xtensa: add separate property sections option
[deliverable/binutils-gdb.git] / bfd / elf32-xtensa.c
1 /* Xtensa-specific support for 32-bit ELF.
2 Copyright (C) 2003-2018 Free Software Foundation, Inc.
3
4 This file is part of BFD, the Binary File Descriptor library.
5
6 This program is free software; you can redistribute it and/or
7 modify it under the terms of the GNU General Public License as
8 published by the Free Software Foundation; either version 3 of the
9 License, or (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
19 02110-1301, USA. */
20
21 #include "sysdep.h"
22 #include "bfd.h"
23
24 #include <stdarg.h>
25 #include <strings.h>
26
27 #include "bfdlink.h"
28 #include "libbfd.h"
29 #include "elf-bfd.h"
30 #include "elf/xtensa.h"
31 #include "splay-tree.h"
32 #include "xtensa-isa.h"
33 #include "xtensa-config.h"
34
35 #define XTENSA_NO_NOP_REMOVAL 0
36
37 /* Local helper functions. */
38
39 static bfd_boolean add_extra_plt_sections (struct bfd_link_info *, int);
40 static char *vsprint_msg (const char *, const char *, int, ...) ATTRIBUTE_PRINTF(2,4);
41 static bfd_reloc_status_type bfd_elf_xtensa_reloc
42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
43 static bfd_boolean do_fix_for_relocatable_link
44 (Elf_Internal_Rela *, bfd *, asection *, bfd_byte *);
45 static void do_fix_for_final_link
46 (Elf_Internal_Rela *, bfd *, asection *, bfd_byte *, bfd_vma *);
47
48 /* Local functions to handle Xtensa configurability. */
49
50 static bfd_boolean is_indirect_call_opcode (xtensa_opcode);
51 static bfd_boolean is_direct_call_opcode (xtensa_opcode);
52 static bfd_boolean is_windowed_call_opcode (xtensa_opcode);
53 static xtensa_opcode get_const16_opcode (void);
54 static xtensa_opcode get_l32r_opcode (void);
55 static bfd_vma l32r_offset (bfd_vma, bfd_vma);
56 static int get_relocation_opnd (xtensa_opcode, int);
57 static int get_relocation_slot (int);
58 static xtensa_opcode get_relocation_opcode
59 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *);
60 static bfd_boolean is_l32r_relocation
61 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *);
62 static bfd_boolean is_alt_relocation (int);
63 static bfd_boolean is_operand_relocation (int);
64 static bfd_size_type insn_decode_len
65 (bfd_byte *, bfd_size_type, bfd_size_type);
66 static xtensa_opcode insn_decode_opcode
67 (bfd_byte *, bfd_size_type, bfd_size_type, int);
68 static bfd_boolean check_branch_target_aligned
69 (bfd_byte *, bfd_size_type, bfd_vma, bfd_vma);
70 static bfd_boolean check_loop_aligned
71 (bfd_byte *, bfd_size_type, bfd_vma, bfd_vma);
72 static bfd_boolean check_branch_target_aligned_address (bfd_vma, int);
73 static bfd_size_type get_asm_simplify_size
74 (bfd_byte *, bfd_size_type, bfd_size_type);
75
76 /* Functions for link-time code simplifications. */
77
78 static bfd_reloc_status_type elf_xtensa_do_asm_simplify
79 (bfd_byte *, bfd_vma, bfd_vma, char **);
80 static bfd_reloc_status_type contract_asm_expansion
81 (bfd_byte *, bfd_vma, Elf_Internal_Rela *, char **);
82 static xtensa_opcode swap_callx_for_call_opcode (xtensa_opcode);
83 static xtensa_opcode get_expanded_call_opcode (bfd_byte *, int, bfd_boolean *);
84
85 /* Access to internal relocations, section contents and symbols. */
86
87 static Elf_Internal_Rela *retrieve_internal_relocs
88 (bfd *, asection *, bfd_boolean);
89 static void pin_internal_relocs (asection *, Elf_Internal_Rela *);
90 static void release_internal_relocs (asection *, Elf_Internal_Rela *);
91 static bfd_byte *retrieve_contents (bfd *, asection *, bfd_boolean);
92 static void pin_contents (asection *, bfd_byte *);
93 static void release_contents (asection *, bfd_byte *);
94 static Elf_Internal_Sym *retrieve_local_syms (bfd *);
95
96 /* Miscellaneous utility functions. */
97
98 static asection *elf_xtensa_get_plt_section (struct bfd_link_info *, int);
99 static asection *elf_xtensa_get_gotplt_section (struct bfd_link_info *, int);
100 static asection *get_elf_r_symndx_section (bfd *, unsigned long);
101 static struct elf_link_hash_entry *get_elf_r_symndx_hash_entry
102 (bfd *, unsigned long);
103 static bfd_vma get_elf_r_symndx_offset (bfd *, unsigned long);
104 static bfd_boolean is_reloc_sym_weak (bfd *, Elf_Internal_Rela *);
105 static bfd_boolean pcrel_reloc_fits (xtensa_opcode, int, bfd_vma, bfd_vma);
106 static bfd_boolean xtensa_is_property_section (asection *);
107 static bfd_boolean xtensa_is_insntable_section (asection *);
108 static bfd_boolean xtensa_is_littable_section (asection *);
109 static bfd_boolean xtensa_is_proptable_section (asection *);
110 static int internal_reloc_compare (const void *, const void *);
111 static int internal_reloc_matches (const void *, const void *);
112 static asection *xtensa_get_property_section (asection *, const char *);
113 static flagword xtensa_get_property_predef_flags (asection *);
114
115 /* Other functions called directly by the linker. */
116
117 typedef void (*deps_callback_t)
118 (asection *, bfd_vma, asection *, bfd_vma, void *);
119 extern bfd_boolean xtensa_callback_required_dependence
120 (bfd *, asection *, struct bfd_link_info *, deps_callback_t, void *);
121
122
123 /* Globally visible flag for choosing size optimization of NOP removal
124 instead of branch-target-aware minimization for NOP removal.
125 When nonzero, narrow all instructions and remove all NOPs possible
126 around longcall expansions. */
127
128 int elf32xtensa_size_opt;
129
130
131 /* The "new_section_hook" is used to set up a per-section
132 "xtensa_relax_info" data structure with additional information used
133 during relaxation. */
134
135 typedef struct xtensa_relax_info_struct xtensa_relax_info;
136
137
138 /* The GNU tools do not easily allow extending interfaces to pass around
139 the pointer to the Xtensa ISA information, so instead we add a global
140 variable here (in BFD) that can be used by any of the tools that need
141 this information. */
142
143 xtensa_isa xtensa_default_isa;
144
145
146 /* When this is true, relocations may have been modified to refer to
147 symbols from other input files. The per-section list of "fix"
148 records needs to be checked when resolving relocations. */
149
150 static bfd_boolean relaxing_section = FALSE;
151
152 /* When this is true, during final links, literals that cannot be
153 coalesced and their relocations may be moved to other sections. */
154
155 int elf32xtensa_no_literal_movement = 1;
156
157 /* Place property records for a section into individual property section
158 with xt.prop. prefix. */
159
160 bfd_boolean elf32xtensa_separate_props = FALSE;
161
162 /* Rename one of the generic section flags to better document how it
163 is used here. */
164 /* Whether relocations have been processed. */
165 #define reloc_done sec_flg0
166 \f
167 static reloc_howto_type elf_howto_table[] =
168 {
169 HOWTO (R_XTENSA_NONE, 0, 3, 0, FALSE, 0, complain_overflow_dont,
170 bfd_elf_xtensa_reloc, "R_XTENSA_NONE",
171 FALSE, 0, 0, FALSE),
172 HOWTO (R_XTENSA_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
173 bfd_elf_xtensa_reloc, "R_XTENSA_32",
174 TRUE, 0xffffffff, 0xffffffff, FALSE),
175
176 /* Replace a 32-bit value with a value from the runtime linker (only
177 used by linker-generated stub functions). The r_addend value is
178 special: 1 means to substitute a pointer to the runtime linker's
179 dynamic resolver function; 2 means to substitute the link map for
180 the shared object. */
181 HOWTO (R_XTENSA_RTLD, 0, 2, 32, FALSE, 0, complain_overflow_dont,
182 NULL, "R_XTENSA_RTLD", FALSE, 0, 0, FALSE),
183
184 HOWTO (R_XTENSA_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
185 bfd_elf_generic_reloc, "R_XTENSA_GLOB_DAT",
186 FALSE, 0, 0xffffffff, FALSE),
187 HOWTO (R_XTENSA_JMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
188 bfd_elf_generic_reloc, "R_XTENSA_JMP_SLOT",
189 FALSE, 0, 0xffffffff, FALSE),
190 HOWTO (R_XTENSA_RELATIVE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
191 bfd_elf_generic_reloc, "R_XTENSA_RELATIVE",
192 FALSE, 0, 0xffffffff, FALSE),
193 HOWTO (R_XTENSA_PLT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
194 bfd_elf_xtensa_reloc, "R_XTENSA_PLT",
195 FALSE, 0, 0xffffffff, FALSE),
196
197 EMPTY_HOWTO (7),
198
199 /* Old relocations for backward compatibility. */
200 HOWTO (R_XTENSA_OP0, 0, 0, 0, TRUE, 0, complain_overflow_dont,
201 bfd_elf_xtensa_reloc, "R_XTENSA_OP0", FALSE, 0, 0, TRUE),
202 HOWTO (R_XTENSA_OP1, 0, 0, 0, TRUE, 0, complain_overflow_dont,
203 bfd_elf_xtensa_reloc, "R_XTENSA_OP1", FALSE, 0, 0, TRUE),
204 HOWTO (R_XTENSA_OP2, 0, 0, 0, TRUE, 0, complain_overflow_dont,
205 bfd_elf_xtensa_reloc, "R_XTENSA_OP2", FALSE, 0, 0, TRUE),
206
207 /* Assembly auto-expansion. */
208 HOWTO (R_XTENSA_ASM_EXPAND, 0, 0, 0, TRUE, 0, complain_overflow_dont,
209 bfd_elf_xtensa_reloc, "R_XTENSA_ASM_EXPAND", FALSE, 0, 0, TRUE),
210 /* Relax assembly auto-expansion. */
211 HOWTO (R_XTENSA_ASM_SIMPLIFY, 0, 0, 0, TRUE, 0, complain_overflow_dont,
212 bfd_elf_xtensa_reloc, "R_XTENSA_ASM_SIMPLIFY", FALSE, 0, 0, TRUE),
213
214 EMPTY_HOWTO (13),
215
216 HOWTO (R_XTENSA_32_PCREL, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
217 bfd_elf_xtensa_reloc, "R_XTENSA_32_PCREL",
218 FALSE, 0, 0xffffffff, TRUE),
219
220 /* GNU extension to record C++ vtable hierarchy. */
221 HOWTO (R_XTENSA_GNU_VTINHERIT, 0, 2, 0, FALSE, 0, complain_overflow_dont,
222 NULL, "R_XTENSA_GNU_VTINHERIT",
223 FALSE, 0, 0, FALSE),
224 /* GNU extension to record C++ vtable member usage. */
225 HOWTO (R_XTENSA_GNU_VTENTRY, 0, 2, 0, FALSE, 0, complain_overflow_dont,
226 _bfd_elf_rel_vtable_reloc_fn, "R_XTENSA_GNU_VTENTRY",
227 FALSE, 0, 0, FALSE),
228
229 /* Relocations for supporting difference of symbols. */
230 HOWTO (R_XTENSA_DIFF8, 0, 0, 8, FALSE, 0, complain_overflow_signed,
231 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF8", FALSE, 0, 0xff, FALSE),
232 HOWTO (R_XTENSA_DIFF16, 0, 1, 16, FALSE, 0, complain_overflow_signed,
233 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF16", FALSE, 0, 0xffff, FALSE),
234 HOWTO (R_XTENSA_DIFF32, 0, 2, 32, FALSE, 0, complain_overflow_signed,
235 bfd_elf_xtensa_reloc, "R_XTENSA_DIFF32", FALSE, 0, 0xffffffff, FALSE),
236
237 /* General immediate operand relocations. */
238 HOWTO (R_XTENSA_SLOT0_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
239 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT0_OP", FALSE, 0, 0, TRUE),
240 HOWTO (R_XTENSA_SLOT1_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
241 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT1_OP", FALSE, 0, 0, TRUE),
242 HOWTO (R_XTENSA_SLOT2_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
243 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT2_OP", FALSE, 0, 0, TRUE),
244 HOWTO (R_XTENSA_SLOT3_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
245 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT3_OP", FALSE, 0, 0, TRUE),
246 HOWTO (R_XTENSA_SLOT4_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
247 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT4_OP", FALSE, 0, 0, TRUE),
248 HOWTO (R_XTENSA_SLOT5_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
249 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT5_OP", FALSE, 0, 0, TRUE),
250 HOWTO (R_XTENSA_SLOT6_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
251 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT6_OP", FALSE, 0, 0, TRUE),
252 HOWTO (R_XTENSA_SLOT7_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
253 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT7_OP", FALSE, 0, 0, TRUE),
254 HOWTO (R_XTENSA_SLOT8_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
255 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT8_OP", FALSE, 0, 0, TRUE),
256 HOWTO (R_XTENSA_SLOT9_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
257 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT9_OP", FALSE, 0, 0, TRUE),
258 HOWTO (R_XTENSA_SLOT10_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
259 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT10_OP", FALSE, 0, 0, TRUE),
260 HOWTO (R_XTENSA_SLOT11_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
261 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT11_OP", FALSE, 0, 0, TRUE),
262 HOWTO (R_XTENSA_SLOT12_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
263 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT12_OP", FALSE, 0, 0, TRUE),
264 HOWTO (R_XTENSA_SLOT13_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
265 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT13_OP", FALSE, 0, 0, TRUE),
266 HOWTO (R_XTENSA_SLOT14_OP, 0, 0, 0, TRUE, 0, complain_overflow_dont,
267 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT14_OP", FALSE, 0, 0, TRUE),
268
269 /* "Alternate" relocations. The meaning of these is opcode-specific. */
270 HOWTO (R_XTENSA_SLOT0_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
271 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT0_ALT", FALSE, 0, 0, TRUE),
272 HOWTO (R_XTENSA_SLOT1_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
273 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT1_ALT", FALSE, 0, 0, TRUE),
274 HOWTO (R_XTENSA_SLOT2_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
275 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT2_ALT", FALSE, 0, 0, TRUE),
276 HOWTO (R_XTENSA_SLOT3_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
277 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT3_ALT", FALSE, 0, 0, TRUE),
278 HOWTO (R_XTENSA_SLOT4_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
279 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT4_ALT", FALSE, 0, 0, TRUE),
280 HOWTO (R_XTENSA_SLOT5_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
281 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT5_ALT", FALSE, 0, 0, TRUE),
282 HOWTO (R_XTENSA_SLOT6_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
283 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT6_ALT", FALSE, 0, 0, TRUE),
284 HOWTO (R_XTENSA_SLOT7_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
285 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT7_ALT", FALSE, 0, 0, TRUE),
286 HOWTO (R_XTENSA_SLOT8_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
287 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT8_ALT", FALSE, 0, 0, TRUE),
288 HOWTO (R_XTENSA_SLOT9_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
289 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT9_ALT", FALSE, 0, 0, TRUE),
290 HOWTO (R_XTENSA_SLOT10_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
291 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT10_ALT", FALSE, 0, 0, TRUE),
292 HOWTO (R_XTENSA_SLOT11_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
293 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT11_ALT", FALSE, 0, 0, TRUE),
294 HOWTO (R_XTENSA_SLOT12_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
295 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT12_ALT", FALSE, 0, 0, TRUE),
296 HOWTO (R_XTENSA_SLOT13_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
297 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT13_ALT", FALSE, 0, 0, TRUE),
298 HOWTO (R_XTENSA_SLOT14_ALT, 0, 0, 0, TRUE, 0, complain_overflow_dont,
299 bfd_elf_xtensa_reloc, "R_XTENSA_SLOT14_ALT", FALSE, 0, 0, TRUE),
300
301 /* TLS relocations. */
302 HOWTO (R_XTENSA_TLSDESC_FN, 0, 2, 32, FALSE, 0, complain_overflow_dont,
303 bfd_elf_xtensa_reloc, "R_XTENSA_TLSDESC_FN",
304 FALSE, 0, 0xffffffff, FALSE),
305 HOWTO (R_XTENSA_TLSDESC_ARG, 0, 2, 32, FALSE, 0, complain_overflow_dont,
306 bfd_elf_xtensa_reloc, "R_XTENSA_TLSDESC_ARG",
307 FALSE, 0, 0xffffffff, FALSE),
308 HOWTO (R_XTENSA_TLS_DTPOFF, 0, 2, 32, FALSE, 0, complain_overflow_dont,
309 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_DTPOFF",
310 FALSE, 0, 0xffffffff, FALSE),
311 HOWTO (R_XTENSA_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_dont,
312 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_TPOFF",
313 FALSE, 0, 0xffffffff, FALSE),
314 HOWTO (R_XTENSA_TLS_FUNC, 0, 0, 0, FALSE, 0, complain_overflow_dont,
315 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_FUNC",
316 FALSE, 0, 0, FALSE),
317 HOWTO (R_XTENSA_TLS_ARG, 0, 0, 0, FALSE, 0, complain_overflow_dont,
318 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_ARG",
319 FALSE, 0, 0, FALSE),
320 HOWTO (R_XTENSA_TLS_CALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
321 bfd_elf_xtensa_reloc, "R_XTENSA_TLS_CALL",
322 FALSE, 0, 0, FALSE),
323 };
324
325 #if DEBUG_GEN_RELOC
326 #define TRACE(str) \
327 fprintf (stderr, "Xtensa bfd reloc lookup %d (%s)\n", code, str)
328 #else
329 #define TRACE(str)
330 #endif
331
332 static reloc_howto_type *
333 elf_xtensa_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
334 bfd_reloc_code_real_type code)
335 {
336 switch (code)
337 {
338 case BFD_RELOC_NONE:
339 TRACE ("BFD_RELOC_NONE");
340 return &elf_howto_table[(unsigned) R_XTENSA_NONE ];
341
342 case BFD_RELOC_32:
343 TRACE ("BFD_RELOC_32");
344 return &elf_howto_table[(unsigned) R_XTENSA_32 ];
345
346 case BFD_RELOC_32_PCREL:
347 TRACE ("BFD_RELOC_32_PCREL");
348 return &elf_howto_table[(unsigned) R_XTENSA_32_PCREL ];
349
350 case BFD_RELOC_XTENSA_DIFF8:
351 TRACE ("BFD_RELOC_XTENSA_DIFF8");
352 return &elf_howto_table[(unsigned) R_XTENSA_DIFF8 ];
353
354 case BFD_RELOC_XTENSA_DIFF16:
355 TRACE ("BFD_RELOC_XTENSA_DIFF16");
356 return &elf_howto_table[(unsigned) R_XTENSA_DIFF16 ];
357
358 case BFD_RELOC_XTENSA_DIFF32:
359 TRACE ("BFD_RELOC_XTENSA_DIFF32");
360 return &elf_howto_table[(unsigned) R_XTENSA_DIFF32 ];
361
362 case BFD_RELOC_XTENSA_RTLD:
363 TRACE ("BFD_RELOC_XTENSA_RTLD");
364 return &elf_howto_table[(unsigned) R_XTENSA_RTLD ];
365
366 case BFD_RELOC_XTENSA_GLOB_DAT:
367 TRACE ("BFD_RELOC_XTENSA_GLOB_DAT");
368 return &elf_howto_table[(unsigned) R_XTENSA_GLOB_DAT ];
369
370 case BFD_RELOC_XTENSA_JMP_SLOT:
371 TRACE ("BFD_RELOC_XTENSA_JMP_SLOT");
372 return &elf_howto_table[(unsigned) R_XTENSA_JMP_SLOT ];
373
374 case BFD_RELOC_XTENSA_RELATIVE:
375 TRACE ("BFD_RELOC_XTENSA_RELATIVE");
376 return &elf_howto_table[(unsigned) R_XTENSA_RELATIVE ];
377
378 case BFD_RELOC_XTENSA_PLT:
379 TRACE ("BFD_RELOC_XTENSA_PLT");
380 return &elf_howto_table[(unsigned) R_XTENSA_PLT ];
381
382 case BFD_RELOC_XTENSA_OP0:
383 TRACE ("BFD_RELOC_XTENSA_OP0");
384 return &elf_howto_table[(unsigned) R_XTENSA_OP0 ];
385
386 case BFD_RELOC_XTENSA_OP1:
387 TRACE ("BFD_RELOC_XTENSA_OP1");
388 return &elf_howto_table[(unsigned) R_XTENSA_OP1 ];
389
390 case BFD_RELOC_XTENSA_OP2:
391 TRACE ("BFD_RELOC_XTENSA_OP2");
392 return &elf_howto_table[(unsigned) R_XTENSA_OP2 ];
393
394 case BFD_RELOC_XTENSA_ASM_EXPAND:
395 TRACE ("BFD_RELOC_XTENSA_ASM_EXPAND");
396 return &elf_howto_table[(unsigned) R_XTENSA_ASM_EXPAND ];
397
398 case BFD_RELOC_XTENSA_ASM_SIMPLIFY:
399 TRACE ("BFD_RELOC_XTENSA_ASM_SIMPLIFY");
400 return &elf_howto_table[(unsigned) R_XTENSA_ASM_SIMPLIFY ];
401
402 case BFD_RELOC_VTABLE_INHERIT:
403 TRACE ("BFD_RELOC_VTABLE_INHERIT");
404 return &elf_howto_table[(unsigned) R_XTENSA_GNU_VTINHERIT ];
405
406 case BFD_RELOC_VTABLE_ENTRY:
407 TRACE ("BFD_RELOC_VTABLE_ENTRY");
408 return &elf_howto_table[(unsigned) R_XTENSA_GNU_VTENTRY ];
409
410 case BFD_RELOC_XTENSA_TLSDESC_FN:
411 TRACE ("BFD_RELOC_XTENSA_TLSDESC_FN");
412 return &elf_howto_table[(unsigned) R_XTENSA_TLSDESC_FN ];
413
414 case BFD_RELOC_XTENSA_TLSDESC_ARG:
415 TRACE ("BFD_RELOC_XTENSA_TLSDESC_ARG");
416 return &elf_howto_table[(unsigned) R_XTENSA_TLSDESC_ARG ];
417
418 case BFD_RELOC_XTENSA_TLS_DTPOFF:
419 TRACE ("BFD_RELOC_XTENSA_TLS_DTPOFF");
420 return &elf_howto_table[(unsigned) R_XTENSA_TLS_DTPOFF ];
421
422 case BFD_RELOC_XTENSA_TLS_TPOFF:
423 TRACE ("BFD_RELOC_XTENSA_TLS_TPOFF");
424 return &elf_howto_table[(unsigned) R_XTENSA_TLS_TPOFF ];
425
426 case BFD_RELOC_XTENSA_TLS_FUNC:
427 TRACE ("BFD_RELOC_XTENSA_TLS_FUNC");
428 return &elf_howto_table[(unsigned) R_XTENSA_TLS_FUNC ];
429
430 case BFD_RELOC_XTENSA_TLS_ARG:
431 TRACE ("BFD_RELOC_XTENSA_TLS_ARG");
432 return &elf_howto_table[(unsigned) R_XTENSA_TLS_ARG ];
433
434 case BFD_RELOC_XTENSA_TLS_CALL:
435 TRACE ("BFD_RELOC_XTENSA_TLS_CALL");
436 return &elf_howto_table[(unsigned) R_XTENSA_TLS_CALL ];
437
438 default:
439 if (code >= BFD_RELOC_XTENSA_SLOT0_OP
440 && code <= BFD_RELOC_XTENSA_SLOT14_OP)
441 {
442 unsigned n = (R_XTENSA_SLOT0_OP +
443 (code - BFD_RELOC_XTENSA_SLOT0_OP));
444 return &elf_howto_table[n];
445 }
446
447 if (code >= BFD_RELOC_XTENSA_SLOT0_ALT
448 && code <= BFD_RELOC_XTENSA_SLOT14_ALT)
449 {
450 unsigned n = (R_XTENSA_SLOT0_ALT +
451 (code - BFD_RELOC_XTENSA_SLOT0_ALT));
452 return &elf_howto_table[n];
453 }
454
455 break;
456 }
457
458 /* xgettext:c-format */
459 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd, (int) code);
460 bfd_set_error (bfd_error_bad_value);
461 TRACE ("Unknown");
462 return NULL;
463 }
464
465 static reloc_howto_type *
466 elf_xtensa_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
467 const char *r_name)
468 {
469 unsigned int i;
470
471 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
472 if (elf_howto_table[i].name != NULL
473 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
474 return &elf_howto_table[i];
475
476 return NULL;
477 }
478
479
480 /* Given an ELF "rela" relocation, find the corresponding howto and record
481 it in the BFD internal arelent representation of the relocation. */
482
483 static bfd_boolean
484 elf_xtensa_info_to_howto_rela (bfd *abfd,
485 arelent *cache_ptr,
486 Elf_Internal_Rela *dst)
487 {
488 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
489
490 if (r_type >= (unsigned int) R_XTENSA_max)
491 {
492 /* xgettext:c-format */
493 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
494 abfd, r_type);
495 bfd_set_error (bfd_error_bad_value);
496 return FALSE;
497 }
498 cache_ptr->howto = &elf_howto_table[r_type];
499 return TRUE;
500 }
501
502 \f
503 /* Functions for the Xtensa ELF linker. */
504
505 /* The name of the dynamic interpreter. This is put in the .interp
506 section. */
507
508 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so"
509
510 /* The size in bytes of an entry in the procedure linkage table.
511 (This does _not_ include the space for the literals associated with
512 the PLT entry.) */
513
514 #define PLT_ENTRY_SIZE 16
515
516 /* For _really_ large PLTs, we may need to alternate between literals
517 and code to keep the literals within the 256K range of the L32R
518 instructions in the code. It's unlikely that anyone would ever need
519 such a big PLT, but an arbitrary limit on the PLT size would be bad.
520 Thus, we split the PLT into chunks. Since there's very little
521 overhead (2 extra literals) for each chunk, the chunk size is kept
522 small so that the code for handling multiple chunks get used and
523 tested regularly. With 254 entries, there are 1K of literals for
524 each chunk, and that seems like a nice round number. */
525
526 #define PLT_ENTRIES_PER_CHUNK 254
527
528 /* PLT entries are actually used as stub functions for lazy symbol
529 resolution. Once the symbol is resolved, the stub function is never
530 invoked. Note: the 32-byte frame size used here cannot be changed
531 without a corresponding change in the runtime linker. */
532
533 static const bfd_byte elf_xtensa_be_plt_entry[][PLT_ENTRY_SIZE] =
534 {
535 {
536 0x6c, 0x10, 0x04, /* entry sp, 32 */
537 0x18, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
538 0x1a, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
539 0x1b, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
540 0x0a, 0x80, 0x00, /* jx a8 */
541 0 /* unused */
542 },
543 {
544 0x18, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
545 0x1a, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
546 0x1b, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
547 0x0a, 0x80, 0x00, /* jx a8 */
548 0 /* unused */
549 }
550 };
551
552 static const bfd_byte elf_xtensa_le_plt_entry[][PLT_ENTRY_SIZE] =
553 {
554 {
555 0x36, 0x41, 0x00, /* entry sp, 32 */
556 0x81, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
557 0xa1, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
558 0xb1, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
559 0xa0, 0x08, 0x00, /* jx a8 */
560 0 /* unused */
561 },
562 {
563 0x81, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
564 0xa1, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
565 0xb1, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
566 0xa0, 0x08, 0x00, /* jx a8 */
567 0 /* unused */
568 }
569 };
570
571 /* The size of the thread control block. */
572 #define TCB_SIZE 8
573
574 struct elf_xtensa_link_hash_entry
575 {
576 struct elf_link_hash_entry elf;
577
578 bfd_signed_vma tlsfunc_refcount;
579
580 #define GOT_UNKNOWN 0
581 #define GOT_NORMAL 1
582 #define GOT_TLS_GD 2 /* global or local dynamic */
583 #define GOT_TLS_IE 4 /* initial or local exec */
584 #define GOT_TLS_ANY (GOT_TLS_GD | GOT_TLS_IE)
585 unsigned char tls_type;
586 };
587
588 #define elf_xtensa_hash_entry(ent) ((struct elf_xtensa_link_hash_entry *)(ent))
589
590 struct elf_xtensa_obj_tdata
591 {
592 struct elf_obj_tdata root;
593
594 /* tls_type for each local got entry. */
595 char *local_got_tls_type;
596
597 bfd_signed_vma *local_tlsfunc_refcounts;
598 };
599
600 #define elf_xtensa_tdata(abfd) \
601 ((struct elf_xtensa_obj_tdata *) (abfd)->tdata.any)
602
603 #define elf_xtensa_local_got_tls_type(abfd) \
604 (elf_xtensa_tdata (abfd)->local_got_tls_type)
605
606 #define elf_xtensa_local_tlsfunc_refcounts(abfd) \
607 (elf_xtensa_tdata (abfd)->local_tlsfunc_refcounts)
608
609 #define is_xtensa_elf(bfd) \
610 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
611 && elf_tdata (bfd) != NULL \
612 && elf_object_id (bfd) == XTENSA_ELF_DATA)
613
614 static bfd_boolean
615 elf_xtensa_mkobject (bfd *abfd)
616 {
617 return bfd_elf_allocate_object (abfd, sizeof (struct elf_xtensa_obj_tdata),
618 XTENSA_ELF_DATA);
619 }
620
621 /* Xtensa ELF linker hash table. */
622
623 struct elf_xtensa_link_hash_table
624 {
625 struct elf_link_hash_table elf;
626
627 /* Short-cuts to get to dynamic linker sections. */
628 asection *sgotloc;
629 asection *spltlittbl;
630
631 /* Total count of PLT relocations seen during check_relocs.
632 The actual PLT code must be split into multiple sections and all
633 the sections have to be created before size_dynamic_sections,
634 where we figure out the exact number of PLT entries that will be
635 needed. It is OK if this count is an overestimate, e.g., some
636 relocations may be removed by GC. */
637 int plt_reloc_count;
638
639 struct elf_xtensa_link_hash_entry *tlsbase;
640 };
641
642 /* Get the Xtensa ELF linker hash table from a link_info structure. */
643
644 #define elf_xtensa_hash_table(p) \
645 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
646 == XTENSA_ELF_DATA ? ((struct elf_xtensa_link_hash_table *) ((p)->hash)) : NULL)
647
648 /* Create an entry in an Xtensa ELF linker hash table. */
649
650 static struct bfd_hash_entry *
651 elf_xtensa_link_hash_newfunc (struct bfd_hash_entry *entry,
652 struct bfd_hash_table *table,
653 const char *string)
654 {
655 /* Allocate the structure if it has not already been allocated by a
656 subclass. */
657 if (entry == NULL)
658 {
659 entry = bfd_hash_allocate (table,
660 sizeof (struct elf_xtensa_link_hash_entry));
661 if (entry == NULL)
662 return entry;
663 }
664
665 /* Call the allocation method of the superclass. */
666 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
667 if (entry != NULL)
668 {
669 struct elf_xtensa_link_hash_entry *eh = elf_xtensa_hash_entry (entry);
670 eh->tlsfunc_refcount = 0;
671 eh->tls_type = GOT_UNKNOWN;
672 }
673
674 return entry;
675 }
676
677 /* Create an Xtensa ELF linker hash table. */
678
679 static struct bfd_link_hash_table *
680 elf_xtensa_link_hash_table_create (bfd *abfd)
681 {
682 struct elf_link_hash_entry *tlsbase;
683 struct elf_xtensa_link_hash_table *ret;
684 bfd_size_type amt = sizeof (struct elf_xtensa_link_hash_table);
685
686 ret = bfd_zmalloc (amt);
687 if (ret == NULL)
688 return NULL;
689
690 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
691 elf_xtensa_link_hash_newfunc,
692 sizeof (struct elf_xtensa_link_hash_entry),
693 XTENSA_ELF_DATA))
694 {
695 free (ret);
696 return NULL;
697 }
698
699 /* Create a hash entry for "_TLS_MODULE_BASE_" to speed up checking
700 for it later. */
701 tlsbase = elf_link_hash_lookup (&ret->elf, "_TLS_MODULE_BASE_",
702 TRUE, FALSE, FALSE);
703 tlsbase->root.type = bfd_link_hash_new;
704 tlsbase->root.u.undef.abfd = NULL;
705 tlsbase->non_elf = 0;
706 ret->tlsbase = elf_xtensa_hash_entry (tlsbase);
707 ret->tlsbase->tls_type = GOT_UNKNOWN;
708
709 return &ret->elf.root;
710 }
711
712 /* Copy the extra info we tack onto an elf_link_hash_entry. */
713
714 static void
715 elf_xtensa_copy_indirect_symbol (struct bfd_link_info *info,
716 struct elf_link_hash_entry *dir,
717 struct elf_link_hash_entry *ind)
718 {
719 struct elf_xtensa_link_hash_entry *edir, *eind;
720
721 edir = elf_xtensa_hash_entry (dir);
722 eind = elf_xtensa_hash_entry (ind);
723
724 if (ind->root.type == bfd_link_hash_indirect)
725 {
726 edir->tlsfunc_refcount += eind->tlsfunc_refcount;
727 eind->tlsfunc_refcount = 0;
728
729 if (dir->got.refcount <= 0)
730 {
731 edir->tls_type = eind->tls_type;
732 eind->tls_type = GOT_UNKNOWN;
733 }
734 }
735
736 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
737 }
738
739 static inline bfd_boolean
740 elf_xtensa_dynamic_symbol_p (struct elf_link_hash_entry *h,
741 struct bfd_link_info *info)
742 {
743 /* Check if we should do dynamic things to this symbol. The
744 "ignore_protected" argument need not be set, because Xtensa code
745 does not require special handling of STV_PROTECTED to make function
746 pointer comparisons work properly. The PLT addresses are never
747 used for function pointers. */
748
749 return _bfd_elf_dynamic_symbol_p (h, info, 0);
750 }
751
752 \f
753 static int
754 property_table_compare (const void *ap, const void *bp)
755 {
756 const property_table_entry *a = (const property_table_entry *) ap;
757 const property_table_entry *b = (const property_table_entry *) bp;
758
759 if (a->address == b->address)
760 {
761 if (a->size != b->size)
762 return (a->size - b->size);
763
764 if ((a->flags & XTENSA_PROP_ALIGN) != (b->flags & XTENSA_PROP_ALIGN))
765 return ((b->flags & XTENSA_PROP_ALIGN)
766 - (a->flags & XTENSA_PROP_ALIGN));
767
768 if ((a->flags & XTENSA_PROP_ALIGN)
769 && (GET_XTENSA_PROP_ALIGNMENT (a->flags)
770 != GET_XTENSA_PROP_ALIGNMENT (b->flags)))
771 return (GET_XTENSA_PROP_ALIGNMENT (a->flags)
772 - GET_XTENSA_PROP_ALIGNMENT (b->flags));
773
774 if ((a->flags & XTENSA_PROP_UNREACHABLE)
775 != (b->flags & XTENSA_PROP_UNREACHABLE))
776 return ((b->flags & XTENSA_PROP_UNREACHABLE)
777 - (a->flags & XTENSA_PROP_UNREACHABLE));
778
779 return (a->flags - b->flags);
780 }
781
782 return (a->address - b->address);
783 }
784
785
786 static int
787 property_table_matches (const void *ap, const void *bp)
788 {
789 const property_table_entry *a = (const property_table_entry *) ap;
790 const property_table_entry *b = (const property_table_entry *) bp;
791
792 /* Check if one entry overlaps with the other. */
793 if ((b->address >= a->address && b->address < (a->address + a->size))
794 || (a->address >= b->address && a->address < (b->address + b->size)))
795 return 0;
796
797 return (a->address - b->address);
798 }
799
800
801 /* Get the literal table or property table entries for the given
802 section. Sets TABLE_P and returns the number of entries. On
803 error, returns a negative value. */
804
805 static int
806 xtensa_read_table_entries (bfd *abfd,
807 asection *section,
808 property_table_entry **table_p,
809 const char *sec_name,
810 bfd_boolean output_addr)
811 {
812 asection *table_section;
813 bfd_size_type table_size = 0;
814 bfd_byte *table_data;
815 property_table_entry *blocks;
816 int blk, block_count;
817 bfd_size_type num_records;
818 Elf_Internal_Rela *internal_relocs, *irel, *rel_end;
819 bfd_vma section_addr, off;
820 flagword predef_flags;
821 bfd_size_type table_entry_size, section_limit;
822
823 if (!section
824 || !(section->flags & SEC_ALLOC)
825 || (section->flags & SEC_DEBUGGING))
826 {
827 *table_p = NULL;
828 return 0;
829 }
830
831 table_section = xtensa_get_property_section (section, sec_name);
832 if (table_section)
833 table_size = table_section->size;
834
835 if (table_size == 0)
836 {
837 *table_p = NULL;
838 return 0;
839 }
840
841 predef_flags = xtensa_get_property_predef_flags (table_section);
842 table_entry_size = 12;
843 if (predef_flags)
844 table_entry_size -= 4;
845
846 num_records = table_size / table_entry_size;
847 table_data = retrieve_contents (abfd, table_section, TRUE);
848 blocks = (property_table_entry *)
849 bfd_malloc (num_records * sizeof (property_table_entry));
850 block_count = 0;
851
852 if (output_addr)
853 section_addr = section->output_section->vma + section->output_offset;
854 else
855 section_addr = section->vma;
856
857 internal_relocs = retrieve_internal_relocs (abfd, table_section, TRUE);
858 if (internal_relocs && !table_section->reloc_done)
859 {
860 qsort (internal_relocs, table_section->reloc_count,
861 sizeof (Elf_Internal_Rela), internal_reloc_compare);
862 irel = internal_relocs;
863 }
864 else
865 irel = NULL;
866
867 section_limit = bfd_get_section_limit (abfd, section);
868 rel_end = internal_relocs + table_section->reloc_count;
869
870 for (off = 0; off < table_size; off += table_entry_size)
871 {
872 bfd_vma address = bfd_get_32 (abfd, table_data + off);
873
874 /* Skip any relocations before the current offset. This should help
875 avoid confusion caused by unexpected relocations for the preceding
876 table entry. */
877 while (irel &&
878 (irel->r_offset < off
879 || (irel->r_offset == off
880 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_NONE)))
881 {
882 irel += 1;
883 if (irel >= rel_end)
884 irel = 0;
885 }
886
887 if (irel && irel->r_offset == off)
888 {
889 bfd_vma sym_off;
890 unsigned long r_symndx = ELF32_R_SYM (irel->r_info);
891 BFD_ASSERT (ELF32_R_TYPE (irel->r_info) == R_XTENSA_32);
892
893 if (get_elf_r_symndx_section (abfd, r_symndx) != section)
894 continue;
895
896 sym_off = get_elf_r_symndx_offset (abfd, r_symndx);
897 BFD_ASSERT (sym_off == 0);
898 address += (section_addr + sym_off + irel->r_addend);
899 }
900 else
901 {
902 if (address < section_addr
903 || address >= section_addr + section_limit)
904 continue;
905 }
906
907 blocks[block_count].address = address;
908 blocks[block_count].size = bfd_get_32 (abfd, table_data + off + 4);
909 if (predef_flags)
910 blocks[block_count].flags = predef_flags;
911 else
912 blocks[block_count].flags = bfd_get_32 (abfd, table_data + off + 8);
913 block_count++;
914 }
915
916 release_contents (table_section, table_data);
917 release_internal_relocs (table_section, internal_relocs);
918
919 if (block_count > 0)
920 {
921 /* Now sort them into address order for easy reference. */
922 qsort (blocks, block_count, sizeof (property_table_entry),
923 property_table_compare);
924
925 /* Check that the table contents are valid. Problems may occur,
926 for example, if an unrelocated object file is stripped. */
927 for (blk = 1; blk < block_count; blk++)
928 {
929 /* The only circumstance where two entries may legitimately
930 have the same address is when one of them is a zero-size
931 placeholder to mark a place where fill can be inserted.
932 The zero-size entry should come first. */
933 if (blocks[blk - 1].address == blocks[blk].address &&
934 blocks[blk - 1].size != 0)
935 {
936 /* xgettext:c-format */
937 _bfd_error_handler (_("%pB(%pA): invalid property table"),
938 abfd, section);
939 bfd_set_error (bfd_error_bad_value);
940 free (blocks);
941 return -1;
942 }
943 }
944 }
945
946 *table_p = blocks;
947 return block_count;
948 }
949
950
951 static property_table_entry *
952 elf_xtensa_find_property_entry (property_table_entry *property_table,
953 int property_table_size,
954 bfd_vma addr)
955 {
956 property_table_entry entry;
957 property_table_entry *rv;
958
959 if (property_table_size == 0)
960 return NULL;
961
962 entry.address = addr;
963 entry.size = 1;
964 entry.flags = 0;
965
966 rv = bsearch (&entry, property_table, property_table_size,
967 sizeof (property_table_entry), property_table_matches);
968 return rv;
969 }
970
971
972 static bfd_boolean
973 elf_xtensa_in_literal_pool (property_table_entry *lit_table,
974 int lit_table_size,
975 bfd_vma addr)
976 {
977 if (elf_xtensa_find_property_entry (lit_table, lit_table_size, addr))
978 return TRUE;
979
980 return FALSE;
981 }
982
983 \f
984 /* Look through the relocs for a section during the first phase, and
985 calculate needed space in the dynamic reloc sections. */
986
987 static bfd_boolean
988 elf_xtensa_check_relocs (bfd *abfd,
989 struct bfd_link_info *info,
990 asection *sec,
991 const Elf_Internal_Rela *relocs)
992 {
993 struct elf_xtensa_link_hash_table *htab;
994 Elf_Internal_Shdr *symtab_hdr;
995 struct elf_link_hash_entry **sym_hashes;
996 const Elf_Internal_Rela *rel;
997 const Elf_Internal_Rela *rel_end;
998
999 if (bfd_link_relocatable (info) || (sec->flags & SEC_ALLOC) == 0)
1000 return TRUE;
1001
1002 BFD_ASSERT (is_xtensa_elf (abfd));
1003
1004 htab = elf_xtensa_hash_table (info);
1005 if (htab == NULL)
1006 return FALSE;
1007
1008 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1009 sym_hashes = elf_sym_hashes (abfd);
1010
1011 rel_end = relocs + sec->reloc_count;
1012 for (rel = relocs; rel < rel_end; rel++)
1013 {
1014 unsigned int r_type;
1015 unsigned r_symndx;
1016 struct elf_link_hash_entry *h = NULL;
1017 struct elf_xtensa_link_hash_entry *eh;
1018 int tls_type, old_tls_type;
1019 bfd_boolean is_got = FALSE;
1020 bfd_boolean is_plt = FALSE;
1021 bfd_boolean is_tlsfunc = FALSE;
1022
1023 r_symndx = ELF32_R_SYM (rel->r_info);
1024 r_type = ELF32_R_TYPE (rel->r_info);
1025
1026 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1027 {
1028 /* xgettext:c-format */
1029 _bfd_error_handler (_("%pB: bad symbol index: %d"),
1030 abfd, r_symndx);
1031 return FALSE;
1032 }
1033
1034 if (r_symndx >= symtab_hdr->sh_info)
1035 {
1036 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1037 while (h->root.type == bfd_link_hash_indirect
1038 || h->root.type == bfd_link_hash_warning)
1039 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1040 }
1041 eh = elf_xtensa_hash_entry (h);
1042
1043 switch (r_type)
1044 {
1045 case R_XTENSA_TLSDESC_FN:
1046 if (bfd_link_pic (info))
1047 {
1048 tls_type = GOT_TLS_GD;
1049 is_got = TRUE;
1050 is_tlsfunc = TRUE;
1051 }
1052 else
1053 tls_type = GOT_TLS_IE;
1054 break;
1055
1056 case R_XTENSA_TLSDESC_ARG:
1057 if (bfd_link_pic (info))
1058 {
1059 tls_type = GOT_TLS_GD;
1060 is_got = TRUE;
1061 }
1062 else
1063 {
1064 tls_type = GOT_TLS_IE;
1065 if (h && elf_xtensa_hash_entry (h) != htab->tlsbase)
1066 is_got = TRUE;
1067 }
1068 break;
1069
1070 case R_XTENSA_TLS_DTPOFF:
1071 if (bfd_link_pic (info))
1072 tls_type = GOT_TLS_GD;
1073 else
1074 tls_type = GOT_TLS_IE;
1075 break;
1076
1077 case R_XTENSA_TLS_TPOFF:
1078 tls_type = GOT_TLS_IE;
1079 if (bfd_link_pic (info))
1080 info->flags |= DF_STATIC_TLS;
1081 if (bfd_link_pic (info) || h)
1082 is_got = TRUE;
1083 break;
1084
1085 case R_XTENSA_32:
1086 tls_type = GOT_NORMAL;
1087 is_got = TRUE;
1088 break;
1089
1090 case R_XTENSA_PLT:
1091 tls_type = GOT_NORMAL;
1092 is_plt = TRUE;
1093 break;
1094
1095 case R_XTENSA_GNU_VTINHERIT:
1096 /* This relocation describes the C++ object vtable hierarchy.
