed_bytes += new_action->removed_bytes;
7698 action->removed_bytes += 3;
7699 action->action = ta_remove_longcall;
7700 action->do_action = TRUE;
7703 removed_bytes = old_removed_bytes;
7704 if (action->do_action)
7705 removed_bytes += action->removed_bytes;
7710 for (i = 0; i < ebb_table->action_count; ++i)
7712 proposed_action *action = &ebb_table->actions[i];
7713 if (action->do_action)
7714 removed_bytes += action->removed_bytes;
7717 if ((removed_bytes % (1 << ebb_table->ebb.sec->alignment_power)) != 0
7718 && ebb->ends_unreachable)
7720 proposed_action *action;
7724 BFD_ASSERT (ebb_table->action_count != 0);
7725 action = &ebb_table->actions[ebb_table->action_count - 1];
7726 BFD_ASSERT (action->action == ta_fill);
7727 BFD_ASSERT (ebb->ends_unreachable->flags & XTENSA_PROP_UNREACHABLE);
7729 extra_space = compute_fill_extra_space (ebb->ends_unreachable);
7730 br = action->removed_bytes + removed_bytes + extra_space;
7731 br = br & ((1 << ebb->sec->alignment_power ) - 1);
7733 action->removed_bytes = extra_space - br;
7739 /* The xlate_map is a sorted array of address mappings designed to
7740 answer the offset_with_removed_text() query with a binary search instead
7741 of a linear search through the section's action_list. */
7743 typedef struct xlate_map_entry xlate_map_entry_t;
7744 typedef struct xlate_map xlate_map_t;
7746 struct xlate_map_entry
7748 unsigned orig_address;
7749 unsigned new_address;
7755 unsigned entry_count;
7756 xlate_map_entry_t *entry;
7761 xlate_compare (const void *a_v, const void *b_v)
7763 const xlate_map_entry_t *a = (const xlate_map_entry_t *) a_v;
7764 const xlate_map_entry_t *b = (const xlate_map_entry_t *) b_v;
7765 if (a->orig_address < b->orig_address)
7767 if (a->orig_address > (b->orig_address + b->size - 1))
7774 xlate_offset_with_removed_text (const xlate_map_t *map,
7775 text_action_list *action_list,
7778 xlate_map_entry_t tmp;
7780 xlate_map_entry_t *e;
7783 return offset_with_removed_text (action_list, offset);
7785 if (map->entry_count == 0)
7788 tmp.orig_address = offset;
7789 tmp.new_address = offset;
7792 r = bsearch (&offset, map->entry, map->entry_count,
7793 sizeof (xlate_map_entry_t), &xlate_compare);
7794 e = (xlate_map_entry_t *) r;
7796 BFD_ASSERT (e != NULL);
7799 return e->new_address - e->orig_address + offset;
7803 /* Build a binary searchable offset translation map from a section's
7806 static xlate_map_t *
7807 build_xlate_map (asection *sec, xtensa_relax_info *relax_info)
7809 xlate_map_t *map = (xlate_map_t *) bfd_malloc (sizeof (xlate_map_t));
7810 text_action_list *action_list = &relax_info->action_list;
7811 unsigned num_actions = 0;
7814 xlate_map_entry_t *current_entry;
7819 num_actions = action_list_count (action_list);
7820 map->entry = (xlate_map_entry_t *)
7821 bfd_malloc (sizeof (xlate_map_entry_t) * (num_actions + 1));
7822 if (map->entry == NULL)
7827 map->entry_count = 0;
7830 current_entry = &map->entry[0];
7832 current_entry->orig_address = 0;
7833 current_entry->new_address = 0;
7834 current_entry->size = 0;
7836 for (r = action_list->head; r != NULL; r = r->next)
7838 unsigned orig_size = 0;
7842 case ta_remove_insn:
7843 case ta_convert_longcall:
7844 case ta_remove_literal:
7845 case ta_add_literal:
7847 case ta_remove_longcall:
7850 case ta_narrow_insn:
7859 current_entry->size =
7860 r->offset + orig_size - current_entry->orig_address;
7861 if (current_entry->size != 0)
7866 current_entry->orig_address = r->offset + orig_size;
7867 removed += r->removed_bytes;
7868 current_entry->new_address = r->offset + orig_size - removed;
7869 current_entry->size = 0;
7872 current_entry->size = (bfd_get_section_limit (sec->owner, sec)
7873 - current_entry->orig_address);
7874 if (current_entry->size != 0)
7881 /* Free an offset translation map. */
7884 free_xlate_map (xlate_map_t *map)
7886 if (map && map->entry)
7893 /* Use check_section_ebb_pcrels_fit to make sure that all of the
7894 relocations in a section will fit if a proposed set of actions
7898 check_section_ebb_pcrels_fit (bfd *abfd,
7901 Elf_Internal_Rela *internal_relocs,
7902 const ebb_constraint *constraint,
7903 const xtensa_opcode *reloc_opcodes)
7906 Elf_Internal_Rela *irel;
7907 xlate_map_t *xmap = NULL;
7908 bfd_boolean ok = TRUE;
7909 xtensa_relax_info *relax_info;
7911 relax_info = get_xtensa_relax_info (sec);
7913 if (relax_info && sec->reloc_count > 100)
7915 xmap = build_xlate_map (sec, relax_info);
7916 /* NULL indicates out of memory, but the slow version
7917 can still be used. */
7920 for (i = 0; i < sec->reloc_count; i++)
7923 bfd_vma orig_self_offset, orig_target_offset;
7924 bfd_vma self_offset, target_offset;
7926 reloc_howto_type *howto;
7927 int self_removed_bytes, target_removed_bytes;
7929 irel = &internal_relocs[i];
7930 r_type = ELF32_R_TYPE (irel->r_info);
7932 howto = &elf_howto_table[r_type];
7933 /* We maintain the required invariant: PC-relative relocations
7934 that fit before linking must fit after linking. Thus we only
7935 need to deal with relocations to the same section that are
7937 if (r_type == R_XTENSA_ASM_SIMPLIFY
7938 || r_type == R_XTENSA_32_PCREL
7939 || !howto->pc_relative)
7942 r_reloc_init (&r_rel, abfd, irel, contents,
7943 bfd_get_section_limit (abfd, sec));
7945 if (r_reloc_get_section (&r_rel) != sec)
7948 orig_self_offset = irel->r_offset;
7949 orig_target_offset = r_rel.target_offset;
7951 self_offset = orig_self_offset;
7952 target_offset = orig_target_offset;
7957 xlate_offset_with_removed_text (xmap, &relax_info->action_list,
7960 xlate_offset_with_removed_text (xmap, &relax_info->action_list,
7961 orig_target_offset);
7964 self_removed_bytes = 0;
7965 target_removed_bytes = 0;
7967 for (j = 0; j < constraint->action_count; ++j)
7969 proposed_action *action = &constraint->actions[j];
7970 bfd_vma offset = action->offset;
7971 int removed_bytes = action->removed_bytes;
7972 if (offset < orig_self_offset
7973 || (offset == orig_self_offset && action->action == ta_fill
7974 && action->removed_bytes < 0))
7975 self_removed_bytes += removed_bytes;
7976 if (offset < orig_target_offset
7977 || (offset == orig_target_offset && action->action == ta_fill
7978 && action->removed_bytes < 0))
7979 target_removed_bytes += removed_bytes;
7981 self_offset -= self_removed_bytes;
7982 target_offset -= target_removed_bytes;
7984 /* Try to encode it. Get the operand and check. */
7985 if (is_alt_relocation (ELF32_R_TYPE (irel->r_info)))
7987 /* None of the current alternate relocs are PC-relative,
7988 and only PC-relative relocs matter here. */
7992 xtensa_opcode opcode;
7996 opcode = reloc_opcodes[i];
7998 opcode = get_relocation_opcode (abfd, sec, contents, irel);
7999 if (opcode == XTENSA_UNDEFINED)
8005 opnum = get_relocation_opnd (opcode, ELF32_R_TYPE (irel->r_info));
8006 if (opnum == XTENSA_UNDEFINED)
8012 if (!pcrel_reloc_fits (opcode, opnum, self_offset, target_offset))
8021 free_xlate_map (xmap);
8028 check_section_ebb_reduces (const ebb_constraint *constraint)
8033 for (i = 0; i < constraint->action_count; i++)
8035 const proposed_action *action = &constraint->actions[i];
8036 if (action->do_action)
8037 removed += action->removed_bytes;
8047 text_action_add_proposed (text_action_list *l,
8048 const ebb_constraint *ebb_table,
8053 for (i = 0; i < ebb_table->action_count; i++)
8055 proposed_action *action = &ebb_table->actions[i];
8057 if (!action->do_action)
8059 switch (action->action)
8061 case ta_remove_insn:
8062 case ta_remove_longcall:
8063 case ta_convert_longcall:
8064 case ta_narrow_insn:
8067 case ta_remove_literal:
8068 text_action_add (l, action->action, sec, action->offset,
8069 action->removed_bytes);
8082 compute_fill_extra_space (property_table_entry *entry)
8084 int fill_extra_space;
8089 if ((entry->flags & XTENSA_PROP_UNREACHABLE) == 0)
8092 fill_extra_space = entry->size;
8093 if ((entry->flags & XTENSA_PROP_ALIGN) != 0)
8095 /* Fill bytes for alignment:
8096 (2**n)-1 - (addr + (2**n)-1) & (2**n -1) */
8097 int pow = GET_XTENSA_PROP_ALIGNMENT (entry->flags);
8098 int nsm = (1 << pow) - 1;
8099 bfd_vma addr = entry->address + entry->size;
8100 bfd_vma align_fill = nsm - ((addr + nsm) & nsm);
8101 fill_extra_space += align_fill;
8103 return fill_extra_space;
8107 /* First relaxation pass. */
8109 /* If the section contains relaxable literals, check each literal to
8110 see if it has the same value as another literal that has already
8111 been seen, either in the current section or a previous one. If so,
8112 add an entry to the per-section list of removed literals. The
8113 actual changes are deferred until the next pass. */
8116 compute_removed_literals (bfd *abfd,
8118 struct bfd_link_info *link_info,
8119 value_map_hash_table *values)
8121 xtensa_relax_info *relax_info;
8123 Elf_Internal_Rela *internal_relocs;
8124 source_reloc *src_relocs, *rel;
8125 bfd_boolean ok = TRUE;
8126 property_table_entry *prop_table = NULL;
8129 bfd_boolean last_loc_is_prev = FALSE;
8130 bfd_vma last_target_offset = 0;
8131 section_cache_t target_sec_cache;
8132 bfd_size_type sec_size;
8134 init_section_cache (&target_sec_cache);
8136 /* Do nothing if it is not a relaxable literal section. */
8137 relax_info = get_xtensa_relax_info (sec);
8138 BFD_ASSERT (relax_info);
