1 /* Xtensa-specific support for 32-bit ELF.
2 Copyright (C) 2003-2014 Free Software Foundation, Inc.
4 This file is part of BFD, the Binary File Descriptor library.
6 This program is free software; you can redistribute it and/or
7 modify it under the terms of the GNU General Public License as
8 published by the Free Software Foundation; either version 3 of the
9 License, or (at your option) any later version.
11 This program is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
30 #include "elf/xtensa.h"
31 #include "xtensa-isa.h"
32 #include "xtensa-config.h"
34 #define XTENSA_NO_NOP_REMOVAL 0
36 /* Local helper functions. */
38 static bfd_boolean
add_extra_plt_sections (struct bfd_link_info
*, int);
39 static char *vsprint_msg (const char *, const char *, int, ...) ATTRIBUTE_PRINTF(2,4);
40 static bfd_reloc_status_type bfd_elf_xtensa_reloc
41 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
42 static bfd_boolean do_fix_for_relocatable_link
43 (Elf_Internal_Rela
*, bfd
*, asection
*, bfd_byte
*);
44 static void do_fix_for_final_link
45 (Elf_Internal_Rela
*, bfd
*, asection
*, bfd_byte
*, bfd_vma
*);
47 /* Local functions to handle Xtensa configurability. */
49 static bfd_boolean
is_indirect_call_opcode (xtensa_opcode
);
50 static bfd_boolean
is_direct_call_opcode (xtensa_opcode
);
51 static bfd_boolean
is_windowed_call_opcode (xtensa_opcode
);
52 static xtensa_opcode
get_const16_opcode (void);
53 static xtensa_opcode
get_l32r_opcode (void);
54 static bfd_vma
l32r_offset (bfd_vma
, bfd_vma
);
55 static int get_relocation_opnd (xtensa_opcode
, int);
56 static int get_relocation_slot (int);
57 static xtensa_opcode get_relocation_opcode
58 (bfd
*, asection
*, bfd_byte
*, Elf_Internal_Rela
*);
59 static bfd_boolean is_l32r_relocation
60 (bfd
*, asection
*, bfd_byte
*, Elf_Internal_Rela
*);
61 static bfd_boolean
is_alt_relocation (int);
62 static bfd_boolean
is_operand_relocation (int);
63 static bfd_size_type insn_decode_len
64 (bfd_byte
*, bfd_size_type
, bfd_size_type
);
65 static xtensa_opcode insn_decode_opcode
66 (bfd_byte
*, bfd_size_type
, bfd_size_type
, int);
67 static bfd_boolean check_branch_target_aligned
68 (bfd_byte
*, bfd_size_type
, bfd_vma
, bfd_vma
);
69 static bfd_boolean check_loop_aligned
70 (bfd_byte
*, bfd_size_type
, bfd_vma
, bfd_vma
);
71 static bfd_boolean
check_branch_target_aligned_address (bfd_vma
, int);
72 static bfd_size_type get_asm_simplify_size
73 (bfd_byte
*, bfd_size_type
, bfd_size_type
);
75 /* Functions for link-time code simplifications. */
77 static bfd_reloc_status_type elf_xtensa_do_asm_simplify
78 (bfd_byte
*, bfd_vma
, bfd_vma
, char **);
79 static bfd_reloc_status_type contract_asm_expansion
80 (bfd_byte
*, bfd_vma
, Elf_Internal_Rela
*, char **);
81 static xtensa_opcode
swap_callx_for_call_opcode (xtensa_opcode
);
82 static xtensa_opcode
get_expanded_call_opcode (bfd_byte
*, int, bfd_boolean
*);
84 /* Access to internal relocations, section contents and symbols. */
86 static Elf_Internal_Rela
*retrieve_internal_relocs
87 (bfd
*, asection
*, bfd_boolean
);
88 static void pin_internal_relocs (asection
*, Elf_Internal_Rela
*);
89 static void release_internal_relocs (asection
*, Elf_Internal_Rela
*);
90 static bfd_byte
*retrieve_contents (bfd
*, asection
*, bfd_boolean
);
91 static void pin_contents (asection
*, bfd_byte
*);
92 static void release_contents (asection
*, bfd_byte
*);
93 static Elf_Internal_Sym
*retrieve_local_syms (bfd
*);
95 /* Miscellaneous utility functions. */
97 static asection
*elf_xtensa_get_plt_section (struct bfd_link_info
*, int);
98 static asection
*elf_xtensa_get_gotplt_section (struct bfd_link_info
*, int);
99 static asection
*get_elf_r_symndx_section (bfd
*, unsigned long);
100 static struct elf_link_hash_entry
*get_elf_r_symndx_hash_entry
101 (bfd
*, unsigned long);
102 static bfd_vma
get_elf_r_symndx_offset (bfd
*, unsigned long);
103 static bfd_boolean
is_reloc_sym_weak (bfd
*, Elf_Internal_Rela
*);
104 static bfd_boolean
pcrel_reloc_fits (xtensa_opcode
, int, bfd_vma
, bfd_vma
);
105 static bfd_boolean
xtensa_is_property_section (asection
*);
106 static bfd_boolean
xtensa_is_insntable_section (asection
*);
107 static bfd_boolean
xtensa_is_littable_section (asection
*);
108 static bfd_boolean
xtensa_is_proptable_section (asection
*);
109 static int internal_reloc_compare (const void *, const void *);
110 static int internal_reloc_matches (const void *, const void *);
111 static asection
*xtensa_get_property_section (asection
*, const char *);
112 extern asection
*xtensa_make_property_section (asection
*, const char *);
113 static flagword
xtensa_get_property_predef_flags (asection
*);
115 /* Other functions called directly by the linker. */
117 typedef void (*deps_callback_t
)
118 (asection
*, bfd_vma
, asection
*, bfd_vma
, void *);
119 extern bfd_boolean xtensa_callback_required_dependence
120 (bfd
*, asection
*, struct bfd_link_info
*, deps_callback_t
, void *);
123 /* Globally visible flag for choosing size optimization of NOP removal
124 instead of branch-target-aware minimization for NOP removal.
125 When nonzero, narrow all instructions and remove all NOPs possible
126 around longcall expansions. */
128 int elf32xtensa_size_opt
;
131 /* The "new_section_hook" is used to set up a per-section
132 "xtensa_relax_info" data structure with additional information used
133 during relaxation. */
135 typedef struct xtensa_relax_info_struct xtensa_relax_info
;
138 /* The GNU tools do not easily allow extending interfaces to pass around
139 the pointer to the Xtensa ISA information, so instead we add a global
140 variable here (in BFD) that can be used by any of the tools that need
143 xtensa_isa xtensa_default_isa
;
146 /* When this is true, relocations may have been modified to refer to
147 symbols from other input files. The per-section list of "fix"
148 records needs to be checked when resolving relocations. */
150 static bfd_boolean relaxing_section
= FALSE
;
152 /* When this is true, during final links, literals that cannot be
153 coalesced and their relocations may be moved to other sections. */
155 int elf32xtensa_no_literal_movement
= 1;
157 /* Rename one of the generic section flags to better document how it
159 /* Whether relocations have been processed. */
160 #define reloc_done sec_flg0
162 static reloc_howto_type elf_howto_table
[] =
164 HOWTO (R_XTENSA_NONE
, 0, 0, 0, FALSE
, 0, complain_overflow_dont
,
165 bfd_elf_xtensa_reloc
, "R_XTENSA_NONE",
167 HOWTO (R_XTENSA_32
, 0, 2, 32, FALSE
, 0, complain_overflow_bitfield
,
168 bfd_elf_xtensa_reloc
, "R_XTENSA_32",
169 TRUE
, 0xffffffff, 0xffffffff, FALSE
),
171 /* Replace a 32-bit value with a value from the runtime linker (only
172 used by linker-generated stub functions). The r_addend value is
173 special: 1 means to substitute a pointer to the runtime linker's
174 dynamic resolver function; 2 means to substitute the link map for
175 the shared object. */
176 HOWTO (R_XTENSA_RTLD
, 0, 2, 32, FALSE
, 0, complain_overflow_dont
,
177 NULL
, "R_XTENSA_RTLD", FALSE
, 0, 0, FALSE
),
179 HOWTO (R_XTENSA_GLOB_DAT
, 0, 2, 32, FALSE
, 0, complain_overflow_bitfield
,
180 bfd_elf_generic_reloc
, "R_XTENSA_GLOB_DAT",
181 FALSE
, 0, 0xffffffff, FALSE
),
182 HOWTO (R_XTENSA_JMP_SLOT
, 0, 2, 32, FALSE
, 0, complain_overflow_bitfield
,
183 bfd_elf_generic_reloc
, "R_XTENSA_JMP_SLOT",
184 FALSE
, 0, 0xffffffff, FALSE
),
185 HOWTO (R_XTENSA_RELATIVE
, 0, 2, 32, FALSE
, 0, complain_overflow_bitfield
,
186 bfd_elf_generic_reloc
, "R_XTENSA_RELATIVE",
187 FALSE
, 0, 0xffffffff, FALSE
),
188 HOWTO (R_XTENSA_PLT
, 0, 2, 32, FALSE
, 0, complain_overflow_bitfield
,
189 bfd_elf_xtensa_reloc
, "R_XTENSA_PLT",
190 FALSE
, 0, 0xffffffff, FALSE
),
194 /* Old relocations for backward compatibility. */
195 HOWTO (R_XTENSA_OP0
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
196 bfd_elf_xtensa_reloc
, "R_XTENSA_OP0", FALSE
, 0, 0, TRUE
),
197 HOWTO (R_XTENSA_OP1
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
198 bfd_elf_xtensa_reloc
, "R_XTENSA_OP1", FALSE
, 0, 0, TRUE
),
199 HOWTO (R_XTENSA_OP2
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
200 bfd_elf_xtensa_reloc
, "R_XTENSA_OP2", FALSE
, 0, 0, TRUE
),
202 /* Assembly auto-expansion. */
203 HOWTO (R_XTENSA_ASM_EXPAND
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
204 bfd_elf_xtensa_reloc
, "R_XTENSA_ASM_EXPAND", FALSE
, 0, 0, TRUE
),
205 /* Relax assembly auto-expansion. */
206 HOWTO (R_XTENSA_ASM_SIMPLIFY
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
207 bfd_elf_xtensa_reloc
, "R_XTENSA_ASM_SIMPLIFY", FALSE
, 0, 0, TRUE
),
211 HOWTO (R_XTENSA_32_PCREL
, 0, 2, 32, TRUE
, 0, complain_overflow_bitfield
,
212 bfd_elf_xtensa_reloc
, "R_XTENSA_32_PCREL",
213 FALSE
, 0, 0xffffffff, TRUE
),
215 /* GNU extension to record C++ vtable hierarchy. */
216 HOWTO (R_XTENSA_GNU_VTINHERIT
, 0, 2, 0, FALSE
, 0, complain_overflow_dont
,
217 NULL
, "R_XTENSA_GNU_VTINHERIT",
219 /* GNU extension to record C++ vtable member usage. */
220 HOWTO (R_XTENSA_GNU_VTENTRY
, 0, 2, 0, FALSE
, 0, complain_overflow_dont
,
221 _bfd_elf_rel_vtable_reloc_fn
, "R_XTENSA_GNU_VTENTRY",
224 /* Relocations for supporting difference of symbols. */
225 HOWTO (R_XTENSA_DIFF8
, 0, 0, 8, FALSE
, 0, complain_overflow_signed
,
226 bfd_elf_xtensa_reloc
, "R_XTENSA_DIFF8", FALSE
, 0, 0xff, FALSE
),
227 HOWTO (R_XTENSA_DIFF16
, 0, 1, 16, FALSE
, 0, complain_overflow_signed
,
228 bfd_elf_xtensa_reloc
, "R_XTENSA_DIFF16", FALSE
, 0, 0xffff, FALSE
),
229 HOWTO (R_XTENSA_DIFF32
, 0, 2, 32, FALSE
, 0, complain_overflow_signed
,
230 bfd_elf_xtensa_reloc
, "R_XTENSA_DIFF32", FALSE
, 0, 0xffffffff, FALSE
),
232 /* General immediate operand relocations. */
233 HOWTO (R_XTENSA_SLOT0_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
234 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT0_OP", FALSE
, 0, 0, TRUE
),
235 HOWTO (R_XTENSA_SLOT1_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
236 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT1_OP", FALSE
, 0, 0, TRUE
),
237 HOWTO (R_XTENSA_SLOT2_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
238 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT2_OP", FALSE
, 0, 0, TRUE
),
239 HOWTO (R_XTENSA_SLOT3_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
240 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT3_OP", FALSE
, 0, 0, TRUE
),
241 HOWTO (R_XTENSA_SLOT4_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
242 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT4_OP", FALSE
, 0, 0, TRUE
),
243 HOWTO (R_XTENSA_SLOT5_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
244 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT5_OP", FALSE
, 0, 0, TRUE
),
245 HOWTO (R_XTENSA_SLOT6_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
246 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT6_OP", FALSE
, 0, 0, TRUE
),
247 HOWTO (R_XTENSA_SLOT7_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
248 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT7_OP", FALSE
, 0, 0, TRUE
),
249 HOWTO (R_XTENSA_SLOT8_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
250 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT8_OP", FALSE
, 0, 0, TRUE
),
251 HOWTO (R_XTENSA_SLOT9_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
252 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT9_OP", FALSE
, 0, 0, TRUE
),
253 HOWTO (R_XTENSA_SLOT10_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
254 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT10_OP", FALSE
, 0, 0, TRUE
),
255 HOWTO (R_XTENSA_SLOT11_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
256 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT11_OP", FALSE
, 0, 0, TRUE
),
257 HOWTO (R_XTENSA_SLOT12_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
258 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT12_OP", FALSE
, 0, 0, TRUE
),
259 HOWTO (R_XTENSA_SLOT13_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
260 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT13_OP", FALSE
, 0, 0, TRUE
),
261 HOWTO (R_XTENSA_SLOT14_OP
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
262 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT14_OP", FALSE
, 0, 0, TRUE
),
264 /* "Alternate" relocations. The meaning of these is opcode-specific. */
265 HOWTO (R_XTENSA_SLOT0_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
266 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT0_ALT", FALSE
, 0, 0, TRUE
),
267 HOWTO (R_XTENSA_SLOT1_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
268 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT1_ALT", FALSE
, 0, 0, TRUE
),
269 HOWTO (R_XTENSA_SLOT2_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
270 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT2_ALT", FALSE
, 0, 0, TRUE
),
271 HOWTO (R_XTENSA_SLOT3_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
272 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT3_ALT", FALSE
, 0, 0, TRUE
),
273 HOWTO (R_XTENSA_SLOT4_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
274 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT4_ALT", FALSE
, 0, 0, TRUE
),
275 HOWTO (R_XTENSA_SLOT5_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
276 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT5_ALT", FALSE
, 0, 0, TRUE
),
277 HOWTO (R_XTENSA_SLOT6_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
278 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT6_ALT", FALSE
, 0, 0, TRUE
),
279 HOWTO (R_XTENSA_SLOT7_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
280 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT7_ALT", FALSE
, 0, 0, TRUE
),
281 HOWTO (R_XTENSA_SLOT8_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
282 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT8_ALT", FALSE
, 0, 0, TRUE
),
283 HOWTO (R_XTENSA_SLOT9_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
284 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT9_ALT", FALSE
, 0, 0, TRUE
),
285 HOWTO (R_XTENSA_SLOT10_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
286 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT10_ALT", FALSE
, 0, 0, TRUE
),
287 HOWTO (R_XTENSA_SLOT11_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
288 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT11_ALT", FALSE
, 0, 0, TRUE
),
289 HOWTO (R_XTENSA_SLOT12_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
290 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT12_ALT", FALSE
, 0, 0, TRUE
),
291 HOWTO (R_XTENSA_SLOT13_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
292 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT13_ALT", FALSE
, 0, 0, TRUE
),
293 HOWTO (R_XTENSA_SLOT14_ALT
, 0, 0, 0, TRUE
, 0, complain_overflow_dont
,
294 bfd_elf_xtensa_reloc
, "R_XTENSA_SLOT14_ALT", FALSE
, 0, 0, TRUE
),
296 /* TLS relocations. */
297 HOWTO (R_XTENSA_TLSDESC_FN
, 0, 2, 32, FALSE
, 0, complain_overflow_dont
,
298 bfd_elf_xtensa_reloc
, "R_XTENSA_TLSDESC_FN",
299 FALSE
, 0, 0xffffffff, FALSE
),
300 HOWTO (R_XTENSA_TLSDESC_ARG
, 0, 2, 32, FALSE
, 0, complain_overflow_dont
,
301 bfd_elf_xtensa_reloc
, "R_XTENSA_TLSDESC_ARG",
302 FALSE
, 0, 0xffffffff, FALSE
),
303 HOWTO (R_XTENSA_TLS_DTPOFF
, 0, 2, 32, FALSE
, 0, complain_overflow_dont
,
304 bfd_elf_xtensa_reloc
, "R_XTENSA_TLS_DTPOFF",
305 FALSE
, 0, 0xffffffff, FALSE
),
306 HOWTO (R_XTENSA_TLS_TPOFF
, 0, 2, 32, FALSE
, 0, complain_overflow_dont
,
307 bfd_elf_xtensa_reloc
, "R_XTENSA_TLS_TPOFF",
308 FALSE
, 0, 0xffffffff, FALSE
),
309 HOWTO (R_XTENSA_TLS_FUNC
, 0, 0, 0, FALSE
, 0, complain_overflow_dont
,
310 bfd_elf_xtensa_reloc
, "R_XTENSA_TLS_FUNC",
312 HOWTO (R_XTENSA_TLS_ARG
, 0, 0, 0, FALSE
, 0, complain_overflow_dont
,
313 bfd_elf_xtensa_reloc
, "R_XTENSA_TLS_ARG",
315 HOWTO (R_XTENSA_TLS_CALL
, 0, 0, 0, FALSE
, 0, complain_overflow_dont
,
316 bfd_elf_xtensa_reloc
, "R_XTENSA_TLS_CALL",
322 fprintf (stderr, "Xtensa bfd reloc lookup %d (%s)\n", code, str)
327 static reloc_howto_type
*
328 elf_xtensa_reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
329 bfd_reloc_code_real_type code
)
334 TRACE ("BFD_RELOC_NONE");
335 return &elf_howto_table
[(unsigned) R_XTENSA_NONE
];
338 TRACE ("BFD_RELOC_32");
339 return &elf_howto_table
[(unsigned) R_XTENSA_32
];
341 case BFD_RELOC_32_PCREL
:
342 TRACE ("BFD_RELOC_32_PCREL");
343 return &elf_howto_table
[(unsigned) R_XTENSA_32_PCREL
];
345 case BFD_RELOC_XTENSA_DIFF8
:
346 TRACE ("BFD_RELOC_XTENSA_DIFF8");
347 return &elf_howto_table
[(unsigned) R_XTENSA_DIFF8
];
349 case BFD_RELOC_XTENSA_DIFF16
:
350 TRACE ("BFD_RELOC_XTENSA_DIFF16");
351 return &elf_howto_table
[(unsigned) R_XTENSA_DIFF16
];
353 case BFD_RELOC_XTENSA_DIFF32
:
354 TRACE ("BFD_RELOC_XTENSA_DIFF32");
355 return &elf_howto_table
[(unsigned) R_XTENSA_DIFF32
];
357 case BFD_RELOC_XTENSA_RTLD
:
358 TRACE ("BFD_RELOC_XTENSA_RTLD");
359 return &elf_howto_table
[(unsigned) R_XTENSA_RTLD
];
361 case BFD_RELOC_XTENSA_GLOB_DAT
:
362 TRACE ("BFD_RELOC_XTENSA_GLOB_DAT");
363 return &elf_howto_table
[(unsigned) R_XTENSA_GLOB_DAT
];
365 case BFD_RELOC_XTENSA_JMP_SLOT
:
366 TRACE ("BFD_RELOC_XTENSA_JMP_SLOT");
367 return &elf_howto_table
[(unsigned) R_XTENSA_JMP_SLOT
];
369 case BFD_RELOC_XTENSA_RELATIVE
:
370 TRACE ("BFD_RELOC_XTENSA_RELATIVE");
371 return &elf_howto_table
[(unsigned) R_XTENSA_RELATIVE
];
373 case BFD_RELOC_XTENSA_PLT
:
374 TRACE ("BFD_RELOC_XTENSA_PLT");
375 return &elf_howto_table
[(unsigned) R_XTENSA_PLT
];
377 case BFD_RELOC_XTENSA_OP0
:
378 TRACE ("BFD_RELOC_XTENSA_OP0");
379 return &elf_howto_table
[(unsigned) R_XTENSA_OP0
];
381 case BFD_RELOC_XTENSA_OP1
:
382 TRACE ("BFD_RELOC_XTENSA_OP1");
383 return &elf_howto_table
[(unsigned) R_XTENSA_OP1
];
385 case BFD_RELOC_XTENSA_OP2
:
386 TRACE ("BFD_RELOC_XTENSA_OP2");
387 return &elf_howto_table
[(unsigned) R_XTENSA_OP2
];
389 case BFD_RELOC_XTENSA_ASM_EXPAND
:
390 TRACE ("BFD_RELOC_XTENSA_ASM_EXPAND");
391 return &elf_howto_table
[(unsigned) R_XTENSA_ASM_EXPAND
];
393 case BFD_RELOC_XTENSA_ASM_SIMPLIFY
:
394 TRACE ("BFD_RELOC_XTENSA_ASM_SIMPLIFY");
395 return &elf_howto_table
[(unsigned) R_XTENSA_ASM_SIMPLIFY
];
397 case BFD_RELOC_VTABLE_INHERIT
:
398 TRACE ("BFD_RELOC_VTABLE_INHERIT");
399 return &elf_howto_table
[(unsigned) R_XTENSA_GNU_VTINHERIT
];
401 case BFD_RELOC_VTABLE_ENTRY
:
402 TRACE ("BFD_RELOC_VTABLE_ENTRY");
403 return &elf_howto_table
[(unsigned) R_XTENSA_GNU_VTENTRY
];
405 case BFD_RELOC_XTENSA_TLSDESC_FN
:
406 TRACE ("BFD_RELOC_XTENSA_TLSDESC_FN");
407 return &elf_howto_table
[(unsigned) R_XTENSA_TLSDESC_FN
];
409 case BFD_RELOC_XTENSA_TLSDESC_ARG
:
410 TRACE ("BFD_RELOC_XTENSA_TLSDESC_ARG");
411 return &elf_howto_table
[(unsigned) R_XTENSA_TLSDESC_ARG
];
413 case BFD_RELOC_XTENSA_TLS_DTPOFF
:
414 TRACE ("BFD_RELOC_XTENSA_TLS_DTPOFF");
415 return &elf_howto_table
[(unsigned) R_XTENSA_TLS_DTPOFF
];
417 case BFD_RELOC_XTENSA_TLS_TPOFF
:
418 TRACE ("BFD_RELOC_XTENSA_TLS_TPOFF");
419 return &elf_howto_table
[(unsigned) R_XTENSA_TLS_TPOFF
];
421 case BFD_RELOC_XTENSA_TLS_FUNC
:
422 TRACE ("BFD_RELOC_XTENSA_TLS_FUNC");
423 return &elf_howto_table
[(unsigned) R_XTENSA_TLS_FUNC
];
425 case BFD_RELOC_XTENSA_TLS_ARG
:
426 TRACE ("BFD_RELOC_XTENSA_TLS_ARG");
427 return &elf_howto_table
[(unsigned) R_XTENSA_TLS_ARG
];
429 case BFD_RELOC_XTENSA_TLS_CALL
:
430 TRACE ("BFD_RELOC_XTENSA_TLS_CALL");
431 return &elf_howto_table
[(unsigned) R_XTENSA_TLS_CALL
];
434 if (code
>= BFD_RELOC_XTENSA_SLOT0_OP
435 && code
<= BFD_RELOC_XTENSA_SLOT14_OP
)
437 unsigned n
= (R_XTENSA_SLOT0_OP
+
438 (code
- BFD_RELOC_XTENSA_SLOT0_OP
));
439 return &elf_howto_table
[n
];
442 if (code
>= BFD_RELOC_XTENSA_SLOT0_ALT
443 && code
<= BFD_RELOC_XTENSA_SLOT14_ALT
)
445 unsigned n
= (R_XTENSA_SLOT0_ALT
+
446 (code
- BFD_RELOC_XTENSA_SLOT0_ALT
));
447 return &elf_howto_table
[n
];
457 static reloc_howto_type
*
458 elf_xtensa_reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
463 for (i
= 0; i
< sizeof (elf_howto_table
) / sizeof (elf_howto_table
[0]); i
++)
464 if (elf_howto_table
[i
].name
!= NULL
465 && strcasecmp (elf_howto_table
[i
].name
, r_name
) == 0)
466 return &elf_howto_table
[i
];
472 /* Given an ELF "rela" relocation, find the corresponding howto and record
473 it in the BFD internal arelent representation of the relocation. */
476 elf_xtensa_info_to_howto_rela (bfd
*abfd ATTRIBUTE_UNUSED
,
478 Elf_Internal_Rela
*dst
)
480 unsigned int r_type
= ELF32_R_TYPE (dst
->r_info
);
482 BFD_ASSERT (r_type
< (unsigned int) R_XTENSA_max
);
483 cache_ptr
->howto
= &elf_howto_table
[r_type
];
487 /* Functions for the Xtensa ELF linker. */
489 /* The name of the dynamic interpreter. This is put in the .interp
492 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so"
494 /* The size in bytes of an entry in the procedure linkage table.
495 (This does _not_ include the space for the literals associated with
498 #define PLT_ENTRY_SIZE 16
500 /* For _really_ large PLTs, we may need to alternate between literals
501 and code to keep the literals within the 256K range of the L32R
502 instructions in the code. It's unlikely that anyone would ever need
503 such a big PLT, but an arbitrary limit on the PLT size would be bad.
504 Thus, we split the PLT into chunks. Since there's very little
505 overhead (2 extra literals) for each chunk, the chunk size is kept
506 small so that the code for handling multiple chunks get used and
507 tested regularly. With 254 entries, there are 1K of literals for
508 each chunk, and that seems like a nice round number. */
510 #define PLT_ENTRIES_PER_CHUNK 254
512 /* PLT entries are actually used as stub functions for lazy symbol
513 resolution. Once the symbol is resolved, the stub function is never
514 invoked. Note: the 32-byte frame size used here cannot be changed
515 without a corresponding change in the runtime linker. */
517 static const bfd_byte elf_xtensa_be_plt_entry
[PLT_ENTRY_SIZE
] =
519 0x6c, 0x10, 0x04, /* entry sp, 32 */
520 0x18, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
521 0x1a, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
522 0x1b, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
523 0x0a, 0x80, 0x00, /* jx a8 */
527 static const bfd_byte elf_xtensa_le_plt_entry
[PLT_ENTRY_SIZE
] =
529 0x36, 0x41, 0x00, /* entry sp, 32 */
530 0x81, 0x00, 0x00, /* l32r a8, [got entry for rtld's resolver] */
531 0xa1, 0x00, 0x00, /* l32r a10, [got entry for rtld's link map] */
532 0xb1, 0x00, 0x00, /* l32r a11, [literal for reloc index] */
533 0xa0, 0x08, 0x00, /* jx a8 */
537 /* The size of the thread control block. */
540 struct elf_xtensa_link_hash_entry
542 struct elf_link_hash_entry elf
;
544 bfd_signed_vma tlsfunc_refcount
;
546 #define GOT_UNKNOWN 0
548 #define GOT_TLS_GD 2 /* global or local dynamic */
549 #define GOT_TLS_IE 4 /* initial or local exec */
550 #define GOT_TLS_ANY (GOT_TLS_GD | GOT_TLS_IE)
551 unsigned char tls_type
;
554 #define elf_xtensa_hash_entry(ent) ((struct elf_xtensa_link_hash_entry *)(ent))
556 struct elf_xtensa_obj_tdata
558 struct elf_obj_tdata root
;
560 /* tls_type for each local got entry. */
561 char *local_got_tls_type
;
563 bfd_signed_vma
*local_tlsfunc_refcounts
;
566 #define elf_xtensa_tdata(abfd) \
567 ((struct elf_xtensa_obj_tdata *) (abfd)->tdata.any)
569 #define elf_xtensa_local_got_tls_type(abfd) \
570 (elf_xtensa_tdata (abfd)->local_got_tls_type)
572 #define elf_xtensa_local_tlsfunc_refcounts(abfd) \
573 (elf_xtensa_tdata (abfd)->local_tlsfunc_refcounts)
575 #define is_xtensa_elf(bfd) \
576 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
577 && elf_tdata (bfd) != NULL \
578 && elf_object_id (bfd) == XTENSA_ELF_DATA)
581 elf_xtensa_mkobject (bfd
*abfd
)
583 return bfd_elf_allocate_object (abfd
, sizeof (struct elf_xtensa_obj_tdata
),
587 /* Xtensa ELF linker hash table. */
589 struct elf_xtensa_link_hash_table
591 struct elf_link_hash_table elf
;
593 /* Short-cuts to get to dynamic linker sections. */
600 asection
*spltlittbl
;
602 /* Total count of PLT relocations seen during check_relocs.