1097 Reconstruct it for later use during GC. */
1098 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1099 return FALSE;
1100 continue;
1101
1102 case R_XTENSA_GNU_VTENTRY:
1103 /* This relocation describes which C++ vtable entries are actually
1104 used. Record for later use during GC. */
1105 BFD_ASSERT (h != NULL);
1106 if (h != NULL
1107 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1108 return FALSE;
1109 continue;
1110
1111 default:
1112 /* Nothing to do for any other relocations. */
1113 continue;
1114 }
1115
1116 if (h)
1117 {
1118 if (is_plt)
1119 {
1120 if (h->plt.refcount <= 0)
1121 {
1122 h->needs_plt = 1;
1123 h->plt.refcount = 1;
1124 }
1125 else
1126 h->plt.refcount += 1;
1127
1128 /* Keep track of the total PLT relocation count even if we
1129 don't yet know whether the dynamic sections will be
1130 created. */
1131 htab->plt_reloc_count += 1;
1132
1133 if (elf_hash_table (info)->dynamic_sections_created)
1134 {
1135 if (! add_extra_plt_sections (info, htab->plt_reloc_count))
1136 return FALSE;
1137 }
1138 }
1139 else if (is_got)
1140 {
1141 if (h->got.refcount <= 0)
1142 h->got.refcount = 1;
1143 else
1144 h->got.refcount += 1;
1145 }
1146
1147 if (is_tlsfunc)
1148 eh->tlsfunc_refcount += 1;
1149
1150 old_tls_type = eh->tls_type;
1151 }
1152 else
1153 {
1154 /* Allocate storage the first time. */
1155 if (elf_local_got_refcounts (abfd) == NULL)
1156 {
1157 bfd_size_type size = symtab_hdr->sh_info;
1158 void *mem;
1159
1160 mem = bfd_zalloc (abfd, size * sizeof (bfd_signed_vma));
1161 if (mem == NULL)
1162 return FALSE;
1163 elf_local_got_refcounts (abfd) = (bfd_signed_vma *) mem;
1164
1165 mem = bfd_zalloc (abfd, size);
1166 if (mem == NULL)
1167 return FALSE;
1168 elf_xtensa_local_got_tls_type (abfd) = (char *) mem;
1169
1170 mem = bfd_zalloc (abfd, size * sizeof (bfd_signed_vma));
1171 if (mem == NULL)
1172 return FALSE;
1173 elf_xtensa_local_tlsfunc_refcounts (abfd)
1174 = (bfd_signed_vma *) mem;
1175 }
1176
1177 /* This is a global offset table entry for a local symbol. */
1178 if (is_got || is_plt)
1179 elf_local_got_refcounts (abfd) [r_symndx] += 1;
1180
1181 if (is_tlsfunc)
1182 elf_xtensa_local_tlsfunc_refcounts (abfd) [r_symndx] += 1;
1183
1184 old_tls_type = elf_xtensa_local_got_tls_type (abfd) [r_symndx];
1185 }
1186
1187 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_IE))
1188 tls_type |= old_tls_type;
1189 /* If a TLS symbol is accessed using IE at least once,
1190 there is no point to use a dynamic model for it. */
1191 else if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
1192 && ((old_tls_type & GOT_TLS_GD) == 0
1193 || (tls_type & GOT_TLS_IE) == 0))
1194 {
1195 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_GD))
1196 tls_type = old_tls_type;
1197 else if ((old_tls_type & GOT_TLS_GD) && (tls_type & GOT_TLS_GD))
1198 tls_type |= old_tls_type;
1199 else
1200 {
1201 _bfd_error_handler
1202 /* xgettext:c-format */
1203 (_("%pB: `%s' accessed both as normal and thread local symbol"),
1204 abfd,
1205 h ? h->root.root.string : "<local>");
1206 return FALSE;
1207 }
1208 }
1209
1210 if (old_tls_type != tls_type)
1211 {
1212 if (eh)
1213 eh->tls_type = tls_type;
1214 else
1215 elf_xtensa_local_got_tls_type (abfd) [r_symndx] = tls_type;
1216 }
1217 }
1218
1219 return TRUE;
1220 }
1221
1222
1223 static void
1224 elf_xtensa_make_sym_local (struct bfd_link_info *info,
1225 struct elf_link_hash_entry *h)
1226 {
1227 if (bfd_link_pic (info))
1228 {
1229 if (h->plt.refcount > 0)
1230 {
1231 /* For shared objects, there's no need for PLT entries for local
1232 symbols (use RELATIVE relocs instead of JMP_SLOT relocs). */
1233 if (h->got.refcount < 0)
1234 h->got.refcount = 0;
1235 h->got.refcount += h->plt.refcount;
1236 h->plt.refcount = 0;
1237 }
1238 }
1239 else
1240 {
1241 /* Don't need any dynamic relocations at all. */
1242 h->plt.refcount = 0;
1243 h->got.refcount = 0;
1244 }
1245 }
1246
1247
1248 static void
1249 elf_xtensa_hide_symbol (struct bfd_link_info *info,
1250 struct elf_link_hash_entry *h,
1251 bfd_boolean force_local)
1252 {
1253 /* For a shared link, move the plt refcount to the got refcount to leave
1254 space for RELATIVE relocs. */
1255 elf_xtensa_make_sym_local (info, h);
1256
1257 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
1258 }
1259
1260
1261 /* Return the section that should be marked against GC for a given
1262 relocation. */
1263
1264 static asection *
1265 elf_xtensa_gc_mark_hook (asection *sec,
1266 struct bfd_link_info *info,
1267 Elf_Internal_Rela *rel,
1268 struct elf_link_hash_entry *h,
1269 Elf_Internal_Sym *sym)
1270 {
1271 /* Property sections are marked "KEEP" in the linker scripts, but they
1272 should not cause other sections to be marked. (This approach relies
1273 on elf_xtensa_discard_info to remove property table entries that
1274 describe discarded sections. Alternatively, it might be more
1275 efficient to avoid using "KEEP" in the linker scripts and instead use
1276 the gc_mark_extra_sections hook to mark only the property sections
1277 that describe marked sections. That alternative does not work well
1278 with the current property table sections, which do not correspond
1279 one-to-one with the sections they describe, but that should be fixed
1280 someday.) */
1281 if (xtensa_is_property_section (sec))
1282 return NULL;
1283
1284 if (h != NULL)
1285 switch (ELF32_R_TYPE (rel->r_info))
1286 {
1287 case R_XTENSA_GNU_VTINHERIT:
1288 case R_XTENSA_GNU_VTENTRY:
1289 return NULL;
1290 }
1291
1292 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1293 }
1294
1295
1296 /* Create all the dynamic sections. */
1297
1298 static bfd_boolean
1299 elf_xtensa_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
1300 {
1301 struct elf_xtensa_link_hash_table *htab;
1302 flagword flags, noalloc_flags;
1303
1304 htab = elf_xtensa_hash_table (info);
1305 if (htab == NULL)
1306 return FALSE;
1307
1308 /* First do all the standard stuff. */
1309 if (! _bfd_elf_create_dynamic_sections (dynobj, info))
1310 return FALSE;
1311
1312 /* Create any extra PLT sections in case check_relocs has already
1313 been called on all the non-dynamic input files. */
1314 if (! add_extra_plt_sections (info, htab->plt_reloc_count))
1315 return FALSE;
1316
1317 noalloc_flags = (SEC_HAS_CONTENTS | SEC_IN_MEMORY
1318 | SEC_LINKER_CREATED | SEC_READONLY);
1319 flags = noalloc_flags | SEC_ALLOC | SEC_LOAD;
1320
1321 /* Mark the ".got.plt" section READONLY. */
1322 if (htab->elf.sgotplt == NULL
1323 || ! bfd_set_section_flags (dynobj, htab->elf.sgotplt, flags))
1324 return FALSE;
1325
1326 /* Create ".got.loc" (literal tables for use by dynamic linker). */
1327 htab->sgotloc = bfd_make_section_anyway_with_flags (dynobj, ".got.loc",
1328 flags);
1329 if (htab->sgotloc == NULL
1330 || ! bfd_set_section_alignment (dynobj, htab->sgotloc, 2))
1331 return FALSE;
1332
1333 /* Create ".xt.lit.plt" (literal table for ".got.plt*"). */
1334 htab->spltlittbl = bfd_make_section_anyway_with_flags (dynobj, ".xt.lit.plt",
1335 noalloc_flags);
1336 if (htab->spltlittbl == NULL
1337 || ! bfd_set_section_alignment (dynobj, htab->spltlittbl, 2))
1338 return FALSE;
1339
1340 return TRUE;
1341 }
1342
1343
1344 static bfd_boolean
1345 add_extra_plt_sections (struct bfd_link_info *info, int count)
1346 {
1347 bfd *dynobj = elf_hash_table (info)->dynobj;
1348 int chunk;
1349
1350 /* Iterate over all chunks except 0 which uses the standard ".plt" and
1351 ".got.plt" sections. */
1352 for (chunk = count / PLT_ENTRIES_PER_CHUNK; chunk > 0; chunk--)
1353 {
1354 char *sname;
1355 flagword flags;
1356 asection *s;
1357
1358 /* Stop when we find a section has already been created. */
1359 if (elf_xtensa_get_plt_section (info, chunk))
1360 break;
1361
1362 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1363 | SEC_LINKER_CREATED | SEC_READONLY);
1364
1365 sname = (char *) bfd_malloc (10);
1366 sprintf (sname, ".plt.%u", chunk);
1367 s = bfd_make_section_anyway_with_flags (dynobj, sname, flags | SEC_CODE);
1368 if (s == NULL
1369 || ! bfd_set_section_alignment (dynobj, s, 2))
1370 return FALSE;
1371
1372 sname = (char *) bfd_malloc (14);
1373 sprintf (sname, ".got.plt.%u", chunk);
1374 s = bfd_make_section_anyway_with_flags (dynobj, sname, flags);
1375 if (s == NULL
1376 || ! bfd_set_section_alignment (dynobj, s, 2))
1377 return FALSE;
1378 }
1379
1380 return TRUE;
1381 }
1382
1383
1384 /* Adjust a symbol defined by a dynamic object and referenced by a
1385 regular object. The current definition is in some section of the
1386 dynamic object, but we're not including those sections. We have to
1387 change the definition to something the rest of the link can
1388 understand. */
1389
1390 static bfd_boolean
1391 elf_xtensa_adjust_dynamic_symbol (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1392 struct elf_link_hash_entry *h)
1393 {
1394 /* If this is a weak symbol, and there is a real definition, the
1395 processor independent code will have arranged for us to see the
1396 real definition first, and we can just use the same value. */
1397 if (h->is_weakalias)
1398 {
1399 struct elf_link_hash_entry *def = weakdef (h);
1400 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1401 h->root.u.def.section = def->root.u.def.section;
1402 h->root.u.def.value = def->root.u.def.value;
1403 return TRUE;
1404 }
1405
1406 /* This is a reference to a symbol defined by a dynamic object. The
1407 reference must go through the GOT, so there's no need for COPY relocs,
1408 .dynbss, etc. */
1409
1410 return TRUE;
1411 }
1412
1413
1414 static bfd_boolean
1415 elf_xtensa_allocate_dynrelocs (struct elf_link_hash_entry *h, void *arg)
1416 {
1417 struct bfd_link_info *info;
1418 struct elf_xtensa_link_hash_table *htab;
1419 struct elf_xtensa_link_hash_entry *eh = elf_xtensa_hash_entry (h);
1420
1421 if (h->root.type == bfd_link_hash_indirect)
1422 return TRUE;
1423
1424 info = (struct bfd_link_info *) arg;
1425 htab = elf_xtensa_hash_table (info);
1426 if (htab == NULL)
1427 return FALSE;
1428
1429 /* If we saw any use of an IE model for this symbol, we can then optimize
1430 away GOT entries for any TLSDESC_FN relocs. */
1431 if ((eh->tls_type & GOT_TLS_IE) != 0)
1432 {
1433 BFD_ASSERT (h->got.refcount >= eh->tlsfunc_refcount);
1434 h->got.refcount -= eh->tlsfunc_refcount;
1435 }
1436
1437 if (! elf_xtensa_dynamic_symbol_p (h, info))
1438 elf_xtensa_make_sym_local (info, h);
1439
1440 if (h->plt.refcount > 0)
1441 htab->elf.srelplt->size += (h->plt.refcount * sizeof (Elf32_External_Rela));
1442
1443 if (h->got.refcount > 0)
1444 htab->elf.srelgot->size += (h->got.refcount * sizeof (Elf32_External_Rela));
1445
1446 return TRUE;
1447 }
1448
1449
1450 static void
1451 elf_xtensa_allocate_local_got_size (struct bfd_link_info *info)
1452 {
1453 struct elf_xtensa_link_hash_table *htab;
1454 bfd *i;
1455
1456 htab = elf_xtensa_hash_table (info);
1457 if (htab == NULL)
1458 return;
1459
1460 for (i = info->input_bfds; i; i = i->link.next)
1461 {
1462 bfd_signed_vma *local_got_refcounts;
1463 bfd_size_type j, cnt;
1464 Elf_Internal_Shdr *symtab_hdr;
1465
1466 local_got_refcounts = elf_local_got_refcounts (i);
1467 if (!local_got_refcounts)
1468 continue;
1469
1470 symtab_hdr = &elf_tdata (i)->symtab_hdr;
1471 cnt = symtab_hdr->sh_info;
1472
1473 for (j = 0; j < cnt; ++j)
1474 {
1475 /* If we saw any use of an IE model for this symbol, we can
1476 then optimize away GOT entries for any TLSDESC_FN relocs. */
1477 if ((elf_xtensa_local_got_tls_type (i) [j] & GOT_TLS_IE) != 0)
1478 {
1479 bfd_signed_vma *tlsfunc_refcount
1480 = &elf_xtensa_local_tlsfunc_refcounts (i) [j];
1481 BFD_ASSERT (local_got_refcounts[j] >= *tlsfunc_refcount);
1482 local_got_refcounts[j] -= *tlsfunc_refcount;
1483 }
1484
1485 if (local_got_refcounts[j] > 0)
1486 htab->elf.srelgot->size += (local_got_refcounts[j]
1487 * sizeof (Elf32_External_Rela));
1488 }
1489 }
1490 }
1491
1492
1493 /* Set the sizes of the dynamic sections. */
1494
1495 static bfd_boolean
1496 elf_xtensa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1497 struct bfd_link_info *info)
1498 {
1499 struct elf_xtensa_link_hash_table *htab;
1500 bfd *dynobj, *abfd;
1501 asection *s, *srelplt, *splt, *sgotplt, *srelgot, *spltlittbl, *sgotloc;
1502 bfd_boolean relplt, relgot;
1503 int plt_entries, plt_chunks, chunk;
1504
1505 plt_entries = 0;
1506 plt_chunks = 0;
1507
1508 htab = elf_xtensa_hash_table (info);
1509 if (htab == NULL)
1510 return FALSE;
1511
1512 dynobj = elf_hash_table (info)->dynobj;
1513 if (dynobj == NULL)
1514 abort ();
1515 srelgot = htab->elf.srelgot;
1516 srelplt = htab->elf.srelplt;
1517
1518 if (elf_hash_table (info)->dynamic_sections_created)
1519 {
1520 BFD_ASSERT (htab->elf.srelgot != NULL
1521 && htab->elf.srelplt != NULL
1522 && htab->elf.sgot != NULL
1523 && htab->spltlittbl != NULL
1524 && htab->sgotloc != NULL);
1525
1526 /* Set the contents of the .interp section to the interpreter. */
1527 if (bfd_link_executable (info) && !info->nointerp)
1528 {
1529 s = bfd_get_linker_section (dynobj, ".interp");
1530 if (s == NULL)
1531 abort ();
1532 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1533 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1534 }
1535
1536 /* Allocate room for one word in ".got". */
1537 htab->elf.sgot->size = 4;
1538
1539 /* Allocate space in ".rela.got" for literals that reference global
1540 symbols and space in ".rela.plt" for literals that have PLT
1541 entries. */
1542 elf_link_hash_traverse (elf_hash_table (info),
1543 elf_xtensa_allocate_dynrelocs,
1544 (void *) info);
1545
1546 /* If we are generating a shared object, we also need space in
1547 ".rela.got" for R_XTENSA_RELATIVE relocs for literals that
1548 reference local symbols. */
1549 if (bfd_link_pic (info))
1550 elf_xtensa_allocate_local_got_size (info);
1551
1552 /* Allocate space in ".plt" to match the size of ".rela.plt". For
1553 each PLT entry, we need the PLT code plus a 4-byte literal.
1554 For each chunk of ".plt", we also need two more 4-byte
1555 literals, two corresponding entries in ".rela.got", and an
1556 8-byte entry in ".xt.lit.plt". */
1557 spltlittbl = htab->spltlittbl;
1558 plt_entries = srelplt->size / sizeof (Elf32_External_Rela);
1559 plt_chunks =
1560 (plt_entries + PLT_ENTRIES_PER_CHUNK - 1) / PLT_ENTRIES_PER_CHUNK;
1561
1562 /* Iterate over all the PLT chunks, including any extra sections
1563 created earlier because the initial count of PLT relocations
1564 was an overestimate. */
1565 for (chunk = 0;
1566 (splt = elf_xtensa_get_plt_section (info, chunk)) != NULL;
1567 chunk++)
1568 {
1569 int chunk_entries;
1570
1571 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
1572 BFD_ASSERT (sgotplt != NULL);
1573
1574 if (chunk < plt_chunks - 1)
1575 chunk_entries = PLT_ENTRIES_PER_CHUNK;
1576 else if (chunk == plt_chunks - 1)
1577 chunk_entries = plt_entries - (chunk * PLT_ENTRIES_PER_CHUNK);
1578 else
1579 chunk_entries = 0;
1580
1581 if (chunk_entries != 0)
1582 {
1583 sgotplt->size = 4 * (chunk_entries + 2);
1584 splt->size = PLT_ENTRY_SIZE * chunk_entries;
1585 srelgot->size += 2 * sizeof (Elf32_External_Rela);
1586 spltlittbl->size += 8;
1587 }
1588 else
1589 {
1590 sgotplt->size = 0;
1591 splt->size = 0;
1592 }
1593 }
1594
1595 /* Allocate space in ".got.loc" to match the total size of all the
1596 literal tables. */
1597 sgotloc = htab->sgotloc;
1598 sgotloc->size = spltlittbl->size;
1599 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link.next)
1600 {
1601 if (abfd->flags & DYNAMIC)
1602 continue;
1603 for (s = abfd->sections; s != NULL; s = s->next)
1604 {
1605 if (! discarded_section (s)
1606 && xtensa_is_littable_section (s)
1607 && s != spltlittbl)
1608 sgotloc->size += s->size;
1609 }
1610 }
1611 }
1612
1613 /* Allocate memory for dynamic sections. */
1614 relplt = FALSE;
1615 relgot = FALSE;
1616 for (s = dynobj->sections; s != NULL; s = s->next)
1617 {
1618 const char *name;
1619
1620 if ((s->flags & SEC_LINKER_CREATED) == 0)
1621 continue;
1622
1623 /* It's OK to base decisions on the section name, because none
1624 of the dynobj section names depend upon the input files. */
1625 name = bfd_get_section_name (dynobj, s);
1626
1627 if (CONST_STRNEQ (name, ".rela"))
1628 {
1629 if (s->size != 0)
1630 {
1631 if (strcmp (name, ".rela.plt") == 0)
1632 relplt = TRUE;
1633 else if (strcmp (name, ".rela.got") == 0)
1634 relgot = TRUE;
1635
1636 /* We use the reloc_count field as a counter if we need
1637 to copy relocs into the output file. */
1638 s->reloc_count = 0;
1639 }
1640 }
1641 else if (! CONST_STRNEQ (name, ".plt.")
1642 && ! CONST_STRNEQ (name, ".got.plt.")
1643 && strcmp (name, ".got") != 0
1644 && strcmp (name, ".plt") != 0
1645 && strcmp (name, ".got.plt") != 0
1646 && strcmp (name, ".xt.lit.plt") != 0
1647 && strcmp (name, ".got.loc") != 0)
1648 {
1649 /* It's not one of our sections, so don't allocate space. */
1650 continue;
1651 }
1652
1653 if (s->size == 0)
1654 {
1655 /* If we don't need this section, strip it from the output
1656 file. We must create the ".plt*" and ".got.plt*"
1657 sections in create_dynamic_sections and/or check_relocs
1658 based on a conservative estimate of the PLT relocation
1659 count, because the sections must be created before the
1660 linker maps input sections to output sections. The
1661 linker does that before size_dynamic_sections, where we
1662 compute the exact size of the PLT, so there may be more
1663 of these sections than are actually needed. */
1664 s->flags |= SEC_EXCLUDE;
1665 }
1666 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
1667 {
1668 /* Allocate memory for the section contents. */
1669 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1670 if (s->contents == NULL)
1671 return FALSE;
1672 }
1673 }
1674
1675 if (elf_hash_table (info)->dynamic_sections_created)
1676 {
1677 /* Add the special XTENSA_RTLD relocations now. The offsets won't be
1678 known until finish_dynamic_sections, but we need to get the relocs
1679 in place before they are sorted. */
1680 for (chunk = 0; chunk < plt_chunks; chunk++)
1681 {
1682 Elf_Internal_Rela irela;
1683 bfd_byte *loc;
1684
1685 irela.r_offset = 0;
1686 irela.r_info = ELF32_R_INFO (0, R_XTENSA_RTLD);
1687 irela.r_addend = 0;
1688
1689 loc = (srelgot->contents
1690 + srelgot->reloc_count * sizeof (Elf32_External_Rela));
1691 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
1692 bfd_elf32_swap_reloca_out (output_bfd, &irela,
1693 loc + sizeof (Elf32_External_Rela));
1694 srelgot->reloc_count += 2;
1695 }
1696
1697 /* Add some entries to the .dynamic section. We fill in the
1698 values later, in elf_xtensa_finish_dynamic_sections, but we
1699 must add the entries now so that we get the correct size for
1700 the .dynamic section. The DT_DEBUG entry is filled in by the
1701 dynamic linker and used by the debugger. */
1702 #define add_dynamic_entry(TAG, VAL) \
1703 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1704
1705 if (bfd_link_executable (info))
1706 {
1707 if (!add_dynamic_entry (DT_DEBUG, 0))
1708 return FALSE;
1709 }
1710
1711 if (relplt)
1712 {
1713 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
1714 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1715 || !add_dynamic_entry (DT_JMPREL, 0))
1716 return FALSE;
1717 }
1718
1719 if (relgot)
1720 {
1721 if (!add_dynamic_entry (DT_RELA, 0)
1722 || !add_dynamic_entry (DT_RELASZ, 0)
1723 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1724 return FALSE;
1725 }
1726
1727 if (!add_dynamic_entry (DT_PLTGOT, 0)
1728 || !add_dynamic_entry (DT_XTENSA_GOT_LOC_OFF, 0)
1729 || !add_dynamic_entry (DT_XTENSA_GOT_LOC_SZ, 0))
1730 return FALSE;
1731 }
1732 #undef add_dynamic_entry
1733
1734 return TRUE;
1735 }
1736
1737 static bfd_boolean
1738 elf_xtensa_always_size_sections (bfd *output_bfd,
1739 struct bfd_link_info *info)
1740 {
1741 struct elf_xtensa_link_hash_table *htab;
1742 asection *tls_sec;
1743
1744 htab = elf_xtensa_hash_table (info);
1745 if (htab == NULL)
1746 return FALSE;
1747
1748 tls_sec = htab->elf.tls_sec;
1749
1750 if (tls_sec && (htab->tlsbase->tls_type & GOT_TLS_ANY) != 0)
1751 {
1752 struct elf_link_hash_entry *tlsbase = &htab->tlsbase->elf;
1753 struct bfd_link_hash_entry *bh = &tlsbase->root;
1754 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
1755
1756 tlsbase->type = STT_TLS;
1757 if (!(_bfd_generic_link_add_one_symbol
1758 (info, output_bfd, "_TLS_MODULE_BASE_", BSF_LOCAL,
1759 tls_sec, 0, NULL, FALSE,
1760 bed->collect, &bh)))
1761 return FALSE;
1762 tlsbase->def_regular = 1;
1763 tlsbase->other = STV_HIDDEN;
1764 (*bed->elf_backend_hide_symbol) (info, tlsbase, TRUE);
1765 }
1766
1767 return TRUE;
1768 }
1769
1770 \f
1771 /* Return the base VMA address which should be subtracted from real addresses
1772 when resolving @dtpoff relocation.
1773 This is PT_TLS segment p_vaddr. */
1774
1775 static bfd_vma
1776 dtpoff_base (struct bfd_link_info *info)
1777 {
1778 /* If tls_sec is NULL, we should have signalled an error already. */
1779 if (elf_hash_table (info)->tls_sec == NULL)
1780 return 0;
1781 return elf_hash_table (info)->tls_sec->vma;
1782 }
1783
1784 /* Return the relocation value for @tpoff relocation
1785 if STT_TLS virtual address is ADDRESS. */
1786
1787 static bfd_vma
1788 tpoff (struct bfd_link_info *info, bfd_vma address)
1789 {
1790 struct elf_link_hash_table *htab = elf_hash_table (info);
1791 bfd_vma base;
1792
1793 /* If tls_sec is NULL, we should have signalled an error already. */
1794 if (htab->tls_sec == NULL)
1795 return 0;
1796 base = align_power ((bfd_vma) TCB_SIZE, htab->tls_sec->alignment_power);
1797 return address - htab->tls_sec->vma + base;
1798 }
1799
1800 /* Perform the specified relocation. The instruction at (contents + address)
1801 is modified to set one operand to represent the value in "relocation". The
1802 operand position is determined by the relocation type recorded in the
1803 howto. */
1804
1805 #define CALL_SEGMENT_BITS (30)
1806 #define CALL_SEGMENT_SIZE (1 << CALL_SEGMENT_BITS)
1807
1808 static bfd_reloc_status_type
1809 elf_xtensa_do_reloc (reloc_howto_type *howto,
1810 bfd *abfd,
1811 asection *input_section,
1812 bfd_vma relocation,
1813 bfd_byte *contents,
1814 bfd_vma address,
1815 bfd_boolean is_weak_undef,
1816 char **error_message)
1817 {
1818 xtensa_format fmt;
1819 xtensa_opcode opcode;
1820 xtensa_isa isa = xtensa_default_isa;
1821 static xtensa_insnbuf ibuff = NULL;
1822 static xtensa_insnbuf sbuff = NULL;
1823 bfd_vma self_address;
1824 bfd_size_type input_size;
1825 int opnd, slot;
1826 uint32 newval;
1827
1828 if (!ibuff)
1829 {
1830 ibuff = xtensa_insnbuf_alloc (isa);
1831 sbuff = xtensa_insnbuf_alloc (isa);
1832 }
1833
1834 input_size = bfd_get_section_limit (abfd, input_section);
1835
1836 /* Calculate the PC address for this instruction. */
1837 self_address = (input_section->output_section->vma
1838 + input_section->output_offset
1839 + address);
1840
1841 switch (howto->type)
1842 {
1843 case R_XTENSA_NONE:
1844 case R_XTENSA_DIFF8:
1845 case R_XTENSA_DIFF16:
1846 case R_XTENSA_DIFF32:
1847 case R_XTENSA_TLS_FUNC:
1848 case R_XTENSA_TLS_ARG:
1849 case R_XTENSA_TLS_CALL:
1850 return bfd_reloc_ok;
1851
1852 case R_XTENSA_ASM_EXPAND:
1853 if (!is_weak_undef)
1854 {
1855 /* Check for windowed CALL across a 1GB boundary. */
1856 opcode = get_expanded_call_opcode (contents + address,
1857 input_size - address, 0);
1858 if (is_windowed_call_opcode (opcode))
1859 {
1860 if ((self_address >> CALL_SEGMENT_BITS)
1861 != (relocation >> CALL_SEGMENT_BITS))
1862 {
1863 *error_message = "windowed longcall crosses 1GB boundary; "
1864 "return may fail";
1865 return bfd_reloc_dangerous;
1866 }
1867 }
1868 }
1869 return bfd_reloc_ok;
1870
1871 case R_XTENSA_ASM_SIMPLIFY:
1872 {
1873 /* Convert the L32R/CALLX to CALL. */
1874 bfd_reloc_status_type retval =
1875 elf_xtensa_do_asm_simplify (contents, address, input_size,
1876 error_message);
1877 if (retval != bfd_reloc_ok)
1878 return bfd_reloc_dangerous;
1879
1880 /* The CALL needs to be relocated. Continue below for that part. */
1881 address += 3;
1882 self_address += 3;
1883 howto = &elf_howto_table[(unsigned) R_XTENSA_SLOT0_OP ];
1884 }
1885 break;
1886
1887 case R_XTENSA_32:
1888 {
1889 bfd_vma x;
1890 x = bfd_get_32 (abfd, contents + address);
1891 x = x + relocation;
1892 bfd_put_32 (abfd, x, contents + address);
1893 }
1894 return bfd_reloc_ok;
1895
1896 case R_XTENSA_32_PCREL:
1897 bfd_put_32 (abfd, relocation - self_address, contents + address);
1898 return bfd_reloc_ok;
1899
1900 case R_XTENSA_PLT:
1901 case R_XTENSA_TLSDESC_FN:
1902 case R_XTENSA_TLSDESC_ARG:
1903 case R_XTENSA_TLS_DTPOFF:
1904 case R_XTENSA_TLS_TPOFF:
1905 bfd_put_32 (abfd, relocation, contents + address);
1906 return bfd_reloc_ok;
1907 }
1908
1909 /* Only instruction slot-specific relocations handled below.... */
1910 slot = get_relocation_slot (howto->type);
1911 if (slot == XTENSA_UNDEFINED)
1912 {
1913 *error_message = "unexpected relocation";
1914 return bfd_reloc_dangerous;
1915 }
1916
1917 /* Read the instruction into a buffer and decode the opcode. */
1918 xtensa_insnbuf_from_chars (isa, ibuff, contents + address,
1919 input_size - address);
1920 fmt = xtensa_format_decode (isa, ibuff);
1921 if (fmt == XTENSA_UNDEFINED)
1922 {
1923 *error_message = "cannot decode instruction format";
1924 return bfd_reloc_dangerous;
1925 }
1926
1927 xtensa_format_get_slot (isa, fmt, slot, ibuff, sbuff);
1928
1929 opcode = xtensa_opcode_decode (isa, fmt, slot, sbuff);
1930 if (opcode == XTENSA_UNDEFINED)
1931 {
1932 *error_message = "cannot decode instruction opcode";
1933 return bfd_reloc_dangerous;
1934 }
1935
1936 /* Check for opcode-specific "alternate" relocations. */
1937 if (is_alt_relocation (howto->type))
1938 {
1939 if (opcode == get_l32r_opcode ())
1940 {
1941 /* Handle the special-case of non-PC-relative L32R instructions. */
1942 bfd *output_bfd = input_section->output_section->owner;
1943 asection *lit4_sec = bfd_get_section_by_name (output_bfd, ".lit4");
1944 if (!lit4_sec)
1945 {
1946 *error_message = "relocation references missing .lit4 section";
1947 return bfd_reloc_dangerous;
1948 }
1949 self_address = ((lit4_sec->vma & ~0xfff)
1950 + 0x40000 - 3); /* -3 to compensate for do_reloc */
1951 newval = relocation;
1952 opnd = 1;
1953 }
1954 else if (opcode == get_const16_opcode ())
1955 {
1956 /* ALT used for high 16 bits. */
1957 newval = relocation >> 16;
1958 opnd = 1;
1959 }
1960 else
1961 {
1962 /* No other "alternate" relocations currently defined. */
1963 *error_message = "unexpected relocation";
1964 return bfd_reloc_dangerous;
1965 }
1966 }
1967 else /* Not an "alternate" relocation.... */
1968 {
1969 if (opcode == get_const16_opcode ())
1970 {
1971 newval = relocation & 0xffff;
1972 opnd = 1;
1973 }
1974 else
1975 {
1976 /* ...normal PC-relative relocation.... */
1977
1978 /* Determine which operand is being relocated. */
1979 opnd = get_relocation_opnd (opcode, howto->type);
1980 if (opnd == XTENSA_UNDEFINED)
1981 {
1982 *error_message = "unexpected relocation";
1983 return bfd_reloc_dangerous;
1984 }
1985
1986 if (!howto->pc_relative)
1987 {
1988 *error_message = "expected PC-relative relocation";
1989 return bfd_reloc_dangerous;
1990 }
1991
1992 newval = relocation;
1993 }
1994 }
1995
1996 /* Apply the relocation. */
1997 if (xtensa_operand_do_reloc (isa, opcode, opnd, &newval, self_address)
1998 || xtensa_operand_encode (isa, opcode, opnd, &newval)
1999 || xtensa_operand_set_field (isa, opcode, opnd, fmt, slot,
2000 sbuff, newval))
2001 {
2002 const char *opname = xtensa_opcode_name (isa, opcode);
2003 const char *msg;
2004
2005 msg = "cannot encode";
2006 if (is_direct_call_opcode (opcode))
2007 {
2008 if ((relocation & 0x3) != 0)
2009 msg = "misaligned call target";
2010 else
2011 msg = "call target out of range";
2012 }
2013 else if (opcode == get_l32r_opcode ())
2014 {
2015 if ((relocation & 0x3) != 0)
2016 msg = "misaligned literal target";
2017 else if (is_alt_relocation (howto->type))
2018 msg = "literal target out of range (too many literals)";
2019 else if (self_address > relocation)
2020 msg = "literal target out of range (try using text-section-literals)";
2021 else
2022 msg = "literal placed after use";
2023 }
2024
2025 *error_message = vsprint_msg (opname, ": %s", strlen (msg) + 2, msg);
2026 return bfd_reloc_dangerous;
2027 }
2028
2029 /* Check for calls across 1GB boundaries. */
2030 if (is_direct_call_opcode (opcode)
2031 && is_windowed_call_opcode (opcode))
2032 {
2033 if ((self_address >> CALL_SEGMENT_BITS)
2034 != (relocation >> CALL_SEGMENT_BITS))
2035 {
2036 *error_message =
2037 "windowed call crosses 1GB boundary; return may fail";
2038 return bfd_reloc_dangerous;
2039 }
2040 }
2041
2042 /* Write the modified instruction back out of the buffer. */
2043 xtensa_format_set_slot (isa, fmt, slot, ibuff, sbuff);
2044 xtensa_insnbuf_to_chars (isa, ibuff, contents + address,
2045 input_size - address);
2046 return bfd_reloc_ok;
2047 }
2048
2049
2050 static char *
2051 vsprint_msg (const char *origmsg, const char *fmt, int arglen, ...)
2052 {
2053 /* To reduce the size of the memory leak,
2054 we only use a single message buffer. */
2055 static bfd_size_type alloc_size = 0;
2056 static char *message = NULL;
2057 bfd_size_type orig_len, len = 0;
2058 bfd_boolean is_append;
2059 va_list ap;
2060
2061 va_start (ap, arglen);
2062
2063 is_append = (origmsg == message);
2064
2065 orig_len = strlen (origmsg);
2066 len = orig_len + strlen (fmt) + arglen + 20;
2067 if (len > alloc_size)
2068 {
2069 message = (char *) bfd_realloc_or_free (message, len);
2070 alloc_size = len;
2071 }
2072 if (message != NULL)
2073 {
2074 if (!is_append)
2075 memcpy (message, origmsg, orig_len);
2076 vsprintf (message + orig_len, fmt, ap);
2077 }
2078 va_end (ap);
2079 return message;
2080 }
2081
2082
2083 /* This function is registered as the "special_function" in the
2084 Xtensa howto for handling simplify operations.
2085 bfd_perform_relocation / bfd_install_relocation use it to
2086 perform (install) the specified relocation. Since this replaces the code
2087 in bfd_perform_relocation, it is basically an Xtensa-specific,
2088 stripped-down version of bfd_perform_relocation. */
2089
2090 static bfd_reloc_status_type
2091 bfd_elf_xtensa_reloc (bfd *abfd,
2092 arelent *reloc_entry,
2093 asymbol *symbol,
2094 void *data,
2095 asection *input_section,
2096 bfd *output_bfd,
2097 char **error_message)
2098 {
2099 bfd_vma relocation;
2100 bfd_reloc_status_type flag;
2101 bfd_size_type octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2102 bfd_vma output_base = 0;
2103 reloc_howto_type *howto = reloc_entry->howto;
2104 asection *reloc_target_output_section;
2105 bfd_boolean is_weak_undef;
2106
2107 if (!xtensa_default_isa)
2108 xtensa_default_isa = xtensa_isa_init (0, 0);
2109
2110 /* ELF relocs are against symbols. If we are producing relocatable
2111 output, and the reloc is against an external symbol, the resulting
2112 reloc will also be against the same symbol. In such a case, we
2113 don't want to change anything about the way the reloc is handled,
2114 since it will all be done at final link time. This test is similar
2115 to what bfd_elf_generic_reloc does except that it lets relocs with
2116 howto->partial_inplace go through even if the addend is non-zero.
2117 (The real problem is that partial_inplace is set for XTENSA_32
2118 relocs to begin with, but that's a long story and there's little we
2119 can do about it now....) */
2120
2121 if (output_bfd && (symbol->flags & BSF_SECTION_SYM) == 0)
2122 {
2123 reloc_entry->address += input_section->output_offset;
2124 return bfd_reloc_ok;
2125 }
2126
2127 /* Is the address of the relocation really within the section? */
2128 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
2129 return bfd_reloc_outofrange;
2130
2131 /* Work out which section the relocation is targeted at and the
2132 initial relocation command value. */
2133
2134 /* Get symbol value. (Common symbols are special.) */
2135 if (bfd_is_com_section (symbol->section))
2136 relocation = 0;
2137 else
2138 relocation = symbol->value;
2139
2140 reloc_target_output_section = symbol->section->output_section;
2141
2142 /* Convert input-section-relative symbol value to absolute. */
2143 if ((output_bfd && !howto->partial_inplace)
2144 || reloc_target_output_section == NULL)
2145 output_base = 0;
2146 else
2147 output_base = reloc_target_output_section->vma;
2148
2149 relocation += output_base + symbol->section->output_offset;
2150
2151 /* Add in supplied addend. */
2152 relocation += reloc_entry->addend;
2153
2154 /* Here the variable relocation holds the final address of the
2155 symbol we are relocating against, plus any addend. */
2156 if (output_bfd)
2157 {
2158 if (!howto->partial_inplace)
2159 {
2160 /* This is a partial relocation, and we want to apply the relocation
2161 to the reloc entry rather than the raw data. Everything except
2162 relocations against section symbols has already been handled
2163 above. */
2164
2165 BFD_ASSERT (symbol->flags & BSF_SECTION_SYM);
2166 reloc_entry->addend = relocation;
2167 reloc_entry->address += input_section->output_offset;
2168 return bfd_reloc_ok;
2169 }
2170 else
2171 {
2172 reloc_entry->address += input_section->output_offset;
2173 reloc_entry->addend = 0;
2174 }
2175 }
2176
2177 is_weak_undef = (bfd_is_und_section (symbol->section)
2178 && (symbol->flags & BSF_WEAK) != 0);
2179 flag = elf_xtensa_do_reloc (howto, abfd, input_section, relocation,
2180 (bfd_byte *) data, (bfd_vma) octets,
2181 is_weak_undef, error_message);
2182
2183 if (flag == bfd_reloc_dangerous)
2184 {
2185 /* Add the symbol name to the error message. */
2186 if (! *error_message)
2187 *error_message = "";
2188 *error_message = vsprint_msg (*error_message, ": (%s + 0x%lx)",
2189 strlen (symbol->name) + 17,
2190 symbol->name,
2191 (unsigned long) reloc_entry->addend);
2192 }
2193
2194 return flag;
2195 }
2196
2197
2198 /* Set up an entry in the procedure linkage table. */
2199
2200 static bfd_vma
2201 elf_xtensa_create_plt_entry (struct bfd_link_info *info,
2202 bfd *output_bfd,
2203 unsigned reloc_index)
2204 {
2205 asection *splt, *sgotplt;
2206 bfd_vma plt_base, got_base;
2207 bfd_vma code_offset, lit_offset, abi_offset;
2208 int chunk;
2209
2210 chunk = reloc_index / PLT_ENTRIES_PER_CHUNK;
2211 splt = elf_xtensa_get_plt_section (info, chunk);
2212 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
2213 BFD_ASSERT (splt != NULL && sgotplt != NULL);
2214
2215 plt_base = splt->output_section->vma + splt->output_offset;
2216 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2217
2218 lit_offset = 8 + (reloc_index % PLT_ENTRIES_PER_CHUNK) * 4;
2219 code_offset = (reloc_index % PLT_ENTRIES_PER_CHUNK) * PLT_ENTRY_SIZE;
2220
2221 /* Fill in the literal entry. This is the offset of the dynamic
2222 relocation entry. */
2223 bfd_put_32 (output_bfd, reloc_index * sizeof (Elf32_External_Rela),
2224 sgotplt->contents + lit_offset);
2225
2226 /* Fill in the entry in the procedure linkage table. */
2227 memcpy (splt->contents + code_offset,
2228 (bfd_big_endian (output_bfd)
2229 ? elf_xtensa_be_plt_entry[XSHAL_ABI != XTHAL_ABI_WINDOWED]
2230 : elf_xtensa_le_plt_entry[XSHAL_ABI != XTHAL_ABI_WINDOWED]),
2231 PLT_ENTRY_SIZE);
2232 abi_offset = XSHAL_ABI == XTHAL_ABI_WINDOWED ? 3 : 0;
2233 bfd_put_16 (output_bfd, l32r_offset (got_base + 0,
2234 plt_base + code_offset + abi_offset),
2235 splt->contents + code_offset + abi_offset + 1);
2236 bfd_put_16 (output_bfd, l32r_offset (got_base + 4,
2237 plt_base + code_offset + abi_offset + 3),
2238 splt->contents + code_offset + abi_offset + 4);
2239 bfd_put_16 (output_bfd, l32r_offset (got_base + lit_offset,
2240 plt_base + code_offset + abi_offset + 6),
2241 splt->contents + code_offset + abi_offset + 7);
2242
2243 return plt_base + code_offset;
2244 }
2245
2246
2247 static bfd_boolean get_indirect_call_dest_reg (xtensa_opcode, unsigned *);
2248
2249 static bfd_boolean
2250 replace_tls_insn (Elf_Internal_Rela *rel,
2251 bfd *abfd,
2252 asection *input_section,
2253 bfd_byte *contents,
2254 bfd_boolean is_ld_model,
2255 char **error_message)
2256 {
2257 static xtensa_insnbuf ibuff = NULL;
2258 static xtensa_insnbuf sbuff = NULL;
2259 xtensa_isa isa = xtensa_default_isa;
2260 xtensa_format fmt;
2261 xtensa_opcode old_op, new_op;
2262 bfd_size_type input_size;
2263 int r_type;
2264 unsigned dest_reg, src_reg;
2265
2266 if (ibuff == NULL)
2267 {
2268 ibuff = xtensa_insnbuf_alloc (isa);
2269 sbuff = xtensa_insnbuf_alloc (isa);
2270 }
2271
2272 input_size = bfd_get_section_limit (abfd, input_section);
2273
2274 /* Read the instruction into a buffer and decode the opcode. */
2275 xtensa_insnbuf_from_chars (isa, ibuff, contents + rel->r_offset,
2276 input_size - rel->r_offset);
2277 fmt = xtensa_format_decode (isa, ibuff);
2278 if (fmt == XTENSA_UNDEFINED)
2279 {
2280 *error_message = "cannot decode instruction format";
2281 return FALSE;
2282 }
2283
2284 BFD_ASSERT (xtensa_format_num_slots (isa, fmt) == 1);
2285 xtensa_format_get_slot (isa, fmt, 0, ibuff, sbuff);
2286
2287 old_op = xtensa_opcode_decode (isa, fmt, 0, sbuff);
2288 if (old_op == XTENSA_UNDEFINED)
2289 {
2290 *error_message = "cannot decode instruction opcode";
2291 return FALSE;
2292 }
2293
2294 r_type = ELF32_R_TYPE (rel->r_info);
2295 switch (r_type)
2296 {
2297 case R_XTENSA_TLS_FUNC:
2298 case R_XTENSA_TLS_ARG:
2299 if (old_op != get_l32r_opcode ()
2300 || xtensa_operand_get_field (isa, old_op, 0, fmt, 0,
2301 sbuff, &dest_reg) != 0)
2302 {
2303 *error_message = "cannot extract L32R destination for TLS access";
2304 return FALSE;
2305 }
2306 break;
2307
2308 case R_XTENSA_TLS_CALL:
2309 if (! get_indirect_call_dest_reg (old_op, &dest_reg)
2310 || xtensa_operand_get_field (isa, old_op, 0, fmt, 0,
2311 sbuff, &src_reg) != 0)
2312 {
2313 *error_message = "cannot extract CALLXn operands for TLS access";
2314 return FALSE;
2315 }
2316 break;
2317
2318 default:
2319 abort ();
2320 }
2321
2322 if (is_ld_model)
2323 {
2324 switch (r_type)
2325 {
2326 case R_XTENSA_TLS_FUNC:
2327 case R_XTENSA_TLS_ARG:
2328 /* Change the instruction to a NOP (or "OR a1, a1, a1" for older
2329 versions of Xtensa). */
2330 new_op = xtensa_opcode_lookup (isa, "nop");
2331 if (new_op == XTENSA_UNDEFINED)
2332 {
2333 new_op = xtensa_opcode_lookup (isa, "or");
2334 if (new_op == XTENSA_UNDEFINED
2335 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2336 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2337 sbuff, 1) != 0
2338 || xtensa_operand_set_field (isa, new_op, 1, fmt, 0,
2339 sbuff, 1) != 0
2340 || xtensa_operand_set_field (isa, new_op, 2, fmt, 0,
2341 sbuff, 1) != 0)
2342 {
2343 *error_message = "cannot encode OR for TLS access";
2344 return FALSE;
2345 }
2346 }
2347 else
2348 {
2349 if (xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0)
2350 {
2351 *error_message = "cannot encode NOP for TLS access";
2352 return FALSE;
2353 }
2354 }
2355 break;
2356
2357 case R_XTENSA_TLS_CALL:
2358 /* Read THREADPTR into the CALLX's return value register. */
2359 new_op = xtensa_opcode_lookup (isa, "rur.threadptr");
2360 if (new_op == XTENSA_UNDEFINED
2361 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2362 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2363 sbuff, dest_reg + 2) != 0)
2364 {
2365 *error_message = "cannot encode RUR.THREADPTR for TLS access";
2366 return FALSE;
2367 }
2368 break;
2369 }
2370 }
2371 else
2372 {
2373 switch (r_type)
2374 {
2375 case R_XTENSA_TLS_FUNC:
2376 new_op = xtensa_opcode_lookup (isa, "rur.threadptr");
2377 if (new_op == XTENSA_UNDEFINED
2378 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2379 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2380 sbuff, dest_reg) != 0)
2381 {
2382 *error_message = "cannot encode RUR.THREADPTR for TLS access";
2383 return FALSE;
2384 }
2385 break;
2386
2387 case R_XTENSA_TLS_ARG:
2388 /* Nothing to do. Keep the original L32R instruction. */
2389 return TRUE;
2390
2391 case R_XTENSA_TLS_CALL:
2392 /* Add the CALLX's src register (holding the THREADPTR value)
2393 to the first argument register (holding the offset) and put
2394 the result in the CALLX's return value register. */
2395 new_op = xtensa_opcode_lookup (isa, "add");
2396 if (new_op == XTENSA_UNDEFINED
2397 || xtensa_opcode_encode (isa, fmt, 0, sbuff, new_op) != 0
2398 || xtensa_operand_set_field (isa, new_op, 0, fmt, 0,
2399 sbuff, dest_reg + 2) != 0
2400 || xtensa_operand_set_field (isa, new_op, 1, fmt, 0,
2401 sbuff, dest_reg + 2) != 0
2402 || xtensa_operand_set_field (isa, new_op, 2, fmt, 0,
2403 sbuff, src_reg) != 0)
2404 {
2405 *error_message = "cannot encode ADD for TLS access";
2406 return FALSE;
2407 }
2408 break;
2409 }
2410 }
2411
2412 xtensa_format_set_slot (isa, fmt, 0, ibuff, sbuff);
2413 xtensa_insnbuf_to_chars (isa, ibuff, contents + rel->r_offset,
2414 input_size - rel->r_offset);
2415
2416 return TRUE;
2417 }
2418
2419
2420 #define IS_XTENSA_TLS_RELOC(R_TYPE) \
2421 ((R_TYPE) == R_XTENSA_TLSDESC_FN \
2422 || (R_TYPE) == R_XTENSA_TLSDESC_ARG \
2423 || (R_TYPE) == R_XTENSA_TLS_DTPOFF \
2424 || (R_TYPE) == R_XTENSA_TLS_TPOFF \
2425 || (R_TYPE) == R_XTENSA_TLS_FUNC \
2426 || (R_TYPE) == R_XTENSA_TLS_ARG \
2427 || (R_TYPE) == R_XTENSA_TLS_CALL)
2428
2429 /* Relocate an Xtensa ELF section. This is invoked by the linker for
2430 both relocatable and final links. */
2431
2432 static bfd_boolean
2433 elf_xtensa_relocate_section (bfd *output_bfd,
2434 struct bfd_link_info *info,
2435 bfd *input_bfd,
2436 asection *input_section,
2437 bfd_byte *contents,
2438 Elf_Internal_Rela *relocs,
2439 Elf_Internal_Sym *local_syms,
2440 asection **local_sections)
2441 {
2442 struct elf_xtensa_link_hash_table *htab;
2443 Elf_Internal_Shdr *symtab_hdr;
2444 Elf_Internal_Rela *rel;
2445 Elf_Internal_Rela *relend;
2446 struct elf_link_hash_entry **sym_hashes;
2447 property_table_entry *lit_table = 0;
2448 int ltblsize = 0;
2449 char *local_got_tls_types;
2450 char *error_message = NULL;
2451 bfd_size_type input_size;
2452 int tls_type;
2453
2454 if (!xtensa_default_isa)
2455 xtensa_default_isa = xtensa_isa_init (0, 0);
2456
2457 BFD_ASSERT (is_xtensa_elf (input_bfd));
2458
2459 htab = elf_xtensa_hash_table (info);
2460 if (htab == NULL)
2461 return FALSE;
2462
2463 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2464 sym_hashes = elf_sym_hashes (input_bfd);
2465 local_got_tls_types = elf_xtensa_local_got_tls_type (input_bfd);
2466
2467 if (elf_hash_table (info)->dynamic_sections_created)
2468 {
2469 ltblsize = xtensa_read_table_entries (input_bfd, input_section,
2470 &lit_table, XTENSA_LIT_SEC_NAME,
2471 TRUE);
2472 if (ltblsize < 0)
2473 return FALSE;
2474 }
2475
2476 input_size = bfd_get_section_limit (input_bfd, input_section);
2477
2478 rel = relocs;
2479 relend = relocs + input_section->reloc_count;
2480 for (; rel < relend; rel++)
2481 {
2482 int r_type;
2483 reloc_howto_type *howto;
2484 unsigned long r_symndx;
2485 struct elf_link_hash_entry *h;
2486 Elf_Internal_Sym *sym;
2487 char sym_type;
2488 const char *name;
2489 asection *sec;
2490 bfd_vma relocation;
2491 bfd_reloc_status_type r;
2492 bfd_boolean is_weak_undef;
2493 bfd_boolean unresolved_reloc;
2494 bfd_boolean warned;
2495 bfd_boolean dynamic_symbol;
2496
2497 r_type = ELF32_R_TYPE (rel->r_info);
2498 if (r_type == (int) R_XTENSA_GNU_VTINHERIT
2499 || r_type == (int) R_XTENSA_GNU_VTENTRY)
2500 continue;
2501
2502 if (r_type < 0 || r_type >= (int) R_XTENSA_max)
2503 {
2504 bfd_set_error (bfd_error_bad_value);
2505 return FALSE;
2506 }
2507 howto = &elf_howto_table[r_type];
2508
2509 r_symndx = ELF32_R_SYM (rel->r_info);
2510
2511 h = NULL;
2512 sym = NULL;
2513 sec = NULL;
2514 is_weak_undef = FALSE;
2515 unresolved_reloc = FALSE;
2516 warned = FALSE;
2517
2518 if (howto->partial_inplace && !bfd_link_relocatable (info))
2519 {
2520 /* Because R_XTENSA_32 was made partial_inplace to fix some
2521 problems with DWARF info in partial links, there may be
2522 an addend stored in the contents. Take it out of there
2523 and move it back into the addend field of the reloc. */
2524 rel->r_addend += bfd_get_32 (input_bfd, contents + rel->r_offset);
2525 bfd_put_32 (input_bfd, 0, contents + rel->r_offset);
2526 }
2527
2528 if (r_symndx < symtab_hdr->sh_info)
2529 {
2530 sym = local_syms + r_symndx;
2531 sym_type = ELF32_ST_TYPE (sym->st_info);
2532 sec = local_sections[r_symndx];
2533 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2534 }
2535 else
2536 {
2537 bfd_boolean ignored;
2538
2539 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2540 r_symndx, symtab_hdr, sym_hashes,
2541 h, sec, relocation,
2542 unresolved_reloc, warned, ignored);
2543
2544 if (relocation == 0
2545 && !unresolved_reloc
2546 && h->root.type == bfd_link_hash_undefweak)
2547 is_weak_undef = TRUE;
2548
2549 sym_type = h->type;
2550 }
2551
2552 if (sec != NULL && discarded_section (sec))
2553 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2554 rel, 1, relend, howto, 0, contents);
2555
2556 if (bfd_link_relocatable (info))
2557 {
2558 bfd_vma dest_addr;
2559 asection * sym_sec = get_elf_r_symndx_section (input_bfd, r_symndx);
2560
2561 /* This is a relocatable link.
2562 1) If the reloc is against a section symbol, adjust
2563 according to the output section.
2564 2) If there is a new target for this relocation,
2565 the new target will be in the same output section.