8139 if (!relax_info->is_relaxable_literal_section)
8142 internal_relocs = retrieve_internal_relocs (abfd, sec,
8143 link_info->keep_memory);
8145 sec_size = bfd_get_section_limit (abfd, sec);
8146 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
8147 if (contents == NULL && sec_size != 0)
8153 /* Sort the source_relocs by target offset. */
8154 src_relocs = relax_info->src_relocs;
8155 qsort (src_relocs, relax_info->src_count,
8156 sizeof (source_reloc), source_reloc_compare);
8157 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
8158 internal_reloc_compare);
8160 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
8161 XTENSA_PROP_SEC_NAME, FALSE);
8169 for (i = 0; i < relax_info->src_count; i++)
8171 Elf_Internal_Rela *irel = NULL;
8173 rel = &src_relocs[i];
8174 if (get_l32r_opcode () != rel->opcode)
8176 irel = get_irel_at_offset (sec, internal_relocs,
8177 rel->r_rel.target_offset);
8179 /* If the relocation on this is not a simple R_XTENSA_32 or
8180 R_XTENSA_PLT then do not consider it. This may happen when
8181 the difference of two symbols is used in a literal. */
8182 if (irel && (ELF32_R_TYPE (irel->r_info) != R_XTENSA_32
8183 && ELF32_R_TYPE (irel->r_info) != R_XTENSA_PLT))
8186 /* If the target_offset for this relocation is the same as the
8187 previous relocation, then we've already considered whether the
8188 literal can be coalesced. Skip to the next one.... */
8189 if (i != 0 && prev_i != -1
8190 && src_relocs[i-1].r_rel.target_offset == rel->r_rel.target_offset)
8194 if (last_loc_is_prev &&
8195 last_target_offset + 4 != rel->r_rel.target_offset)
8196 last_loc_is_prev = FALSE;
8198 /* Check if the relocation was from an L32R that is being removed
8199 because a CALLX was converted to a direct CALL, and check if
8200 there are no other relocations to the literal. */
8201 if (is_removable_literal (rel, i, src_relocs, relax_info->src_count,
8202 sec, prop_table, ptblsize))
8204 if (!remove_dead_literal (abfd, sec, link_info, internal_relocs,
8205 irel, rel, prop_table, ptblsize))
8210 last_target_offset = rel->r_rel.target_offset;
8214 if (!identify_literal_placement (abfd, sec, contents, link_info,
8216 &last_loc_is_prev, irel,
8217 relax_info->src_count - i, rel,
8218 prop_table, ptblsize,
8219 &target_sec_cache, rel->is_abs_literal))
8224 last_target_offset = rel->r_rel.target_offset;
8228 print_removed_literals (stderr, &relax_info->removed_list);
8229 print_action_list (stderr, &relax_info->action_list);
8233 if (prop_table) free (prop_table);
8234 clear_section_cache (&target_sec_cache);
8236 release_contents (sec, contents);
8237 release_internal_relocs (sec, internal_relocs);
8242 static Elf_Internal_Rela *
8243 get_irel_at_offset (asection *sec,
8244 Elf_Internal_Rela *internal_relocs,
8248 Elf_Internal_Rela *irel;
8250 Elf_Internal_Rela key;
8252 if (!internal_relocs)
8255 key.r_offset = offset;
8256 irel = bsearch (&key, internal_relocs, sec->reloc_count,
8257 sizeof (Elf_Internal_Rela), internal_reloc_matches);
8261 /* bsearch does not guarantee which will be returned if there are
8262 multiple matches. We need the first that is not an alignment. */
8263 i = irel - internal_relocs;
8266 if (internal_relocs[i-1].r_offset != offset)
8270 for ( ; i < sec->reloc_count; i++)
8272 irel = &internal_relocs[i];
8273 r_type = ELF32_R_TYPE (irel->r_info);
8274 if (irel->r_offset == offset && r_type != R_XTENSA_NONE)
8283 is_removable_literal (const source_reloc *rel,
8285 const source_reloc *src_relocs,
8288 property_table_entry *prop_table,
8291 const source_reloc *curr_rel;
8292 property_table_entry *entry;
8297 entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8298 sec->vma + rel->r_rel.target_offset);
8299 if (entry && (entry->flags & XTENSA_PROP_NO_TRANSFORM))
8302 for (++i; i < src_count; ++i)
8304 curr_rel = &src_relocs[i];
8305 /* If all others have the same target offset.... */
8306 if (curr_rel->r_rel.target_offset != rel->r_rel.target_offset)
8309 if (!curr_rel->is_null
8310 && !xtensa_is_property_section (curr_rel->source_sec)
8311 && !(curr_rel->source_sec->flags & SEC_DEBUGGING))
8319 remove_dead_literal (bfd *abfd,
8321 struct bfd_link_info *link_info,
8322 Elf_Internal_Rela *internal_relocs,
8323 Elf_Internal_Rela *irel,
8325 property_table_entry *prop_table,
8328 property_table_entry *entry;
8329 xtensa_relax_info *relax_info;
8331 relax_info = get_xtensa_relax_info (sec);
8335 entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8336 sec->vma + rel->r_rel.target_offset);
8338 /* Mark the unused literal so that it will be removed. */
8339 add_removed_literal (&relax_info->removed_list, &rel->r_rel, NULL);
8341 text_action_add (&relax_info->action_list,
8342 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
8344 /* If the section is 4-byte aligned, do not add fill. */
8345 if (sec->alignment_power > 2)
8347 int fill_extra_space;
8348 bfd_vma entry_sec_offset;
8350 property_table_entry *the_add_entry;
8354 entry_sec_offset = entry->address - sec->vma + entry->size;
8356 entry_sec_offset = rel->r_rel.target_offset + 4;
8358 /* If the literal range is at the end of the section,
8360 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8362 fill_extra_space = compute_fill_extra_space (the_add_entry);
8364 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
8365 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
8366 -4, fill_extra_space);
8368 adjust_fill_action (fa, removed_diff);
8370 text_action_add (&relax_info->action_list,
8371 ta_fill, sec, entry_sec_offset, removed_diff);
8374 /* Zero out the relocation on this literal location. */
8377 if (elf_hash_table (link_info)->dynamic_sections_created)
8378 shrink_dynamic_reloc_sections (link_info, abfd, sec, irel);
8380 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
8381 pin_internal_relocs (sec, internal_relocs);
8384 /* Do not modify "last_loc_is_prev". */
8390 identify_literal_placement (bfd *abfd,
8393 struct bfd_link_info *link_info,
8394 value_map_hash_table *values,
8395 bfd_boolean *last_loc_is_prev_p,
8396 Elf_Internal_Rela *irel,
8397 int remaining_src_rels,
8399 property_table_entry *prop_table,
8401 section_cache_t *target_sec_cache,
8402 bfd_boolean is_abs_literal)
8406 xtensa_relax_info *relax_info;
8407 bfd_boolean literal_placed = FALSE;
8409 unsigned long value;
8410 bfd_boolean final_static_link;
8411 bfd_size_type sec_size;
8413 relax_info = get_xtensa_relax_info (sec);
8417 sec_size = bfd_get_section_limit (abfd, sec);
8420 (!link_info->relocatable
8421 && !elf_hash_table (link_info)->dynamic_sections_created);
8423 /* The placement algorithm first checks to see if the literal is
8424 already in the value map. If so and the value map is reachable
8425 from all uses, then the literal is moved to that location. If
8426 not, then we identify the last location where a fresh literal was
8427 placed. If the literal can be safely moved there, then we do so.
8428 If not, then we assume that the literal is not to move and leave
8429 the literal where it is, marking it as the last literal
8432 /* Find the literal value. */
8434 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
8437 BFD_ASSERT (rel->r_rel.target_offset < sec_size);
8438 value = bfd_get_32 (abfd, contents + rel->r_rel.target_offset);
8440 init_literal_value (&val, &r_rel, value, is_abs_literal);
8442 /* Check if we've seen another literal with the same value that
8443 is in the same output section. */
8444 val_map = value_map_get_cached_value (values, &val, final_static_link);
8447 && (r_reloc_get_section (&val_map->loc)->output_section
8448 == sec->output_section)
8449 && relocations_reach (rel, remaining_src_rels, &val_map->loc)
8450 && coalesce_shared_literal (sec, rel, prop_table, ptblsize, val_map))
8452 /* No change to last_loc_is_prev. */
8453 literal_placed = TRUE;
8456 /* For relocatable links, do not try to move literals. To do it
8457 correctly might increase the number of relocations in an input
8458 section making the default relocatable linking fail. */
8459 if (!link_info->relocatable && !literal_placed
8460 && values->has_last_loc && !(*last_loc_is_prev_p))
8462 asection *target_sec = r_reloc_get_section (&values->last_loc);
8463 if (target_sec && target_sec->output_section == sec->output_section)
8465 /* Increment the virtual offset. */
8466 r_reloc try_loc = values->last_loc;
8467 try_loc.virtual_offset += 4;
8469 /* There is a last loc that was in the same output section. */
8470 if (relocations_reach (rel, remaining_src_rels, &try_loc)
8471 && move_shared_literal (sec, link_info, rel,
8472 prop_table, ptblsize,
8473 &try_loc, &val, target_sec_cache))
8475 values->last_loc.virtual_offset += 4;
8476 literal_placed = TRUE;
8478 val_map = add_value_map (values, &val, &try_loc,
8481 val_map->loc = try_loc;
8486 if (!literal_placed)
8488 /* Nothing worked, leave the literal alone but update the last loc. */
8489 values->has_last_loc = TRUE;
8490 values->last_loc = rel->r_rel;
8492 val_map = add_value_map (values, &val, &rel->r_rel, final_static_link);
8494 val_map->loc = rel->r_rel;
8495 *last_loc_is_prev_p = TRUE;
8502 /* Check if the original relocations (presumably on L32R instructions)
8503 identified by reloc[0..N] can be changed to reference the literal