603 The actual PLT code must be split into multiple sections and all
604 the sections have to be created before size_dynamic_sections,
605 where we figure out the exact number of PLT entries that will be
606 needed. It is OK if this count is an overestimate, e.g., some
607 relocations may be removed by GC. */
610 struct elf_xtensa_link_hash_entry
*tlsbase
;
613 /* Get the Xtensa ELF linker hash table from a link_info structure. */
615 #define elf_xtensa_hash_table(p) \
616 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
617 == XTENSA_ELF_DATA ? ((struct elf_xtensa_link_hash_table *) ((p)->hash)) : NULL)
619 /* Create an entry in an Xtensa ELF linker hash table. */
621 static struct bfd_hash_entry
*
622 elf_xtensa_link_hash_newfunc (struct bfd_hash_entry
*entry
,
623 struct bfd_hash_table
*table
,
626 /* Allocate the structure if it has not already been allocated by a
630 entry
= bfd_hash_allocate (table
,
631 sizeof (struct elf_xtensa_link_hash_entry
));
636 /* Call the allocation method of the superclass. */
637 entry
= _bfd_elf_link_hash_newfunc (entry
, table
, string
);
640 struct elf_xtensa_link_hash_entry
*eh
= elf_xtensa_hash_entry (entry
);
641 eh
->tlsfunc_refcount
= 0;
642 eh
->tls_type
= GOT_UNKNOWN
;
648 /* Create an Xtensa ELF linker hash table. */
650 static struct bfd_link_hash_table
*
651 elf_xtensa_link_hash_table_create (bfd
*abfd
)
653 struct elf_link_hash_entry
*tlsbase
;
654 struct elf_xtensa_link_hash_table
*ret
;
655 bfd_size_type amt
= sizeof (struct elf_xtensa_link_hash_table
);
657 ret
= bfd_zmalloc (amt
);
661 if (!_bfd_elf_link_hash_table_init (&ret
->elf
, abfd
,
662 elf_xtensa_link_hash_newfunc
,
663 sizeof (struct elf_xtensa_link_hash_entry
),
670 /* Create a hash entry for "_TLS_MODULE_BASE_" to speed up checking
672 tlsbase
= elf_link_hash_lookup (&ret
->elf
, "_TLS_MODULE_BASE_",
674 tlsbase
->root
.type
= bfd_link_hash_new
;
675 tlsbase
->root
.u
.undef
.abfd
= NULL
;
676 tlsbase
->non_elf
= 0;
677 ret
->tlsbase
= elf_xtensa_hash_entry (tlsbase
);
678 ret
->tlsbase
->tls_type
= GOT_UNKNOWN
;
680 return &ret
->elf
.root
;
683 /* Copy the extra info we tack onto an elf_link_hash_entry. */
686 elf_xtensa_copy_indirect_symbol (struct bfd_link_info
*info
,
687 struct elf_link_hash_entry
*dir
,
688 struct elf_link_hash_entry
*ind
)
690 struct elf_xtensa_link_hash_entry
*edir
, *eind
;
692 edir
= elf_xtensa_hash_entry (dir
);
693 eind
= elf_xtensa_hash_entry (ind
);
695 if (ind
->root
.type
== bfd_link_hash_indirect
)
697 edir
->tlsfunc_refcount
+= eind
->tlsfunc_refcount
;
698 eind
->tlsfunc_refcount
= 0;
700 if (dir
->got
.refcount
<= 0)
702 edir
->tls_type
= eind
->tls_type
;
703 eind
->tls_type
= GOT_UNKNOWN
;
707 _bfd_elf_link_hash_copy_indirect (info
, dir
, ind
);
710 static inline bfd_boolean
711 elf_xtensa_dynamic_symbol_p (struct elf_link_hash_entry
*h
,
712 struct bfd_link_info
*info
)
714 /* Check if we should do dynamic things to this symbol. The
715 "ignore_protected" argument need not be set, because Xtensa code
716 does not require special handling of STV_PROTECTED to make function
717 pointer comparisons work properly. The PLT addresses are never
718 used for function pointers. */
720 return _bfd_elf_dynamic_symbol_p (h
, info
, 0);
725 property_table_compare (const void *ap
, const void *bp
)
727 const property_table_entry
*a
= (const property_table_entry
*) ap
;
728 const property_table_entry
*b
= (const property_table_entry
*) bp
;
730 if (a
->address
== b
->address
)
732 if (a
->size
!= b
->size
)
733 return (a
->size
- b
->size
);
735 if ((a
->flags
& XTENSA_PROP_ALIGN
) != (b
->flags
& XTENSA_PROP_ALIGN
))
736 return ((b
->flags
& XTENSA_PROP_ALIGN
)
737 - (a
->flags
& XTENSA_PROP_ALIGN
));
739 if ((a
->flags
& XTENSA_PROP_ALIGN
)
740 && (GET_XTENSA_PROP_ALIGNMENT (a
->flags
)
741 != GET_XTENSA_PROP_ALIGNMENT (b
->flags
)))
742 return (GET_XTENSA_PROP_ALIGNMENT (a
->flags
)
743 - GET_XTENSA_PROP_ALIGNMENT (b
->flags
));
745 if ((a
->flags
& XTENSA_PROP_UNREACHABLE
)
746 != (b
->flags
& XTENSA_PROP_UNREACHABLE
))
747 return ((b
->flags
& XTENSA_PROP_UNREACHABLE
)
748 - (a
->flags
& XTENSA_PROP_UNREACHABLE
));
750 return (a
->flags
- b
->flags
);
753 return (a
->address
- b
->address
);
758 property_table_matches (const void *ap
, const void *bp
)
760 const property_table_entry
*a
= (const property_table_entry
*) ap
;
761 const property_table_entry
*b
= (const property_table_entry
*) bp
;
763 /* Check if one entry overlaps with the other. */
764 if ((b
->address
>= a
->address
&& b
->address
< (a
->address
+ a
->size
))
765 || (a
->address
>= b
->address
&& a
->address
< (b
->address
+ b
->size
)))
768 return (a
->address
- b
->address
);
772 /* Get the literal table or property table entries for the given
773 section. Sets TABLE_P and returns the number of entries. On
774 error, returns a negative value. */
777 xtensa_read_table_entries (bfd
*abfd
,
779 property_table_entry
**table_p
,
780 const char *sec_name
,
781 bfd_boolean output_addr
)
783 asection
*table_section
;
784 bfd_size_type table_size
= 0;
785 bfd_byte
*table_data
;
786 property_table_entry
*blocks
;
787 int blk
, block_count
;
788 bfd_size_type num_records
;
789 Elf_Internal_Rela
*internal_relocs
, *irel
, *rel_end
;
790 bfd_vma section_addr
, off
;
791 flagword predef_flags
;
792 bfd_size_type table_entry_size
, section_limit
;
795 || !(section
->flags
& SEC_ALLOC
)
796 || (section
->flags
& SEC_DEBUGGING
))
802 table_section
= xtensa_get_property_section (section
, sec_name
);
804 table_size
= table_section
->size
;
812 predef_flags
= xtensa_get_property_predef_flags (table_section
);
813 table_entry_size
= 12;
815 table_entry_size
-= 4;
817 num_records
= table_size
/ table_entry_size
;
818 table_data
= retrieve_contents (abfd
, table_section
, TRUE
);
819 blocks
= (property_table_entry
*)
820 bfd_malloc (num_records
* sizeof (property_table_entry
));
824 section_addr
= section
->output_section
->vma
+ section
->output_offset
;
826 section_addr
= section
->vma
;
828 internal_relocs
= retrieve_internal_relocs (abfd
, table_section
, TRUE
);
829 if (internal_relocs
&& !table_section
->reloc_done
)
831 qsort (internal_relocs
, table_section
->reloc_count
,
832 sizeof (Elf_Internal_Rela
), internal_reloc_compare
);
833 irel
= internal_relocs
;
838 section_limit
= bfd_get_section_limit (abfd
, section
);
839 rel_end
= internal_relocs
+ table_section
->reloc_count
;
841 for (off
= 0; off
< table_size
; off
+= table_entry_size
)
843 bfd_vma address
= bfd_get_32 (abfd
, table_data
+ off
);
845 /* Skip any relocations before the current offset. This should help
846 avoid confusion caused by unexpected relocations for the preceding
849 (irel
->r_offset
< off
850 || (irel
->r_offset
== off
851 && ELF32_R_TYPE (irel
->r_info
) == R_XTENSA_NONE
)))
858 if (irel
&& irel
->r_offset
== off
)
861 unsigned long r_symndx
= ELF32_R_SYM (irel
->r_info
);
862 BFD_ASSERT (ELF32_R_TYPE (irel
->r_info
) == R_XTENSA_32
);
864 if (get_elf_r_symndx_section (abfd
, r_symndx
) != section
)
867 sym_off
= get_elf_r_symndx_offset (abfd
, r_symndx
);
868 BFD_ASSERT (sym_off
== 0);
869 address
+= (section_addr
+ sym_off
+ irel
->r_addend
);
873 if (address
< section_addr
874 || address
>= section_addr
+ section_limit
)
878 blocks
[block_count
].address
= address
;
879 blocks
[block_count
].size
= bfd_get_32 (abfd
, table_data
+ off
+ 4);
881 blocks
[block_count
].flags
= predef_flags
;
883 blocks
[block_count
].flags
= bfd_get_32 (abfd
, table_data
+ off
+ 8);
887 release_contents (table_section
, table_data
);
888 release_internal_relocs (table_section
, internal_relocs
);
892 /* Now sort them into address order for easy reference. */
893 qsort (blocks
, block_count
, sizeof (property_table_entry
),
894 property_table_compare
);
896 /* Check that the table contents are valid. Problems may occur,
897 for example, if an unrelocated object file is stripped. */
898 for (blk
= 1; blk
< block_count
; blk
++)
900 /* The only circumstance where two entries may legitimately
901 have the same address is when one of them is a zero-size
902 placeholder to mark a place where fill can be inserted.
903 The zero-size entry should come first. */
904 if (blocks
[blk
- 1].address
== blocks
[blk
].address
&&
905 blocks
[blk
- 1].size
!= 0)
907 (*_bfd_error_handler
) (_("%B(%A): invalid property table"),
909 bfd_set_error (bfd_error_bad_value
);
921 static property_table_entry
*
922 elf_xtensa_find_property_entry (property_table_entry
*property_table
,
923 int property_table_size
,
926 property_table_entry entry
;
927 property_table_entry
*rv
;
929 if (property_table_size
== 0)
932 entry
.address
= addr
;
936 rv
= bsearch (&entry
, property_table
, property_table_size
,
937 sizeof (property_table_entry
), property_table_matches
);
943 elf_xtensa_in_literal_pool (property_table_entry
*lit_table
,
947 if (elf_xtensa_find_property_entry (lit_table
, lit_table_size
, addr
))
954 /* Look through the relocs for a section during the first phase, and
955 calculate needed space in the dynamic reloc sections. */
958 elf_xtensa_check_relocs (bfd
*abfd
,
959 struct bfd_link_info
*info
,
961 const Elf_Internal_Rela
*relocs
)
963 struct elf_xtensa_link_hash_table
*htab
;
964 Elf_Internal_Shdr
*symtab_hdr
;
965 struct elf_link_hash_entry
**sym_hashes
;
966 const Elf_Internal_Rela
*rel
;
967 const Elf_Internal_Rela
*rel_end
;
969 if (info
->relocatable
|| (sec
->flags
& SEC_ALLOC
) == 0)
972 BFD_ASSERT (is_xtensa_elf (abfd
));
974 htab
= elf_xtensa_hash_table (info
);
978 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
979 sym_hashes
= elf_sym_hashes (abfd
);
981 rel_end
= relocs
+ sec
->reloc_count
;
982 for (rel
= relocs
; rel
< rel_end
; rel
++)
985 unsigned long r_symndx
;
986 struct elf_link_hash_entry
*h
= NULL
;
987 struct elf_xtensa_link_hash_entry
*eh
;
988 int tls_type
, old_tls_type
;
989 bfd_boolean is_got
= FALSE
;
990 bfd_boolean is_plt
= FALSE
;
991 bfd_boolean is_tlsfunc
= FALSE
;
993 r_symndx
= ELF32_R_SYM (rel
->r_info
);
994 r_type
= ELF32_R_TYPE (rel
->r_info
);
996 if (r_symndx
>= NUM_SHDR_ENTRIES (symtab_hdr
))
998 (*_bfd_error_handler
) (_("%B: bad symbol index: %d"),
1003 if (r_symndx
>= symtab_hdr
->sh_info
)
1005 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
1006 while (h
->root
.type
== bfd_link_hash_indirect
1007 || h
->root
.type
== bfd_link_hash_warning
)
1008 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
1010 /* PR15323, ref flags aren't set for references in the same
1012 h
->root
.non_ir_ref
= 1;
1014 eh
= elf_xtensa_hash_entry (h
);
1018 case R_XTENSA_TLSDESC_FN
:
1021 tls_type
= GOT_TLS_GD
;
1026 tls_type
= GOT_TLS_IE
;
1029 case R_XTENSA_TLSDESC_ARG
:
1032 tls_type
= GOT_TLS_GD
;
1037 tls_type
= GOT_TLS_IE
;
1038 if (h
&& elf_xtensa_hash_entry (h
) != htab
->tlsbase
)
1043 case R_XTENSA_TLS_DTPOFF
:
1045 tls_type
= GOT_TLS_GD
;
1047 tls_type
= GOT_TLS_IE
;
1050 case R_XTENSA_TLS_TPOFF
:
1051 tls_type
= GOT_TLS_IE
;
1053 info
->flags
|= DF_STATIC_TLS
;
1054 if (info
->shared
|| h
)
1059 tls_type
= GOT_NORMAL
;
1064 tls_type
= GOT_NORMAL
;
1068 case R_XTENSA_GNU_VTINHERIT
:
1069 /* This relocation describes the C++ object vtable hierarchy.
1070 Reconstruct it for later use during GC. */
1071 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
1075 case R_XTENSA_GNU_VTENTRY
:
1076 /* This relocation describes which C++ vtable entries are actually
1077 used. Record for later use during GC. */
1078 BFD_ASSERT (h
!= NULL
);
1080 && !bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
1085 /* Nothing to do for any other relocations. */
1093 if (h
->plt
.refcount
<= 0)
1096 h
->plt
.refcount
= 1;
1099 h
->plt
.refcount
+= 1;
1101 /* Keep track of the total PLT relocation count even if we
1102 don't yet know whether the dynamic sections will be
1104 htab
->plt_reloc_count
+= 1;
1106 if (elf_hash_table (info
)->dynamic_sections_created
)
1108 if (! add_extra_plt_sections (info
, htab
->plt_reloc_count
))
1114 if (h
->got
.refcount
<= 0)
1115 h
->got
.refcount
= 1;
1117 h
->got
.refcount
+= 1;
1121 eh
->tlsfunc_refcount
+= 1;
1123 old_tls_type
= eh
->tls_type
;
1127 /* Allocate storage the first time. */
1128 if (elf_local_got_refcounts (abfd
) == NULL
)
1130 bfd_size_type size
= symtab_hdr
->sh_info
;
1133 mem
= bfd_zalloc (abfd
, size
* sizeof (bfd_signed_vma
));
1136 elf_local_got_refcounts (abfd
) = (bfd_signed_vma
*) mem
;
1138 mem
= bfd_zalloc (abfd
, size
);
1141 elf_xtensa_local_got_tls_type (abfd
) = (char *) mem
;
1143 mem
= bfd_zalloc (abfd
, size
* sizeof (bfd_signed_vma
));
1146 elf_xtensa_local_tlsfunc_refcounts (abfd
)
1147 = (bfd_signed_vma
*) mem
;
1150 /* This is a global offset table entry for a local symbol. */
1151 if (is_got
|| is_plt
)
1152 elf_local_got_refcounts (abfd
) [r_symndx
] += 1;
1155 elf_xtensa_local_tlsfunc_refcounts (abfd
) [r_symndx
] += 1;
1157 old_tls_type
= elf_xtensa_local_got_tls_type (abfd
) [r_symndx
];
1160 if ((old_tls_type
& GOT_TLS_IE
) && (tls_type
& GOT_TLS_IE
))
1161 tls_type
|= old_tls_type
;
1162 /* If a TLS symbol is accessed using IE at least once,
1163 there is no point to use a dynamic model for it. */
1164 else if (old_tls_type
!= tls_type
&& old_tls_type
!= GOT_UNKNOWN
1165 && ((old_tls_type
& GOT_TLS_GD
) == 0
1166 || (tls_type
& GOT_TLS_IE
) == 0))
1168 if ((old_tls_type
& GOT_TLS_IE
) && (tls_type
& GOT_TLS_GD
))
1169 tls_type
= old_tls_type
;
1170 else if ((old_tls_type
& GOT_TLS_GD
) && (tls_type
& GOT_TLS_GD
))
1171 tls_type
|= old_tls_type
;
1174 (*_bfd_error_handler
)
1175 (_("%B: `%s' accessed both as normal and thread local symbol"),
1177 h
? h
->root
.root
.string
: "<local>");
1182 if (old_tls_type
!= tls_type
)
1185 eh
->tls_type
= tls_type
;
1187 elf_xtensa_local_got_tls_type (abfd
) [r_symndx
] = tls_type
;
1196 elf_xtensa_make_sym_local (struct bfd_link_info
*info
,
1197 struct elf_link_hash_entry
*h
)
1201 if (h
->plt
.refcount
> 0)
1203 /* For shared objects, there's no need for PLT entries for local
1204 symbols (use RELATIVE relocs instead of JMP_SLOT relocs). */
1205 if (h
->got
.refcount
< 0)
1206 h
->got
.refcount
= 0;
1207 h
->got
.refcount
+= h
->plt
.refcount
;
1208 h
->plt
.refcount
= 0;
1213 /* Don't need any dynamic relocations at all. */
1214 h
->plt
.refcount
= 0;
1215 h
->got
.refcount
= 0;
1221 elf_xtensa_hide_symbol (struct bfd_link_info
*info
,
1222 struct elf_link_hash_entry
*h
,
1223 bfd_boolean force_local
)
1225 /* For a shared link, move the plt refcount to the got refcount to leave
1226 space for RELATIVE relocs. */
1227 elf_xtensa_make_sym_local (info
, h
);
1229 _bfd_elf_link_hash_hide_symbol (info
, h
, force_local
);
1233 /* Return the section that should be marked against GC for a given
1237 elf_xtensa_gc_mark_hook (asection
*sec
,
1238 struct bfd_link_info
*info
,
1239 Elf_Internal_Rela
*rel
,
1240 struct elf_link_hash_entry
*h
,
1241 Elf_Internal_Sym
*sym
)
1243 /* Property sections are marked "KEEP" in the linker scripts, but they
1244 should not cause other sections to be marked. (This approach relies
1245 on elf_xtensa_discard_info to remove property table entries that
1246 describe discarded sections. Alternatively, it might be more
1247 efficient to avoid using "KEEP" in the linker scripts and instead use
1248 the gc_mark_extra_sections hook to mark only the property sections
1249 that describe marked sections. That alternative does not work well
1250 with the current property table sections, which do not correspond
1251 one-to-one with the sections they describe, but that should be fixed
1253 if (xtensa_is_property_section (sec
))
1257 switch (ELF32_R_TYPE (rel
->r_info
))
1259 case R_XTENSA_GNU_VTINHERIT
:
1260 case R_XTENSA_GNU_VTENTRY
:
1264 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
1268 /* Update the GOT & PLT entry reference counts
1269 for the section being removed. */
1272 elf_xtensa_gc_sweep_hook (bfd
*abfd
,
1273 struct bfd_link_info
*info
,
1275 const Elf_Internal_Rela
*relocs
)
1277 Elf_Internal_Shdr
*symtab_hdr
;
1278 struct elf_link_hash_entry
**sym_hashes
;
1279 const Elf_Internal_Rela
*rel
, *relend
;
1280 struct elf_xtensa_link_hash_table
*htab
;
1282 htab
= elf_xtensa_hash_table (info
);
1286 if (info
->relocatable
)
1289 if ((sec
->flags
& SEC_ALLOC
) == 0)
1292 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1293 sym_hashes
= elf_sym_hashes (abfd
);
1295 relend
= relocs
+ sec
->reloc_count
;
1296 for (rel
= relocs
; rel
< relend
; rel
++)
1298 unsigned long r_symndx
;
1299 unsigned int r_type
;
1300 struct elf_link_hash_entry
*h
= NULL
;
1301 struct elf_xtensa_link_hash_entry
*eh
;
1302 bfd_boolean is_got
= FALSE
;
1303 bfd_boolean is_plt
= FALSE
;
1304 bfd_boolean is_tlsfunc
= FALSE
;
1306 r_symndx
= ELF32_R_SYM (rel
->r_info
);
1307 if (r_symndx
>= symtab_hdr
->sh_info
)
1309 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
1310 while (h
->root
.type
== bfd_link_hash_indirect
1311 || h
->root
.type
== bfd_link_hash_warning
)
1312 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
1314 eh
= elf_xtensa_hash_entry (h
);
1316 r_type
= ELF32_R_TYPE (rel
->r_info
);
1319 case R_XTENSA_TLSDESC_FN
:
1327 case R_XTENSA_TLSDESC_ARG
:
1332 if (h
&& elf_xtensa_hash_entry (h
) != htab
->tlsbase
)
1337 case R_XTENSA_TLS_TPOFF
:
1338 if (info
->shared
|| h
)
1358 if (h
->plt
.refcount
> 0)
1363 if (h
->got
.refcount
> 0)
1368 if (eh
->tlsfunc_refcount
> 0)
1369 eh
->tlsfunc_refcount
--;
1374 if (is_got
|| is_plt
)
1376 bfd_signed_vma
*got_refcount
1377 = &elf_local_got_refcounts (abfd
) [r_symndx
];
1378 if (*got_refcount
> 0)
1383 bfd_signed_vma
*tlsfunc_refcount
1384 = &elf_xtensa_local_tlsfunc_refcounts (abfd
) [r_symndx
];
1385 if (*tlsfunc_refcount
> 0)
1386 *tlsfunc_refcount
-= 1;
1395 /* Create all the dynamic sections. */
1398 elf_xtensa_create_dynamic_sections (bfd
*dynobj
, struct bfd_link_info
*info
)
1400 struct elf_xtensa_link_hash_table
*htab
;
1401 flagword flags
, noalloc_flags
;
1403 htab
= elf_xtensa_hash_table (info
);
1407 /* First do all the standard stuff. */
1408 if (! _bfd_elf_create_dynamic_sections (dynobj
, info
))
1410 htab
->splt
= bfd_get_linker_section (dynobj
, ".plt");
1411 htab
->srelplt
= bfd_get_linker_section (dynobj
, ".rela.plt");
1412 htab
->sgot
= bfd_get_linker_section (dynobj
, ".got");
1413 htab
->sgotplt
= bfd_get_linker_section (dynobj
, ".got.plt");
1414 htab
->srelgot
= bfd_get_linker_section (dynobj
, ".rela.got");
1416 /* Create any extra PLT sections in case check_relocs has already
1417 been called on all the non-dynamic input files. */
1418 if (! add_extra_plt_sections (info
, htab
->plt_reloc_count
))
1421 noalloc_flags
= (SEC_HAS_CONTENTS
| SEC_IN_MEMORY
1422 | SEC_LINKER_CREATED
| SEC_READONLY
);
1423 flags
= noalloc_flags
| SEC_ALLOC
| SEC_LOAD
;
1425 /* Mark the ".got.plt" section READONLY. */
1426 if (htab
->sgotplt
== NULL
1427 || ! bfd_set_section_flags (dynobj
, htab
->sgotplt
, flags
))
1430 /* Create ".got.loc" (literal tables for use by dynamic linker). */
1431 htab
->sgotloc
= bfd_make_section_anyway_with_flags (dynobj
, ".got.loc",
1433 if (htab
->sgotloc
== NULL
1434 || ! bfd_set_section_alignment (dynobj
, htab
->sgotloc
, 2))
1437 /* Create ".xt.lit.plt" (literal table for ".got.plt*"). */
1438 htab
->spltlittbl
= bfd_make_section_anyway_with_flags (dynobj
, ".xt.lit.plt",
1440 if (htab
->spltlittbl
== NULL
1441 || ! bfd_set_section_alignment (dynobj
, htab
->spltlittbl
, 2))
1449 add_extra_plt_sections (struct bfd_link_info
*info
, int count
)
1451 bfd
*dynobj
= elf_hash_table (info
)->dynobj
;
1454 /* Iterate over all chunks except 0 which uses the standard ".plt" and
1455 ".got.plt" sections. */
1456 for (chunk
= count
/ PLT_ENTRIES_PER_CHUNK
; chunk
> 0; chunk
--)
1462 /* Stop when we find a section has already been created. */
1463 if (elf_xtensa_get_plt_section (info
, chunk
))
1466 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
1467 | SEC_LINKER_CREATED
| SEC_READONLY
);
1469 sname
= (char *) bfd_malloc (10);
1470 sprintf (sname
, ".plt.%u", chunk
);
1471 s
= bfd_make_section_anyway_with_flags (dynobj
, sname
, flags
| SEC_CODE
);
1473 || ! bfd_set_section_alignment (dynobj
, s
, 2))
1476 sname
= (char *) bfd_malloc (14);
1477 sprintf (sname
, ".got.plt.%u", chunk
);
1478 s
= bfd_make_section_anyway_with_flags (dynobj
, sname
, flags
);
1480 || ! bfd_set_section_alignment (dynobj
, s
, 2))
1488 /* Adjust a symbol defined by a dynamic object and referenced by a
1489 regular object. The current definition is in some section of the
1490 dynamic object, but we're not including those sections. We have to
1491 change the definition to something the rest of the link can
1495 elf_xtensa_adjust_dynamic_symbol (struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
1496 struct elf_link_hash_entry
*h
)
1498 /* If this is a weak symbol, and there is a real definition, the
1499 processor independent code will have arranged for us to see the
1500 real definition first, and we can just use the same value. */
1503 BFD_ASSERT (h
->u
.weakdef
->root
.type
== bfd_link_hash_defined
1504 || h
->u
.weakdef
->root
.type
== bfd_link_hash_defweak
);
1505 h
->root
.u
.def
.section
= h
->u
.weakdef
->root
.u
.def
.section
;
1506 h
->root
.u
.def
.value
= h
->u
.weakdef
->root
.u
.def
.value
;
1510 /* This is a reference to a symbol defined by a dynamic object. The
1511 reference must go through the GOT, so there's no need for COPY relocs,
1519 elf_xtensa_allocate_dynrelocs (struct elf_link_hash_entry
*h
, void *arg
)
1521 struct bfd_link_info
*info
;
1522 struct elf_xtensa_link_hash_table
*htab
;
1523 struct elf_xtensa_link_hash_entry
*eh
= elf_xtensa_hash_entry (h
);
1525 if (h
->root
.type
== bfd_link_hash_indirect
)
1528 info
= (struct bfd_link_info
*) arg
;
1529 htab
= elf_xtensa_hash_table (info
);
1533 /* If we saw any use of an IE model for this symbol, we can then optimize
1534 away GOT entries for any TLSDESC_FN relocs. */
1535 if ((eh
->tls_type
& GOT_TLS_IE
) != 0)
1537 BFD_ASSERT (h
->got
.refcount
>= eh
->tlsfunc_refcount
);
1538 h
->got
.refcount
-= eh
->tlsfunc_refcount
;
1541 if (! elf_xtensa_dynamic_symbol_p (h
, info
))
1542 elf_xtensa_make_sym_local (info
, h
);
1544 if (h
->plt
.refcount
> 0)
1545 htab
->srelplt
->size
+= (h
->plt
.refcount
* sizeof (Elf32_External_Rela
));
1547 if (h
->got
.refcount
> 0)
1548 htab
->srelgot
->size
+= (h
->got
.refcount
* sizeof (Elf32_External_Rela
));
1555 elf_xtensa_allocate_local_got_size (struct bfd_link_info
*info
)
1557 struct elf_xtensa_link_hash_table
*htab
;
1560 htab
= elf_xtensa_hash_table (info
);
1564 for (i
= info
->input_bfds
; i
; i
= i
->link
.next
)
1566 bfd_signed_vma
*local_got_refcounts
;
1567 bfd_size_type j
, cnt
;
1568 Elf_Internal_Shdr
*symtab_hdr
;
1570 local_got_refcounts
= elf_local_got_refcounts (i
);
1571 if (!local_got_refcounts
)
1574 symtab_hdr
= &elf_tdata (i
)->symtab_hdr
;
1575 cnt
= symtab_hdr
->sh_info
;
1577 for (j
= 0; j
< cnt
; ++j
)
1579 /* If we saw any use of an IE model for this symbol, we can
1580 then optimize away GOT entries for any TLSDESC_FN relocs. */
1581 if ((elf_xtensa_local_got_tls_type (i
) [j
] & GOT_TLS_IE
) != 0)
1583 bfd_signed_vma
*tlsfunc_refcount
1584 = &elf_xtensa_local_tlsfunc_refcounts (i
) [j
];
1585 BFD_ASSERT (local_got_refcounts
[j
] >= *tlsfunc_refcount
);
1586 local_got_refcounts
[j
] -= *tlsfunc_refcount
;
1589 if (local_got_refcounts
[j
] > 0)
1590 htab
->srelgot
->size
+= (local_got_refcounts
[j
]
1591 * sizeof (Elf32_External_Rela
));
1597 /* Set the sizes of the dynamic sections. */
1600 elf_xtensa_size_dynamic_sections (bfd
*output_bfd ATTRIBUTE_UNUSED
,
1601 struct bfd_link_info
*info
)
1603 struct elf_xtensa_link_hash_table
*htab
;
1605 asection
*s
, *srelplt
, *splt
, *sgotplt
, *srelgot
, *spltlittbl
, *sgotloc
;
1606 bfd_boolean relplt
, relgot
;
1607 int plt_entries
, plt_chunks
, chunk
;
1612 htab
= elf_xtensa_hash_table (info
);
1616 dynobj
= elf_hash_table (info
)->dynobj
;
1619 srelgot
= htab
->srelgot
;
1620 srelplt
= htab
->srelplt
;
1622 if (elf_hash_table (info
)->dynamic_sections_created
)
1624 BFD_ASSERT (htab
->srelgot
!= NULL
1625 && htab
->srelplt
!= NULL
1626 && htab
->sgot
!= NULL
1627 && htab
->spltlittbl
!= NULL
1628 && htab
->sgotloc
!= NULL
);
1630 /* Set the contents of the .interp section to the interpreter. */
1631 if (info
->executable
)
1633 s
= bfd_get_linker_section (dynobj
, ".interp");
1636 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
1637 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
1640 /* Allocate room for one word in ".got". */
1641 htab
->sgot
->size
= 4;
1643 /* Allocate space in ".rela.got" for literals that reference global
1644 symbols and space in ".rela.plt" for literals that have PLT
1646 elf_link_hash_traverse (elf_hash_table (info
),
1647 elf_xtensa_allocate_dynrelocs
,
1650 /* If we are generating a shared object, we also need space in
1651 ".rela.got" for R_XTENSA_RELATIVE relocs for literals that
1652 reference local symbols. */
1654 elf_xtensa_allocate_local_got_size (info
);
1656 /* Allocate space in ".plt" to match the size of ".rela.plt". For
1657 each PLT entry, we need the PLT code plus a 4-byte literal.