2566 We adjust the relocation by the output section
2567 difference. */
2568
2569 if (relaxing_section)
2570 {
2571 /* Check if this references a section in another input file. */
2572 if (!do_fix_for_relocatable_link (rel, input_bfd, input_section,
2573 contents))
2574 return FALSE;
2575 }
2576
2577 dest_addr = sym_sec->output_section->vma + sym_sec->output_offset
2578 + get_elf_r_symndx_offset (input_bfd, r_symndx) + rel->r_addend;
2579
2580 if (r_type == R_XTENSA_ASM_SIMPLIFY)
2581 {
2582 error_message = NULL;
2583 /* Convert ASM_SIMPLIFY into the simpler relocation
2584 so that they never escape a relaxing link. */
2585 r = contract_asm_expansion (contents, input_size, rel,
2586 &error_message);
2587 if (r != bfd_reloc_ok)
2588 (*info->callbacks->reloc_dangerous)
2589 (info, error_message,
2590 input_bfd, input_section, rel->r_offset);
2591
2592 r_type = ELF32_R_TYPE (rel->r_info);
2593 }
2594
2595 /* This is a relocatable link, so we don't have to change
2596 anything unless the reloc is against a section symbol,
2597 in which case we have to adjust according to where the
2598 section symbol winds up in the output section. */
2599 if (r_symndx < symtab_hdr->sh_info)
2600 {
2601 sym = local_syms + r_symndx;
2602 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
2603 {
2604 sec = local_sections[r_symndx];
2605 rel->r_addend += sec->output_offset + sym->st_value;
2606 }
2607 }
2608
2609 /* If there is an addend with a partial_inplace howto,
2610 then move the addend to the contents. This is a hack
2611 to work around problems with DWARF in relocatable links
2612 with some previous version of BFD. Now we can't easily get
2613 rid of the hack without breaking backward compatibility.... */
2614 r = bfd_reloc_ok;
2615 howto = &elf_howto_table[r_type];
2616 if (howto->partial_inplace && rel->r_addend)
2617 {
2618 r = elf_xtensa_do_reloc (howto, input_bfd, input_section,
2619 rel->r_addend, contents,
2620 rel->r_offset, FALSE,
2621 &error_message);
2622 rel->r_addend = 0;
2623 }
2624 else
2625 {
2626 /* Put the correct bits in the target instruction, even
2627 though the relocation will still be present in the output
2628 file. This makes disassembly clearer, as well as
2629 allowing loadable kernel modules to work without needing
2630 relocations on anything other than calls and l32r's. */
2631
2632 /* If it is not in the same section, there is nothing we can do. */
2633 if (r_type >= R_XTENSA_SLOT0_OP && r_type <= R_XTENSA_SLOT14_OP &&
2634 sym_sec->output_section == input_section->output_section)
2635 {
2636 r = elf_xtensa_do_reloc (howto, input_bfd, input_section,
2637 dest_addr, contents,
2638 rel->r_offset, FALSE,
2639 &error_message);
2640 }
2641 }
2642 if (r != bfd_reloc_ok)
2643 (*info->callbacks->reloc_dangerous)
2644 (info, error_message,
2645 input_bfd, input_section, rel->r_offset);
2646
2647 /* Done with work for relocatable link; continue with next reloc. */
2648 continue;
2649 }
2650
2651 /* This is a final link. */
2652
2653 if (relaxing_section)
2654 {
2655 /* Check if this references a section in another input file. */
2656 do_fix_for_final_link (rel, input_bfd, input_section, contents,
2657 &relocation);
2658 }
2659
2660 /* Sanity check the address. */
2661 if (rel->r_offset >= input_size
2662 && ELF32_R_TYPE (rel->r_info) != R_XTENSA_NONE)
2663 {
2664 _bfd_error_handler
2665 /* xgettext:c-format */
2666 (_("%pB(%pA+%#" PRIx64 "): "
2667 "relocation offset out of range (size=%#" PRIx64 ")"),
2668 input_bfd, input_section, (uint64_t) rel->r_offset,
2669 (uint64_t) input_size);
2670 bfd_set_error (bfd_error_bad_value);
2671 return FALSE;
2672 }
2673
2674 if (h != NULL)
2675 name = h->root.root.string;
2676 else
2677 {
2678 name = (bfd_elf_string_from_elf_section
2679 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2680 if (name == NULL || *name == '\0')
2681 name = bfd_section_name (input_bfd, sec);
2682 }
2683
2684 if (r_symndx != STN_UNDEF
2685 && r_type != R_XTENSA_NONE
2686 && (h == NULL
2687 || h->root.type == bfd_link_hash_defined
2688 || h->root.type == bfd_link_hash_defweak)
2689 && IS_XTENSA_TLS_RELOC (r_type) != (sym_type == STT_TLS))
2690 {
2691 _bfd_error_handler
2692 ((sym_type == STT_TLS
2693 /* xgettext:c-format */
2694 ? _("%pB(%pA+%#" PRIx64 "): %s used with TLS symbol %s")
2695 /* xgettext:c-format */
2696 : _("%pB(%pA+%#" PRIx64 "): %s used with non-TLS symbol %s")),
2697 input_bfd,
2698 input_section,
2699 (uint64_t) rel->r_offset,
2700 howto->name,
2701 name);
2702 }
2703
2704 dynamic_symbol = elf_xtensa_dynamic_symbol_p (h, info);
2705
2706 tls_type = GOT_UNKNOWN;
2707 if (h)
2708 tls_type = elf_xtensa_hash_entry (h)->tls_type;
2709 else if (local_got_tls_types)
2710 tls_type = local_got_tls_types [r_symndx];
2711
2712 switch (r_type)
2713 {
2714 case R_XTENSA_32:
2715 case R_XTENSA_PLT:
2716 if (elf_hash_table (info)->dynamic_sections_created
2717 && (input_section->flags & SEC_ALLOC) != 0
2718 && (dynamic_symbol || bfd_link_pic (info)))
2719 {
2720 Elf_Internal_Rela outrel;
2721 bfd_byte *loc;
2722 asection *srel;
2723
2724 if (dynamic_symbol && r_type == R_XTENSA_PLT)
2725 srel = htab->elf.srelplt;
2726 else
2727 srel = htab->elf.srelgot;
2728
2729 BFD_ASSERT (srel != NULL);
2730
2731 outrel.r_offset =
2732 _bfd_elf_section_offset (output_bfd, info,
2733 input_section, rel->r_offset);
2734
2735 if ((outrel.r_offset | 1) == (bfd_vma) -1)
2736 memset (&outrel, 0, sizeof outrel);
2737 else
2738 {
2739 outrel.r_offset += (input_section->output_section->vma
2740 + input_section->output_offset);
2741
2742 /* Complain if the relocation is in a read-only section
2743 and not in a literal pool. */
2744 if ((input_section->flags & SEC_READONLY) != 0
2745 && !elf_xtensa_in_literal_pool (lit_table, ltblsize,
2746 outrel.r_offset))
2747 {
2748 error_message =
2749 _("dynamic relocation in read-only section");
2750 (*info->callbacks->reloc_dangerous)
2751 (info, error_message,
2752 input_bfd, input_section, rel->r_offset);
2753 }
2754
2755 if (dynamic_symbol)
2756 {
2757 outrel.r_addend = rel->r_addend;
2758 rel->r_addend = 0;
2759
2760 if (r_type == R_XTENSA_32)
2761 {
2762 outrel.r_info =
2763 ELF32_R_INFO (h->dynindx, R_XTENSA_GLOB_DAT);
2764 relocation = 0;
2765 }
2766 else /* r_type == R_XTENSA_PLT */
2767 {
2768 outrel.r_info =
2769 ELF32_R_INFO (h->dynindx, R_XTENSA_JMP_SLOT);
2770
2771 /* Create the PLT entry and set the initial
2772 contents of the literal entry to the address of
2773 the PLT entry. */
2774 relocation =
2775 elf_xtensa_create_plt_entry (info, output_bfd,
2776 srel->reloc_count);
2777 }
2778 unresolved_reloc = FALSE;
2779 }
2780 else
2781 {
2782 /* Generate a RELATIVE relocation. */
2783 outrel.r_info = ELF32_R_INFO (0, R_XTENSA_RELATIVE);
2784 outrel.r_addend = 0;
2785 }
2786 }
2787
2788 loc = (srel->contents
2789 + srel->reloc_count++ * sizeof (Elf32_External_Rela));
2790 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2791 BFD_ASSERT (sizeof (Elf32_External_Rela) * srel->reloc_count
2792 <= srel->size);
2793 }
2794 else if (r_type == R_XTENSA_ASM_EXPAND && dynamic_symbol)
2795 {
2796 /* This should only happen for non-PIC code, which is not
2797 supposed to be used on systems with dynamic linking.
2798 Just ignore these relocations. */
2799 continue;
2800 }
2801 break;
2802
2803 case R_XTENSA_TLS_TPOFF:
2804 /* Switch to LE model for local symbols in an executable. */
2805 if (! bfd_link_pic (info) && ! dynamic_symbol)
2806 {
2807 relocation = tpoff (info, relocation);
2808 break;
2809 }
2810 /* fall through */
2811
2812 case R_XTENSA_TLSDESC_FN:
2813 case R_XTENSA_TLSDESC_ARG:
2814 {
2815 if (r_type == R_XTENSA_TLSDESC_FN)
2816 {
2817 if (! bfd_link_pic (info) || (tls_type & GOT_TLS_IE) != 0)
2818 r_type = R_XTENSA_NONE;
2819 }
2820 else if (r_type == R_XTENSA_TLSDESC_ARG)
2821 {
2822 if (bfd_link_pic (info))
2823 {
2824 if ((tls_type & GOT_TLS_IE) != 0)
2825 r_type = R_XTENSA_TLS_TPOFF;
2826 }
2827 else
2828 {
2829 r_type = R_XTENSA_TLS_TPOFF;
2830 if (! dynamic_symbol)
2831 {
2832 relocation = tpoff (info, relocation);
2833 break;
2834 }
2835 }
2836 }
2837
2838 if (r_type == R_XTENSA_NONE)
2839 /* Nothing to do here; skip to the next reloc. */
2840 continue;
2841
2842 if (! elf_hash_table (info)->dynamic_sections_created)
2843 {
2844 error_message =
2845 _("TLS relocation invalid without dynamic sections");
2846 (*info->callbacks->reloc_dangerous)
2847 (info, error_message,
2848 input_bfd, input_section, rel->r_offset);
2849 }
2850 else
2851 {
2852 Elf_Internal_Rela outrel;
2853 bfd_byte *loc;
2854 asection *srel = htab->elf.srelgot;
2855 int indx;
2856
2857 outrel.r_offset = (input_section->output_section->vma
2858 + input_section->output_offset
2859 + rel->r_offset);
2860
2861 /* Complain if the relocation is in a read-only section
2862 and not in a literal pool. */
2863 if ((input_section->flags & SEC_READONLY) != 0
2864 && ! elf_xtensa_in_literal_pool (lit_table, ltblsize,
2865 outrel.r_offset))
2866 {
2867 error_message =
2868 _("dynamic relocation in read-only section");
2869 (*info->callbacks->reloc_dangerous)
2870 (info, error_message,
2871 input_bfd, input_section, rel->r_offset);
2872 }
2873
2874 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2875 if (indx == 0)
2876 outrel.r_addend = relocation - dtpoff_base (info);
2877 else
2878 outrel.r_addend = 0;
2879 rel->r_addend = 0;
2880
2881 outrel.r_info = ELF32_R_INFO (indx, r_type);
2882 relocation = 0;
2883 unresolved_reloc = FALSE;
2884
2885 BFD_ASSERT (srel);
2886 loc = (srel->contents
2887 + srel->reloc_count++ * sizeof (Elf32_External_Rela));
2888 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2889 BFD_ASSERT (sizeof (Elf32_External_Rela) * srel->reloc_count
2890 <= srel->size);
2891 }
2892 }
2893 break;
2894
2895 case R_XTENSA_TLS_DTPOFF:
2896 if (! bfd_link_pic (info))
2897 /* Switch from LD model to LE model. */
2898 relocation = tpoff (info, relocation);
2899 else
2900 relocation -= dtpoff_base (info);
2901 break;
2902
2903 case R_XTENSA_TLS_FUNC:
2904 case R_XTENSA_TLS_ARG:
2905 case R_XTENSA_TLS_CALL:
2906 /* Check if optimizing to IE or LE model. */
2907 if ((tls_type & GOT_TLS_IE) != 0)
2908 {
2909 bfd_boolean is_ld_model =
2910 (h && elf_xtensa_hash_entry (h) == htab->tlsbase);
2911 if (! replace_tls_insn (rel, input_bfd, input_section, contents,
2912 is_ld_model, &error_message))
2913 (*info->callbacks->reloc_dangerous)
2914 (info, error_message,
2915 input_bfd, input_section, rel->r_offset);
2916
2917 if (r_type != R_XTENSA_TLS_ARG || is_ld_model)
2918 {
2919 /* Skip subsequent relocations on the same instruction. */
2920 while (rel + 1 < relend && rel[1].r_offset == rel->r_offset)
2921 rel++;
2922 }
2923 }
2924 continue;
2925
2926 default:
2927 if (elf_hash_table (info)->dynamic_sections_created
2928 && dynamic_symbol && (is_operand_relocation (r_type)
2929 || r_type == R_XTENSA_32_PCREL))
2930 {
2931 error_message =
2932 vsprint_msg ("invalid relocation for dynamic symbol", ": %s",
2933 strlen (name) + 2, name);
2934 (*info->callbacks->reloc_dangerous)
2935 (info, error_message, input_bfd, input_section, rel->r_offset);
2936 continue;
2937 }
2938 break;
2939 }
2940
2941 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2942 because such sections are not SEC_ALLOC and thus ld.so will
2943 not process them. */
2944 if (unresolved_reloc
2945 && !((input_section->flags & SEC_DEBUGGING) != 0
2946 && h->def_dynamic)
2947 && _bfd_elf_section_offset (output_bfd, info, input_section,
2948 rel->r_offset) != (bfd_vma) -1)
2949 {
2950 _bfd_error_handler
2951 /* xgettext:c-format */
2952 (_("%pB(%pA+%#" PRIx64 "): "
2953 "unresolvable %s relocation against symbol `%s'"),
2954 input_bfd,
2955 input_section,
2956 (uint64_t) rel->r_offset,
2957 howto->name,
2958 name);
2959 return FALSE;
2960 }
2961
2962 /* TLS optimizations may have changed r_type; update "howto". */
2963 howto = &elf_howto_table[r_type];
2964
2965 /* There's no point in calling bfd_perform_relocation here.
2966 Just go directly to our "special function". */
2967 r = elf_xtensa_do_reloc (howto, input_bfd, input_section,
2968 relocation + rel->r_addend,
2969 contents, rel->r_offset, is_weak_undef,
2970 &error_message);
2971
2972 if (r != bfd_reloc_ok && !warned)
2973 {
2974 BFD_ASSERT (r == bfd_reloc_dangerous || r == bfd_reloc_other);
2975 BFD_ASSERT (error_message != NULL);
2976
2977 if (rel->r_addend == 0)
2978 error_message = vsprint_msg (error_message, ": %s",
2979 strlen (name) + 2, name);
2980 else
2981 error_message = vsprint_msg (error_message, ": (%s+0x%x)",
2982 strlen (name) + 22,
2983 name, (int) rel->r_addend);
2984
2985 (*info->callbacks->reloc_dangerous)
2986 (info, error_message, input_bfd, input_section, rel->r_offset);
2987 }
2988 }
2989
2990 if (lit_table)
2991 free (lit_table);
2992
2993 input_section->reloc_done = TRUE;
2994
2995 return TRUE;
2996 }
2997
2998
2999 /* Finish up dynamic symbol handling. There's not much to do here since
3000 the PLT and GOT entries are all set up by relocate_section. */
3001
3002 static bfd_boolean
3003 elf_xtensa_finish_dynamic_symbol (bfd *output_bfd ATTRIBUTE_UNUSED,
3004 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3005 struct elf_link_hash_entry *h,
3006 Elf_Internal_Sym *sym)
3007 {
3008 if (h->needs_plt && !h->def_regular)
3009 {
3010 /* Mark the symbol as undefined, rather than as defined in
3011 the .plt section. Leave the value alone. */
3012 sym->st_shndx = SHN_UNDEF;
3013 /* If the symbol is weak, we do need to clear the value.
3014 Otherwise, the PLT entry would provide a definition for
3015 the symbol even if the symbol wasn't defined anywhere,
3016 and so the symbol would never be NULL. */
3017 if (!h->ref_regular_nonweak)
3018 sym->st_value = 0;
3019 }
3020
3021 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3022 if (h == elf_hash_table (info)->hdynamic
3023 || h == elf_hash_table (info)->hgot)
3024 sym->st_shndx = SHN_ABS;
3025
3026 return TRUE;
3027 }
3028
3029
3030 /* Combine adjacent literal table entries in the output. Adjacent
3031 entries within each input section may have been removed during
3032 relaxation, but we repeat the process here, even though it's too late
3033 to shrink the output section, because it's important to minimize the
3034 number of literal table entries to reduce the start-up work for the
3035 runtime linker. Returns the number of remaining table entries or -1
3036 on error. */
3037
3038 static int
3039 elf_xtensa_combine_prop_entries (bfd *output_bfd,
3040 asection *sxtlit,
3041 asection *sgotloc)
3042 {
3043 bfd_byte *contents;
3044 property_table_entry *table;
3045 bfd_size_type section_size, sgotloc_size;
3046 bfd_vma offset;
3047 int n, m, num;
3048
3049 section_size = sxtlit->size;
3050 BFD_ASSERT (section_size % 8 == 0);
3051 num = section_size / 8;
3052
3053 sgotloc_size = sgotloc->size;
3054 if (sgotloc_size != section_size)
3055 {
3056 _bfd_error_handler
3057 (_("internal inconsistency in size of .got.loc section"));
3058 return -1;
3059 }
3060
3061 table = bfd_malloc (num * sizeof (property_table_entry));
3062 if (table == 0)
3063 return -1;
3064
3065 /* The ".xt.lit.plt" section has the SEC_IN_MEMORY flag set and this
3066 propagates to the output section, where it doesn't really apply and
3067 where it breaks the following call to bfd_malloc_and_get_section. */
3068 sxtlit->flags &= ~SEC_IN_MEMORY;
3069
3070 if (!bfd_malloc_and_get_section (output_bfd, sxtlit, &contents))
3071 {
3072 if (contents != 0)
3073 free (contents);
3074 free (table);
3075 return -1;
3076 }
3077
3078 /* There should never be any relocations left at this point, so this
3079 is quite a bit easier than what is done during relaxation. */
3080
3081 /* Copy the raw contents into a property table array and sort it. */
3082 offset = 0;
3083 for (n = 0; n < num; n++)
3084 {
3085 table[n].address = bfd_get_32 (output_bfd, &contents[offset]);
3086 table[n].size = bfd_get_32 (output_bfd, &contents[offset + 4]);
3087 offset += 8;
3088 }
3089 qsort (table, num, sizeof (property_table_entry), property_table_compare);
3090
3091 for (n = 0; n < num; n++)
3092 {
3093 bfd_boolean remove_entry = FALSE;
3094
3095 if (table[n].size == 0)
3096 remove_entry = TRUE;
3097 else if (n > 0
3098 && (table[n-1].address + table[n-1].size == table[n].address))
3099 {
3100 table[n-1].size += table[n].size;
3101 remove_entry = TRUE;
3102 }
3103
3104 if (remove_entry)
3105 {
3106 for (m = n; m < num - 1; m++)
3107 {
3108 table[m].address = table[m+1].address;
3109 table[m].size = table[m+1].size;
3110 }
3111
3112 n--;
3113 num--;
3114 }
3115 }
3116
3117 /* Copy the data back to the raw contents. */
3118 offset = 0;
3119 for (n = 0; n < num; n++)
3120 {
3121 bfd_put_32 (output_bfd, table[n].address, &contents[offset]);
3122 bfd_put_32 (output_bfd, table[n].size, &contents[offset + 4]);
3123 offset += 8;
3124 }
3125
3126 /* Clear the removed bytes. */
3127 if ((bfd_size_type) (num * 8) < section_size)
3128 memset (&contents[num * 8], 0, section_size - num * 8);
3129
3130 if (! bfd_set_section_contents (output_bfd, sxtlit, contents, 0,
3131 section_size))
3132 return -1;
3133
3134 /* Copy the contents to ".got.loc". */
3135 memcpy (sgotloc->contents, contents, section_size);
3136
3137 free (contents);
3138 free (table);
3139 return num;
3140 }
3141
3142
3143 /* Finish up the dynamic sections. */
3144
3145 static bfd_boolean
3146 elf_xtensa_finish_dynamic_sections (bfd *output_bfd,
3147 struct bfd_link_info *info)
3148 {
3149 struct elf_xtensa_link_hash_table *htab;
3150 bfd *dynobj;
3151 asection *sdyn, *srelplt, *sgot, *sxtlit, *sgotloc;
3152 Elf32_External_Dyn *dyncon, *dynconend;
3153 int num_xtlit_entries = 0;
3154
3155 if (! elf_hash_table (info)->dynamic_sections_created)
3156 return TRUE;
3157
3158 htab = elf_xtensa_hash_table (info);
3159 if (htab == NULL)
3160 return FALSE;
3161
3162 dynobj = elf_hash_table (info)->dynobj;
3163 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3164 BFD_ASSERT (sdyn != NULL);
3165
3166 /* Set the first entry in the global offset table to the address of
3167 the dynamic section. */
3168 sgot = htab->elf.sgot;
3169 if (sgot)
3170 {
3171 BFD_ASSERT (sgot->size == 4);
3172 if (sdyn == NULL)
3173 bfd_put_32 (output_bfd, 0, sgot->contents);
3174 else
3175 bfd_put_32 (output_bfd,
3176 sdyn->output_section->vma + sdyn->output_offset,
3177 sgot->contents);
3178 }
3179
3180 srelplt = htab->elf.srelplt;
3181 if (srelplt && srelplt->size != 0)
3182 {
3183 asection *sgotplt, *srelgot, *spltlittbl;
3184 int chunk, plt_chunks, plt_entries;
3185 Elf_Internal_Rela irela;
3186 bfd_byte *loc;
3187 unsigned rtld_reloc;
3188
3189 srelgot = htab->elf.srelgot;
3190 spltlittbl = htab->spltlittbl;
3191 BFD_ASSERT (srelgot != NULL && spltlittbl != NULL);
3192
3193 /* Find the first XTENSA_RTLD relocation. Presumably the rest
3194 of them follow immediately after.... */
3195 for (rtld_reloc = 0; rtld_reloc < srelgot->reloc_count; rtld_reloc++)
3196 {
3197 loc = srelgot->contents + rtld_reloc * sizeof (Elf32_External_Rela);
3198 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3199 if (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD)
3200 break;
3201 }
3202 BFD_ASSERT (rtld_reloc < srelgot->reloc_count);
3203
3204 plt_entries = srelplt->size / sizeof (Elf32_External_Rela);
3205 plt_chunks =
3206 (plt_entries + PLT_ENTRIES_PER_CHUNK - 1) / PLT_ENTRIES_PER_CHUNK;
3207
3208 for (chunk = 0; chunk < plt_chunks; chunk++)
3209 {
3210 int chunk_entries = 0;
3211
3212 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
3213 BFD_ASSERT (sgotplt != NULL);
3214
3215 /* Emit special RTLD relocations for the first two entries in
3216 each chunk of the .got.plt section. */
3217
3218 loc = srelgot->contents + rtld_reloc * sizeof (Elf32_External_Rela);
3219 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3220 BFD_ASSERT (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD);
3221 irela.r_offset = (sgotplt->output_section->vma
3222 + sgotplt->output_offset);
3223 irela.r_addend = 1; /* tell rtld to set value to resolver function */
3224 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
3225 rtld_reloc += 1;
3226 BFD_ASSERT (rtld_reloc <= srelgot->reloc_count);
3227
3228 /* Next literal immediately follows the first. */
3229 loc += sizeof (Elf32_External_Rela);
3230 bfd_elf32_swap_reloca_in (output_bfd, loc, &irela);
3231 BFD_ASSERT (ELF32_R_TYPE (irela.r_info) == R_XTENSA_RTLD);
3232 irela.r_offset = (sgotplt->output_section->vma
3233 + sgotplt->output_offset + 4);
3234 /* Tell rtld to set value to object's link map. */
3235 irela.r_addend = 2;
3236 bfd_elf32_swap_reloca_out (output_bfd, &irela, loc);
3237 rtld_reloc += 1;
3238 BFD_ASSERT (rtld_reloc <= srelgot->reloc_count);
3239
3240 /* Fill in the literal table. */
3241 if (chunk < plt_chunks - 1)
3242 chunk_entries = PLT_ENTRIES_PER_CHUNK;
3243 else
3244 chunk_entries = plt_entries - (chunk * PLT_ENTRIES_PER_CHUNK);
3245
3246 BFD_ASSERT ((unsigned) (chunk + 1) * 8 <= spltlittbl->size);
3247 bfd_put_32 (output_bfd,
3248 sgotplt->output_section->vma + sgotplt->output_offset,
3249 spltlittbl->contents + (chunk * 8) + 0);
3250 bfd_put_32 (output_bfd,
3251 8 + (chunk_entries * 4),
3252 spltlittbl->contents + (chunk * 8) + 4);
3253 }
3254
3255 /* All the dynamic relocations have been emitted at this point.
3256 Make sure the relocation sections are the correct size. */
3257 if (srelgot->size != (sizeof (Elf32_External_Rela)
3258 * srelgot->reloc_count)
3259 || srelplt->size != (sizeof (Elf32_External_Rela)
3260 * srelplt->reloc_count))
3261 abort ();
3262
3263 /* The .xt.lit.plt section has just been modified. This must
3264 happen before the code below which combines adjacent literal
3265 table entries, and the .xt.lit.plt contents have to be forced to
3266 the output here. */
3267 if (! bfd_set_section_contents (output_bfd,
3268 spltlittbl->output_section,
3269 spltlittbl->contents,
3270 spltlittbl->output_offset,
3271 spltlittbl->size))
3272 return FALSE;
3273 /* Clear SEC_HAS_CONTENTS so the contents won't be output again. */
3274 spltlittbl->flags &= ~SEC_HAS_CONTENTS;
3275 }
3276
3277 /* Combine adjacent literal table entries. */
3278 BFD_ASSERT (! bfd_link_relocatable (info));
3279 sxtlit = bfd_get_section_by_name (output_bfd, ".xt.lit");
3280 sgotloc = htab->sgotloc;
3281 BFD_ASSERT (sgotloc);
3282 if (sxtlit)
3283 {
3284 num_xtlit_entries =
3285 elf_xtensa_combine_prop_entries (output_bfd, sxtlit, sgotloc);
3286 if (num_xtlit_entries < 0)
3287 return FALSE;
3288 }
3289
3290 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3291 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3292 for (; dyncon < dynconend; dyncon++)
3293 {
3294 Elf_Internal_Dyn dyn;
3295
3296 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3297
3298 switch (dyn.d_tag)
3299 {
3300 default:
3301 break;
3302
3303 case DT_XTENSA_GOT_LOC_SZ:
3304 dyn.d_un.d_val = num_xtlit_entries;
3305 break;
3306
3307 case DT_XTENSA_GOT_LOC_OFF:
3308 dyn.d_un.d_ptr = (htab->sgotloc->output_section->vma
3309 + htab->sgotloc->output_offset);
3310 break;
3311
3312 case DT_PLTGOT:
3313 dyn.d_un.d_ptr = (htab->elf.sgot->output_section->vma
3314 + htab->elf.sgot->output_offset);
3315 break;
3316
3317 case DT_JMPREL:
3318 dyn.d_un.d_ptr = (htab->elf.srelplt->output_section->vma
3319 + htab->elf.srelplt->output_offset);
3320 break;
3321
3322 case DT_PLTRELSZ:
3323 dyn.d_un.d_val = htab->elf.srelplt->size;
3324 break;
3325 }
3326
3327 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3328 }
3329
3330 return TRUE;
3331 }
3332
3333 \f
3334 /* Functions for dealing with the e_flags field. */
3335
3336 /* Merge backend specific data from an object file to the output
3337 object file when linking. */
3338
3339 static bfd_boolean
3340 elf_xtensa_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3341 {
3342 bfd *obfd = info->output_bfd;
3343 unsigned out_mach, in_mach;
3344 flagword out_flag, in_flag;
3345
3346 /* Check if we have the same endianness. */
3347 if (!_bfd_generic_verify_endian_match (ibfd, info))
3348 return FALSE;
3349
3350 /* Don't even pretend to support mixed-format linking. */
3351 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3352 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
3353 return FALSE;
3354
3355 out_flag = elf_elfheader (obfd)->e_flags;
3356 in_flag = elf_elfheader (ibfd)->e_flags;
3357
3358 out_mach = out_flag & EF_XTENSA_MACH;
3359 in_mach = in_flag & EF_XTENSA_MACH;
3360 if (out_mach != in_mach)
3361 {
3362 _bfd_error_handler
3363 /* xgettext:c-format */
3364 (_("%pB: incompatible machine type; output is 0x%x; input is 0x%x"),
3365 ibfd, out_mach, in_mach);
3366 bfd_set_error (bfd_error_wrong_format);
3367 return FALSE;
3368 }
3369
3370 if (! elf_flags_init (obfd))
3371 {
3372 elf_flags_init (obfd) = TRUE;
3373 elf_elfheader (obfd)->e_flags = in_flag;
3374
3375 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
3376 && bfd_get_arch_info (obfd)->the_default)
3377 return bfd_set_arch_mach (obfd, bfd_get_arch (ibfd),
3378 bfd_get_mach (ibfd));
3379
3380 return TRUE;
3381 }
3382
3383 if ((out_flag & EF_XTENSA_XT_INSN) != (in_flag & EF_XTENSA_XT_INSN))
3384 elf_elfheader (obfd)->e_flags &= (~ EF_XTENSA_XT_INSN);
3385
3386 if ((out_flag & EF_XTENSA_XT_LIT) != (in_flag & EF_XTENSA_XT_LIT))
3387 elf_elfheader (obfd)->e_flags &= (~ EF_XTENSA_XT_LIT);
3388
3389 return TRUE;
3390 }
3391
3392
3393 static bfd_boolean
3394 elf_xtensa_set_private_flags (bfd *abfd, flagword flags)
3395 {
3396 BFD_ASSERT (!elf_flags_init (abfd)
3397 || elf_elfheader (abfd)->e_flags == flags);
3398
3399 elf_elfheader (abfd)->e_flags |= flags;
3400 elf_flags_init (abfd) = TRUE;
3401
3402 return TRUE;
3403 }
3404
3405
3406 static bfd_boolean
3407 elf_xtensa_print_private_bfd_data (bfd *abfd, void *farg)
3408 {
3409 FILE *f = (FILE *) farg;
3410 flagword e_flags = elf_elfheader (abfd)->e_flags;
3411
3412 fprintf (f, "\nXtensa header:\n");
3413 if ((e_flags & EF_XTENSA_MACH) == E_XTENSA_MACH)
3414 fprintf (f, "\nMachine = Base\n");
3415 else
3416 fprintf (f, "\nMachine Id = 0x%x\n", e_flags & EF_XTENSA_MACH);
3417
3418 fprintf (f, "Insn tables = %s\n",
3419 (e_flags & EF_XTENSA_XT_INSN) ? "true" : "false");
3420
3421 fprintf (f, "Literal tables = %s\n",
3422 (e_flags & EF_XTENSA_XT_LIT) ? "true" : "false");
3423
3424 return _bfd_elf_print_private_bfd_data (abfd, farg);
3425 }
3426
3427
3428 /* Set the right machine number for an Xtensa ELF file. */
3429
3430 static bfd_boolean
3431 elf_xtensa_object_p (bfd *abfd)
3432 {
3433 int mach;
3434 unsigned long arch = elf_elfheader (abfd)->e_flags & EF_XTENSA_MACH;
3435
3436 switch (arch)
3437 {
3438 case E_XTENSA_MACH:
3439 mach = bfd_mach_xtensa;
3440 break;
3441 default:
3442 return FALSE;
3443 }
3444
3445 (void) bfd_default_set_arch_mach (abfd, bfd_arch_xtensa, mach);
3446 return TRUE;
3447 }
3448
3449
3450 /* The final processing done just before writing out an Xtensa ELF object
3451 file. This gets the Xtensa architecture right based on the machine
3452 number. */
3453
3454 static void
3455 elf_xtensa_final_write_processing (bfd *abfd,
3456 bfd_boolean linker ATTRIBUTE_UNUSED)
3457 {
3458 int mach;
3459 unsigned long val;
3460
3461 switch (mach = bfd_get_mach (abfd))
3462 {
3463 case bfd_mach_xtensa:
3464 val = E_XTENSA_MACH;
3465 break;
3466 default:
3467 return;
3468 }
3469
3470 elf_elfheader (abfd)->e_flags &= (~ EF_XTENSA_MACH);
3471 elf_elfheader (abfd)->e_flags |= val;
3472 }
3473
3474
3475 static enum elf_reloc_type_class
3476 elf_xtensa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3477 const asection *rel_sec ATTRIBUTE_UNUSED,
3478 const Elf_Internal_Rela *rela)
3479 {
3480 switch ((int) ELF32_R_TYPE (rela->r_info))
3481 {
3482 case R_XTENSA_RELATIVE:
3483 return reloc_class_relative;
3484 case R_XTENSA_JMP_SLOT:
3485 return reloc_class_plt;
3486 default:
3487 return reloc_class_normal;
3488 }
3489 }
3490
3491 \f
3492 static bfd_boolean
3493 elf_xtensa_discard_info_for_section (bfd *abfd,
3494 struct elf_reloc_cookie *cookie,
3495 struct bfd_link_info *info,
3496 asection *sec)
3497 {
3498 bfd_byte *contents;
3499 bfd_vma offset, actual_offset;
3500 bfd_size_type removed_bytes = 0;
3501 bfd_size_type entry_size;
3502
3503 if (sec->output_section
3504 && bfd_is_abs_section (sec->output_section))
3505 return FALSE;
3506
3507 if (xtensa_is_proptable_section (sec))
3508 entry_size = 12;
3509 else
3510 entry_size = 8;
3511
3512 if (sec->size == 0 || sec->size % entry_size != 0)
3513 return FALSE;
3514
3515 contents = retrieve_contents (abfd, sec, info->keep_memory);
3516 if (!contents)
3517 return FALSE;
3518
3519 cookie->rels = retrieve_internal_relocs (abfd, sec, info->keep_memory);
3520 if (!cookie->rels)
3521 {
3522 release_contents (sec, contents);
3523 return FALSE;
3524 }
3525
3526 /* Sort the relocations. They should already be in order when
3527 relaxation is enabled, but it might not be. */
3528 qsort (cookie->rels, sec->reloc_count, sizeof (Elf_Internal_Rela),
3529 internal_reloc_compare);
3530
3531 cookie->rel = cookie->rels;
3532 cookie->relend = cookie->rels + sec->reloc_count;
3533
3534 for (offset = 0; offset < sec->size; offset += entry_size)
3535 {
3536 actual_offset = offset - removed_bytes;
3537
3538 /* The ...symbol_deleted_p function will skip over relocs but it
3539 won't adjust their offsets, so do that here. */
3540 while (cookie->rel < cookie->relend
3541 && cookie->rel->r_offset < offset)
3542 {
3543 cookie->rel->r_offset -= removed_bytes;
3544 cookie->rel++;
3545 }
3546
3547 while (cookie->rel < cookie->relend
3548 && cookie->rel->r_offset == offset)
3549 {
3550 if (bfd_elf_reloc_symbol_deleted_p (offset, cookie))
3551 {
3552 /* Remove the table entry. (If the reloc type is NONE, then
3553 the entry has already been merged with another and deleted
3554 during relaxation.) */
3555 if (ELF32_R_TYPE (cookie->rel->r_info) != R_XTENSA_NONE)
3556 {
3557 /* Shift the contents up. */
3558 if (offset + entry_size < sec->size)
3559 memmove (&contents[actual_offset],
3560 &contents[actual_offset + entry_size],
3561 sec->size - offset - entry_size);
3562 removed_bytes += entry_size;
3563 }
3564
3565 /* Remove this relocation. */
3566 cookie->rel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
3567 }
3568
3569 /* Adjust the relocation offset for previous removals. This
3570 should not be done before calling ...symbol_deleted_p
3571 because it might mess up the offset comparisons there.
3572 Make sure the offset doesn't underflow in the case where
3573 the first entry is removed. */
3574 if (cookie->rel->r_offset >= removed_bytes)
3575 cookie->rel->r_offset -= removed_bytes;
3576 else
3577 cookie->rel->r_offset = 0;
3578
3579 cookie->rel++;
3580 }
3581 }
3582
3583 if (removed_bytes != 0)
3584 {
3585 /* Adjust any remaining relocs (shouldn't be any). */
3586 for (; cookie->rel < cookie->relend; cookie->rel++)
3587 {
3588 if (cookie->rel->r_offset >= removed_bytes)
3589 cookie->rel->r_offset -= removed_bytes;
3590 else
3591 cookie->rel->r_offset = 0;
3592 }
3593
3594 /* Clear the removed bytes. */
3595 memset (&contents[sec->size - removed_bytes], 0, removed_bytes);
3596
3597 pin_contents (sec, contents);
3598 pin_internal_relocs (sec, cookie->rels);
3599
3600 /* Shrink size. */
3601 if (sec->rawsize == 0)
3602 sec->rawsize = sec->size;
3603 sec->size -= removed_bytes;
3604
3605 if (xtensa_is_littable_section (sec))
3606 {
3607 asection *sgotloc = elf_xtensa_hash_table (info)->sgotloc;
3608 if (sgotloc)
3609 sgotloc->size -= removed_bytes;
3610 }
3611 }
3612 else
3613 {
3614 release_contents (sec, contents);
3615 release_internal_relocs (sec, cookie->rels);
3616 }
3617
3618 return (removed_bytes != 0);
3619 }
3620
3621
3622 static bfd_boolean
3623 elf_xtensa_discard_info (bfd *abfd,
3624 struct elf_reloc_cookie *cookie,
3625 struct bfd_link_info *info)
3626 {
3627 asection *sec;
3628 bfd_boolean changed = FALSE;
3629
3630 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3631 {
3632 if (xtensa_is_property_section (sec))
3633 {
3634 if (elf_xtensa_discard_info_for_section (abfd, cookie, info, sec))
3635 changed = TRUE;
3636 }
3637 }
3638
3639 return changed;
3640 }
3641
3642
3643 static bfd_boolean
3644 elf_xtensa_ignore_discarded_relocs (asection *sec)
3645 {
3646 return xtensa_is_property_section (sec);
3647 }
3648
3649
3650 static unsigned int
3651 elf_xtensa_action_discarded (asection *sec)
3652 {
3653 if (strcmp (".xt_except_table", sec->name) == 0)
3654 return 0;
3655
3656 if (strcmp (".xt_except_desc", sec->name) == 0)
3657 return 0;
3658
3659 return _bfd_elf_default_action_discarded (sec);
3660 }
3661
3662 \f
3663 /* Support for core dump NOTE sections. */
3664
3665 static bfd_boolean
3666 elf_xtensa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3667 {
3668 int offset;
3669 unsigned int size;
3670
3671 /* The size for Xtensa is variable, so don't try to recognize the format
3672 based on the size. Just assume this is GNU/Linux. */
3673
3674 /* pr_cursig */
3675 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3676
3677 /* pr_pid */
3678 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
3679
3680 /* pr_reg */
3681 offset = 72;
3682 size = note->descsz - offset - 4;
3683
3684 /* Make a ".reg/999" section. */
3685 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3686 size, note->descpos + offset);
3687 }
3688
3689
3690 static bfd_boolean
3691 elf_xtensa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3692 {
3693 switch (note->descsz)
3694 {
3695 default:
3696 return FALSE;
3697
3698 case 128: /* GNU/Linux elf_prpsinfo */
3699 elf_tdata (abfd)->core->program
3700 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
3701 elf_tdata (abfd)->core->command
3702 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
3703 }
3704
3705 /* Note that for some reason, a spurious space is tacked
3706 onto the end of the args in some (at least one anyway)
3707 implementations, so strip it off if it exists. */
3708
3709 {
3710 char *command = elf_tdata (abfd)->core->command;
3711 int n = strlen (command);
3712
3713 if (0 < n && command[n - 1] == ' ')
3714 command[n - 1] = '\0';
3715 }
3716
3717 return TRUE;
3718 }
3719
3720 \f
3721 /* Generic Xtensa configurability stuff. */
3722
3723 static xtensa_opcode callx0_op = XTENSA_UNDEFINED;
3724 static xtensa_opcode callx4_op = XTENSA_UNDEFINED;
3725 static xtensa_opcode callx8_op = XTENSA_UNDEFINED;
3726 static xtensa_opcode callx12_op = XTENSA_UNDEFINED;
3727 static xtensa_opcode call0_op = XTENSA_UNDEFINED;
3728 static xtensa_opcode call4_op = XTENSA_UNDEFINED;
3729 static xtensa_opcode call8_op = XTENSA_UNDEFINED;
3730 static xtensa_opcode call12_op = XTENSA_UNDEFINED;
3731
3732 static void
3733 init_call_opcodes (void)
3734 {
3735 if (callx0_op == XTENSA_UNDEFINED)
3736 {
3737 callx0_op = xtensa_opcode_lookup (xtensa_default_isa, "callx0");
3738 callx4_op = xtensa_opcode_lookup (xtensa_default_isa, "callx4");
3739 callx8_op = xtensa_opcode_lookup (xtensa_default_isa, "callx8");
3740 callx12_op = xtensa_opcode_lookup (xtensa_default_isa, "callx12");
3741 call0_op = xtensa_opcode_lookup (xtensa_default_isa, "call0");
3742 call4_op = xtensa_opcode_lookup (xtensa_default_isa, "call4");
3743 call8_op = xtensa_opcode_lookup (xtensa_default_isa, "call8");
3744 call12_op = xtensa_opcode_lookup (xtensa_default_isa, "call12");
3745 }
3746 }
3747
3748
3749 static bfd_boolean
3750 is_indirect_call_opcode (xtensa_opcode opcode)
3751 {
3752 init_call_opcodes ();
3753 return (opcode == callx0_op
3754 || opcode == callx4_op
3755 || opcode == callx8_op
3756 || opcode == callx12_op);
3757 }
3758
3759
3760 static bfd_boolean
3761 is_direct_call_opcode (xtensa_opcode opcode)
3762 {
3763 init_call_opcodes ();
3764 return (opcode == call0_op
3765 || opcode == call4_op
3766 || opcode == call8_op
3767 || opcode == call12_op);
3768 }
3769
3770
3771 static bfd_boolean
3772 is_windowed_call_opcode (xtensa_opcode opcode)
3773 {
3774 init_call_opcodes ();
3775 return (opcode == call4_op
3776 || opcode == call8_op
3777 || opcode == call12_op
3778 || opcode == callx4_op
3779 || opcode == callx8_op
3780 || opcode == callx12_op);
3781 }
3782
3783
3784 static bfd_boolean
3785 get_indirect_call_dest_reg (xtensa_opcode opcode, unsigned *pdst)
3786 {
3787 unsigned dst = (unsigned) -1;
3788
3789 init_call_opcodes ();
3790 if (opcode == callx0_op)
3791 dst = 0;
3792 else if (opcode == callx4_op)
3793 dst = 4;
3794 else if (opcode == callx8_op)
3795 dst = 8;
3796 else if (opcode == callx12_op)
3797 dst = 12;
3798
3799 if (dst == (unsigned) -1)
3800 return FALSE;
3801
3802 *pdst = dst;
3803 return TRUE;
3804 }
3805
3806
3807 static xtensa_opcode
3808 get_const16_opcode (void)
3809 {
3810 static bfd_boolean done_lookup = FALSE;
3811 static xtensa_opcode const16_opcode = XTENSA_UNDEFINED;
3812 if (!done_lookup)
3813 {
3814 const16_opcode = xtensa_opcode_lookup (xtensa_default_isa, "const16");
3815 done_lookup = TRUE;
3816 }
3817 return const16_opcode;
3818 }
3819
3820
3821 static xtensa_opcode
3822 get_l32r_opcode (void)
3823 {
3824 static xtensa_opcode l32r_opcode = XTENSA_UNDEFINED;
3825 static bfd_boolean done_lookup = FALSE;
3826
3827 if (!done_lookup)
3828 {
3829 l32r_opcode = xtensa_opcode_lookup (xtensa_default_isa, "l32r");
3830 done_lookup = TRUE;
3831 }
3832 return l32r_opcode;
3833 }
3834
3835
3836 static bfd_vma
3837 l32r_offset (bfd_vma addr, bfd_vma pc)
3838 {
3839 bfd_vma offset;
3840
3841 offset = addr - ((pc+3) & -4);
3842 BFD_ASSERT ((offset & ((1 << 2) - 1)) == 0);
3843 offset = (signed int) offset >> 2;
3844 BFD_ASSERT ((signed int) offset >> 16 == -1);
3845 return offset;
3846 }
3847
3848
3849 static int
3850 get_relocation_opnd (xtensa_opcode opcode, int r_type)
3851 {
3852 xtensa_isa isa = xtensa_default_isa;
3853 int last_immed, last_opnd, opi;
3854
3855 if (opcode == XTENSA_UNDEFINED)
3856 return XTENSA_UNDEFINED;
3857
3858 /* Find the last visible PC-relative immediate operand for the opcode.
3859 If there are no PC-relative immediates, then choose the last visible
3860 immediate; otherwise, fail and return XTENSA_UNDEFINED. */
3861 last_immed = XTENSA_UNDEFINED;
3862 last_opnd = xtensa_opcode_num_operands (isa, opcode);
3863 for (opi = last_opnd - 1; opi >= 0; opi--)
3864 {
3865 if (xtensa_operand_is_visible (isa, opcode, opi) == 0)
3866 continue;
3867 if (xtensa_operand_is_PCrelative (isa, opcode, opi) == 1)
3868 {
3869 last_immed = opi;
3870 break;
3871 }
3872 if (last_immed == XTENSA_UNDEFINED
3873 && xtensa_operand_is_register (isa, opcode, opi) == 0)
3874 last_immed = opi;
3875 }
3876 if (last_immed < 0)
3877 return XTENSA_UNDEFINED;
3878
3879 /* If the operand number was specified in an old-style relocation,
3880 check for consistency with the operand computed above. */
3881 if (r_type >= R_XTENSA_OP0 && r_type <= R_XTENSA_OP2)
3882 {
3883 int reloc_opnd = r_type - R_XTENSA_OP0;
3884 if (reloc_opnd != last_immed)
3885 return XTENSA_UNDEFINED;
3886 }
3887
3888 return last_immed;
3889 }
3890
3891
3892 int
3893 get_relocation_slot (int r_type)
3894 {
3895 switch (r_type)
3896 {
3897 case R_XTENSA_OP0:
3898 case R_XTENSA_OP1:
3899 case R_XTENSA_OP2:
3900 return 0;
3901
3902 default:
3903 if (r_type >= R_XTENSA_SLOT0_OP && r_type <= R_XTENSA_SLOT14_OP)
3904 return r_type - R_XTENSA_SLOT0_OP;
3905 if (r_type >= R_XTENSA_SLOT0_ALT && r_type <= R_XTENSA_SLOT14_ALT)
3906 return r_type - R_XTENSA_SLOT0_ALT;
3907 break;
3908 }
3909
3910 return XTENSA_UNDEFINED;
3911 }
3912
3913
3914 /* Get the opcode for a relocation. */
3915
3916 static xtensa_opcode
3917 get_relocation_opcode (bfd *abfd,
3918 asection *sec,
3919 bfd_byte *contents,
3920 Elf_Internal_Rela *irel)
3921 {
3922 static xtensa_insnbuf ibuff = NULL;
3923 static xtensa_insnbuf sbuff = NULL;
3924 xtensa_isa isa = xtensa_default_isa;
3925 xtensa_format fmt;
3926 int slot;
3927
3928 if (contents == NULL)
3929 return XTENSA_UNDEFINED;
3930
3931 if (bfd_get_section_limit (abfd, sec) <= irel->r_offset)
3932 return XTENSA_UNDEFINED;
3933
3934 if (ibuff == NULL)
3935 {
3936 ibuff = xtensa_insnbuf_alloc (isa);
3937 sbuff = xtensa_insnbuf_alloc (isa);
3938 }
3939
3940 /* Decode the instruction. */
3941 xtensa_insnbuf_from_chars (isa, ibuff, &contents[irel->r_offset],
3942 sec->size - irel->r_offset);
3943 fmt = xtensa_format_decode (isa, ibuff);
3944 slot = get_relocation_slot (ELF32_R_TYPE (irel->r_info));
3945 if (slot == XTENSA_UNDEFINED)
3946 return XTENSA_UNDEFINED;
3947 xtensa_format_get_slot (isa, fmt, slot, ibuff, sbuff);
3948 return xtensa_opcode_decode (isa, fmt, slot, sbuff);
3949 }
3950
3951
3952 bfd_boolean
3953 is_l32r_relocation (bfd *abfd,
3954 asection *sec,
3955 bfd_byte *contents,
3956 Elf_Internal_Rela *irel)
3957 {
3958 xtensa_opcode opcode;
3959 if (!is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
3960 return FALSE;
3961 opcode = get_relocation_opcode (abfd, sec, contents, irel);
3962 return (opcode == get_l32r_opcode ());
3963 }
3964
3965
3966 static bfd_size_type
3967 get_asm_simplify_size (bfd_byte *contents,
3968 bfd_size_type content_len,
3969 bfd_size_type offset)
3970 {
3971 bfd_size_type insnlen, size = 0;
3972
3973 /* Decode the size of the next two instructions. */
3974 insnlen = insn_decode_len (contents, content_len, offset);
3975 if (insnlen == 0)
3976 return 0;
3977
3978 size += insnlen;
3979
3980 insnlen = insn_decode_len (contents, content_len, offset + size);
3981 if (insnlen == 0)
3982 return 0;
3983
3984 size += insnlen;
3985 return size;
3986 }
3987
3988
3989 bfd_boolean
3990 is_alt_relocation (int r_type)
3991 {
3992 return (r_type >= R_XTENSA_SLOT0_ALT
3993 && r_type <= R_XTENSA_SLOT14_ALT);
3994 }
3995
3996
3997 bfd_boolean
3998 is_operand_relocation (int r_type)
3999 {
4000 switch (r_type)
4001 {
4002 case R_XTENSA_OP0:
4003 case R_XTENSA_OP1:
4004 case R_XTENSA_OP2:
4005 return TRUE;
4006
4007 default:
4008 if (r_type >= R_XTENSA_SLOT0_OP && r_type <= R_XTENSA_SLOT14_OP)
4009 return TRUE;
4010 if (r_type >= R_XTENSA_SLOT0_ALT && r_type <= R_XTENSA_SLOT14_ALT)
4011 return TRUE;
4012 break;
4013 }
4014
4015 return FALSE;
4016 }
4017
4018
4019 #define MIN_INSN_LENGTH 2
4020
4021 /* Return 0 if it fails to decode. */
4022
4023 bfd_size_type
4024 insn_decode_len (bfd_byte *contents,
4025 bfd_size_type content_len,
4026 bfd_size_type offset)
4027 {
4028 int insn_len;
4029 xtensa_isa isa = xtensa_default_isa;
4030 xtensa_format fmt;
4031 static xtensa_insnbuf ibuff = NULL;
4032
4033 if (offset + MIN_INSN_LENGTH > content_len)
4034 return 0;
4035
4036 if (ibuff == NULL)
4037 ibuff = xtensa_insnbuf_alloc (isa);
4038 xtensa_insnbuf_from_chars (isa, ibuff, &contents[offset],
4039 content_len - offset);
4040 fmt = xtensa_format_decode (isa, ibuff);
4041 if (fmt == XTENSA_UNDEFINED)
4042 return 0;
4043 insn_len = xtensa_format_length (isa, fmt);
4044 if (insn_len == XTENSA_UNDEFINED)
4045 return 0;
4046 return insn_len;
4047 }
4048
4049
4050 /* Decode the opcode for a single slot instruction.
4051 Return 0 if it fails to decode or the instruction is multi-slot. */
4052
4053 xtensa_opcode
4054 insn_decode_opcode (bfd_byte *contents,
4055 bfd_size_type content_len,
4056 bfd_size_type offset,
4057 int slot)
4058 {
4059 xtensa_isa isa = xtensa_default_isa;
4060 xtensa_format fmt;
4061 static xtensa_insnbuf insnbuf = NULL;
4062 static xtensa_insnbuf slotbuf = NULL;
4063
4064 if (offset + MIN_INSN_LENGTH > content_len)
4065 return XTENSA_UNDEFINED;
4066
4067 if (insnbuf == NULL)
4068 {
4069 insnbuf = xtensa_insnbuf_alloc (isa);
4070 slotbuf = xtensa_insnbuf_alloc (isa);
4071 }
4072
4073 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4074 content_len - offset);
4075 fmt = xtensa_format_decode (isa, insnbuf);
4076 if (fmt == XTENSA_UNDEFINED)
4077 return XTENSA_UNDEFINED;
4078
4079 if (slot >= xtensa_format_num_slots (isa, fmt))
4080 return XTENSA_UNDEFINED;
4081
4082 xtensa_format_get_slot (isa, fmt, slot, insnbuf, slotbuf);
4083 return xtensa_opcode_decode (isa, fmt, slot, slotbuf);
4084 }
4085
4086
4087 /* The offset is the offset in the contents.