8504 identified by r_rel. If r_rel is out of range for any of the
8505 original relocations, then we don't want to coalesce the original
8506 literal with the one at r_rel. We only check reloc[0..N], where the
8507 offsets are all the same as for reloc[0] (i.e., they're all
8508 referencing the same literal) and where N is also bounded by the
8509 number of remaining entries in the "reloc" array. The "reloc" array
8510 is sorted by target offset so we know all the entries for the same
8511 literal will be contiguous. */
8514 relocations_reach (source_reloc *reloc,
8515 int remaining_relocs,
8516 const r_reloc *r_rel)
8518 bfd_vma from_offset, source_address, dest_address;
8522 if (!r_reloc_is_defined (r_rel))
8525 sec = r_reloc_get_section (r_rel);
8526 from_offset = reloc[0].r_rel.target_offset;
8528 for (i = 0; i < remaining_relocs; i++)
8530 if (reloc[i].r_rel.target_offset != from_offset)
8533 /* Ignore relocations that have been removed. */
8534 if (reloc[i].is_null)
8537 /* The original and new output section for these must be the same
8538 in order to coalesce. */
8539 if (r_reloc_get_section (&reloc[i].r_rel)->output_section
8540 != sec->output_section)
8543 /* Absolute literals in the same output section can always be
8545 if (reloc[i].is_abs_literal)
8548 /* A literal with no PC-relative relocations can be moved anywhere. */
8549 if (reloc[i].opnd != -1)
8551 /* Otherwise, check to see that it fits. */
8552 source_address = (reloc[i].source_sec->output_section->vma
8553 + reloc[i].source_sec->output_offset
8554 + reloc[i].r_rel.rela.r_offset);
8555 dest_address = (sec->output_section->vma
8556 + sec->output_offset
8557 + r_rel->target_offset);
8559 if (!pcrel_reloc_fits (reloc[i].opcode, reloc[i].opnd,
8560 source_address, dest_address))
8569 /* Move a literal to another literal location because it is
8570 the same as the other literal value. */
8573 coalesce_shared_literal (asection *sec,
8575 property_table_entry *prop_table,
8579 property_table_entry *entry;
8581 property_table_entry *the_add_entry;
8583 xtensa_relax_info *relax_info;
8585 relax_info = get_xtensa_relax_info (sec);
8589 entry = elf_xtensa_find_property_entry
8590 (prop_table, ptblsize, sec->vma + rel->r_rel.target_offset);
8591 if (entry && (entry->flags & XTENSA_PROP_NO_TRANSFORM))
8594 /* Mark that the literal will be coalesced. */
8595 add_removed_literal (&relax_info->removed_list, &rel->r_rel, &val_map->loc);
8597 text_action_add (&relax_info->action_list,
8598 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
8600 /* If the section is 4-byte aligned, do not add fill. */
8601 if (sec->alignment_power > 2)
8603 int fill_extra_space;
8604 bfd_vma entry_sec_offset;
8607 entry_sec_offset = entry->address - sec->vma + entry->size;
8609 entry_sec_offset = rel->r_rel.target_offset + 4;
8611 /* If the literal range is at the end of the section,
8613 fill_extra_space = 0;
8614 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8616 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
8617 fill_extra_space = the_add_entry->size;
8619 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
8620 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
8621 -4, fill_extra_space);
8623 adjust_fill_action (fa, removed_diff);
8625 text_action_add (&relax_info->action_list,
8626 ta_fill, sec, entry_sec_offset, removed_diff);
8633 /* Move a literal to another location. This may actually increase the
8634 total amount of space used because of alignments so we need to do
8635 this carefully. Also, it may make a branch go out of range. */
8638 move_shared_literal (asection *sec,
8639 struct bfd_link_info *link_info,
8641 property_table_entry *prop_table,
8643 const r_reloc *target_loc,
8644 const literal_value *lit_value,
8645 section_cache_t *target_sec_cache)
8647 property_table_entry *the_add_entry, *src_entry, *target_entry = NULL;
8648 text_action *fa, *target_fa;
8650 xtensa_relax_info *relax_info, *target_relax_info;
8651 asection *target_sec;
8653 ebb_constraint ebb_table;
8654 bfd_boolean relocs_fit;
8656 /* If this routine always returns FALSE, the literals that cannot be
8657 coalesced will not be moved. */
8658 if (elf32xtensa_no_literal_movement)
8661 relax_info = get_xtensa_relax_info (sec);
8665 target_sec = r_reloc_get_section (target_loc);
8666 target_relax_info = get_xtensa_relax_info (target_sec);
8668 /* Literals to undefined sections may not be moved because they
8669 must report an error. */
8670 if (bfd_is_und_section (target_sec))
8673 src_entry = elf_xtensa_find_property_entry
8674 (prop_table, ptblsize, sec->vma + rel->r_rel.target_offset);
8676 if (!section_cache_section (target_sec_cache, target_sec, link_info))
8679 target_entry = elf_xtensa_find_property_entry
8680 (target_sec_cache->ptbl, target_sec_cache->pte_count,
8681 target_sec->vma + target_loc->target_offset);
8686 /* Make sure that we have not broken any branches. */
8689 init_ebb_constraint (&ebb_table);
8690 ebb = &ebb_table.ebb;
8691 init_ebb (ebb, target_sec_cache->sec, target_sec_cache->contents,
8692 target_sec_cache->content_length,
8693 target_sec_cache->ptbl, target_sec_cache->pte_count,
8694 target_sec_cache->relocs, target_sec_cache->reloc_count);
8696 /* Propose to add 4 bytes + worst-case alignment size increase to
8698 ebb_propose_action (&ebb_table, EBB_NO_ALIGN, 0,
8699 ta_fill, target_loc->target_offset,
8700 -4 - (1 << target_sec->alignment_power), TRUE);
8702 /* Check all of the PC-relative relocations to make sure they still fit. */
8703 relocs_fit = check_section_ebb_pcrels_fit (target_sec->owner, target_sec,
8704 target_sec_cache->contents,
8705 target_sec_cache->relocs,
8711 text_action_add_literal (&target_relax_info->action_list,
8712 ta_add_literal, target_loc, lit_value, -4);
8714 if (target_sec->alignment_power > 2 && target_entry != src_entry)
8716 /* May need to add or remove some fill to maintain alignment. */
8717 int fill_extra_space;
8718 bfd_vma entry_sec_offset;
8721 target_entry->address - target_sec->vma + target_entry->size;
8723 /* If the literal range is at the end of the section,
8725 fill_extra_space = 0;
8727 elf_xtensa_find_property_entry (target_sec_cache->ptbl,
8728 target_sec_cache->pte_count,
8730 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
8731 fill_extra_space = the_add_entry->size;
8733 target_fa = find_fill_action (&target_relax_info->action_list,
8734 target_sec, entry_sec_offset);
8735 removed_diff = compute_removed_action_diff (target_fa, target_sec,
8736 entry_sec_offset, 4,
8739 adjust_fill_action (target_fa, removed_diff);
8741 text_action_add (&target_relax_info->action_list,
8742 ta_fill, target_sec, entry_sec_offset, removed_diff);
8745 /* Mark that the literal will be moved to the new location. */
8746 add_removed_literal (&relax_info->removed_list, &rel->r_rel, target_loc);
8748 /* Remove the literal. */
8749 text_action_add (&relax_info->action_list,
8750 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
8752 /* If the section is 4-byte aligned, do not add fill. */
8753 if (sec->alignment_power > 2 && target_entry != src_entry)
8755 int fill_extra_space;
8756 bfd_vma entry_sec_offset;
8759 entry_sec_offset = src_entry->address - sec->vma + src_entry->size;
8761 entry_sec_offset = rel->r_rel.target_offset+4;
8763 /* If the literal range is at the end of the section,
8765 fill_extra_space = 0;
8766 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8768 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
8769 fill_extra_space = the_add_entry->size;
8771 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
8772 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
8773 -4, fill_extra_space);
8775 adjust_fill_action (fa, removed_diff);
8777 text_action_add (&relax_info->action_list,
8778 ta_fill, sec, entry_sec_offset, removed_diff);
8785 /* Second relaxation pass. */
8787 /* Modify all of the relocations to point to the right spot, and if this
8788 is a relaxable section, delete the unwanted literals and fix the
8792 relax_section (bfd *abfd, asection *sec, struct bfd_link_info *link_info)
8794 Elf_Internal_Rela *internal_relocs;
8795 xtensa_relax_info *relax_info;
8797 bfd_boolean ok = TRUE;
8799 bfd_boolean rv = FALSE;
8800 bfd_boolean virtual_action;
8801 bfd_size_type sec_size;
8803 sec_size = bfd_get_section_limit (abfd, sec);
8804 relax_info = get_xtensa_relax_info (sec);
8805 BFD_ASSERT (relax_info);
8807 /* First translate any of the fixes that have been added already. */
8808 translate_section_fixes (sec);
8810 /* Handle property sections (e.g., literal tables) specially. */
8811 if (xtensa_is_property_section (sec))
8813 BFD_ASSERT (!relax_info->is_relaxable_literal_section);
8814 return relax_property_section (abfd, sec, link_info);
8817 internal_relocs = retrieve_internal_relocs (abfd, sec,
8818 link_info->keep_memory);
8819 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
8820 if (contents == NULL && sec_size != 0)
8826 if (internal_relocs)
8828 for (i = 0; i < sec->reloc_count; i++)
8830 Elf_Internal_Rela *irel;
8831 xtensa_relax_info *target_relax_info;
8832 bfd_vma source_offset, old_source_offset;
8835 asection *target_sec;
8837 /* Locally change the source address.