1658 For each chunk of ".plt", we also need two more 4-byte
1659 literals, two corresponding entries in ".rela.got", and an
1660 8-byte entry in ".xt.lit.plt". */
1661 spltlittbl
= htab
->spltlittbl
;
1662 plt_entries
= srelplt
->size
/ sizeof (Elf32_External_Rela
);
1664 (plt_entries
+ PLT_ENTRIES_PER_CHUNK
- 1) / PLT_ENTRIES_PER_CHUNK
;
1666 /* Iterate over all the PLT chunks, including any extra sections
1667 created earlier because the initial count of PLT relocations
1668 was an overestimate. */
1670 (splt
= elf_xtensa_get_plt_section (info
, chunk
)) != NULL
;
1675 sgotplt
= elf_xtensa_get_gotplt_section (info
, chunk
);
1676 BFD_ASSERT (sgotplt
!= NULL
);
1678 if (chunk
< plt_chunks
- 1)
1679 chunk_entries
= PLT_ENTRIES_PER_CHUNK
;
1680 else if (chunk
== plt_chunks
- 1)
1681 chunk_entries
= plt_entries
- (chunk
* PLT_ENTRIES_PER_CHUNK
);
1685 if (chunk_entries
!= 0)
1687 sgotplt
->size
= 4 * (chunk_entries
+ 2);
1688 splt
->size
= PLT_ENTRY_SIZE
* chunk_entries
;
1689 srelgot
->size
+= 2 * sizeof (Elf32_External_Rela
);
1690 spltlittbl
->size
+= 8;
1699 /* Allocate space in ".got.loc" to match the total size of all the
1701 sgotloc
= htab
->sgotloc
;
1702 sgotloc
->size
= spltlittbl
->size
;
1703 for (abfd
= info
->input_bfds
; abfd
!= NULL
; abfd
= abfd
->link
.next
)
1705 if (abfd
->flags
& DYNAMIC
)
1707 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
1709 if (! discarded_section (s
)
1710 && xtensa_is_littable_section (s
)
1712 sgotloc
->size
+= s
->size
;
1717 /* Allocate memory for dynamic sections. */
1720 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
1724 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
1727 /* It's OK to base decisions on the section name, because none
1728 of the dynobj section names depend upon the input files. */
1729 name
= bfd_get_section_name (dynobj
, s
);
1731 if (CONST_STRNEQ (name
, ".rela"))
1735 if (strcmp (name
, ".rela.plt") == 0)
1737 else if (strcmp (name
, ".rela.got") == 0)
1740 /* We use the reloc_count field as a counter if we need
1741 to copy relocs into the output file. */
1745 else if (! CONST_STRNEQ (name
, ".plt.")
1746 && ! CONST_STRNEQ (name
, ".got.plt.")
1747 && strcmp (name
, ".got") != 0
1748 && strcmp (name
, ".plt") != 0
1749 && strcmp (name
, ".got.plt") != 0
1750 && strcmp (name
, ".xt.lit.plt") != 0
1751 && strcmp (name
, ".got.loc") != 0)
1753 /* It's not one of our sections, so don't allocate space. */
1759 /* If we don't need this section, strip it from the output
1760 file. We must create the ".plt*" and ".got.plt*"
1761 sections in create_dynamic_sections and/or check_relocs
1762 based on a conservative estimate of the PLT relocation
1763 count, because the sections must be created before the
1764 linker maps input sections to output sections. The
1765 linker does that before size_dynamic_sections, where we
1766 compute the exact size of the PLT, so there may be more
1767 of these sections than are actually needed. */
1768 s
->flags
|= SEC_EXCLUDE
;
1770 else if ((s
->flags
& SEC_HAS_CONTENTS
) != 0)
1772 /* Allocate memory for the section contents. */
1773 s
->contents
= (bfd_byte
*) bfd_zalloc (dynobj
, s
->size
);
1774 if (s
->contents
== NULL
)
1779 if (elf_hash_table (info
)->dynamic_sections_created
)
1781 /* Add the special XTENSA_RTLD relocations now. The offsets won't be
1782 known until finish_dynamic_sections, but we need to get the relocs
1783 in place before they are sorted. */
1784 for (chunk
= 0; chunk
< plt_chunks
; chunk
++)
1786 Elf_Internal_Rela irela
;
1790 irela
.r_info
= ELF32_R_INFO (0, R_XTENSA_RTLD
);
1793 loc
= (srelgot
->contents
1794 + srelgot
->reloc_count
* sizeof (Elf32_External_Rela
));
1795 bfd_elf32_swap_reloca_out (output_bfd
, &irela
, loc
);
1796 bfd_elf32_swap_reloca_out (output_bfd
, &irela
,
1797 loc
+ sizeof (Elf32_External_Rela
));
1798 srelgot
->reloc_count
+= 2;
1801 /* Add some entries to the .dynamic section. We fill in the
1802 values later, in elf_xtensa_finish_dynamic_sections, but we
1803 must add the entries now so that we get the correct size for
1804 the .dynamic section. The DT_DEBUG entry is filled in by the
1805 dynamic linker and used by the debugger. */
1806 #define add_dynamic_entry(TAG, VAL) \
1807 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1809 if (info
->executable
)
1811 if (!add_dynamic_entry (DT_DEBUG
, 0))
1817 if (!add_dynamic_entry (DT_PLTRELSZ
, 0)
1818 || !add_dynamic_entry (DT_PLTREL
, DT_RELA
)
1819 || !add_dynamic_entry (DT_JMPREL
, 0))
1825 if (!add_dynamic_entry (DT_RELA
, 0)
1826 || !add_dynamic_entry (DT_RELASZ
, 0)
1827 || !add_dynamic_entry (DT_RELAENT
, sizeof (Elf32_External_Rela
)))
1831 if (!add_dynamic_entry (DT_PLTGOT
, 0)
1832 || !add_dynamic_entry (DT_XTENSA_GOT_LOC_OFF
, 0)
1833 || !add_dynamic_entry (DT_XTENSA_GOT_LOC_SZ
, 0))
1836 #undef add_dynamic_entry
1842 elf_xtensa_always_size_sections (bfd
*output_bfd
,
1843 struct bfd_link_info
*info
)
1845 struct elf_xtensa_link_hash_table
*htab
;
1848 htab
= elf_xtensa_hash_table (info
);
1852 tls_sec
= htab
->elf
.tls_sec
;
1854 if (tls_sec
&& (htab
->tlsbase
->tls_type
& GOT_TLS_ANY
) != 0)
1856 struct elf_link_hash_entry
*tlsbase
= &htab
->tlsbase
->elf
;
1857 struct bfd_link_hash_entry
*bh
= &tlsbase
->root
;
1858 const struct elf_backend_data
*bed
= get_elf_backend_data (output_bfd
);
1860 tlsbase
->type
= STT_TLS
;
1861 if (!(_bfd_generic_link_add_one_symbol
1862 (info
, output_bfd
, "_TLS_MODULE_BASE_", BSF_LOCAL
,
1863 tls_sec
, 0, NULL
, FALSE
,
1864 bed
->collect
, &bh
)))
1866 tlsbase
->def_regular
= 1;
1867 tlsbase
->other
= STV_HIDDEN
;
1868 (*bed
->elf_backend_hide_symbol
) (info
, tlsbase
, TRUE
);
1875 /* Return the base VMA address which should be subtracted from real addresses
1876 when resolving @dtpoff relocation.
1877 This is PT_TLS segment p_vaddr. */
1880 dtpoff_base (struct bfd_link_info
*info
)
1882 /* If tls_sec is NULL, we should have signalled an error already. */
1883 if (elf_hash_table (info
)->tls_sec
== NULL
)
1885 return elf_hash_table (info
)->tls_sec
->vma
;
1888 /* Return the relocation value for @tpoff relocation
1889 if STT_TLS virtual address is ADDRESS. */
1892 tpoff (struct bfd_link_info
*info
, bfd_vma address
)
1894 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
1897 /* If tls_sec is NULL, we should have signalled an error already. */
1898 if (htab
->tls_sec
== NULL
)
1900 base
= align_power ((bfd_vma
) TCB_SIZE
, htab
->tls_sec
->alignment_power
);
1901 return address
- htab
->tls_sec
->vma
+ base
;
1904 /* Perform the specified relocation. The instruction at (contents + address)
1905 is modified to set one operand to represent the value in "relocation". The
1906 operand position is determined by the relocation type recorded in the
1909 #define CALL_SEGMENT_BITS (30)
1910 #define CALL_SEGMENT_SIZE (1 << CALL_SEGMENT_BITS)
1912 static bfd_reloc_status_type
1913 elf_xtensa_do_reloc (reloc_howto_type
*howto
,
1915 asection
*input_section
,
1919 bfd_boolean is_weak_undef
,
1920 char **error_message
)
1923 xtensa_opcode opcode
;
1924 xtensa_isa isa
= xtensa_default_isa
;
1925 static xtensa_insnbuf ibuff
= NULL
;
1926 static xtensa_insnbuf sbuff
= NULL
;
1927 bfd_vma self_address
;
1928 bfd_size_type input_size
;
1934 ibuff
= xtensa_insnbuf_alloc (isa
);
1935 sbuff
= xtensa_insnbuf_alloc (isa
);
1938 input_size
= bfd_get_section_limit (abfd
, input_section
);
1940 /* Calculate the PC address for this instruction. */
1941 self_address
= (input_section
->output_section
->vma
1942 + input_section
->output_offset
1945 switch (howto
->type
)
1948 case R_XTENSA_DIFF8
:
1949 case R_XTENSA_DIFF16
:
1950 case R_XTENSA_DIFF32
:
1951 case R_XTENSA_TLS_FUNC
:
1952 case R_XTENSA_TLS_ARG
:
1953 case R_XTENSA_TLS_CALL
:
1954 return bfd_reloc_ok
;
1956 case R_XTENSA_ASM_EXPAND
:
1959 /* Check for windowed CALL across a 1GB boundary. */
1960 opcode
= get_expanded_call_opcode (contents
+ address
,
1961 input_size
- address
, 0);
1962 if (is_windowed_call_opcode (opcode
))
1964 if ((self_address
>> CALL_SEGMENT_BITS
)
1965 != (relocation
>> CALL_SEGMENT_BITS
))
1967 *error_message
= "windowed longcall crosses 1GB boundary; "
1969 return bfd_reloc_dangerous
;
1973 return bfd_reloc_ok
;
1975 case R_XTENSA_ASM_SIMPLIFY
:
1977 /* Convert the L32R/CALLX to CALL. */
1978 bfd_reloc_status_type retval
=
1979 elf_xtensa_do_asm_simplify (contents
, address
, input_size
,
1981 if (retval
!= bfd_reloc_ok
)
1982 return bfd_reloc_dangerous
;
1984 /* The CALL needs to be relocated. Continue below for that part. */
1987 howto
= &elf_howto_table
[(unsigned) R_XTENSA_SLOT0_OP
];
1994 x
= bfd_get_32 (abfd
, contents
+ address
);
1996 bfd_put_32 (abfd
, x
, contents
+ address
);
1998 return bfd_reloc_ok
;
2000 case R_XTENSA_32_PCREL
:
2001 bfd_put_32 (abfd
, relocation
- self_address
, contents
+ address
);
2002 return bfd_reloc_ok
;
2005 case R_XTENSA_TLSDESC_FN
:
2006 case R_XTENSA_TLSDESC_ARG
:
2007 case R_XTENSA_TLS_DTPOFF
:
2008 case R_XTENSA_TLS_TPOFF
:
2009 bfd_put_32 (abfd
, relocation
, contents
+ address
);
2010 return bfd_reloc_ok
;
2013 /* Only instruction slot-specific relocations handled below.... */
2014 slot
= get_relocation_slot (howto
->type
);
2015 if (slot
== XTENSA_UNDEFINED
)
2017 *error_message
= "unexpected relocation";
2018 return bfd_reloc_dangerous
;
2021 /* Read the instruction into a buffer and decode the opcode. */
2022 xtensa_insnbuf_from_chars (isa
, ibuff
, contents
+ address
,
2023 input_size
- address
);
2024 fmt
= xtensa_format_decode (isa
, ibuff
);
2025 if (fmt
== XTENSA_UNDEFINED
)
2027 *error_message
= "cannot decode instruction format";
2028 return bfd_reloc_dangerous
;
2031 xtensa_format_get_slot (isa
, fmt
, slot
, ibuff
, sbuff
);
2033 opcode
= xtensa_opcode_decode (isa
, fmt
, slot
, sbuff
);
2034 if (opcode
== XTENSA_UNDEFINED
)
2036 *error_message
= "cannot decode instruction opcode";
2037 return bfd_reloc_dangerous
;
2040 /* Check for opcode-specific "alternate" relocations. */
2041 if (is_alt_relocation (howto
->type
))
2043 if (opcode
== get_l32r_opcode ())
2045 /* Handle the special-case of non-PC-relative L32R instructions. */
2046 bfd
*output_bfd
= input_section
->output_section
->owner
;
2047 asection
*lit4_sec
= bfd_get_section_by_name (output_bfd
, ".lit4");
2050 *error_message
= "relocation references missing .lit4 section";
2051 return bfd_reloc_dangerous
;
2053 self_address
= ((lit4_sec
->vma
& ~0xfff)
2054 + 0x40000 - 3); /* -3 to compensate for do_reloc */
2055 newval
= relocation
;
2058 else if (opcode
== get_const16_opcode ())
2060 /* ALT used for high 16 bits. */
2061 newval
= relocation
>> 16;
2066 /* No other "alternate" relocations currently defined. */
2067 *error_message
= "unexpected relocation";
2068 return bfd_reloc_dangerous
;
2071 else /* Not an "alternate" relocation.... */
2073 if (opcode
== get_const16_opcode ())
2075 newval
= relocation
& 0xffff;
2080 /* ...normal PC-relative relocation.... */
2082 /* Determine which operand is being relocated. */
2083 opnd
= get_relocation_opnd (opcode
, howto
->type
);
2084 if (opnd
== XTENSA_UNDEFINED
)
2086 *error_message
= "unexpected relocation";
2087 return bfd_reloc_dangerous
;
2090 if (!howto
->pc_relative
)
2092 *error_message
= "expected PC-relative relocation";
2093 return bfd_reloc_dangerous
;
2096 newval
= relocation
;
2100 /* Apply the relocation. */
2101 if (xtensa_operand_do_reloc (isa
, opcode
, opnd
, &newval
, self_address
)
2102 || xtensa_operand_encode (isa
, opcode
, opnd
, &newval
)
2103 || xtensa_operand_set_field (isa
, opcode
, opnd
, fmt
, slot
,
2106 const char *opname
= xtensa_opcode_name (isa
, opcode
);
2109 msg
= "cannot encode";
2110 if (is_direct_call_opcode (opcode
))
2112 if ((relocation
& 0x3) != 0)
2113 msg
= "misaligned call target";
2115 msg
= "call target out of range";
2117 else if (opcode
== get_l32r_opcode ())
2119 if ((relocation
& 0x3) != 0)
2120 msg
= "misaligned literal target";
2121 else if (is_alt_relocation (howto
->type
))
2122 msg
= "literal target out of range (too many literals)";
2123 else if (self_address
> relocation
)
2124 msg
= "literal target out of range (try using text-section-literals)";
2126 msg
= "literal placed after use";
2129 *error_message
= vsprint_msg (opname
, ": %s", strlen (msg
) + 2, msg
);
2130 return bfd_reloc_dangerous
;
2133 /* Check for calls across 1GB boundaries. */
2134 if (is_direct_call_opcode (opcode
)
2135 && is_windowed_call_opcode (opcode
))
2137 if ((self_address
>> CALL_SEGMENT_BITS
)
2138 != (relocation
>> CALL_SEGMENT_BITS
))
2141 "windowed call crosses 1GB boundary; return may fail";
2142 return bfd_reloc_dangerous
;
2146 /* Write the modified instruction back out of the buffer. */
2147 xtensa_format_set_slot (isa
, fmt
, slot
, ibuff
, sbuff
);
2148 xtensa_insnbuf_to_chars (isa
, ibuff
, contents
+ address
,
2149 input_size
- address
);
2150 return bfd_reloc_ok
;
2155 vsprint_msg (const char *origmsg
, const char *fmt
, int arglen
, ...)
2157 /* To reduce the size of the memory leak,
2158 we only use a single message buffer. */
2159 static bfd_size_type alloc_size
= 0;
2160 static char *message
= NULL
;
2161 bfd_size_type orig_len
, len
= 0;
2162 bfd_boolean is_append
;
2165 va_start (ap
, arglen
);
2167 is_append
= (origmsg
== message
);
2169 orig_len
= strlen (origmsg
);
2170 len
= orig_len
+ strlen (fmt
) + arglen
+ 20;
2171 if (len
> alloc_size
)
2173 message
= (char *) bfd_realloc_or_free (message
, len
);
2176 if (message
!= NULL
)
2179 memcpy (message
, origmsg
, orig_len
);
2180 vsprintf (message
+ orig_len
, fmt
, ap
);
2187 /* This function is registered as the "special_function" in the
2188 Xtensa howto for handling simplify operations.
2189 bfd_perform_relocation / bfd_install_relocation use it to
2190 perform (install) the specified relocation. Since this replaces the code
2191 in bfd_perform_relocation, it is basically an Xtensa-specific,
2192 stripped-down version of bfd_perform_relocation. */
2194 static bfd_reloc_status_type
2195 bfd_elf_xtensa_reloc (bfd
*abfd
,
2196 arelent
*reloc_entry
,
2199 asection
*input_section
,
2201 char **error_message
)
2204 bfd_reloc_status_type flag
;
2205 bfd_size_type octets
= reloc_entry
->address
* bfd_octets_per_byte (abfd
);
2206 bfd_vma output_base
= 0;
2207 reloc_howto_type
*howto
= reloc_entry
->howto
;
2208 asection
*reloc_target_output_section
;
2209 bfd_boolean is_weak_undef
;
2211 if (!xtensa_default_isa
)
2212 xtensa_default_isa
= xtensa_isa_init (0, 0);
2214 /* ELF relocs are against symbols. If we are producing relocatable
2215 output, and the reloc is against an external symbol, the resulting
2216 reloc will also be against the same symbol. In such a case, we
2217 don't want to change anything about the way the reloc is handled,
2218 since it will all be done at final link time. This test is similar
2219 to what bfd_elf_generic_reloc does except that it lets relocs with
2220 howto->partial_inplace go through even if the addend is non-zero.