4088 The address is the address of that offset. */
4089
4090 static bfd_boolean
4091 check_branch_target_aligned (bfd_byte *contents,
4092 bfd_size_type content_length,
4093 bfd_vma offset,
4094 bfd_vma address)
4095 {
4096 bfd_size_type insn_len = insn_decode_len (contents, content_length, offset);
4097 if (insn_len == 0)
4098 return FALSE;
4099 return check_branch_target_aligned_address (address, insn_len);
4100 }
4101
4102
4103 static bfd_boolean
4104 check_loop_aligned (bfd_byte *contents,
4105 bfd_size_type content_length,
4106 bfd_vma offset,
4107 bfd_vma address)
4108 {
4109 bfd_size_type loop_len, insn_len;
4110 xtensa_opcode opcode;
4111
4112 opcode = insn_decode_opcode (contents, content_length, offset, 0);
4113 if (opcode == XTENSA_UNDEFINED
4114 || xtensa_opcode_is_loop (xtensa_default_isa, opcode) != 1)
4115 {
4116 BFD_ASSERT (FALSE);
4117 return FALSE;
4118 }
4119
4120 loop_len = insn_decode_len (contents, content_length, offset);
4121 insn_len = insn_decode_len (contents, content_length, offset + loop_len);
4122 if (loop_len == 0 || insn_len == 0)
4123 {
4124 BFD_ASSERT (FALSE);
4125 return FALSE;
4126 }
4127
4128 return check_branch_target_aligned_address (address + loop_len, insn_len);
4129 }
4130
4131
4132 static bfd_boolean
4133 check_branch_target_aligned_address (bfd_vma addr, int len)
4134 {
4135 if (len == 8)
4136 return (addr % 8 == 0);
4137 return ((addr >> 2) == ((addr + len - 1) >> 2));
4138 }
4139
4140 \f
4141 /* Instruction widening and narrowing. */
4142
4143 /* When FLIX is available we need to access certain instructions only
4144 when they are 16-bit or 24-bit instructions. This table caches
4145 information about such instructions by walking through all the
4146 opcodes and finding the smallest single-slot format into which each
4147 can be encoded. */
4148
4149 static xtensa_format *op_single_fmt_table = NULL;
4150
4151
4152 static void
4153 init_op_single_format_table (void)
4154 {
4155 xtensa_isa isa = xtensa_default_isa;
4156 xtensa_insnbuf ibuf;
4157 xtensa_opcode opcode;
4158 xtensa_format fmt;
4159 int num_opcodes;
4160
4161 if (op_single_fmt_table)
4162 return;
4163
4164 ibuf = xtensa_insnbuf_alloc (isa);
4165 num_opcodes = xtensa_isa_num_opcodes (isa);
4166
4167 op_single_fmt_table = (xtensa_format *)
4168 bfd_malloc (sizeof (xtensa_format) * num_opcodes);
4169 for (opcode = 0; opcode < num_opcodes; opcode++)
4170 {
4171 op_single_fmt_table[opcode] = XTENSA_UNDEFINED;
4172 for (fmt = 0; fmt < xtensa_isa_num_formats (isa); fmt++)
4173 {
4174 if (xtensa_format_num_slots (isa, fmt) == 1
4175 && xtensa_opcode_encode (isa, fmt, 0, ibuf, opcode) == 0)
4176 {
4177 xtensa_opcode old_fmt = op_single_fmt_table[opcode];
4178 int fmt_length = xtensa_format_length (isa, fmt);
4179 if (old_fmt == XTENSA_UNDEFINED
4180 || fmt_length < xtensa_format_length (isa, old_fmt))
4181 op_single_fmt_table[opcode] = fmt;
4182 }
4183 }
4184 }
4185 xtensa_insnbuf_free (isa, ibuf);
4186 }
4187
4188
4189 static xtensa_format
4190 get_single_format (xtensa_opcode opcode)
4191 {
4192 init_op_single_format_table ();
4193 return op_single_fmt_table[opcode];
4194 }
4195
4196
4197 /* For the set of narrowable instructions we do NOT include the
4198 narrowings beqz -> beqz.n or bnez -> bnez.n because of complexities
4199 involved during linker relaxation that may require these to
4200 re-expand in some conditions. Also, the narrowing "or" -> mov.n
4201 requires special case code to ensure it only works when op1 == op2. */
4202
4203 struct string_pair
4204 {
4205 const char *wide;
4206 const char *narrow;
4207 };
4208
4209 struct string_pair narrowable[] =
4210 {
4211 { "add", "add.n" },
4212 { "addi", "addi.n" },
4213 { "addmi", "addi.n" },
4214 { "l32i", "l32i.n" },
4215 { "movi", "movi.n" },
4216 { "ret", "ret.n" },
4217 { "retw", "retw.n" },
4218 { "s32i", "s32i.n" },
4219 { "or", "mov.n" } /* special case only when op1 == op2 */
4220 };
4221
4222 struct string_pair widenable[] =
4223 {
4224 { "add", "add.n" },
4225 { "addi", "addi.n" },
4226 { "addmi", "addi.n" },
4227 { "beqz", "beqz.n" },
4228 { "bnez", "bnez.n" },
4229 { "l32i", "l32i.n" },
4230 { "movi", "movi.n" },
4231 { "ret", "ret.n" },
4232 { "retw", "retw.n" },
4233 { "s32i", "s32i.n" },
4234 { "or", "mov.n" } /* special case only when op1 == op2 */
4235 };
4236
4237
4238 /* Check if an instruction can be "narrowed", i.e., changed from a standard
4239 3-byte instruction to a 2-byte "density" instruction. If it is valid,
4240 return the instruction buffer holding the narrow instruction. Otherwise,
4241 return 0. The set of valid narrowing are specified by a string table
4242 but require some special case operand checks in some cases. */
4243
4244 static xtensa_insnbuf
4245 can_narrow_instruction (xtensa_insnbuf slotbuf,
4246 xtensa_format fmt,
4247 xtensa_opcode opcode)
4248 {
4249 xtensa_isa isa = xtensa_default_isa;
4250 xtensa_format o_fmt;
4251 unsigned opi;
4252
4253 static xtensa_insnbuf o_insnbuf = NULL;
4254 static xtensa_insnbuf o_slotbuf = NULL;
4255
4256 if (o_insnbuf == NULL)
4257 {
4258 o_insnbuf = xtensa_insnbuf_alloc (isa);
4259 o_slotbuf = xtensa_insnbuf_alloc (isa);
4260 }
4261
4262 for (opi = 0; opi < (sizeof (narrowable)/sizeof (struct string_pair)); opi++)
4263 {
4264 bfd_boolean is_or = (strcmp ("or", narrowable[opi].wide) == 0);
4265
4266 if (opcode == xtensa_opcode_lookup (isa, narrowable[opi].wide))
4267 {
4268 uint32 value, newval;
4269 int i, operand_count, o_operand_count;
4270 xtensa_opcode o_opcode;
4271
4272 /* Address does not matter in this case. We might need to
4273 fix it to handle branches/jumps. */
4274 bfd_vma self_address = 0;
4275
4276 o_opcode = xtensa_opcode_lookup (isa, narrowable[opi].narrow);
4277 if (o_opcode == XTENSA_UNDEFINED)
4278 return 0;
4279 o_fmt = get_single_format (o_opcode);
4280 if (o_fmt == XTENSA_UNDEFINED)
4281 return 0;
4282
4283 if (xtensa_format_length (isa, fmt) != 3
4284 || xtensa_format_length (isa, o_fmt) != 2)
4285 return 0;
4286
4287 xtensa_format_encode (isa, o_fmt, o_insnbuf);
4288 operand_count = xtensa_opcode_num_operands (isa, opcode);
4289 o_operand_count = xtensa_opcode_num_operands (isa, o_opcode);
4290
4291 if (xtensa_opcode_encode (isa, o_fmt, 0, o_slotbuf, o_opcode) != 0)
4292 return 0;
4293
4294 if (!is_or)
4295 {
4296 if (xtensa_opcode_num_operands (isa, o_opcode) != operand_count)
4297 return 0;
4298 }
4299 else
4300 {
4301 uint32 rawval0, rawval1, rawval2;
4302
4303 if (o_operand_count + 1 != operand_count
4304 || xtensa_operand_get_field (isa, opcode, 0,
4305 fmt, 0, slotbuf, &rawval0) != 0
4306 || xtensa_operand_get_field (isa, opcode, 1,
4307 fmt, 0, slotbuf, &rawval1) != 0
4308 || xtensa_operand_get_field (isa, opcode, 2,
4309 fmt, 0, slotbuf, &rawval2) != 0
4310 || rawval1 != rawval2
4311 || rawval0 == rawval1 /* it is a nop */)
4312 return 0;
4313 }
4314
4315 for (i = 0; i < o_operand_count; ++i)
4316 {
4317 if (xtensa_operand_get_field (isa, opcode, i, fmt, 0,
4318 slotbuf, &value)
4319 || xtensa_operand_decode (isa, opcode, i, &value))
4320 return 0;
4321
4322 /* PC-relative branches need adjustment, but
4323 the PC-rel operand will always have a relocation. */
4324 newval = value;
4325 if (xtensa_operand_do_reloc (isa, o_opcode, i, &newval,
4326 self_address)
4327 || xtensa_operand_encode (isa, o_opcode, i, &newval)
4328 || xtensa_operand_set_field (isa, o_opcode, i, o_fmt, 0,
4329 o_slotbuf, newval))
4330 return 0;
4331 }
4332
4333 if (xtensa_format_set_slot (isa, o_fmt, 0, o_insnbuf, o_slotbuf))
4334 return 0;
4335
4336 return o_insnbuf;
4337 }
4338 }
4339 return 0;
4340 }
4341
4342
4343 /* Attempt to narrow an instruction. If the narrowing is valid, perform
4344 the action in-place directly into the contents and return TRUE. Otherwise,
4345 the return value is FALSE and the contents are not modified. */
4346
4347 static bfd_boolean
4348 narrow_instruction (bfd_byte *contents,
4349 bfd_size_type content_length,
4350 bfd_size_type offset)
4351 {
4352 xtensa_opcode opcode;
4353 bfd_size_type insn_len;
4354 xtensa_isa isa = xtensa_default_isa;
4355 xtensa_format fmt;
4356 xtensa_insnbuf o_insnbuf;
4357
4358 static xtensa_insnbuf insnbuf = NULL;
4359 static xtensa_insnbuf slotbuf = NULL;
4360
4361 if (insnbuf == NULL)
4362 {
4363 insnbuf = xtensa_insnbuf_alloc (isa);
4364 slotbuf = xtensa_insnbuf_alloc (isa);
4365 }
4366
4367 BFD_ASSERT (offset < content_length);
4368
4369 if (content_length < 2)
4370 return FALSE;
4371
4372 /* We will hand-code a few of these for a little while.
4373 These have all been specified in the assembler aleady. */
4374 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4375 content_length - offset);
4376 fmt = xtensa_format_decode (isa, insnbuf);
4377 if (xtensa_format_num_slots (isa, fmt) != 1)
4378 return FALSE;
4379
4380 if (xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf) != 0)
4381 return FALSE;
4382
4383 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4384 if (opcode == XTENSA_UNDEFINED)
4385 return FALSE;
4386 insn_len = xtensa_format_length (isa, fmt);
4387 if (insn_len > content_length)
4388 return FALSE;
4389
4390 o_insnbuf = can_narrow_instruction (slotbuf, fmt, opcode);
4391 if (o_insnbuf)
4392 {
4393 xtensa_insnbuf_to_chars (isa, o_insnbuf, contents + offset,
4394 content_length - offset);
4395 return TRUE;
4396 }
4397
4398 return FALSE;
4399 }
4400
4401
4402 /* Check if an instruction can be "widened", i.e., changed from a 2-byte
4403 "density" instruction to a standard 3-byte instruction. If it is valid,
4404 return the instruction buffer holding the wide instruction. Otherwise,
4405 return 0. The set of valid widenings are specified by a string table
4406 but require some special case operand checks in some cases. */
4407
4408 static xtensa_insnbuf
4409 can_widen_instruction (xtensa_insnbuf slotbuf,
4410 xtensa_format fmt,
4411 xtensa_opcode opcode)
4412 {
4413 xtensa_isa isa = xtensa_default_isa;
4414 xtensa_format o_fmt;
4415 unsigned opi;
4416
4417 static xtensa_insnbuf o_insnbuf = NULL;
4418 static xtensa_insnbuf o_slotbuf = NULL;
4419
4420 if (o_insnbuf == NULL)
4421 {
4422 o_insnbuf = xtensa_insnbuf_alloc (isa);
4423 o_slotbuf = xtensa_insnbuf_alloc (isa);
4424 }
4425
4426 for (opi = 0; opi < (sizeof (widenable)/sizeof (struct string_pair)); opi++)
4427 {
4428 bfd_boolean is_or = (strcmp ("or", widenable[opi].wide) == 0);
4429 bfd_boolean is_branch = (strcmp ("beqz", widenable[opi].wide) == 0
4430 || strcmp ("bnez", widenable[opi].wide) == 0);
4431
4432 if (opcode == xtensa_opcode_lookup (isa, widenable[opi].narrow))
4433 {
4434 uint32 value, newval;
4435 int i, operand_count, o_operand_count, check_operand_count;
4436 xtensa_opcode o_opcode;
4437
4438 /* Address does not matter in this case. We might need to fix it
4439 to handle branches/jumps. */
4440 bfd_vma self_address = 0;
4441
4442 o_opcode = xtensa_opcode_lookup (isa, widenable[opi].wide);
4443 if (o_opcode == XTENSA_UNDEFINED)
4444 return 0;
4445 o_fmt = get_single_format (o_opcode);
4446 if (o_fmt == XTENSA_UNDEFINED)
4447 return 0;
4448
4449 if (xtensa_format_length (isa, fmt) != 2
4450 || xtensa_format_length (isa, o_fmt) != 3)
4451 return 0;
4452
4453 xtensa_format_encode (isa, o_fmt, o_insnbuf);
4454 operand_count = xtensa_opcode_num_operands (isa, opcode);
4455 o_operand_count = xtensa_opcode_num_operands (isa, o_opcode);
4456 check_operand_count = o_operand_count;
4457
4458 if (xtensa_opcode_encode (isa, o_fmt, 0, o_slotbuf, o_opcode) != 0)
4459 return 0;
4460
4461 if (!is_or)
4462 {
4463 if (xtensa_opcode_num_operands (isa, o_opcode) != operand_count)
4464 return 0;
4465 }
4466 else
4467 {
4468 uint32 rawval0, rawval1;
4469
4470 if (o_operand_count != operand_count + 1
4471 || xtensa_operand_get_field (isa, opcode, 0,
4472 fmt, 0, slotbuf, &rawval0) != 0
4473 || xtensa_operand_get_field (isa, opcode, 1,
4474 fmt, 0, slotbuf, &rawval1) != 0
4475 || rawval0 == rawval1 /* it is a nop */)
4476 return 0;
4477 }
4478 if (is_branch)
4479 check_operand_count--;
4480
4481 for (i = 0; i < check_operand_count; i++)
4482 {
4483 int new_i = i;
4484 if (is_or && i == o_operand_count - 1)
4485 new_i = i - 1;
4486 if (xtensa_operand_get_field (isa, opcode, new_i, fmt, 0,
4487 slotbuf, &value)
4488 || xtensa_operand_decode (isa, opcode, new_i, &value))
4489 return 0;
4490
4491 /* PC-relative branches need adjustment, but
4492 the PC-rel operand will always have a relocation. */
4493 newval = value;
4494 if (xtensa_operand_do_reloc (isa, o_opcode, i, &newval,
4495 self_address)
4496 || xtensa_operand_encode (isa, o_opcode, i, &newval)
4497 || xtensa_operand_set_field (isa, o_opcode, i, o_fmt, 0,
4498 o_slotbuf, newval))
4499 return 0;
4500 }
4501
4502 if (xtensa_format_set_slot (isa, o_fmt, 0, o_insnbuf, o_slotbuf))
4503 return 0;
4504
4505 return o_insnbuf;
4506 }
4507 }
4508 return 0;
4509 }
4510
4511
4512 /* Attempt to widen an instruction. If the widening is valid, perform
4513 the action in-place directly into the contents and return TRUE. Otherwise,
4514 the return value is FALSE and the contents are not modified. */
4515
4516 static bfd_boolean
4517 widen_instruction (bfd_byte *contents,
4518 bfd_size_type content_length,
4519 bfd_size_type offset)
4520 {
4521 xtensa_opcode opcode;
4522 bfd_size_type insn_len;
4523 xtensa_isa isa = xtensa_default_isa;
4524 xtensa_format fmt;
4525 xtensa_insnbuf o_insnbuf;
4526
4527 static xtensa_insnbuf insnbuf = NULL;
4528 static xtensa_insnbuf slotbuf = NULL;
4529
4530 if (insnbuf == NULL)
4531 {
4532 insnbuf = xtensa_insnbuf_alloc (isa);
4533 slotbuf = xtensa_insnbuf_alloc (isa);
4534 }
4535
4536 BFD_ASSERT (offset < content_length);
4537
4538 if (content_length < 2)
4539 return FALSE;
4540
4541 /* We will hand-code a few of these for a little while.
4542 These have all been specified in the assembler aleady. */
4543 xtensa_insnbuf_from_chars (isa, insnbuf, &contents[offset],
4544 content_length - offset);
4545 fmt = xtensa_format_decode (isa, insnbuf);
4546 if (xtensa_format_num_slots (isa, fmt) != 1)
4547 return FALSE;
4548
4549 if (xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf) != 0)
4550 return FALSE;
4551
4552 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4553 if (opcode == XTENSA_UNDEFINED)
4554 return FALSE;
4555 insn_len = xtensa_format_length (isa, fmt);
4556 if (insn_len > content_length)
4557 return FALSE;
4558
4559 o_insnbuf = can_widen_instruction (slotbuf, fmt, opcode);
4560 if (o_insnbuf)
4561 {
4562 xtensa_insnbuf_to_chars (isa, o_insnbuf, contents + offset,
4563 content_length - offset);
4564 return TRUE;
4565 }
4566 return FALSE;
4567 }
4568
4569 \f
4570 /* Code for transforming CALLs at link-time. */
4571
4572 static bfd_reloc_status_type
4573 elf_xtensa_do_asm_simplify (bfd_byte *contents,
4574 bfd_vma address,
4575 bfd_vma content_length,
4576 char **error_message)
4577 {
4578 static xtensa_insnbuf insnbuf = NULL;
4579 static xtensa_insnbuf slotbuf = NULL;
4580 xtensa_format core_format = XTENSA_UNDEFINED;
4581 xtensa_opcode opcode;
4582 xtensa_opcode direct_call_opcode;
4583 xtensa_isa isa = xtensa_default_isa;
4584 bfd_byte *chbuf = contents + address;
4585 int opn;
4586
4587 if (insnbuf == NULL)
4588 {
4589 insnbuf = xtensa_insnbuf_alloc (isa);
4590 slotbuf = xtensa_insnbuf_alloc (isa);
4591 }
4592
4593 if (content_length < address)
4594 {
4595 *error_message = _("attempt to convert L32R/CALLX to CALL failed");
4596 return bfd_reloc_other;
4597 }
4598
4599 opcode = get_expanded_call_opcode (chbuf, content_length - address, 0);
4600 direct_call_opcode = swap_callx_for_call_opcode (opcode);
4601 if (direct_call_opcode == XTENSA_UNDEFINED)
4602 {
4603 *error_message = _("attempt to convert L32R/CALLX to CALL failed");
4604 return bfd_reloc_other;
4605 }
4606
4607 /* Assemble a NOP ("or a1, a1, a1") into the 0 byte offset. */
4608 core_format = xtensa_format_lookup (isa, "x24");
4609 opcode = xtensa_opcode_lookup (isa, "or");
4610 xtensa_opcode_encode (isa, core_format, 0, slotbuf, opcode);
4611 for (opn = 0; opn < 3; opn++)
4612 {
4613 uint32 regno = 1;
4614 xtensa_operand_encode (isa, opcode, opn, &regno);
4615 xtensa_operand_set_field (isa, opcode, opn, core_format, 0,
4616 slotbuf, regno);
4617 }
4618 xtensa_format_encode (isa, core_format, insnbuf);
4619 xtensa_format_set_slot (isa, core_format, 0, insnbuf, slotbuf);
4620 xtensa_insnbuf_to_chars (isa, insnbuf, chbuf, content_length - address);
4621
4622 /* Assemble a CALL ("callN 0") into the 3 byte offset. */
4623 xtensa_opcode_encode (isa, core_format, 0, slotbuf, direct_call_opcode);
4624 xtensa_operand_set_field (isa, opcode, 0, core_format, 0, slotbuf, 0);
4625
4626 xtensa_format_encode (isa, core_format, insnbuf);
4627 xtensa_format_set_slot (isa, core_format, 0, insnbuf, slotbuf);
4628 xtensa_insnbuf_to_chars (isa, insnbuf, chbuf + 3,
4629 content_length - address - 3);
4630
4631 return bfd_reloc_ok;
4632 }
4633
4634
4635 static bfd_reloc_status_type
4636 contract_asm_expansion (bfd_byte *contents,
4637 bfd_vma content_length,
4638 Elf_Internal_Rela *irel,
4639 char **error_message)
4640 {
4641 bfd_reloc_status_type retval =
4642 elf_xtensa_do_asm_simplify (contents, irel->r_offset, content_length,
4643 error_message);
4644
4645 if (retval != bfd_reloc_ok)
4646 return bfd_reloc_dangerous;
4647
4648 /* Update the irel->r_offset field so that the right immediate and
4649 the right instruction are modified during the relocation. */
4650 irel->r_offset += 3;
4651 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info), R_XTENSA_SLOT0_OP);
4652 return bfd_reloc_ok;
4653 }
4654
4655
4656 static xtensa_opcode
4657 swap_callx_for_call_opcode (xtensa_opcode opcode)
4658 {
4659 init_call_opcodes ();
4660
4661 if (opcode == callx0_op) return call0_op;
4662 if (opcode == callx4_op) return call4_op;
4663 if (opcode == callx8_op) return call8_op;
4664 if (opcode == callx12_op) return call12_op;
4665
4666 /* Return XTENSA_UNDEFINED if the opcode is not an indirect call. */
4667 return XTENSA_UNDEFINED;
4668 }
4669
4670
4671 /* Check if "buf" is pointing to a "L32R aN; CALLX aN" or "CONST16 aN;
4672 CONST16 aN; CALLX aN" sequence, and if so, return the CALLX opcode.
4673 If not, return XTENSA_UNDEFINED. */
4674
4675 #define L32R_TARGET_REG_OPERAND 0
4676 #define CONST16_TARGET_REG_OPERAND 0
4677 #define CALLN_SOURCE_OPERAND 0
4678
4679 static xtensa_opcode
4680 get_expanded_call_opcode (bfd_byte *buf, int bufsize, bfd_boolean *p_uses_l32r)
4681 {
4682 static xtensa_insnbuf insnbuf = NULL;
4683 static xtensa_insnbuf slotbuf = NULL;
4684 xtensa_format fmt;
4685 xtensa_opcode opcode;
4686 xtensa_isa isa = xtensa_default_isa;
4687 uint32 regno, const16_regno, call_regno;
4688 int offset = 0;
4689
4690 if (insnbuf == NULL)
4691 {
4692 insnbuf = xtensa_insnbuf_alloc (isa);
4693 slotbuf = xtensa_insnbuf_alloc (isa);
4694 }
4695
4696 xtensa_insnbuf_from_chars (isa, insnbuf, buf, bufsize);
4697 fmt = xtensa_format_decode (isa, insnbuf);
4698 if (fmt == XTENSA_UNDEFINED
4699 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4700 return XTENSA_UNDEFINED;
4701
4702 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4703 if (opcode == XTENSA_UNDEFINED)
4704 return XTENSA_UNDEFINED;
4705
4706 if (opcode == get_l32r_opcode ())
4707 {
4708 if (p_uses_l32r)
4709 *p_uses_l32r = TRUE;
4710 if (xtensa_operand_get_field (isa, opcode, L32R_TARGET_REG_OPERAND,
4711 fmt, 0, slotbuf, &regno)
4712 || xtensa_operand_decode (isa, opcode, L32R_TARGET_REG_OPERAND,
4713 &regno))
4714 return XTENSA_UNDEFINED;
4715 }
4716 else if (opcode == get_const16_opcode ())
4717 {
4718 if (p_uses_l32r)
4719 *p_uses_l32r = FALSE;
4720 if (xtensa_operand_get_field (isa, opcode, CONST16_TARGET_REG_OPERAND,
4721 fmt, 0, slotbuf, &regno)
4722 || xtensa_operand_decode (isa, opcode, CONST16_TARGET_REG_OPERAND,
4723 &regno))
4724 return XTENSA_UNDEFINED;
4725
4726 /* Check that the next instruction is also CONST16. */
4727 offset += xtensa_format_length (isa, fmt);
4728 xtensa_insnbuf_from_chars (isa, insnbuf, buf + offset, bufsize - offset);
4729 fmt = xtensa_format_decode (isa, insnbuf);
4730 if (fmt == XTENSA_UNDEFINED
4731 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4732 return XTENSA_UNDEFINED;
4733 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4734 if (opcode != get_const16_opcode ())
4735 return XTENSA_UNDEFINED;
4736
4737 if (xtensa_operand_get_field (isa, opcode, CONST16_TARGET_REG_OPERAND,
4738 fmt, 0, slotbuf, &const16_regno)
4739 || xtensa_operand_decode (isa, opcode, CONST16_TARGET_REG_OPERAND,
4740 &const16_regno)
4741 || const16_regno != regno)
4742 return XTENSA_UNDEFINED;
4743 }
4744 else
4745 return XTENSA_UNDEFINED;
4746
4747 /* Next instruction should be an CALLXn with operand 0 == regno. */
4748 offset += xtensa_format_length (isa, fmt);
4749 xtensa_insnbuf_from_chars (isa, insnbuf, buf + offset, bufsize - offset);
4750 fmt = xtensa_format_decode (isa, insnbuf);
4751 if (fmt == XTENSA_UNDEFINED
4752 || xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf))
4753 return XTENSA_UNDEFINED;
4754 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
4755 if (opcode == XTENSA_UNDEFINED
4756 || !is_indirect_call_opcode (opcode))
4757 return XTENSA_UNDEFINED;
4758
4759 if (xtensa_operand_get_field (isa, opcode, CALLN_SOURCE_OPERAND,
4760 fmt, 0, slotbuf, &call_regno)
4761 || xtensa_operand_decode (isa, opcode, CALLN_SOURCE_OPERAND,
4762 &call_regno))
4763 return XTENSA_UNDEFINED;
4764
4765 if (call_regno != regno)
4766 return XTENSA_UNDEFINED;
4767
4768 return opcode;
4769 }
4770
4771 \f
4772 /* Data structures used during relaxation. */
4773
4774 /* r_reloc: relocation values. */
4775
4776 /* Through the relaxation process, we need to keep track of the values
4777 that will result from evaluating relocations. The standard ELF
4778 relocation structure is not sufficient for this purpose because we're
4779 operating on multiple input files at once, so we need to know which
4780 input file a relocation refers to. The r_reloc structure thus
4781 records both the input file (bfd) and ELF relocation.
4782
4783 For efficiency, an r_reloc also contains a "target_offset" field to
4784 cache the target-section-relative offset value that is represented by
4785 the relocation.
4786
4787 The r_reloc also contains a virtual offset that allows multiple
4788 inserted literals to be placed at the same "address" with
4789 different offsets. */
4790
4791 typedef struct r_reloc_struct r_reloc;
4792
4793 struct r_reloc_struct
4794 {
4795 bfd *abfd;
4796 Elf_Internal_Rela rela;
4797 bfd_vma target_offset;
4798 bfd_vma virtual_offset;
4799 };
4800
4801
4802 /* The r_reloc structure is included by value in literal_value, but not
4803 every literal_value has an associated relocation -- some are simple
4804 constants. In such cases, we set all the fields in the r_reloc
4805 struct to zero. The r_reloc_is_const function should be used to
4806 detect this case. */
4807
4808 static bfd_boolean
4809 r_reloc_is_const (const r_reloc *r_rel)
4810 {
4811 return (r_rel->abfd == NULL);
4812 }
4813
4814
4815 static bfd_vma
4816 r_reloc_get_target_offset (const r_reloc *r_rel)
4817 {
4818 bfd_vma target_offset;
4819 unsigned long r_symndx;
4820
4821 BFD_ASSERT (!r_reloc_is_const (r_rel));
4822 r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4823 target_offset = get_elf_r_symndx_offset (r_rel->abfd, r_symndx);
4824 return (target_offset + r_rel->rela.r_addend);
4825 }
4826
4827
4828 static struct elf_link_hash_entry *
4829 r_reloc_get_hash_entry (const r_reloc *r_rel)
4830 {
4831 unsigned long r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4832 return get_elf_r_symndx_hash_entry (r_rel->abfd, r_symndx);
4833 }
4834
4835
4836 static asection *
4837 r_reloc_get_section (const r_reloc *r_rel)
4838 {
4839 unsigned long r_symndx = ELF32_R_SYM (r_rel->rela.r_info);
4840 return get_elf_r_symndx_section (r_rel->abfd, r_symndx);
4841 }
4842
4843
4844 static bfd_boolean
4845 r_reloc_is_defined (const r_reloc *r_rel)
4846 {
4847 asection *sec;
4848 if (r_rel == NULL)
4849 return FALSE;
4850
4851 sec = r_reloc_get_section (r_rel);
4852 if (sec == bfd_abs_section_ptr
4853 || sec == bfd_com_section_ptr
4854 || sec == bfd_und_section_ptr)
4855 return FALSE;
4856 return TRUE;
4857 }
4858
4859
4860 static void
4861 r_reloc_init (r_reloc *r_rel,
4862 bfd *abfd,
4863 Elf_Internal_Rela *irel,
4864 bfd_byte *contents,
4865 bfd_size_type content_length)
4866 {
4867 int r_type;
4868 reloc_howto_type *howto;
4869
4870 if (irel)
4871 {
4872 r_rel->rela = *irel;
4873 r_rel->abfd = abfd;
4874 r_rel->target_offset = r_reloc_get_target_offset (r_rel);
4875 r_rel->virtual_offset = 0;
4876 r_type = ELF32_R_TYPE (r_rel->rela.r_info);
4877 howto = &elf_howto_table[r_type];
4878 if (howto->partial_inplace)
4879 {
4880 bfd_vma inplace_val;
4881 BFD_ASSERT (r_rel->rela.r_offset < content_length);
4882
4883 inplace_val = bfd_get_32 (abfd, &contents[r_rel->rela.r_offset]);
4884 r_rel->target_offset += inplace_val;
4885 }
4886 }
4887 else
4888 memset (r_rel, 0, sizeof (r_reloc));
4889 }
4890
4891
4892 #if DEBUG
4893
4894 static void
4895 print_r_reloc (FILE *fp, const r_reloc *r_rel)
4896 {
4897 if (r_reloc_is_defined (r_rel))
4898 {
4899 asection *sec = r_reloc_get_section (r_rel);
4900 fprintf (fp, " %s(%s + ", sec->owner->filename, sec->name);
4901 }
4902 else if (r_reloc_get_hash_entry (r_rel))
4903 fprintf (fp, " %s + ", r_reloc_get_hash_entry (r_rel)->root.root.string);
4904 else
4905 fprintf (fp, " ?? + ");
4906
4907 fprintf_vma (fp, r_rel->target_offset);
4908 if (r_rel->virtual_offset)
4909 {
4910 fprintf (fp, " + ");
4911 fprintf_vma (fp, r_rel->virtual_offset);
4912 }
4913
4914 fprintf (fp, ")");
4915 }
4916
4917 #endif /* DEBUG */
4918
4919 \f
4920 /* source_reloc: relocations that reference literals. */
4921
4922 /* To determine whether literals can be coalesced, we need to first
4923 record all the relocations that reference the literals. The
4924 source_reloc structure below is used for this purpose. The
4925 source_reloc entries are kept in a per-literal-section array, sorted
4926 by offset within the literal section (i.e., target offset).
4927
4928 The source_sec and r_rel.rela.r_offset fields identify the source of
4929 the relocation. The r_rel field records the relocation value, i.e.,
4930 the offset of the literal being referenced. The opnd field is needed
4931 to determine the range of the immediate field to which the relocation
4932 applies, so we can determine whether another literal with the same
4933 value is within range. The is_null field is true when the relocation
4934 is being removed (e.g., when an L32R is being removed due to a CALLX
4935 that is converted to a direct CALL). */
4936
4937 typedef struct source_reloc_struct source_reloc;
4938
4939 struct source_reloc_struct
4940 {
4941 asection *source_sec;
4942 r_reloc r_rel;
4943 xtensa_opcode opcode;
4944 int opnd;
4945 bfd_boolean is_null;
4946 bfd_boolean is_abs_literal;
4947 };
4948
4949
4950 static void
4951 init_source_reloc (source_reloc *reloc,
4952 asection *source_sec,
4953 const r_reloc *r_rel,
4954 xtensa_opcode opcode,
4955 int opnd,
4956 bfd_boolean is_abs_literal)
4957 {
4958 reloc->source_sec = source_sec;
4959 reloc->r_rel = *r_rel;
4960 reloc->opcode = opcode;
4961 reloc->opnd = opnd;
4962 reloc->is_null = FALSE;
4963 reloc->is_abs_literal = is_abs_literal;
4964 }
4965
4966
4967 /* Find the source_reloc for a particular source offset and relocation
4968 type. Note that the array is sorted by _target_ offset, so this is
4969 just a linear search. */
4970
4971 static source_reloc *
4972 find_source_reloc (source_reloc *src_relocs,
4973 int src_count,
4974 asection *sec,
4975 Elf_Internal_Rela *irel)
4976 {
4977 int i;
4978
4979 for (i = 0; i < src_count; i++)
4980 {
4981 if (src_relocs[i].source_sec == sec
4982 && src_relocs[i].r_rel.rela.r_offset == irel->r_offset
4983 && (ELF32_R_TYPE (src_relocs[i].r_rel.rela.r_info)
4984 == ELF32_R_TYPE (irel->r_info)))
4985 return &src_relocs[i];
4986 }
4987
4988 return NULL;
4989 }
4990
4991
4992 static int
4993 source_reloc_compare (const void *ap, const void *bp)
4994 {
4995 const source_reloc *a = (const source_reloc *) ap;
4996 const source_reloc *b = (const source_reloc *) bp;
4997
4998 if (a->r_rel.target_offset != b->r_rel.target_offset)
4999 return (a->r_rel.target_offset - b->r_rel.target_offset);
5000
5001 /* We don't need to sort on these criteria for correctness,
5002 but enforcing a more strict ordering prevents unstable qsort
5003 from behaving differently with different implementations.
5004 Without the code below we get correct but different results
5005 on Solaris 2.7 and 2.8. We would like to always produce the
5006 same results no matter the host. */
5007
5008 if ((!a->is_null) - (!b->is_null))
5009 return ((!a->is_null) - (!b->is_null));
5010 return internal_reloc_compare (&a->r_rel.rela, &b->r_rel.rela);
5011 }
5012
5013 \f
5014 /* Literal values and value hash tables. */
5015
5016 /* Literals with the same value can be coalesced. The literal_value
5017 structure records the value of a literal: the "r_rel" field holds the
5018 information from the relocation on the literal (if there is one) and
5019 the "value" field holds the contents of the literal word itself.
5020
5021 The value_map structure records a literal value along with the
5022 location of a literal holding that value. The value_map hash table
5023 is indexed by the literal value, so that we can quickly check if a
5024 particular literal value has been seen before and is thus a candidate
5025 for coalescing. */
5026
5027 typedef struct literal_value_struct literal_value;
5028 typedef struct value_map_struct value_map;
5029 typedef struct value_map_hash_table_struct value_map_hash_table;
5030
5031 struct literal_value_struct
5032 {
5033 r_reloc r_rel;
5034 unsigned long value;
5035 bfd_boolean is_abs_literal;
5036 };
5037
5038 struct value_map_struct
5039 {
5040 literal_value val; /* The literal value. */
5041 r_reloc loc; /* Location of the literal. */
5042 value_map *next;
5043 };
5044
5045 struct value_map_hash_table_struct
5046 {
5047 unsigned bucket_count;
5048 value_map **buckets;
5049 unsigned count;
5050 bfd_boolean has_last_loc;
5051 r_reloc last_loc;
5052 };
5053
5054
5055 static void
5056 init_literal_value (literal_value *lit,
5057 const r_reloc *r_rel,
5058 unsigned long value,
5059 bfd_boolean is_abs_literal)
5060 {
5061 lit->r_rel = *r_rel;
5062 lit->value = value;
5063 lit->is_abs_literal = is_abs_literal;
5064 }
5065
5066
5067 static bfd_boolean
5068 literal_value_equal (const literal_value *src1,
5069 const literal_value *src2,
5070 bfd_boolean final_static_link)
5071 {
5072 struct elf_link_hash_entry *h1, *h2;
5073
5074 if (r_reloc_is_const (&src1->r_rel) != r_reloc_is_const (&src2->r_rel))
5075 return FALSE;
5076
5077 if (r_reloc_is_const (&src1->r_rel))
5078 return (src1->value == src2->value);
5079
5080 if (ELF32_R_TYPE (src1->r_rel.rela.r_info)
5081 != ELF32_R_TYPE (src2->r_rel.rela.r_info))
5082 return FALSE;
5083
5084 if (src1->r_rel.target_offset != src2->r_rel.target_offset)
5085 return FALSE;
5086
5087 if (src1->r_rel.virtual_offset != src2->r_rel.virtual_offset)
5088 return FALSE;
5089
5090 if (src1->value != src2->value)
5091 return FALSE;
5092
5093 /* Now check for the same section (if defined) or the same elf_hash
5094 (if undefined or weak). */
5095 h1 = r_reloc_get_hash_entry (&src1->r_rel);
5096 h2 = r_reloc_get_hash_entry (&src2->r_rel);
5097 if (r_reloc_is_defined (&src1->r_rel)
5098 && (final_static_link
5099 || ((!h1 || h1->root.type != bfd_link_hash_defweak)
5100 && (!h2 || h2->root.type != bfd_link_hash_defweak))))
5101 {
5102 if (r_reloc_get_section (&src1->r_rel)
5103 != r_reloc_get_section (&src2->r_rel))
5104 return FALSE;
5105 }
5106 else
5107 {
5108 /* Require that the hash entries (i.e., symbols) be identical. */
5109 if (h1 != h2 || h1 == 0)
5110 return FALSE;
5111 }
5112
5113 if (src1->is_abs_literal != src2->is_abs_literal)
5114 return FALSE;
5115
5116 return TRUE;
5117 }
5118
5119
5120 /* Must be power of 2. */
5121 #define INITIAL_HASH_RELOC_BUCKET_COUNT 1024
5122
5123 static value_map_hash_table *
5124 value_map_hash_table_init (void)
5125 {
5126 value_map_hash_table *values;
5127
5128 values = (value_map_hash_table *)
5129 bfd_zmalloc (sizeof (value_map_hash_table));
5130 values->bucket_count = INITIAL_HASH_RELOC_BUCKET_COUNT;
5131 values->count = 0;
5132 values->buckets = (value_map **)
5133 bfd_zmalloc (sizeof (value_map *) * values->bucket_count);
5134 if (values->buckets == NULL)
5135 {
5136 free (values);
5137 return NULL;
5138 }
5139 values->has_last_loc = FALSE;
5140
5141 return values;
5142 }
5143
5144
5145 static void
5146 value_map_hash_table_delete (value_map_hash_table *table)
5147 {
5148 free (table->buckets);
5149 free (table);
5150 }
5151
5152
5153 static unsigned
5154 hash_bfd_vma (bfd_vma val)
5155 {
5156 return (val >> 2) + (val >> 10);
5157 }
5158
5159
5160 static unsigned
5161 literal_value_hash (const literal_value *src)
5162 {
5163 unsigned hash_val;
5164
5165 hash_val = hash_bfd_vma (src->value);
5166 if (!r_reloc_is_const (&src->r_rel))
5167 {
5168 void *sec_or_hash;
5169
5170 hash_val += hash_bfd_vma (src->is_abs_literal * 1000);
5171 hash_val += hash_bfd_vma (src->r_rel.target_offset);
5172 hash_val += hash_bfd_vma (src->r_rel.virtual_offset);
5173
5174 /* Now check for the same section and the same elf_hash. */
5175 if (r_reloc_is_defined (&src->r_rel))
5176 sec_or_hash = r_reloc_get_section (&src->r_rel);
5177 else
5178 sec_or_hash = r_reloc_get_hash_entry (&src->r_rel);
5179 hash_val += hash_bfd_vma ((bfd_vma) (size_t) sec_or_hash);
5180 }
5181 return hash_val;
5182 }
5183
5184
5185 /* Check if the specified literal_value has been seen before. */
5186
5187 static value_map *
5188 value_map_get_cached_value (value_map_hash_table *map,
5189 const literal_value *val,
5190 bfd_boolean final_static_link)
5191 {
5192 value_map *map_e;
5193 value_map *bucket;
5194 unsigned idx;
5195
5196 idx = literal_value_hash (val);
5197 idx = idx & (map->bucket_count - 1);
5198 bucket = map->buckets[idx];
5199 for (map_e = bucket; map_e; map_e = map_e->next)
5200 {
5201 if (literal_value_equal (&map_e->val, val, final_static_link))
5202 return map_e;
5203 }
5204 return NULL;
5205 }
5206
5207
5208 /* Record a new literal value. It is illegal to call this if VALUE
5209 already has an entry here. */
5210
5211 static value_map *
5212 add_value_map (value_map_hash_table *map,
5213 const literal_value *val,
5214 const r_reloc *loc,
5215 bfd_boolean final_static_link)
5216 {
5217 value_map **bucket_p;
5218 unsigned idx;
5219
5220 value_map *val_e = (value_map *) bfd_zmalloc (sizeof (value_map));
5221 if (val_e == NULL)
5222 {
5223 bfd_set_error (bfd_error_no_memory);
5224 return NULL;
5225 }
5226
5227 BFD_ASSERT (!value_map_get_cached_value (map, val, final_static_link));
5228 val_e->val = *val;
5229 val_e->loc = *loc;
5230
5231 idx = literal_value_hash (val);
5232 idx = idx & (map->bucket_count - 1);
5233 bucket_p = &map->buckets[idx];
5234
5235 val_e->next = *bucket_p;
5236 *bucket_p = val_e;
5237 map->count++;
5238 /* FIXME: Consider resizing the hash table if we get too many entries. */
5239
5240 return val_e;
5241 }
5242
5243 \f
5244 /* Lists of text actions (ta_) for narrowing, widening, longcall
5245 conversion, space fill, code & literal removal, etc. */
5246
5247 /* The following text actions are generated:
5248
5249 "ta_remove_insn" remove an instruction or instructions
5250 "ta_remove_longcall" convert longcall to call
5251 "ta_convert_longcall" convert longcall to nop/call
5252 "ta_narrow_insn" narrow a wide instruction
5253 "ta_widen" widen a narrow instruction
5254 "ta_fill" add fill or remove fill
5255 removed < 0 is a fill; branches to the fill address will be
5256 changed to address + fill size (e.g., address - removed)
5257 removed >= 0 branches to the fill address will stay unchanged
5258 "ta_remove_literal" remove a literal; this action is
5259 indicated when a literal is removed
5260 or replaced.
5261 "ta_add_literal" insert a new literal; this action is
5262 indicated when a literal has been moved.
5263 It may use a virtual_offset because
5264 multiple literals can be placed at the
5265 same location.
5266
5267 For each of these text actions, we also record the number of bytes
5268 removed by performing the text action. In the case of a "ta_widen"
5269 or a "ta_fill" that adds space, the removed_bytes will be negative. */
5270
5271 typedef struct text_action_struct text_action;
5272 typedef struct text_action_list_struct text_action_list;
5273 typedef enum text_action_enum_t text_action_t;
5274
5275 enum text_action_enum_t
5276 {
5277 ta_none,
5278 ta_remove_insn, /* removed = -size */
5279 ta_remove_longcall, /* removed = -size */
5280 ta_convert_longcall, /* removed = 0 */
5281 ta_narrow_insn, /* removed = -1 */
5282 ta_widen_insn, /* removed = +1 */
5283 ta_fill, /* removed = +size */
5284 ta_remove_literal,
5285 ta_add_literal
5286 };
5287
5288
5289 /* Structure for a text action record. */
5290 struct text_action_struct
5291 {
5292 text_action_t action;
5293 asection *sec; /* Optional */
5294 bfd_vma offset;
5295 bfd_vma virtual_offset; /* Zero except for adding literals. */
5296 int removed_bytes;
5297 literal_value value; /* Only valid when adding literals. */
5298 };
5299
5300 struct removal_by_action_entry_struct
5301 {
5302 bfd_vma offset;
5303 int removed;
5304 int eq_removed;
5305 int eq_removed_before_fill;
5306 };
5307 typedef struct removal_by_action_entry_struct removal_by_action_entry;
5308
5309 struct removal_by_action_map_struct
5310 {
5311 unsigned n_entries;
5312 removal_by_action_entry *entry;
5313 };
5314 typedef struct removal_by_action_map_struct removal_by_action_map;
5315
5316
5317 /* List of all of the actions taken on a text section. */
5318 struct text_action_list_struct
5319 {
5320 unsigned count;
5321 splay_tree tree;
5322 removal_by_action_map map;
5323 };
5324
5325
5326 static text_action *
5327 find_fill_action (text_action_list *l, asection *sec, bfd_vma offset)
5328 {
5329 text_action a;
5330
5331 /* It is not necessary to fill at the end of a section. */
5332 if (sec->size == offset)
5333 return NULL;
5334
5335 a.offset = offset;
5336 a.action = ta_fill;
5337
5338 splay_tree_node node = splay_tree_lookup (l->tree, (splay_tree_key)&a);
5339 if (node)
5340 return (text_action *)node->value;
5341 return NULL;
5342 }
5343
5344
5345 static int
5346 compute_removed_action_diff (const text_action *ta,
5347 asection *sec,
5348 bfd_vma offset,
5349 int removed,
5350 int removable_space)
5351 {
5352 int new_removed;
5353 int current_removed = 0;
5354
5355 if (ta)
5356 current_removed = ta->removed_bytes;
5357
5358 BFD_ASSERT (ta == NULL || ta->offset == offset);
5359 BFD_ASSERT (ta == NULL || ta->action == ta_fill);
5360
5361 /* It is not necessary to fill at the end of a section. Clean this up. */
5362 if (sec->size == offset)
5363 new_removed = removable_space - 0;
5364 else
5365 {
5366 int space;
5367 int added = -removed - current_removed;
5368 /* Ignore multiples of the section alignment. */
5369 added = ((1 << sec->alignment_power) - 1) & added;
5370 new_removed = (-added);
5371
5372 /* Modify for removable. */
5373 space = removable_space - new_removed;
5374 new_removed = (removable_space
5375 - (((1 << sec->alignment_power) - 1) & space));
5376 }
5377 return (new_removed - current_removed);
5378 }
5379
5380
5381 static void
5382 adjust_fill_action (text_action *ta, int fill_diff)
5383 {
5384 ta->removed_bytes += fill_diff;
5385 }
5386
5387
5388 static int
5389 text_action_compare (splay_tree_key a, splay_tree_key b)
5390 {
5391 text_action *pa = (text_action *)a;
5392 text_action *pb = (text_action *)b;
5393 static const int action_priority[] =
5394 {
5395 [ta_fill] = 0,
5396 [ta_none] = 1,
5397 [ta_convert_longcall] = 2,
5398 [ta_narrow_insn] = 3,
5399 [ta_remove_insn] = 4,
5400 [ta_remove_longcall] = 5,
5401 [ta_remove_literal] = 6,
5402 [ta_widen_insn] = 7,
5403 [ta_add_literal] = 8,
5404 };
5405
5406 if (pa->offset == pb->offset)
5407 {
5408 if (pa->action == pb->action)
5409 return 0;
5410 return action_priority[pa->action] - action_priority[pb->action];
5411 }
5412 else
5413 return pa->offset < pb->offset ? -1 : 1;
5414 }
5415
5416 static text_action *
5417 action_first (text_action_list *action_list)
5418 {
5419 splay_tree_node node = splay_tree_min (action_list->tree);
5420 return node ? (text_action *)node->value : NULL;
5421 }
5422
5423 static text_action *
5424 action_next (text_action_list *action_list, text_action *action)
5425 {
5426 splay_tree_node node = splay_tree_successor (action_list->tree,
5427 (splay_tree_key)action);
5428 return node ? (text_action *)node->value : NULL;
5429 }
5430
5431 /* Add a modification action to the text. For the case of adding or
5432 removing space, modify any current fill and assume that
5433 "unreachable_space" bytes can be freely contracted. Note that a
5434 negative removed value is a fill. */
5435
5436 static void
5437 text_action_add (text_action_list *l,
5438 text_action_t action,
5439 asection *sec,
5440 bfd_vma offset,
5441 int removed)
5442 {
5443 text_action *ta;
5444 text_action a;
5445
5446 /* It is not necessary to fill at the end of a section. */
5447 if (action == ta_fill && sec->size == offset)
5448 return;
5449
5450 /* It is not necessary to fill 0 bytes. */
5451 if (action == ta_fill && removed == 0)
5452 return;
5453
5454 a.action = action;
5455 a.offset = offset;
5456
5457 if (action == ta_fill)
5458 {
5459 splay_tree_node node = splay_tree_lookup (l->tree, (splay_tree_key)&a);
5460
5461 if (node)
5462 {
5463 ta = (text_action *)node->value;
5464 ta->removed_bytes += removed;
5465 return;
5466 }
5467 }
5468 else
5469 BFD_ASSERT (splay_tree_lookup (l->tree, (splay_tree_key)&a) == NULL);
5470
5471 ta = (text_action *) bfd_zmalloc (sizeof (text_action));
5472 ta->action = action;
5473 ta->sec = sec;
5474 ta->offset = offset;
5475 ta->removed_bytes = removed;
5476 splay_tree_insert (l->tree, (splay_tree_key)ta, (splay_tree_value)ta);
5477 ++l->count;
5478 }
5479
5480
5481 static void
5482 text_action_add_literal (text_action_list *l,
5483 text_action_t action,
5484 const r_reloc *loc,
5485 const literal_value *value,
5486 int removed)
5487 {
5488 text_action *ta;
5489 asection *sec = r_reloc_get_section (loc);
5490 bfd_vma offset = loc->target_offset;
5491 bfd_vma virtual_offset = loc->virtual_offset;
5492
5493 BFD_ASSERT (action == ta_add_literal);
5494
5495 /* Create a new record and fill it up. */
5496 ta = (text_action *) bfd_zmalloc (sizeof (text_action));
5497 ta->action = action;
5498 ta->sec = sec;
5499 ta->offset = offset;
5500 ta->virtual_offset = virtual_offset;
5501 ta->value = *value;
5502 ta->removed_bytes = removed;
5503
5504 BFD_ASSERT (splay_tree_lookup (l->tree, (splay_tree_key)ta) == NULL);
5505 splay_tree_insert (l->tree, (splay_tree_key)ta, (splay_tree_value)ta);
5506 ++l->count;
5507 }
5508
5509
5510 /* Find the total offset adjustment for the relaxations specified by
5511 text_actions, beginning from a particular starting action. This is
5512 typically used from offset_with_removed_text to search an entire list of
5513 actions, but it may also be called directly when adjusting adjacent offsets
5514 so that each search may begin where the previous one left off. */
5515
5516 static int
5517 removed_by_actions (text_action_list *action_list,
5518 text_action **p_start_action,
5519 bfd_vma offset,
5520 bfd_boolean before_fill)
5521 {
5522 text_action *r;
5523 int removed = 0;
5524
5525 r = *p_start_action;
5526 if (r)
5527 {
5528 splay_tree_node node = splay_tree_lookup (action_list->tree,
5529 (splay_tree_key)r);
5530 BFD_ASSERT (node != NULL && r == (text_action *)node->value);
5531 }
5532
5533 while (r)
5534 {
5535 if (r->offset > offset)
5536 break;
5537
5538 if (r->offset == offset
5539 && (before_fill || r->action != ta_fill || r->removed_bytes >= 0))
5540 break;
5541
5542 removed += r->removed_bytes;
5543
5544 r = action_next (action_list, r);
5545 }
5546
5547 *p_start_action = r;
5548 return removed;
5549 }
5550
5551
5552 static bfd_vma
5553 offset_with_removed_text (text_action_list *action_list, bfd_vma offset)
5554 {
5555 text_action *r = action_first (action_list);
5556
5557 return offset - removed_by_actions (action_list, &r, offset, FALSE);
5558 }
5559
5560
5561 static unsigned
5562 action_list_count (text_action_list *action_list)
5563 {
5564 return action_list->count;
5565 }
5566
5567 typedef struct map_action_fn_context_struct map_action_fn_context;
5568 struct map_action_fn_context_struct
5569 {
5570 int removed;
5571 removal_by_action_map map;
5572 bfd_boolean eq_complete;
5573 };
5574
5575 static int
5576 map_action_fn (splay_tree_node node, void *p)
5577 {
5578 map_action_fn_context *ctx = p;
5579 text_action *r = (text_action *)node->value;
5580 removal_by_action_entry *ientry = ctx->map.entry + ctx->map.n_entries;
5581
5582 if (ctx->map.n_entries && (ientry - 1)->offset == r->offset)
5583 {
5584 --ientry;
5585 }
5586 else
5587 {
5588 ++ctx->map.n_entries;
5589 ctx->eq_complete = FALSE;
5590 ientry->offset = r->offset;
5591 ientry->eq_removed_before_fill = ctx->removed;
5592 }
5593
5594 if (!ctx->eq_complete)
5595 {
5596 if (r->action != ta_fill || r->removed_bytes >= 0)
5597 {
5598 ientry->eq_removed = ctx->removed;
5599 ctx->eq_complete = TRUE;
5600 }
5601 else
5602 ientry->eq_removed = ctx->removed + r->removed_bytes;
5603 }
5604
5605 ctx->removed += r->removed_bytes;
5606 ientry->removed = ctx->removed;
5607 return 0;
5608 }
5609
5610 static void
5611 map_removal_by_action (text_action_list *action_list)
5612 {
5613 map_action_fn_context ctx;
5614
5615 ctx.removed = 0;
5616 ctx.map.n_entries = 0;
5617 ctx.map.entry = bfd_malloc (action_list_count (action_list) *
5618 sizeof (removal_by_action_entry));
5619 ctx.eq_complete = FALSE;
5620
5621 splay_tree_foreach (action_list->tree, map_action_fn, &ctx);
5622 action_list->map = ctx.map;
5623 }
5624
5625 static int
5626 removed_by_actions_map (text_action_list *action_list, bfd_vma offset,
5627 bfd_boolean before_fill)
5628 {
5629 unsigned a, b;
5630
5631 if (!action_list->map.entry)
5632 map_removal_by_action (action_list);
5633
5634 if (!action_list->map.n_entries)
5635 return 0;
5636
5637 a = 0;
5638 b = action_list->map.n_entries;
5639
5640 while (b - a > 1)
5641 {
5642 unsigned c = (a + b) / 2;
5643
5644 if (action_list->map.entry[c].offset <= offset)
5645 a = c;
5646 else
5647 b = c;
5648 }
5649
5650 if (action_list->map.entry[a].offset < offset)
5651 {
5652 return action_list->map.entry[a].removed;
5653 }
5654 else if (action_list->map.entry[a].offset == offset)
5655 {
5656 return before_fill ?