8838 Translate the target to the new target address.
8839 If it points to this section and has been removed,
8843 irel = &internal_relocs[i];
8844 source_offset = irel->r_offset;
8845 old_source_offset = source_offset;
8847 r_type = ELF32_R_TYPE (irel->r_info);
8848 r_reloc_init (&r_rel, abfd, irel, contents,
8849 bfd_get_section_limit (abfd, sec));
8851 /* If this section could have changed then we may need to
8852 change the relocation's offset. */
8854 if (relax_info->is_relaxable_literal_section
8855 || relax_info->is_relaxable_asm_section)
8857 pin_internal_relocs (sec, internal_relocs);
8859 if (r_type != R_XTENSA_NONE
8860 && find_removed_literal (&relax_info->removed_list,
8863 /* Remove this relocation. */
8864 if (elf_hash_table (link_info)->dynamic_sections_created)
8865 shrink_dynamic_reloc_sections (link_info, abfd, sec, irel);
8866 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
8867 irel->r_offset = offset_with_removed_text
8868 (&relax_info->action_list, irel->r_offset);
8872 if (r_type == R_XTENSA_ASM_SIMPLIFY)
8874 text_action *action =
8875 find_insn_action (&relax_info->action_list,
8877 if (action && (action->action == ta_convert_longcall
8878 || action->action == ta_remove_longcall))
8880 bfd_reloc_status_type retval;
8881 char *error_message = NULL;
8883 retval = contract_asm_expansion (contents, sec_size,
8884 irel, &error_message);
8885 if (retval != bfd_reloc_ok)
8887 (*link_info->callbacks->reloc_dangerous)
8888 (link_info, error_message, abfd, sec,
8892 /* Update the action so that the code that moves
8893 the contents will do the right thing. */
8894 if (action->action == ta_remove_longcall)
8895 action->action = ta_remove_insn;
8897 action->action = ta_none;
8898 /* Refresh the info in the r_rel. */
8899 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
8900 r_type = ELF32_R_TYPE (irel->r_info);
8904 source_offset = offset_with_removed_text
8905 (&relax_info->action_list, irel->r_offset);
8906 irel->r_offset = source_offset;
8909 /* If the target section could have changed then
8910 we may need to change the relocation's target offset. */
8912 target_sec = r_reloc_get_section (&r_rel);
8914 /* For a reference to a discarded section from a DWARF section,
8915 i.e., where action_discarded is PRETEND, the symbol will
8916 eventually be modified to refer to the kept section (at least if
8917 the kept and discarded sections are the same size). Anticipate
8918 that here and adjust things accordingly. */
8919 if (! elf_xtensa_ignore_discarded_relocs (sec)
8920 && elf_xtensa_action_discarded (sec) == PRETEND
8921 && sec->sec_info_type != ELF_INFO_TYPE_STABS
8922 && target_sec != NULL
8923 && elf_discarded_section (target_sec))
8925 /* It would be natural to call _bfd_elf_check_kept_section
8926 here, but it's not exported from elflink.c. It's also a
8927 fairly expensive check. Adjusting the relocations to the
8928 discarded section is fairly harmless; it will only adjust
8929 some addends and difference values. If it turns out that
8930 _bfd_elf_check_kept_section fails later, it won't matter,
8931 so just compare the section names to find the right group
8933 asection *kept = target_sec->kept_section;
8936 if ((kept->flags & SEC_GROUP) != 0)
8938 asection *first = elf_next_in_group (kept);
8939 asection *s = first;
8944 if (strcmp (s->name, target_sec->name) == 0)
8949 s = elf_next_in_group (s);
8956 && ((target_sec->rawsize != 0
8957 ? target_sec->rawsize : target_sec->size)
8958 == (kept->rawsize != 0 ? kept->rawsize : kept->size)))
8962 target_relax_info = get_xtensa_relax_info (target_sec);
8963 if (target_relax_info
8964 && (target_relax_info->is_relaxable_literal_section
8965 || target_relax_info->is_relaxable_asm_section))
8968 target_sec = translate_reloc (&r_rel, &new_reloc, target_sec);
8970 if (r_type == R_XTENSA_DIFF8
8971 || r_type == R_XTENSA_DIFF16
8972 || r_type == R_XTENSA_DIFF32)
8974 bfd_vma diff_value = 0, new_end_offset, diff_mask = 0;
8976 if (bfd_get_section_limit (abfd, sec) < old_source_offset)
8978 (*link_info->callbacks->reloc_dangerous)
8979 (link_info, _("invalid relocation address"),
8980 abfd, sec, old_source_offset);
8986 case R_XTENSA_DIFF8:
8988 bfd_get_8 (abfd, &contents[old_source_offset]);
8990 case R_XTENSA_DIFF16:
8992 bfd_get_16 (abfd, &contents[old_source_offset]);
8994 case R_XTENSA_DIFF32:
8996 bfd_get_32 (abfd, &contents[old_source_offset]);
9000 new_end_offset = offset_with_removed_text
9001 (&target_relax_info->action_list,
9002 r_rel.target_offset + diff_value);
9003 diff_value = new_end_offset - new_reloc.target_offset;
9007 case R_XTENSA_DIFF8:
9009 bfd_put_8 (abfd, diff_value,
9010 &contents[old_source_offset]);
9012 case R_XTENSA_DIFF16:
9014 bfd_put_16 (abfd, diff_value,
9015 &contents[old_source_offset]);
9017 case R_XTENSA_DIFF32:
9018 diff_mask = 0xffffffff;
9019 bfd_put_32 (abfd, diff_value,
9020 &contents[old_source_offset]);
9024 /* Check for overflow. */
9025 if ((diff_value & ~diff_mask) != 0)
9027 (*link_info->callbacks->reloc_dangerous)
9028 (link_info, _("overflow after relaxation"),
9029 abfd, sec, old_source_offset);
9033 pin_contents (sec, contents);
9036 /* If the relocation still references a section in the same
9037 input file, modify the relocation directly instead of
9038 adding a "fix" record. */
9039 if (target_sec->owner == abfd)
9041 unsigned r_symndx = ELF32_R_SYM (new_reloc.rela.r_info);
9042 irel->r_info = ELF32_R_INFO (r_symndx, r_type);
9043 irel->r_addend = new_reloc.rela.r_addend;
9044 pin_internal_relocs (sec, internal_relocs);
9048 bfd_vma addend_displacement;
9051 addend_displacement =
9052 new_reloc.target_offset + new_reloc.virtual_offset;
9053 fix = reloc_bfd_fix_init (sec, source_offset, r_type,
9055 addend_displacement, TRUE);
9062 if ((relax_info->is_relaxable_literal_section
9063 || relax_info->is_relaxable_asm_section)
9064 && relax_info->action_list.head)
9066 /* Walk through the planned actions and build up a table
9067 of move, copy and fill records. Use the move, copy and
9068 fill records to perform the actions once. */
9071 bfd_size_type final_size, copy_size, orig_insn_size;
9072 bfd_byte *scratch = NULL;
9073 bfd_byte *dup_contents = NULL;
9074 bfd_size_type orig_size = sec->size;
9075 bfd_vma orig_dot = 0;
9076 bfd_vma orig_dot_copied = 0; /* Byte copied already from
9077 orig dot in physical memory. */
9078 bfd_vma orig_dot_vo = 0; /* Virtual offset from orig_dot. */
9079 bfd_vma dup_dot = 0;
9081 text_action *action = relax_info->action_list.head;
9083 final_size = sec->size;
9084 for (action = relax_info->action_list.head; action;
9085 action = action->next)
9087 final_size -= action->removed_bytes;
9090 scratch = (bfd_byte *) bfd_zmalloc (final_size);
9091 dup_contents = (bfd_byte *) bfd_zmalloc (final_size);
9093 /* The dot is the current fill location. */
9095 print_action_list (stderr, &relax_info->action_list);
9098 for (action = relax_info->action_list.head; action;
9099 action = action->next)
9101 virtual_action = FALSE;
9102 if (action->offset > orig_dot)
9104 orig_dot += orig_dot_copied;
9105 orig_dot_copied = 0;
9107 /* Out of the virtual world. */
9110 if (action->offset > orig_dot)
9112 copy_size = action->offset - orig_dot;
9113 memmove (&dup_contents[dup_dot], &contents[orig_dot], copy_size);
9114 orig_dot += copy_size;
9115 dup_dot += copy_size;
9116 BFD_ASSERT (action->offset == orig_dot);
9118 else if (action->offset < orig_dot)
9120 if (action->action == ta_fill
9121 && action->offset - action->removed_bytes == orig_dot)
9123 /* This is OK because the fill only effects the dup_dot. */
9125 else if (action->action == ta_add_literal)
9127 /* TBD. Might need to handle this. */
9130 if (action->offset == orig_dot)
9132 if (action->virtual_offset > orig_dot_vo)
9134 if (orig_dot_vo == 0)
9136 /* Need to copy virtual_offset bytes. Probably four. */
9137 copy_size = action->virtual_offset - orig_dot_vo;
9138 memmove (&dup_contents[dup_dot],
9139 &contents[orig_dot], copy_size);
9140 orig_dot_copied = copy_size;
9141 dup_dot += copy_size;
9143 virtual_action = TRUE;
9146 BFD_ASSERT (action->virtual_offset <= orig_dot_vo);
9148 switch (action->action)
9150 case ta_remove_literal:
9151 case ta_remove_insn:
9152 BFD_ASSERT (action->removed_bytes >= 0);
9153 orig_dot += action->removed_bytes;
9156 case ta_narrow_insn:
9159 memmove (scratch, &contents[orig_dot], orig_insn_size);
9160 BFD_ASSERT (action->removed_bytes == 1);
9161 rv = narrow_instruction (scratch, final_size, 0);
9163 memmove (&dup_contents[dup_dot], scratch, copy_size);
9164 orig_dot += orig_insn_size;
9165 dup_dot += copy_size;
9169 if (action->removed_bytes >= 0)
9170 orig_dot += action->removed_bytes;
9173 /* Already zeroed in dup_contents. Just bump the
9175 dup_dot += (-action->removed_bytes);
9180 BFD_ASSERT (action->removed_bytes == 0);
9183 case ta_convert_longcall:
9184 case ta_remove_longcall:
9185 /* These will be removed or converted before we get here. */
9192 memmove (scratch, &contents[orig_dot], orig_insn_size);
9193 BFD_ASSERT (action->removed_bytes == -1);
9194 rv = widen_instruction (scratch, final_size, 0);
9196 memmove (&dup_contents[dup_dot], scratch, copy_size);
9197 orig_dot += orig_insn_size;
9198 dup_dot += copy_size;
9201 case ta_add_literal:
9204 BFD_ASSERT (action->removed_bytes == -4);
9205 /* TBD -- place the literal value here and insert
9207 memset (&dup_contents[dup_dot], 0, 4);
9208 pin_internal_relocs (sec, internal_relocs);
9209 pin_contents (sec, contents);
9211 if (!move_literal (abfd, link_info, sec, dup_dot, dup_contents,
9212 relax_info, &internal_relocs, &action->value))
9216 orig_dot_vo += copy_size;
9218 orig_dot += orig_insn_size;
9219 dup_dot += copy_size;
9223 /* Not implemented yet. */
9228 removed += action->removed_bytes;
9229 BFD_ASSERT (dup_dot <= final_size);
9230 BFD_ASSERT (orig_dot <= orig_size);
9233 orig_dot += orig_dot_copied;
9234 orig_dot_copied = 0;
9236 if (orig_dot != orig_size)
9238 copy_size = orig_size - orig_dot;
9239 BFD_ASSERT (orig_size > orig_dot);
9240 BFD_ASSERT (dup_dot + copy_size == final_size);
9241 memmove (&dup_contents[dup_dot], &contents[orig_dot], copy_size);
9242 orig_dot += copy_size;
9243 dup_dot += copy_size;
9245 BFD_ASSERT (orig_size == orig_dot);
9246 BFD_ASSERT (final_size == dup_dot);
9248 /* Move the dup_contents back. */
9249 if (final_size > orig_size)
9251 /* Contents need to be reallocated. Swap the dup_contents into
9253 sec->contents = dup_contents;
9255 contents = dup_contents;
9256 pin_contents (sec, contents);
9260 BFD_ASSERT (final_size <= orig_size);
9261 memset (contents, 0, orig_size);
9262 memcpy (contents, dup_contents, final_size);
9263 free (dup_contents);
9266 pin_contents (sec, contents);
9268 if (sec->rawsize == 0)
9269 sec->rawsize = sec->size;
9270 sec->size = final_size;
9274 release_internal_relocs (sec, internal_relocs);
9275 release_contents (sec, contents);
9281 translate_section_fixes (asection *sec)