2221 (The real problem is that partial_inplace is set for XTENSA_32
2222 relocs to begin with, but that's a long story and there's little we
2223 can do about it now....) */
2225 if (output_bfd
&& (symbol
->flags
& BSF_SECTION_SYM
) == 0)
2227 reloc_entry
->address
+= input_section
->output_offset
;
2228 return bfd_reloc_ok
;
2231 /* Is the address of the relocation really within the section? */
2232 if (reloc_entry
->address
> bfd_get_section_limit (abfd
, input_section
))
2233 return bfd_reloc_outofrange
;
2235 /* Work out which section the relocation is targeted at and the
2236 initial relocation command value. */
2238 /* Get symbol value. (Common symbols are special.) */
2239 if (bfd_is_com_section (symbol
->section
))
2242 relocation
= symbol
->value
;
2244 reloc_target_output_section
= symbol
->section
->output_section
;
2246 /* Convert input-section-relative symbol value to absolute. */
2247 if ((output_bfd
&& !howto
->partial_inplace
)
2248 || reloc_target_output_section
== NULL
)
2251 output_base
= reloc_target_output_section
->vma
;
2253 relocation
+= output_base
+ symbol
->section
->output_offset
;
2255 /* Add in supplied addend. */
2256 relocation
+= reloc_entry
->addend
;
2258 /* Here the variable relocation holds the final address of the
2259 symbol we are relocating against, plus any addend. */
2262 if (!howto
->partial_inplace
)
2264 /* This is a partial relocation, and we want to apply the relocation
2265 to the reloc entry rather than the raw data. Everything except
2266 relocations against section symbols has already been handled
2269 BFD_ASSERT (symbol
->flags
& BSF_SECTION_SYM
);
2270 reloc_entry
->addend
= relocation
;
2271 reloc_entry
->address
+= input_section
->output_offset
;
2272 return bfd_reloc_ok
;
2276 reloc_entry
->address
+= input_section
->output_offset
;
2277 reloc_entry
->addend
= 0;
2281 is_weak_undef
= (bfd_is_und_section (symbol
->section
)
2282 && (symbol
->flags
& BSF_WEAK
) != 0);
2283 flag
= elf_xtensa_do_reloc (howto
, abfd
, input_section
, relocation
,
2284 (bfd_byte
*) data
, (bfd_vma
) octets
,
2285 is_weak_undef
, error_message
);
2287 if (flag
== bfd_reloc_dangerous
)
2289 /* Add the symbol name to the error message. */
2290 if (! *error_message
)
2291 *error_message
= "";
2292 *error_message
= vsprint_msg (*error_message
, ": (%s + 0x%lx)",
2293 strlen (symbol
->name
) + 17,
2295 (unsigned long) reloc_entry
->addend
);
2302 /* Set up an entry in the procedure linkage table. */
2305 elf_xtensa_create_plt_entry (struct bfd_link_info
*info
,
2307 unsigned reloc_index
)
2309 asection
*splt
, *sgotplt
;
2310 bfd_vma plt_base
, got_base
;
2311 bfd_vma code_offset
, lit_offset
;
2314 chunk
= reloc_index
/ PLT_ENTRIES_PER_CHUNK
;
2315 splt
= elf_xtensa_get_plt_section (info
, chunk
);
2316 sgotplt
= elf_xtensa_get_gotplt_section (info
, chunk
);
2317 BFD_ASSERT (splt
!= NULL
&& sgotplt
!= NULL
);
2319 plt_base
= splt
->output_section
->vma
+ splt
->output_offset
;
2320 got_base
= sgotplt
->output_section
->vma
+ sgotplt
->output_offset
;
2322 lit_offset
= 8 + (reloc_index
% PLT_ENTRIES_PER_CHUNK
) * 4;
2323 code_offset
= (reloc_index
% PLT_ENTRIES_PER_CHUNK
) * PLT_ENTRY_SIZE
;
2325 /* Fill in the literal entry. This is the offset of the dynamic
2326 relocation entry. */
2327 bfd_put_32 (output_bfd
, reloc_index
* sizeof (Elf32_External_Rela
),
2328 sgotplt
->contents
+ lit_offset
);
2330 /* Fill in the entry in the procedure linkage table. */
2331 memcpy (splt
->contents
+ code_offset
,
2332 (bfd_big_endian (output_bfd
)
2333 ? elf_xtensa_be_plt_entry
2334 : elf_xtensa_le_plt_entry
),
2336 bfd_put_16 (output_bfd
, l32r_offset (got_base
+ 0,
2337 plt_base
+ code_offset
+ 3),
2338 splt
->contents
+ code_offset
+ 4);
2339 bfd_put_16 (output_bfd
, l32r_offset (got_base
+ 4,
2340 plt_base
+ code_offset
+ 6),
2341 splt
->contents
+ code_offset
+ 7);
2342 bfd_put_16 (output_bfd
, l32r_offset (got_base
+ lit_offset
,
2343 plt_base
+ code_offset
+ 9),
2344 splt
->contents
+ code_offset
+ 10);
2346 return plt_base
+ code_offset
;
2350 static bfd_boolean
get_indirect_call_dest_reg (xtensa_opcode
, unsigned *);
2353 replace_tls_insn (Elf_Internal_Rela
*rel
,
2355 asection
*input_section
,
2357 bfd_boolean is_ld_model
,
2358 char **error_message
)
2360 static xtensa_insnbuf ibuff
= NULL
;
2361 static xtensa_insnbuf sbuff
= NULL
;
2362 xtensa_isa isa
= xtensa_default_isa
;
2364 xtensa_opcode old_op
, new_op
;
2365 bfd_size_type input_size
;
2367 unsigned dest_reg
, src_reg
;
2371 ibuff
= xtensa_insnbuf_alloc (isa
);
2372 sbuff
= xtensa_insnbuf_alloc (isa
);
2375 input_size
= bfd_get_section_limit (abfd
, input_section
);
2377 /* Read the instruction into a buffer and decode the opcode. */
2378 xtensa_insnbuf_from_chars (isa
, ibuff
, contents
+ rel
->r_offset
,
2379 input_size
- rel
->r_offset
);
2380 fmt
= xtensa_format_decode (isa
, ibuff
);
2381 if (fmt
== XTENSA_UNDEFINED
)
2383 *error_message
= "cannot decode instruction format";
2387 BFD_ASSERT (xtensa_format_num_slots (isa
, fmt
) == 1);
2388 xtensa_format_get_slot (isa
, fmt
, 0, ibuff
, sbuff
);
2390 old_op
= xtensa_opcode_decode (isa
, fmt
, 0, sbuff
);
2391 if (old_op
== XTENSA_UNDEFINED
)
2393 *error_message
= "cannot decode instruction opcode";
2397 r_type
= ELF32_R_TYPE (rel
->r_info
);
2400 case R_XTENSA_TLS_FUNC
:
2401 case R_XTENSA_TLS_ARG
:
2402 if (old_op
!= get_l32r_opcode ()
2403 || xtensa_operand_get_field (isa
, old_op
, 0, fmt
, 0,
2404 sbuff
, &dest_reg
) != 0)
2406 *error_message
= "cannot extract L32R destination for TLS access";
2411 case R_XTENSA_TLS_CALL
:
2412 if (! get_indirect_call_dest_reg (old_op
, &dest_reg
)
2413 || xtensa_operand_get_field (isa
, old_op
, 0, fmt
, 0,
2414 sbuff
, &src_reg
) != 0)
2416 *error_message
= "cannot extract CALLXn operands for TLS access";
2429 case R_XTENSA_TLS_FUNC
:
2430 case R_XTENSA_TLS_ARG
:
2431 /* Change the instruction to a NOP (or "OR a1, a1, a1" for older
2432 versions of Xtensa). */
2433 new_op
= xtensa_opcode_lookup (isa
, "nop");
2434 if (new_op
== XTENSA_UNDEFINED
)
2436 new_op
= xtensa_opcode_lookup (isa
, "or");
2437 if (new_op
== XTENSA_UNDEFINED
2438 || xtensa_opcode_encode (isa
, fmt
, 0, sbuff
, new_op
) != 0
2439 || xtensa_operand_set_field (isa
, new_op
, 0, fmt
, 0,
2441 || xtensa_operand_set_field (isa
, new_op
, 1, fmt
, 0,
2443 || xtensa_operand_set_field (isa
, new_op
, 2, fmt
, 0,
2446 *error_message
= "cannot encode OR for TLS access";
2452 if (xtensa_opcode_encode (isa
, fmt
, 0, sbuff
, new_op
) != 0)
2454 *error_message
= "cannot encode NOP for TLS access";
2460 case R_XTENSA_TLS_CALL
:
2461 /* Read THREADPTR into the CALLX's return value register. */
2462 new_op
= xtensa_opcode_lookup (isa
, "rur.threadptr");
2463 if (new_op
== XTENSA_UNDEFINED
2464 || xtensa_opcode_encode (isa
, fmt
, 0, sbuff
, new_op
) != 0
2465 || xtensa_operand_set_field (isa
, new_op
, 0, fmt
, 0,
2466 sbuff
, dest_reg
+ 2) != 0)
2468 *error_message
= "cannot encode RUR.THREADPTR for TLS access";
2478 case R_XTENSA_TLS_FUNC
:
2479 new_op
= xtensa_opcode_lookup (isa
, "rur.threadptr");
2480 if (new_op
== XTENSA_UNDEFINED
2481 || xtensa_opcode_encode (isa
, fmt
, 0, sbuff
, new_op
) != 0
2482 || xtensa_operand_set_field (isa
, new_op
, 0, fmt
, 0,
2483 sbuff
, dest_reg
) != 0)
2485 *error_message
= "cannot encode RUR.THREADPTR for TLS access";
2490 case R_XTENSA_TLS_ARG
:
2491 /* Nothing to do. Keep the original L32R instruction. */
2494 case R_XTENSA_TLS_CALL
:
2495 /* Add the CALLX's src register (holding the THREADPTR value)
2496 to the first argument register (holding the offset) and put
2497 the result in the CALLX's return value register. */
2498 new_op
= xtensa_opcode_lookup (isa
, "add");
2499 if (new_op
== XTENSA_UNDEFINED
2500 || xtensa_opcode_encode (isa
, fmt
, 0, sbuff
, new_op
) != 0
2501 || xtensa_operand_set_field (isa
, new_op
, 0, fmt
, 0,
2502 sbuff
, dest_reg
+ 2) != 0
2503 || xtensa_operand_set_field (isa
, new_op
, 1, fmt
, 0,
2504 sbuff
, dest_reg
+ 2) != 0
2505 || xtensa_operand_set_field (isa
, new_op
, 2, fmt
, 0,
2506 sbuff
, src_reg
) != 0)
2508 *error_message
= "cannot encode ADD for TLS access";
2515 xtensa_format_set_slot (isa
, fmt
, 0, ibuff
, sbuff
);
2516 xtensa_insnbuf_to_chars (isa
, ibuff
, contents
+ rel
->r_offset
,
2517 input_size
- rel
->r_offset
);
2523 #define IS_XTENSA_TLS_RELOC(R_TYPE) \
2524 ((R_TYPE) == R_XTENSA_TLSDESC_FN \
2525 || (R_TYPE) == R_XTENSA_TLSDESC_ARG \
2526 || (R_TYPE) == R_XTENSA_TLS_DTPOFF \
2527 || (R_TYPE) == R_XTENSA_TLS_TPOFF \
2528 || (R_TYPE) == R_XTENSA_TLS_FUNC \
2529 || (R_TYPE) == R_XTENSA_TLS_ARG \
2530 || (R_TYPE) == R_XTENSA_TLS_CALL)
2532 /* Relocate an Xtensa ELF section. This is invoked by the linker for
2533 both relocatable and final links. */
2536 elf_xtensa_relocate_section (bfd
*output_bfd
,
2537 struct bfd_link_info
*info
,
2539 asection
*input_section
,
2541 Elf_Internal_Rela
*relocs
,
2542 Elf_Internal_Sym
*local_syms
,
2543 asection
**local_sections
)
2545 struct elf_xtensa_link_hash_table
*htab
;
2546 Elf_Internal_Shdr
*symtab_hdr
;
2547 Elf_Internal_Rela
*rel
;
2548 Elf_Internal_Rela
*relend
;
2549 struct elf_link_hash_entry
**sym_hashes
;
2550 property_table_entry
*lit_table
= 0;
2552 char *local_got_tls_types
;
2553 char *error_message
= NULL
;
2554 bfd_size_type input_size
;
2557 if (!xtensa_default_isa
)
2558 xtensa_default_isa
= xtensa_isa_init (0, 0);
2560 BFD_ASSERT (is_xtensa_elf (input_bfd
));
2562 htab
= elf_xtensa_hash_table (info
);
2566 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
2567 sym_hashes
= elf_sym_hashes (input_bfd
);
2568 local_got_tls_types
= elf_xtensa_local_got_tls_type (input_bfd
);
2570 if (elf_hash_table (info
)->dynamic_sections_created
)
2572 ltblsize
= xtensa_read_table_entries (input_bfd
, input_section
,
2573 &lit_table
, XTENSA_LIT_SEC_NAME
,
2579 input_size
= bfd_get_section_limit (input_bfd
, input_section
);
2582 relend
= relocs
+ input_section
->reloc_count
;
2583 for (; rel
< relend
; rel
++)
2586 reloc_howto_type
*howto
;
2587 unsigned long r_symndx
;
2588 struct elf_link_hash_entry
*h
;
2589 Elf_Internal_Sym
*sym
;
2594 bfd_reloc_status_type r
;
2595 bfd_boolean is_weak_undef
;
2596 bfd_boolean unresolved_reloc
;
2598 bfd_boolean dynamic_symbol
;
2600 r_type
= ELF32_R_TYPE (rel
->r_info
);
2601 if (r_type
== (int) R_XTENSA_GNU_VTINHERIT
2602 || r_type
== (int) R_XTENSA_GNU_VTENTRY
)
2605 if (r_type
< 0 || r_type
>= (int) R_XTENSA_max
)
2607 bfd_set_error (bfd_error_bad_value
);
2610 howto
= &elf_howto_table
[r_type
];
2612 r_symndx
= ELF32_R_SYM (rel
->r_info
);
2617 is_weak_undef
= FALSE
;
2618 unresolved_reloc
= FALSE
;
2621 if (howto
->partial_inplace
&& !info
->relocatable
)
2623 /* Because R_XTENSA_32 was made partial_inplace to fix some
2624 problems with DWARF info in partial links, there may be
2625 an addend stored in the contents. Take it out of there
2626 and move it back into the addend field of the reloc. */
2627 rel
->r_addend
+= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
2628 bfd_put_32 (input_bfd
, 0, contents
+ rel
->r_offset
);
2631 if (r_symndx
< symtab_hdr
->sh_info
)
2633 sym
= local_syms
+ r_symndx
;
2634 sym_type
= ELF32_ST_TYPE (sym
->st_info
);
2635 sec
= local_sections
[r_symndx
];
2636 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
2640 bfd_boolean ignored
;
2642 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
2643 r_symndx
, symtab_hdr
, sym_hashes
,
2645 unresolved_reloc
, warned
, ignored
);
2648 && !unresolved_reloc
2649 && h
->root
.type
== bfd_link_hash_undefweak
)
2650 is_weak_undef
= TRUE
;
2655 if (sec
!= NULL
&& discarded_section (sec
))
2656 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
2657 rel
, 1, relend
, howto
, 0, contents
);
2659 if (info
->relocatable
)
2662 asection
* sym_sec
= get_elf_r_symndx_section (input_bfd
, r_symndx
);
2664 /* This is a relocatable link.
2665 1) If the reloc is against a section symbol, adjust
2666 according to the output section.
2667 2) If there is a new target for this relocation,
2668 the new target will be in the same output section.
2669 We adjust the relocation by the output section
2672 if (relaxing_section
)
2674 /* Check if this references a section in another input file. */
2675 if (!do_fix_for_relocatable_link (rel
, input_bfd
, input_section
,
2680 dest_addr
= sym_sec
->output_section
->vma
+ sym_sec
->output_offset
2681 + get_elf_r_symndx_offset (input_bfd
, r_symndx
) + rel
->r_addend
;
2683 if (r_type
== R_XTENSA_ASM_SIMPLIFY
)
2685 error_message
= NULL
;
2686 /* Convert ASM_SIMPLIFY into the simpler relocation
2687 so that they never escape a relaxing link. */
2688 r
= contract_asm_expansion (contents
, input_size
, rel
,
2690 if (r
!= bfd_reloc_ok
)
2692 if (!((*info
->callbacks
->reloc_dangerous
)
2693 (info
, error_message
, input_bfd
, input_section
,
2697 r_type
= ELF32_R_TYPE (rel
->r_info
);
2700 /* This is a relocatable link, so we don't have to change
2701 anything unless the reloc is against a section symbol,
2702 in which case we have to adjust according to where the
2703 section symbol winds up in the output section. */
2704 if (r_symndx
< symtab_hdr
->sh_info
)
2706 sym
= local_syms
+ r_symndx
;
2707 if (ELF_ST_TYPE (sym
->st_info
) == STT_SECTION
)
2709 sec
= local_sections
[r_symndx
];
2710 rel
->r_addend
+= sec
->output_offset
+ sym
->st_value
;
2714 /* If there is an addend with a partial_inplace howto,
2715 then move the addend to the contents. This is a hack
2716 to work around problems with DWARF in relocatable links
2717 with some previous version of BFD. Now we can't easily get
2718 rid of the hack without breaking backward compatibility.... */
2720 howto
= &elf_howto_table
[r_type
];
2721 if (howto
->partial_inplace
&& rel
->r_addend
)
2723 r
= elf_xtensa_do_reloc (howto
, input_bfd
, input_section
,
2724 rel
->r_addend
, contents
,
2725 rel
->r_offset
, FALSE
,
2731 /* Put the correct bits in the target instruction, even
2732 though the relocation will still be present in the output
2733 file. This makes disassembly clearer, as well as
2734 allowing loadable kernel modules to work without needing
2735 relocations on anything other than calls and l32r's. */
2737 /* If it is not in the same section, there is nothing we can do. */
2738 if (r_type
>= R_XTENSA_SLOT0_OP
&& r_type
<= R_XTENSA_SLOT14_OP
&&
2739 sym_sec
->output_section
== input_section
->output_section
)
2741 r
= elf_xtensa_do_reloc (howto
, input_bfd
, input_section
,
2742 dest_addr
, contents
,
2743 rel
->r_offset
, FALSE
,
2747 if (r
!= bfd_reloc_ok
)
2749 if (!((*info
->callbacks
->reloc_dangerous
)
2750 (info
, error_message
, input_bfd
, input_section
,
2755 /* Done with work for relocatable link; continue with next reloc. */
2759 /* This is a final link. */
2761 if (relaxing_section
)
2763 /* Check if this references a section in another input file. */
2764 do_fix_for_final_link (rel
, input_bfd
, input_section
, contents
,
2768 /* Sanity check the address. */
2769 if (rel
->r_offset
>= input_size
2770 && ELF32_R_TYPE (rel
->r_info
) != R_XTENSA_NONE
)
2772 (*_bfd_error_handler
)
2773 (_("%B(%A+0x%lx): relocation offset out of range (size=0x%x)"),
2774 input_bfd
, input_section
, rel
->r_offset
, input_size
);
2775 bfd_set_error (bfd_error_bad_value
);
2780 name
= h
->root
.root
.string
;
2783 name
= (bfd_elf_string_from_elf_section
2784 (input_bfd
, symtab_hdr
->sh_link
, sym
->st_name
));
2785 if (name
== NULL
|| *name
== '\0')
2786 name
= bfd_section_name (input_bfd
, sec
);
2789 if (r_symndx
!= STN_UNDEF
2790 && r_type
!= R_XTENSA_NONE
2792 || h
->root
.type
== bfd_link_hash_defined
2793 || h
->root
.type
== bfd_link_hash_defweak
)
2794 && IS_XTENSA_TLS_RELOC (r_type
) != (sym_type
== STT_TLS
))
2796 (*_bfd_error_handler
)
2797 ((sym_type
== STT_TLS
2798 ? _("%B(%A+0x%lx): %s used with TLS symbol %s")
2799 : _("%B(%A+0x%lx): %s used with non-TLS symbol %s")),
2802 (long) rel
->r_offset
,
2807 dynamic_symbol
= elf_xtensa_dynamic_symbol_p (h
, info
);
2809 tls_type
= GOT_UNKNOWN
;
2811 tls_type
= elf_xtensa_hash_entry (h
)->tls_type
;
2812 else if (local_got_tls_types
)
2813 tls_type
= local_got_tls_types
[r_symndx
];
2819 if (elf_hash_table (info
)->dynamic_sections_created
2820 && (input_section
->flags
& SEC_ALLOC
) != 0
2821 && (dynamic_symbol
|| info
->shared
))
2823 Elf_Internal_Rela outrel
;
2827 if (dynamic_symbol
&& r_type
== R_XTENSA_PLT
)
2828 srel
= htab
->srelplt
;
2830 srel
= htab
->srelgot
;
2832 BFD_ASSERT (srel
!= NULL
);
2835 _bfd_elf_section_offset (output_bfd
, info
,
2836 input_section
, rel
->r_offset
);
2838 if ((outrel
.r_offset
| 1) == (bfd_vma
) -1)
2839 memset (&outrel
, 0, sizeof outrel
);
2842 outrel
.r_offset
+= (input_section
->output_section
->vma
2843 + input_section
->output_offset
);
2845 /* Complain if the relocation is in a read-only section
2846 and not in a literal pool. */
2847 if ((input_section
->flags
& SEC_READONLY
) != 0
2848 && !elf_xtensa_in_literal_pool (lit_table
, ltblsize
,
2852 _("dynamic relocation in read-only section");
2853 if (!((*info
->callbacks
->reloc_dangerous
)
2854 (info
, error_message
, input_bfd
, input_section
,
2861 outrel
.r_addend
= rel
->r_addend
;
2864 if (r_type
== R_XTENSA_32
)
2867 ELF32_R_INFO (h
->dynindx
, R_XTENSA_GLOB_DAT
);
2870 else /* r_type == R_XTENSA_PLT */
2873 ELF32_R_INFO (h
->dynindx
, R_XTENSA_JMP_SLOT
);
2875 /* Create the PLT entry and set the initial
2876 contents of the literal entry to the address of
2879 elf_xtensa_create_plt_entry (info
, output_bfd
,
2882 unresolved_reloc
= FALSE
;
2886 /* Generate a RELATIVE relocation. */
2887 outrel
.r_info
= ELF32_R_INFO (0, R_XTENSA_RELATIVE
);
2888 outrel
.r_addend
= 0;
2892 loc
= (srel
->contents
2893 + srel
->reloc_count
++ * sizeof (Elf32_External_Rela
));
2894 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
2895 BFD_ASSERT (sizeof (Elf32_External_Rela
) * srel
->reloc_count
2898 else if (r_type
== R_XTENSA_ASM_EXPAND
&& dynamic_symbol
)
2900 /* This should only happen for non-PIC code, which is not
2901 supposed to be used on systems with dynamic linking.
2902 Just ignore these relocations. */
2907 case R_XTENSA_TLS_TPOFF
:
2908 /* Switch to LE model for local symbols in an executable. */
2909 if (! info
->shared
&& ! dynamic_symbol
)
2911 relocation
= tpoff (info
, relocation
);
2916 case R_XTENSA_TLSDESC_FN
:
2917 case R_XTENSA_TLSDESC_ARG
:
2919 if (r_type
== R_XTENSA_TLSDESC_FN
)
2921 if (! info
->shared
|| (tls_type
& GOT_TLS_IE
) != 0)
2922 r_type
= R_XTENSA_NONE
;
2924 else if (r_type
== R_XTENSA_TLSDESC_ARG
)
2928 if ((tls_type
& GOT_TLS_IE
) != 0)
2929 r_type
= R_XTENSA_TLS_TPOFF
;
2933 r_type
= R_XTENSA_TLS_TPOFF
;
2934 if (! dynamic_symbol
)
2936 relocation
= tpoff (info
, relocation
);
2942 if (r_type
== R_XTENSA_NONE
)
2943 /* Nothing to do here; skip to the next reloc. */
2946 if (! elf_hash_table (info
)->dynamic_sections_created
)
2949 _("TLS relocation invalid without dynamic sections");
2950 if (!((*info
->callbacks
->reloc_dangerous
)
2951 (info
, error_message
, input_bfd
, input_section
,
2957 Elf_Internal_Rela outrel
;
2959 asection
*srel
= htab
->srelgot
;
2962 outrel
.r_offset
= (input_section
->output_section
->vma
2963 + input_section
->output_offset
2966 /* Complain if the relocation is in a read-only section
2967 and not in a literal pool. */
2968 if ((input_section
->flags
& SEC_READONLY
) != 0
2969 && ! elf_xtensa_in_literal_pool (lit_table
, ltblsize
,
2973 _("dynamic relocation in read-only section");
2974 if (!((*info
->callbacks
->reloc_dangerous
)
2975 (info
, error_message
, input_bfd
, input_section
,
2980 indx
= h
&& h
->dynindx
!= -1 ? h
->dynindx
: 0;
2982 outrel
.r_addend
= relocation
- dtpoff_base (info
);
2984 outrel
.r_addend
= 0;
2987 outrel
.r_info
= ELF32_R_INFO (indx
, r_type
);
2989 unresolved_reloc
= FALSE
;
2992 loc
= (srel
->contents
2993 + srel
->reloc_count
++ * sizeof (Elf32_External_Rela
));
2994 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
2995 BFD_ASSERT (sizeof (Elf32_External_Rela
) * srel
->reloc_count
3001 case R_XTENSA_TLS_DTPOFF
:
3003 /* Switch from LD model to LE model. */
3004 relocation
= tpoff (info
, relocation
);
3006 relocation
-= dtpoff_base (info
);
3009 case R_XTENSA_TLS_FUNC
:
3010 case R_XTENSA_TLS_ARG
:
3011 case R_XTENSA_TLS_CALL
:
3012 /* Check if optimizing to IE or LE model. */
3013 if ((tls_type
& GOT_TLS_IE
) != 0)
3015 bfd_boolean is_ld_model
=
3016 (h
&& elf_xtensa_hash_entry (h
) == htab
->tlsbase
);
3017 if (! replace_tls_insn (rel
, input_bfd
, input_section
, contents
,
3018 is_ld_model
, &error_message
))
3020 if (!((*info
->callbacks
->reloc_dangerous
)
3021 (info
, error_message
, input_bfd
, input_section
,
3026 if (r_type
!= R_XTENSA_TLS_ARG
|| is_ld_model
)
3028 /* Skip subsequent relocations on the same instruction. */
3029 while (rel
+ 1 < relend
&& rel
[1].r_offset
== rel
->r_offset
)
3036 if (elf_hash_table (info
)->dynamic_sections_created
3037 && dynamic_symbol
&& (is_operand_relocation (r_type
)
3038 || r_type
== R_XTENSA_32_PCREL
))
3041 vsprint_msg ("invalid relocation for dynamic symbol", ": %s",
3042 strlen (name
) + 2, name
);
3043 if (!((*info
->callbacks
->reloc_dangerous
)
3044 (info
, error_message
, input_bfd
, input_section
,
3052 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3053 because such sections are not SEC_ALLOC and thus ld.so will
3054 not process them. */
3055 if (unresolved_reloc
3056 && !((input_section
->flags
& SEC_DEBUGGING
) != 0
3058 && _bfd_elf_section_offset (output_bfd
, info
, input_section
,
3059 rel
->r_offset
) != (bfd_vma
) -1)
3061 (*_bfd_error_handler
)
3062 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
3065 (long) rel
->r_offset
,
3071 /* TLS optimizations may have changed r_type; update "howto". */
3072 howto
= &elf_howto_table
[r_type
];
3074 /* There's no point in calling bfd_perform_relocation here.
3075 Just go directly to our "special function". */
3076 r
= elf_xtensa_do_reloc (howto
, input_bfd
, input_section
,
3077 relocation
+ rel
->r_addend
,
3078 contents
, rel
->r_offset
, is_weak_undef
,
3081 if (r
!= bfd_reloc_ok
&& !warned
)
3083 BFD_ASSERT (r
== bfd_reloc_dangerous
|| r
== bfd_reloc_other
);
3084 BFD_ASSERT (error_message
!= NULL
);
3086 if (rel
->r_addend
== 0)
3087 error_message
= vsprint_msg (error_message
, ": %s",
3088 strlen (name
) + 2, name
);
3090 error_message
= vsprint_msg (error_message
, ": (%s+0x%x)",
3092 name
, (int) rel
->r_addend
);
3094 if (!((*info
->callbacks
->reloc_dangerous
)
3095 (info
, error_message
, input_bfd
, input_section
,
3104 input_section
->reloc_done
= TRUE
;
3110 /* Finish up dynamic symbol handling. There's not much to do here since
3111 the PLT and GOT entries are all set up by relocate_section. */
3114 elf_xtensa_finish_dynamic_symbol (bfd
*output_bfd ATTRIBUTE_UNUSED
,
3115 struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
3116 struct elf_link_hash_entry
*h
,
3117 Elf_Internal_Sym
*sym
)
3119 if (h
->needs_plt
&& !h
->def_regular
)
3121 /* Mark the symbol as undefined, rather than as defined in
3122 the .plt section. Leave the value alone. */
3123 sym
->st_shndx
= SHN_UNDEF
;
3124 /* If the symbol is weak, we do need to clear the value.
3125 Otherwise, the PLT entry would provide a definition for
3126 the symbol even if the symbol wasn't defined anywhere,
3127 and so the symbol would never be NULL. */
3128 if (!h
->ref_regular_nonweak
)
3132 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3133 if (h
== elf_hash_table (info
)->hdynamic
3134 || h
== elf_hash_table (info
)->hgot
)
3135 sym
->st_shndx
= SHN_ABS
;
3141 /* Combine adjacent literal table entries in the output. Adjacent
3142 entries within each input section may have been removed during
3143 relaxation, but we repeat the process here, even though it's too late
3144 to shrink the output section, because it's important to minimize the
3145 number of literal table entries to reduce the start-up work for the
3146 runtime linker. Returns the number of remaining table entries or -1
3150 elf_xtensa_combine_prop_entries (bfd
*output_bfd
,
3155 property_table_entry
*table
;
3156 bfd_size_type section_size
, sgotloc_size
;
3160 section_size
= sxtlit
->size
;
3161 BFD_ASSERT (section_size
% 8 == 0);
3162 num
= section_size
/ 8;
3164 sgotloc_size
= sgotloc
->size
;
3165 if (sgotloc_size
!= section_size
)
3167 (*_bfd_error_handler
)
3168 (_("internal inconsistency in size of .got.loc section"));
3172 table
= bfd_malloc (num
* sizeof (property_table_entry
));
3176 /* The ".xt.lit.plt" section has the SEC_IN_MEMORY flag set and this
3177 propagates to the output section, where it doesn't really apply and
3178 where it breaks the following call to bfd_malloc_and_get_section. */
3179 sxtlit
->flags
&= ~SEC_IN_MEMORY
;
3181 if (!bfd_malloc_and_get_section (output_bfd
, sxtlit
, &contents
))
3189 /* There should never be any relocations left at this point, so this
3190 is quite a bit easier than what is done during relaxation. */
3192 /* Copy the raw contents into a property table array and sort it. */
3194 for (n
= 0; n
< num
; n
++)
3196 table
[n
].address
= bfd_get_32 (output_bfd
, &contents
[offset
]);
3197 table
[n
].size
= bfd_get_32 (output_bfd
, &contents
[offset
+ 4]);
3200 qsort (table
, num
, sizeof (property_table_entry
), property_table_compare
);
3202 for (n
= 0; n
< num
; n
++)
3204 bfd_boolean remove_entry
= FALSE
;
3206 if (table
[n
].size
== 0)
3207 remove_entry
= TRUE
;
3209 && (table
[n
-1].address
+ table
[n
-1].size
== table
[n
].address
))
3211 table
[n
-1].size
+= table
[n
].size
;
3212 remove_entry
= TRUE
;
3217 for (m
= n
; m
< num
- 1; m
++)
3219 table
[m
].address
= table
[m
+1].address
;
3220 table
[m
].size
= table
[m
+1].size
;
3228 /* Copy the data back to the raw contents. */
3230 for (n
= 0; n
< num
; n
++)
3232 bfd_put_32 (output_bfd
, table
[n
].address
, &contents
[offset
]);
3233 bfd_put_32 (output_bfd
, table
[n
].size
, &contents
[offset
+ 4]);
3237 /* Clear the removed bytes. */
3238 if ((bfd_size_type
) (num
* 8) < section_size
)
3239 memset (&contents
[num
* 8], 0, section_size
- num
* 8);
3241 if (! bfd_set_section_contents (output_bfd
, sxtlit
, contents
, 0,
3245 /* Copy the contents to ".got.loc". */
3246 memcpy (sgotloc
->contents
, contents
, section_size
);
3254 /* Finish up the dynamic sections. */
3257 elf_xtensa_finish_dynamic_sections (bfd
*output_bfd
,
3258 struct bfd_link_info
*info
)
3260 struct elf_xtensa_link_hash_table
*htab
;
3262 asection
*sdyn
, *srelplt
, *sgot
, *sxtlit
, *sgotloc
;
3263 Elf32_External_Dyn
*dyncon
, *dynconend
;
3264 int num_xtlit_entries
= 0;
3266 if (! elf_hash_table (info
)->dynamic_sections_created
)
3269 htab
= elf_xtensa_hash_table (info
);
3273 dynobj
= elf_hash_table (info
)->dynobj
;
3274 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
3275 BFD_ASSERT (sdyn
!= NULL
);
3277 /* Set the first entry in the global offset table to the address of
3278 the dynamic section. */
3282 BFD_ASSERT (sgot
->size
== 4);
3284 bfd_put_32 (output_bfd
, 0, sgot
->contents
);
3286 bfd_put_32 (output_bfd
,
3287 sdyn
->output_section
->vma
+ sdyn
->output_offset
,
3291 srelplt
= htab
->srelplt
;
3292 if (srelplt
&& srelplt
->size
!= 0)
3294 asection
*sgotplt
, *srelgot
, *spltlittbl
;
3295 int chunk
, plt_chunks
, plt_entries
;
3296 Elf_Internal_Rela irela
;
3298 unsigned rtld_reloc
;
3300 srelgot
= htab
->srelgot
;
3301 spltlittbl
= htab
->spltlittbl
;
3302 BFD_ASSERT (srelgot
!= NULL
&& spltlittbl
!= NULL
);
3304 /* Find the first XTENSA_RTLD relocation. Presumably the rest
3305 of them follow immediately after.... */
3306 for (rtld_reloc
= 0; rtld_reloc
< srelgot
->reloc_count
; rtld_reloc
++)
3308 loc
= srelgot
->contents
+ rtld_reloc
* sizeof (Elf32_External_Rela
);
3309 bfd_elf32_swap_reloca_in (output_bfd
, loc
, &irela
);
3310 if (ELF32_R_TYPE (irela
.r_info
) == R_XTENSA_RTLD
)
3313 BFD_ASSERT (rtld_reloc
< srelgot
->reloc_count
);
3315 plt_entries
= srelplt
->size
/ sizeof (Elf32_External_Rela
);
3317 (plt_entries
+ PLT_ENTRIES_PER_CHUNK
- 1) / PLT_ENTRIES_PER_CHUNK
;
3319 for (chunk
= 0; chunk
< plt_chunks
; chunk
++)
3321 int chunk_entries
= 0;
3323 sgotplt
= elf_xtensa_get_gotplt_section (info
, chunk
);
3324 BFD_ASSERT (sgotplt
!= NULL
);
3326 /* Emit special RTLD relocations for the first two entries in
3327 each chunk of the .got.plt section. */
3329 loc
= srelgot
->contents
+ rtld_reloc
* sizeof (Elf32_External_Rela
);
3330 bfd_elf32_swap_reloca_in (output_bfd
, loc
, &irela
);
3331 BFD_ASSERT (ELF32_R_TYPE (irela
.r_info
) == R_XTENSA_RTLD
);
3332 irela
.r_offset
= (sgotplt
->output_section
->vma
3333 + sgotplt
->output_offset
);
3334 irela
.r_addend
= 1; /* tell rtld to set value to resolver function */
3335 bfd_elf32_swap_reloca_out (output_bfd
, &irela
, loc
);
3337 BFD_ASSERT (rtld_reloc
<= srelgot
->reloc_count
);
3339 /* Next literal immediately follows the first. */
3340 loc
+= sizeof (Elf32_External_Rela
);
3341 bfd_elf32_swap_reloca_in (output_bfd
, loc
, &irela
);
3342 BFD_ASSERT (ELF32_R_TYPE (irela
.r_info
) == R_XTENSA_RTLD
);
3343 irela
.r_offset
= (sgotplt
->output_section
->vma
3344 + sgotplt
->output_offset
+ 4);
3345 /* Tell rtld to set value to object's link map. */
3347 bfd_elf32_swap_reloca_out (output_bfd
, &irela
, loc
);
3349 BFD_ASSERT (rtld_reloc
<= srelgot
->reloc_count
);
3351 /* Fill in the literal table. */
3352 if (chunk
< plt_chunks
- 1)
3353 chunk_entries
= PLT_ENTRIES_PER_CHUNK
;
3355 chunk_entries
= plt_entries
- (chunk
* PLT_ENTRIES_PER_CHUNK
);
3357 BFD_ASSERT ((unsigned) (chunk
+ 1) * 8 <= spltlittbl
->size
);
3358 bfd_put_32 (output_bfd
,
3359 sgotplt
->output_section
->vma
+ sgotplt
->output_offset
,
3360 spltlittbl
->contents
+ (chunk
* 8) + 0);
3361 bfd_put_32 (output_bfd
,
3362 8 + (chunk_entries
* 4),
3363 spltlittbl
->contents
+ (chunk
* 8) + 4);
3366 /* All the dynamic relocations have been emitted at this point.