5657 action_list->map.entry[a].eq_removed_before_fill :
5658 action_list->map.entry[a].eq_removed;
5659 }
5660 else
5661 {
5662 return 0;
5663 }
5664 }
5665
5666 static bfd_vma
5667 offset_with_removed_text_map (text_action_list *action_list, bfd_vma offset)
5668 {
5669 int removed = removed_by_actions_map (action_list, offset, FALSE);
5670 return offset - removed;
5671 }
5672
5673
5674 /* The find_insn_action routine will only find non-fill actions. */
5675
5676 static text_action *
5677 find_insn_action (text_action_list *action_list, bfd_vma offset)
5678 {
5679 static const text_action_t action[] =
5680 {
5681 ta_convert_longcall,
5682 ta_remove_longcall,
5683 ta_widen_insn,
5684 ta_narrow_insn,
5685 ta_remove_insn,
5686 };
5687 text_action a;
5688 unsigned i;
5689
5690 a.offset = offset;
5691 for (i = 0; i < sizeof (action) / sizeof (*action); ++i)
5692 {
5693 splay_tree_node node;
5694
5695 a.action = action[i];
5696 node = splay_tree_lookup (action_list->tree, (splay_tree_key)&a);
5697 if (node)
5698 return (text_action *)node->value;
5699 }
5700 return NULL;
5701 }
5702
5703
5704 #if DEBUG
5705
5706 static void
5707 print_action (FILE *fp, text_action *r)
5708 {
5709 const char *t = "unknown";
5710 switch (r->action)
5711 {
5712 case ta_remove_insn:
5713 t = "remove_insn"; break;
5714 case ta_remove_longcall:
5715 t = "remove_longcall"; break;
5716 case ta_convert_longcall:
5717 t = "convert_longcall"; break;
5718 case ta_narrow_insn:
5719 t = "narrow_insn"; break;
5720 case ta_widen_insn:
5721 t = "widen_insn"; break;
5722 case ta_fill:
5723 t = "fill"; break;
5724 case ta_none:
5725 t = "none"; break;
5726 case ta_remove_literal:
5727 t = "remove_literal"; break;
5728 case ta_add_literal:
5729 t = "add_literal"; break;
5730 }
5731
5732 fprintf (fp, "%s: %s[0x%lx] \"%s\" %d\n",
5733 r->sec->owner->filename,
5734 r->sec->name, (unsigned long) r->offset, t, r->removed_bytes);
5735 }
5736
5737 static int
5738 print_action_list_fn (splay_tree_node node, void *p)
5739 {
5740 text_action *r = (text_action *)node->value;
5741
5742 print_action (p, r);
5743 return 0;
5744 }
5745
5746 static void
5747 print_action_list (FILE *fp, text_action_list *action_list)
5748 {
5749 fprintf (fp, "Text Action\n");
5750 splay_tree_foreach (action_list->tree, print_action_list_fn, fp);
5751 }
5752
5753 #endif /* DEBUG */
5754
5755 \f
5756 /* Lists of literals being coalesced or removed. */
5757
5758 /* In the usual case, the literal identified by "from" is being
5759 coalesced with another literal identified by "to". If the literal is
5760 unused and is being removed altogether, "to.abfd" will be NULL.
5761 The removed_literal entries are kept on a per-section list, sorted
5762 by the "from" offset field. */
5763
5764 typedef struct removed_literal_struct removed_literal;
5765 typedef struct removed_literal_map_entry_struct removed_literal_map_entry;
5766 typedef struct removed_literal_list_struct removed_literal_list;
5767
5768 struct removed_literal_struct
5769 {
5770 r_reloc from;
5771 r_reloc to;
5772 removed_literal *next;
5773 };
5774
5775 struct removed_literal_map_entry_struct
5776 {
5777 bfd_vma addr;
5778 removed_literal *literal;
5779 };
5780
5781 struct removed_literal_list_struct
5782 {
5783 removed_literal *head;
5784 removed_literal *tail;
5785
5786 unsigned n_map;
5787 removed_literal_map_entry *map;
5788 };
5789
5790
5791 /* Record that the literal at "from" is being removed. If "to" is not
5792 NULL, the "from" literal is being coalesced with the "to" literal. */
5793
5794 static void
5795 add_removed_literal (removed_literal_list *removed_list,
5796 const r_reloc *from,
5797 const r_reloc *to)
5798 {
5799 removed_literal *r, *new_r, *next_r;
5800
5801 new_r = (removed_literal *) bfd_zmalloc (sizeof (removed_literal));
5802
5803 new_r->from = *from;
5804 if (to)
5805 new_r->to = *to;
5806 else
5807 new_r->to.abfd = NULL;
5808 new_r->next = NULL;
5809
5810 r = removed_list->head;
5811 if (r == NULL)
5812 {
5813 removed_list->head = new_r;
5814 removed_list->tail = new_r;
5815 }
5816 /* Special check for common case of append. */
5817 else if (removed_list->tail->from.target_offset < from->target_offset)
5818 {
5819 removed_list->tail->next = new_r;
5820 removed_list->tail = new_r;
5821 }
5822 else
5823 {
5824 while (r->from.target_offset < from->target_offset && r->next)
5825 {
5826 r = r->next;
5827 }
5828 next_r = r->next;
5829 r->next = new_r;
5830 new_r->next = next_r;
5831 if (next_r == NULL)
5832 removed_list->tail = new_r;
5833 }
5834 }
5835
5836 static void
5837 map_removed_literal (removed_literal_list *removed_list)
5838 {
5839 unsigned n_map = 0;
5840 unsigned i;
5841 removed_literal_map_entry *map = NULL;
5842 removed_literal *r = removed_list->head;
5843
5844 for (i = 0; r; ++i, r = r->next)
5845 {
5846 if (i == n_map)
5847 {
5848 n_map = (n_map * 2) + 2;
5849 map = bfd_realloc (map, n_map * sizeof (*map));
5850 }
5851 map[i].addr = r->from.target_offset;
5852 map[i].literal = r;
5853 }
5854 removed_list->map = map;
5855 removed_list->n_map = i;
5856 }
5857
5858 static int
5859 removed_literal_compare (const void *a, const void *b)
5860 {
5861 const removed_literal_map_entry *pa = a;
5862 const removed_literal_map_entry *pb = b;
5863
5864 if (pa->addr == pb->addr)
5865 return 0;
5866 else
5867 return pa->addr < pb->addr ? -1 : 1;
5868 }
5869
5870 /* Check if the list of removed literals contains an entry for the
5871 given address. Return the entry if found. */
5872
5873 static removed_literal *
5874 find_removed_literal (removed_literal_list *removed_list, bfd_vma addr)
5875 {
5876 removed_literal_map_entry *p;
5877 removed_literal *r = NULL;
5878
5879 if (removed_list->map == NULL)
5880 map_removed_literal (removed_list);
5881
5882 p = bsearch (&addr, removed_list->map, removed_list->n_map,
5883 sizeof (*removed_list->map), removed_literal_compare);
5884 if (p)
5885 {
5886 while (p != removed_list->map && (p - 1)->addr == addr)
5887 --p;
5888 r = p->literal;
5889 }
5890 return r;
5891 }
5892
5893
5894 #if DEBUG
5895
5896 static void
5897 print_removed_literals (FILE *fp, removed_literal_list *removed_list)
5898 {
5899 removed_literal *r;
5900 r = removed_list->head;
5901 if (r)
5902 fprintf (fp, "Removed Literals\n");
5903 for (; r != NULL; r = r->next)
5904 {
5905 print_r_reloc (fp, &r->from);
5906 fprintf (fp, " => ");
5907 if (r->to.abfd == NULL)
5908 fprintf (fp, "REMOVED");
5909 else
5910 print_r_reloc (fp, &r->to);
5911 fprintf (fp, "\n");
5912 }
5913 }
5914
5915 #endif /* DEBUG */
5916
5917 \f
5918 /* Per-section data for relaxation. */
5919
5920 typedef struct reloc_bfd_fix_struct reloc_bfd_fix;
5921
5922 struct xtensa_relax_info_struct
5923 {
5924 bfd_boolean is_relaxable_literal_section;
5925 bfd_boolean is_relaxable_asm_section;
5926 int visited; /* Number of times visited. */
5927
5928 source_reloc *src_relocs; /* Array[src_count]. */
5929 int src_count;
5930 int src_next; /* Next src_relocs entry to assign. */
5931
5932 removed_literal_list removed_list;
5933 text_action_list action_list;
5934
5935 reloc_bfd_fix *fix_list;
5936 reloc_bfd_fix *fix_array;
5937 unsigned fix_array_count;
5938
5939 /* Support for expanding the reloc array that is stored
5940 in the section structure. If the relocations have been
5941 reallocated, the newly allocated relocations will be referenced
5942 here along with the actual size allocated. The relocation
5943 count will always be found in the section structure. */
5944 Elf_Internal_Rela *allocated_relocs;
5945 unsigned relocs_count;
5946 unsigned allocated_relocs_count;
5947 };
5948
5949 struct elf_xtensa_section_data
5950 {
5951 struct bfd_elf_section_data elf;
5952 xtensa_relax_info relax_info;
5953 };
5954
5955
5956 static bfd_boolean
5957 elf_xtensa_new_section_hook (bfd *abfd, asection *sec)
5958 {
5959 if (!sec->used_by_bfd)
5960 {
5961 struct elf_xtensa_section_data *sdata;
5962 bfd_size_type amt = sizeof (*sdata);
5963
5964 sdata = bfd_zalloc (abfd, amt);
5965 if (sdata == NULL)
5966 return FALSE;
5967 sec->used_by_bfd = sdata;
5968 }
5969
5970 return _bfd_elf_new_section_hook (abfd, sec);
5971 }
5972
5973
5974 static xtensa_relax_info *
5975 get_xtensa_relax_info (asection *sec)
5976 {
5977 struct elf_xtensa_section_data *section_data;
5978
5979 /* No info available if no section or if it is an output section. */
5980 if (!sec || sec == sec->output_section)
5981 return NULL;
5982
5983 section_data = (struct elf_xtensa_section_data *) elf_section_data (sec);
5984 return &section_data->relax_info;
5985 }
5986
5987
5988 static void
5989 init_xtensa_relax_info (asection *sec)
5990 {
5991 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
5992
5993 relax_info->is_relaxable_literal_section = FALSE;
5994 relax_info->is_relaxable_asm_section = FALSE;
5995 relax_info->visited = 0;
5996
5997 relax_info->src_relocs = NULL;
5998 relax_info->src_count = 0;
5999 relax_info->src_next = 0;
6000
6001 relax_info->removed_list.head = NULL;
6002 relax_info->removed_list.tail = NULL;
6003
6004 relax_info->action_list.tree = splay_tree_new (text_action_compare,
6005 NULL, NULL);
6006 relax_info->action_list.map.n_entries = 0;
6007 relax_info->action_list.map.entry = NULL;
6008
6009 relax_info->fix_list = NULL;
6010 relax_info->fix_array = NULL;
6011 relax_info->fix_array_count = 0;
6012
6013 relax_info->allocated_relocs = NULL;
6014 relax_info->relocs_count = 0;
6015 relax_info->allocated_relocs_count = 0;
6016 }
6017
6018 \f
6019 /* Coalescing literals may require a relocation to refer to a section in
6020 a different input file, but the standard relocation information
6021 cannot express that. Instead, the reloc_bfd_fix structures are used
6022 to "fix" the relocations that refer to sections in other input files.
6023 These structures are kept on per-section lists. The "src_type" field
6024 records the relocation type in case there are multiple relocations on
6025 the same location. FIXME: This is ugly; an alternative might be to
6026 add new symbols with the "owner" field to some other input file. */
6027
6028 struct reloc_bfd_fix_struct
6029 {
6030 asection *src_sec;
6031 bfd_vma src_offset;
6032 unsigned src_type; /* Relocation type. */
6033
6034 asection *target_sec;
6035 bfd_vma target_offset;
6036 bfd_boolean translated;
6037
6038 reloc_bfd_fix *next;
6039 };
6040
6041
6042 static reloc_bfd_fix *
6043 reloc_bfd_fix_init (asection *src_sec,
6044 bfd_vma src_offset,
6045 unsigned src_type,
6046 asection *target_sec,
6047 bfd_vma target_offset,
6048 bfd_boolean translated)
6049 {
6050 reloc_bfd_fix *fix;
6051
6052 fix = (reloc_bfd_fix *) bfd_malloc (sizeof (reloc_bfd_fix));
6053 fix->src_sec = src_sec;
6054 fix->src_offset = src_offset;
6055 fix->src_type = src_type;
6056 fix->target_sec = target_sec;
6057 fix->target_offset = target_offset;
6058 fix->translated = translated;
6059
6060 return fix;
6061 }
6062
6063
6064 static void
6065 add_fix (asection *src_sec, reloc_bfd_fix *fix)
6066 {
6067 xtensa_relax_info *relax_info;
6068
6069 relax_info = get_xtensa_relax_info (src_sec);
6070 fix->next = relax_info->fix_list;
6071 relax_info->fix_list = fix;
6072 }
6073
6074
6075 static int
6076 fix_compare (const void *ap, const void *bp)
6077 {
6078 const reloc_bfd_fix *a = (const reloc_bfd_fix *) ap;
6079 const reloc_bfd_fix *b = (const reloc_bfd_fix *) bp;
6080
6081 if (a->src_offset != b->src_offset)
6082 return (a->src_offset - b->src_offset);
6083 return (a->src_type - b->src_type);
6084 }
6085
6086
6087 static void
6088 cache_fix_array (asection *sec)
6089 {
6090 unsigned i, count = 0;
6091 reloc_bfd_fix *r;
6092 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
6093
6094 if (relax_info == NULL)
6095 return;
6096 if (relax_info->fix_list == NULL)
6097 return;
6098
6099 for (r = relax_info->fix_list; r != NULL; r = r->next)
6100 count++;
6101
6102 relax_info->fix_array =
6103 (reloc_bfd_fix *) bfd_malloc (sizeof (reloc_bfd_fix) * count);
6104 relax_info->fix_array_count = count;
6105
6106 r = relax_info->fix_list;
6107 for (i = 0; i < count; i++, r = r->next)
6108 {
6109 relax_info->fix_array[count - 1 - i] = *r;
6110 relax_info->fix_array[count - 1 - i].next = NULL;
6111 }
6112
6113 qsort (relax_info->fix_array, relax_info->fix_array_count,
6114 sizeof (reloc_bfd_fix), fix_compare);
6115 }
6116
6117
6118 static reloc_bfd_fix *
6119 get_bfd_fix (asection *sec, bfd_vma offset, unsigned type)
6120 {
6121 xtensa_relax_info *relax_info = get_xtensa_relax_info (sec);
6122 reloc_bfd_fix *rv;
6123 reloc_bfd_fix key;
6124
6125 if (relax_info == NULL)
6126 return NULL;
6127 if (relax_info->fix_list == NULL)
6128 return NULL;
6129
6130 if (relax_info->fix_array == NULL)
6131 cache_fix_array (sec);
6132
6133 key.src_offset = offset;
6134 key.src_type = type;
6135 rv = bsearch (&key, relax_info->fix_array, relax_info->fix_array_count,
6136 sizeof (reloc_bfd_fix), fix_compare);
6137 return rv;
6138 }
6139
6140 \f
6141 /* Section caching. */
6142
6143 typedef struct section_cache_struct section_cache_t;
6144
6145 struct section_cache_struct
6146 {
6147 asection *sec;
6148
6149 bfd_byte *contents; /* Cache of the section contents. */
6150 bfd_size_type content_length;
6151
6152 property_table_entry *ptbl; /* Cache of the section property table. */
6153 unsigned pte_count;
6154
6155 Elf_Internal_Rela *relocs; /* Cache of the section relocations. */
6156 unsigned reloc_count;
6157 };
6158
6159
6160 static void
6161 init_section_cache (section_cache_t *sec_cache)
6162 {
6163 memset (sec_cache, 0, sizeof (*sec_cache));
6164 }
6165
6166
6167 static void
6168 free_section_cache (section_cache_t *sec_cache)
6169 {
6170 if (sec_cache->sec)
6171 {
6172 release_contents (sec_cache->sec, sec_cache->contents);
6173 release_internal_relocs (sec_cache->sec, sec_cache->relocs);
6174 if (sec_cache->ptbl)
6175 free (sec_cache->ptbl);
6176 }
6177 }
6178
6179
6180 static bfd_boolean
6181 section_cache_section (section_cache_t *sec_cache,
6182 asection *sec,
6183 struct bfd_link_info *link_info)
6184 {
6185 bfd *abfd;
6186 property_table_entry *prop_table = NULL;
6187 int ptblsize = 0;
6188 bfd_byte *contents = NULL;
6189 Elf_Internal_Rela *internal_relocs = NULL;
6190 bfd_size_type sec_size;
6191
6192 if (sec == NULL)
6193 return FALSE;
6194 if (sec == sec_cache->sec)
6195 return TRUE;
6196
6197 abfd = sec->owner;
6198 sec_size = bfd_get_section_limit (abfd, sec);
6199
6200 /* Get the contents. */
6201 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
6202 if (contents == NULL && sec_size != 0)
6203 goto err;
6204
6205 /* Get the relocations. */
6206 internal_relocs = retrieve_internal_relocs (abfd, sec,
6207 link_info->keep_memory);
6208
6209 /* Get the entry table. */
6210 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
6211 XTENSA_PROP_SEC_NAME, FALSE);
6212 if (ptblsize < 0)
6213 goto err;
6214
6215 /* Fill in the new section cache. */
6216 free_section_cache (sec_cache);
6217 init_section_cache (sec_cache);
6218
6219 sec_cache->sec = sec;
6220 sec_cache->contents = contents;
6221 sec_cache->content_length = sec_size;
6222 sec_cache->relocs = internal_relocs;
6223 sec_cache->reloc_count = sec->reloc_count;
6224 sec_cache->pte_count = ptblsize;
6225 sec_cache->ptbl = prop_table;
6226
6227 return TRUE;
6228
6229 err:
6230 release_contents (sec, contents);
6231 release_internal_relocs (sec, internal_relocs);
6232 if (prop_table)
6233 free (prop_table);
6234 return FALSE;
6235 }
6236
6237 \f
6238 /* Extended basic blocks. */
6239
6240 /* An ebb_struct represents an Extended Basic Block. Within this
6241 range, we guarantee that all instructions are decodable, the
6242 property table entries are contiguous, and no property table
6243 specifies a segment that cannot have instructions moved. This
6244 structure contains caches of the contents, property table and
6245 relocations for the specified section for easy use. The range is
6246 specified by ranges of indices for the byte offset, property table
6247 offsets and relocation offsets. These must be consistent. */
6248
6249 typedef struct ebb_struct ebb_t;
6250
6251 struct ebb_struct
6252 {
6253 asection *sec;
6254
6255 bfd_byte *contents; /* Cache of the section contents. */
6256 bfd_size_type content_length;
6257
6258 property_table_entry *ptbl; /* Cache of the section property table. */
6259 unsigned pte_count;
6260
6261 Elf_Internal_Rela *relocs; /* Cache of the section relocations. */
6262 unsigned reloc_count;
6263
6264 bfd_vma start_offset; /* Offset in section. */
6265 unsigned start_ptbl_idx; /* Offset in the property table. */
6266 unsigned start_reloc_idx; /* Offset in the relocations. */
6267
6268 bfd_vma end_offset;
6269 unsigned end_ptbl_idx;
6270 unsigned end_reloc_idx;
6271
6272 bfd_boolean ends_section; /* Is this the last ebb in a section? */
6273
6274 /* The unreachable property table at the end of this set of blocks;
6275 NULL if the end is not an unreachable block. */
6276 property_table_entry *ends_unreachable;
6277 };
6278
6279
6280 enum ebb_target_enum
6281 {
6282 EBB_NO_ALIGN = 0,
6283 EBB_DESIRE_TGT_ALIGN,
6284 EBB_REQUIRE_TGT_ALIGN,
6285 EBB_REQUIRE_LOOP_ALIGN,
6286 EBB_REQUIRE_ALIGN
6287 };
6288
6289
6290 /* proposed_action_struct is similar to the text_action_struct except
6291 that is represents a potential transformation, not one that will
6292 occur. We build a list of these for an extended basic block
6293 and use them to compute the actual actions desired. We must be
6294 careful that the entire set of actual actions we perform do not
6295 break any relocations that would fit if the actions were not
6296 performed. */
6297
6298 typedef struct proposed_action_struct proposed_action;
6299
6300 struct proposed_action_struct
6301 {
6302 enum ebb_target_enum align_type; /* for the target alignment */
6303 bfd_vma alignment_pow;
6304 text_action_t action;
6305 bfd_vma offset;
6306 int removed_bytes;
6307 bfd_boolean do_action; /* If false, then we will not perform the action. */
6308 };
6309
6310
6311 /* The ebb_constraint_struct keeps a set of proposed actions for an
6312 extended basic block. */
6313
6314 typedef struct ebb_constraint_struct ebb_constraint;
6315
6316 struct ebb_constraint_struct
6317 {
6318 ebb_t ebb;
6319 bfd_boolean start_movable;
6320
6321 /* Bytes of extra space at the beginning if movable. */
6322 int start_extra_space;
6323
6324 enum ebb_target_enum start_align;
6325
6326 bfd_boolean end_movable;
6327
6328 /* Bytes of extra space at the end if movable. */
6329 int end_extra_space;
6330
6331 unsigned action_count;
6332 unsigned action_allocated;
6333
6334 /* Array of proposed actions. */
6335 proposed_action *actions;
6336
6337 /* Action alignments -- one for each proposed action. */
6338 enum ebb_target_enum *action_aligns;
6339 };
6340
6341
6342 static void
6343 init_ebb_constraint (ebb_constraint *c)
6344 {
6345 memset (c, 0, sizeof (ebb_constraint));
6346 }
6347
6348
6349 static void
6350 free_ebb_constraint (ebb_constraint *c)
6351 {
6352 if (c->actions)
6353 free (c->actions);
6354 }
6355
6356
6357 static void
6358 init_ebb (ebb_t *ebb,
6359 asection *sec,
6360 bfd_byte *contents,
6361 bfd_size_type content_length,
6362 property_table_entry *prop_table,
6363 unsigned ptblsize,
6364 Elf_Internal_Rela *internal_relocs,
6365 unsigned reloc_count)
6366 {
6367 memset (ebb, 0, sizeof (ebb_t));
6368 ebb->sec = sec;
6369 ebb->contents = contents;
6370 ebb->content_length = content_length;
6371 ebb->ptbl = prop_table;
6372 ebb->pte_count = ptblsize;
6373 ebb->relocs = internal_relocs;
6374 ebb->reloc_count = reloc_count;
6375 ebb->start_offset = 0;
6376 ebb->end_offset = ebb->content_length - 1;
6377 ebb->start_ptbl_idx = 0;
6378 ebb->end_ptbl_idx = ptblsize;
6379 ebb->start_reloc_idx = 0;
6380 ebb->end_reloc_idx = reloc_count;
6381 }
6382
6383
6384 /* Extend the ebb to all decodable contiguous sections. The algorithm
6385 for building a basic block around an instruction is to push it
6386 forward until we hit the end of a section, an unreachable block or
6387 a block that cannot be transformed. Then we push it backwards
6388 searching for similar conditions. */
6389
6390 static bfd_boolean extend_ebb_bounds_forward (ebb_t *);
6391 static bfd_boolean extend_ebb_bounds_backward (ebb_t *);
6392 static bfd_size_type insn_block_decodable_len
6393 (bfd_byte *, bfd_size_type, bfd_vma, bfd_size_type);
6394
6395 static bfd_boolean
6396 extend_ebb_bounds (ebb_t *ebb)
6397 {
6398 if (!extend_ebb_bounds_forward (ebb))
6399 return FALSE;
6400 if (!extend_ebb_bounds_backward (ebb))
6401 return FALSE;
6402 return TRUE;
6403 }
6404
6405
6406 static bfd_boolean
6407 extend_ebb_bounds_forward (ebb_t *ebb)
6408 {
6409 property_table_entry *the_entry, *new_entry;
6410
6411 the_entry = &ebb->ptbl[ebb->end_ptbl_idx];
6412
6413 /* Stop when (1) we cannot decode an instruction, (2) we are at
6414 the end of the property tables, (3) we hit a non-contiguous property
6415 table entry, (4) we hit a NO_TRANSFORM region. */
6416
6417 while (1)
6418 {
6419 bfd_vma entry_end;
6420 bfd_size_type insn_block_len;
6421
6422 entry_end = the_entry->address - ebb->sec->vma + the_entry->size;
6423 insn_block_len =
6424 insn_block_decodable_len (ebb->contents, ebb->content_length,
6425 ebb->end_offset,
6426 entry_end - ebb->end_offset);
6427 if (insn_block_len != (entry_end - ebb->end_offset))
6428 {
6429 _bfd_error_handler
6430 /* xgettext:c-format */
6431 (_("%pB(%pA+%#" PRIx64 "): could not decode instruction; "
6432 "possible configuration mismatch"),
6433 ebb->sec->owner, ebb->sec,
6434 (uint64_t) (ebb->end_offset + insn_block_len));
6435 return FALSE;
6436 }
6437 ebb->end_offset += insn_block_len;
6438
6439 if (ebb->end_offset == ebb->sec->size)
6440 ebb->ends_section = TRUE;
6441
6442 /* Update the reloc counter. */
6443 while (ebb->end_reloc_idx + 1 < ebb->reloc_count
6444 && (ebb->relocs[ebb->end_reloc_idx + 1].r_offset
6445 < ebb->end_offset))
6446 {
6447 ebb->end_reloc_idx++;
6448 }
6449
6450 if (ebb->end_ptbl_idx + 1 == ebb->pte_count)
6451 return TRUE;
6452
6453 new_entry = &ebb->ptbl[ebb->end_ptbl_idx + 1];
6454 if (((new_entry->flags & XTENSA_PROP_INSN) == 0)
6455 || ((new_entry->flags & XTENSA_PROP_NO_TRANSFORM) != 0)
6456 || ((the_entry->flags & XTENSA_PROP_ALIGN) != 0))
6457 break;
6458
6459 if (the_entry->address + the_entry->size != new_entry->address)
6460 break;
6461
6462 the_entry = new_entry;
6463 ebb->end_ptbl_idx++;
6464 }
6465
6466 /* Quick check for an unreachable or end of file just at the end. */
6467 if (ebb->end_ptbl_idx + 1 == ebb->pte_count)
6468 {
6469 if (ebb->end_offset == ebb->content_length)
6470 ebb->ends_section = TRUE;
6471 }
6472 else
6473 {
6474 new_entry = &ebb->ptbl[ebb->end_ptbl_idx + 1];
6475 if ((new_entry->flags & XTENSA_PROP_UNREACHABLE) != 0
6476 && the_entry->address + the_entry->size == new_entry->address)
6477 ebb->ends_unreachable = new_entry;
6478 }
6479
6480 /* Any other ending requires exact alignment. */
6481 return TRUE;
6482 }
6483
6484
6485 static bfd_boolean
6486 extend_ebb_bounds_backward (ebb_t *ebb)
6487 {
6488 property_table_entry *the_entry, *new_entry;
6489
6490 the_entry = &ebb->ptbl[ebb->start_ptbl_idx];
6491
6492 /* Stop when (1) we cannot decode the instructions in the current entry.
6493 (2) we are at the beginning of the property tables, (3) we hit a
6494 non-contiguous property table entry, (4) we hit a NO_TRANSFORM region. */
6495
6496 while (1)
6497 {
6498 bfd_vma block_begin;
6499 bfd_size_type insn_block_len;
6500
6501 block_begin = the_entry->address - ebb->sec->vma;
6502 insn_block_len =
6503 insn_block_decodable_len (ebb->contents, ebb->content_length,
6504 block_begin,
6505 ebb->start_offset - block_begin);
6506 if (insn_block_len != ebb->start_offset - block_begin)
6507 {
6508 _bfd_error_handler
6509 /* xgettext:c-format */
6510 (_("%pB(%pA+%#" PRIx64 "): could not decode instruction; "
6511 "possible configuration mismatch"),
6512 ebb->sec->owner, ebb->sec,
6513 (uint64_t) (ebb->end_offset + insn_block_len));
6514 return FALSE;
6515 }
6516 ebb->start_offset -= insn_block_len;
6517
6518 /* Update the reloc counter. */
6519 while (ebb->start_reloc_idx > 0
6520 && (ebb->relocs[ebb->start_reloc_idx - 1].r_offset
6521 >= ebb->start_offset))
6522 {
6523 ebb->start_reloc_idx--;
6524 }
6525
6526 if (ebb->start_ptbl_idx == 0)
6527 return TRUE;
6528
6529 new_entry = &ebb->ptbl[ebb->start_ptbl_idx - 1];
6530 if ((new_entry->flags & XTENSA_PROP_INSN) == 0
6531 || ((new_entry->flags & XTENSA_PROP_NO_TRANSFORM) != 0)
6532 || ((new_entry->flags & XTENSA_PROP_ALIGN) != 0))
6533 return TRUE;
6534 if (new_entry->address + new_entry->size != the_entry->address)
6535 return TRUE;
6536
6537 the_entry = new_entry;
6538 ebb->start_ptbl_idx--;
6539 }
6540 return TRUE;
6541 }
6542
6543
6544 static bfd_size_type
6545 insn_block_decodable_len (bfd_byte *contents,
6546 bfd_size_type content_len,
6547 bfd_vma block_offset,
6548 bfd_size_type block_len)
6549 {
6550 bfd_vma offset = block_offset;
6551
6552 while (offset < block_offset + block_len)
6553 {
6554 bfd_size_type insn_len = 0;
6555
6556 insn_len = insn_decode_len (contents, content_len, offset);
6557 if (insn_len == 0)
6558 return (offset - block_offset);
6559 offset += insn_len;
6560 }
6561 return (offset - block_offset);
6562 }
6563
6564
6565 static void
6566 ebb_propose_action (ebb_constraint *c,
6567 enum ebb_target_enum align_type,
6568 bfd_vma alignment_pow,
6569 text_action_t action,
6570 bfd_vma offset,
6571 int removed_bytes,
6572 bfd_boolean do_action)
6573 {
6574 proposed_action *act;
6575
6576 if (c->action_allocated <= c->action_count)
6577 {
6578 unsigned new_allocated, i;
6579 proposed_action *new_actions;
6580
6581 new_allocated = (c->action_count + 2) * 2;
6582 new_actions = (proposed_action *)
6583 bfd_zmalloc (sizeof (proposed_action) * new_allocated);
6584
6585 for (i = 0; i < c->action_count; i++)
6586 new_actions[i] = c->actions[i];
6587 if (c->actions)
6588 free (c->actions);
6589 c->actions = new_actions;
6590 c->action_allocated = new_allocated;
6591 }
6592
6593 act = &c->actions[c->action_count];
6594 act->align_type = align_type;
6595 act->alignment_pow = alignment_pow;
6596 act->action = action;
6597 act->offset = offset;
6598 act->removed_bytes = removed_bytes;
6599 act->do_action = do_action;
6600
6601 c->action_count++;
6602 }
6603
6604 \f
6605 /* Access to internal relocations, section contents and symbols. */
6606
6607 /* During relaxation, we need to modify relocations, section contents,
6608 and symbol definitions, and we need to keep the original values from
6609 being reloaded from the input files, i.e., we need to "pin" the
6610 modified values in memory. We also want to continue to observe the
6611 setting of the "keep-memory" flag. The following functions wrap the
6612 standard BFD functions to take care of this for us. */
6613
6614 static Elf_Internal_Rela *
6615 retrieve_internal_relocs (bfd *abfd, asection *sec, bfd_boolean keep_memory)
6616 {
6617 Elf_Internal_Rela *internal_relocs;
6618
6619 if ((sec->flags & SEC_LINKER_CREATED) != 0)
6620 return NULL;
6621
6622 internal_relocs = elf_section_data (sec)->relocs;
6623 if (internal_relocs == NULL)
6624 internal_relocs = (_bfd_elf_link_read_relocs
6625 (abfd, sec, NULL, NULL, keep_memory));
6626 return internal_relocs;
6627 }
6628
6629
6630 static void
6631 pin_internal_relocs (asection *sec, Elf_Internal_Rela *internal_relocs)
6632 {
6633 elf_section_data (sec)->relocs = internal_relocs;
6634 }
6635
6636
6637 static void
6638 release_internal_relocs (asection *sec, Elf_Internal_Rela *internal_relocs)
6639 {
6640 if (internal_relocs
6641 && elf_section_data (sec)->relocs != internal_relocs)
6642 free (internal_relocs);
6643 }
6644
6645
6646 static bfd_byte *
6647 retrieve_contents (bfd *abfd, asection *sec, bfd_boolean keep_memory)
6648 {
6649 bfd_byte *contents;
6650 bfd_size_type sec_size;
6651
6652 sec_size = bfd_get_section_limit (abfd, sec);
6653 contents = elf_section_data (sec)->this_hdr.contents;
6654
6655 if (contents == NULL && sec_size != 0)
6656 {
6657 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
6658 {
6659 if (contents)
6660 free (contents);
6661 return NULL;
6662 }
6663 if (keep_memory)
6664 elf_section_data (sec)->this_hdr.contents = contents;
6665 }
6666 return contents;
6667 }
6668
6669
6670 static void
6671 pin_contents (asection *sec, bfd_byte *contents)
6672 {
6673 elf_section_data (sec)->this_hdr.contents = contents;
6674 }
6675
6676
6677 static void
6678 release_contents (asection *sec, bfd_byte *contents)
6679 {
6680 if (contents && elf_section_data (sec)->this_hdr.contents != contents)
6681 free (contents);
6682 }
6683
6684
6685 static Elf_Internal_Sym *
6686 retrieve_local_syms (bfd *input_bfd)
6687 {
6688 Elf_Internal_Shdr *symtab_hdr;
6689 Elf_Internal_Sym *isymbuf;
6690 size_t locsymcount;
6691
6692 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6693 locsymcount = symtab_hdr->sh_info;
6694
6695 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6696 if (isymbuf == NULL && locsymcount != 0)
6697 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
6698 NULL, NULL, NULL);
6699
6700 /* Save the symbols for this input file so they won't be read again. */
6701 if (isymbuf && isymbuf != (Elf_Internal_Sym *) symtab_hdr->contents)
6702 symtab_hdr->contents = (unsigned char *) isymbuf;
6703
6704 return isymbuf;
6705 }
6706
6707 \f
6708 /* Code for link-time relaxation. */
6709
6710 /* Initialization for relaxation: */
6711 static bfd_boolean analyze_relocations (struct bfd_link_info *);
6712 static bfd_boolean find_relaxable_sections
6713 (bfd *, asection *, struct bfd_link_info *, bfd_boolean *);
6714 static bfd_boolean collect_source_relocs
6715 (bfd *, asection *, struct bfd_link_info *);
6716 static bfd_boolean is_resolvable_asm_expansion
6717 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *, struct bfd_link_info *,
6718 bfd_boolean *);
6719 static Elf_Internal_Rela *find_associated_l32r_irel
6720 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Rela *);
6721 static bfd_boolean compute_text_actions
6722 (bfd *, asection *, struct bfd_link_info *);
6723 static bfd_boolean compute_ebb_proposed_actions (ebb_constraint *);
6724 static bfd_boolean compute_ebb_actions (ebb_constraint *);
6725 typedef struct reloc_range_list_struct reloc_range_list;
6726 static bfd_boolean check_section_ebb_pcrels_fit
6727 (bfd *, asection *, bfd_byte *, Elf_Internal_Rela *,
6728 reloc_range_list *, const ebb_constraint *,
6729 const xtensa_opcode *);
6730 static bfd_boolean check_section_ebb_reduces (const ebb_constraint *);
6731 static void text_action_add_proposed
6732 (text_action_list *, const ebb_constraint *, asection *);
6733 static int compute_fill_extra_space (property_table_entry *);
6734
6735 /* First pass: */
6736 static bfd_boolean compute_removed_literals
6737 (bfd *, asection *, struct bfd_link_info *, value_map_hash_table *);
6738 static Elf_Internal_Rela *get_irel_at_offset
6739 (asection *, Elf_Internal_Rela *, bfd_vma);
6740 static bfd_boolean is_removable_literal
6741 (const source_reloc *, int, const source_reloc *, int, asection *,
6742 property_table_entry *, int);
6743 static bfd_boolean remove_dead_literal
6744 (bfd *, asection *, struct bfd_link_info *, Elf_Internal_Rela *,
6745 Elf_Internal_Rela *, source_reloc *, property_table_entry *, int);
6746 static bfd_boolean identify_literal_placement
6747 (bfd *, asection *, bfd_byte *, struct bfd_link_info *,
6748 value_map_hash_table *, bfd_boolean *, Elf_Internal_Rela *, int,
6749 source_reloc *, property_table_entry *, int, section_cache_t *,
6750 bfd_boolean);
6751 static bfd_boolean relocations_reach (source_reloc *, int, const r_reloc *);
6752 static bfd_boolean coalesce_shared_literal
6753 (asection *, source_reloc *, property_table_entry *, int, value_map *);
6754 static bfd_boolean move_shared_literal
6755 (asection *, struct bfd_link_info *, source_reloc *, property_table_entry *,
6756 int, const r_reloc *, const literal_value *, section_cache_t *);
6757
6758 /* Second pass: */
6759 static bfd_boolean relax_section (bfd *, asection *, struct bfd_link_info *);
6760 static bfd_boolean translate_section_fixes (asection *);
6761 static bfd_boolean translate_reloc_bfd_fix (reloc_bfd_fix *);
6762 static asection *translate_reloc (const r_reloc *, r_reloc *, asection *);
6763 static void shrink_dynamic_reloc_sections
6764 (struct bfd_link_info *, bfd *, asection *, Elf_Internal_Rela *);
6765 static bfd_boolean move_literal
6766 (bfd *, struct bfd_link_info *, asection *, bfd_vma, bfd_byte *,
6767 xtensa_relax_info *, Elf_Internal_Rela **, const literal_value *);
6768 static bfd_boolean relax_property_section
6769 (bfd *, asection *, struct bfd_link_info *);
6770
6771 /* Third pass: */
6772 static bfd_boolean relax_section_symbols (bfd *, asection *);
6773
6774
6775 static bfd_boolean
6776 elf_xtensa_relax_section (bfd *abfd,
6777 asection *sec,
6778 struct bfd_link_info *link_info,
6779 bfd_boolean *again)
6780 {
6781 static value_map_hash_table *values = NULL;
6782 static bfd_boolean relocations_analyzed = FALSE;
6783 xtensa_relax_info *relax_info;
6784
6785 if (!relocations_analyzed)
6786 {
6787 /* Do some overall initialization for relaxation. */
6788 values = value_map_hash_table_init ();
6789 if (values == NULL)
6790 return FALSE;
6791 relaxing_section = TRUE;
6792 if (!analyze_relocations (link_info))
6793 return FALSE;
6794 relocations_analyzed = TRUE;
6795 }
6796 *again = FALSE;
6797
6798 /* Don't mess with linker-created sections. */
6799 if ((sec->flags & SEC_LINKER_CREATED) != 0)
6800 return TRUE;
6801
6802 relax_info = get_xtensa_relax_info (sec);
6803 BFD_ASSERT (relax_info != NULL);
6804
6805 switch (relax_info->visited)
6806 {
6807 case 0:
6808 /* Note: It would be nice to fold this pass into
6809 analyze_relocations, but it is important for this step that the
6810 sections be examined in link order. */
6811 if (!compute_removed_literals (abfd, sec, link_info, values))
6812 return FALSE;
6813 *again = TRUE;
6814 break;
6815
6816 case 1:
6817 if (values)
6818 value_map_hash_table_delete (values);
6819 values = NULL;
6820 if (!relax_section (abfd, sec, link_info))
6821 return FALSE;
6822 *again = TRUE;
6823 break;
6824
6825 case 2:
6826 if (!relax_section_symbols (abfd, sec))
6827 return FALSE;
6828 break;
6829 }
6830
6831 relax_info->visited++;
6832 return TRUE;
6833 }
6834
6835 \f
6836 /* Initialization for relaxation. */
6837
6838 /* This function is called once at the start of relaxation. It scans
6839 all the input sections and marks the ones that are relaxable (i.e.,
6840 literal sections with L32R relocations against them), and then
6841 collects source_reloc information for all the relocations against
6842 those relaxable sections. During this process, it also detects
6843 longcalls, i.e., calls relaxed by the assembler into indirect
6844 calls, that can be optimized back into direct calls. Within each
6845 extended basic block (ebb) containing an optimized longcall, it
6846 computes a set of "text actions" that can be performed to remove
6847 the L32R associated with the longcall while optionally preserving
6848 branch target alignments. */
6849
6850 static bfd_boolean
6851 analyze_relocations (struct bfd_link_info *link_info)
6852 {
6853 bfd *abfd;
6854 asection *sec;
6855 bfd_boolean is_relaxable = FALSE;
6856
6857 /* Initialize the per-section relaxation info. */
6858 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link.next)
6859 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6860 {
6861 init_xtensa_relax_info (sec);
6862 }
6863
6864 /* Mark relaxable sections (and count relocations against each one). */
6865 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link.next)
6866 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6867 {
6868 if (!find_relaxable_sections (abfd, sec, link_info, &is_relaxable))
6869 return FALSE;
6870 }
6871
6872 /* Bail out if there are no relaxable sections. */
6873 if (!is_relaxable)
6874 return TRUE;
6875
6876 /* Allocate space for source_relocs. */
6877 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link.next)
6878 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6879 {
6880 xtensa_relax_info *relax_info;
6881
6882 relax_info = get_xtensa_relax_info (sec);
6883 if (relax_info->is_relaxable_literal_section
6884 || relax_info->is_relaxable_asm_section)
6885 {
6886 relax_info->src_relocs = (source_reloc *)
6887 bfd_malloc (relax_info->src_count * sizeof (source_reloc));
6888 }
6889 else
6890 relax_info->src_count = 0;
6891 }
6892
6893 /* Collect info on relocations against each relaxable section. */
6894 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link.next)
6895 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6896 {
6897 if (!collect_source_relocs (abfd, sec, link_info))
6898 return FALSE;
6899 }
6900
6901 /* Compute the text actions. */
6902 for (abfd = link_info->input_bfds; abfd != NULL; abfd = abfd->link.next)
6903 for (sec = abfd->sections; sec != NULL; sec = sec->next)
6904 {
6905 if (!compute_text_actions (abfd, sec, link_info))
6906 return FALSE;
6907 }
6908
6909 return TRUE;
6910 }
6911
6912
6913 /* Find all the sections that might be relaxed. The motivation for
6914 this pass is that collect_source_relocs() needs to record _all_ the
6915 relocations that target each relaxable section. That is expensive
6916 and unnecessary unless the target section is actually going to be
6917 relaxed. This pass identifies all such sections by checking if
6918 they have L32Rs pointing to them. In the process, the total number
6919 of relocations targeting each section is also counted so that we
6920 know how much space to allocate for source_relocs against each
6921 relaxable literal section. */
6922
6923 static bfd_boolean
6924 find_relaxable_sections (bfd *abfd,
6925 asection *sec,
6926 struct bfd_link_info *link_info,
6927 bfd_boolean *is_relaxable_p)
6928 {
6929 Elf_Internal_Rela *internal_relocs;
6930 bfd_byte *contents;
6931 bfd_boolean ok = TRUE;
6932 unsigned i;
6933 xtensa_relax_info *source_relax_info;
6934 bfd_boolean is_l32r_reloc;
6935
6936 internal_relocs = retrieve_internal_relocs (abfd, sec,
6937 link_info->keep_memory);
6938 if (internal_relocs == NULL)
6939 return ok;
6940
6941 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
6942 if (contents == NULL && sec->size != 0)
6943 {
6944 ok = FALSE;
6945 goto error_return;
6946 }
6947
6948 source_relax_info = get_xtensa_relax_info (sec);
6949 for (i = 0; i < sec->reloc_count; i++)
6950 {
6951 Elf_Internal_Rela *irel = &internal_relocs[i];
6952 r_reloc r_rel;
6953 asection *target_sec;
6954 xtensa_relax_info *target_relax_info;
6955
6956 /* If this section has not already been marked as "relaxable", and
6957 if it contains any ASM_EXPAND relocations (marking expanded
6958 longcalls) that can be optimized into direct calls, then mark
6959 the section as "relaxable". */
6960 if (source_relax_info
6961 && !source_relax_info->is_relaxable_asm_section
6962 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_ASM_EXPAND)
6963 {
6964 bfd_boolean is_reachable = FALSE;
6965 if (is_resolvable_asm_expansion (abfd, sec, contents, irel,
6966 link_info, &is_reachable)
6967 && is_reachable)
6968 {
6969 source_relax_info->is_relaxable_asm_section = TRUE;
6970 *is_relaxable_p = TRUE;
6971 }
6972 }
6973
6974 r_reloc_init (&r_rel, abfd, irel, contents,
6975 bfd_get_section_limit (abfd, sec));
6976
6977 target_sec = r_reloc_get_section (&r_rel);
6978 target_relax_info = get_xtensa_relax_info (target_sec);
6979 if (!target_relax_info)
6980 continue;
6981
6982 /* Count PC-relative operand relocations against the target section.