9283 xtensa_relax_info *relax_info;
9286 relax_info = get_xtensa_relax_info (sec);
9290 for (r = relax_info->fix_list; r != NULL; r = r->next)
9291 if (!translate_reloc_bfd_fix (r))
9298 /* Translate a fix given the mapping in the relax info for the target
9299 section. If it has already been translated, no work is required. */
9302 translate_reloc_bfd_fix (reloc_bfd_fix *fix)
9304 reloc_bfd_fix new_fix;
9306 xtensa_relax_info *relax_info;
9307 removed_literal *removed;
9308 bfd_vma new_offset, target_offset;
9310 if (fix->translated)
9313 sec = fix->target_sec;
9314 target_offset = fix->target_offset;
9316 relax_info = get_xtensa_relax_info (sec);
9319 fix->translated = TRUE;
9325 /* The fix does not need to be translated if the section cannot change. */
9326 if (!relax_info->is_relaxable_literal_section
9327 && !relax_info->is_relaxable_asm_section)
9329 fix->translated = TRUE;
9333 /* If the literal has been moved and this relocation was on an
9334 opcode, then the relocation should move to the new literal
9335 location. Otherwise, the relocation should move within the
9339 if (is_operand_relocation (fix->src_type))
9341 /* Check if the original relocation is against a literal being
9343 removed = find_removed_literal (&relax_info->removed_list,
9351 /* The fact that there is still a relocation to this literal indicates
9352 that the literal is being coalesced, not simply removed. */
9353 BFD_ASSERT (removed->to.abfd != NULL);
9355 /* This was moved to some other address (possibly another section). */
9356 new_sec = r_reloc_get_section (&removed->to);
9360 relax_info = get_xtensa_relax_info (sec);
9362 (!relax_info->is_relaxable_literal_section
9363 && !relax_info->is_relaxable_asm_section))
9365 target_offset = removed->to.target_offset;
9366 new_fix.target_sec = new_sec;
9367 new_fix.target_offset = target_offset;
9368 new_fix.translated = TRUE;
9373 target_offset = removed->to.target_offset;
9374 new_fix.target_sec = new_sec;
9377 /* The target address may have been moved within its section. */
9378 new_offset = offset_with_removed_text (&relax_info->action_list,
9381 new_fix.target_offset = new_offset;
9382 new_fix.target_offset = new_offset;
9383 new_fix.translated = TRUE;
9389 /* Fix up a relocation to take account of removed literals. */
9392 translate_reloc (const r_reloc *orig_rel, r_reloc *new_rel, asection *sec)
9394 xtensa_relax_info *relax_info;
9395 removed_literal *removed;
9396 bfd_vma target_offset, base_offset;
9399 *new_rel = *orig_rel;
9401 if (!r_reloc_is_defined (orig_rel))
9404 relax_info = get_xtensa_relax_info (sec);
9405 BFD_ASSERT (relax_info && (relax_info->is_relaxable_literal_section
9406 || relax_info->is_relaxable_asm_section));
9408 target_offset = orig_rel->target_offset;
9411 if (is_operand_relocation (ELF32_R_TYPE (orig_rel->rela.r_info)))
9413 /* Check if the original relocation is against a literal being
9415 removed = find_removed_literal (&relax_info->removed_list,
9418 if (removed && removed->to.abfd)
9422 /* The fact that there is still a relocation to this literal indicates
9423 that the literal is being coalesced, not simply removed. */
9424 BFD_ASSERT (removed->to.abfd != NULL);
9426 /* This was moved to some other address
9427 (possibly in another section). */
9428 *new_rel = removed->to;
9429 new_sec = r_reloc_get_section (new_rel);
9433 relax_info = get_xtensa_relax_info (sec);
9435 || (!relax_info->is_relaxable_literal_section
9436 && !relax_info->is_relaxable_asm_section))
9439 target_offset = new_rel->target_offset;
9442 /* Find the base offset of the reloc symbol, excluding any addend from the
9443 reloc or from the section contents (for a partial_inplace reloc). Then
9444 find the adjusted values of the offsets due to relaxation. The base
9445 offset is needed to determine the change to the reloc's addend; the reloc
9446 addend should not be adjusted due to relaxations located before the base
9449 base_offset = r_reloc_get_target_offset (new_rel) - new_rel->rela.r_addend;
9450 act = relax_info->action_list.head;
9451 if (base_offset <= target_offset)
9453 int base_removed = removed_by_actions (&act, base_offset, FALSE);
9454 int addend_removed = removed_by_actions (&act, target_offset, FALSE);
9455 new_rel->target_offset = target_offset - base_removed - addend_removed;
9456 new_rel->rela.r_addend -= addend_removed;
9460 /* Handle a negative addend. The base offset comes first. */
9461 int tgt_removed = removed_by_actions (&act, target_offset, FALSE);
9462 int addend_removed = removed_by_actions (&act, base_offset, FALSE);
9463 new_rel->target_offset = target_offset - tgt_removed;
9464 new_rel->rela.r_addend += addend_removed;
9471 /* For dynamic links, there may be a dynamic relocation for each
9472 literal. The number of dynamic relocations must be computed in
9473 size_dynamic_sections, which occurs before relaxation. When a
9474 literal is removed, this function checks if there is a corresponding
9475 dynamic relocation and shrinks the size of the appropriate dynamic
9476 relocation section accordingly. At this point, the contents of the
9477 dynamic relocation sections have not yet been filled in, so there's
9478 nothing else that needs to be done. */
9481 shrink_dynamic_reloc_sections (struct bfd_link_info *info,
9483 asection *input_section,
9484 Elf_Internal_Rela *rel)
9486 struct elf_xtensa_link_hash_table *htab;
9487 Elf_Internal_Shdr *symtab_hdr;
9488 struct elf_link_hash_entry **sym_hashes;
9489 unsigned long r_symndx;
9491 struct elf_link_hash_entry *h;
9492 bfd_boolean dynamic_symbol;
9494 htab = elf_xtensa_hash_table (info);
9495 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
9496 sym_hashes = elf_sym_hashes (abfd);
9498 r_type = ELF32_R_TYPE (rel->r_info);
9499 r_symndx = ELF32_R_SYM (rel->r_info);
9501 if (r_symndx < symtab_hdr->sh_info)
9504 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
9506 dynamic_symbol = elf_xtensa_dynamic_symbol_p (h, info);
9508 if ((r_type == R_XTENSA_32 || r_type == R_XTENSA_PLT)
9509 && (input_section->flags & SEC_ALLOC) != 0
9510 && (dynamic_symbol || info->shared))
9513 bfd_boolean is_plt = FALSE;
9515 if (dynamic_symbol && r_type == R_XTENSA_PLT)
9517 srel = htab->srelplt;
9521 srel = htab->srelgot;
9523 /* Reduce size of the .rela.* section by one reloc. */
9524 BFD_ASSERT (srel != NULL);
9525 BFD_ASSERT (srel->size >= sizeof (Elf32_External_Rela));
9526 srel->size -= sizeof (Elf32_External_Rela);
9530 asection *splt, *sgotplt, *srelgot;
9531 int reloc_index, chunk;
9533 /* Find the PLT reloc index of the entry being removed. This
9534 is computed from the size of ".rela.plt". It is needed to
9535 figure out which PLT chunk to resize. Usually "last index
9536 = size - 1" since the index starts at zero, but in this
9537 context, the size has just been decremented so there's no
9538 need to subtract one. */
9539 reloc_index = srel->size / sizeof (Elf32_External_Rela);
9541 chunk = reloc_index / PLT_ENTRIES_PER_CHUNK;
9542 splt = elf_xtensa_get_plt_section (info, chunk);
9543 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
9544 BFD_ASSERT (splt != NULL && sgotplt != NULL);
9546 /* Check if an entire PLT chunk has just been eliminated. */
9547 if (reloc_index % PLT_ENTRIES_PER_CHUNK == 0)
9549 /* The two magic GOT entries for that chunk can go away. */
9550 srelgot = htab->srelgot;
9551 BFD_ASSERT (srelgot != NULL);
9552 srelgot->reloc_count -= 2;
9553 srelgot->size -= 2 * sizeof (Elf32_External_Rela);
9556 /* There should be only one entry left (and it will be
9558 BFD_ASSERT (sgotplt->size == 4);
9559 BFD_ASSERT (splt->size == PLT_ENTRY_SIZE);
9562 BFD_ASSERT (sgotplt->size >= 4);
9563 BFD_ASSERT (splt->size >= PLT_ENTRY_SIZE);
9566 splt->size -= PLT_ENTRY_SIZE;
9572 /* Take an r_rel and move it to another section. This usually
9573 requires extending the interal_relocation array and pinning it. If
9574 the original r_rel is from the same BFD, we can complete this here.
9575 Otherwise, we add a fix record to let the final link fix the
9576 appropriate address. Contents and internal relocations for the
9577 section must be pinned after calling this routine. */
9580 move_literal (bfd *abfd,
9581 struct bfd_link_info *link_info,
9585 xtensa_relax_info *relax_info,
9586 Elf_Internal_Rela **internal_relocs_p,
9587 const literal_value *lit)
9589 Elf_Internal_Rela *new_relocs = NULL;
9590 size_t new_relocs_count = 0;
9591 Elf_Internal_Rela this_rela;
9592 const r_reloc *r_rel;
9594 r_rel = &lit->r_rel;
9595 BFD_ASSERT (elf_section_data (sec)->relocs == *internal_relocs_p);
9597 if (r_reloc_is_const (r_rel))
9598 bfd_put_32 (abfd, lit->value, contents + offset);
9603 asection *target_sec;
9607 r_type = ELF32_R_TYPE (r_rel->rela.r_info);
9608 target_sec = r_reloc_get_section (r_rel);
9610 /* This is the difficult case. We have to create a fix up. */
9611 this_rela.r_offset = offset;
9612 this_rela.r_info = ELF32_R_INFO (0, r_type);
9613 this_rela.r_addend =
9614 r_rel->target_offset - r_reloc_get_target_offset (r_rel);
9615 bfd_put_32 (abfd, lit->value, contents + offset);
9617 /* Currently, we cannot move relocations during a relocatable link. */
9618 BFD_ASSERT (!link_info->relocatable);
9619 fix = reloc_bfd_fix_init (sec, offset, r_type,
9620 r_reloc_get_section (r_rel),
9621 r_rel->target_offset + r_rel->virtual_offset,
9623 /* We also need to mark that relocations are needed here. */
9624 sec->flags |= SEC_RELOC;
9626 translate_reloc_bfd_fix (fix);
9627 /* This fix has not yet been translated. */
9630 /* Add the relocation. If we have already allocated our own
9631 space for the relocations and we have room for more, then use
9632 it. Otherwise, allocate new space and move the literals. */
9633 insert_at = sec->reloc_count;
9634 for (i = 0; i < sec->reloc_count; ++i)
9636 if (this_rela.r_offset < (*internal_relocs_p)[i].r_offset)
9643 if (*internal_relocs_p != relax_info->allocated_relocs
9644 || sec->reloc_count + 1 > relax_info->allocated_relocs_count)
9646 BFD_ASSERT (relax_info->allocated_relocs == NULL
9647 || sec->reloc_count == relax_info->relocs_count);
9649 if (relax_info->allocated_relocs_count == 0)
9650 new_relocs_count = (sec->reloc_count + 2) * 2;
9652 new_relocs_count = (relax_info->allocated_relocs_count + 2) * 2;
9654 new_relocs = (Elf_Internal_Rela *)
9655 bfd_zmalloc (sizeof (Elf_Internal_Rela) * (new_relocs_count));
9659 /* We could handle this more quickly by finding the split point. */
9661 memcpy (new_relocs, *internal_relocs_p,
9662 insert_at * sizeof (Elf_Internal_Rela));
9664 new_relocs[insert_at] = this_rela;
9666 if (insert_at != sec->reloc_count)
9667 memcpy (new_relocs + insert_at + 1,
9668 (*internal_relocs_p) + insert_at,
9669 (sec->reloc_count - insert_at)
9670 * sizeof (Elf_Internal_Rela));
9672 if (*internal_relocs_p != relax_info->allocated_relocs)
9674 /* The first time we re-allocate, we can only free the
9675 old relocs if they were allocated with bfd_malloc.