3367 Make sure the relocation sections are the correct size. */
3368 if (srelgot
->size
!= (sizeof (Elf32_External_Rela
)
3369 * srelgot
->reloc_count
)
3370 || srelplt
->size
!= (sizeof (Elf32_External_Rela
)
3371 * srelplt
->reloc_count
))
3374 /* The .xt.lit.plt section has just been modified. This must
3375 happen before the code below which combines adjacent literal
3376 table entries, and the .xt.lit.plt contents have to be forced to
3378 if (! bfd_set_section_contents (output_bfd
,
3379 spltlittbl
->output_section
,
3380 spltlittbl
->contents
,
3381 spltlittbl
->output_offset
,
3384 /* Clear SEC_HAS_CONTENTS so the contents won't be output again. */
3385 spltlittbl
->flags
&= ~SEC_HAS_CONTENTS
;
3388 /* Combine adjacent literal table entries. */
3389 BFD_ASSERT (! info
->relocatable
);
3390 sxtlit
= bfd_get_section_by_name (output_bfd
, ".xt.lit");
3391 sgotloc
= htab
->sgotloc
;
3392 BFD_ASSERT (sgotloc
);
3396 elf_xtensa_combine_prop_entries (output_bfd
, sxtlit
, sgotloc
);
3397 if (num_xtlit_entries
< 0)
3401 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
3402 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
3403 for (; dyncon
< dynconend
; dyncon
++)
3405 Elf_Internal_Dyn dyn
;
3407 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
3414 case DT_XTENSA_GOT_LOC_SZ
:
3415 dyn
.d_un
.d_val
= num_xtlit_entries
;
3418 case DT_XTENSA_GOT_LOC_OFF
:
3419 dyn
.d_un
.d_ptr
= htab
->sgotloc
->output_section
->vma
;
3423 dyn
.d_un
.d_ptr
= htab
->sgot
->output_section
->vma
;
3427 dyn
.d_un
.d_ptr
= htab
->srelplt
->output_section
->vma
;
3431 dyn
.d_un
.d_val
= htab
->srelplt
->output_section
->size
;
3435 /* Adjust RELASZ to not include JMPREL. This matches what
3436 glibc expects and what is done for several other ELF
3437 targets (e.g., i386, alpha), but the "correct" behavior
3438 seems to be unresolved. Since the linker script arranges
3439 for .rela.plt to follow all other relocation sections, we
3440 don't have to worry about changing the DT_RELA entry. */
3442 dyn
.d_un
.d_val
-= htab
->srelplt
->output_section
->size
;
3446 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
3453 /* Functions for dealing with the e_flags field. */
3455 /* Merge backend specific data from an object file to the output
3456 object file when linking. */
3459 elf_xtensa_merge_private_bfd_data (bfd
*ibfd
, bfd
*obfd
)
3461 unsigned out_mach
, in_mach
;
3462 flagword out_flag
, in_flag
;
3464 /* Check if we have the same endianness. */
3465 if (!_bfd_generic_verify_endian_match (ibfd
, obfd
))
3468 /* Don't even pretend to support mixed-format linking. */
3469 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
3470 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
3473 out_flag
= elf_elfheader (obfd
)->e_flags
;
3474 in_flag
= elf_elfheader (ibfd
)->e_flags
;
3476 out_mach
= out_flag
& EF_XTENSA_MACH
;
3477 in_mach
= in_flag
& EF_XTENSA_MACH
;
3478 if (out_mach
!= in_mach
)
3480 (*_bfd_error_handler
)
3481 (_("%B: incompatible machine type. Output is 0x%x. Input is 0x%x"),
3482 ibfd
, out_mach
, in_mach
);
3483 bfd_set_error (bfd_error_wrong_format
);
3487 if (! elf_flags_init (obfd
))
3489 elf_flags_init (obfd
) = TRUE
;
3490 elf_elfheader (obfd
)->e_flags
= in_flag
;
3492 if (bfd_get_arch (obfd
) == bfd_get_arch (ibfd
)
3493 && bfd_get_arch_info (obfd
)->the_default
)
3494 return bfd_set_arch_mach (obfd
, bfd_get_arch (ibfd
),
3495 bfd_get_mach (ibfd
));
3500 if ((out_flag
& EF_XTENSA_XT_INSN
) != (in_flag
& EF_XTENSA_XT_INSN
))
3501 elf_elfheader (obfd
)->e_flags
&= (~ EF_XTENSA_XT_INSN
);
3503 if ((out_flag
& EF_XTENSA_XT_LIT
) != (in_flag
& EF_XTENSA_XT_LIT
))
3504 elf_elfheader (obfd
)->e_flags
&= (~ EF_XTENSA_XT_LIT
);
3511 elf_xtensa_set_private_flags (bfd
*abfd
, flagword flags
)
3513 BFD_ASSERT (!elf_flags_init (abfd
)
3514 || elf_elfheader (abfd
)->e_flags
== flags
);
3516 elf_elfheader (abfd
)->e_flags
|= flags
;
3517 elf_flags_init (abfd
) = TRUE
;
3524 elf_xtensa_print_private_bfd_data (bfd
*abfd
, void *farg
)
3526 FILE *f
= (FILE *) farg
;
3527 flagword e_flags
= elf_elfheader (abfd
)->e_flags
;
3529 fprintf (f
, "\nXtensa header:\n");
3530 if ((e_flags
& EF_XTENSA_MACH
) == E_XTENSA_MACH
)
3531 fprintf (f
, "\nMachine = Base\n");
3533 fprintf (f
, "\nMachine Id = 0x%x\n", e_flags
& EF_XTENSA_MACH
);
3535 fprintf (f
, "Insn tables = %s\n",
3536 (e_flags
& EF_XTENSA_XT_INSN
) ? "true" : "false");
3538 fprintf (f
, "Literal tables = %s\n",
3539 (e_flags
& EF_XTENSA_XT_LIT
) ? "true" : "false");
3541 return _bfd_elf_print_private_bfd_data (abfd
, farg
);
3545 /* Set the right machine number for an Xtensa ELF file. */
3548 elf_xtensa_object_p (bfd
*abfd
)
3551 unsigned long arch
= elf_elfheader (abfd
)->e_flags
& EF_XTENSA_MACH
;
3556 mach
= bfd_mach_xtensa
;
3562 (void) bfd_default_set_arch_mach (abfd
, bfd_arch_xtensa
, mach
);
3567 /* The final processing done just before writing out an Xtensa ELF object
3568 file. This gets the Xtensa architecture right based on the machine
3572 elf_xtensa_final_write_processing (bfd
*abfd
,
3573 bfd_boolean linker ATTRIBUTE_UNUSED
)
3578 switch (mach
= bfd_get_mach (abfd
))
3580 case bfd_mach_xtensa
:
3581 val
= E_XTENSA_MACH
;
3587 elf_elfheader (abfd
)->e_flags
&= (~ EF_XTENSA_MACH
);
3588 elf_elfheader (abfd
)->e_flags
|= val
;
3592 static enum elf_reloc_type_class
3593 elf_xtensa_reloc_type_class (const struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
3594 const asection
*rel_sec ATTRIBUTE_UNUSED
,
3595 const Elf_Internal_Rela
*rela
)
3597 switch ((int) ELF32_R_TYPE (rela
->r_info
))
3599 case R_XTENSA_RELATIVE
:
3600 return reloc_class_relative
;
3601 case R_XTENSA_JMP_SLOT
:
3602 return reloc_class_plt
;
3604 return reloc_class_normal
;
3610 elf_xtensa_discard_info_for_section (bfd
*abfd
,
3611 struct elf_reloc_cookie
*cookie
,
3612 struct bfd_link_info
*info
,
3616 bfd_vma offset
, actual_offset
;
3617 bfd_size_type removed_bytes
= 0;
3618 bfd_size_type entry_size
;
3620 if (sec
->output_section
3621 && bfd_is_abs_section (sec
->output_section
))
3624 if (xtensa_is_proptable_section (sec
))
3629 if (sec
->size
== 0 || sec
->size
% entry_size
!= 0)
3632 contents
= retrieve_contents (abfd
, sec
, info
->keep_memory
);
3636 cookie
->rels
= retrieve_internal_relocs (abfd
, sec
, info
->keep_memory
);
3639 release_contents (sec
, contents
);
3643 /* Sort the relocations. They should already be in order when
3644 relaxation is enabled, but it might not be. */
3645 qsort (cookie
->rels
, sec
->reloc_count
, sizeof (Elf_Internal_Rela
),
3646 internal_reloc_compare
);
3648 cookie
->rel
= cookie
->rels
;
3649 cookie
->relend
= cookie
->rels
+ sec
->reloc_count
;
3651 for (offset
= 0; offset
< sec
->size
; offset
+= entry_size
)
3653 actual_offset
= offset
- removed_bytes
;
3655 /* The ...symbol_deleted_p function will skip over relocs but it
3656 won't adjust their offsets, so do that here. */
3657 while (cookie
->rel
< cookie
->relend
3658 && cookie
->rel
->r_offset
< offset
)
3660 cookie
->rel
->r_offset
-= removed_bytes
;
3664 while (cookie
->rel
< cookie
->relend
3665 && cookie
->rel
->r_offset
== offset
)
3667 if (bfd_elf_reloc_symbol_deleted_p (offset
, cookie
))
3669 /* Remove the table entry. (If the reloc type is NONE, then
3670 the entry has already been merged with another and deleted
3671 during relaxation.) */
3672 if (ELF32_R_TYPE (cookie
->rel
->r_info
) != R_XTENSA_NONE
)
3674 /* Shift the contents up. */
3675 if (offset
+ entry_size
< sec
->size
)
3676 memmove (&contents
[actual_offset
],
3677 &contents
[actual_offset
+ entry_size
],
3678 sec
->size
- offset
- entry_size
);
3679 removed_bytes
+= entry_size
;
3682 /* Remove this relocation. */
3683 cookie
->rel
->r_info
= ELF32_R_INFO (0, R_XTENSA_NONE
);
3686 /* Adjust the relocation offset for previous removals. This
3687 should not be done before calling ...symbol_deleted_p
3688 because it might mess up the offset comparisons there.
3689 Make sure the offset doesn't underflow in the case where
3690 the first entry is removed. */
3691 if (cookie
->rel
->r_offset
>= removed_bytes
)
3692 cookie
->rel
->r_offset
-= removed_bytes
;
3694 cookie
->rel
->r_offset
= 0;
3700 if (removed_bytes
!= 0)
3702 /* Adjust any remaining relocs (shouldn't be any). */
3703 for (; cookie
->rel
< cookie
->relend
; cookie
->rel
++)
3705 if (cookie
->rel
->r_offset
>= removed_bytes
)
3706 cookie
->rel
->r_offset
-= removed_bytes
;
3708 cookie
->rel
->r_offset
= 0;
3711 /* Clear the removed bytes. */
3712 memset (&contents
[sec
->size
- removed_bytes
], 0, removed_bytes
);
3714 pin_contents (sec
, contents
);
3715 pin_internal_relocs (sec
, cookie
->rels
);
3718 if (sec
->rawsize
== 0)
3719 sec
->rawsize
= sec
->size
;
3720 sec
->size
-= removed_bytes
;
3722 if (xtensa_is_littable_section (sec
))
3724 asection
*sgotloc
= elf_xtensa_hash_table (info
)->sgotloc
;
3726 sgotloc
->size
-= removed_bytes
;
3731 release_contents (sec
, contents
);
3732 release_internal_relocs (sec
, cookie
->rels
);
3735 return (removed_bytes
!= 0);
3740 elf_xtensa_discard_info (bfd
*abfd
,
3741 struct elf_reloc_cookie
*cookie
,
3742 struct bfd_link_info
*info
)
3745 bfd_boolean changed
= FALSE
;
3747 for (sec
= abfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
3749 if (xtensa_is_property_section (sec
))
3751 if (elf_xtensa_discard_info_for_section (abfd
, cookie
, info
, sec
))
3761 elf_xtensa_ignore_discarded_relocs (asection
*sec
)
3763 return xtensa_is_property_section (sec
);
3768 elf_xtensa_action_discarded (asection
*sec
)
3770 if (strcmp (".xt_except_table", sec
->name
) == 0)
3773 if (strcmp (".xt_except_desc", sec
->name
) == 0)
3776 return _bfd_elf_default_action_discarded (sec
);
3780 /* Support for core dump NOTE sections. */
3783 elf_xtensa_grok_prstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
3788 /* The size for Xtensa is variable, so don't try to recognize the format
3789 based on the size. Just assume this is GNU/Linux. */
3792 elf_tdata (abfd
)->core
->signal
= bfd_get_16 (abfd
, note
->descdata
+ 12);
3795 elf_tdata (abfd
)->core
->lwpid
= bfd_get_32 (abfd
, note
->descdata
+ 24);
3799 size
= note
->descsz
- offset
- 4;
3801 /* Make a ".reg/999" section. */
3802 return _bfd_elfcore_make_pseudosection (abfd
, ".reg",
3803 size
, note
->descpos
+ offset
);
3808 elf_xtensa_grok_psinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
3810 switch (note
->descsz
)
3815 case 128: /* GNU/Linux elf_prpsinfo */
3816 elf_tdata (abfd
)->core
->program
3817 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 32, 16);
3818 elf_tdata (abfd
)->core
->command
3819 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 48, 80);
3822 /* Note that for some reason, a spurious space is tacked
3823 onto the end of the args in some (at least one anyway)
3824 implementations, so strip it off if it exists. */
3827 char *command
= elf_tdata (abfd
)->core
->command
;
3828 int n
= strlen (command
);
3830 if (0 < n
&& command
[n
- 1] == ' ')
3831 command
[n
- 1] = '\0';
3838 /* Generic Xtensa configurability stuff. */
3840 static xtensa_opcode callx0_op
= XTENSA_UNDEFINED
;
3841 static xtensa_opcode callx4_op
= XTENSA_UNDEFINED
;
3842 static xtensa_opcode callx8_op
= XTENSA_UNDEFINED
;
3843 static xtensa_opcode callx12_op
= XTENSA_UNDEFINED
;
3844 static xtensa_opcode call0_op
= XTENSA_UNDEFINED
;
3845 static xtensa_opcode call4_op
= XTENSA_UNDEFINED
;
3846 static xtensa_opcode call8_op
= XTENSA_UNDEFINED
;
3847 static xtensa_opcode call12_op
= XTENSA_UNDEFINED
;
3850 init_call_opcodes (void)
3852 if (callx0_op
== XTENSA_UNDEFINED
)
3854 callx0_op
= xtensa_opcode_lookup (xtensa_default_isa
, "callx0");
3855 callx4_op
= xtensa_opcode_lookup (xtensa_default_isa
, "callx4");
3856 callx8_op
= xtensa_opcode_lookup (xtensa_default_isa
, "callx8");
3857 callx12_op
= xtensa_opcode_lookup (xtensa_default_isa
, "callx12");
3858 call0_op
= xtensa_opcode_lookup (xtensa_default_isa
, "call0");
3859 call4_op
= xtensa_opcode_lookup (xtensa_default_isa
, "call4");
3860 call8_op
= xtensa_opcode_lookup (xtensa_default_isa
, "call8");
3861 call12_op
= xtensa_opcode_lookup (xtensa_default_isa
, "call12");
3867 is_indirect_call_opcode (xtensa_opcode opcode
)
3869 init_call_opcodes ();
3870 return (opcode
== callx0_op
3871 || opcode
== callx4_op
3872 || opcode
== callx8_op
3873 || opcode
== callx12_op
);
3878 is_direct_call_opcode (xtensa_opcode opcode
)
3880 init_call_opcodes ();
3881 return (opcode
== call0_op
3882 || opcode
== call4_op
3883 || opcode
== call8_op
3884 || opcode
== call12_op
);
3889 is_windowed_call_opcode (xtensa_opcode opcode
)
3891 init_call_opcodes ();
3892 return (opcode
== call4_op
3893 || opcode
== call8_op
3894 || opcode
== call12_op
3895 || opcode
== callx4_op
3896 || opcode
== callx8_op
3897 || opcode
== callx12_op
);
3902 get_indirect_call_dest_reg (xtensa_opcode opcode
, unsigned *pdst
)
3904 unsigned dst
= (unsigned) -1;
3906 init_call_opcodes ();
3907 if (opcode
== callx0_op
)
3909 else if (opcode
== callx4_op
)
3911 else if (opcode
== callx8_op
)
3913 else if (opcode
== callx12_op
)
3916 if (dst
== (unsigned) -1)
3924 static xtensa_opcode
3925 get_const16_opcode (void)
3927 static bfd_boolean done_lookup
= FALSE
;
3928 static xtensa_opcode const16_opcode
= XTENSA_UNDEFINED
;
3931 const16_opcode
= xtensa_opcode_lookup (xtensa_default_isa
, "const16");
3934 return const16_opcode
;
3938 static xtensa_opcode
3939 get_l32r_opcode (void)
3941 static xtensa_opcode l32r_opcode
= XTENSA_UNDEFINED
;
3942 static bfd_boolean done_lookup
= FALSE
;
3946 l32r_opcode
= xtensa_opcode_lookup (xtensa_default_isa
, "l32r");
3954 l32r_offset (bfd_vma addr
, bfd_vma pc
)
3958 offset
= addr
- ((pc
+3) & -4);
3959 BFD_ASSERT ((offset
& ((1 << 2) - 1)) == 0);
3960 offset
= (signed int) offset
>> 2;
3961 BFD_ASSERT ((signed int) offset
>> 16 == -1);
3967 get_relocation_opnd (xtensa_opcode opcode
, int r_type
)
3969 xtensa_isa isa
= xtensa_default_isa
;
3970 int last_immed
, last_opnd
, opi
;
3972 if (opcode
== XTENSA_UNDEFINED
)
3973 return XTENSA_UNDEFINED
;
3975 /* Find the last visible PC-relative immediate operand for the opcode.
3976 If there are no PC-relative immediates, then choose the last visible
3977 immediate; otherwise, fail and return XTENSA_UNDEFINED. */
3978 last_immed
= XTENSA_UNDEFINED
;
3979 last_opnd
= xtensa_opcode_num_operands (isa
, opcode
);
3980 for (opi
= last_opnd
- 1; opi
>= 0; opi
--)
3982 if (xtensa_operand_is_visible (isa
, opcode
, opi
) == 0)
3984 if (xtensa_operand_is_PCrelative (isa
, opcode
, opi
) == 1)
3989 if (last_immed
== XTENSA_UNDEFINED
3990 && xtensa_operand_is_register (isa
, opcode
, opi
) == 0)
3994 return XTENSA_UNDEFINED
;
3996 /* If the operand number was specified in an old-style relocation,
3997 check for consistency with the operand computed above. */
3998 if (r_type
>= R_XTENSA_OP0
&& r_type
<= R_XTENSA_OP2
)
4000 int reloc_opnd
= r_type
- R_XTENSA_OP0
;
4001 if (reloc_opnd
!= last_immed
)
4002 return XTENSA_UNDEFINED
;
4010 get_relocation_slot (int r_type
)
4020 if (r_type
>= R_XTENSA_SLOT0_OP
&& r_type
<= R_XTENSA_SLOT14_OP
)
4021 return r_type
- R_XTENSA_SLOT0_OP
;
4022 if (r_type
>= R_XTENSA_SLOT0_ALT
&& r_type
<= R_XTENSA_SLOT14_ALT
)
4023 return r_type
- R_XTENSA_SLOT0_ALT
;
4027 return XTENSA_UNDEFINED
;
4031 /* Get the opcode for a relocation. */
4033 static xtensa_opcode
4034 get_relocation_opcode (bfd
*abfd
,
4037 Elf_Internal_Rela
*irel
)
4039 static xtensa_insnbuf ibuff
= NULL
;
4040 static xtensa_insnbuf sbuff
= NULL
;
4041 xtensa_isa isa
= xtensa_default_isa
;
4045 if (contents
== NULL
)
4046 return XTENSA_UNDEFINED
;
4048 if (bfd_get_section_limit (abfd
, sec
) <= irel
->r_offset
)
4049 return XTENSA_UNDEFINED
;
4053 ibuff
= xtensa_insnbuf_alloc (isa
);
4054 sbuff
= xtensa_insnbuf_alloc (isa
);
4057 /* Decode the instruction. */
4058 xtensa_insnbuf_from_chars (isa
, ibuff
, &contents
[irel
->r_offset
],
4059 sec
->size
- irel
->r_offset
);
4060 fmt
= xtensa_format_decode (isa
, ibuff
);
4061 slot
= get_relocation_slot (ELF32_R_TYPE (irel
->r_info
));
4062 if (slot
== XTENSA_UNDEFINED
)
4063 return XTENSA_UNDEFINED
;
4064 xtensa_format_get_slot (isa
, fmt
, slot
, ibuff
, sbuff
);
4065 return xtensa_opcode_decode (isa
, fmt
, slot
, sbuff
);
4070 is_l32r_relocation (bfd
*abfd
,
4073 Elf_Internal_Rela
*irel
)
4075 xtensa_opcode opcode
;
4076 if (!is_operand_relocation (ELF32_R_TYPE (irel
->r_info
)))
4078 opcode
= get_relocation_opcode (abfd
, sec
, contents
, irel
);
4079 return (opcode
== get_l32r_opcode ());
4083 static bfd_size_type
4084 get_asm_simplify_size (bfd_byte
*contents
,
4085 bfd_size_type content_len
,
4086 bfd_size_type offset
)
4088 bfd_size_type insnlen
, size
= 0;
4090 /* Decode the size of the next two instructions. */
4091 insnlen
= insn_decode_len (contents
, content_len
, offset
);
4097 insnlen
= insn_decode_len (contents
, content_len
, offset
+ size
);
4107 is_alt_relocation (int r_type
)
4109 return (r_type
>= R_XTENSA_SLOT0_ALT
4110 && r_type
<= R_XTENSA_SLOT14_ALT
);
4115 is_operand_relocation (int r_type
)
4125 if (r_type
>= R_XTENSA_SLOT0_OP
&& r_type
<= R_XTENSA_SLOT14_OP
)
4127 if (r_type
>= R_XTENSA_SLOT0_ALT
&& r_type
<= R_XTENSA_SLOT14_ALT
)
4136 #define MIN_INSN_LENGTH 2
4138 /* Return 0 if it fails to decode. */
4141 insn_decode_len (bfd_byte
*contents
,
4142 bfd_size_type content_len
,
4143 bfd_size_type offset
)
4146 xtensa_isa isa
= xtensa_default_isa
;
4148 static xtensa_insnbuf ibuff
= NULL
;
4150 if (offset
+ MIN_INSN_LENGTH
> content_len
)
4154 ibuff
= xtensa_insnbuf_alloc (isa
);
4155 xtensa_insnbuf_from_chars (isa
, ibuff
, &contents
[offset
],
4156 content_len
- offset
);
4157 fmt
= xtensa_format_decode (isa
, ibuff
);
4158 if (fmt
== XTENSA_UNDEFINED
)
4160 insn_len
= xtensa_format_length (isa
, fmt
);
4161 if (insn_len
== XTENSA_UNDEFINED
)
4167 /* Decode the opcode for a single slot instruction.
4168 Return 0 if it fails to decode or the instruction is multi-slot. */
4171 insn_decode_opcode (bfd_byte
*contents
,
4172 bfd_size_type content_len
,
4173 bfd_size_type offset
,
4176 xtensa_isa isa
= xtensa_default_isa
;
4178 static xtensa_insnbuf insnbuf
= NULL
;
4179 static xtensa_insnbuf slotbuf
= NULL
;
4181 if (offset
+ MIN_INSN_LENGTH
> content_len
)
4182 return XTENSA_UNDEFINED
;
4184 if (insnbuf
== NULL
)
4186 insnbuf
= xtensa_insnbuf_alloc (isa
);
4187 slotbuf
= xtensa_insnbuf_alloc (isa
);
4190 xtensa_insnbuf_from_chars (isa
, insnbuf
, &contents
[offset
],
4191 content_len
- offset
);
4192 fmt
= xtensa_format_decode (isa
, insnbuf
);
4193 if (fmt
== XTENSA_UNDEFINED
)
4194 return XTENSA_UNDEFINED
;
4196 if (slot
>= xtensa_format_num_slots (isa
, fmt
))
4197 return XTENSA_UNDEFINED
;
4199 xtensa_format_get_slot (isa
, fmt
, slot
, insnbuf
, slotbuf
);
4200 return xtensa_opcode_decode (isa
, fmt
, slot
, slotbuf
);
4204 /* The offset is the offset in the contents.