6983 Note: The conditions tested here must match the conditions under
6984 which init_source_reloc is called in collect_source_relocs(). */
6985 is_l32r_reloc = FALSE;
6986 if (is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
6987 {
6988 xtensa_opcode opcode =
6989 get_relocation_opcode (abfd, sec, contents, irel);
6990 if (opcode != XTENSA_UNDEFINED)
6991 {
6992 is_l32r_reloc = (opcode == get_l32r_opcode ());
6993 if (!is_alt_relocation (ELF32_R_TYPE (irel->r_info))
6994 || is_l32r_reloc)
6995 target_relax_info->src_count++;
6996 }
6997 }
6998
6999 if (is_l32r_reloc && r_reloc_is_defined (&r_rel))
7000 {
7001 /* Mark the target section as relaxable. */
7002 target_relax_info->is_relaxable_literal_section = TRUE;
7003 *is_relaxable_p = TRUE;
7004 }
7005 }
7006
7007 error_return:
7008 release_contents (sec, contents);
7009 release_internal_relocs (sec, internal_relocs);
7010 return ok;
7011 }
7012
7013
7014 /* Record _all_ the relocations that point to relaxable sections, and
7015 get rid of ASM_EXPAND relocs by either converting them to
7016 ASM_SIMPLIFY or by removing them. */
7017
7018 static bfd_boolean
7019 collect_source_relocs (bfd *abfd,
7020 asection *sec,
7021 struct bfd_link_info *link_info)
7022 {
7023 Elf_Internal_Rela *internal_relocs;
7024 bfd_byte *contents;
7025 bfd_boolean ok = TRUE;
7026 unsigned i;
7027 bfd_size_type sec_size;
7028
7029 internal_relocs = retrieve_internal_relocs (abfd, sec,
7030 link_info->keep_memory);
7031 if (internal_relocs == NULL)
7032 return ok;
7033
7034 sec_size = bfd_get_section_limit (abfd, sec);
7035 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
7036 if (contents == NULL && sec_size != 0)
7037 {
7038 ok = FALSE;
7039 goto error_return;
7040 }
7041
7042 /* Record relocations against relaxable literal sections. */
7043 for (i = 0; i < sec->reloc_count; i++)
7044 {
7045 Elf_Internal_Rela *irel = &internal_relocs[i];
7046 r_reloc r_rel;
7047 asection *target_sec;
7048 xtensa_relax_info *target_relax_info;
7049
7050 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
7051
7052 target_sec = r_reloc_get_section (&r_rel);
7053 target_relax_info = get_xtensa_relax_info (target_sec);
7054
7055 if (target_relax_info
7056 && (target_relax_info->is_relaxable_literal_section
7057 || target_relax_info->is_relaxable_asm_section))
7058 {
7059 xtensa_opcode opcode = XTENSA_UNDEFINED;
7060 int opnd = -1;
7061 bfd_boolean is_abs_literal = FALSE;
7062
7063 if (is_alt_relocation (ELF32_R_TYPE (irel->r_info)))
7064 {
7065 /* None of the current alternate relocs are PC-relative,
7066 and only PC-relative relocs matter here. However, we
7067 still need to record the opcode for literal
7068 coalescing. */
7069 opcode = get_relocation_opcode (abfd, sec, contents, irel);
7070 if (opcode == get_l32r_opcode ())
7071 {
7072 is_abs_literal = TRUE;
7073 opnd = 1;
7074 }
7075 else
7076 opcode = XTENSA_UNDEFINED;
7077 }
7078 else if (is_operand_relocation (ELF32_R_TYPE (irel->r_info)))
7079 {
7080 opcode = get_relocation_opcode (abfd, sec, contents, irel);
7081 opnd = get_relocation_opnd (opcode, ELF32_R_TYPE (irel->r_info));
7082 }
7083
7084 if (opcode != XTENSA_UNDEFINED)
7085 {
7086 int src_next = target_relax_info->src_next++;
7087 source_reloc *s_reloc = &target_relax_info->src_relocs[src_next];
7088
7089 init_source_reloc (s_reloc, sec, &r_rel, opcode, opnd,
7090 is_abs_literal);
7091 }
7092 }
7093 }
7094
7095 /* Now get rid of ASM_EXPAND relocations. At this point, the
7096 src_relocs array for the target literal section may still be
7097 incomplete, but it must at least contain the entries for the L32R
7098 relocations associated with ASM_EXPANDs because they were just
7099 added in the preceding loop over the relocations. */
7100
7101 for (i = 0; i < sec->reloc_count; i++)
7102 {
7103 Elf_Internal_Rela *irel = &internal_relocs[i];
7104 bfd_boolean is_reachable;
7105
7106 if (!is_resolvable_asm_expansion (abfd, sec, contents, irel, link_info,
7107 &is_reachable))
7108 continue;
7109
7110 if (is_reachable)
7111 {
7112 Elf_Internal_Rela *l32r_irel;
7113 r_reloc r_rel;
7114 asection *target_sec;
7115 xtensa_relax_info *target_relax_info;
7116
7117 /* Mark the source_reloc for the L32R so that it will be
7118 removed in compute_removed_literals(), along with the
7119 associated literal. */
7120 l32r_irel = find_associated_l32r_irel (abfd, sec, contents,
7121 irel, internal_relocs);
7122 if (l32r_irel == NULL)
7123 continue;
7124
7125 r_reloc_init (&r_rel, abfd, l32r_irel, contents, sec_size);
7126
7127 target_sec = r_reloc_get_section (&r_rel);
7128 target_relax_info = get_xtensa_relax_info (target_sec);
7129
7130 if (target_relax_info
7131 && (target_relax_info->is_relaxable_literal_section
7132 || target_relax_info->is_relaxable_asm_section))
7133 {
7134 source_reloc *s_reloc;
7135
7136 /* Search the source_relocs for the entry corresponding to
7137 the l32r_irel. Note: The src_relocs array is not yet
7138 sorted, but it wouldn't matter anyway because we're
7139 searching by source offset instead of target offset. */
7140 s_reloc = find_source_reloc (target_relax_info->src_relocs,
7141 target_relax_info->src_next,
7142 sec, l32r_irel);
7143 BFD_ASSERT (s_reloc);
7144 s_reloc->is_null = TRUE;
7145 }
7146
7147 /* Convert this reloc to ASM_SIMPLIFY. */
7148 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7149 R_XTENSA_ASM_SIMPLIFY);
7150 l32r_irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
7151
7152 pin_internal_relocs (sec, internal_relocs);
7153 }
7154 else
7155 {
7156 /* It is resolvable but doesn't reach. We resolve now
7157 by eliminating the relocation -- the call will remain
7158 expanded into L32R/CALLX. */
7159 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
7160 pin_internal_relocs (sec, internal_relocs);
7161 }
7162 }
7163
7164 error_return:
7165 release_contents (sec, contents);
7166 release_internal_relocs (sec, internal_relocs);
7167 return ok;
7168 }
7169
7170
7171 /* Return TRUE if the asm expansion can be resolved. Generally it can
7172 be resolved on a final link or when a partial link locates it in the
7173 same section as the target. Set "is_reachable" flag if the target of
7174 the call is within the range of a direct call, given the current VMA
7175 for this section and the target section. */
7176
7177 bfd_boolean
7178 is_resolvable_asm_expansion (bfd *abfd,
7179 asection *sec,
7180 bfd_byte *contents,
7181 Elf_Internal_Rela *irel,
7182 struct bfd_link_info *link_info,
7183 bfd_boolean *is_reachable_p)
7184 {
7185 asection *target_sec;
7186 bfd_vma target_offset;
7187 r_reloc r_rel;
7188 xtensa_opcode opcode, direct_call_opcode;
7189 bfd_vma self_address;
7190 bfd_vma dest_address;
7191 bfd_boolean uses_l32r;
7192 bfd_size_type sec_size;
7193
7194 *is_reachable_p = FALSE;
7195
7196 if (contents == NULL)
7197 return FALSE;
7198
7199 if (ELF32_R_TYPE (irel->r_info) != R_XTENSA_ASM_EXPAND)
7200 return FALSE;
7201
7202 sec_size = bfd_get_section_limit (abfd, sec);
7203 opcode = get_expanded_call_opcode (contents + irel->r_offset,
7204 sec_size - irel->r_offset, &uses_l32r);
7205 /* Optimization of longcalls that use CONST16 is not yet implemented. */
7206 if (!uses_l32r)
7207 return FALSE;
7208
7209 direct_call_opcode = swap_callx_for_call_opcode (opcode);
7210 if (direct_call_opcode == XTENSA_UNDEFINED)
7211 return FALSE;
7212
7213 /* Check and see that the target resolves. */
7214 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
7215 if (!r_reloc_is_defined (&r_rel))
7216 return FALSE;
7217
7218 target_sec = r_reloc_get_section (&r_rel);
7219 target_offset = r_rel.target_offset;
7220
7221 /* If the target is in a shared library, then it doesn't reach. This
7222 isn't supposed to come up because the compiler should never generate
7223 non-PIC calls on systems that use shared libraries, but the linker
7224 shouldn't crash regardless. */
7225 if (!target_sec->output_section)
7226 return FALSE;
7227
7228 /* For relocatable sections, we can only simplify when the output
7229 section of the target is the same as the output section of the
7230 source. */
7231 if (bfd_link_relocatable (link_info)
7232 && (target_sec->output_section != sec->output_section
7233 || is_reloc_sym_weak (abfd, irel)))
7234 return FALSE;
7235
7236 if (target_sec->output_section != sec->output_section)
7237 {
7238 /* If the two sections are sufficiently far away that relaxation
7239 might take the call out of range, we can't simplify. For
7240 example, a positive displacement call into another memory
7241 could get moved to a lower address due to literal removal,
7242 but the destination won't move, and so the displacment might
7243 get larger.
7244
7245 If the displacement is negative, assume the destination could
7246 move as far back as the start of the output section. The
7247 self_address will be at least as far into the output section
7248 as it is prior to relaxation.
7249
7250 If the displacement is postive, assume the destination will be in
7251 it's pre-relaxed location (because relaxation only makes sections
7252 smaller). The self_address could go all the way to the beginning
7253 of the output section. */
7254
7255 dest_address = target_sec->output_section->vma;
7256 self_address = sec->output_section->vma;
7257
7258 if (sec->output_section->vma > target_sec->output_section->vma)
7259 self_address += sec->output_offset + irel->r_offset + 3;
7260 else
7261 dest_address += bfd_get_section_limit (abfd, target_sec->output_section);
7262 /* Call targets should be four-byte aligned. */
7263 dest_address = (dest_address + 3) & ~3;
7264 }
7265 else
7266 {
7267
7268 self_address = (sec->output_section->vma
7269 + sec->output_offset + irel->r_offset + 3);
7270 dest_address = (target_sec->output_section->vma
7271 + target_sec->output_offset + target_offset);
7272 }
7273
7274 *is_reachable_p = pcrel_reloc_fits (direct_call_opcode, 0,
7275 self_address, dest_address);
7276
7277 if ((self_address >> CALL_SEGMENT_BITS) !=
7278 (dest_address >> CALL_SEGMENT_BITS))
7279 return FALSE;
7280
7281 return TRUE;
7282 }
7283
7284
7285 static Elf_Internal_Rela *
7286 find_associated_l32r_irel (bfd *abfd,
7287 asection *sec,
7288 bfd_byte *contents,
7289 Elf_Internal_Rela *other_irel,
7290 Elf_Internal_Rela *internal_relocs)
7291 {
7292 unsigned i;
7293
7294 for (i = 0; i < sec->reloc_count; i++)
7295 {
7296 Elf_Internal_Rela *irel = &internal_relocs[i];
7297
7298 if (irel == other_irel)
7299 continue;
7300 if (irel->r_offset != other_irel->r_offset)
7301 continue;
7302 if (is_l32r_relocation (abfd, sec, contents, irel))
7303 return irel;
7304 }
7305
7306 return NULL;
7307 }
7308
7309
7310 static xtensa_opcode *
7311 build_reloc_opcodes (bfd *abfd,
7312 asection *sec,
7313 bfd_byte *contents,
7314 Elf_Internal_Rela *internal_relocs)
7315 {
7316 unsigned i;
7317 xtensa_opcode *reloc_opcodes =
7318 (xtensa_opcode *) bfd_malloc (sizeof (xtensa_opcode) * sec->reloc_count);
7319 for (i = 0; i < sec->reloc_count; i++)
7320 {
7321 Elf_Internal_Rela *irel = &internal_relocs[i];
7322 reloc_opcodes[i] = get_relocation_opcode (abfd, sec, contents, irel);
7323 }
7324 return reloc_opcodes;
7325 }
7326
7327 struct reloc_range_struct
7328 {
7329 bfd_vma addr;
7330 bfd_boolean add; /* TRUE if start of a range, FALSE otherwise. */
7331 /* Original irel index in the array of relocations for a section. */
7332 unsigned irel_index;
7333 };
7334 typedef struct reloc_range_struct reloc_range;
7335
7336 typedef struct reloc_range_list_entry_struct reloc_range_list_entry;
7337 struct reloc_range_list_entry_struct
7338 {
7339 reloc_range_list_entry *next;
7340 reloc_range_list_entry *prev;
7341 Elf_Internal_Rela *irel;
7342 xtensa_opcode opcode;
7343 int opnum;
7344 };
7345
7346 struct reloc_range_list_struct
7347 {
7348 /* The rest of the structure is only meaningful when ok is TRUE. */
7349 bfd_boolean ok;
7350
7351 unsigned n_range; /* Number of range markers. */
7352 reloc_range *range; /* Sorted range markers. */
7353
7354 unsigned first; /* Index of a first range element in the list. */
7355 unsigned last; /* One past index of a last range element in the list. */
7356
7357 unsigned n_list; /* Number of list elements. */
7358 reloc_range_list_entry *reloc; /* */
7359 reloc_range_list_entry list_root;
7360 };
7361
7362 static int
7363 reloc_range_compare (const void *a, const void *b)
7364 {
7365 const reloc_range *ra = a;
7366 const reloc_range *rb = b;
7367
7368 if (ra->addr != rb->addr)
7369 return ra->addr < rb->addr ? -1 : 1;
7370 if (ra->add != rb->add)
7371 return ra->add ? -1 : 1;
7372 return 0;
7373 }
7374
7375 static void
7376 build_reloc_ranges (bfd *abfd, asection *sec,
7377 bfd_byte *contents,
7378 Elf_Internal_Rela *internal_relocs,
7379 xtensa_opcode *reloc_opcodes,
7380 reloc_range_list *list)
7381 {
7382 unsigned i;
7383 size_t n = 0;
7384 size_t max_n = 0;
7385 reloc_range *ranges = NULL;
7386 reloc_range_list_entry *reloc =
7387 bfd_malloc (sec->reloc_count * sizeof (*reloc));
7388
7389 memset (list, 0, sizeof (*list));
7390 list->ok = TRUE;
7391
7392 for (i = 0; i < sec->reloc_count; i++)
7393 {
7394 Elf_Internal_Rela *irel = &internal_relocs[i];
7395 int r_type = ELF32_R_TYPE (irel->r_info);
7396 reloc_howto_type *howto = &elf_howto_table[r_type];
7397 r_reloc r_rel;
7398
7399 if (r_type == R_XTENSA_ASM_SIMPLIFY
7400 || r_type == R_XTENSA_32_PCREL
7401 || !howto->pc_relative)
7402 continue;
7403
7404 r_reloc_init (&r_rel, abfd, irel, contents,
7405 bfd_get_section_limit (abfd, sec));
7406
7407 if (r_reloc_get_section (&r_rel) != sec)
7408 continue;
7409
7410 if (n + 2 > max_n)
7411 {
7412 max_n = (max_n + 2) * 2;
7413 ranges = bfd_realloc (ranges, max_n * sizeof (*ranges));
7414 }
7415
7416 ranges[n].addr = irel->r_offset;
7417 ranges[n + 1].addr = r_rel.target_offset;
7418
7419 ranges[n].add = ranges[n].addr < ranges[n + 1].addr;
7420 ranges[n + 1].add = !ranges[n].add;
7421
7422 ranges[n].irel_index = i;
7423 ranges[n + 1].irel_index = i;
7424
7425 n += 2;
7426
7427 reloc[i].irel = irel;
7428
7429 /* Every relocation won't possibly be checked in the optimized version of
7430 check_section_ebb_pcrels_fit, so this needs to be done here. */
7431 if (is_alt_relocation (ELF32_R_TYPE (irel->r_info)))
7432 {
7433 /* None of the current alternate relocs are PC-relative,
7434 and only PC-relative relocs matter here. */
7435 }
7436 else
7437 {
7438 xtensa_opcode opcode;
7439 int opnum;
7440
7441 if (reloc_opcodes)
7442 opcode = reloc_opcodes[i];
7443 else
7444 opcode = get_relocation_opcode (abfd, sec, contents, irel);
7445
7446 if (opcode == XTENSA_UNDEFINED)
7447 {
7448 list->ok = FALSE;
7449 break;
7450 }
7451
7452 opnum = get_relocation_opnd (opcode, ELF32_R_TYPE (irel->r_info));
7453 if (opnum == XTENSA_UNDEFINED)
7454 {
7455 list->ok = FALSE;
7456 break;
7457 }
7458
7459 /* Record relocation opcode and opnum as we've calculated them
7460 anyway and they won't change. */
7461 reloc[i].opcode = opcode;
7462 reloc[i].opnum = opnum;
7463 }
7464 }
7465
7466 if (list->ok)
7467 {
7468 ranges = bfd_realloc (ranges, n * sizeof (*ranges));
7469 qsort (ranges, n, sizeof (*ranges), reloc_range_compare);
7470
7471 list->n_range = n;
7472 list->range = ranges;
7473 list->reloc = reloc;
7474 list->list_root.prev = &list->list_root;
7475 list->list_root.next = &list->list_root;
7476 }
7477 else
7478 {
7479 free (ranges);
7480 free (reloc);
7481 }
7482 }
7483
7484 static void reloc_range_list_append (reloc_range_list *list,
7485 unsigned irel_index)
7486 {
7487 reloc_range_list_entry *entry = list->reloc + irel_index;
7488
7489 entry->prev = list->list_root.prev;
7490 entry->next = &list->list_root;
7491 entry->prev->next = entry;
7492 entry->next->prev = entry;
7493 ++list->n_list;
7494 }
7495
7496 static void reloc_range_list_remove (reloc_range_list *list,
7497 unsigned irel_index)
7498 {
7499 reloc_range_list_entry *entry = list->reloc + irel_index;
7500
7501 entry->next->prev = entry->prev;
7502 entry->prev->next = entry->next;
7503 --list->n_list;
7504 }
7505
7506 /* Update relocation list object so that it lists all relocations that cross
7507 [first; last] range. Range bounds should not decrease with successive
7508 invocations. */
7509 static void reloc_range_list_update_range (reloc_range_list *list,
7510 bfd_vma first, bfd_vma last)
7511 {
7512 /* This should not happen: EBBs are iterated from lower addresses to higher.
7513 But even if that happens there's no need to break: just flush current list
7514 and start from scratch. */
7515 if ((list->last > 0 && list->range[list->last - 1].addr > last) ||
7516 (list->first > 0 && list->range[list->first - 1].addr >= first))
7517 {
7518 list->first = 0;
7519 list->last = 0;
7520 list->n_list = 0;
7521 list->list_root.next = &list->list_root;
7522 list->list_root.prev = &list->list_root;
7523 fprintf (stderr, "%s: move backwards requested\n", __func__);
7524 }
7525
7526 for (; list->last < list->n_range &&
7527 list->range[list->last].addr <= last; ++list->last)
7528 if (list->range[list->last].add)
7529 reloc_range_list_append (list, list->range[list->last].irel_index);
7530
7531 for (; list->first < list->n_range &&
7532 list->range[list->first].addr < first; ++list->first)
7533 if (!list->range[list->first].add)
7534 reloc_range_list_remove (list, list->range[list->first].irel_index);
7535 }
7536
7537 static void free_reloc_range_list (reloc_range_list *list)
7538 {
7539 free (list->range);
7540 free (list->reloc);
7541 }
7542
7543 /* The compute_text_actions function will build a list of potential
7544 transformation actions for code in the extended basic block of each
7545 longcall that is optimized to a direct call. From this list we
7546 generate a set of actions to actually perform that optimizes for
7547 space and, if not using size_opt, maintains branch target
7548 alignments.
7549
7550 These actions to be performed are placed on a per-section list.
7551 The actual changes are performed by relax_section() in the second
7552 pass. */
7553
7554 bfd_boolean
7555 compute_text_actions (bfd *abfd,
7556 asection *sec,
7557 struct bfd_link_info *link_info)
7558 {
7559 xtensa_opcode *reloc_opcodes = NULL;
7560 xtensa_relax_info *relax_info;
7561 bfd_byte *contents;
7562 Elf_Internal_Rela *internal_relocs;
7563 bfd_boolean ok = TRUE;
7564 unsigned i;
7565 property_table_entry *prop_table = 0;
7566 int ptblsize = 0;
7567 bfd_size_type sec_size;
7568 reloc_range_list relevant_relocs;
7569
7570 relax_info = get_xtensa_relax_info (sec);
7571 BFD_ASSERT (relax_info);
7572 BFD_ASSERT (relax_info->src_next == relax_info->src_count);
7573
7574 /* Do nothing if the section contains no optimized longcalls. */
7575 if (!relax_info->is_relaxable_asm_section)
7576 return ok;
7577
7578 internal_relocs = retrieve_internal_relocs (abfd, sec,
7579 link_info->keep_memory);
7580
7581 if (internal_relocs)
7582 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
7583 internal_reloc_compare);
7584
7585 sec_size = bfd_get_section_limit (abfd, sec);
7586 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
7587 if (contents == NULL && sec_size != 0)
7588 {
7589 ok = FALSE;
7590 goto error_return;
7591 }
7592
7593 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
7594 XTENSA_PROP_SEC_NAME, FALSE);
7595 if (ptblsize < 0)
7596 {
7597 ok = FALSE;
7598 goto error_return;
7599 }
7600
7601 /* Precompute the opcode for each relocation. */
7602 reloc_opcodes = build_reloc_opcodes (abfd, sec, contents, internal_relocs);
7603
7604 build_reloc_ranges (abfd, sec, contents, internal_relocs, reloc_opcodes,
7605 &relevant_relocs);
7606
7607 for (i = 0; i < sec->reloc_count; i++)
7608 {
7609 Elf_Internal_Rela *irel = &internal_relocs[i];
7610 bfd_vma r_offset;
7611 property_table_entry *the_entry;
7612 int ptbl_idx;
7613 ebb_t *ebb;
7614 ebb_constraint ebb_table;
7615 bfd_size_type simplify_size;
7616
7617 if (irel && ELF32_R_TYPE (irel->r_info) != R_XTENSA_ASM_SIMPLIFY)
7618 continue;
7619 r_offset = irel->r_offset;
7620
7621 simplify_size = get_asm_simplify_size (contents, sec_size, r_offset);
7622 if (simplify_size == 0)
7623 {
7624 _bfd_error_handler
7625 /* xgettext:c-format */
7626 (_("%pB(%pA+%#" PRIx64 "): could not decode instruction for "
7627 "XTENSA_ASM_SIMPLIFY relocation; "
7628 "possible configuration mismatch"),
7629 sec->owner, sec, (uint64_t) r_offset);
7630 continue;
7631 }
7632
7633 /* If the instruction table is not around, then don't do this
7634 relaxation. */
7635 the_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
7636 sec->vma + irel->r_offset);
7637 if (the_entry == NULL || XTENSA_NO_NOP_REMOVAL)
7638 {
7639 text_action_add (&relax_info->action_list,
7640 ta_convert_longcall, sec, r_offset,
7641 0);
7642 continue;
7643 }
7644
7645 /* If the next longcall happens to be at the same address as an
7646 unreachable section of size 0, then skip forward. */
7647 ptbl_idx = the_entry - prop_table;
7648 while ((the_entry->flags & XTENSA_PROP_UNREACHABLE)
7649 && the_entry->size == 0
7650 && ptbl_idx + 1 < ptblsize
7651 && (prop_table[ptbl_idx + 1].address
7652 == prop_table[ptbl_idx].address))
7653 {
7654 ptbl_idx++;
7655 the_entry++;
7656 }
7657
7658 if (the_entry->flags & XTENSA_PROP_NO_TRANSFORM)
7659 /* NO_REORDER is OK */
7660 continue;
7661
7662 init_ebb_constraint (&ebb_table);
7663 ebb = &ebb_table.ebb;
7664 init_ebb (ebb, sec, contents, sec_size, prop_table, ptblsize,
7665 internal_relocs, sec->reloc_count);
7666 ebb->start_offset = r_offset + simplify_size;
7667 ebb->end_offset = r_offset + simplify_size;
7668 ebb->start_ptbl_idx = ptbl_idx;
7669 ebb->end_ptbl_idx = ptbl_idx;
7670 ebb->start_reloc_idx = i;
7671 ebb->end_reloc_idx = i;
7672
7673 if (!extend_ebb_bounds (ebb)
7674 || !compute_ebb_proposed_actions (&ebb_table)
7675 || !compute_ebb_actions (&ebb_table)
7676 || !check_section_ebb_pcrels_fit (abfd, sec, contents,
7677 internal_relocs,
7678 &relevant_relocs,
7679 &ebb_table, reloc_opcodes)
7680 || !check_section_ebb_reduces (&ebb_table))
7681 {
7682 /* If anything goes wrong or we get unlucky and something does
7683 not fit, with our plan because of expansion between
7684 critical branches, just convert to a NOP. */
7685
7686 text_action_add (&relax_info->action_list,
7687 ta_convert_longcall, sec, r_offset, 0);
7688 i = ebb_table.ebb.end_reloc_idx;
7689 free_ebb_constraint (&ebb_table);
7690 continue;
7691 }
7692
7693 text_action_add_proposed (&relax_info->action_list, &ebb_table, sec);
7694
7695 /* Update the index so we do not go looking at the relocations
7696 we have already processed. */
7697 i = ebb_table.ebb.end_reloc_idx;
7698 free_ebb_constraint (&ebb_table);
7699 }
7700
7701 free_reloc_range_list (&relevant_relocs);
7702
7703 #if DEBUG
7704 if (action_list_count (&relax_info->action_list))
7705 print_action_list (stderr, &relax_info->action_list);
7706 #endif
7707
7708 error_return:
7709 release_contents (sec, contents);
7710 release_internal_relocs (sec, internal_relocs);
7711 if (prop_table)
7712 free (prop_table);
7713 if (reloc_opcodes)
7714 free (reloc_opcodes);
7715
7716 return ok;
7717 }
7718
7719
7720 /* Do not widen an instruction if it is preceeded by a
7721 loop opcode. It might cause misalignment. */
7722
7723 static bfd_boolean
7724 prev_instr_is_a_loop (bfd_byte *contents,
7725 bfd_size_type content_length,
7726 bfd_size_type offset)
7727 {
7728 xtensa_opcode prev_opcode;
7729
7730 if (offset < 3)
7731 return FALSE;
7732 prev_opcode = insn_decode_opcode (contents, content_length, offset-3, 0);
7733 return (xtensa_opcode_is_loop (xtensa_default_isa, prev_opcode) == 1);
7734 }
7735
7736
7737 /* Find all of the possible actions for an extended basic block. */
7738
7739 bfd_boolean
7740 compute_ebb_proposed_actions (ebb_constraint *ebb_table)
7741 {
7742 const ebb_t *ebb = &ebb_table->ebb;
7743 unsigned rel_idx = ebb->start_reloc_idx;
7744 property_table_entry *entry, *start_entry, *end_entry;
7745 bfd_vma offset = 0;
7746 xtensa_isa isa = xtensa_default_isa;
7747 xtensa_format fmt;
7748 static xtensa_insnbuf insnbuf = NULL;
7749 static xtensa_insnbuf slotbuf = NULL;
7750
7751 if (insnbuf == NULL)
7752 {
7753 insnbuf = xtensa_insnbuf_alloc (isa);
7754 slotbuf = xtensa_insnbuf_alloc (isa);
7755 }
7756
7757 start_entry = &ebb->ptbl[ebb->start_ptbl_idx];
7758 end_entry = &ebb->ptbl[ebb->end_ptbl_idx];
7759
7760 for (entry = start_entry; entry <= end_entry; entry++)
7761 {
7762 bfd_vma start_offset, end_offset;
7763 bfd_size_type insn_len;
7764
7765 start_offset = entry->address - ebb->sec->vma;
7766 end_offset = entry->address + entry->size - ebb->sec->vma;
7767
7768 if (entry == start_entry)
7769 start_offset = ebb->start_offset;
7770 if (entry == end_entry)
7771 end_offset = ebb->end_offset;
7772 offset = start_offset;
7773
7774 if (offset == entry->address - ebb->sec->vma
7775 && (entry->flags & XTENSA_PROP_INSN_BRANCH_TARGET) != 0)
7776 {
7777 enum ebb_target_enum align_type = EBB_DESIRE_TGT_ALIGN;
7778 BFD_ASSERT (offset != end_offset);
7779 if (offset == end_offset)
7780 return FALSE;
7781
7782 insn_len = insn_decode_len (ebb->contents, ebb->content_length,
7783 offset);
7784 if (insn_len == 0)
7785 goto decode_error;
7786
7787 if (check_branch_target_aligned_address (offset, insn_len))
7788 align_type = EBB_REQUIRE_TGT_ALIGN;
7789
7790 ebb_propose_action (ebb_table, align_type, 0,
7791 ta_none, offset, 0, TRUE);
7792 }
7793
7794 while (offset != end_offset)
7795 {
7796 Elf_Internal_Rela *irel;
7797 xtensa_opcode opcode;
7798
7799 while (rel_idx < ebb->end_reloc_idx
7800 && (ebb->relocs[rel_idx].r_offset < offset
7801 || (ebb->relocs[rel_idx].r_offset == offset
7802 && (ELF32_R_TYPE (ebb->relocs[rel_idx].r_info)
7803 != R_XTENSA_ASM_SIMPLIFY))))
7804 rel_idx++;
7805
7806 /* Check for longcall. */
7807 irel = &ebb->relocs[rel_idx];
7808 if (irel->r_offset == offset
7809 && ELF32_R_TYPE (irel->r_info) == R_XTENSA_ASM_SIMPLIFY)
7810 {
7811 bfd_size_type simplify_size;
7812
7813 simplify_size = get_asm_simplify_size (ebb->contents,
7814 ebb->content_length,
7815 irel->r_offset);
7816 if (simplify_size == 0)
7817 goto decode_error;
7818
7819 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7820 ta_convert_longcall, offset, 0, TRUE);
7821
7822 offset += simplify_size;
7823 continue;
7824 }
7825
7826 if (offset + MIN_INSN_LENGTH > ebb->content_length)
7827 goto decode_error;
7828 xtensa_insnbuf_from_chars (isa, insnbuf, &ebb->contents[offset],
7829 ebb->content_length - offset);
7830 fmt = xtensa_format_decode (isa, insnbuf);
7831 if (fmt == XTENSA_UNDEFINED)
7832 goto decode_error;
7833 insn_len = xtensa_format_length (isa, fmt);
7834 if (insn_len == (bfd_size_type) XTENSA_UNDEFINED)
7835 goto decode_error;
7836
7837 if (xtensa_format_num_slots (isa, fmt) != 1)
7838 {
7839 offset += insn_len;
7840 continue;
7841 }
7842
7843 xtensa_format_get_slot (isa, fmt, 0, insnbuf, slotbuf);
7844 opcode = xtensa_opcode_decode (isa, fmt, 0, slotbuf);
7845 if (opcode == XTENSA_UNDEFINED)
7846 goto decode_error;
7847
7848 if ((entry->flags & XTENSA_PROP_INSN_NO_DENSITY) == 0
7849 && (entry->flags & XTENSA_PROP_NO_TRANSFORM) == 0
7850 && can_narrow_instruction (slotbuf, fmt, opcode) != 0)
7851 {
7852 /* Add an instruction narrow action. */
7853 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7854 ta_narrow_insn, offset, 0, FALSE);
7855 }
7856 else if ((entry->flags & XTENSA_PROP_NO_TRANSFORM) == 0
7857 && can_widen_instruction (slotbuf, fmt, opcode) != 0
7858 && ! prev_instr_is_a_loop (ebb->contents,
7859 ebb->content_length, offset))
7860 {
7861 /* Add an instruction widen action. */
7862 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7863 ta_widen_insn, offset, 0, FALSE);
7864 }
7865 else if (xtensa_opcode_is_loop (xtensa_default_isa, opcode) == 1)
7866 {
7867 /* Check for branch targets. */
7868 ebb_propose_action (ebb_table, EBB_REQUIRE_LOOP_ALIGN, 0,
7869 ta_none, offset, 0, TRUE);
7870 }
7871
7872 offset += insn_len;
7873 }
7874 }
7875
7876 if (ebb->ends_unreachable)
7877 {
7878 ebb_propose_action (ebb_table, EBB_NO_ALIGN, 0,
7879 ta_fill, ebb->end_offset, 0, TRUE);
7880 }
7881
7882 return TRUE;
7883
7884 decode_error:
7885 _bfd_error_handler
7886 /* xgettext:c-format */
7887 (_("%pB(%pA+%#" PRIx64 "): could not decode instruction; "
7888 "possible configuration mismatch"),
7889 ebb->sec->owner, ebb->sec, (uint64_t) offset);
7890 return FALSE;
7891 }
7892
7893
7894 /* After all of the information has collected about the
7895 transformations possible in an EBB, compute the appropriate actions
7896 here in compute_ebb_actions. We still must check later to make
7897 sure that the actions do not break any relocations. The algorithm
7898 used here is pretty greedy. Basically, it removes as many no-ops
7899 as possible so that the end of the EBB has the same alignment
7900 characteristics as the original. First, it uses narrowing, then
7901 fill space at the end of the EBB, and finally widenings. If that
7902 does not work, it tries again with one fewer no-op removed. The
7903 optimization will only be performed if all of the branch targets
7904 that were aligned before transformation are also aligned after the
7905 transformation.
7906
7907 When the size_opt flag is set, ignore the branch target alignments,
7908 narrow all wide instructions, and remove all no-ops unless the end
7909 of the EBB prevents it. */
7910
7911 bfd_boolean
7912 compute_ebb_actions (ebb_constraint *ebb_table)
7913 {
7914 unsigned i = 0;
7915 unsigned j;
7916 int removed_bytes = 0;
7917 ebb_t *ebb = &ebb_table->ebb;
7918 unsigned seg_idx_start = 0;
7919 unsigned seg_idx_end = 0;
7920
7921 /* We perform this like the assembler relaxation algorithm: Start by
7922 assuming all instructions are narrow and all no-ops removed; then
7923 walk through.... */
7924
7925 /* For each segment of this that has a solid constraint, check to
7926 see if there are any combinations that will keep the constraint.
7927 If so, use it. */
7928 for (seg_idx_end = 0; seg_idx_end < ebb_table->action_count; seg_idx_end++)
7929 {
7930 bfd_boolean requires_text_end_align = FALSE;
7931 unsigned longcall_count = 0;
7932 unsigned longcall_convert_count = 0;
7933 unsigned narrowable_count = 0;
7934 unsigned narrowable_convert_count = 0;
7935 unsigned widenable_count = 0;
7936 unsigned widenable_convert_count = 0;
7937
7938 proposed_action *action = NULL;
7939 int align = (1 << ebb_table->ebb.sec->alignment_power);
7940
7941 seg_idx_start = seg_idx_end;
7942
7943 for (i = seg_idx_start; i < ebb_table->action_count; i++)
7944 {
7945 action = &ebb_table->actions[i];
7946 if (action->action == ta_convert_longcall)
7947 longcall_count++;
7948 if (action->action == ta_narrow_insn)
7949 narrowable_count++;
7950 if (action->action == ta_widen_insn)
7951 widenable_count++;
7952 if (action->action == ta_fill)
7953 break;
7954 if (action->align_type == EBB_REQUIRE_LOOP_ALIGN)
7955 break;
7956 if (action->align_type == EBB_REQUIRE_TGT_ALIGN
7957 && !elf32xtensa_size_opt)
7958 break;
7959 }
7960 seg_idx_end = i;
7961
7962 if (seg_idx_end == ebb_table->action_count && !ebb->ends_unreachable)
7963 requires_text_end_align = TRUE;
7964
7965 if (elf32xtensa_size_opt && !requires_text_end_align
7966 && action->align_type != EBB_REQUIRE_LOOP_ALIGN
7967 && action->align_type != EBB_REQUIRE_TGT_ALIGN)
7968 {
7969 longcall_convert_count = longcall_count;
7970 narrowable_convert_count = narrowable_count;
7971 widenable_convert_count = 0;
7972 }
7973 else
7974 {
7975 /* There is a constraint. Convert the max number of longcalls. */
7976 narrowable_convert_count = 0;
7977 longcall_convert_count = 0;
7978 widenable_convert_count = 0;
7979
7980 for (j = 0; j < longcall_count; j++)
7981 {
7982 int removed = (longcall_count - j) * 3 & (align - 1);
7983 unsigned desire_narrow = (align - removed) & (align - 1);
7984 unsigned desire_widen = removed;
7985 if (desire_narrow <= narrowable_count)
7986 {
7987 narrowable_convert_count = desire_narrow;
7988 narrowable_convert_count +=
7989 (align * ((narrowable_count - narrowable_convert_count)
7990 / align));
7991 longcall_convert_count = (longcall_count - j);
7992 widenable_convert_count = 0;
7993 break;
7994 }
7995 if (desire_widen <= widenable_count && !elf32xtensa_size_opt)
7996 {
7997 narrowable_convert_count = 0;
7998 longcall_convert_count = longcall_count - j;
7999 widenable_convert_count = desire_widen;
8000 break;
8001 }
8002 }
8003 }
8004
8005 /* Now the number of conversions are saved. Do them. */
8006 for (i = seg_idx_start; i < seg_idx_end; i++)
8007 {
8008 action = &ebb_table->actions[i];
8009 switch (action->action)
8010 {
8011 case ta_convert_longcall:
8012 if (longcall_convert_count != 0)
8013 {
8014 action->action = ta_remove_longcall;
8015 action->do_action = TRUE;
8016 action->removed_bytes += 3;
8017 longcall_convert_count--;
8018 }
8019 break;
8020 case ta_narrow_insn:
8021 if (narrowable_convert_count != 0)
8022 {
8023 action->do_action = TRUE;
8024 action->removed_bytes += 1;
8025 narrowable_convert_count--;
8026 }
8027 break;
8028 case ta_widen_insn:
8029 if (widenable_convert_count != 0)
8030 {
8031 action->do_action = TRUE;
8032 action->removed_bytes -= 1;
8033 widenable_convert_count--;
8034 }
8035 break;
8036 default:
8037 break;
8038 }
8039 }
8040 }
8041
8042 /* Now we move on to some local opts. Try to remove each of the
8043 remaining longcalls. */
8044
8045 if (ebb_table->ebb.ends_section || ebb_table->ebb.ends_unreachable)
8046 {
8047 removed_bytes = 0;
8048 for (i = 0; i < ebb_table->action_count; i++)
8049 {
8050 int old_removed_bytes = removed_bytes;
8051 proposed_action *action = &ebb_table->actions[i];
8052
8053 if (action->do_action && action->action == ta_convert_longcall)
8054 {
8055 bfd_boolean bad_alignment = FALSE;
8056 removed_bytes += 3;
8057 for (j = i + 1; j < ebb_table->action_count; j++)
8058 {
8059 proposed_action *new_action = &ebb_table->actions[j];
8060 bfd_vma offset = new_action->offset;
8061 if (new_action->align_type == EBB_REQUIRE_TGT_ALIGN)
8062 {
8063 if (!check_branch_target_aligned
8064 (ebb_table->ebb.contents,
8065 ebb_table->ebb.content_length,
8066 offset, offset - removed_bytes))
8067 {
8068 bad_alignment = TRUE;
8069 break;
8070 }
8071 }
8072 if (new_action->align_type == EBB_REQUIRE_LOOP_ALIGN)
8073 {
8074 if (!check_loop_aligned (ebb_table->ebb.contents,
8075 ebb_table->ebb.content_length,
8076 offset,
8077 offset - removed_bytes))
8078 {
8079 bad_alignment = TRUE;
8080 break;
8081 }
8082 }
8083 if (new_action->action == ta_narrow_insn
8084 && !new_action->do_action
8085 && ebb_table->ebb.sec->alignment_power == 2)
8086 {
8087 /* Narrow an instruction and we are done. */
8088 new_action->do_action = TRUE;
8089 new_action->removed_bytes += 1;
8090 bad_alignment = FALSE;
8091 break;
8092 }
8093 if (new_action->action == ta_widen_insn
8094 && new_action->do_action
8095 && ebb_table->ebb.sec->alignment_power == 2)
8096 {
8097 /* Narrow an instruction and we are done. */
8098 new_action->do_action = FALSE;
8099 new_action->removed_bytes += 1;
8100 bad_alignment = FALSE;
8101 break;
8102 }
8103 if (new_action->do_action)
8104 removed_bytes += new_action->removed_bytes;
8105 }
8106 if (!bad_alignment)
8107 {
8108 action->removed_bytes += 3;
8109 action->action = ta_remove_longcall;
8110 action->do_action = TRUE;
8111 }
8112 }
8113 removed_bytes = old_removed_bytes;
8114 if (action->do_action)
8115 removed_bytes += action->removed_bytes;
8116 }
8117 }
8118
8119 removed_bytes = 0;
8120 for (i = 0; i < ebb_table->action_count; ++i)
8121 {
8122 proposed_action *action = &ebb_table->actions[i];
8123 if (action->do_action)
8124 removed_bytes += action->removed_bytes;
8125 }
8126
8127 if ((removed_bytes % (1 << ebb_table->ebb.sec->alignment_power)) != 0
8128 && ebb->ends_unreachable)
8129 {
8130 proposed_action *action;
8131 int br;
8132 int extra_space;
8133
8134 BFD_ASSERT (ebb_table->action_count != 0);
8135 action = &ebb_table->actions[ebb_table->action_count - 1];
8136 BFD_ASSERT (action->action == ta_fill);
8137 BFD_ASSERT (ebb->ends_unreachable->flags & XTENSA_PROP_UNREACHABLE);
8138
8139 extra_space = compute_fill_extra_space (ebb->ends_unreachable);
8140 br = action->removed_bytes + removed_bytes + extra_space;
8141 br = br & ((1 << ebb->sec->alignment_power ) - 1);
8142
8143 action->removed_bytes = extra_space - br;
8144 }
8145 return TRUE;
8146 }
8147
8148
8149 /* The xlate_map is a sorted array of address mappings designed to
8150 answer the offset_with_removed_text() query with a binary search instead
8151 of a linear search through the section's action_list. */
8152
8153 typedef struct xlate_map_entry xlate_map_entry_t;
8154 typedef struct xlate_map xlate_map_t;
8155
8156 struct xlate_map_entry
8157 {
8158 bfd_vma orig_address;
8159 bfd_vma new_address;
8160 unsigned size;
8161 };
8162
8163 struct xlate_map
8164 {
8165 unsigned entry_count;
8166 xlate_map_entry_t *entry;
8167 };
8168
8169
8170 static int
8171 xlate_compare (const void *a_v, const void *b_v)
8172 {
8173 const xlate_map_entry_t *a = (const xlate_map_entry_t *) a_v;
8174 const xlate_map_entry_t *b = (const xlate_map_entry_t *) b_v;
8175 if (a->orig_address < b->orig_address)
8176 return -1;
8177 if (a->orig_address > (b->orig_address + b->size - 1))
8178 return 1;
8179 return 0;
8180 }
8181
8182
8183 static bfd_vma
8184 xlate_offset_with_removed_text (const xlate_map_t *map,
8185 text_action_list *action_list,
8186 bfd_vma offset)
8187 {
8188 void *r;
8189 xlate_map_entry_t *e;
8190 struct xlate_map_entry se;
8191
8192 if (map == NULL)
8193 return offset_with_removed_text (action_list, offset);
8194
8195 if (map->entry_count == 0)
8196 return offset;
8197
8198 se.orig_address = offset;
8199 r = bsearch (&se, map->entry, map->entry_count,
8200 sizeof (xlate_map_entry_t), &xlate_compare);
8201 e = (xlate_map_entry_t *) r;
8202
8203 /* There could be a jump past the end of the section,
8204 allow it using the last xlate map entry to translate its address. */
8205 if (e == NULL)
8206 {
8207 e = map->entry + map->entry_count - 1;
8208 if (xlate_compare (&se, e) <= 0)
8209 e = NULL;
8210 }
8211 BFD_ASSERT (e != NULL);
8212 if (e == NULL)
8213 return offset;
8214 return e->new_address - e->orig_address + offset;
8215 }
8216
8217 typedef struct xlate_map_context_struct xlate_map_context;
8218 struct xlate_map_context_struct
8219 {
8220 xlate_map_t *map;
8221 xlate_map_entry_t *current_entry;
8222 int removed;
8223 };
8224
8225 static int
8226 xlate_map_fn (splay_tree_node node, void *p)
8227 {
8228 text_action *r = (text_action *)node->value;
8229 xlate_map_context *ctx = p;
8230 unsigned orig_size = 0;
8231
8232 switch (r->action)
8233 {
8234 case ta_none:
8235 case ta_remove_insn:
8236 case ta_convert_longcall:
8237 case ta_remove_literal:
8238 case ta_add_literal:
8239 break;
8240 case ta_remove_longcall:
8241 orig_size = 6;
8242 break;
8243 case ta_narrow_insn:
8244 orig_size = 3;
8245 break;
8246 case ta_widen_insn:
8247 orig_size = 2;
8248 break;
8249 case ta_fill:
8250 break;
8251 }
8252 ctx->current_entry->size =
8253 r->offset + orig_size - ctx->current_entry->orig_address;
8254 if (ctx->current_entry->size != 0)
8255 {
8256 ctx->current_entry++;
8257 ctx->map->entry_count++;
8258 }
8259 ctx->current_entry->orig_address = r->offset + orig_size;
8260 ctx->removed += r->removed_bytes;
8261 ctx->current_entry->new_address = r->offset + orig_size - ctx->removed;
8262 ctx->current_entry->size = 0;
8263 return 0;
8264 }
8265
8266 /* Build a binary searchable offset translation map from a section's
8267 action list. */
8268
8269 static xlate_map_t *
8270 build_xlate_map (asection *sec, xtensa_relax_info *relax_info)
8271 {
8272 text_action_list *action_list = &relax_info->action_list;
8273 unsigned num_actions = 0;
8274 xlate_map_context ctx;
8275
8276 ctx.map = (xlate_map_t *) bfd_malloc (sizeof (xlate_map_t));
8277
8278 if (ctx.map == NULL)
8279 return NULL;
8280
8281 num_actions = action_list_count (action_list);
8282 ctx.map->entry = (xlate_map_entry_t *)
8283 bfd_malloc (sizeof (xlate_map_entry_t) * (num_actions + 1));
8284 if (ctx.map->entry == NULL)
8285 {
8286 free (ctx.map);
8287 return NULL;
8288 }
8289 ctx.map->entry_count = 0;
8290
8291 ctx.removed = 0;
8292 ctx.current_entry = &ctx.map->entry[0];
8293
8294 ctx.current_entry->orig_address = 0;
8295 ctx.current_entry->new_address = 0;
8296 ctx.current_entry->size = 0;
8297
8298 splay_tree_foreach (action_list->tree, xlate_map_fn, &ctx);
8299
8300 ctx.current_entry->size = (bfd_get_section_limit (sec->owner, sec)
8301 - ctx.current_entry->orig_address);
8302 if (ctx.current_entry->size != 0)
8303 ctx.map->entry_count++;
8304
8305 return ctx.map;
8306 }
8307
8308
8309 /* Free an offset translation map. */
8310
8311 static void
8312 free_xlate_map (xlate_map_t *map)
8313 {
8314 if (map && map->entry)
8315 free (map->entry);
8316 if (map)
8317 free (map);
8318 }
8319
8320
8321 /* Use check_section_ebb_pcrels_fit to make sure that all of the
8322 relocations in a section will fit if a proposed set of actions
8323 are performed. */
8324
8325 static bfd_boolean
8326 check_section_ebb_pcrels_fit (bfd *abfd,
8327 asection *sec,
8328 bfd_byte *contents,
8329 Elf_Internal_Rela *internal_relocs,
8330 reloc_range_list *relevant_relocs,
8331 const ebb_constraint *constraint,
8332 const xtensa_opcode *reloc_opcodes)
8333 {
8334 unsigned i, j;
8335 unsigned n = sec->reloc_count;
8336 Elf_Internal_Rela *irel;
8337 xlate_map_t *xmap = NULL;
8338 bfd_boolean ok = TRUE;
8339 xtensa_relax_info *relax_info;
8340 reloc_range_list_entry *entry = NULL;
8341
8342 relax_info = get_xtensa_relax_info (sec);
8343
8344 if (relax_info && sec->reloc_count > 100)
8345 {
8346 xmap = build_xlate_map (sec, relax_info);
8347 /* NULL indicates out of memory, but the slow version
8348 can still be used. */
8349 }
8350
8351 if (relevant_relocs && constraint->action_count)
8352 {
8353 if (!relevant_relocs->ok)
8354 {
8355 ok = FALSE;
8356 n = 0;
8357 }
8358 else
8359 {
8360 bfd_vma min_offset, max_offset;
8361 min_offset = max_offset = constraint->actions[0].offset;
8362
8363 for (i = 1; i < constraint->action_count; ++i)
8364 {
8365 proposed_action *action = &constraint->actions[i];
8366 bfd_vma offset = action->offset;
8367
8368 if (offset < min_offset)
8369 min_offset = offset;
8370 if (offset > max_offset)
8371 max_offset = offset;
8372 }
8373 reloc_range_list_update_range (relevant_relocs, min_offset,
8374 max_offset);
8375 n = relevant_relocs->n_list;
8376 entry = &relevant_relocs->list_root;
8377 }
8378 }
8379 else
8380 {
8381 relevant_relocs = NULL;
8382 }
8383
8384 for (i = 0; i < n; i++)
8385 {
8386 r_reloc r_rel;
8387 bfd_vma orig_self_offset, orig_target_offset;
8388 bfd_vma self_offset, target_offset;
8389 int r_type;
8390 reloc_howto_type *howto;
8391 int self_removed_bytes, target_removed_bytes;
8392
8393 if (relevant_relocs)
8394 {
8395 entry = entry->next;
8396 irel = entry->irel;
8397 }
8398 else
8399 {
8400 irel = internal_relocs + i;
8401 }
8402 r_type = ELF32_R_TYPE (irel->r_info);
8403
8404 howto = &elf_howto_table[r_type];
8405 /* We maintain the required invariant: PC-relative relocations
8406 that fit before linking must fit after linking. Thus we only
8407 need to deal with relocations to the same section that are
8408 PC-relative. */
8409 if (r_type == R_XTENSA_ASM_SIMPLIFY
8410 || r_type == R_XTENSA_32_PCREL
8411 || !howto->pc_relative)
8412 continue;
8413
8414 r_reloc_init (&r_rel, abfd, irel, contents,
8415 bfd_get_section_limit (abfd, sec));
8416
8417 if (r_reloc_get_section (&r_rel) != sec)
8418 continue;
8419
8420 orig_self_offset = irel->r_offset;
8421 orig_target_offset = r_rel.target_offset;
8422
8423 self_offset = orig_self_offset;
8424 target_offset = orig_target_offset;
8425
8426 if (relax_info)
8427 {
8428 self_offset =
8429 xlate_offset_with_removed_text (xmap, &relax_info->action_list,
8430 orig_self_offset);
8431 target_offset =
8432 xlate_offset_with_removed_text (xmap, &relax_info->action_list,
8433 orig_target_offset);
8434 }
8435
8436 self_removed_bytes = 0;
8437 target_removed_bytes = 0;
8438
8439 for (j = 0; j < constraint->action_count; ++j)
8440 {
8441 proposed_action *action = &constraint->actions[j];
8442 bfd_vma offset = action->offset;
8443 int removed_bytes = action->removed_bytes;
8444 if (offset < orig_self_offset
8445 || (offset == orig_self_offset && action->action == ta_fill
8446 && action->removed_bytes < 0))
8447 self_removed_bytes += removed_bytes;
8448 if (offset < orig_target_offset
8449 || (offset == orig_target_offset && action->action == ta_fill
8450 && action->removed_bytes < 0))
8451 target_removed_bytes += removed_bytes;
8452 }
8453 self_offset -= self_removed_bytes;
8454 target_offset -= target_removed_bytes;
8455
8456 /* Try to encode it. Get the operand and check. */
8457 if (is_alt_relocation (ELF32_R_TYPE (irel->r_info)))
8458 {
8459 /* None of the current alternate relocs are PC-relative,
8460 and only PC-relative relocs matter here. */
8461 }
8462 else
8463 {
8464 xtensa_opcode opcode;
8465 int opnum;
8466
8467 if (relevant_relocs)
8468 {
8469 opcode = entry->opcode;
8470 opnum = entry->opnum;
8471 }
8472 else
8473 {
8474 if (reloc_opcodes)
8475 opcode = reloc_opcodes[relevant_relocs ?