9676 This is not true when keep_memory is in effect. */
9677 if (!link_info->keep_memory)
9678 free (*internal_relocs_p);
9681 free (*internal_relocs_p);
9682 relax_info->allocated_relocs = new_relocs;
9683 relax_info->allocated_relocs_count = new_relocs_count;
9684 elf_section_data (sec)->relocs = new_relocs;
9686 relax_info->relocs_count = sec->reloc_count;
9687 *internal_relocs_p = new_relocs;
9691 if (insert_at != sec->reloc_count)
9694 for (idx = sec->reloc_count; idx > insert_at; idx--)
9695 (*internal_relocs_p)[idx] = (*internal_relocs_p)[idx-1];
9697 (*internal_relocs_p)[insert_at] = this_rela;
9699 if (relax_info->allocated_relocs)
9700 relax_info->relocs_count = sec->reloc_count;
9707 /* This is similar to relax_section except that when a target is moved,
9708 we shift addresses up. We also need to modify the size. This
9709 algorithm does NOT allow for relocations into the middle of the
9710 property sections. */
9713 relax_property_section (bfd *abfd,
9715 struct bfd_link_info *link_info)
9717 Elf_Internal_Rela *internal_relocs;
9720 bfd_boolean ok = TRUE;
9721 bfd_boolean is_full_prop_section;
9722 size_t last_zfill_target_offset = 0;
9723 asection *last_zfill_target_sec = NULL;
9724 bfd_size_type sec_size;
9725 bfd_size_type entry_size;
9727 sec_size = bfd_get_section_limit (abfd, sec);
9728 internal_relocs = retrieve_internal_relocs (abfd, sec,
9729 link_info->keep_memory);
9730 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
9731 if (contents == NULL && sec_size != 0)
9737 is_full_prop_section = xtensa_is_proptable_section (sec);
9738 if (is_full_prop_section)
9743 if (internal_relocs)
9745 for (i = 0; i < sec->reloc_count; i++)
9747 Elf_Internal_Rela *irel;
9748 xtensa_relax_info *target_relax_info;
9750 asection *target_sec;
9752 bfd_byte *size_p, *flags_p;
9754 /* Locally change the source address.
9755 Translate the target to the new target address.
9756 If it points to this section and has been removed, MOVE IT.
9757 Also, don't forget to modify the associated SIZE at
9760 irel = &internal_relocs[i];
9761 r_type = ELF32_R_TYPE (irel->r_info);
9762 if (r_type == R_XTENSA_NONE)
9765 /* Find the literal value. */
9766 r_reloc_init (&val.r_rel, abfd, irel, contents, sec_size);
9767 size_p = &contents[irel->r_offset + 4];
9769 if (is_full_prop_section)
9770 flags_p = &contents[irel->r_offset + 8];
9771 BFD_ASSERT (irel->r_offset + entry_size <= sec_size);
9773 target_sec = r_reloc_get_section (&val.r_rel);
9774 target_relax_info = get_xtensa_relax_info (target_sec);
9776 if (target_relax_info
9777 && (target_relax_info->is_relaxable_literal_section
9778 || target_relax_info->is_relaxable_asm_section ))
9780 /* Translate the relocation's destination. */
9781 bfd_vma old_offset = val.r_rel.target_offset;
9783 long old_size, new_size;
9784 text_action *act = target_relax_info->action_list.head;
9785 new_offset = old_offset -
9786 removed_by_actions (&act, old_offset, FALSE);
9788 /* Assert that we are not out of bounds. */
9789 old_size = bfd_get_32 (abfd, size_p);
9790 new_size = old_size;
9794 /* Only the first zero-sized unreachable entry is
9795 allowed to expand. In this case the new offset
9796 should be the offset before the fill and the new
9797 size is the expansion size. For other zero-sized
9798 entries the resulting size should be zero with an
9799 offset before or after the fill address depending
9800 on whether the expanding unreachable entry
9802 if (last_zfill_target_sec == 0
9803 || last_zfill_target_sec != target_sec
9804 || last_zfill_target_offset != old_offset)
9806 bfd_vma new_end_offset = new_offset;
9808 /* Recompute the new_offset, but this time don't
9809 include any fill inserted by relaxation. */
9810 act = target_relax_info->action_list.head;
9811 new_offset = old_offset -
9812 removed_by_actions (&act, old_offset, TRUE);
9814 /* If it is not unreachable and we have not yet
9815 seen an unreachable at this address, place it
9816 before the fill address. */
9817 if (flags_p && (bfd_get_32 (abfd, flags_p)
9818 & XTENSA_PROP_UNREACHABLE) != 0)
9820 new_size = new_end_offset - new_offset;
9822 last_zfill_target_sec = target_sec;
9823 last_zfill_target_offset = old_offset;
9829 removed_by_actions (&act, old_offset + old_size, TRUE);
9831 if (new_size != old_size)
9833 bfd_put_32 (abfd, new_size, size_p);
9834 pin_contents (sec, contents);
9837 if (new_offset != old_offset)
9839 bfd_vma diff = new_offset - old_offset;
9840 irel->r_addend += diff;
9841 pin_internal_relocs (sec, internal_relocs);
9847 /* Combine adjacent property table entries. This is also done in
9848 finish_dynamic_sections() but at that point it's too late to
9849 reclaim the space in the output section, so we do this twice. */
9851 if (internal_relocs && (!link_info->relocatable
9852 || xtensa_is_littable_section (sec)))
9854 Elf_Internal_Rela *last_irel = NULL;
9855 Elf_Internal_Rela *irel, *next_rel, *rel_end;
9856 int removed_bytes = 0;
9858 flagword predef_flags;
9860 predef_flags = xtensa_get_property_predef_flags (sec);
9862 /* Walk over memory and relocations at the same time.
9863 This REQUIRES that the internal_relocs be sorted by offset. */
9864 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
9865 internal_reloc_compare);
9867 pin_internal_relocs (sec, internal_relocs);
9868 pin_contents (sec, contents);
9870 next_rel = internal_relocs;
9871 rel_end = internal_relocs + sec->reloc_count;
9873 BFD_ASSERT (sec->size % entry_size == 0);
9875 for (offset = 0; offset < sec->size; offset += entry_size)
9877 Elf_Internal_Rela *offset_rel, *extra_rel;
9878 bfd_vma bytes_to_remove, size, actual_offset;
9879 bfd_boolean remove_this_rel;
9882 /* Find the first relocation for the entry at the current offset.
9883 Adjust the offsets of any extra relocations for the previous
9888 for (irel = next_rel; irel < rel_end; irel++)
9890 if ((irel->r_offset == offset
9891 && ELF32_R_TYPE (irel->r_info) != R_XTENSA_NONE)
9892 || irel->r_offset > offset)
9897 irel->r_offset -= removed_bytes;
9901 /* Find the next relocation (if there are any left). */
9905 for (irel = offset_rel + 1; irel < rel_end; irel++)
9907 if (ELF32_R_TYPE (irel->r_info) != R_XTENSA_NONE)
9915 /* Check if there are relocations on the current entry. There
9916 should usually be a relocation on the offset field. If there
9917 are relocations on the size or flags, then we can't optimize
9918 this entry. Also, find the next relocation to examine on the
9922 if (offset_rel->r_offset >= offset + entry_size)
9924 next_rel = offset_rel;
9925 /* There are no relocations on the current entry, but we
9926 might still be able to remove it if the size is zero. */
9929 else if (offset_rel->r_offset > offset
9931 && extra_rel->r_offset < offset + entry_size))
9933 /* There is a relocation on the size or flags, so we can't
9934 do anything with this entry. Continue with the next. */
9935 next_rel = offset_rel;
9940 BFD_ASSERT (offset_rel->r_offset == offset);
9941 offset_rel->r_offset -= removed_bytes;
9942 next_rel = offset_rel + 1;
9948 remove_this_rel = FALSE;
9949 bytes_to_remove = 0;
9950 actual_offset = offset - removed_bytes;
9951 size = bfd_get_32 (abfd, &contents[actual_offset + 4]);
9953 if (is_full_prop_section)
9954 flags = bfd_get_32 (abfd, &contents[actual_offset + 8]);
9956 flags = predef_flags;
9959 && (flags & XTENSA_PROP_ALIGN) == 0
9960 && (flags & XTENSA_PROP_UNREACHABLE) == 0)
9962 /* Always remove entries with zero size and no alignment. */
9963 bytes_to_remove = entry_size;
9965 remove_this_rel = TRUE;
9968 && ELF32_R_TYPE (offset_rel->r_info) == R_XTENSA_32)
9974 bfd_get_32 (abfd, &contents[last_irel->r_offset + 4]);
9975 bfd_vma old_address =
9976 (last_irel->r_addend
9977 + bfd_get_32 (abfd, &contents[last_irel->r_offset]));
9978 bfd_vma new_address =
9979 (offset_rel->r_addend
9980 + bfd_get_32 (abfd, &contents[actual_offset]));
9981 if (is_full_prop_section)
9982 old_flags = bfd_get_32
9983 (abfd, &contents[last_irel->r_offset + 8]);
9985 old_flags = predef_flags;
9987 if ((ELF32_R_SYM (offset_rel->r_info)
9988 == ELF32_R_SYM (last_irel->r_info))
9989 && old_address + old_size == new_address
9990 && old_flags == flags
9991 && (old_flags & XTENSA_PROP_INSN_BRANCH_TARGET) == 0
9992 && (old_flags & XTENSA_PROP_INSN_LOOP_TARGET) == 0)
9994 /* Fix the old size. */
9995 bfd_put_32 (abfd, old_size + size,
9996 &contents[last_irel->r_offset + 4]);
9997 bytes_to_remove = entry_size;
9998 remove_this_rel = TRUE;
10001 last_irel = offset_rel;
10004 last_irel = offset_rel;
10007 if (remove_this_rel)
10009 offset_rel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
10010 /* In case this is the last entry, move the relocation offset
10011 to the previous entry, if there is one. */
10012 if (offset_rel->r_offset >= bytes_to_remove)
10013 offset_rel->r_offset -= bytes_to_remove;
10015 offset_rel->r_offset = 0;
10018 if (bytes_to_remove != 0)
10020 removed_bytes += bytes_to_remove;
10021 if (offset + bytes_to_remove < sec->size)
10022 memmove (&contents[actual_offset],
10023 &contents[actual_offset + bytes_to_remove],
10024 sec->size - offset - bytes_to_remove);
10030 /* Fix up any extra relocations on the last entry. */
10031 for (irel = next_rel; irel < rel_end; irel++)
10032 irel->r_offset -= removed_bytes;
10034 /* Clear the removed bytes. */
10035 memset (&contents[sec->size - removed_bytes], 0, removed_bytes);
10037 if (sec->rawsize == 0)
10038 sec->rawsize = sec->size;
10039 sec->size -= removed_bytes;
10041 if (xtensa_is_littable_section (sec))