4205 The address is the address of that offset. */
4208 check_branch_target_aligned (bfd_byte
*contents
,
4209 bfd_size_type content_length
,
4213 bfd_size_type insn_len
= insn_decode_len (contents
, content_length
, offset
);
4216 return check_branch_target_aligned_address (address
, insn_len
);
4221 check_loop_aligned (bfd_byte
*contents
,
4222 bfd_size_type content_length
,
4226 bfd_size_type loop_len
, insn_len
;
4227 xtensa_opcode opcode
;
4229 opcode
= insn_decode_opcode (contents
, content_length
, offset
, 0);
4230 if (opcode
== XTENSA_UNDEFINED
4231 || xtensa_opcode_is_loop (xtensa_default_isa
, opcode
) != 1)
4237 loop_len
= insn_decode_len (contents
, content_length
, offset
);
4238 insn_len
= insn_decode_len (contents
, content_length
, offset
+ loop_len
);
4239 if (loop_len
== 0 || insn_len
== 0)
4245 return check_branch_target_aligned_address (address
+ loop_len
, insn_len
);
4250 check_branch_target_aligned_address (bfd_vma addr
, int len
)
4253 return (addr
% 8 == 0);
4254 return ((addr
>> 2) == ((addr
+ len
- 1) >> 2));
4258 /* Instruction widening and narrowing. */
4260 /* When FLIX is available we need to access certain instructions only
4261 when they are 16-bit or 24-bit instructions. This table caches
4262 information about such instructions by walking through all the
4263 opcodes and finding the smallest single-slot format into which each
4266 static xtensa_format
*op_single_fmt_table
= NULL
;
4270 init_op_single_format_table (void)
4272 xtensa_isa isa
= xtensa_default_isa
;
4273 xtensa_insnbuf ibuf
;
4274 xtensa_opcode opcode
;
4278 if (op_single_fmt_table
)
4281 ibuf
= xtensa_insnbuf_alloc (isa
);
4282 num_opcodes
= xtensa_isa_num_opcodes (isa
);
4284 op_single_fmt_table
= (xtensa_format
*)
4285 bfd_malloc (sizeof (xtensa_format
) * num_opcodes
);
4286 for (opcode
= 0; opcode
< num_opcodes
; opcode
++)
4288 op_single_fmt_table
[opcode
] = XTENSA_UNDEFINED
;
4289 for (fmt
= 0; fmt
< xtensa_isa_num_formats (isa
); fmt
++)
4291 if (xtensa_format_num_slots (isa
, fmt
) == 1
4292 && xtensa_opcode_encode (isa
, fmt
, 0, ibuf
, opcode
) == 0)
4294 xtensa_opcode old_fmt
= op_single_fmt_table
[opcode
];
4295 int fmt_length
= xtensa_format_length (isa
, fmt
);
4296 if (old_fmt
== XTENSA_UNDEFINED
4297 || fmt_length
< xtensa_format_length (isa
, old_fmt
))
4298 op_single_fmt_table
[opcode
] = fmt
;
4302 xtensa_insnbuf_free (isa
, ibuf
);
4306 static xtensa_format
4307 get_single_format (xtensa_opcode opcode
)
4309 init_op_single_format_table ();
4310 return op_single_fmt_table
[opcode
];
4314 /* For the set of narrowable instructions we do NOT include the
4315 narrowings beqz -> beqz.n or bnez -> bnez.n because of complexities
4316 involved during linker relaxation that may require these to
4317 re-expand in some conditions. Also, the narrowing "or" -> mov.n
4318 requires special case code to ensure it only works when op1 == op2. */
4326 struct string_pair narrowable
[] =
4329 { "addi", "addi.n" },
4330 { "addmi", "addi.n" },
4331 { "l32i", "l32i.n" },
4332 { "movi", "movi.n" },
4334 { "retw", "retw.n" },
4335 { "s32i", "s32i.n" },
4336 { "or", "mov.n" } /* special case only when op1 == op2 */
4339 struct string_pair widenable
[] =
4342 { "addi", "addi.n" },
4343 { "addmi", "addi.n" },
4344 { "beqz", "beqz.n" },
4345 { "bnez", "bnez.n" },
4346 { "l32i", "l32i.n" },
4347 { "movi", "movi.n" },
4349 { "retw", "retw.n" },
4350 { "s32i", "s32i.n" },
4351 { "or", "mov.n" } /* special case only when op1 == op2 */
4355 /* Check if an instruction can be "narrowed", i.e., changed from a standard
4356 3-byte instruction to a 2-byte "density" instruction. If it is valid,
4357 return the instruction buffer holding the narrow instruction. Otherwise,
4358 return 0. The set of valid narrowing are specified by a string table
4359 but require some special case operand checks in some cases. */
4361 static xtensa_insnbuf
4362 can_narrow_instruction (xtensa_insnbuf slotbuf
,
4364 xtensa_opcode opcode
)
4366 xtensa_isa isa
= xtensa_default_isa
;
4367 xtensa_format o_fmt
;
4370 static xtensa_insnbuf o_insnbuf
= NULL
;
4371 static xtensa_insnbuf o_slotbuf
= NULL
;
4373 if (o_insnbuf
== NULL
)
4375 o_insnbuf
= xtensa_insnbuf_alloc (isa
);
4376 o_slotbuf
= xtensa_insnbuf_alloc (isa
);
4379 for (opi
= 0; opi
< (sizeof (narrowable
)/sizeof (struct string_pair
)); opi
++)
4381 bfd_boolean is_or
= (strcmp ("or", narrowable
[opi
].wide
) == 0);
4383 if (opcode
== xtensa_opcode_lookup (isa
, narrowable
[opi
].wide
))
4385 uint32 value
, newval
;
4386 int i
, operand_count
, o_operand_count
;
4387 xtensa_opcode o_opcode
;
4389 /* Address does not matter in this case. We might need to
4390 fix it to handle branches/jumps. */
4391 bfd_vma self_address
= 0;
4393 o_opcode
= xtensa_opcode_lookup (isa
, narrowable
[opi
].narrow
);
4394 if (o_opcode
== XTENSA_UNDEFINED
)
4396 o_fmt
= get_single_format (o_opcode
);
4397 if (o_fmt
== XTENSA_UNDEFINED
)
4400 if (xtensa_format_length (isa
, fmt
) != 3
4401 || xtensa_format_length (isa
, o_fmt
) != 2)
4404 xtensa_format_encode (isa
, o_fmt
, o_insnbuf
);
4405 operand_count
= xtensa_opcode_num_operands (isa
, opcode
);
4406 o_operand_count
= xtensa_opcode_num_operands (isa
, o_opcode
);
4408 if (xtensa_opcode_encode (isa
, o_fmt
, 0, o_slotbuf
, o_opcode
) != 0)
4413 if (xtensa_opcode_num_operands (isa
, o_opcode
) != operand_count
)
4418 uint32 rawval0
, rawval1
, rawval2
;
4420 if (o_operand_count
+ 1 != operand_count
4421 || xtensa_operand_get_field (isa
, opcode
, 0,
4422 fmt
, 0, slotbuf
, &rawval0
) != 0
4423 || xtensa_operand_get_field (isa
, opcode
, 1,
4424 fmt
, 0, slotbuf
, &rawval1
) != 0
4425 || xtensa_operand_get_field (isa
, opcode
, 2,
4426 fmt
, 0, slotbuf
, &rawval2
) != 0
4427 || rawval1
!= rawval2
4428 || rawval0
== rawval1
/* it is a nop */)
4432 for (i
= 0; i
< o_operand_count
; ++i
)
4434 if (xtensa_operand_get_field (isa
, opcode
, i
, fmt
, 0,
4436 || xtensa_operand_decode (isa
, opcode
, i
, &value
))
4439 /* PC-relative branches need adjustment, but
4440 the PC-rel operand will always have a relocation. */
4442 if (xtensa_operand_do_reloc (isa
, o_opcode
, i
, &newval
,
4444 || xtensa_operand_encode (isa
, o_opcode
, i
, &newval
)
4445 || xtensa_operand_set_field (isa
, o_opcode
, i
, o_fmt
, 0,
4450 if (xtensa_format_set_slot (isa
, o_fmt
, 0, o_insnbuf
, o_slotbuf
))
4460 /* Attempt to narrow an instruction. If the narrowing is valid, perform
4461 the action in-place directly into the contents and return TRUE. Otherwise,
4462 the return value is FALSE and the contents are not modified. */
4465 narrow_instruction (bfd_byte
*contents
,
4466 bfd_size_type content_length
,
4467 bfd_size_type offset
)
4469 xtensa_opcode opcode
;
4470 bfd_size_type insn_len
;
4471 xtensa_isa isa
= xtensa_default_isa
;
4473 xtensa_insnbuf o_insnbuf
;
4475 static xtensa_insnbuf insnbuf
= NULL
;
4476 static xtensa_insnbuf slotbuf
= NULL
;
4478 if (insnbuf
== NULL
)
4480 insnbuf
= xtensa_insnbuf_alloc (isa
);
4481 slotbuf
= xtensa_insnbuf_alloc (isa
);
4484 BFD_ASSERT (offset
< content_length
);
4486 if (content_length
< 2)
4489 /* We will hand-code a few of these for a little while.
4490 These have all been specified in the assembler aleady. */
4491 xtensa_insnbuf_from_chars (isa
, insnbuf
, &contents
[offset
],
4492 content_length
- offset
);
4493 fmt
= xtensa_format_decode (isa
, insnbuf
);
4494 if (xtensa_format_num_slots (isa
, fmt
) != 1)
4497 if (xtensa_format_get_slot (isa
, fmt
, 0, insnbuf
, slotbuf
) != 0)
4500 opcode
= xtensa_opcode_decode (isa
, fmt
, 0, slotbuf
);
4501 if (opcode
== XTENSA_UNDEFINED
)
4503 insn_len
= xtensa_format_length (isa
, fmt
);
4504 if (insn_len
> content_length
)
4507 o_insnbuf
= can_narrow_instruction (slotbuf
, fmt
, opcode
);
4510 xtensa_insnbuf_to_chars (isa
, o_insnbuf
, contents
+ offset
,
4511 content_length
- offset
);
4519 /* Check if an instruction can be "widened", i.e., changed from a 2-byte
4520 "density" instruction to a standard 3-byte instruction. If it is valid,
4521 return the instruction buffer holding the wide instruction. Otherwise,
4522 return 0. The set of valid widenings are specified by a string table
4523 but require some special case operand checks in some cases. */
4525 static xtensa_insnbuf
4526 can_widen_instruction (xtensa_insnbuf slotbuf
,
4528 xtensa_opcode opcode
)
4530 xtensa_isa isa
= xtensa_default_isa
;
4531 xtensa_format o_fmt
;
4534 static xtensa_insnbuf o_insnbuf
= NULL
;
4535 static xtensa_insnbuf o_slotbuf
= NULL
;
4537 if (o_insnbuf
== NULL
)
4539 o_insnbuf
= xtensa_insnbuf_alloc (isa
);
4540 o_slotbuf
= xtensa_insnbuf_alloc (isa
);
4543 for (opi
= 0; opi
< (sizeof (widenable
)/sizeof (struct string_pair
)); opi
++)
4545 bfd_boolean is_or
= (strcmp ("or", widenable
[opi
].wide
) == 0);
4546 bfd_boolean is_branch
= (strcmp ("beqz", widenable
[opi
].wide
) == 0
4547 || strcmp ("bnez", widenable
[opi
].wide
) == 0);
4549 if (opcode
== xtensa_opcode_lookup (isa
, widenable
[opi
].narrow
))
4551 uint32 value
, newval
;
4552 int i
, operand_count
, o_operand_count
, check_operand_count
;
4553 xtensa_opcode o_opcode
;
4555 /* Address does not matter in this case. We might need to fix it
4556 to handle branches/jumps. */
4557 bfd_vma self_address
= 0;
4559 o_opcode
= xtensa_opcode_lookup (isa
, widenable
[opi
].wide
);
4560 if (o_opcode
== XTENSA_UNDEFINED
)
4562 o_fmt
= get_single_format (o_opcode
);
4563 if (o_fmt
== XTENSA_UNDEFINED
)
4566 if (xtensa_format_length (isa
, fmt
) != 2
4567 || xtensa_format_length (isa
, o_fmt
) != 3)
4570 xtensa_format_encode (isa
, o_fmt
, o_insnbuf
);
4571 operand_count
= xtensa_opcode_num_operands (isa
, opcode
);
4572 o_operand_count
= xtensa_opcode_num_operands (isa
, o_opcode
);
4573 check_operand_count
= o_operand_count
;
4575 if (xtensa_opcode_encode (isa
, o_fmt
, 0, o_slotbuf
, o_opcode
) != 0)
4580 if (xtensa_opcode_num_operands (isa
, o_opcode
) != operand_count
)
4585 uint32 rawval0
, rawval1
;
4587 if (o_operand_count
!= operand_count
+ 1
4588 || xtensa_operand_get_field (isa
, opcode
, 0,
4589 fmt
, 0, slotbuf
, &rawval0
) != 0
4590 || xtensa_operand_get_field (isa
, opcode
, 1,
4591 fmt
, 0, slotbuf
, &rawval1
) != 0
4592 || rawval0
== rawval1
/* it is a nop */)
4596 check_operand_count
--;
4598 for (i
= 0; i
< check_operand_count
; i
++)
4601 if (is_or
&& i
== o_operand_count
- 1)
4603 if (xtensa_operand_get_field (isa
, opcode
, new_i
, fmt
, 0,
4605 || xtensa_operand_decode (isa
, opcode
, new_i
, &value
))
4608 /* PC-relative branches need adjustment, but
4609 the PC-rel operand will always have a relocation. */
4611 if (xtensa_operand_do_reloc (isa
, o_opcode
, i
, &newval
,
4613 || xtensa_operand_encode (isa
, o_opcode
, i
, &newval
)
4614 || xtensa_operand_set_field (isa
, o_opcode
, i
, o_fmt
, 0,
4619 if (xtensa_format_set_slot (isa
, o_fmt
, 0, o_insnbuf
, o_slotbuf
))
4629 /* Attempt to widen an instruction. If the widening is valid, perform
4630 the action in-place directly into the contents and return TRUE. Otherwise,
4631 the return value is FALSE and the contents are not modified. */
4634 widen_instruction (bfd_byte
*contents
,
4635 bfd_size_type content_length
,
4636 bfd_size_type offset
)
4638 xtensa_opcode opcode
;
4639 bfd_size_type insn_len
;
4640 xtensa_isa isa
= xtensa_default_isa
;
4642 xtensa_insnbuf o_insnbuf
;
4644 static xtensa_insnbuf insnbuf
= NULL
;
4645 static xtensa_insnbuf slotbuf
= NULL
;
4647 if (insnbuf
== NULL
)
4649 insnbuf
= xtensa_insnbuf_alloc (isa
);
4650 slotbuf
= xtensa_insnbuf_alloc (isa
);
4653 BFD_ASSERT (offset
< content_length
);
4655 if (content_length
< 2)
4658 /* We will hand-code a few of these for a little while.
4659 These have all been specified in the assembler aleady. */
4660 xtensa_insnbuf_from_chars (isa
, insnbuf
, &contents
[offset
],
4661 content_length
- offset
);
4662 fmt
= xtensa_format_decode (isa
, insnbuf
);
4663 if (xtensa_format_num_slots (isa
, fmt
) != 1)
4666 if (xtensa_format_get_slot (isa
, fmt
, 0, insnbuf
, slotbuf
) != 0)
4669 opcode
= xtensa_opcode_decode (isa
, fmt
, 0, slotbuf
);
4670 if (opcode
== XTENSA_UNDEFINED
)
4672 insn_len
= xtensa_format_length (isa
, fmt
);
4673 if (insn_len
> content_length
)
4676 o_insnbuf
= can_widen_instruction (slotbuf
, fmt
, opcode
);
4679 xtensa_insnbuf_to_chars (isa
, o_insnbuf
, contents
+ offset
,
4680 content_length
- offset
);
4687 /* Code for transforming CALLs at link-time. */
4689 static bfd_reloc_status_type
4690 elf_xtensa_do_asm_simplify (bfd_byte
*contents
,
4692 bfd_vma content_length
,
4693 char **error_message
)
4695 static xtensa_insnbuf insnbuf
= NULL
;
4696 static xtensa_insnbuf slotbuf
= NULL
;
4697 xtensa_format core_format
= XTENSA_UNDEFINED
;
4698 xtensa_opcode opcode
;
4699 xtensa_opcode direct_call_opcode
;
4700 xtensa_isa isa
= xtensa_default_isa
;
4701 bfd_byte
*chbuf
= contents
+ address
;
4704 if (insnbuf
== NULL
)
4706 insnbuf
= xtensa_insnbuf_alloc (isa
);
4707 slotbuf
= xtensa_insnbuf_alloc (isa
);
4710 if (content_length
< address
)
4712 *error_message
= _("Attempt to convert L32R/CALLX to CALL failed");
4713 return bfd_reloc_other
;
4716 opcode
= get_expanded_call_opcode (chbuf
, content_length
- address
, 0);
4717 direct_call_opcode
= swap_callx_for_call_opcode (opcode
);
4718 if (direct_call_opcode
== XTENSA_UNDEFINED
)
4720 *error_message
= _("Attempt to convert L32R/CALLX to CALL failed");
4721 return bfd_reloc_other
;
4724 /* Assemble a NOP ("or a1, a1, a1") into the 0 byte offset. */
4725 core_format
= xtensa_format_lookup (isa
, "x24");
4726 opcode
= xtensa_opcode_lookup (isa
, "or");
4727 xtensa_opcode_encode (isa
, core_format
, 0, slotbuf
, opcode
);
4728 for (opn
= 0; opn
< 3; opn
++)
4731 xtensa_operand_encode (isa
, opcode
, opn
, ®no
);
4732 xtensa_operand_set_field (isa
, opcode
, opn
, core_format
, 0,
4735 xtensa_format_encode (isa
, core_format
, insnbuf
);
4736 xtensa_format_set_slot (isa
, core_format
, 0, insnbuf
, slotbuf
);
4737 xtensa_insnbuf_to_chars (isa
, insnbuf
, chbuf
, content_length
- address
);
4739 /* Assemble a CALL ("callN 0") into the 3 byte offset. */
4740 xtensa_opcode_encode (isa
, core_format
, 0, slotbuf
, direct_call_opcode
);
4741 xtensa_operand_set_field (isa
, opcode
, 0, core_format
, 0, slotbuf
, 0);
4743 xtensa_format_encode (isa
, core_format
, insnbuf
);
4744 xtensa_format_set_slot (isa
, core_format
, 0, insnbuf
, slotbuf
);
4745 xtensa_insnbuf_to_chars (isa
, insnbuf
, chbuf
+ 3,
4746 content_length
- address
- 3);
4748 return bfd_reloc_ok
;
4752 static bfd_reloc_status_type
4753 contract_asm_expansion (bfd_byte
*contents
,
4754 bfd_vma content_length
,
4755 Elf_Internal_Rela
*irel
,
4756 char **error_message
)
4758 bfd_reloc_status_type retval
=
4759 elf_xtensa_do_asm_simplify (contents
, irel
->r_offset
, content_length
,
4762 if (retval
!= bfd_reloc_ok
)
4763 return bfd_reloc_dangerous
;
4765 /* Update the irel->r_offset field so that the right immediate and
4766 the right instruction are modified during the relocation. */
4767 irel
->r_offset
+= 3;
4768 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
), R_XTENSA_SLOT0_OP
);
4769 return bfd_reloc_ok
;
4773 static xtensa_opcode
4774 swap_callx_for_call_opcode (xtensa_opcode opcode
)
4776 init_call_opcodes ();
4778 if (opcode
== callx0_op
) return call0_op
;
4779 if (opcode
== callx4_op
) return call4_op
;
4780 if (opcode
== callx8_op
) return call8_op
;
4781 if (opcode
== callx12_op
) return call12_op
;
4783 /* Return XTENSA_UNDEFINED if the opcode is not an indirect call. */
4784 return XTENSA_UNDEFINED
;
4788 /* Check if "buf" is pointing to a "L32R aN; CALLX aN" or "CONST16 aN;
4789 CONST16 aN; CALLX aN" sequence, and if so, return the CALLX opcode.
4790 If not, return XTENSA_UNDEFINED. */
4792 #define L32R_TARGET_REG_OPERAND 0
4793 #define CONST16_TARGET_REG_OPERAND 0
4794 #define CALLN_SOURCE_OPERAND 0
4796 static xtensa_opcode
4797 get_expanded_call_opcode (bfd_byte
*buf
, int bufsize
, bfd_boolean
*p_uses_l32r
)
4799 static xtensa_insnbuf insnbuf
= NULL
;
4800 static xtensa_insnbuf slotbuf
= NULL
;
4802 xtensa_opcode opcode
;
4803 xtensa_isa isa
= xtensa_default_isa
;
4804 uint32 regno
, const16_regno
, call_regno
;
4807 if (insnbuf
== NULL
)
4809 insnbuf
= xtensa_insnbuf_alloc (isa
);
4810 slotbuf
= xtensa_insnbuf_alloc (isa
);
4813 xtensa_insnbuf_from_chars (isa
, insnbuf
, buf
, bufsize
);
4814 fmt
= xtensa_format_decode (isa
, insnbuf
);
4815 if (fmt
== XTENSA_UNDEFINED
4816 || xtensa_format_get_slot (isa
, fmt
, 0, insnbuf
, slotbuf
))
4817 return XTENSA_UNDEFINED
;
4819 opcode
= xtensa_opcode_decode (isa
, fmt
, 0, slotbuf
);
4820 if (opcode
== XTENSA_UNDEFINED
)
4821 return XTENSA_UNDEFINED
;
4823 if (opcode
== get_l32r_opcode ())
4826 *p_uses_l32r
= TRUE
;
4827 if (xtensa_operand_get_field (isa
, opcode
, L32R_TARGET_REG_OPERAND
,
4828 fmt
, 0, slotbuf
, ®no
)
4829 || xtensa_operand_decode (isa
, opcode
, L32R_TARGET_REG_OPERAND
,
4831 return XTENSA_UNDEFINED
;
4833 else if (opcode
== get_const16_opcode ())
4836 *p_uses_l32r
= FALSE
;
4837 if (xtensa_operand_get_field (isa
, opcode
, CONST16_TARGET_REG_OPERAND
,
4838 fmt
, 0, slotbuf
, ®no
)
4839 || xtensa_operand_decode (isa
, opcode
, CONST16_TARGET_REG_OPERAND
,
4841 return XTENSA_UNDEFINED
;
4843 /* Check that the next instruction is also CONST16. */
4844 offset
+= xtensa_format_length (isa
, fmt
);
4845 xtensa_insnbuf_from_chars (isa
, insnbuf
, buf
+ offset
, bufsize
- offset
);
4846 fmt
= xtensa_format_decode (isa
, insnbuf
);
4847 if (fmt
== XTENSA_UNDEFINED
4848 || xtensa_format_get_slot (isa
, fmt
, 0, insnbuf
, slotbuf
))
4849 return XTENSA_UNDEFINED
;
4850 opcode
= xtensa_opcode_decode (isa
, fmt
, 0, slotbuf
);
4851 if (opcode
!= get_const16_opcode ())
4852 return XTENSA_UNDEFINED
;
4854 if (xtensa_operand_get_field (isa
, opcode
, CONST16_TARGET_REG_OPERAND
,
4855 fmt
, 0, slotbuf
, &const16_regno
)
4856 || xtensa_operand_decode (isa
, opcode
, CONST16_TARGET_REG_OPERAND
,
4858 || const16_regno
!= regno
)
4859 return XTENSA_UNDEFINED
;
4862 return XTENSA_UNDEFINED
;
4864 /* Next instruction should be an CALLXn with operand 0 == regno. */
4865 offset
+= xtensa_format_length (isa
, fmt
);
4866 xtensa_insnbuf_from_chars (isa
, insnbuf
, buf
+ offset
, bufsize
- offset
);
4867 fmt
= xtensa_format_decode (isa
, insnbuf
);
4868 if (fmt
== XTENSA_UNDEFINED
4869 || xtensa_format_get_slot (isa
, fmt
, 0, insnbuf
, slotbuf
))
4870 return XTENSA_UNDEFINED
;
4871 opcode
= xtensa_opcode_decode (isa
, fmt
, 0, slotbuf
);
4872 if (opcode
== XTENSA_UNDEFINED
4873 || !is_indirect_call_opcode (opcode
))
4874 return XTENSA_UNDEFINED
;
4876 if (xtensa_operand_get_field (isa
, opcode
, CALLN_SOURCE_OPERAND
,
4877 fmt
, 0, slotbuf
, &call_regno
)
4878 || xtensa_operand_decode (isa
, opcode
, CALLN_SOURCE_OPERAND
,
4880 return XTENSA_UNDEFINED
;
4882 if (call_regno
!= regno
)
4883 return XTENSA_UNDEFINED
;
4889 /* Data structures used during relaxation. */
4891 /* r_reloc: relocation values. */
4893 /* Through the relaxation process, we need to keep track of the values
4894 that will result from evaluating relocations. The standard ELF
4895 relocation structure is not sufficient for this purpose because we're
4896 operating on multiple input files at once, so we need to know which
4897 input file a relocation refers to. The r_reloc structure thus
4898 records both the input file (bfd) and ELF relocation.
4900 For efficiency, an r_reloc also contains a "target_offset" field to
4901 cache the target-section-relative offset value that is represented by
4904 The r_reloc also contains a virtual offset that allows multiple
4905 inserted literals to be placed at the same "address" with
4906 different offsets. */
4908 typedef struct r_reloc_struct r_reloc
;
4910 struct r_reloc_struct
4913 Elf_Internal_Rela rela
;
4914 bfd_vma target_offset
;
4915 bfd_vma virtual_offset
;
4919 /* The r_reloc structure is included by value in literal_value, but not
4920 every literal_value has an associated relocation -- some are simple
4921 constants. In such cases, we set all the fields in the r_reloc
4922 struct to zero. The r_reloc_is_const function should be used to
4923 detect this case. */
4926 r_reloc_is_const (const r_reloc
*r_rel
)
4928 return (r_rel
->abfd
== NULL
);
4933 r_reloc_get_target_offset (const r_reloc
*r_rel
)
4935 bfd_vma target_offset
;
4936 unsigned long r_symndx
;
4938 BFD_ASSERT (!r_reloc_is_const (r_rel
));
4939 r_symndx
= ELF32_R_SYM (r_rel
->rela
.r_info
);
4940 target_offset
= get_elf_r_symndx_offset (r_rel
->abfd
, r_symndx
);
4941 return (target_offset
+ r_rel
->rela
.r_addend
);
4945 static struct elf_link_hash_entry
*
4946 r_reloc_get_hash_entry (const r_reloc
*r_rel
)
4948 unsigned long r_symndx
= ELF32_R_SYM (r_rel
->rela
.r_info
);
4949 return get_elf_r_symndx_hash_entry (r_rel
->abfd
, r_symndx
);
4954 r_reloc_get_section (const r_reloc
*r_rel
)
4956 unsigned long r_symndx
= ELF32_R_SYM (r_rel
->rela
.r_info
);
4957 return get_elf_r_symndx_section (r_rel
->abfd
, r_symndx
);
4962 r_reloc_is_defined (const r_reloc
*r_rel
)
4968 sec
= r_reloc_get_section (r_rel
);
4969 if (sec
== bfd_abs_section_ptr
4970 || sec
== bfd_com_section_ptr
4971 || sec
== bfd_und_section_ptr
)
4978 r_reloc_init (r_reloc
*r_rel
,
4980 Elf_Internal_Rela
*irel
,
4982 bfd_size_type content_length
)
4985 reloc_howto_type
*howto
;
4989 r_rel
->rela
= *irel
;
4991 r_rel
->target_offset
= r_reloc_get_target_offset (r_rel
);
4992 r_rel
->virtual_offset
= 0;
4993 r_type
= ELF32_R_TYPE (r_rel
->rela
.r_info
);
4994 howto
= &elf_howto_table
[r_type
];
4995 if (howto
->partial_inplace
)
4997 bfd_vma inplace_val
;
4998 BFD_ASSERT (r_rel
->rela
.r_offset
< content_length
);
5000 inplace_val
= bfd_get_32 (abfd
, &contents
[r_rel
->rela
.r_offset
]);
5001 r_rel
->target_offset
+= inplace_val
;
5005 memset (r_rel
, 0, sizeof (r_reloc
));
5012 print_r_reloc (FILE *fp
, const r_reloc
*r_rel
)
5014 if (r_reloc_is_defined (r_rel
))
5016 asection
*sec
= r_reloc_get_section (r_rel
);
5017 fprintf (fp
, " %s(%s + ", sec
->owner
->filename
, sec
->name
);
5019 else if (r_reloc_get_hash_entry (r_rel
))
5020 fprintf (fp
, " %s + ", r_reloc_get_hash_entry (r_rel
)->root
.root
.string
);
5022 fprintf (fp
, " ?? + ");
5024 fprintf_vma (fp
, r_rel
->target_offset
);
5025 if (r_rel
->virtual_offset
)
5027 fprintf (fp
, " + ");
5028 fprintf_vma (fp
, r_rel
->virtual_offset
);
5037 /* source_reloc: relocations that reference literals. */
5039 /* To determine whether literals can be coalesced, we need to first
5040 record all the relocations that reference the literals. The
5041 source_reloc structure below is used for this purpose. The
5042 source_reloc entries are kept in a per-literal-section array, sorted
5043 by offset within the literal section (i.e., target offset).
5045 The source_sec and r_rel.rela.r_offset fields identify the source of
5046 the relocation. The r_rel field records the relocation value, i.e.,
5047 the offset of the literal being referenced. The opnd field is needed
5048 to determine the range of the immediate field to which the relocation
5049 applies, so we can determine whether another literal with the same
5050 value is within range. The is_null field is true when the relocation
5051 is being removed (e.g., when an L32R is being removed due to a CALLX
5052 that is converted to a direct CALL). */
5054 typedef struct source_reloc_struct source_reloc
;
5056 struct source_reloc_struct
5058 asection
*source_sec
;
5060 xtensa_opcode opcode
;
5062 bfd_boolean is_null
;
5063 bfd_boolean is_abs_literal
;
5068 init_source_reloc (source_reloc
*reloc
,
5069 asection
*source_sec
,
5070 const r_reloc
*r_rel
,
5071 xtensa_opcode opcode
,
5073 bfd_boolean is_abs_literal
)
5075 reloc
->source_sec
= source_sec
;
5076 reloc
->r_rel
= *r_rel
;
5077 reloc
->opcode
= opcode
;
5079 reloc
->is_null
= FALSE
;
5080 reloc
->is_abs_literal
= is_abs_literal
;
5084 /* Find the source_reloc for a particular source offset and relocation
5085 type. Note that the array is sorted by _target_ offset, so this is
5086 just a linear search. */
5088 static source_reloc
*
5089 find_source_reloc (source_reloc
*src_relocs
,
5092 Elf_Internal_Rela
*irel
)
5096 for (i
= 0; i
< src_count
; i
++)
5098 if (src_relocs
[i
].source_sec
== sec
5099 && src_relocs
[i
].r_rel
.rela
.r_offset
== irel
->r_offset
5100 && (ELF32_R_TYPE (src_relocs
[i
].r_rel
.rela
.r_info
)
5101 == ELF32_R_TYPE (irel
->r_info
)))
5102 return &src_relocs
[i
];
5110 source_reloc_compare (const void *ap
, const void *bp
)
5112 const source_reloc
*a
= (const source_reloc
*) ap
;
5113 const source_reloc
*b
= (const source_reloc
*) bp
;
5115 if (a
->r_rel
.target_offset
!= b
->r_rel
.target_offset
)
5116 return (a
->r_rel
.target_offset
- b
->r_rel
.target_offset
);
5118 /* We don't need to sort on these criteria for correctness,
5119 but enforcing a more strict ordering prevents unstable qsort
5120 from behaving differently with different implementations.