8476 (unsigned)(entry - relevant_relocs->reloc) : i];
8477 else
8478 opcode = get_relocation_opcode (abfd, sec, contents, irel);
8479 if (opcode == XTENSA_UNDEFINED)
8480 {
8481 ok = FALSE;
8482 break;
8483 }
8484
8485 opnum = get_relocation_opnd (opcode, ELF32_R_TYPE (irel->r_info));
8486 if (opnum == XTENSA_UNDEFINED)
8487 {
8488 ok = FALSE;
8489 break;
8490 }
8491 }
8492
8493 if (!pcrel_reloc_fits (opcode, opnum, self_offset, target_offset))
8494 {
8495 ok = FALSE;
8496 break;
8497 }
8498 }
8499 }
8500
8501 if (xmap)
8502 free_xlate_map (xmap);
8503
8504 return ok;
8505 }
8506
8507
8508 static bfd_boolean
8509 check_section_ebb_reduces (const ebb_constraint *constraint)
8510 {
8511 int removed = 0;
8512 unsigned i;
8513
8514 for (i = 0; i < constraint->action_count; i++)
8515 {
8516 const proposed_action *action = &constraint->actions[i];
8517 if (action->do_action)
8518 removed += action->removed_bytes;
8519 }
8520 if (removed < 0)
8521 return FALSE;
8522
8523 return TRUE;
8524 }
8525
8526
8527 void
8528 text_action_add_proposed (text_action_list *l,
8529 const ebb_constraint *ebb_table,
8530 asection *sec)
8531 {
8532 unsigned i;
8533
8534 for (i = 0; i < ebb_table->action_count; i++)
8535 {
8536 proposed_action *action = &ebb_table->actions[i];
8537
8538 if (!action->do_action)
8539 continue;
8540 switch (action->action)
8541 {
8542 case ta_remove_insn:
8543 case ta_remove_longcall:
8544 case ta_convert_longcall:
8545 case ta_narrow_insn:
8546 case ta_widen_insn:
8547 case ta_fill:
8548 case ta_remove_literal:
8549 text_action_add (l, action->action, sec, action->offset,
8550 action->removed_bytes);
8551 break;
8552 case ta_none:
8553 break;
8554 default:
8555 BFD_ASSERT (0);
8556 break;
8557 }
8558 }
8559 }
8560
8561
8562 int
8563 compute_fill_extra_space (property_table_entry *entry)
8564 {
8565 int fill_extra_space;
8566
8567 if (!entry)
8568 return 0;
8569
8570 if ((entry->flags & XTENSA_PROP_UNREACHABLE) == 0)
8571 return 0;
8572
8573 fill_extra_space = entry->size;
8574 if ((entry->flags & XTENSA_PROP_ALIGN) != 0)
8575 {
8576 /* Fill bytes for alignment:
8577 (2**n)-1 - (addr + (2**n)-1) & (2**n -1) */
8578 int pow = GET_XTENSA_PROP_ALIGNMENT (entry->flags);
8579 int nsm = (1 << pow) - 1;
8580 bfd_vma addr = entry->address + entry->size;
8581 bfd_vma align_fill = nsm - ((addr + nsm) & nsm);
8582 fill_extra_space += align_fill;
8583 }
8584 return fill_extra_space;
8585 }
8586
8587 \f
8588 /* First relaxation pass. */
8589
8590 /* If the section contains relaxable literals, check each literal to
8591 see if it has the same value as another literal that has already
8592 been seen, either in the current section or a previous one. If so,
8593 add an entry to the per-section list of removed literals. The
8594 actual changes are deferred until the next pass. */
8595
8596 static bfd_boolean
8597 compute_removed_literals (bfd *abfd,
8598 asection *sec,
8599 struct bfd_link_info *link_info,
8600 value_map_hash_table *values)
8601 {
8602 xtensa_relax_info *relax_info;
8603 bfd_byte *contents;
8604 Elf_Internal_Rela *internal_relocs;
8605 source_reloc *src_relocs, *rel;
8606 bfd_boolean ok = TRUE;
8607 property_table_entry *prop_table = NULL;
8608 int ptblsize;
8609 int i, prev_i;
8610 bfd_boolean last_loc_is_prev = FALSE;
8611 bfd_vma last_target_offset = 0;
8612 section_cache_t target_sec_cache;
8613 bfd_size_type sec_size;
8614
8615 init_section_cache (&target_sec_cache);
8616
8617 /* Do nothing if it is not a relaxable literal section. */
8618 relax_info = get_xtensa_relax_info (sec);
8619 BFD_ASSERT (relax_info);
8620 if (!relax_info->is_relaxable_literal_section)
8621 return ok;
8622
8623 internal_relocs = retrieve_internal_relocs (abfd, sec,
8624 link_info->keep_memory);
8625
8626 sec_size = bfd_get_section_limit (abfd, sec);
8627 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
8628 if (contents == NULL && sec_size != 0)
8629 {
8630 ok = FALSE;
8631 goto error_return;
8632 }
8633
8634 /* Sort the source_relocs by target offset. */
8635 src_relocs = relax_info->src_relocs;
8636 qsort (src_relocs, relax_info->src_count,
8637 sizeof (source_reloc), source_reloc_compare);
8638 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
8639 internal_reloc_compare);
8640
8641 ptblsize = xtensa_read_table_entries (abfd, sec, &prop_table,
8642 XTENSA_PROP_SEC_NAME, FALSE);
8643 if (ptblsize < 0)
8644 {
8645 ok = FALSE;
8646 goto error_return;
8647 }
8648
8649 prev_i = -1;
8650 for (i = 0; i < relax_info->src_count; i++)
8651 {
8652 Elf_Internal_Rela *irel = NULL;
8653
8654 rel = &src_relocs[i];
8655 if (get_l32r_opcode () != rel->opcode)
8656 continue;
8657 irel = get_irel_at_offset (sec, internal_relocs,
8658 rel->r_rel.target_offset);
8659
8660 /* If the relocation on this is not a simple R_XTENSA_32 or
8661 R_XTENSA_PLT then do not consider it. This may happen when
8662 the difference of two symbols is used in a literal. */
8663 if (irel && (ELF32_R_TYPE (irel->r_info) != R_XTENSA_32
8664 && ELF32_R_TYPE (irel->r_info) != R_XTENSA_PLT))
8665 continue;
8666
8667 /* If the target_offset for this relocation is the same as the
8668 previous relocation, then we've already considered whether the
8669 literal can be coalesced. Skip to the next one.... */
8670 if (i != 0 && prev_i != -1
8671 && src_relocs[i-1].r_rel.target_offset == rel->r_rel.target_offset)
8672 continue;
8673 prev_i = i;
8674
8675 if (last_loc_is_prev &&
8676 last_target_offset + 4 != rel->r_rel.target_offset)
8677 last_loc_is_prev = FALSE;
8678
8679 /* Check if the relocation was from an L32R that is being removed
8680 because a CALLX was converted to a direct CALL, and check if
8681 there are no other relocations to the literal. */
8682 if (is_removable_literal (rel, i, src_relocs, relax_info->src_count,
8683 sec, prop_table, ptblsize))
8684 {
8685 if (!remove_dead_literal (abfd, sec, link_info, internal_relocs,
8686 irel, rel, prop_table, ptblsize))
8687 {
8688 ok = FALSE;
8689 goto error_return;
8690 }
8691 last_target_offset = rel->r_rel.target_offset;
8692 continue;
8693 }
8694
8695 if (!identify_literal_placement (abfd, sec, contents, link_info,
8696 values,
8697 &last_loc_is_prev, irel,
8698 relax_info->src_count - i, rel,
8699 prop_table, ptblsize,
8700 &target_sec_cache, rel->is_abs_literal))
8701 {
8702 ok = FALSE;
8703 goto error_return;
8704 }
8705 last_target_offset = rel->r_rel.target_offset;
8706 }
8707
8708 #if DEBUG
8709 print_removed_literals (stderr, &relax_info->removed_list);
8710 print_action_list (stderr, &relax_info->action_list);
8711 #endif /* DEBUG */
8712
8713 error_return:
8714 if (prop_table)
8715 free (prop_table);
8716 free_section_cache (&target_sec_cache);
8717
8718 release_contents (sec, contents);
8719 release_internal_relocs (sec, internal_relocs);
8720 return ok;
8721 }
8722
8723
8724 static Elf_Internal_Rela *
8725 get_irel_at_offset (asection *sec,
8726 Elf_Internal_Rela *internal_relocs,
8727 bfd_vma offset)
8728 {
8729 unsigned i;
8730 Elf_Internal_Rela *irel;
8731 unsigned r_type;
8732 Elf_Internal_Rela key;
8733
8734 if (!internal_relocs)
8735 return NULL;
8736
8737 key.r_offset = offset;
8738 irel = bsearch (&key, internal_relocs, sec->reloc_count,
8739 sizeof (Elf_Internal_Rela), internal_reloc_matches);
8740 if (!irel)
8741 return NULL;
8742
8743 /* bsearch does not guarantee which will be returned if there are
8744 multiple matches. We need the first that is not an alignment. */
8745 i = irel - internal_relocs;
8746 while (i > 0)
8747 {
8748 if (internal_relocs[i-1].r_offset != offset)
8749 break;
8750 i--;
8751 }
8752 for ( ; i < sec->reloc_count; i++)
8753 {
8754 irel = &internal_relocs[i];
8755 r_type = ELF32_R_TYPE (irel->r_info);
8756 if (irel->r_offset == offset && r_type != R_XTENSA_NONE)
8757 return irel;
8758 }
8759
8760 return NULL;
8761 }
8762
8763
8764 bfd_boolean
8765 is_removable_literal (const source_reloc *rel,
8766 int i,
8767 const source_reloc *src_relocs,
8768 int src_count,
8769 asection *sec,
8770 property_table_entry *prop_table,
8771 int ptblsize)
8772 {
8773 const source_reloc *curr_rel;
8774 property_table_entry *entry;
8775
8776 if (!rel->is_null)
8777 return FALSE;
8778
8779 entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8780 sec->vma + rel->r_rel.target_offset);
8781 if (entry && (entry->flags & XTENSA_PROP_NO_TRANSFORM))
8782 return FALSE;
8783
8784 for (++i; i < src_count; ++i)
8785 {
8786 curr_rel = &src_relocs[i];
8787 /* If all others have the same target offset.... */
8788 if (curr_rel->r_rel.target_offset != rel->r_rel.target_offset)
8789 return TRUE;
8790
8791 if (!curr_rel->is_null
8792 && !xtensa_is_property_section (curr_rel->source_sec)
8793 && !(curr_rel->source_sec->flags & SEC_DEBUGGING))
8794 return FALSE;
8795 }
8796 return TRUE;
8797 }
8798
8799
8800 bfd_boolean
8801 remove_dead_literal (bfd *abfd,
8802 asection *sec,
8803 struct bfd_link_info *link_info,
8804 Elf_Internal_Rela *internal_relocs,
8805 Elf_Internal_Rela *irel,
8806 source_reloc *rel,
8807 property_table_entry *prop_table,
8808 int ptblsize)
8809 {
8810 property_table_entry *entry;
8811 xtensa_relax_info *relax_info;
8812
8813 relax_info = get_xtensa_relax_info (sec);
8814 if (!relax_info)
8815 return FALSE;
8816
8817 entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8818 sec->vma + rel->r_rel.target_offset);
8819
8820 /* Mark the unused literal so that it will be removed. */
8821 add_removed_literal (&relax_info->removed_list, &rel->r_rel, NULL);
8822
8823 text_action_add (&relax_info->action_list,
8824 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
8825
8826 /* If the section is 4-byte aligned, do not add fill. */
8827 if (sec->alignment_power > 2)
8828 {
8829 int fill_extra_space;
8830 bfd_vma entry_sec_offset;
8831 text_action *fa;
8832 property_table_entry *the_add_entry;
8833 int removed_diff;
8834
8835 if (entry)
8836 entry_sec_offset = entry->address - sec->vma + entry->size;
8837 else
8838 entry_sec_offset = rel->r_rel.target_offset + 4;
8839
8840 /* If the literal range is at the end of the section,
8841 do not add fill. */
8842 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
8843 entry_sec_offset);
8844 fill_extra_space = compute_fill_extra_space (the_add_entry);
8845
8846 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
8847 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
8848 -4, fill_extra_space);
8849 if (fa)
8850 adjust_fill_action (fa, removed_diff);
8851 else
8852 text_action_add (&relax_info->action_list,
8853 ta_fill, sec, entry_sec_offset, removed_diff);
8854 }
8855
8856 /* Zero out the relocation on this literal location. */
8857 if (irel)
8858 {
8859 if (elf_hash_table (link_info)->dynamic_sections_created)
8860 shrink_dynamic_reloc_sections (link_info, abfd, sec, irel);
8861
8862 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
8863 pin_internal_relocs (sec, internal_relocs);
8864 }
8865
8866 /* Do not modify "last_loc_is_prev". */
8867 return TRUE;
8868 }
8869
8870
8871 bfd_boolean
8872 identify_literal_placement (bfd *abfd,
8873 asection *sec,
8874 bfd_byte *contents,
8875 struct bfd_link_info *link_info,
8876 value_map_hash_table *values,
8877 bfd_boolean *last_loc_is_prev_p,
8878 Elf_Internal_Rela *irel,
8879 int remaining_src_rels,
8880 source_reloc *rel,
8881 property_table_entry *prop_table,
8882 int ptblsize,
8883 section_cache_t *target_sec_cache,
8884 bfd_boolean is_abs_literal)
8885 {
8886 literal_value val;
8887 value_map *val_map;
8888 xtensa_relax_info *relax_info;
8889 bfd_boolean literal_placed = FALSE;
8890 r_reloc r_rel;
8891 unsigned long value;
8892 bfd_boolean final_static_link;
8893 bfd_size_type sec_size;
8894
8895 relax_info = get_xtensa_relax_info (sec);
8896 if (!relax_info)
8897 return FALSE;
8898
8899 sec_size = bfd_get_section_limit (abfd, sec);
8900
8901 final_static_link =
8902 (!bfd_link_relocatable (link_info)
8903 && !elf_hash_table (link_info)->dynamic_sections_created);
8904
8905 /* The placement algorithm first checks to see if the literal is
8906 already in the value map. If so and the value map is reachable
8907 from all uses, then the literal is moved to that location. If
8908 not, then we identify the last location where a fresh literal was
8909 placed. If the literal can be safely moved there, then we do so.
8910 If not, then we assume that the literal is not to move and leave
8911 the literal where it is, marking it as the last literal
8912 location. */
8913
8914 /* Find the literal value. */
8915 value = 0;
8916 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
8917 if (!irel)
8918 {
8919 BFD_ASSERT (rel->r_rel.target_offset < sec_size);
8920 value = bfd_get_32 (abfd, contents + rel->r_rel.target_offset);
8921 }
8922 init_literal_value (&val, &r_rel, value, is_abs_literal);
8923
8924 /* Check if we've seen another literal with the same value that
8925 is in the same output section. */
8926 val_map = value_map_get_cached_value (values, &val, final_static_link);
8927
8928 if (val_map
8929 && (r_reloc_get_section (&val_map->loc)->output_section
8930 == sec->output_section)
8931 && relocations_reach (rel, remaining_src_rels, &val_map->loc)
8932 && coalesce_shared_literal (sec, rel, prop_table, ptblsize, val_map))
8933 {
8934 /* No change to last_loc_is_prev. */
8935 literal_placed = TRUE;
8936 }
8937
8938 /* For relocatable links, do not try to move literals. To do it
8939 correctly might increase the number of relocations in an input
8940 section making the default relocatable linking fail. */
8941 if (!bfd_link_relocatable (link_info) && !literal_placed
8942 && values->has_last_loc && !(*last_loc_is_prev_p))
8943 {
8944 asection *target_sec = r_reloc_get_section (&values->last_loc);
8945 if (target_sec && target_sec->output_section == sec->output_section)
8946 {
8947 /* Increment the virtual offset. */
8948 r_reloc try_loc = values->last_loc;
8949 try_loc.virtual_offset += 4;
8950
8951 /* There is a last loc that was in the same output section. */
8952 if (relocations_reach (rel, remaining_src_rels, &try_loc)
8953 && move_shared_literal (sec, link_info, rel,
8954 prop_table, ptblsize,
8955 &try_loc, &val, target_sec_cache))
8956 {
8957 values->last_loc.virtual_offset += 4;
8958 literal_placed = TRUE;
8959 if (!val_map)
8960 val_map = add_value_map (values, &val, &try_loc,
8961 final_static_link);
8962 else
8963 val_map->loc = try_loc;
8964 }
8965 }
8966 }
8967
8968 if (!literal_placed)
8969 {
8970 /* Nothing worked, leave the literal alone but update the last loc. */
8971 values->has_last_loc = TRUE;
8972 values->last_loc = rel->r_rel;
8973 if (!val_map)
8974 val_map = add_value_map (values, &val, &rel->r_rel, final_static_link);
8975 else
8976 val_map->loc = rel->r_rel;
8977 *last_loc_is_prev_p = TRUE;
8978 }
8979
8980 return TRUE;
8981 }
8982
8983
8984 /* Check if the original relocations (presumably on L32R instructions)
8985 identified by reloc[0..N] can be changed to reference the literal
8986 identified by r_rel. If r_rel is out of range for any of the
8987 original relocations, then we don't want to coalesce the original
8988 literal with the one at r_rel. We only check reloc[0..N], where the
8989 offsets are all the same as for reloc[0] (i.e., they're all
8990 referencing the same literal) and where N is also bounded by the
8991 number of remaining entries in the "reloc" array. The "reloc" array
8992 is sorted by target offset so we know all the entries for the same
8993 literal will be contiguous. */
8994
8995 static bfd_boolean
8996 relocations_reach (source_reloc *reloc,
8997 int remaining_relocs,
8998 const r_reloc *r_rel)
8999 {
9000 bfd_vma from_offset, source_address, dest_address;
9001 asection *sec;
9002 int i;
9003
9004 if (!r_reloc_is_defined (r_rel))
9005 return FALSE;
9006
9007 sec = r_reloc_get_section (r_rel);
9008 from_offset = reloc[0].r_rel.target_offset;
9009
9010 for (i = 0; i < remaining_relocs; i++)
9011 {
9012 if (reloc[i].r_rel.target_offset != from_offset)
9013 break;
9014
9015 /* Ignore relocations that have been removed. */
9016 if (reloc[i].is_null)
9017 continue;
9018
9019 /* The original and new output section for these must be the same
9020 in order to coalesce. */
9021 if (r_reloc_get_section (&reloc[i].r_rel)->output_section
9022 != sec->output_section)
9023 return FALSE;
9024
9025 /* Absolute literals in the same output section can always be
9026 combined. */
9027 if (reloc[i].is_abs_literal)
9028 continue;
9029
9030 /* A literal with no PC-relative relocations can be moved anywhere. */
9031 if (reloc[i].opnd != -1)
9032 {
9033 /* Otherwise, check to see that it fits. */
9034 source_address = (reloc[i].source_sec->output_section->vma
9035 + reloc[i].source_sec->output_offset
9036 + reloc[i].r_rel.rela.r_offset);
9037 dest_address = (sec->output_section->vma
9038 + sec->output_offset
9039 + r_rel->target_offset);
9040
9041 if (!pcrel_reloc_fits (reloc[i].opcode, reloc[i].opnd,
9042 source_address, dest_address))
9043 return FALSE;
9044 }
9045 }
9046
9047 return TRUE;
9048 }
9049
9050
9051 /* Move a literal to another literal location because it is
9052 the same as the other literal value. */
9053
9054 static bfd_boolean
9055 coalesce_shared_literal (asection *sec,
9056 source_reloc *rel,
9057 property_table_entry *prop_table,
9058 int ptblsize,
9059 value_map *val_map)
9060 {
9061 property_table_entry *entry;
9062 text_action *fa;
9063 property_table_entry *the_add_entry;
9064 int removed_diff;
9065 xtensa_relax_info *relax_info;
9066
9067 relax_info = get_xtensa_relax_info (sec);
9068 if (!relax_info)
9069 return FALSE;
9070
9071 entry = elf_xtensa_find_property_entry
9072 (prop_table, ptblsize, sec->vma + rel->r_rel.target_offset);
9073 if (entry && (entry->flags & XTENSA_PROP_NO_TRANSFORM))
9074 return TRUE;
9075
9076 /* Mark that the literal will be coalesced. */
9077 add_removed_literal (&relax_info->removed_list, &rel->r_rel, &val_map->loc);
9078
9079 text_action_add (&relax_info->action_list,
9080 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
9081
9082 /* If the section is 4-byte aligned, do not add fill. */
9083 if (sec->alignment_power > 2)
9084 {
9085 int fill_extra_space;
9086 bfd_vma entry_sec_offset;
9087
9088 if (entry)
9089 entry_sec_offset = entry->address - sec->vma + entry->size;
9090 else
9091 entry_sec_offset = rel->r_rel.target_offset + 4;
9092
9093 /* If the literal range is at the end of the section,
9094 do not add fill. */
9095 fill_extra_space = 0;
9096 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
9097 entry_sec_offset);
9098 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
9099 fill_extra_space = the_add_entry->size;
9100
9101 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
9102 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
9103 -4, fill_extra_space);
9104 if (fa)
9105 adjust_fill_action (fa, removed_diff);
9106 else
9107 text_action_add (&relax_info->action_list,
9108 ta_fill, sec, entry_sec_offset, removed_diff);
9109 }
9110
9111 return TRUE;
9112 }
9113
9114
9115 /* Move a literal to another location. This may actually increase the
9116 total amount of space used because of alignments so we need to do
9117 this carefully. Also, it may make a branch go out of range. */
9118
9119 static bfd_boolean
9120 move_shared_literal (asection *sec,
9121 struct bfd_link_info *link_info,
9122 source_reloc *rel,
9123 property_table_entry *prop_table,
9124 int ptblsize,
9125 const r_reloc *target_loc,
9126 const literal_value *lit_value,
9127 section_cache_t *target_sec_cache)
9128 {
9129 property_table_entry *the_add_entry, *src_entry, *target_entry = NULL;
9130 text_action *fa, *target_fa;
9131 int removed_diff;
9132 xtensa_relax_info *relax_info, *target_relax_info;
9133 asection *target_sec;
9134 ebb_t *ebb;
9135 ebb_constraint ebb_table;
9136 bfd_boolean relocs_fit;
9137
9138 /* If this routine always returns FALSE, the literals that cannot be
9139 coalesced will not be moved. */
9140 if (elf32xtensa_no_literal_movement)
9141 return FALSE;
9142
9143 relax_info = get_xtensa_relax_info (sec);
9144 if (!relax_info)
9145 return FALSE;
9146
9147 target_sec = r_reloc_get_section (target_loc);
9148 target_relax_info = get_xtensa_relax_info (target_sec);
9149
9150 /* Literals to undefined sections may not be moved because they
9151 must report an error. */
9152 if (bfd_is_und_section (target_sec))
9153 return FALSE;
9154
9155 src_entry = elf_xtensa_find_property_entry
9156 (prop_table, ptblsize, sec->vma + rel->r_rel.target_offset);
9157
9158 if (!section_cache_section (target_sec_cache, target_sec, link_info))
9159 return FALSE;
9160
9161 target_entry = elf_xtensa_find_property_entry
9162 (target_sec_cache->ptbl, target_sec_cache->pte_count,
9163 target_sec->vma + target_loc->target_offset);
9164
9165 if (!target_entry)
9166 return FALSE;
9167
9168 /* Make sure that we have not broken any branches. */
9169 relocs_fit = FALSE;
9170
9171 init_ebb_constraint (&ebb_table);
9172 ebb = &ebb_table.ebb;
9173 init_ebb (ebb, target_sec_cache->sec, target_sec_cache->contents,
9174 target_sec_cache->content_length,
9175 target_sec_cache->ptbl, target_sec_cache->pte_count,
9176 target_sec_cache->relocs, target_sec_cache->reloc_count);
9177
9178 /* Propose to add 4 bytes + worst-case alignment size increase to
9179 destination. */
9180 ebb_propose_action (&ebb_table, EBB_NO_ALIGN, 0,
9181 ta_fill, target_loc->target_offset,
9182 -4 - (1 << target_sec->alignment_power), TRUE);
9183
9184 /* Check all of the PC-relative relocations to make sure they still fit. */
9185 relocs_fit = check_section_ebb_pcrels_fit (target_sec->owner, target_sec,
9186 target_sec_cache->contents,
9187 target_sec_cache->relocs, NULL,
9188 &ebb_table, NULL);
9189
9190 if (!relocs_fit)
9191 return FALSE;
9192
9193 text_action_add_literal (&target_relax_info->action_list,
9194 ta_add_literal, target_loc, lit_value, -4);
9195
9196 if (target_sec->alignment_power > 2 && target_entry != src_entry)
9197 {
9198 /* May need to add or remove some fill to maintain alignment. */
9199 int fill_extra_space;
9200 bfd_vma entry_sec_offset;
9201
9202 entry_sec_offset =
9203 target_entry->address - target_sec->vma + target_entry->size;
9204
9205 /* If the literal range is at the end of the section,
9206 do not add fill. */
9207 fill_extra_space = 0;
9208 the_add_entry =
9209 elf_xtensa_find_property_entry (target_sec_cache->ptbl,
9210 target_sec_cache->pte_count,
9211 entry_sec_offset);
9212 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
9213 fill_extra_space = the_add_entry->size;
9214
9215 target_fa = find_fill_action (&target_relax_info->action_list,
9216 target_sec, entry_sec_offset);
9217 removed_diff = compute_removed_action_diff (target_fa, target_sec,
9218 entry_sec_offset, 4,
9219 fill_extra_space);
9220 if (target_fa)
9221 adjust_fill_action (target_fa, removed_diff);
9222 else
9223 text_action_add (&target_relax_info->action_list,
9224 ta_fill, target_sec, entry_sec_offset, removed_diff);
9225 }
9226
9227 /* Mark that the literal will be moved to the new location. */
9228 add_removed_literal (&relax_info->removed_list, &rel->r_rel, target_loc);
9229
9230 /* Remove the literal. */
9231 text_action_add (&relax_info->action_list,
9232 ta_remove_literal, sec, rel->r_rel.target_offset, 4);
9233
9234 /* If the section is 4-byte aligned, do not add fill. */
9235 if (sec->alignment_power > 2 && target_entry != src_entry)
9236 {
9237 int fill_extra_space;
9238 bfd_vma entry_sec_offset;
9239
9240 if (src_entry)
9241 entry_sec_offset = src_entry->address - sec->vma + src_entry->size;
9242 else
9243 entry_sec_offset = rel->r_rel.target_offset+4;
9244
9245 /* If the literal range is at the end of the section,
9246 do not add fill. */
9247 fill_extra_space = 0;
9248 the_add_entry = elf_xtensa_find_property_entry (prop_table, ptblsize,
9249 entry_sec_offset);
9250 if (the_add_entry && (the_add_entry->flags & XTENSA_PROP_UNREACHABLE))
9251 fill_extra_space = the_add_entry->size;
9252
9253 fa = find_fill_action (&relax_info->action_list, sec, entry_sec_offset);
9254 removed_diff = compute_removed_action_diff (fa, sec, entry_sec_offset,
9255 -4, fill_extra_space);
9256 if (fa)
9257 adjust_fill_action (fa, removed_diff);
9258 else
9259 text_action_add (&relax_info->action_list,
9260 ta_fill, sec, entry_sec_offset, removed_diff);
9261 }
9262
9263 return TRUE;
9264 }
9265
9266 \f
9267 /* Second relaxation pass. */
9268
9269 static int
9270 action_remove_bytes_fn (splay_tree_node node, void *p)
9271 {
9272 bfd_size_type *final_size = p;
9273 text_action *action = (text_action *)node->value;
9274
9275 *final_size -= action->removed_bytes;
9276 return 0;
9277 }
9278
9279 /* Modify all of the relocations to point to the right spot, and if this
9280 is a relaxable section, delete the unwanted literals and fix the
9281 section size. */
9282
9283 bfd_boolean
9284 relax_section (bfd *abfd, asection *sec, struct bfd_link_info *link_info)
9285 {
9286 Elf_Internal_Rela *internal_relocs;
9287 xtensa_relax_info *relax_info;
9288 bfd_byte *contents;
9289 bfd_boolean ok = TRUE;
9290 unsigned i;
9291 bfd_boolean rv = FALSE;
9292 bfd_boolean virtual_action;
9293 bfd_size_type sec_size;
9294
9295 sec_size = bfd_get_section_limit (abfd, sec);
9296 relax_info = get_xtensa_relax_info (sec);
9297 BFD_ASSERT (relax_info);
9298
9299 /* First translate any of the fixes that have been added already. */
9300 translate_section_fixes (sec);
9301
9302 /* Handle property sections (e.g., literal tables) specially. */
9303 if (xtensa_is_property_section (sec))
9304 {
9305 BFD_ASSERT (!relax_info->is_relaxable_literal_section);
9306 return relax_property_section (abfd, sec, link_info);
9307 }
9308
9309 internal_relocs = retrieve_internal_relocs (abfd, sec,
9310 link_info->keep_memory);
9311 if (!internal_relocs && !action_list_count (&relax_info->action_list))
9312 return TRUE;
9313
9314 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
9315 if (contents == NULL && sec_size != 0)
9316 {
9317 ok = FALSE;
9318 goto error_return;
9319 }
9320
9321 if (internal_relocs)
9322 {
9323 for (i = 0; i < sec->reloc_count; i++)
9324 {
9325 Elf_Internal_Rela *irel;
9326 xtensa_relax_info *target_relax_info;
9327 bfd_vma source_offset, old_source_offset;
9328 r_reloc r_rel;
9329 unsigned r_type;
9330 asection *target_sec;
9331
9332 /* Locally change the source address.
9333 Translate the target to the new target address.
9334 If it points to this section and has been removed,
9335 NULLify it.
9336 Write it back. */
9337
9338 irel = &internal_relocs[i];
9339 source_offset = irel->r_offset;
9340 old_source_offset = source_offset;
9341
9342 r_type = ELF32_R_TYPE (irel->r_info);
9343 r_reloc_init (&r_rel, abfd, irel, contents,
9344 bfd_get_section_limit (abfd, sec));
9345
9346 /* If this section could have changed then we may need to
9347 change the relocation's offset. */
9348
9349 if (relax_info->is_relaxable_literal_section
9350 || relax_info->is_relaxable_asm_section)
9351 {
9352 pin_internal_relocs (sec, internal_relocs);
9353
9354 if (r_type != R_XTENSA_NONE
9355 && find_removed_literal (&relax_info->removed_list,
9356 irel->r_offset))
9357 {
9358 /* Remove this relocation. */
9359 if (elf_hash_table (link_info)->dynamic_sections_created)
9360 shrink_dynamic_reloc_sections (link_info, abfd, sec, irel);
9361 irel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
9362 irel->r_offset = offset_with_removed_text_map
9363 (&relax_info->action_list, irel->r_offset);
9364 continue;
9365 }
9366
9367 if (r_type == R_XTENSA_ASM_SIMPLIFY)
9368 {
9369 text_action *action =
9370 find_insn_action (&relax_info->action_list,
9371 irel->r_offset);
9372 if (action && (action->action == ta_convert_longcall
9373 || action->action == ta_remove_longcall))
9374 {
9375 bfd_reloc_status_type retval;
9376 char *error_message = NULL;
9377
9378 retval = contract_asm_expansion (contents, sec_size,
9379 irel, &error_message);
9380 if (retval != bfd_reloc_ok)
9381 {
9382 (*link_info->callbacks->reloc_dangerous)
9383 (link_info, error_message, abfd, sec,
9384 irel->r_offset);
9385 goto error_return;
9386 }
9387 /* Update the action so that the code that moves
9388 the contents will do the right thing. */
9389 /* ta_remove_longcall and ta_remove_insn actions are
9390 grouped together in the tree as well as
9391 ta_convert_longcall and ta_none, so that changes below
9392 can be done w/o removing and reinserting action into
9393 the tree. */
9394
9395 if (action->action == ta_remove_longcall)
9396 action->action = ta_remove_insn;
9397 else
9398 action->action = ta_none;
9399 /* Refresh the info in the r_rel. */
9400 r_reloc_init (&r_rel, abfd, irel, contents, sec_size);
9401 r_type = ELF32_R_TYPE (irel->r_info);
9402 }
9403 }
9404
9405 source_offset = offset_with_removed_text_map
9406 (&relax_info->action_list, irel->r_offset);
9407 irel->r_offset = source_offset;
9408 }
9409
9410 /* If the target section could have changed then
9411 we may need to change the relocation's target offset. */
9412
9413 target_sec = r_reloc_get_section (&r_rel);
9414
9415 /* For a reference to a discarded section from a DWARF section,
9416 i.e., where action_discarded is PRETEND, the symbol will
9417 eventually be modified to refer to the kept section (at least if
9418 the kept and discarded sections are the same size). Anticipate
9419 that here and adjust things accordingly. */
9420 if (! elf_xtensa_ignore_discarded_relocs (sec)
9421 && elf_xtensa_action_discarded (sec) == PRETEND
9422 && sec->sec_info_type != SEC_INFO_TYPE_STABS
9423 && target_sec != NULL
9424 && discarded_section (target_sec))
9425 {
9426 /* It would be natural to call _bfd_elf_check_kept_section
9427 here, but it's not exported from elflink.c. It's also a
9428 fairly expensive check. Adjusting the relocations to the
9429 discarded section is fairly harmless; it will only adjust
9430 some addends and difference values. If it turns out that
9431 _bfd_elf_check_kept_section fails later, it won't matter,
9432 so just compare the section names to find the right group
9433 member. */
9434 asection *kept = target_sec->kept_section;
9435 if (kept != NULL)
9436 {
9437 if ((kept->flags & SEC_GROUP) != 0)
9438 {
9439 asection *first = elf_next_in_group (kept);
9440 asection *s = first;
9441
9442 kept = NULL;
9443 while (s != NULL)
9444 {
9445 if (strcmp (s->name, target_sec->name) == 0)
9446 {
9447 kept = s;
9448 break;
9449 }
9450 s = elf_next_in_group (s);
9451 if (s == first)
9452 break;
9453 }
9454 }
9455 }
9456 if (kept != NULL
9457 && ((target_sec->rawsize != 0
9458 ? target_sec->rawsize : target_sec->size)
9459 == (kept->rawsize != 0 ? kept->rawsize : kept->size)))
9460 target_sec = kept;
9461 }
9462
9463 target_relax_info = get_xtensa_relax_info (target_sec);
9464 if (target_relax_info
9465 && (target_relax_info->is_relaxable_literal_section
9466 || target_relax_info->is_relaxable_asm_section))
9467 {
9468 r_reloc new_reloc;
9469 target_sec = translate_reloc (&r_rel, &new_reloc, target_sec);
9470
9471 if (r_type == R_XTENSA_DIFF8
9472 || r_type == R_XTENSA_DIFF16
9473 || r_type == R_XTENSA_DIFF32)
9474 {
9475 bfd_signed_vma diff_value = 0;
9476 bfd_vma new_end_offset, diff_mask = 0;
9477
9478 if (bfd_get_section_limit (abfd, sec) < old_source_offset)
9479 {
9480 (*link_info->callbacks->reloc_dangerous)
9481 (link_info, _("invalid relocation address"),
9482 abfd, sec, old_source_offset);
9483 goto error_return;
9484 }
9485
9486 switch (r_type)
9487 {
9488 case R_XTENSA_DIFF8:
9489 diff_value =
9490 bfd_get_signed_8 (abfd, &contents[old_source_offset]);
9491 break;
9492 case R_XTENSA_DIFF16:
9493 diff_value =
9494 bfd_get_signed_16 (abfd, &contents[old_source_offset]);
9495 break;
9496 case R_XTENSA_DIFF32:
9497 diff_value =
9498 bfd_get_signed_32 (abfd, &contents[old_source_offset]);
9499 break;
9500 }
9501
9502 new_end_offset = offset_with_removed_text_map
9503 (&target_relax_info->action_list,
9504 r_rel.target_offset + diff_value);
9505 diff_value = new_end_offset - new_reloc.target_offset;
9506
9507 switch (r_type)
9508 {
9509 case R_XTENSA_DIFF8:
9510 diff_mask = 0x7f;
9511 bfd_put_signed_8 (abfd, diff_value,
9512 &contents[old_source_offset]);
9513 break;
9514 case R_XTENSA_DIFF16:
9515 diff_mask = 0x7fff;
9516 bfd_put_signed_16 (abfd, diff_value,
9517 &contents[old_source_offset]);
9518 break;
9519 case R_XTENSA_DIFF32:
9520 diff_mask = 0x7fffffff;
9521 bfd_put_signed_32 (abfd, diff_value,
9522 &contents[old_source_offset]);
9523 break;
9524 }
9525
9526 /* Check for overflow. Sign bits must be all zeroes or all ones */
9527 if ((diff_value & ~diff_mask) != 0 &&
9528 (diff_value & ~diff_mask) != (-1 & ~diff_mask))
9529 {
9530 (*link_info->callbacks->reloc_dangerous)
9531 (link_info, _("overflow after relaxation"),
9532 abfd, sec, old_source_offset);
9533 goto error_return;
9534 }
9535
9536 pin_contents (sec, contents);
9537 }
9538
9539 /* If the relocation still references a section in the same
9540 input file, modify the relocation directly instead of
9541 adding a "fix" record. */
9542 if (target_sec->owner == abfd)
9543 {
9544 unsigned r_symndx = ELF32_R_SYM (new_reloc.rela.r_info);
9545 irel->r_info = ELF32_R_INFO (r_symndx, r_type);
9546 irel->r_addend = new_reloc.rela.r_addend;
9547 pin_internal_relocs (sec, internal_relocs);
9548 }
9549 else
9550 {
9551 bfd_vma addend_displacement;
9552 reloc_bfd_fix *fix;
9553
9554 addend_displacement =
9555 new_reloc.target_offset + new_reloc.virtual_offset;
9556 fix = reloc_bfd_fix_init (sec, source_offset, r_type,
9557 target_sec,
9558 addend_displacement, TRUE);
9559 add_fix (sec, fix);
9560 }
9561 }
9562 }
9563 }
9564
9565 if ((relax_info->is_relaxable_literal_section
9566 || relax_info->is_relaxable_asm_section)
9567 && action_list_count (&relax_info->action_list))
9568 {
9569 /* Walk through the planned actions and build up a table
9570 of move, copy and fill records. Use the move, copy and
9571 fill records to perform the actions once. */
9572
9573 bfd_size_type final_size, copy_size, orig_insn_size;
9574 bfd_byte *scratch = NULL;
9575 bfd_byte *dup_contents = NULL;
9576 bfd_size_type orig_size = sec->size;
9577 bfd_vma orig_dot = 0;
9578 bfd_vma orig_dot_copied = 0; /* Byte copied already from
9579 orig dot in physical memory. */
9580 bfd_vma orig_dot_vo = 0; /* Virtual offset from orig_dot. */
9581 bfd_vma dup_dot = 0;
9582
9583 text_action *action;
9584
9585 final_size = sec->size;
9586
9587 splay_tree_foreach (relax_info->action_list.tree,
9588 action_remove_bytes_fn, &final_size);
9589 scratch = (bfd_byte *) bfd_zmalloc (final_size);
9590 dup_contents = (bfd_byte *) bfd_zmalloc (final_size);
9591
9592 /* The dot is the current fill location. */
9593 #if DEBUG
9594 print_action_list (stderr, &relax_info->action_list);
9595 #endif
9596
9597 for (action = action_first (&relax_info->action_list); action;
9598 action = action_next (&relax_info->action_list, action))
9599 {
9600 virtual_action = FALSE;
9601 if (action->offset > orig_dot)
9602 {
9603 orig_dot += orig_dot_copied;
9604 orig_dot_copied = 0;
9605 orig_dot_vo = 0;
9606 /* Out of the virtual world. */
9607 }
9608
9609 if (action->offset > orig_dot)
9610 {
9611 copy_size = action->offset - orig_dot;
9612 memmove (&dup_contents[dup_dot], &contents[orig_dot], copy_size);
9613 orig_dot += copy_size;
9614 dup_dot += copy_size;
9615 BFD_ASSERT (action->offset == orig_dot);
9616 }
9617 else if (action->offset < orig_dot)
9618 {
9619 if (action->action == ta_fill
9620 && action->offset - action->removed_bytes == orig_dot)
9621 {
9622 /* This is OK because the fill only effects the dup_dot. */
9623 }
9624 else if (action->action == ta_add_literal)
9625 {
9626 /* TBD. Might need to handle this. */
9627 }
9628 }
9629 if (action->offset == orig_dot)
9630 {
9631 if (action->virtual_offset > orig_dot_vo)
9632 {
9633 if (orig_dot_vo == 0)
9634 {
9635 /* Need to copy virtual_offset bytes. Probably four. */
9636 copy_size = action->virtual_offset - orig_dot_vo;
9637 memmove (&dup_contents[dup_dot],
9638 &contents[orig_dot], copy_size);
9639 orig_dot_copied = copy_size;
9640 dup_dot += copy_size;
9641 }
9642 virtual_action = TRUE;
9643 }
9644 else
9645 BFD_ASSERT (action->virtual_offset <= orig_dot_vo);
9646 }
9647 switch (action->action)
9648 {
9649 case ta_remove_literal:
9650 case ta_remove_insn:
9651 BFD_ASSERT (action->removed_bytes >= 0);
9652 orig_dot += action->removed_bytes;
9653 break;
9654
9655 case ta_narrow_insn:
9656 orig_insn_size = 3;
9657 copy_size = 2;
9658 memmove (scratch, &contents[orig_dot], orig_insn_size);
9659 BFD_ASSERT (action->removed_bytes == 1);
9660 rv = narrow_instruction (scratch, final_size, 0);
9661 BFD_ASSERT (rv);
9662 memmove (&dup_contents[dup_dot], scratch, copy_size);
9663 orig_dot += orig_insn_size;
9664 dup_dot += copy_size;
9665 break;
9666
9667 case ta_fill:
9668 if (action->removed_bytes >= 0)
9669 orig_dot += action->removed_bytes;
9670 else
9671 {
9672 /* Already zeroed in dup_contents. Just bump the
9673 counters. */
9674 dup_dot += (-action->removed_bytes);
9675 }
9676 break;
9677
9678 case ta_none:
9679 BFD_ASSERT (action->removed_bytes == 0);
9680 break;
9681
9682 case ta_convert_longcall:
9683 case ta_remove_longcall:
9684 /* These will be removed or converted before we get here. */
9685 BFD_ASSERT (0);
9686 break;
9687
9688 case ta_widen_insn:
9689 orig_insn_size = 2;
9690 copy_size = 3;
9691 memmove (scratch, &contents[orig_dot], orig_insn_size);
9692 BFD_ASSERT (action->removed_bytes == -1);
9693 rv = widen_instruction (scratch, final_size, 0);
9694 BFD_ASSERT (rv);
9695 memmove (&dup_contents[dup_dot], scratch, copy_size);
9696 orig_dot += orig_insn_size;
9697 dup_dot += copy_size;
9698 break;
9699
9700 case ta_add_literal:
9701 orig_insn_size = 0;
9702 copy_size = 4;
9703 BFD_ASSERT (action->removed_bytes == -4);
9704 /* TBD -- place the literal value here and insert
9705 into the table. */
9706 memset (&dup_contents[dup_dot], 0, 4);
9707 pin_internal_relocs (sec, internal_relocs);
9708 pin_contents (sec, contents);
9709
9710 if (!move_literal (abfd, link_info, sec, dup_dot, dup_contents,
9711 relax_info, &internal_relocs, &action->value))
9712 goto error_return;
9713
9714 if (virtual_action)
9715 orig_dot_vo += copy_size;
9716
9717 orig_dot += orig_insn_size;
9718 dup_dot += copy_size;
9719 break;
9720
9721 default:
9722 /* Not implemented yet. */
9723 BFD_ASSERT (0);
9724 break;
9725 }
9726
9727 BFD_ASSERT (dup_dot <= final_size);
9728 BFD_ASSERT (orig_dot <= orig_size);
9729 }
9730
9731 orig_dot += orig_dot_copied;
9732 orig_dot_copied = 0;
9733
9734 if (orig_dot != orig_size)
9735 {
9736 copy_size = orig_size - orig_dot;
9737 BFD_ASSERT (orig_size > orig_dot);
9738 BFD_ASSERT (dup_dot + copy_size == final_size);
9739 memmove (&dup_contents[dup_dot], &contents[orig_dot], copy_size);
9740 orig_dot += copy_size;
9741 dup_dot += copy_size;
9742 }
9743 BFD_ASSERT (orig_size == orig_dot);
9744 BFD_ASSERT (final_size == dup_dot);
9745
9746 /* Move the dup_contents back. */
9747 if (final_size > orig_size)
9748 {
9749 /* Contents need to be reallocated. Swap the dup_contents into
9750 contents. */
9751 sec->contents = dup_contents;
9752 free (contents);
9753 contents = dup_contents;
9754 pin_contents (sec, contents);
9755 }
9756 else
9757 {
9758 BFD_ASSERT (final_size <= orig_size);
9759 memset (contents, 0, orig_size);
9760 memcpy (contents, dup_contents, final_size);
9761 free (dup_contents);
9762 }
9763 free (scratch);
9764 pin_contents (sec, contents);
9765
9766 if (sec->rawsize == 0)
9767 sec->rawsize = sec->size;
9768 sec->size = final_size;
9769 }
9770
9771 error_return:
9772 release_internal_relocs (sec, internal_relocs);
9773 release_contents (sec, contents);
9774 return ok;
9775 }
9776
9777
9778 static bfd_boolean
9779 translate_section_fixes (asection *sec)
9780 {
9781 xtensa_relax_info *relax_info;
9782 reloc_bfd_fix *r;
9783
9784 relax_info = get_xtensa_relax_info (sec);
9785 if (!relax_info)
9786 return TRUE;
9787
9788 for (r = relax_info->fix_list; r != NULL; r = r->next)
9789 if (!translate_reloc_bfd_fix (r))
9790 return FALSE;
9791
9792 return TRUE;
9793 }
9794
9795
9796 /* Translate a fix given the mapping in the relax info for the target
9797 section. If it has already been translated, no work is required. */
9798
9799 static bfd_boolean
9800 translate_reloc_bfd_fix (reloc_bfd_fix *fix)
9801 {
9802 reloc_bfd_fix new_fix;
9803 asection *sec;
9804 xtensa_relax_info *relax_info;
9805 removed_literal *removed;
9806 bfd_vma new_offset, target_offset;
9807
9808 if (fix->translated)
9809 return TRUE;
9810
9811 sec = fix->target_sec;
9812 target_offset = fix->target_offset;
9813
9814 relax_info = get_xtensa_relax_info (sec);
9815 if (!relax_info)
9816 {
9817 fix->translated = TRUE;
9818 return TRUE;
9819 }
9820
9821 new_fix = *fix;
9822
9823 /* The fix does not need to be translated if the section cannot change. */
9824 if (!relax_info->is_relaxable_literal_section
9825 && !relax_info->is_relaxable_asm_section)
9826 {
9827 fix->translated = TRUE;
9828 return TRUE;
9829 }
9830
9831 /* If the literal has been moved and this relocation was on an
9832 opcode, then the relocation should move to the new literal
9833 location. Otherwise, the relocation should move within the
9834 section. */
9835
9836 removed = FALSE;
9837 if (is_operand_relocation (fix->src_type))
9838 {
9839 /* Check if the original relocation is against a literal being
9840 removed. */
9841 removed = find_removed_literal (&relax_info->removed_list,
9842 target_offset);
9843 }
9844
9845 if (removed)
9846 {
9847 asection *new_sec;
9848
9849 /* The fact that there is still a relocation to this literal indicates
9850 that the literal is being coalesced, not simply removed. */
9851 BFD_ASSERT (removed->to.abfd != NULL);
9852
9853 /* This was moved to some other address (possibly another section). */
9854 new_sec = r_reloc_get_section (&removed->to);
9855 if (new_sec != sec)
9856 {
9857 sec = new_sec;
9858 relax_info = get_xtensa_relax_info (sec);
9859 if (!relax_info ||
9860 (!relax_info->is_relaxable_literal_section
9861 && !relax_info->is_relaxable_asm_section))
9862 {
9863 target_offset = removed->to.target_offset;
9864 new_fix.target_sec = new_sec;
9865 new_fix.target_offset = target_offset;
9866 new_fix.translated = TRUE;
9867 *fix = new_fix;
9868 return TRUE;
9869 }
9870 }
9871 target_offset = removed->to.target_offset;
9872 new_fix.target_sec = new_sec;
9873 }
9874
9875 /* The target address may have been moved within its section. */
9876 new_offset = offset_with_removed_text (&relax_info->action_list,
9877 target_offset);
9878
9879 new_fix.target_offset = new_offset;
9880 new_fix.target_offset = new_offset;
9881 new_fix.translated = TRUE;
9882 *fix = new_fix;
9883 return TRUE;
9884 }
9885
9886
9887 /* Fix up a relocation to take account of removed literals. */
9888
9889 static asection *
9890 translate_reloc (const r_reloc *orig_rel, r_reloc *new_rel, asection *sec)
9891 {
9892 xtensa_relax_info *relax_info;
9893 removed_literal *removed;
9894 bfd_vma target_offset, base_offset;
9895
9896 *new_rel = *orig_rel;
9897
9898 if (!r_reloc_is_defined (orig_rel))
9899 return sec ;
9900
9901 relax_info = get_xtensa_relax_info (sec);
9902 BFD_ASSERT (relax_info && (relax_info->is_relaxable_literal_section
9903 || relax_info->is_relaxable_asm_section));
9904
9905 target_offset = orig_rel->target_offset;
9906
9907 removed = FALSE;
9908 if (is_operand_relocation (ELF32_R_TYPE (orig_rel->rela.r_info)))
9909 {
9910 /* Check if the original relocation is against a literal being
9911 removed. */
9912 removed = find_removed_literal (&relax_info->removed_list,
9913 target_offset);
9914 }
9915 if (removed && removed->to.abfd)
9916 {
9917 asection *new_sec;
9918
9919 /* The fact that there is still a relocation to this literal indicates
9920 that the literal is being coalesced, not simply removed. */
9921 BFD_ASSERT (removed->to.abfd != NULL);
9922
9923 /* This was moved to some other address
9924 (possibly in another section). */
9925 *new_rel = removed->to;
9926 new_sec = r_reloc_get_section (new_rel);
9927 if (new_sec != sec)
9928 {
9929 sec = new_sec;
9930 relax_info = get_xtensa_relax_info (sec);
9931 if (!relax_info
9932 || (!relax_info->is_relaxable_literal_section
9933 && !relax_info->is_relaxable_asm_section))
9934 return sec;
9935 }
9936 target_offset = new_rel->target_offset;
9937 }
9938
9939 /* Find the base offset of the reloc symbol, excluding any addend from the
9940 reloc or from the section contents (for a partial_inplace reloc). Then
9941 find the adjusted values of the offsets due to relaxation. The base
9942 offset is needed to determine the change to the reloc's addend; the reloc
9943 addend should not be adjusted due to relaxations located before the base
9944 offset. */
9945
9946 base_offset = r_reloc_get_target_offset (new_rel) - new_rel->rela.r_addend;
9947 if (base_offset <= target_offset)
9948 {
9949 int base_removed = removed_by_actions_map (&relax_info->action_list,
9950 base_offset, FALSE);
9951 int addend_removed = removed_by_actions_map (&relax_info->action_list,
9952 target_offset, FALSE) -
9953 base_removed;
9954
9955 new_rel->target_offset = target_offset - base_removed - addend_removed;
9956 new_rel->rela.r_addend -= addend_removed;
9957 }
9958 else
9959 {
9960 /* Handle a negative addend. The base offset comes first. */
9961 int tgt_removed = removed_by_actions_map (&relax_info->action_list,
9962 target_offset, FALSE);
9963 int addend_removed = removed_by_actions_map (&relax_info->action_list,
9964 base_offset, FALSE) -
9965 tgt_removed;
9966
9967 new_rel->target_offset = target_offset - tgt_removed;
9968 new_rel->rela.r_addend += addend_removed;
9969 }
9970
9971 return sec;
9972 }
9973
9974
9975 /* For dynamic links, there may be a dynamic relocation for each
9976 literal. The number of dynamic relocations must be computed in
9977 size_dynamic_sections, which occurs before relaxation. When a
9978 literal is removed, this function checks if there is a corresponding
9979 dynamic relocation and shrinks the size of the appropriate dynamic
9980 relocation section accordingly. At this point, the contents of the
9981 dynamic relocation sections have not yet been filled in, so there's
9982 nothing else that needs to be done. */
9983
9984 static void
9985 shrink_dynamic_reloc_sections (struct bfd_link_info *info,
9986 bfd *abfd,
9987 asection *input_section,
9988 Elf_Internal_Rela *rel)
9989 {
9990 struct elf_xtensa_link_hash_table *htab;
9991 Elf_Internal_Shdr *symtab_hdr;
9992 struct elf_link_hash_entry **sym_hashes;
9993 unsigned long r_symndx;
9994 int r_type;
9995 struct elf_link_hash_entry *h;
9996 bfd_boolean dynamic_symbol;
9997
9998 htab = elf_xtensa_hash_table (info);
9999 if (htab == NULL)
10000 return;
10001
10002 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10003 sym_hashes = elf_sym_hashes (abfd);
10004
10005 r_type = ELF32_R_TYPE (rel->r_info);
10006 r_symndx = ELF32_R_SYM (rel->r_info);
10007
10008 if (r_symndx < symtab_hdr->sh_info)
10009 h = NULL;
10010 else
10011 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
10012
10013 dynamic_symbol = elf_xtensa_dynamic_symbol_p (h, info);
10014
10015 if ((r_type == R_XTENSA_32 || r_type == R_XTENSA_PLT)
10016 && (input_section->flags & SEC_ALLOC) != 0
10017 && (dynamic_symbol || bfd_link_pic (info)))
10018 {
10019 asection *srel;
10020 bfd_boolean is_plt = FALSE;
10021
10022 if (dynamic_symbol && r_type == R_XTENSA_PLT)
10023 {
10024 srel = htab->elf.srelplt;
10025 is_plt = TRUE;
10026 }
10027 else
10028 srel = htab->elf.srelgot;
10029
10030 /* Reduce size of the .rela.* section by one reloc. */
10031 BFD_ASSERT (srel != NULL);
10032 BFD_ASSERT (srel->size >= sizeof (Elf32_External_Rela));
10033 srel->size -= sizeof (Elf32_External_Rela);
10034
10035 if (is_plt)
10036 {
10037 asection *splt, *sgotplt, *srelgot;
10038 int reloc_index, chunk;
10039
10040 /* Find the PLT reloc index of the entry being removed. This
10041 is computed from the size of ".rela.plt". It is needed to
10042 figure out which PLT chunk to resize. Usually "last index
10043 = size - 1" since the index starts at zero, but in this
10044 context, the size has just been decremented so there's no
10045 need to subtract one. */
10046 reloc_index = srel->size / sizeof (Elf32_External_Rela);
10047
10048 chunk = reloc_index / PLT_ENTRIES_PER_CHUNK;
10049 splt = elf_xtensa_get_plt_section (info, chunk);
10050 sgotplt = elf_xtensa_get_gotplt_section (info, chunk);
10051 BFD_ASSERT (splt != NULL && sgotplt != NULL);
10052
10053 /* Check if an entire PLT chunk has just been eliminated. */
10054 if (reloc_index % PLT_ENTRIES_PER_CHUNK == 0)
10055 {
10056 /* The two magic GOT entries for that chunk can go away. */
10057 srelgot = htab->elf.srelgot;
10058 BFD_ASSERT (srelgot != NULL);
10059 srelgot->reloc_count -= 2;
10060 srelgot->size -= 2 * sizeof (Elf32_External_Rela);
10061 sgotplt->size -= 8;
10062
10063 /* There should be only one entry left (and it will be
10064 removed below). */
10065 BFD_ASSERT (sgotplt->size == 4);
10066 BFD_ASSERT (splt->size == PLT_ENTRY_SIZE);
10067 }
10068
10069 BFD_ASSERT (sgotplt->size >= 4);
10070 BFD_ASSERT (splt->size >= PLT_ENTRY_SIZE);
10071
10072 sgotplt->size -= 4;
10073 splt->size -= PLT_ENTRY_SIZE;
10074 }
10075 }
10076 }
10077
10078
10079 /* Take an r_rel and move it to another section. This usually
10080 requires extending the interal_relocation array and pinning it. If
10081 the original r_rel is from the same BFD, we can complete this here.