10043 asection *sgotloc = elf_xtensa_hash_table (link_info)->sgotloc;
10045 sgotloc->size -= removed_bytes;
10051 release_internal_relocs (sec, internal_relocs);
10052 release_contents (sec, contents);
10057 /* Third relaxation pass. */
10059 /* Change symbol values to account for removed literals. */
10062 relax_section_symbols (bfd *abfd, asection *sec)
10064 xtensa_relax_info *relax_info;
10065 unsigned int sec_shndx;
10066 Elf_Internal_Shdr *symtab_hdr;
10067 Elf_Internal_Sym *isymbuf;
10068 unsigned i, num_syms, num_locals;
10070 relax_info = get_xtensa_relax_info (sec);
10071 BFD_ASSERT (relax_info);
10073 if (!relax_info->is_relaxable_literal_section
10074 && !relax_info->is_relaxable_asm_section)
10077 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
10079 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10080 isymbuf = retrieve_local_syms (abfd);
10082 num_syms = symtab_hdr->sh_size / sizeof (Elf32_External_Sym);
10083 num_locals = symtab_hdr->sh_info;
10085 /* Adjust the local symbols defined in this section. */
10086 for (i = 0; i < num_locals; i++)
10088 Elf_Internal_Sym *isym = &isymbuf[i];
10090 if (isym->st_shndx == sec_shndx)
10092 text_action *act = relax_info->action_list.head;
10093 bfd_vma orig_addr = isym->st_value;
10095 isym->st_value -= removed_by_actions (&act, orig_addr, FALSE);
10097 if (ELF32_ST_TYPE (isym->st_info) == STT_FUNC)
10099 removed_by_actions (&act, orig_addr + isym->st_size, FALSE);
10103 /* Now adjust the global symbols defined in this section. */
10104 for (i = 0; i < (num_syms - num_locals); i++)
10106 struct elf_link_hash_entry *sym_hash;
10108 sym_hash = elf_sym_hashes (abfd)[i];
10110 if (sym_hash->root.type == bfd_link_hash_warning)
10111 sym_hash = (struct elf_link_hash_entry *) sym_hash->root.u.i.link;
10113 if ((sym_hash->root.type == bfd_link_hash_defined
10114 || sym_hash->root.type == bfd_link_hash_defweak)
10115 && sym_hash->root.u.def.section == sec)
10117 text_action *act = relax_info->action_list.head;
10118 bfd_vma orig_addr = sym_hash->root.u.def.value;
10120 sym_hash->root.u.def.value -=
10121 removed_by_actions (&act, orig_addr, FALSE);
10123 if (sym_hash->type == STT_FUNC)
10125 removed_by_actions (&act, orig_addr + sym_hash->size, FALSE);
10133 /* "Fix" handling functions, called while performing relocations. */
10136 do_fix_for_relocatable_link (Elf_Internal_Rela *rel,
10138 asection *input_section,
10139 bfd_byte *contents)
10142 asection *sec, *old_sec;
10143 bfd_vma old_offset;
10144 int r_type = ELF32_R_TYPE (rel->r_info);
10145 reloc_bfd_fix *fix;
10147 if (r_type == R_XTENSA_NONE)
10150 fix = get_bfd_fix (input_section, rel->r_offset, r_type);
10154 r_reloc_init (&r_rel, input_bfd, rel, contents,
10155 bfd_get_section_limit (input_bfd, input_section));
10156 old_sec = r_reloc_get_section (&r_rel);
10157 old_offset = r_rel.target_offset;
10159 if (!old_sec || !r_reloc_is_defined (&r_rel))
10161 if (r_type != R_XTENSA_ASM_EXPAND)
10163 (*_bfd_error_handler)
10164 (_("%B(%A+0x%lx): unexpected fix for %s relocation"),
10165 input_bfd, input_section, rel->r_offset,
10166 elf_howto_table[r_type].name);
10169 /* Leave it be. Resolution will happen in a later stage. */
10173 sec = fix->target_sec;
10174 rel->r_addend += ((sec->output_offset + fix->target_offset)
10175 - (old_sec->output_offset + old_offset));
10182 do_fix_for_final_link (Elf_Internal_Rela *rel,
10184 asection *input_section,
10185 bfd_byte *contents,
10186 bfd_vma *relocationp)
10189 int r_type = ELF32_R_TYPE (rel->r_info);
10190 reloc_bfd_fix *fix;
10191 bfd_vma fixup_diff;
10193 if (r_type == R_XTENSA_NONE)
10196 fix = get_bfd_fix (input_section, rel->r_offset, r_type);
10200 sec = fix->target_sec;
10202 fixup_diff = rel->r_addend;
10203 if (elf_howto_table[fix->src_type].partial_inplace)
10205 bfd_vma inplace_val;
10206 BFD_ASSERT (fix->src_offset
10207 < bfd_get_section_limit (input_bfd, input_section));
10208 inplace_val = bfd_get_32 (input_bfd, &contents[fix->src_offset]);
10209 fixup_diff += inplace_val;
10212 *relocationp = (sec->output_section->vma
10213 + sec->output_offset
10214 + fix->target_offset - fixup_diff);
10218 /* Miscellaneous utility functions.... */
10221 elf_xtensa_get_plt_section (struct bfd_link_info *info, int chunk)
10223 struct elf_xtensa_link_hash_table *htab;
10229 htab = elf_xtensa_hash_table (info);
10233 dynobj = elf_hash_table (info)->dynobj;
10234 sprintf (plt_name, ".plt.%u", chunk);
10235 return bfd_get_section_by_name (dynobj, plt_name);
10240 elf_xtensa_get_gotplt_section (struct bfd_link_info *info, int chunk)
10242 struct elf_xtensa_link_hash_table *htab;
10248 htab = elf_xtensa_hash_table (info);
10249 return htab->sgotplt;
10252 dynobj = elf_hash_table (info)->dynobj;
10253 sprintf (got_name, ".got.plt.%u", chunk);
10254 return bfd_get_section_by_name (dynobj, got_name);
10258 /* Get the input section for a given symbol index.
10260 . a section symbol, return the section;
10261 . a common symbol, return the common section;
10262 . an undefined symbol, return the undefined section;
10263 . an indirect symbol, follow the links;
10264 . an absolute value, return the absolute section. */
10267 get_elf_r_symndx_section (bfd *abfd, unsigned long r_symndx)
10269 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10270 asection *target_sec = NULL;
10271 if (r_symndx < symtab_hdr->sh_info)
10273 Elf_Internal_Sym *isymbuf;
10274 unsigned int section_index;
10276 isymbuf = retrieve_local_syms (abfd);
10277 section_index = isymbuf[r_symndx].st_shndx;
10279 if (section_index == SHN_UNDEF)
10280 target_sec = bfd_und_section_ptr;
10281 else if (section_index == SHN_ABS)
10282 target_sec = bfd_abs_section_ptr;
10283 else if (section_index == SHN_COMMON)
10284 target_sec = bfd_com_section_ptr;
10286 target_sec = bfd_section_from_elf_index (abfd, section_index);
10290 unsigned long indx = r_symndx - symtab_hdr->sh_info;
10291 struct elf_link_hash_entry *h = elf_sym_hashes (abfd)[indx];
10293 while (h->root.type == bfd_link_hash_indirect
10294 || h->root.type == bfd_link_hash_warning)
10295 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10297 switch (h->root.type)
10299 case bfd_link_hash_defined:
10300 case bfd_link_hash_defweak:
10301 target_sec = h->root.u.def.section;
10303 case bfd_link_hash_common:
10304 target_sec = bfd_com_section_ptr;
10306 case bfd_link_hash_undefined:
10307 case bfd_link_hash_undefweak:
10308 target_sec = bfd_und_section_ptr;
10310 default: /* New indirect warning. */
10311 target_sec = bfd_und_section_ptr;
10319 static struct elf_link_hash_entry *
10320 get_elf_r_symndx_hash_entry (bfd *abfd, unsigned long r_symndx)
10322 unsigned long indx;
10323 struct elf_link_hash_entry *h;
10324 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10326 if (r_symndx < symtab_hdr->sh_info)
10329 indx = r_symndx - symtab_hdr->sh_info;
10330 h = elf_sym_hashes (abfd)[indx];
10331 while (h->root.type == bfd_link_hash_indirect
10332 || h->root.type == bfd_link_hash_warning)
10333 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10338 /* Get the section-relative offset for a symbol number. */
10341 get_elf_r_symndx_offset (bfd *abfd, unsigned long r_symndx)
10343 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10344 bfd_vma offset = 0;
10346 if (r_symndx < symtab_hdr->sh_info)
10348 Elf_Internal_Sym *isymbuf;
10349 isymbuf = retrieve_local_syms (abfd);
10350 offset = isymbuf[r_symndx].st_value;
10354 unsigned long indx = r_symndx - symtab_hdr->sh_info;
10355 struct elf_link_hash_entry *h =
10356 elf_sym_hashes (abfd)[indx];
10358 while (h->root.type == bfd_link_hash_indirect
10359 || h->root.type == bfd_link_hash_warning)
10360 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10361 if (h->root.type == bfd_link_hash_defined
10362 || h->root.type == bfd_link_hash_defweak)
10363 offset = h->root.u.def.value;
10370 is_reloc_sym_weak (bfd *abfd, Elf_Internal_Rela *rel)
10372 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
10373 struct elf_link_hash_entry *h;
10375 h = get_elf_r_symndx_hash_entry (abfd, r_symndx);
10376 if (h && h->root.type == bfd_link_hash_defweak)
10383 pcrel_reloc_fits (xtensa_opcode opc,
10385 bfd_vma self_address,
10386 bfd_vma dest_address)
10388 xtensa_isa isa = xtensa_default_isa;
10389 uint32 valp = dest_address;
10390 if (xtensa_operand_do_reloc (isa, opc, opnd, &valp, self_address)
10391 || xtensa_operand_encode (isa, opc, opnd, &valp))
10398 xtensa_is_property_section (asection *sec)
10400 if (xtensa_is_insntable_section (sec)
10401 || xtensa_is_littable_section (sec)
10402 || xtensa_is_proptable_section (sec))
10410 xtensa_is_insntable_section (asection *sec)
10412 if (CONST_STRNEQ (sec->name, XTENSA_INSN_SEC_NAME)
10413 || CONST_STRNEQ (sec->name, ".gnu.linkonce.x."))
10421 xtensa_is_littable_section (asection *sec)
10423 if (CONST_STRNEQ (sec->name, XTENSA_LIT_SEC_NAME)
10424 || CONST_STRNEQ (sec->name, ".gnu.linkonce.p."))
10432 xtensa_is_proptable_section (asection *sec)
10434 if (CONST_STRNEQ (sec->name, XTENSA_PROP_SEC_NAME)
10435 || CONST_STRNEQ (sec->name, ".gnu.linkonce.prop."))
10443 internal_reloc_compare (const void *ap, const void *bp)
10445 const Elf_Internal_Rela *a = (const Elf_Internal_Rela *) ap;
10446 const Elf_Internal_Rela *b = (const Elf_Internal_Rela *) bp;
10448 if (a->r_offset != b->r_offset)
10449 return (a->r_offset - b->r_offset);
10451 /* We don't need to sort on these criteria for correctness,
10452 but enforcing a more strict ordering prevents unstable qsort
10453 from behaving differently with different implementations.