5121 Without the code below we get correct but different results
5122 on Solaris 2.7 and 2.8. We would like to always produce the
5123 same results no matter the host. */
5125 if ((!a
->is_null
) - (!b
->is_null
))
5126 return ((!a
->is_null
) - (!b
->is_null
));
5127 return internal_reloc_compare (&a
->r_rel
.rela
, &b
->r_rel
.rela
);
5131 /* Literal values and value hash tables. */
5133 /* Literals with the same value can be coalesced. The literal_value
5134 structure records the value of a literal: the "r_rel" field holds the
5135 information from the relocation on the literal (if there is one) and
5136 the "value" field holds the contents of the literal word itself.
5138 The value_map structure records a literal value along with the
5139 location of a literal holding that value. The value_map hash table
5140 is indexed by the literal value, so that we can quickly check if a
5141 particular literal value has been seen before and is thus a candidate
5144 typedef struct literal_value_struct literal_value
;
5145 typedef struct value_map_struct value_map
;
5146 typedef struct value_map_hash_table_struct value_map_hash_table
;
5148 struct literal_value_struct
5151 unsigned long value
;
5152 bfd_boolean is_abs_literal
;
5155 struct value_map_struct
5157 literal_value val
; /* The literal value. */
5158 r_reloc loc
; /* Location of the literal. */
5162 struct value_map_hash_table_struct
5164 unsigned bucket_count
;
5165 value_map
**buckets
;
5167 bfd_boolean has_last_loc
;
5173 init_literal_value (literal_value
*lit
,
5174 const r_reloc
*r_rel
,
5175 unsigned long value
,
5176 bfd_boolean is_abs_literal
)
5178 lit
->r_rel
= *r_rel
;
5180 lit
->is_abs_literal
= is_abs_literal
;
5185 literal_value_equal (const literal_value
*src1
,
5186 const literal_value
*src2
,
5187 bfd_boolean final_static_link
)
5189 struct elf_link_hash_entry
*h1
, *h2
;
5191 if (r_reloc_is_const (&src1
->r_rel
) != r_reloc_is_const (&src2
->r_rel
))
5194 if (r_reloc_is_const (&src1
->r_rel
))
5195 return (src1
->value
== src2
->value
);
5197 if (ELF32_R_TYPE (src1
->r_rel
.rela
.r_info
)
5198 != ELF32_R_TYPE (src2
->r_rel
.rela
.r_info
))
5201 if (src1
->r_rel
.target_offset
!= src2
->r_rel
.target_offset
)
5204 if (src1
->r_rel
.virtual_offset
!= src2
->r_rel
.virtual_offset
)
5207 if (src1
->value
!= src2
->value
)
5210 /* Now check for the same section (if defined) or the same elf_hash
5211 (if undefined or weak). */
5212 h1
= r_reloc_get_hash_entry (&src1
->r_rel
);
5213 h2
= r_reloc_get_hash_entry (&src2
->r_rel
);
5214 if (r_reloc_is_defined (&src1
->r_rel
)
5215 && (final_static_link
5216 || ((!h1
|| h1
->root
.type
!= bfd_link_hash_defweak
)
5217 && (!h2
|| h2
->root
.type
!= bfd_link_hash_defweak
))))
5219 if (r_reloc_get_section (&src1
->r_rel
)
5220 != r_reloc_get_section (&src2
->r_rel
))
5225 /* Require that the hash entries (i.e., symbols) be identical. */
5226 if (h1
!= h2
|| h1
== 0)
5230 if (src1
->is_abs_literal
!= src2
->is_abs_literal
)
5237 /* Must be power of 2. */
5238 #define INITIAL_HASH_RELOC_BUCKET_COUNT 1024
5240 static value_map_hash_table
*
5241 value_map_hash_table_init (void)
5243 value_map_hash_table
*values
;
5245 values
= (value_map_hash_table
*)
5246 bfd_zmalloc (sizeof (value_map_hash_table
));
5247 values
->bucket_count
= INITIAL_HASH_RELOC_BUCKET_COUNT
;
5249 values
->buckets
= (value_map
**)
5250 bfd_zmalloc (sizeof (value_map
*) * values
->bucket_count
);
5251 if (values
->buckets
== NULL
)
5256 values
->has_last_loc
= FALSE
;
5263 value_map_hash_table_delete (value_map_hash_table
*table
)
5265 free (table
->buckets
);
5271 hash_bfd_vma (bfd_vma val
)
5273 return (val
>> 2) + (val
>> 10);
5278 literal_value_hash (const literal_value
*src
)
5282 hash_val
= hash_bfd_vma (src
->value
);
5283 if (!r_reloc_is_const (&src
->r_rel
))
5287 hash_val
+= hash_bfd_vma (src
->is_abs_literal
* 1000);
5288 hash_val
+= hash_bfd_vma (src
->r_rel
.target_offset
);
5289 hash_val
+= hash_bfd_vma (src
->r_rel
.virtual_offset
);
5291 /* Now check for the same section and the same elf_hash. */
5292 if (r_reloc_is_defined (&src
->r_rel
))
5293 sec_or_hash
= r_reloc_get_section (&src
->r_rel
);
5295 sec_or_hash
= r_reloc_get_hash_entry (&src
->r_rel
);
5296 hash_val
+= hash_bfd_vma ((bfd_vma
) (size_t) sec_or_hash
);
5302 /* Check if the specified literal_value has been seen before. */
5305 value_map_get_cached_value (value_map_hash_table
*map
,
5306 const literal_value
*val
,
5307 bfd_boolean final_static_link
)
5313 idx
= literal_value_hash (val
);
5314 idx
= idx
& (map
->bucket_count
- 1);
5315 bucket
= map
->buckets
[idx
];
5316 for (map_e
= bucket
; map_e
; map_e
= map_e
->next
)
5318 if (literal_value_equal (&map_e
->val
, val
, final_static_link
))
5325 /* Record a new literal value. It is illegal to call this if VALUE
5326 already has an entry here. */
5329 add_value_map (value_map_hash_table
*map
,
5330 const literal_value
*val
,
5332 bfd_boolean final_static_link
)
5334 value_map
**bucket_p
;
5337 value_map
*val_e
= (value_map
*) bfd_zmalloc (sizeof (value_map
));
5340 bfd_set_error (bfd_error_no_memory
);
5344 BFD_ASSERT (!value_map_get_cached_value (map
, val
, final_static_link
));
5348 idx
= literal_value_hash (val
);
5349 idx
= idx
& (map
->bucket_count
- 1);
5350 bucket_p
= &map
->buckets
[idx
];
5352 val_e
->next
= *bucket_p
;
5355 /* FIXME: Consider resizing the hash table if we get too many entries. */
5361 /* Lists of text actions (ta_) for narrowing, widening, longcall
5362 conversion, space fill, code & literal removal, etc. */
5364 /* The following text actions are generated:
5366 "ta_remove_insn" remove an instruction or instructions
5367 "ta_remove_longcall" convert longcall to call
5368 "ta_convert_longcall" convert longcall to nop/call
5369 "ta_narrow_insn" narrow a wide instruction
5370 "ta_widen" widen a narrow instruction
5371 "ta_fill" add fill or remove fill
5372 removed < 0 is a fill; branches to the fill address will be
5373 changed to address + fill size (e.g., address - removed)
5374 removed >= 0 branches to the fill address will stay unchanged
5375 "ta_remove_literal" remove a literal; this action is
5376 indicated when a literal is removed
5378 "ta_add_literal" insert a new literal; this action is
5379 indicated when a literal has been moved.
5380 It may use a virtual_offset because
5381 multiple literals can be placed at the
5384 For each of these text actions, we also record the number of bytes
5385 removed by performing the text action. In the case of a "ta_widen"
5386 or a "ta_fill" that adds space, the removed_bytes will be negative. */
5388 typedef struct text_action_struct text_action
;
5389 typedef struct text_action_list_struct text_action_list
;
5390 typedef enum text_action_enum_t text_action_t
;
5392 enum text_action_enum_t
5395 ta_remove_insn
, /* removed = -size */
5396 ta_remove_longcall
, /* removed = -size */
5397 ta_convert_longcall
, /* removed = 0 */
5398 ta_narrow_insn
, /* removed = -1 */
5399 ta_widen_insn
, /* removed = +1 */
5400 ta_fill
, /* removed = +size */
5406 /* Structure for a text action record. */
5407 struct text_action_struct
5409 text_action_t action
;
5410 asection
*sec
; /* Optional */
5412 bfd_vma virtual_offset
; /* Zero except for adding literals. */
5414 literal_value value
; /* Only valid when adding literals. */
5420 /* List of all of the actions taken on a text section. */
5421 struct text_action_list_struct
5427 static text_action
*
5428 find_fill_action (text_action_list
*l
, asection
*sec
, bfd_vma offset
)
5432 /* It is not necessary to fill at the end of a section. */
5433 if (sec
->size
== offset
)
5436 for (m_p
= &l
->head
; *m_p
&& (*m_p
)->offset
<= offset
; m_p
= &(*m_p
)->next
)
5438 text_action
*t
= *m_p
;
5439 /* When the action is another fill at the same address,
5440 just increase the size. */
5441 if (t
->offset
== offset
&& t
->action
== ta_fill
)
5449 compute_removed_action_diff (const text_action
*ta
,
5453 int removable_space
)
5456 int current_removed
= 0;
5459 current_removed
= ta
->removed_bytes
;
5461 BFD_ASSERT (ta
== NULL
|| ta
->offset
== offset
);
5462 BFD_ASSERT (ta
== NULL
|| ta
->action
== ta_fill
);
5464 /* It is not necessary to fill at the end of a section. Clean this up. */
5465 if (sec
->size
== offset
)
5466 new_removed
= removable_space
- 0;
5470 int added
= -removed
- current_removed
;
5471 /* Ignore multiples of the section alignment. */
5472 added
= ((1 << sec
->alignment_power
) - 1) & added
;
5473 new_removed
= (-added
);
5475 /* Modify for removable. */
5476 space
= removable_space
- new_removed
;
5477 new_removed
= (removable_space
5478 - (((1 << sec
->alignment_power
) - 1) & space
));
5480 return (new_removed
- current_removed
);
5485 adjust_fill_action (text_action
*ta
, int fill_diff
)
5487 ta
->removed_bytes
+= fill_diff
;
5491 /* Add a modification action to the text. For the case of adding or
5492 removing space, modify any current fill and assume that
5493 "unreachable_space" bytes can be freely contracted. Note that a
5494 negative removed value is a fill. */
5497 text_action_add (text_action_list
*l
,
5498 text_action_t action
,
5506 /* It is not necessary to fill at the end of a section. */
5507 if (action
== ta_fill
&& sec
->size
== offset
)
5510 /* It is not necessary to fill 0 bytes. */
5511 if (action
== ta_fill
&& removed
== 0)
5514 for (m_p
= &l
->head
; *m_p
&& (*m_p
)->offset
<= offset
; m_p
= &(*m_p
)->next
)
5516 text_action
*t
= *m_p
;
5518 if (action
== ta_fill
)
5520 /* When the action is another fill at the same address,
5521 just increase the size. */
5522 if (t
->offset
== offset
&& t
->action
== ta_fill
)
5524 t
->removed_bytes
+= removed
;
5527 /* Fills need to happen before widens so that we don't
5528 insert fill bytes into the instruction stream. */
5529 if (t
->offset
== offset
&& t
->action
== ta_widen_insn
)
5534 /* Create a new record and fill it up. */
5535 ta
= (text_action
*) bfd_zmalloc (sizeof (text_action
));
5536 ta
->action
= action
;
5538 ta
->offset
= offset
;
5539 ta
->removed_bytes
= removed
;
5546 text_action_add_literal (text_action_list
*l
,
5547 text_action_t action
,
5549 const literal_value
*value
,
5554 asection
*sec
= r_reloc_get_section (loc
);
5555 bfd_vma offset
= loc
->target_offset
;
5556 bfd_vma virtual_offset
= loc
->virtual_offset
;
5558 BFD_ASSERT (action
== ta_add_literal
);
5560 for (m_p
= &l
->head
; *m_p
!= NULL
; m_p
= &(*m_p
)->next
)
5562 if ((*m_p
)->offset
> offset
5563 && ((*m_p
)->offset
!= offset
5564 || (*m_p
)->virtual_offset
> virtual_offset
))
5568 /* Create a new record and fill it up. */
5569 ta
= (text_action
*) bfd_zmalloc (sizeof (text_action
));
5570 ta
->action
= action
;
5572 ta
->offset
= offset
;
5573 ta
->virtual_offset
= virtual_offset
;
5575 ta
->removed_bytes
= removed
;
5581 /* Find the total offset adjustment for the relaxations specified by
5582 text_actions, beginning from a particular starting action. This is
5583 typically used from offset_with_removed_text to search an entire list of
5584 actions, but it may also be called directly when adjusting adjacent offsets
5585 so that each search may begin where the previous one left off. */
5588 removed_by_actions (text_action
**p_start_action
,
5590 bfd_boolean before_fill
)
5595 r
= *p_start_action
;
5598 if (r
->offset
> offset
)
5601 if (r
->offset
== offset
5602 && (before_fill
|| r
->action
!= ta_fill
|| r
->removed_bytes
>= 0))
5605 removed
+= r
->removed_bytes
;
5610 *p_start_action
= r
;
5616 offset_with_removed_text (text_action_list
*action_list
, bfd_vma offset
)
5618 text_action
*r
= action_list
->head
;
5619 return offset
- removed_by_actions (&r
, offset
, FALSE
);
5624 action_list_count (text_action_list
*action_list
)
5626 text_action
*r
= action_list
->head
;
5628 for (r
= action_list
->head
; r
!= NULL
; r
= r
->next
)
5636 /* The find_insn_action routine will only find non-fill actions. */
5638 static text_action
*
5639 find_insn_action (text_action_list
*action_list
, bfd_vma offset
)
5642 for (t
= action_list
->head
; t
; t
= t
->next
)
5644 if (t
->offset
== offset
)
5651 case ta_remove_insn
:
5652 case ta_remove_longcall
:
5653 case ta_convert_longcall
:
5654 case ta_narrow_insn
:
5657 case ta_remove_literal
:
5658 case ta_add_literal
:
5671 print_action_list (FILE *fp
, text_action_list
*action_list
)
5675 fprintf (fp
, "Text Action\n");
5676 for (r
= action_list
->head
; r
!= NULL
; r
= r
->next
)
5678 const char *t
= "unknown";
5681 case ta_remove_insn
:
5682 t
= "remove_insn"; break;
5683 case ta_remove_longcall
:
5684 t
= "remove_longcall"; break;
5685 case ta_convert_longcall
:
5686 t
= "convert_longcall"; break;
5687 case ta_narrow_insn
:
5688 t
= "narrow_insn"; break;
5690 t
= "widen_insn"; break;
5695 case ta_remove_literal
:
5696 t
= "remove_literal"; break;
5697 case ta_add_literal
:
5698 t
= "add_literal"; break;
5701 fprintf (fp
, "%s: %s[0x%lx] \"%s\" %d\n",
5702 r
->sec
->owner
->filename
,
5703 r
->sec
->name
, (unsigned long) r
->offset
, t
, r
->removed_bytes
);
5710 /* Lists of literals being coalesced or removed. */
5712 /* In the usual case, the literal identified by "from" is being
5713 coalesced with another literal identified by "to". If the literal is
5714 unused and is being removed altogether, "to.abfd" will be NULL.
5715 The removed_literal entries are kept on a per-section list, sorted
5716 by the "from" offset field. */
5718 typedef struct removed_literal_struct removed_literal
;
5719 typedef struct removed_literal_list_struct removed_literal_list
;
5721 struct removed_literal_struct
5725 removed_literal
*next
;
5728 struct removed_literal_list_struct
5730 removed_literal
*head
;
5731 removed_literal
*tail
;
5735 /* Record that the literal at "from" is being removed. If "to" is not
5736 NULL, the "from" literal is being coalesced with the "to" literal. */
5739 add_removed_literal (removed_literal_list
*removed_list
,
5740 const r_reloc
*from
,
5743 removed_literal
*r
, *new_r
, *next_r
;
5745 new_r
= (removed_literal
*) bfd_zmalloc (sizeof (removed_literal
));
5747 new_r
->from
= *from
;
5751 new_r
->to
.abfd
= NULL
;
5754 r
= removed_list
->head
;
5757 removed_list
->head
= new_r
;
5758 removed_list
->tail
= new_r
;
5760 /* Special check for common case of append. */
5761 else if (removed_list
->tail
->from
.target_offset
< from
->target_offset
)
5763 removed_list
->tail
->next
= new_r
;
5764 removed_list
->tail
= new_r
;
5768 while (r
->from
.target_offset
< from
->target_offset
&& r
->next
)
5774 new_r
->next
= next_r
;
5776 removed_list
->tail
= new_r
;
5781 /* Check if the list of removed literals contains an entry for the
5782 given address. Return the entry if found. */
5784 static removed_literal
*
5785 find_removed_literal (removed_literal_list
*removed_list
, bfd_vma addr
)
5787 removed_literal
*r
= removed_list
->head
;
5788 while (r
&& r
->from
.target_offset
< addr
)
5790 if (r
&& r
->from
.target_offset
== addr
)
5799 print_removed_literals (FILE *fp
, removed_literal_list
*removed_list
)
5802 r
= removed_list
->head
;
5804 fprintf (fp
, "Removed Literals\n");
5805 for (; r
!= NULL
; r
= r
->next
)
5807 print_r_reloc (fp
, &r
->from
);
5808 fprintf (fp
, " => ");
5809 if (r
->to
.abfd
== NULL
)
5810 fprintf (fp
, "REMOVED");
5812 print_r_reloc (fp
, &r
->to
);
5820 /* Per-section data for relaxation. */
5822 typedef struct reloc_bfd_fix_struct reloc_bfd_fix
;
5824 struct xtensa_relax_info_struct
5826 bfd_boolean is_relaxable_literal_section
;
5827 bfd_boolean is_relaxable_asm_section
;
5828 int visited
; /* Number of times visited. */
5830 source_reloc
*src_relocs
; /* Array[src_count]. */
5832 int src_next
; /* Next src_relocs entry to assign. */
5834 removed_literal_list removed_list
;
5835 text_action_list action_list
;
5837 reloc_bfd_fix
*fix_list
;
5838 reloc_bfd_fix
*fix_array
;
5839 unsigned fix_array_count
;
5841 /* Support for expanding the reloc array that is stored
5842 in the section structure. If the relocations have been
5843 reallocated, the newly allocated relocations will be referenced
5844 here along with the actual size allocated. The relocation
5845 count will always be found in the section structure. */
5846 Elf_Internal_Rela
*allocated_relocs
;
5847 unsigned relocs_count
;
5848 unsigned allocated_relocs_count
;
5851 struct elf_xtensa_section_data
5853 struct bfd_elf_section_data elf
;
5854 xtensa_relax_info relax_info
;
5859 elf_xtensa_new_section_hook (bfd
*abfd
, asection
*sec
)
5861 if (!sec
->used_by_bfd
)
5863 struct elf_xtensa_section_data
*sdata
;
5864 bfd_size_type amt
= sizeof (*sdata
);
5866 sdata
= bfd_zalloc (abfd
, amt
);
5869 sec
->used_by_bfd
= sdata
;
5872 return _bfd_elf_new_section_hook (abfd
, sec
);
5876 static xtensa_relax_info
*
5877 get_xtensa_relax_info (asection
*sec
)
5879 struct elf_xtensa_section_data
*section_data
;
5881 /* No info available if no section or if it is an output section. */
5882 if (!sec
|| sec
== sec
->output_section
)
5885 section_data
= (struct elf_xtensa_section_data
*) elf_section_data (sec
);
5886 return §ion_data
->relax_info
;
5891 init_xtensa_relax_info (asection
*sec
)
5893 xtensa_relax_info
*relax_info
= get_xtensa_relax_info (sec
);
5895 relax_info
->is_relaxable_literal_section
= FALSE
;
5896 relax_info
->is_relaxable_asm_section
= FALSE
;
5897 relax_info
->visited
= 0;
5899 relax_info
->src_relocs
= NULL
;
5900 relax_info
->src_count
= 0;
5901 relax_info
->src_next
= 0;
5903 relax_info
->removed_list
.head
= NULL
;
5904 relax_info
->removed_list
.tail
= NULL
;
5906 relax_info
->action_list
.head
= NULL
;
5908 relax_info
->fix_list
= NULL
;
5909 relax_info
->fix_array
= NULL
;
5910 relax_info
->fix_array_count
= 0;
5912 relax_info
->allocated_relocs
= NULL
;
5913 relax_info
->relocs_count
= 0;
5914 relax_info
->allocated_relocs_count
= 0;
5918 /* Coalescing literals may require a relocation to refer to a section in
5919 a different input file, but the standard relocation information
5920 cannot express that. Instead, the reloc_bfd_fix structures are used
5921 to "fix" the relocations that refer to sections in other input files.
5922 These structures are kept on per-section lists. The "src_type" field
5923 records the relocation type in case there are multiple relocations on
5924 the same location. FIXME: This is ugly; an alternative might be to
5925 add new symbols with the "owner" field to some other input file. */
5927 struct reloc_bfd_fix_struct
5931 unsigned src_type
; /* Relocation type. */
5933 asection
*target_sec
;
5934 bfd_vma target_offset
;
5935 bfd_boolean translated
;
5937 reloc_bfd_fix
*next
;
5941 static reloc_bfd_fix
*
5942 reloc_bfd_fix_init (asection
*src_sec
,
5945 asection
*target_sec
,
5946 bfd_vma target_offset
,
5947 bfd_boolean translated
)
5951 fix
= (reloc_bfd_fix
*) bfd_malloc (sizeof (reloc_bfd_fix
));
5952 fix
->src_sec
= src_sec
;
5953 fix
->src_offset
= src_offset
;
5954 fix
->src_type
= src_type
;
5955 fix
->target_sec
= target_sec
;
5956 fix
->target_offset
= target_offset
;
5957 fix
->translated
= translated
;
5964 add_fix (asection
*src_sec
, reloc_bfd_fix
*fix
)
5966 xtensa_relax_info
*relax_info
;
5968 relax_info
= get_xtensa_relax_info (src_sec
);
5969 fix
->next
= relax_info
->fix_list
;
5970 relax_info
->fix_list
= fix
;
5975 fix_compare (const void *ap
, const void *bp
)
5977 const reloc_bfd_fix
*a
= (const reloc_bfd_fix
*) ap
;
5978 const reloc_bfd_fix
*b
= (const reloc_bfd_fix
*) bp
;
5980 if (a
->src_offset
!= b
->src_offset
)
5981 return (a
->src_offset
- b
->src_offset
);
5982 return (a
->src_type
- b
->src_type
);
5987 cache_fix_array (asection
*sec
)
5989 unsigned i
, count
= 0;
5991 xtensa_relax_info
*relax_info
= get_xtensa_relax_info (sec
);
5993 if (relax_info
== NULL
)
5995 if (relax_info
->fix_list
== NULL
)
5998 for (r
= relax_info
->fix_list
; r
!= NULL
; r
= r
->next
)
6001 relax_info
->fix_array
=
6002 (reloc_bfd_fix
*) bfd_malloc (sizeof (reloc_bfd_fix
) * count
);
6003 relax_info
->fix_array_count
= count
;
6005 r
= relax_info
->fix_list
;
6006 for (i
= 0; i
< count
; i
++, r
= r
->next
)
6008 relax_info
->fix_array
[count
- 1 - i
] = *r
;
6009 relax_info
->fix_array
[count
- 1 - i
].next
= NULL
;
6012 qsort (relax_info
->fix_array
, relax_info
->fix_array_count
,
6013 sizeof (reloc_bfd_fix
), fix_compare
);
6017 static reloc_bfd_fix
*
6018 get_bfd_fix (asection
*sec
, bfd_vma offset
, unsigned type
)
6020 xtensa_relax_info
*relax_info
= get_xtensa_relax_info (sec
);
6024 if (relax_info
== NULL
)
6026 if (relax_info
->fix_list
== NULL
)
6029 if (relax_info
->fix_array
== NULL
)
6030 cache_fix_array (sec
);
6032 key
.src_offset
= offset
;
6033 key
.src_type
= type
;
6034 rv
= bsearch (&key
, relax_info
->fix_array
, relax_info
->fix_array_count
,
6035 sizeof (reloc_bfd_fix
), fix_compare
);
6040 /* Section caching. */
6042 typedef struct section_cache_struct section_cache_t
;
6044 struct section_cache_struct
6048 bfd_byte
*contents
; /* Cache of the section contents. */
6049 bfd_size_type content_length
;
6051 property_table_entry
*ptbl
; /* Cache of the section property table. */
6054 Elf_Internal_Rela
*relocs
; /* Cache of the section relocations. */
6055 unsigned reloc_count
;
6060 init_section_cache (section_cache_t
*sec_cache
)
6062 memset (sec_cache
, 0, sizeof (*sec_cache
));
6067 free_section_cache (section_cache_t
*sec_cache
)
6071 release_contents (sec_cache
->sec
, sec_cache
->contents
);
6072 release_internal_relocs (sec_cache
->sec
, sec_cache
->relocs
);
6073 if (sec_cache
->ptbl
)
6074 free (sec_cache
->ptbl
);
6080 section_cache_section (section_cache_t
*sec_cache
,
6082 struct bfd_link_info
*link_info
)
6085 property_table_entry
*prop_table
= NULL
;
6087 bfd_byte
*contents
= NULL
;
6088 Elf_Internal_Rela
*internal_relocs
= NULL
;
6089 bfd_size_type sec_size
;
6093 if (sec
== sec_cache
->sec
)
6097 sec_size
= bfd_get_section_limit (abfd
, sec
);
6099 /* Get the contents. */
6100 contents
= retrieve_contents (abfd
, sec
, link_info
->keep_memory
);
6101 if (contents
== NULL
&& sec_size
!= 0)
6104 /* Get the relocations. */
6105 internal_relocs
= retrieve_internal_relocs (abfd
, sec
,
6106 link_info
->keep_memory
);
6108 /* Get the entry table. */
6109 ptblsize
= xtensa_read_table_entries (abfd
, sec
, &prop_table
,
6110 XTENSA_PROP_SEC_NAME
, FALSE
);
6114 /* Fill in the new section cache. */
6115 free_section_cache (sec_cache
);
6116 init_section_cache (sec_cache
);
6118 sec_cache
->sec
= sec
;
6119 sec_cache
->contents
= contents
;
6120 sec_cache
->content_length
= sec_size
;
6121 sec_cache
->relocs
= internal_relocs
;
6122 sec_cache
->reloc_count
= sec
->reloc_count
;
6123 sec_cache
->pte_count
= ptblsize
;
6124 sec_cache
->ptbl
= prop_table
;
6129 release_contents (sec
, contents
);
6130 release_internal_relocs (sec
, internal_relocs
);
6137 /* Extended basic blocks. */
6139 /* An ebb_struct represents an Extended Basic Block. Within this
6140 range, we guarantee that all instructions are decodable, the
6141 property table entries are contiguous, and no property table
6142 specifies a segment that cannot have instructions moved. This
6143 structure contains caches of the contents, property table and
6144 relocations for the specified section for easy use. The range is
6145 specified by ranges of indices for the byte offset, property table
6146 offsets and relocation offsets. These must be consistent. */
6148 typedef struct ebb_struct ebb_t
;
6154 bfd_byte
*contents
; /* Cache of the section contents. */
6155 bfd_size_type content_length
;
6157 property_table_entry
*ptbl
; /* Cache of the section property table. */
6160 Elf_Internal_Rela
*relocs
; /* Cache of the section relocations. */
6161 unsigned reloc_count
;
6163 bfd_vma start_offset
; /* Offset in section. */
6164 unsigned start_ptbl_idx
; /* Offset in the property table. */
6165 unsigned start_reloc_idx
; /* Offset in the relocations. */
6168 unsigned end_ptbl_idx
;
6169 unsigned end_reloc_idx
;
6171 bfd_boolean ends_section
; /* Is this the last ebb in a section? */
6173 /* The unreachable property table at the end of this set of blocks;
6174 NULL if the end is not an unreachable block. */
6175 property_table_entry
*ends_unreachable
;
6179 enum ebb_target_enum
6182 EBB_DESIRE_TGT_ALIGN
,
6183 EBB_REQUIRE_TGT_ALIGN
,
6184 EBB_REQUIRE_LOOP_ALIGN
,
6189 /* proposed_action_struct is similar to the text_action_struct except
6190 that is represents a potential transformation, not one that will
6191 occur. We build a list of these for an extended basic block
6192 and use them to compute the actual actions desired. We must be
6193 careful that the entire set of actual actions we perform do not
6194 break any relocations that would fit if the actions were not
6197 typedef struct proposed_action_struct proposed_action
;
6199 struct proposed_action_struct
6201 enum ebb_target_enum align_type
; /* for the target alignment */
6202 bfd_vma alignment_pow
;
6203 text_action_t action
;
6206 bfd_boolean do_action
; /* If false, then we will not perform the action. */
6210 /* The ebb_constraint_struct keeps a set of proposed actions for an
6211 extended basic block. */
6213 typedef struct ebb_constraint_struct ebb_constraint
;
6215 struct ebb_constraint_struct
6218 bfd_boolean start_movable
;
6220 /* Bytes of extra space at the beginning if movable. */
6221 int start_extra_space
;
6223 enum ebb_target_enum start_align
;
6225 bfd_boolean end_movable
;
6227 /* Bytes of extra space at the end if movable. */
6228 int end_extra_space
;
6230 unsigned action_count
;
6231 unsigned action_allocated
;
6233 /* Array of proposed actions. */
6234 proposed_action
*actions
;
6236 /* Action alignments -- one for each proposed action. */
6237 enum ebb_target_enum
*action_aligns
;
6242 init_ebb_constraint (ebb_constraint
*c
)
6244 memset (c
, 0, sizeof (ebb_constraint
));
6249 free_ebb_constraint (ebb_constraint
*c
)
6257 init_ebb (ebb_t
*ebb
,
6260 bfd_size_type content_length
,
6261 property_table_entry
*prop_table
,
6263 Elf_Internal_Rela
*internal_relocs
,
6264 unsigned reloc_count
)
6266 memset (ebb
, 0, sizeof (ebb_t
));
6268 ebb
->contents
= contents
;
6269 ebb
->content_length
= content_length
;
6270 ebb
->ptbl
= prop_table
;
6271 ebb
->pte_count
= ptblsize
;
6272 ebb
->relocs
= internal_relocs
;
6273 ebb
->reloc_count
= reloc_count
;
6274 ebb
->start_offset
= 0;
6275 ebb
->end_offset
= ebb
->content_length
- 1;
6276 ebb
->start_ptbl_idx
= 0;
6277 ebb
->end_ptbl_idx
= ptblsize
;
6278 ebb
->start_reloc_idx
= 0;
6279 ebb
->end_reloc_idx
= reloc_count
;
6283 /* Extend the ebb to all decodable contiguous sections. The algorithm
6284 for building a basic block around an instruction is to push it
6285 forward until we hit the end of a section, an unreachable block or
6286 a block that cannot be transformed. Then we push it backwards
6287 searching for similar conditions. */
6289 static bfd_boolean
extend_ebb_bounds_forward (ebb_t
*);
6290 static bfd_boolean
extend_ebb_bounds_backward (ebb_t
*);
6291 static bfd_size_type insn_block_decodable_len
6292 (bfd_byte
*, bfd_size_type
, bfd_vma
, bfd_size_type
);
6295 extend_ebb_bounds (ebb_t
*ebb
)
6297 if (!extend_ebb_bounds_forward (ebb
))
6299 if (!extend_ebb_bounds_backward (ebb
))
6306 extend_ebb_bounds_forward (ebb_t
*ebb
)
6308 property_table_entry
*the_entry
, *new_entry
;
6310 the_entry
= &ebb
->ptbl
[ebb
->end_ptbl_idx
];
6312 /* Stop when (1) we cannot decode an instruction, (2) we are at
6313 the end of the property tables, (3) we hit a non-contiguous property
6314 table entry, (4) we hit a NO_TRANSFORM region. */
6319 bfd_size_type insn_block_len
;
6321 entry_end
= the_entry
->address
- ebb
->sec
->vma
+ the_entry
->size
;
6323 insn_block_decodable_len (ebb
->contents
, ebb
->content_length
,
6325 entry_end
- ebb
->end_offset
);
6326 if (insn_block_len
!= (entry_end
- ebb
->end_offset
))
6328 (*_bfd_error_handler
)
6329 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
6330 ebb
->sec
->owner
, ebb
->sec
, ebb
->end_offset
+ insn_block_len
);
6333 ebb
->end_offset
+= insn_block_len
;
6335 if (ebb
->end_offset
== ebb
->sec
->size
)
6336 ebb
->ends_section
= TRUE
;
6338 /* Update the reloc counter. */
6339 while (ebb
->end_reloc_idx
+ 1 < ebb
->reloc_count
6340 && (ebb
->relocs
[ebb
->end_reloc_idx
+ 1].r_offset
6343 ebb
->end_reloc_idx
++;
6346 if (ebb
->end_ptbl_idx
+ 1 == ebb
->pte_count
)
6349 new_entry
= &ebb
->ptbl
[ebb
->end_ptbl_idx
+ 1];
6350 if (((new_entry
->flags
& XTENSA_PROP_INSN
) == 0)
6351 || ((new_entry
->flags
& XTENSA_PROP_NO_TRANSFORM
) != 0)
6352 || ((the_entry
->flags
& XTENSA_PROP_ALIGN
) != 0))
6355 if (the_entry
->address
+ the_entry
->size
!= new_entry
->address
)
6358 the_entry
= new_entry
;
6359 ebb
->end_ptbl_idx
++;
6362 /* Quick check for an unreachable or end of file just at the end. */
6363 if (ebb
->end_ptbl_idx
+ 1 == ebb
->pte_count
)
6365 if (ebb
->end_offset
== ebb
->content_length
)
6366 ebb
->ends_section
= TRUE
;
6370 new_entry
= &ebb
->ptbl
[ebb
->end_ptbl_idx
+ 1];
6371 if ((new_entry
->flags
& XTENSA_PROP_UNREACHABLE
) != 0
6372 && the_entry
->address
+ the_entry
->size
== new_entry
->address
)
6373 ebb
->ends_unreachable
= new_entry
;
6376 /* Any other ending requires exact alignment. */
6382 extend_ebb_bounds_backward (ebb_t
*ebb
)
6384 property_table_entry
*the_entry
, *new_entry
;
6386 the_entry
= &ebb
->ptbl
[ebb
->start_ptbl_idx
];
6388 /* Stop when (1) we cannot decode the instructions in the current entry.