10082 Otherwise, we add a fix record to let the final link fix the
10083 appropriate address. Contents and internal relocations for the
10084 section must be pinned after calling this routine. */
10085
10086 static bfd_boolean
10087 move_literal (bfd *abfd,
10088 struct bfd_link_info *link_info,
10089 asection *sec,
10090 bfd_vma offset,
10091 bfd_byte *contents,
10092 xtensa_relax_info *relax_info,
10093 Elf_Internal_Rela **internal_relocs_p,
10094 const literal_value *lit)
10095 {
10096 Elf_Internal_Rela *new_relocs = NULL;
10097 size_t new_relocs_count = 0;
10098 Elf_Internal_Rela this_rela;
10099 const r_reloc *r_rel;
10100
10101 r_rel = &lit->r_rel;
10102 BFD_ASSERT (elf_section_data (sec)->relocs == *internal_relocs_p);
10103
10104 if (r_reloc_is_const (r_rel))
10105 bfd_put_32 (abfd, lit->value, contents + offset);
10106 else
10107 {
10108 int r_type;
10109 unsigned i;
10110 reloc_bfd_fix *fix;
10111 unsigned insert_at;
10112
10113 r_type = ELF32_R_TYPE (r_rel->rela.r_info);
10114
10115 /* This is the difficult case. We have to create a fix up. */
10116 this_rela.r_offset = offset;
10117 this_rela.r_info = ELF32_R_INFO (0, r_type);
10118 this_rela.r_addend =
10119 r_rel->target_offset - r_reloc_get_target_offset (r_rel);
10120 bfd_put_32 (abfd, lit->value, contents + offset);
10121
10122 /* Currently, we cannot move relocations during a relocatable link. */
10123 BFD_ASSERT (!bfd_link_relocatable (link_info));
10124 fix = reloc_bfd_fix_init (sec, offset, r_type,
10125 r_reloc_get_section (r_rel),
10126 r_rel->target_offset + r_rel->virtual_offset,
10127 FALSE);
10128 /* We also need to mark that relocations are needed here. */
10129 sec->flags |= SEC_RELOC;
10130
10131 translate_reloc_bfd_fix (fix);
10132 /* This fix has not yet been translated. */
10133 add_fix (sec, fix);
10134
10135 /* Add the relocation. If we have already allocated our own
10136 space for the relocations and we have room for more, then use
10137 it. Otherwise, allocate new space and move the literals. */
10138 insert_at = sec->reloc_count;
10139 for (i = 0; i < sec->reloc_count; ++i)
10140 {
10141 if (this_rela.r_offset < (*internal_relocs_p)[i].r_offset)
10142 {
10143 insert_at = i;
10144 break;
10145 }
10146 }
10147
10148 if (*internal_relocs_p != relax_info->allocated_relocs
10149 || sec->reloc_count + 1 > relax_info->allocated_relocs_count)
10150 {
10151 BFD_ASSERT (relax_info->allocated_relocs == NULL
10152 || sec->reloc_count == relax_info->relocs_count);
10153
10154 if (relax_info->allocated_relocs_count == 0)
10155 new_relocs_count = (sec->reloc_count + 2) * 2;
10156 else
10157 new_relocs_count = (relax_info->allocated_relocs_count + 2) * 2;
10158
10159 new_relocs = (Elf_Internal_Rela *)
10160 bfd_zmalloc (sizeof (Elf_Internal_Rela) * (new_relocs_count));
10161 if (!new_relocs)
10162 return FALSE;
10163
10164 /* We could handle this more quickly by finding the split point. */
10165 if (insert_at != 0)
10166 memcpy (new_relocs, *internal_relocs_p,
10167 insert_at * sizeof (Elf_Internal_Rela));
10168
10169 new_relocs[insert_at] = this_rela;
10170
10171 if (insert_at != sec->reloc_count)
10172 memcpy (new_relocs + insert_at + 1,
10173 (*internal_relocs_p) + insert_at,
10174 (sec->reloc_count - insert_at)
10175 * sizeof (Elf_Internal_Rela));
10176
10177 if (*internal_relocs_p != relax_info->allocated_relocs)
10178 {
10179 /* The first time we re-allocate, we can only free the
10180 old relocs if they were allocated with bfd_malloc.
10181 This is not true when keep_memory is in effect. */
10182 if (!link_info->keep_memory)
10183 free (*internal_relocs_p);
10184 }
10185 else
10186 free (*internal_relocs_p);
10187 relax_info->allocated_relocs = new_relocs;
10188 relax_info->allocated_relocs_count = new_relocs_count;
10189 elf_section_data (sec)->relocs = new_relocs;
10190 sec->reloc_count++;
10191 relax_info->relocs_count = sec->reloc_count;
10192 *internal_relocs_p = new_relocs;
10193 }
10194 else
10195 {
10196 if (insert_at != sec->reloc_count)
10197 {
10198 unsigned idx;
10199 for (idx = sec->reloc_count; idx > insert_at; idx--)
10200 (*internal_relocs_p)[idx] = (*internal_relocs_p)[idx-1];
10201 }
10202 (*internal_relocs_p)[insert_at] = this_rela;
10203 sec->reloc_count++;
10204 if (relax_info->allocated_relocs)
10205 relax_info->relocs_count = sec->reloc_count;
10206 }
10207 }
10208 return TRUE;
10209 }
10210
10211
10212 /* This is similar to relax_section except that when a target is moved,
10213 we shift addresses up. We also need to modify the size. This
10214 algorithm does NOT allow for relocations into the middle of the
10215 property sections. */
10216
10217 static bfd_boolean
10218 relax_property_section (bfd *abfd,
10219 asection *sec,
10220 struct bfd_link_info *link_info)
10221 {
10222 Elf_Internal_Rela *internal_relocs;
10223 bfd_byte *contents;
10224 unsigned i;
10225 bfd_boolean ok = TRUE;
10226 bfd_boolean is_full_prop_section;
10227 size_t last_zfill_target_offset = 0;
10228 asection *last_zfill_target_sec = NULL;
10229 bfd_size_type sec_size;
10230 bfd_size_type entry_size;
10231
10232 sec_size = bfd_get_section_limit (abfd, sec);
10233 internal_relocs = retrieve_internal_relocs (abfd, sec,
10234 link_info->keep_memory);
10235 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
10236 if (contents == NULL && sec_size != 0)
10237 {
10238 ok = FALSE;
10239 goto error_return;
10240 }
10241
10242 is_full_prop_section = xtensa_is_proptable_section (sec);
10243 if (is_full_prop_section)
10244 entry_size = 12;
10245 else
10246 entry_size = 8;
10247
10248 if (internal_relocs)
10249 {
10250 for (i = 0; i < sec->reloc_count; i++)
10251 {
10252 Elf_Internal_Rela *irel;
10253 xtensa_relax_info *target_relax_info;
10254 unsigned r_type;
10255 asection *target_sec;
10256 literal_value val;
10257 bfd_byte *size_p, *flags_p;
10258
10259 /* Locally change the source address.
10260 Translate the target to the new target address.
10261 If it points to this section and has been removed, MOVE IT.
10262 Also, don't forget to modify the associated SIZE at
10263 (offset + 4). */
10264
10265 irel = &internal_relocs[i];
10266 r_type = ELF32_R_TYPE (irel->r_info);
10267 if (r_type == R_XTENSA_NONE)
10268 continue;
10269
10270 /* Find the literal value. */
10271 r_reloc_init (&val.r_rel, abfd, irel, contents, sec_size);
10272 size_p = &contents[irel->r_offset + 4];
10273 flags_p = NULL;
10274 if (is_full_prop_section)
10275 flags_p = &contents[irel->r_offset + 8];
10276 BFD_ASSERT (irel->r_offset + entry_size <= sec_size);
10277
10278 target_sec = r_reloc_get_section (&val.r_rel);
10279 target_relax_info = get_xtensa_relax_info (target_sec);
10280
10281 if (target_relax_info
10282 && (target_relax_info->is_relaxable_literal_section
10283 || target_relax_info->is_relaxable_asm_section ))
10284 {
10285 /* Translate the relocation's destination. */
10286 bfd_vma old_offset = val.r_rel.target_offset;
10287 bfd_vma new_offset;
10288 long old_size, new_size;
10289 int removed_by_old_offset =
10290 removed_by_actions_map (&target_relax_info->action_list,
10291 old_offset, FALSE);
10292 new_offset = old_offset - removed_by_old_offset;
10293
10294 /* Assert that we are not out of bounds. */
10295 old_size = bfd_get_32 (abfd, size_p);
10296 new_size = old_size;
10297
10298 if (old_size == 0)
10299 {
10300 /* Only the first zero-sized unreachable entry is
10301 allowed to expand. In this case the new offset
10302 should be the offset before the fill and the new
10303 size is the expansion size. For other zero-sized
10304 entries the resulting size should be zero with an
10305 offset before or after the fill address depending
10306 on whether the expanding unreachable entry
10307 preceeds it. */
10308 if (last_zfill_target_sec == 0
10309 || last_zfill_target_sec != target_sec
10310 || last_zfill_target_offset != old_offset)
10311 {
10312 bfd_vma new_end_offset = new_offset;
10313
10314 /* Recompute the new_offset, but this time don't
10315 include any fill inserted by relaxation. */
10316 removed_by_old_offset =
10317 removed_by_actions_map (&target_relax_info->action_list,
10318 old_offset, TRUE);
10319 new_offset = old_offset - removed_by_old_offset;
10320
10321 /* If it is not unreachable and we have not yet
10322 seen an unreachable at this address, place it
10323 before the fill address. */
10324 if (flags_p && (bfd_get_32 (abfd, flags_p)
10325 & XTENSA_PROP_UNREACHABLE) != 0)
10326 {
10327 new_size = new_end_offset - new_offset;
10328
10329 last_zfill_target_sec = target_sec;
10330 last_zfill_target_offset = old_offset;
10331 }
10332 }
10333 }
10334 else
10335 {
10336 int removed_by_old_offset_size =
10337 removed_by_actions_map (&target_relax_info->action_list,
10338 old_offset + old_size, TRUE);
10339 new_size -= removed_by_old_offset_size - removed_by_old_offset;
10340 }
10341
10342 if (new_size != old_size)
10343 {
10344 bfd_put_32 (abfd, new_size, size_p);
10345 pin_contents (sec, contents);
10346 }
10347
10348 if (new_offset != old_offset)
10349 {
10350 bfd_vma diff = new_offset - old_offset;
10351 irel->r_addend += diff;
10352 pin_internal_relocs (sec, internal_relocs);
10353 }
10354 }
10355 }
10356 }
10357
10358 /* Combine adjacent property table entries. This is also done in
10359 finish_dynamic_sections() but at that point it's too late to
10360 reclaim the space in the output section, so we do this twice. */
10361
10362 if (internal_relocs && (!bfd_link_relocatable (link_info)
10363 || xtensa_is_littable_section (sec)))
10364 {
10365 Elf_Internal_Rela *last_irel = NULL;
10366 Elf_Internal_Rela *irel, *next_rel, *rel_end;
10367 int removed_bytes = 0;
10368 bfd_vma offset;
10369 flagword predef_flags;
10370
10371 predef_flags = xtensa_get_property_predef_flags (sec);
10372
10373 /* Walk over memory and relocations at the same time.
10374 This REQUIRES that the internal_relocs be sorted by offset. */
10375 qsort (internal_relocs, sec->reloc_count, sizeof (Elf_Internal_Rela),
10376 internal_reloc_compare);
10377
10378 pin_internal_relocs (sec, internal_relocs);
10379 pin_contents (sec, contents);
10380
10381 next_rel = internal_relocs;
10382 rel_end = internal_relocs + sec->reloc_count;
10383
10384 BFD_ASSERT (sec->size % entry_size == 0);
10385
10386 for (offset = 0; offset < sec->size; offset += entry_size)
10387 {
10388 Elf_Internal_Rela *offset_rel, *extra_rel;
10389 bfd_vma bytes_to_remove, size, actual_offset;
10390 bfd_boolean remove_this_rel;
10391 flagword flags;
10392
10393 /* Find the first relocation for the entry at the current offset.
10394 Adjust the offsets of any extra relocations for the previous
10395 entry. */
10396 offset_rel = NULL;
10397 if (next_rel)
10398 {
10399 for (irel = next_rel; irel < rel_end; irel++)
10400 {
10401 if ((irel->r_offset == offset
10402 && ELF32_R_TYPE (irel->r_info) != R_XTENSA_NONE)
10403 || irel->r_offset > offset)
10404 {
10405 offset_rel = irel;
10406 break;
10407 }
10408 irel->r_offset -= removed_bytes;
10409 }
10410 }
10411
10412 /* Find the next relocation (if there are any left). */
10413 extra_rel = NULL;
10414 if (offset_rel)
10415 {
10416 for (irel = offset_rel + 1; irel < rel_end; irel++)
10417 {
10418 if (ELF32_R_TYPE (irel->r_info) != R_XTENSA_NONE)
10419 {
10420 extra_rel = irel;
10421 break;
10422 }
10423 }
10424 }
10425
10426 /* Check if there are relocations on the current entry. There
10427 should usually be a relocation on the offset field. If there
10428 are relocations on the size or flags, then we can't optimize
10429 this entry. Also, find the next relocation to examine on the
10430 next iteration. */
10431 if (offset_rel)
10432 {
10433 if (offset_rel->r_offset >= offset + entry_size)
10434 {
10435 next_rel = offset_rel;
10436 /* There are no relocations on the current entry, but we
10437 might still be able to remove it if the size is zero. */
10438 offset_rel = NULL;
10439 }
10440 else if (offset_rel->r_offset > offset
10441 || (extra_rel
10442 && extra_rel->r_offset < offset + entry_size))
10443 {
10444 /* There is a relocation on the size or flags, so we can't
10445 do anything with this entry. Continue with the next. */
10446 next_rel = offset_rel;
10447 continue;
10448 }
10449 else
10450 {
10451 BFD_ASSERT (offset_rel->r_offset == offset);
10452 offset_rel->r_offset -= removed_bytes;
10453 next_rel = offset_rel + 1;
10454 }
10455 }
10456 else
10457 next_rel = NULL;
10458
10459 remove_this_rel = FALSE;
10460 bytes_to_remove = 0;
10461 actual_offset = offset - removed_bytes;
10462 size = bfd_get_32 (abfd, &contents[actual_offset + 4]);
10463
10464 if (is_full_prop_section)
10465 flags = bfd_get_32 (abfd, &contents[actual_offset + 8]);
10466 else
10467 flags = predef_flags;
10468
10469 if (size == 0
10470 && (flags & XTENSA_PROP_ALIGN) == 0
10471 && (flags & XTENSA_PROP_UNREACHABLE) == 0)
10472 {
10473 /* Always remove entries with zero size and no alignment. */
10474 bytes_to_remove = entry_size;
10475 if (offset_rel)
10476 remove_this_rel = TRUE;
10477 }
10478 else if (offset_rel
10479 && ELF32_R_TYPE (offset_rel->r_info) == R_XTENSA_32)
10480 {
10481 if (last_irel)
10482 {
10483 flagword old_flags;
10484 bfd_vma old_size =
10485 bfd_get_32 (abfd, &contents[last_irel->r_offset + 4]);
10486 bfd_vma old_address =
10487 (last_irel->r_addend
10488 + bfd_get_32 (abfd, &contents[last_irel->r_offset]));
10489 bfd_vma new_address =
10490 (offset_rel->r_addend
10491 + bfd_get_32 (abfd, &contents[actual_offset]));
10492 if (is_full_prop_section)
10493 old_flags = bfd_get_32
10494 (abfd, &contents[last_irel->r_offset + 8]);
10495 else
10496 old_flags = predef_flags;
10497
10498 if ((ELF32_R_SYM (offset_rel->r_info)
10499 == ELF32_R_SYM (last_irel->r_info))
10500 && old_address + old_size == new_address
10501 && old_flags == flags
10502 && (old_flags & XTENSA_PROP_INSN_BRANCH_TARGET) == 0
10503 && (old_flags & XTENSA_PROP_INSN_LOOP_TARGET) == 0)
10504 {
10505 /* Fix the old size. */
10506 bfd_put_32 (abfd, old_size + size,
10507 &contents[last_irel->r_offset + 4]);
10508 bytes_to_remove = entry_size;
10509 remove_this_rel = TRUE;
10510 }
10511 else
10512 last_irel = offset_rel;
10513 }
10514 else
10515 last_irel = offset_rel;
10516 }
10517
10518 if (remove_this_rel)
10519 {
10520 offset_rel->r_info = ELF32_R_INFO (0, R_XTENSA_NONE);
10521 offset_rel->r_offset = 0;
10522 }
10523
10524 if (bytes_to_remove != 0)
10525 {
10526 removed_bytes += bytes_to_remove;
10527 if (offset + bytes_to_remove < sec->size)
10528 memmove (&contents[actual_offset],
10529 &contents[actual_offset + bytes_to_remove],
10530 sec->size - offset - bytes_to_remove);
10531 }
10532 }
10533
10534 if (removed_bytes)
10535 {
10536 /* Fix up any extra relocations on the last entry. */
10537 for (irel = next_rel; irel < rel_end; irel++)
10538 irel->r_offset -= removed_bytes;
10539
10540 /* Clear the removed bytes. */
10541 memset (&contents[sec->size - removed_bytes], 0, removed_bytes);
10542
10543 if (sec->rawsize == 0)
10544 sec->rawsize = sec->size;
10545 sec->size -= removed_bytes;
10546
10547 if (xtensa_is_littable_section (sec))
10548 {
10549 asection *sgotloc = elf_xtensa_hash_table (link_info)->sgotloc;
10550 if (sgotloc)
10551 sgotloc->size -= removed_bytes;
10552 }
10553 }
10554 }
10555
10556 error_return:
10557 release_internal_relocs (sec, internal_relocs);
10558 release_contents (sec, contents);
10559 return ok;
10560 }
10561
10562 \f
10563 /* Third relaxation pass. */
10564
10565 /* Change symbol values to account for removed literals. */
10566
10567 bfd_boolean
10568 relax_section_symbols (bfd *abfd, asection *sec)
10569 {
10570 xtensa_relax_info *relax_info;
10571 unsigned int sec_shndx;
10572 Elf_Internal_Shdr *symtab_hdr;
10573 Elf_Internal_Sym *isymbuf;
10574 unsigned i, num_syms, num_locals;
10575
10576 relax_info = get_xtensa_relax_info (sec);
10577 BFD_ASSERT (relax_info);
10578
10579 if (!relax_info->is_relaxable_literal_section
10580 && !relax_info->is_relaxable_asm_section)
10581 return TRUE;
10582
10583 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
10584
10585 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10586 isymbuf = retrieve_local_syms (abfd);
10587
10588 num_syms = symtab_hdr->sh_size / sizeof (Elf32_External_Sym);
10589 num_locals = symtab_hdr->sh_info;
10590
10591 /* Adjust the local symbols defined in this section. */
10592 for (i = 0; i < num_locals; i++)
10593 {
10594 Elf_Internal_Sym *isym = &isymbuf[i];
10595
10596 if (isym->st_shndx == sec_shndx)
10597 {
10598 bfd_vma orig_addr = isym->st_value;
10599 int removed = removed_by_actions_map (&relax_info->action_list,
10600 orig_addr, FALSE);
10601
10602 isym->st_value -= removed;
10603 if (ELF32_ST_TYPE (isym->st_info) == STT_FUNC)
10604 isym->st_size -=
10605 removed_by_actions_map (&relax_info->action_list,
10606 orig_addr + isym->st_size, FALSE) -
10607 removed;
10608 }
10609 }
10610
10611 /* Now adjust the global symbols defined in this section. */
10612 for (i = 0; i < (num_syms - num_locals); i++)
10613 {
10614 struct elf_link_hash_entry *sym_hash;
10615
10616 sym_hash = elf_sym_hashes (abfd)[i];
10617
10618 if (sym_hash->root.type == bfd_link_hash_warning)
10619 sym_hash = (struct elf_link_hash_entry *) sym_hash->root.u.i.link;
10620
10621 if ((sym_hash->root.type == bfd_link_hash_defined
10622 || sym_hash->root.type == bfd_link_hash_defweak)
10623 && sym_hash->root.u.def.section == sec)
10624 {
10625 bfd_vma orig_addr = sym_hash->root.u.def.value;
10626 int removed = removed_by_actions_map (&relax_info->action_list,
10627 orig_addr, FALSE);
10628
10629 sym_hash->root.u.def.value -= removed;
10630
10631 if (sym_hash->type == STT_FUNC)
10632 sym_hash->size -=
10633 removed_by_actions_map (&relax_info->action_list,
10634 orig_addr + sym_hash->size, FALSE) -
10635 removed;
10636 }
10637 }
10638
10639 return TRUE;
10640 }
10641
10642 \f
10643 /* "Fix" handling functions, called while performing relocations. */
10644
10645 static bfd_boolean
10646 do_fix_for_relocatable_link (Elf_Internal_Rela *rel,
10647 bfd *input_bfd,
10648 asection *input_section,
10649 bfd_byte *contents)
10650 {
10651 r_reloc r_rel;
10652 asection *sec, *old_sec;
10653 bfd_vma old_offset;
10654 int r_type = ELF32_R_TYPE (rel->r_info);
10655 reloc_bfd_fix *fix;
10656
10657 if (r_type == R_XTENSA_NONE)
10658 return TRUE;
10659
10660 fix = get_bfd_fix (input_section, rel->r_offset, r_type);
10661 if (!fix)
10662 return TRUE;
10663
10664 r_reloc_init (&r_rel, input_bfd, rel, contents,
10665 bfd_get_section_limit (input_bfd, input_section));
10666 old_sec = r_reloc_get_section (&r_rel);
10667 old_offset = r_rel.target_offset;
10668
10669 if (!old_sec || !r_reloc_is_defined (&r_rel))
10670 {
10671 if (r_type != R_XTENSA_ASM_EXPAND)
10672 {
10673 _bfd_error_handler
10674 /* xgettext:c-format */
10675 (_("%pB(%pA+%#" PRIx64 "): unexpected fix for %s relocation"),
10676 input_bfd, input_section, (uint64_t) rel->r_offset,
10677 elf_howto_table[r_type].name);
10678 return FALSE;
10679 }
10680 /* Leave it be. Resolution will happen in a later stage. */
10681 }
10682 else
10683 {
10684 sec = fix->target_sec;
10685 rel->r_addend += ((sec->output_offset + fix->target_offset)
10686 - (old_sec->output_offset + old_offset));
10687 }
10688 return TRUE;
10689 }
10690
10691
10692 static void
10693 do_fix_for_final_link (Elf_Internal_Rela *rel,
10694 bfd *input_bfd,
10695 asection *input_section,
10696 bfd_byte *contents,
10697 bfd_vma *relocationp)
10698 {
10699 asection *sec;
10700 int r_type = ELF32_R_TYPE (rel->r_info);
10701 reloc_bfd_fix *fix;
10702 bfd_vma fixup_diff;
10703
10704 if (r_type == R_XTENSA_NONE)
10705 return;
10706
10707 fix = get_bfd_fix (input_section, rel->r_offset, r_type);
10708 if (!fix)
10709 return;
10710
10711 sec = fix->target_sec;
10712
10713 fixup_diff = rel->r_addend;
10714 if (elf_howto_table[fix->src_type].partial_inplace)
10715 {
10716 bfd_vma inplace_val;
10717 BFD_ASSERT (fix->src_offset
10718 < bfd_get_section_limit (input_bfd, input_section));
10719 inplace_val = bfd_get_32 (input_bfd, &contents[fix->src_offset]);
10720 fixup_diff += inplace_val;
10721 }
10722
10723 *relocationp = (sec->output_section->vma
10724 + sec->output_offset
10725 + fix->target_offset - fixup_diff);
10726 }
10727
10728 \f
10729 /* Miscellaneous utility functions.... */
10730
10731 static asection *
10732 elf_xtensa_get_plt_section (struct bfd_link_info *info, int chunk)
10733 {
10734 bfd *dynobj;
10735 char plt_name[17];
10736
10737 if (chunk == 0)
10738 return elf_hash_table (info)->splt;
10739
10740 dynobj = elf_hash_table (info)->dynobj;
10741 sprintf (plt_name, ".plt.%u", chunk);
10742 return bfd_get_linker_section (dynobj, plt_name);
10743 }
10744
10745
10746 static asection *
10747 elf_xtensa_get_gotplt_section (struct bfd_link_info *info, int chunk)
10748 {
10749 bfd *dynobj;
10750 char got_name[21];
10751
10752 if (chunk == 0)
10753 return elf_hash_table (info)->sgotplt;
10754
10755 dynobj = elf_hash_table (info)->dynobj;
10756 sprintf (got_name, ".got.plt.%u", chunk);
10757 return bfd_get_linker_section (dynobj, got_name);
10758 }
10759
10760
10761 /* Get the input section for a given symbol index.
10762 If the symbol is:
10763 . a section symbol, return the section;
10764 . a common symbol, return the common section;
10765 . an undefined symbol, return the undefined section;
10766 . an indirect symbol, follow the links;
10767 . an absolute value, return the absolute section. */
10768
10769 static asection *
10770 get_elf_r_symndx_section (bfd *abfd, unsigned long r_symndx)
10771 {
10772 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10773 asection *target_sec = NULL;
10774 if (r_symndx < symtab_hdr->sh_info)
10775 {
10776 Elf_Internal_Sym *isymbuf;
10777 unsigned int section_index;
10778
10779 isymbuf = retrieve_local_syms (abfd);
10780 section_index = isymbuf[r_symndx].st_shndx;
10781
10782 if (section_index == SHN_UNDEF)
10783 target_sec = bfd_und_section_ptr;
10784 else if (section_index == SHN_ABS)
10785 target_sec = bfd_abs_section_ptr;
10786 else if (section_index == SHN_COMMON)
10787 target_sec = bfd_com_section_ptr;
10788 else
10789 target_sec = bfd_section_from_elf_index (abfd, section_index);
10790 }
10791 else
10792 {
10793 unsigned long indx = r_symndx - symtab_hdr->sh_info;
10794 struct elf_link_hash_entry *h = elf_sym_hashes (abfd)[indx];
10795
10796 while (h->root.type == bfd_link_hash_indirect
10797 || h->root.type == bfd_link_hash_warning)
10798 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10799
10800 switch (h->root.type)
10801 {
10802 case bfd_link_hash_defined:
10803 case bfd_link_hash_defweak:
10804 target_sec = h->root.u.def.section;
10805 break;
10806 case bfd_link_hash_common:
10807 target_sec = bfd_com_section_ptr;
10808 break;
10809 case bfd_link_hash_undefined:
10810 case bfd_link_hash_undefweak:
10811 target_sec = bfd_und_section_ptr;
10812 break;
10813 default: /* New indirect warning. */
10814 target_sec = bfd_und_section_ptr;
10815 break;
10816 }
10817 }
10818 return target_sec;
10819 }
10820
10821
10822 static struct elf_link_hash_entry *
10823 get_elf_r_symndx_hash_entry (bfd *abfd, unsigned long r_symndx)
10824 {
10825 unsigned long indx;
10826 struct elf_link_hash_entry *h;
10827 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10828
10829 if (r_symndx < symtab_hdr->sh_info)
10830 return NULL;
10831
10832 indx = r_symndx - symtab_hdr->sh_info;
10833 h = elf_sym_hashes (abfd)[indx];
10834 while (h->root.type == bfd_link_hash_indirect
10835 || h->root.type == bfd_link_hash_warning)
10836 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10837 return h;
10838 }
10839
10840
10841 /* Get the section-relative offset for a symbol number. */
10842
10843 static bfd_vma
10844 get_elf_r_symndx_offset (bfd *abfd, unsigned long r_symndx)
10845 {
10846 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10847 bfd_vma offset = 0;
10848
10849 if (r_symndx < symtab_hdr->sh_info)
10850 {
10851 Elf_Internal_Sym *isymbuf;
10852 isymbuf = retrieve_local_syms (abfd);
10853 offset = isymbuf[r_symndx].st_value;
10854 }
10855 else
10856 {
10857 unsigned long indx = r_symndx - symtab_hdr->sh_info;
10858 struct elf_link_hash_entry *h =
10859 elf_sym_hashes (abfd)[indx];
10860
10861 while (h->root.type == bfd_link_hash_indirect
10862 || h->root.type == bfd_link_hash_warning)
10863 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10864 if (h->root.type == bfd_link_hash_defined
10865 || h->root.type == bfd_link_hash_defweak)
10866 offset = h->root.u.def.value;
10867 }
10868 return offset;
10869 }
10870
10871
10872 static bfd_boolean
10873 is_reloc_sym_weak (bfd *abfd, Elf_Internal_Rela *rel)
10874 {
10875 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
10876 struct elf_link_hash_entry *h;
10877
10878 h = get_elf_r_symndx_hash_entry (abfd, r_symndx);
10879 if (h && h->root.type == bfd_link_hash_defweak)
10880 return TRUE;
10881 return FALSE;
10882 }
10883
10884
10885 static bfd_boolean
10886 pcrel_reloc_fits (xtensa_opcode opc,
10887 int opnd,
10888 bfd_vma self_address,
10889 bfd_vma dest_address)
10890 {
10891 xtensa_isa isa = xtensa_default_isa;
10892 uint32 valp = dest_address;
10893 if (xtensa_operand_do_reloc (isa, opc, opnd, &valp, self_address)
10894 || xtensa_operand_encode (isa, opc, opnd, &valp))
10895 return FALSE;
10896 return TRUE;
10897 }
10898
10899
10900 static bfd_boolean
10901 xtensa_is_property_section (asection *sec)
10902 {
10903 if (xtensa_is_insntable_section (sec)
10904 || xtensa_is_littable_section (sec)
10905 || xtensa_is_proptable_section (sec))
10906 return TRUE;
10907
10908 return FALSE;
10909 }
10910
10911
10912 static bfd_boolean
10913 xtensa_is_insntable_section (asection *sec)
10914 {
10915 if (CONST_STRNEQ (sec->name, XTENSA_INSN_SEC_NAME)
10916 || CONST_STRNEQ (sec->name, ".gnu.linkonce.x."))
10917 return TRUE;
10918
10919 return FALSE;
10920 }
10921
10922
10923 static bfd_boolean
10924 xtensa_is_littable_section (asection *sec)
10925 {
10926 if (CONST_STRNEQ (sec->name, XTENSA_LIT_SEC_NAME)
10927 || CONST_STRNEQ (sec->name, ".gnu.linkonce.p."))
10928 return TRUE;
10929
10930 return FALSE;
10931 }
10932
10933
10934 static bfd_boolean
10935 xtensa_is_proptable_section (asection *sec)
10936 {
10937 if (CONST_STRNEQ (sec->name, XTENSA_PROP_SEC_NAME)
10938 || CONST_STRNEQ (sec->name, ".gnu.linkonce.prop."))
10939 return TRUE;
10940
10941 return FALSE;
10942 }
10943
10944
10945 static int
10946 internal_reloc_compare (const void *ap, const void *bp)
10947 {
10948 const Elf_Internal_Rela *a = (const Elf_Internal_Rela *) ap;
10949 const Elf_Internal_Rela *b = (const Elf_Internal_Rela *) bp;
10950
10951 if (a->r_offset != b->r_offset)
10952 return (a->r_offset - b->r_offset);
10953
10954 /* We don't need to sort on these criteria for correctness,
10955 but enforcing a more strict ordering prevents unstable qsort
10956 from behaving differently with different implementations.
10957 Without the code below we get correct but different results
10958 on Solaris 2.7 and 2.8. We would like to always produce the
10959 same results no matter the host. */
10960
10961 if (a->r_info != b->r_info)
10962 return (a->r_info - b->r_info);
10963
10964 return (a->r_addend - b->r_addend);
10965 }
10966
10967
10968 static int
10969 internal_reloc_matches (const void *ap, const void *bp)
10970 {
10971 const Elf_Internal_Rela *a = (const Elf_Internal_Rela *) ap;
10972 const Elf_Internal_Rela *b = (const Elf_Internal_Rela *) bp;
10973
10974 /* Check if one entry overlaps with the other; this shouldn't happen
10975 except when searching for a match. */
10976 return (a->r_offset - b->r_offset);
10977 }
10978
10979
10980 /* Predicate function used to look up a section in a particular group. */
10981
10982 static bfd_boolean
10983 match_section_group (bfd *abfd ATTRIBUTE_UNUSED, asection *sec, void *inf)
10984 {
10985 const char *gname = inf;
10986 const char *group_name = elf_group_name (sec);
10987
10988 return (group_name == gname
10989 || (group_name != NULL
10990 && gname != NULL
10991 && strcmp (group_name, gname) == 0));
10992 }
10993
10994
10995 static char *
10996 xtensa_add_names (const char *base, const char *suffix)
10997 {
10998 if (suffix)
10999 {
11000 size_t base_len = strlen (base);
11001 size_t suffix_len = strlen (suffix);
11002 char *str = bfd_malloc (base_len + suffix_len + 1);
11003
11004 memcpy (str, base, base_len);
11005 memcpy (str + base_len, suffix, suffix_len + 1);
11006 return str;
11007 }
11008 else
11009 {
11010 return strdup (base);
11011 }
11012 }
11013
11014 static int linkonce_len = sizeof (".gnu.linkonce.") - 1;
11015
11016 static char *
11017 xtensa_property_section_name (asection *sec, const char *base_name,
11018 bfd_boolean separate_sections)
11019 {
11020 const char *suffix, *group_name;
11021 char *prop_sec_name;
11022
11023 group_name = elf_group_name (sec);
11024 if (group_name)
11025 {
11026 suffix = strrchr (sec->name, '.');
11027 if (suffix == sec->name)
11028 suffix = 0;
11029 prop_sec_name = xtensa_add_names (base_name, suffix);
11030 }
11031 else if (strncmp (sec->name, ".gnu.linkonce.", linkonce_len) == 0)
11032 {
11033 char *linkonce_kind = 0;
11034
11035 if (strcmp (base_name, XTENSA_INSN_SEC_NAME) == 0)
11036 linkonce_kind = "x.";
11037 else if (strcmp (base_name, XTENSA_LIT_SEC_NAME) == 0)
11038 linkonce_kind = "p.";
11039 else if (strcmp (base_name, XTENSA_PROP_SEC_NAME) == 0)
11040 linkonce_kind = "prop.";
11041 else
11042 abort ();
11043
11044 prop_sec_name = (char *) bfd_malloc (strlen (sec->name)
11045 + strlen (linkonce_kind) + 1);
11046 memcpy (prop_sec_name, ".gnu.linkonce.", linkonce_len);
11047 strcpy (prop_sec_name + linkonce_len, linkonce_kind);
11048
11049 suffix = sec->name + linkonce_len;
11050 /* For backward compatibility, replace "t." instead of inserting
11051 the new linkonce_kind (but not for "prop" sections). */
11052 if (CONST_STRNEQ (suffix, "t.") && linkonce_kind[1] == '.')
11053 suffix += 2;
11054 strcat (prop_sec_name + linkonce_len, suffix);
11055 }
11056 else
11057 {
11058 prop_sec_name = xtensa_add_names (base_name,
11059 separate_sections ? sec->name : NULL);
11060 }
11061
11062 return prop_sec_name;
11063 }
11064
11065
11066 static asection *
11067 xtensa_get_separate_property_section (asection *sec, const char *base_name,
11068 bfd_boolean separate_section)
11069 {
11070 char *prop_sec_name;
11071 asection *prop_sec;
11072
11073 prop_sec_name = xtensa_property_section_name (sec, base_name,
11074 separate_section);
11075 prop_sec = bfd_get_section_by_name_if (sec->owner, prop_sec_name,
11076 match_section_group,
11077 (void *) elf_group_name (sec));
11078 free (prop_sec_name);
11079 return prop_sec;
11080 }
11081
11082 static asection *
11083 xtensa_get_property_section (asection *sec, const char *base_name)
11084 {
11085 asection *prop_sec;
11086
11087 /* Try individual property section first. */
11088 prop_sec = xtensa_get_separate_property_section (sec, base_name, TRUE);
11089
11090 /* Refer to a common property section if individual is not present. */
11091 if (!prop_sec)
11092 prop_sec = xtensa_get_separate_property_section (sec, base_name, FALSE);
11093
11094 return prop_sec;
11095 }
11096
11097
11098 asection *
11099 xtensa_make_property_section (asection *sec, const char *base_name)
11100 {
11101 char *prop_sec_name;
11102 asection *prop_sec;
11103
11104 /* Check if the section already exists. */
11105 prop_sec_name = xtensa_property_section_name (sec, base_name,
11106 elf32xtensa_separate_props);
11107 prop_sec = bfd_get_section_by_name_if (sec->owner, prop_sec_name,
11108 match_section_group,
11109 (void *) elf_group_name (sec));
11110 /* If not, create it. */
11111 if (! prop_sec)
11112 {
11113 flagword flags = (SEC_RELOC | SEC_HAS_CONTENTS | SEC_READONLY);
11114 flags |= (bfd_get_section_flags (sec->owner, sec)
11115 & (SEC_LINK_ONCE | SEC_LINK_DUPLICATES));
11116
11117 prop_sec = bfd_make_section_anyway_with_flags
11118 (sec->owner, strdup (prop_sec_name), flags);
11119 if (! prop_sec)
11120 return 0;
11121
11122 elf_group_name (prop_sec) = elf_group_name (sec);
11123 }
11124
11125 free (prop_sec_name);
11126 return prop_sec;
11127 }
11128
11129
11130 flagword
11131 xtensa_get_property_predef_flags (asection *sec)
11132 {
11133 if (xtensa_is_insntable_section (sec))
11134 return (XTENSA_PROP_INSN
11135 | XTENSA_PROP_NO_TRANSFORM
11136 | XTENSA_PROP_INSN_NO_REORDER);
11137
11138 if (xtensa_is_littable_section (sec))
11139 return (XTENSA_PROP_LITERAL
11140 | XTENSA_PROP_NO_TRANSFORM
11141 | XTENSA_PROP_INSN_NO_REORDER);
11142
11143 return 0;
11144 }
11145
11146 \f
11147 /* Other functions called directly by the linker. */
11148
11149 bfd_boolean
11150 xtensa_callback_required_dependence (bfd *abfd,
11151 asection *sec,
11152 struct bfd_link_info *link_info,
11153 deps_callback_t callback,
11154 void *closure)
11155 {
11156 Elf_Internal_Rela *internal_relocs;
11157 bfd_byte *contents;
11158 unsigned i;
11159 bfd_boolean ok = TRUE;
11160 bfd_size_type sec_size;
11161
11162 sec_size = bfd_get_section_limit (abfd, sec);
11163
11164 /* ".plt*" sections have no explicit relocations but they contain L32R
11165 instructions that reference the corresponding ".got.plt*" sections. */
11166 if ((sec->flags & SEC_LINKER_CREATED) != 0
11167 && CONST_STRNEQ (sec->name, ".plt"))
11168 {
11169 asection *sgotplt;
11170
11171 /* Find the corresponding ".got.plt*" section. */
11172 if (sec->name[4] == '\0')
11173 sgotplt = elf_hash_table (link_info)->sgotplt;
11174 else
11175 {
11176 char got_name[14];
11177 int chunk = 0;
11178
11179 BFD_ASSERT (sec->name[4] == '.');
11180 chunk = strtol (&sec->name[5], NULL, 10);
11181
11182 sprintf (got_name, ".got.plt.%u", chunk);
11183 sgotplt = bfd_get_linker_section (sec->owner, got_name);
11184 }
11185 BFD_ASSERT (sgotplt);
11186
11187 /* Assume worst-case offsets: L32R at the very end of the ".plt"
11188 section referencing a literal at the very beginning of
11189 ".got.plt". This is very close to the real dependence, anyway. */
11190 (*callback) (sec, sec_size, sgotplt, 0, closure);
11191 }
11192
11193 /* Only ELF files are supported for Xtensa. Check here to avoid a segfault
11194 when building uclibc, which runs "ld -b binary /dev/null". */
11195 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
11196 return ok;
11197
11198 internal_relocs = retrieve_internal_relocs (abfd, sec,
11199 link_info->keep_memory);
11200 if (internal_relocs == NULL
11201 || sec->reloc_count == 0)
11202 return ok;
11203
11204 /* Cache the contents for the duration of this scan. */
11205 contents = retrieve_contents (abfd, sec, link_info->keep_memory);
11206 if (contents == NULL && sec_size != 0)
11207 {
11208 ok = FALSE;
11209 goto error_return;
11210 }
11211
11212 if (!xtensa_default_isa)
11213 xtensa_default_isa = xtensa_isa_init (0, 0);
11214
11215 for (i = 0; i < sec->reloc_count; i++)
11216 {
11217 Elf_Internal_Rela *irel = &internal_relocs[i];
11218 if (is_l32r_relocation (abfd, sec, contents, irel))
11219 {
11220 r_reloc l32r_rel;
11221 asection *target_sec;
11222 bfd_vma target_offset;
11223
11224 r_reloc_init (&l32r_rel, abfd, irel, contents, sec_size);
11225 target_sec = NULL;
11226 target_offset = 0;
11227 /* L32Rs must be local to the input file. */
11228 if (r_reloc_is_defined (&l32r_rel))
11229 {
11230 target_sec = r_reloc_get_section (&l32r_rel);
11231 target_offset = l32r_rel.target_offset;
11232 }
11233 (*callback) (sec, irel->r_offset, target_sec, target_offset,
11234 closure);
11235 }
11236 }
11237
11238 error_return:
11239 release_internal_relocs (sec, internal_relocs);
11240 release_contents (sec, contents);
11241 return ok;
11242 }
11243
11244 /* The default literal sections should always be marked as "code" (i.e.,
11245 SHF_EXECINSTR). This is particularly important for the Linux kernel
11246 module loader so that the literals are not placed after the text. */
11247 static const struct bfd_elf_special_section elf_xtensa_special_sections[] =
11248 {
11249 { STRING_COMMA_LEN (".fini.literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
11250 { STRING_COMMA_LEN (".init.literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
11251 { STRING_COMMA_LEN (".literal"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
11252 { STRING_COMMA_LEN (".xtensa.info"), 0, SHT_NOTE, 0 },
11253 { NULL, 0, 0, 0, 0 }
11254 };
11255 \f
11256 #define ELF_TARGET_ID XTENSA_ELF_DATA
11257 #ifndef ELF_ARCH
11258 #define TARGET_LITTLE_SYM xtensa_elf32_le_vec
11259 #define TARGET_LITTLE_NAME "elf32-xtensa-le"
11260 #define TARGET_BIG_SYM xtensa_elf32_be_vec
11261 #define TARGET_BIG_NAME "elf32-xtensa-be"
11262 #define ELF_ARCH bfd_arch_xtensa
11263
11264 #define ELF_MACHINE_CODE EM_XTENSA
11265 #define ELF_MACHINE_ALT1 EM_XTENSA_OLD
11266
11267 #define ELF_MAXPAGESIZE 0x1000
11268 #endif /* ELF_ARCH */
11269
11270 #define elf_backend_can_gc_sections 1
11271 #define elf_backend_can_refcount 1
11272 #define elf_backend_plt_readonly 1
11273 #define elf_backend_got_header_size 4
11274 #define elf_backend_want_dynbss 0
11275 #define elf_backend_want_got_plt 1
11276 #define elf_backend_dtrel_excludes_plt 1
11277
11278 #define elf_info_to_howto elf_xtensa_info_to_howto_rela
11279
11280 #define bfd_elf32_mkobject elf_xtensa_mkobject
11281
11282 #define bfd_elf32_bfd_merge_private_bfd_data elf_xtensa_merge_private_bfd_data
11283 #define bfd_elf32_new_section_hook elf_xtensa_new_section_hook
11284 #define bfd_elf32_bfd_print_private_bfd_data elf_xtensa_print_private_bfd_data
11285 #define bfd_elf32_bfd_relax_section elf_xtensa_relax_section
11286 #define bfd_elf32_bfd_reloc_type_lookup elf_xtensa_reloc_type_lookup
11287 #define bfd_elf32_bfd_reloc_name_lookup \
11288 elf_xtensa_reloc_name_lookup
11289 #define bfd_elf32_bfd_set_private_flags elf_xtensa_set_private_flags
11290 #define bfd_elf32_bfd_link_hash_table_create elf_xtensa_link_hash_table_create
11291
11292 #define elf_backend_adjust_dynamic_symbol elf_xtensa_adjust_dynamic_symbol
11293 #define elf_backend_check_relocs elf_xtensa_check_relocs
11294 #define elf_backend_create_dynamic_sections elf_xtensa_create_dynamic_sections
11295 #define elf_backend_discard_info elf_xtensa_discard_info
11296 #define elf_backend_ignore_discarded_relocs elf_xtensa_ignore_discarded_relocs
11297 #define elf_backend_final_write_processing elf_xtensa_final_write_processing
11298 #define elf_backend_finish_dynamic_sections elf_xtensa_finish_dynamic_sections
11299 #define elf_backend_finish_dynamic_symbol elf_xtensa_finish_dynamic_symbol
11300 #define elf_backend_gc_mark_hook elf_xtensa_gc_mark_hook
11301 #define elf_backend_grok_prstatus elf_xtensa_grok_prstatus
11302 #define elf_backend_grok_psinfo elf_xtensa_grok_psinfo
11303 #define elf_backend_hide_symbol elf_xtensa_hide_symbol
11304 #define elf_backend_object_p elf_xtensa_object_p
11305 #define elf_backend_reloc_type_class elf_xtensa_reloc_type_class
11306 #define elf_backend_relocate_section elf_xtensa_relocate_section
11307 #define elf_backend_size_dynamic_sections elf_xtensa_size_dynamic_sections
11308 #define elf_backend_always_size_sections elf_xtensa_always_size_sections
11309 #define elf_backend_omit_section_dynsym _bfd_elf_omit_section_dynsym_all
11310 #define elf_backend_special_sections elf_xtensa_special_sections
11311 #define elf_backend_action_discarded elf_xtensa_action_discarded
11312 #define elf_backend_copy_indirect_symbol elf_xtensa_copy_indirect_symbol
11313
11314 #include "elf32-target.h"
This page took 0.451228 seconds and 5 git commands to generate.