10454 Without the code below we get correct but different results
10455 on Solaris 2.7 and 2.8. We would like to always produce the
10456 same results no matter the host. */
10458 if (a->r_info != b->r_info)
10459 return (a->r_info - b->r_info);
10461 return (a->r_addend - b->r_addend);
10466 internal_reloc_matches (const void *ap, const void *bp)
10468 const Elf_Internal_Rela *a = (const Elf_Internal_Rela *) ap;
10469 const Elf_Internal_Rela *b = (const Elf_Internal_Rela *) bp;
10471 /* Check if one entry overlaps with the other; this shouldn't happen
10472 except when searching for a match. */
10473 return (a->r_offset - b->r_offset);
10477 /* Predicate function used to look up a section in a particular group. */
10480 match_section_group (bfd *abfd ATTRIBUTE_UNUSED, asection *sec, void *inf)
10482 const char *gname = inf;
10483 const char *group_name = elf_group_name (sec);
10485 return (group_name == gname
10486 || (group_name != NULL
10488 && strcmp (group_name, gname) == 0));
10492 static int linkonce_len = sizeof (".gnu.linkonce.") - 1;
10495 xtensa_property_section_name (asection *sec, const char *base_name)
10497 const char *suffix, *group_name;
10498 char *prop_sec_name;
10500 group_name = elf_group_name (sec);
10503 suffix = strrchr (sec->name, '.');
10504 if (suffix == sec->name)
10506 prop_sec_name = (char *) bfd_malloc (strlen (base_name) + 1
10507 + (suffix ? strlen (suffix) : 0));
10508 strcpy (prop_sec_name, base_name);
10510 strcat (prop_sec_name, suffix);
10512 else if (strncmp (sec->name, ".gnu.linkonce.", linkonce_len) == 0)
10514 char *linkonce_kind = 0;
10516 if (strcmp (base_name, XTENSA_INSN_SEC_NAME) == 0)
10517 linkonce_kind = "x.";
10518 else if (strcmp (base_name, XTENSA_LIT_SEC_NAME) == 0)
10519 linkonce_kind = "p.";
10520 else if (strcmp (base_name, XTENSA_PROP_SEC_NAME) == 0)
10521 linkonce_kind = "prop.";
10525 prop_sec_name = (char *) bfd_malloc (strlen (sec->name)
10526 + strlen (linkonce_kind) + 1);
10527 memcpy (prop_sec_name, ".gnu.linkonce.", linkonce_len);
10528 strcpy (prop_sec_name + linkonce_len, linkonce_kind);
10530 suffix = sec->name + linkonce_len;
10531 /* For backward compatibility, replace "t." instead of inserting
10532 the new linkonce_kind (but not for "prop" sections). */
10533 if (CONST_STRNEQ (suffix, "t.") && linkonce_kind[1] == '.')
10535 strcat (prop_sec_name + linkonce_len, suffix);
10538 prop_sec_name = strdup (base_name);
10540 return prop_sec_name;
10545 xtensa_get_property_section (asection *sec, const char *base_name)
10547 char *prop_sec_name;
10548 asection *prop_sec;
10550 prop_sec_name = xtensa_property_section_name (sec, base_name);
10551 prop_sec = bfd_get_section_by_name_if (sec->owner, prop_sec_name,
10552 match_section_group,
10553 (void *) elf_group_name (sec));
10554 free (prop_sec_name);
10560 xtensa_make_property_section (asection *sec, const char *base_name)
10562 char *prop_sec_name;
10563 asection *prop_sec;
10565 /* Check if the section already exists. */
10566 prop_sec_name = xtensa_property_section_name (sec, base_name);
10567 prop_sec = bfd_get_section_by_name_if (sec->owner, prop_sec_name,
10568 match_section_group,
10569 (void *) elf_group_name (sec));
10570 /* If not, create it. */
10573 flagword flags = (SEC_RELOC | SEC_HAS_CONTENTS | SEC_READONLY);
10574 flags |= (bfd_get_section_flags (sec->owner, sec)
10575 & (SEC_LINK_ONCE | SEC_LINK_DUPLICATES));
10577 prop_sec = bfd_make_section_anyway_with_flags
10578 (sec->owner, strdup (prop_sec_name), flags);
10582 elf_group_name (prop_sec) = elf_group_name (sec);
10585 free (prop_sec_name);
10591 xtensa_get_property_predef_flags (asection *sec)
10593 if (xtensa_is_insntable_section (sec))
10594 return (XTENSA_PROP_INSN
10595 | XTENSA_PROP_NO_TRANSFORM
10596 | XTENSA_PROP_INSN_NO_REORDER);
10598 if (xtensa_is_littable_section (sec))
10599 return (XTENSA_PROP_LITERAL
10600 | XTENSA_PROP_NO_TRANSFORM
10601 | XTENSA_PROP_INSN_NO_REORDER);
10607 /* Other functions called directly by the linker. */
10610 xtensa_callback_required_dependence (bfd *abfd,
10612 struct bfd_link_info *link_info,
10613 deps_callback_t callback,
10616 Elf_Internal_Rela *internal_relocs;
10617 bfd_byte *contents;
10619 bfd_boolean ok = TRUE;
10620 bfd_size_type sec_size;
10622 sec_size = bfd_get_section_limit (abfd, sec);
10624 /* ".plt*" sections have no explicit relocations but they contain L32R
10625 instructions that reference the corresponding ".got.plt*" sections. */
10626 if ((sec->flags & SEC_LINKER_CREATED) != 0
10627 && CONST_STRNEQ (sec->name, ".plt"))
10631 /* Find the corresponding ".got.plt*" section. */
10632 if (sec->name[4] == '\0')
10633 sgotplt = bfd_get_section_by_name (sec->owner, ".got.plt");
10639 BFD_ASSERT (sec->name[4] == '.');
10640 chunk = strtol (&sec->name[5], NULL, 10);
10642 sprintf (got_name, ".got.plt.%u", chunk);
10643 sgotplt = bfd_get_section_by_name (sec->owner, got_name);
10645 BFD_ASSERT (sgotplt);
10647 /* Assume worst-case offsets: L32R at the very end of the ".plt"
10648 section referencing a literal at the very beginning of
10649 ".got.plt". This is very close to the real dependence, anyway. */
10650 (*callback) (sec, sec_size, sgotplt, 0, closure);
10653 /* Only ELF files are supported for Xtensa. Check here to avoid a segfault
10654 when building uclibc, which runs "ld -b binary /dev/null". */
10655 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
10658 internal_relocs = retrieve_internal_relocs (abfd, sec,
10659 link_info->keep_memory);
10660 if (internal_relocs == NULL
10661 || sec->reloc_count == 0)
10664 /* Cache the contents for the duration of this scan. */
10665 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
10666 if (contents == NULL && sec_size != 0)
10672 if (!xtensa_default_isa)
10673 xtensa_default_isa = xtensa_isa_init (0, 0);
10675 for (i = 0; i < sec->reloc_count; i++)
10677 Elf_Internal_Rela *irel = &internal_relocs[i];
10678 if (is_l32r_relocation (abfd, sec, contents, irel))
10681 asection *target_sec;
10682 bfd_vma target_offset;
10684 r_reloc_init (&l32r_rel, abfd, irel, contents, sec_size);
10687 /* L32Rs must be local to the input file. */
10688 if (r_reloc_is_defined (&l32r_rel))
10690 target_sec = r_reloc_get_section (&l32r_rel);
10691 target_offset = l32r_rel.target_offset;
10693 (*callback) (sec, irel->r_offset, target_sec, target_offset,
10699 release_internal_relocs (sec, internal_relocs);
10700 release_contents (sec, contents);
10704 /* The default literal sections should always be marked as "code" (i.e.,
10705 SHF_EXECINSTR). This is particularly important for the Linux kernel
10706 module loader so that the literals are not placed after the text. */
10707 static const struct bfd_elf_special_section elf_xtensa_special_sections[] =
10709 { STRING_COMMA_LEN (".fini.literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
10710 { STRING_COMMA_LEN (".init.literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
10711 { STRING_COMMA_LEN (".literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
10712 { STRING_COMMA_LEN (".xtensa.info"), 0, SHT_NOTE, 0 },
10713 { NULL, 0, 0, 0, 0 }
10717 #define TARGET_LITTLE_SYM bfd_elf32_xtensa_le_vec
10718 #define TARGET_LITTLE_NAME "elf32-xtensa-le"
10719 #define TARGET_BIG_SYM bfd_elf32_xtensa_be_vec
10720 #define TARGET_BIG_NAME "elf32-xtensa-be"
10721 #define ELF_ARCH bfd_arch_xtensa
10723 #define ELF_MACHINE_CODE EM_XTENSA
10724 #define ELF_MACHINE_ALT1 EM_XTENSA_OLD
10727 #define ELF_MAXPAGESIZE (1 << XCHAL_MMU_MIN_PTE_PAGE_SIZE)
10728 #else /* !XCHAL_HAVE_MMU */
10729 #define ELF_MAXPAGESIZE 1
10730 #endif /* !XCHAL_HAVE_MMU */
10731 #endif /* ELF_ARCH */
10733 #define elf_backend_can_gc_sections 1
10734 #define elf_backend_can_refcount 1
10735 #define elf_backend_plt_readonly 1
10736 #define elf_backend_got_header_size 4
10737 #define elf_backend_want_dynbss 0
10738 #define elf_backend_want_got_plt 1
10740 #define elf_info_to_howto elf_xtensa_info_to_howto_rela
10742 #define bfd_elf32_mkobject elf_xtensa_mkobject
10744 #define bfd_elf32_bfd_merge_private_bfd_data elf_xtensa_merge_private_bfd_data
10745 #define bfd_elf32_new_section_hook elf_xtensa_new_section_hook
10746 #define bfd_elf32_bfd_print_private_bfd_data elf_xtensa_print_private_bfd_data
10747 #define bfd_elf32_bfd_relax_section elf_xtensa_relax_section
10748 #define bfd_elf32_bfd_reloc_type_lookup elf_xtensa_reloc_type_lookup
10749 #define bfd_elf32_bfd_reloc_name_lookup \
10750 elf_xtensa_reloc_name_lookup
10751 #define bfd_elf32_bfd_set_private_flags elf_xtensa_set_private_flags
10752 #define bfd_elf32_bfd_link_hash_table_create elf_xtensa_link_hash_table_create
10754 #define elf_backend_adjust_dynamic_symbol elf_xtensa_adjust_dynamic_symbol
10755 #define elf_backend_check_relocs elf_xtensa_check_relocs
10756 #define elf_backend_create_dynamic_sections elf_xtensa_create_dynamic_sections
10757 #define elf_backend_discard_info elf_xtensa_discard_info
10758 #define elf_backend_ignore_discarded_relocs elf_xtensa_ignore_discarded_relocs
10759 #define elf_backend_final_write_processing elf_xtensa_final_write_processing
10760 #define elf_backend_finish_dynamic_sections elf_xtensa_finish_dynamic_sections
10761 #define elf_backend_finish_dynamic_symbol elf_xtensa_finish_dynamic_symbol
10762 #define elf_backend_gc_mark_hook elf_xtensa_gc_mark_hook
10763 #define elf_backend_gc_sweep_hook elf_xtensa_gc_sweep_hook
10764 #define elf_backend_grok_prstatus elf_xtensa_grok_prstatus
10765 #define elf_backend_grok_psinfo elf_xtensa_grok_psinfo
10766 #define elf_backend_hide_symbol elf_xtensa_hide_symbol
10767 #define elf_backend_object_p elf_xtensa_object_p
10768 #define elf_backend_reloc_type_class elf_xtensa_reloc_type_class
10769 #define elf_backend_relocate_section elf_xtensa_relocate_section
10770 #define elf_backend_size_dynamic_sections elf_xtensa_size_dynamic_sections
10771 #define elf_backend_always_size_sections elf_xtensa_always_size_sections
10772 #define elf_backend_omit_section_dynsym \
10773 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
10774 #define elf_backend_special_sections elf_xtensa_special_sections
10775 #define elf_backend_action_discarded elf_xtensa_action_discarded
10776 #define elf_backend_copy_indirect_symbol elf_xtensa_copy_indirect_symbol
10778 #include "elf32-target.h"