6389 (2) we are at the beginning of the property tables, (3) we hit a
6390 non-contiguous property table entry, (4) we hit a NO_TRANSFORM region. */
6394 bfd_vma block_begin
;
6395 bfd_size_type insn_block_len
;
6397 block_begin
= the_entry
->address
- ebb
->sec
->vma
;
6399 insn_block_decodable_len (ebb
->contents
, ebb
->content_length
,
6401 ebb
->start_offset
- block_begin
);
6402 if (insn_block_len
!= ebb
->start_offset
- block_begin
)
6404 (*_bfd_error_handler
)
6405 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
6406 ebb
->sec
->owner
, ebb
->sec
, ebb
->end_offset
+ insn_block_len
);
6409 ebb
->start_offset
-= insn_block_len
;
6411 /* Update the reloc counter. */
6412 while (ebb
->start_reloc_idx
> 0
6413 && (ebb
->relocs
[ebb
->start_reloc_idx
- 1].r_offset
6414 >= ebb
->start_offset
))
6416 ebb
->start_reloc_idx
--;
6419 if (ebb
->start_ptbl_idx
== 0)
6422 new_entry
= &ebb
->ptbl
[ebb
->start_ptbl_idx
- 1];
6423 if ((new_entry
->flags
& XTENSA_PROP_INSN
) == 0
6424 || ((new_entry
->flags
& XTENSA_PROP_NO_TRANSFORM
) != 0)
6425 || ((new_entry
->flags
& XTENSA_PROP_ALIGN
) != 0))
6427 if (new_entry
->address
+ new_entry
->size
!= the_entry
->address
)
6430 the_entry
= new_entry
;
6431 ebb
->start_ptbl_idx
--;
6437 static bfd_size_type
6438 insn_block_decodable_len (bfd_byte
*contents
,
6439 bfd_size_type content_len
,
6440 bfd_vma block_offset
,
6441 bfd_size_type block_len
)
6443 bfd_vma offset
= block_offset
;
6445 while (offset
< block_offset
+ block_len
)
6447 bfd_size_type insn_len
= 0;
6449 insn_len
= insn_decode_len (contents
, content_len
, offset
);
6451 return (offset
- block_offset
);
6454 return (offset
- block_offset
);
6459 ebb_propose_action (ebb_constraint
*c
,
6460 enum ebb_target_enum align_type
,
6461 bfd_vma alignment_pow
,
6462 text_action_t action
,
6465 bfd_boolean do_action
)
6467 proposed_action
*act
;
6469 if (c
->action_allocated
<= c
->action_count
)
6471 unsigned new_allocated
, i
;
6472 proposed_action
*new_actions
;
6474 new_allocated
= (c
->action_count
+ 2) * 2;
6475 new_actions
= (proposed_action
*)
6476 bfd_zmalloc (sizeof (proposed_action
) * new_allocated
);
6478 for (i
= 0; i
< c
->action_count
; i
++)
6479 new_actions
[i
] = c
->actions
[i
];
6482 c
->actions
= new_actions
;
6483 c
->action_allocated
= new_allocated
;
6486 act
= &c
->actions
[c
->action_count
];
6487 act
->align_type
= align_type
;
6488 act
->alignment_pow
= alignment_pow
;
6489 act
->action
= action
;
6490 act
->offset
= offset
;
6491 act
->removed_bytes
= removed_bytes
;
6492 act
->do_action
= do_action
;
6498 /* Access to internal relocations, section contents and symbols. */
6500 /* During relaxation, we need to modify relocations, section contents,
6501 and symbol definitions, and we need to keep the original values from
6502 being reloaded from the input files, i.e., we need to "pin" the
6503 modified values in memory. We also want to continue to observe the
6504 setting of the "keep-memory" flag. The following functions wrap the
6505 standard BFD functions to take care of this for us. */
6507 static Elf_Internal_Rela
*
6508 retrieve_internal_relocs (bfd
*abfd
, asection
*sec
, bfd_boolean keep_memory
)
6510 Elf_Internal_Rela
*internal_relocs
;
6512 if ((sec
->flags
& SEC_LINKER_CREATED
) != 0)
6515 internal_relocs
= elf_section_data (sec
)->relocs
;
6516 if (internal_relocs
== NULL
)
6517 internal_relocs
= (_bfd_elf_link_read_relocs
6518 (abfd
, sec
, NULL
, NULL
, keep_memory
));
6519 return internal_relocs
;
6524 pin_internal_relocs (asection
*sec
, Elf_Internal_Rela
*internal_relocs
)
6526 elf_section_data (sec
)->relocs
= internal_relocs
;
6531 release_internal_relocs (asection
*sec
, Elf_Internal_Rela
*internal_relocs
)
6534 && elf_section_data (sec
)->relocs
!= internal_relocs
)
6535 free (internal_relocs
);
6540 retrieve_contents (bfd
*abfd
, asection
*sec
, bfd_boolean keep_memory
)
6543 bfd_size_type sec_size
;
6545 sec_size
= bfd_get_section_limit (abfd
, sec
);
6546 contents
= elf_section_data (sec
)->this_hdr
.contents
;
6548 if (contents
== NULL
&& sec_size
!= 0)
6550 if (!bfd_malloc_and_get_section (abfd
, sec
, &contents
))
6557 elf_section_data (sec
)->this_hdr
.contents
= contents
;
6564 pin_contents (asection
*sec
, bfd_byte
*contents
)
6566 elf_section_data (sec
)->this_hdr
.contents
= contents
;
6571 release_contents (asection
*sec
, bfd_byte
*contents
)
6573 if (contents
&& elf_section_data (sec
)->this_hdr
.contents
!= contents
)
6578 static Elf_Internal_Sym
*
6579 retrieve_local_syms (bfd
*input_bfd
)
6581 Elf_Internal_Shdr
*symtab_hdr
;
6582 Elf_Internal_Sym
*isymbuf
;
6585 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
6586 locsymcount
= symtab_hdr
->sh_info
;
6588 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
6589 if (isymbuf
== NULL
&& locsymcount
!= 0)
6590 isymbuf
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
, locsymcount
, 0,
6593 /* Save the symbols for this input file so they won't be read again. */
6594 if (isymbuf
&& isymbuf
!= (Elf_Internal_Sym
*) symtab_hdr
->contents
)
6595 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
6601 /* Code for link-time relaxation. */
6603 /* Initialization for relaxation: */
6604 static bfd_boolean
analyze_relocations (struct bfd_link_info
*);
6605 static bfd_boolean find_relaxable_sections
6606 (bfd
*, asection
*, struct bfd_link_info
*, bfd_boolean
*);
6607 static bfd_boolean collect_source_relocs
6608 (bfd
*, asection
*, struct bfd_link_info
*);
6609 static bfd_boolean is_resolvable_asm_expansion
6610 (bfd
*, asection
*, bfd_byte
*, Elf_Internal_Rela
*, struct bfd_link_info
*,
6612 static Elf_Internal_Rela
*find_associated_l32r_irel
6613 (bfd
*, asection
*, bfd_byte
*, Elf_Internal_Rela
*, Elf_Internal_Rela
*);
6614 static bfd_boolean compute_text_actions
6615 (bfd
*, asection
*, struct bfd_link_info
*);
6616 static bfd_boolean
compute_ebb_proposed_actions (ebb_constraint
*);
6617 static bfd_boolean
compute_ebb_actions (ebb_constraint
*);
6618 static bfd_boolean check_section_ebb_pcrels_fit
6619 (bfd
*, asection
*, bfd_byte
*, Elf_Internal_Rela
*, const ebb_constraint
*,
6620 const xtensa_opcode
*);
6621 static bfd_boolean
check_section_ebb_reduces (const ebb_constraint
*);
6622 static void text_action_add_proposed
6623 (text_action_list
*, const ebb_constraint
*, asection
*);
6624 static int compute_fill_extra_space (property_table_entry
*);
6627 static bfd_boolean compute_removed_literals
6628 (bfd
*, asection
*, struct bfd_link_info
*, value_map_hash_table
*);
6629 static Elf_Internal_Rela
*get_irel_at_offset
6630 (asection
*, Elf_Internal_Rela
*, bfd_vma
);
6631 static bfd_boolean is_removable_literal
6632 (const source_reloc
*, int, const source_reloc
*, int, asection
*,
6633 property_table_entry
*, int);
6634 static bfd_boolean remove_dead_literal
6635 (bfd
*, asection
*, struct bfd_link_info
*, Elf_Internal_Rela
*,
6636 Elf_Internal_Rela
*, source_reloc
*, property_table_entry
*, int);
6637 static bfd_boolean identify_literal_placement
6638 (bfd
*, asection
*, bfd_byte
*, struct bfd_link_info
*,
6639 value_map_hash_table
*, bfd_boolean
*, Elf_Internal_Rela
*, int,
6640 source_reloc
*, property_table_entry
*, int, section_cache_t
*,
6642 static bfd_boolean
relocations_reach (source_reloc
*, int, const r_reloc
*);
6643 static bfd_boolean coalesce_shared_literal
6644 (asection
*, source_reloc
*, property_table_entry
*, int, value_map
*);
6645 static bfd_boolean move_shared_literal
6646 (asection
*, struct bfd_link_info
*, source_reloc
*, property_table_entry
*,
6647 int, const r_reloc
*, const literal_value
*, section_cache_t
*);
6650 static bfd_boolean
relax_section (bfd
*, asection
*, struct bfd_link_info
*);
6651 static bfd_boolean
translate_section_fixes (asection
*);
6652 static bfd_boolean
translate_reloc_bfd_fix (reloc_bfd_fix
*);
6653 static asection
*translate_reloc (const r_reloc
*, r_reloc
*, asection
*);
6654 static void shrink_dynamic_reloc_sections
6655 (struct bfd_link_info
*, bfd
*, asection
*, Elf_Internal_Rela
*);
6656 static bfd_boolean move_literal
6657 (bfd
*, struct bfd_link_info
*, asection
*, bfd_vma
, bfd_byte
*,
6658 xtensa_relax_info
*, Elf_Internal_Rela
**, const literal_value
*);
6659 static bfd_boolean relax_property_section
6660 (bfd
*, asection
*, struct bfd_link_info
*);
6663 static bfd_boolean
relax_section_symbols (bfd
*, asection
*);
6667 elf_xtensa_relax_section (bfd
*abfd
,
6669 struct bfd_link_info
*link_info
,
6672 static value_map_hash_table
*values
= NULL
;
6673 static bfd_boolean relocations_analyzed
= FALSE
;
6674 xtensa_relax_info
*relax_info
;
6676 if (!relocations_analyzed
)
6678 /* Do some overall initialization for relaxation. */
6679 values
= value_map_hash_table_init ();
6682 relaxing_section
= TRUE
;
6683 if (!analyze_relocations (link_info
))
6685 relocations_analyzed
= TRUE
;
6689 /* Don't mess with linker-created sections. */
6690 if ((sec
->flags
& SEC_LINKER_CREATED
) != 0)
6693 relax_info
= get_xtensa_relax_info (sec
);
6694 BFD_ASSERT (relax_info
!= NULL
);
6696 switch (relax_info
->visited
)
6699 /* Note: It would be nice to fold this pass into
6700 analyze_relocations, but it is important for this step that the
6701 sections be examined in link order. */
6702 if (!compute_removed_literals (abfd
, sec
, link_info
, values
))
6709 value_map_hash_table_delete (values
);
6711 if (!relax_section (abfd
, sec
, link_info
))
6717 if (!relax_section_symbols (abfd
, sec
))
6722 relax_info
->visited
++;
6727 /* Initialization for relaxation. */
6729 /* This function is called once at the start of relaxation. It scans
6730 all the input sections and marks the ones that are relaxable (i.e.,
6731 literal sections with L32R relocations against them), and then
6732 collects source_reloc information for all the relocations against
6733 those relaxable sections. During this process, it also detects
6734 longcalls, i.e., calls relaxed by the assembler into indirect
6735 calls, that can be optimized back into direct calls. Within each
6736 extended basic block (ebb) containing an optimized longcall, it
6737 computes a set of "text actions" that can be performed to remove
6738 the L32R associated with the longcall while optionally preserving
6739 branch target alignments. */
6742 analyze_relocations (struct bfd_link_info
*link_info
)
6746 bfd_boolean is_relaxable
= FALSE
;
6748 /* Initialize the per-section relaxation info. */
6749 for (abfd
= link_info
->input_bfds
; abfd
!= NULL
; abfd
= abfd
->link
.next
)
6750 for (sec
= abfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
6752 init_xtensa_relax_info (sec
);
6755 /* Mark relaxable sections (and count relocations against each one). */
6756 for (abfd
= link_info
->input_bfds
; abfd
!= NULL
; abfd
= abfd
->link
.next
)
6757 for (sec
= abfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
6759 if (!find_relaxable_sections (abfd
, sec
, link_info
, &is_relaxable
))
6763 /* Bail out if there are no relaxable sections. */
6767 /* Allocate space for source_relocs. */
6768 for (abfd
= link_info
->input_bfds
; abfd
!= NULL
; abfd
= abfd
->link
.next
)
6769 for (sec
= abfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
6771 xtensa_relax_info
*relax_info
;
6773 relax_info
= get_xtensa_relax_info (sec
);
6774 if (relax_info
->is_relaxable_literal_section
6775 || relax_info
->is_relaxable_asm_section
)
6777 relax_info
->src_relocs
= (source_reloc
*)
6778 bfd_malloc (relax_info
->src_count
* sizeof (source_reloc
));
6781 relax_info
->src_count
= 0;
6784 /* Collect info on relocations against each relaxable section. */
6785 for (abfd
= link_info
->input_bfds
; abfd
!= NULL
; abfd
= abfd
->link
.next
)
6786 for (sec
= abfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
6788 if (!collect_source_relocs (abfd
, sec
, link_info
))
6792 /* Compute the text actions. */
6793 for (abfd
= link_info
->input_bfds
; abfd
!= NULL
; abfd
= abfd
->link
.next
)
6794 for (sec
= abfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
6796 if (!compute_text_actions (abfd
, sec
, link_info
))
6804 /* Find all the sections that might be relaxed. The motivation for
6805 this pass is that collect_source_relocs() needs to record _all_ the
6806 relocations that target each relaxable section. That is expensive
6807 and unnecessary unless the target section is actually going to be
6808 relaxed. This pass identifies all such sections by checking if
6809 they have L32Rs pointing to them. In the process, the total number
6810 of relocations targeting each section is also counted so that we
6811 know how much space to allocate for source_relocs against each
6812 relaxable literal section. */
6815 find_relaxable_sections (bfd
*abfd
,
6817 struct bfd_link_info
*link_info
,
6818 bfd_boolean
*is_relaxable_p
)
6820 Elf_Internal_Rela
*internal_relocs
;
6822 bfd_boolean ok
= TRUE
;
6824 xtensa_relax_info
*source_relax_info
;
6825 bfd_boolean is_l32r_reloc
;
6827 internal_relocs
= retrieve_internal_relocs (abfd
, sec
,
6828 link_info
->keep_memory
);
6829 if (internal_relocs
== NULL
)
6832 contents
= retrieve_contents (abfd
, sec
, link_info
->keep_memory
);
6833 if (contents
== NULL
&& sec
->size
!= 0)
6839 source_relax_info
= get_xtensa_relax_info (sec
);
6840 for (i
= 0; i
< sec
->reloc_count
; i
++)
6842 Elf_Internal_Rela
*irel
= &internal_relocs
[i
];
6844 asection
*target_sec
;
6845 xtensa_relax_info
*target_relax_info
;
6847 /* If this section has not already been marked as "relaxable", and
6848 if it contains any ASM_EXPAND relocations (marking expanded
6849 longcalls) that can be optimized into direct calls, then mark
6850 the section as "relaxable". */
6851 if (source_relax_info
6852 && !source_relax_info
->is_relaxable_asm_section
6853 && ELF32_R_TYPE (irel
->r_info
) == R_XTENSA_ASM_EXPAND
)
6855 bfd_boolean is_reachable
= FALSE
;
6856 if (is_resolvable_asm_expansion (abfd
, sec
, contents
, irel
,
6857 link_info
, &is_reachable
)
6860 source_relax_info
->is_relaxable_asm_section
= TRUE
;
6861 *is_relaxable_p
= TRUE
;
6865 r_reloc_init (&r_rel
, abfd
, irel
, contents
,
6866 bfd_get_section_limit (abfd
, sec
));
6868 target_sec
= r_reloc_get_section (&r_rel
);
6869 target_relax_info
= get_xtensa_relax_info (target_sec
);
6870 if (!target_relax_info
)
6873 /* Count PC-relative operand relocations against the target section.
6874 Note: The conditions tested here must match the conditions under
6875 which init_source_reloc is called in collect_source_relocs(). */
6876 is_l32r_reloc
= FALSE
;
6877 if (is_operand_relocation (ELF32_R_TYPE (irel
->r_info
)))
6879 xtensa_opcode opcode
=
6880 get_relocation_opcode (abfd
, sec
, contents
, irel
);
6881 if (opcode
!= XTENSA_UNDEFINED
)
6883 is_l32r_reloc
= (opcode
== get_l32r_opcode ());
6884 if (!is_alt_relocation (ELF32_R_TYPE (irel
->r_info
))
6886 target_relax_info
->src_count
++;
6890 if (is_l32r_reloc
&& r_reloc_is_defined (&r_rel
))
6892 /* Mark the target section as relaxable. */
6893 target_relax_info
->is_relaxable_literal_section
= TRUE
;
6894 *is_relaxable_p
= TRUE
;
6899 release_contents (sec
, contents
);
6900 release_internal_relocs (sec
, internal_relocs
);
6905 /* Record _all_ the relocations that point to relaxable sections, and
6906 get rid of ASM_EXPAND relocs by either converting them to
6907 ASM_SIMPLIFY or by removing them. */
6910 collect_source_relocs (bfd
*abfd
,
6912 struct bfd_link_info
*link_info
)
6914 Elf_Internal_Rela
*internal_relocs
;
6916 bfd_boolean ok
= TRUE
;
6918 bfd_size_type sec_size
;
6920 internal_relocs
= retrieve_internal_relocs (abfd
, sec
,
6921 link_info
->keep_memory
);
6922 if (internal_relocs
== NULL
)
6925 sec_size
= bfd_get_section_limit (abfd
, sec
);
6926 contents
= retrieve_contents (abfd
, sec
, link_info
->keep_memory
);
6927 if (contents
== NULL
&& sec_size
!= 0)
6933 /* Record relocations against relaxable literal sections. */
6934 for (i
= 0; i
< sec
->reloc_count
; i
++)
6936 Elf_Internal_Rela
*irel
= &internal_relocs
[i
];
6938 asection
*target_sec
;
6939 xtensa_relax_info
*target_relax_info
;
6941 r_reloc_init (&r_rel
, abfd
, irel
, contents
, sec_size
);
6943 target_sec
= r_reloc_get_section (&r_rel
);
6944 target_relax_info
= get_xtensa_relax_info (target_sec
);
6946 if (target_relax_info
6947 && (target_relax_info
->is_relaxable_literal_section
6948 || target_relax_info
->is_relaxable_asm_section
))
6950 xtensa_opcode opcode
= XTENSA_UNDEFINED
;
6952 bfd_boolean is_abs_literal
= FALSE
;
6954 if (is_alt_relocation (ELF32_R_TYPE (irel
->r_info
)))
6956 /* None of the current alternate relocs are PC-relative,
6957 and only PC-relative relocs matter here. However, we
6958 still need to record the opcode for literal
6960 opcode
= get_relocation_opcode (abfd
, sec
, contents
, irel
);
6961 if (opcode
== get_l32r_opcode ())
6963 is_abs_literal
= TRUE
;
6967 opcode
= XTENSA_UNDEFINED
;
6969 else if (is_operand_relocation (ELF32_R_TYPE (irel
->r_info
)))
6971 opcode
= get_relocation_opcode (abfd
, sec
, contents
, irel
);
6972 opnd
= get_relocation_opnd (opcode
, ELF32_R_TYPE (irel
->r_info
));
6975 if (opcode
!= XTENSA_UNDEFINED
)
6977 int src_next
= target_relax_info
->src_next
++;
6978 source_reloc
*s_reloc
= &target_relax_info
->src_relocs
[src_next
];
6980 init_source_reloc (s_reloc
, sec
, &r_rel
, opcode
, opnd
,
6986 /* Now get rid of ASM_EXPAND relocations. At this point, the
6987 src_relocs array for the target literal section may still be
6988 incomplete, but it must at least contain the entries for the L32R
6989 relocations associated with ASM_EXPANDs because they were just
6990 added in the preceding loop over the relocations. */
6992 for (i
= 0; i
< sec
->reloc_count
; i
++)
6994 Elf_Internal_Rela
*irel
= &internal_relocs
[i
];
6995 bfd_boolean is_reachable
;
6997 if (!is_resolvable_asm_expansion (abfd
, sec
, contents
, irel
, link_info
,
7003 Elf_Internal_Rela
*l32r_irel
;
7005 asection
*target_sec
;
7006 xtensa_relax_info
*target_relax_info
;
7008 /* Mark the source_reloc for the L32R so that it will be
7009 removed in compute_removed_literals(), along with the
7010 associated literal. */
7011 l32r_irel
= find_associated_l32r_irel (abfd
, sec
, contents
,
7012 irel
, internal_relocs
);
7013 if (l32r_irel
== NULL
)
7016 r_reloc_init (&r_rel
, abfd
, l32r_irel
, contents
, sec_size
);
7018 target_sec
= r_reloc_get_section (&r_rel
);
7019 target_relax_info
= get_xtensa_relax_info (target_sec
);
7021 if (target_relax_info
7022 && (target_relax_info
->is_relaxable_literal_section
7023 || target_relax_info
->is_relaxable_asm_section
))
7025 source_reloc
*s_reloc
;
7027 /* Search the source_relocs for the entry corresponding to
7028 the l32r_irel. Note: The src_relocs array is not yet
7029 sorted, but it wouldn't matter anyway because we're
7030 searching by source offset instead of target offset. */
7031 s_reloc
= find_source_reloc (target_relax_info
->src_relocs
,
7032 target_relax_info
->src_next
,
7034 BFD_ASSERT (s_reloc
);
7035 s_reloc
->is_null
= TRUE
;
7038 /* Convert this reloc to ASM_SIMPLIFY. */
7039 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
7040 R_XTENSA_ASM_SIMPLIFY
);
7041 l32r_irel
->r_info
= ELF32_R_INFO (0, R_XTENSA_NONE
);
7043 pin_internal_relocs (sec
, internal_relocs
);
7047 /* It is resolvable but doesn't reach. We resolve now
7048 by eliminating the relocation -- the call will remain
7049 expanded into L32R/CALLX. */
7050 irel
->r_info
= ELF32_R_INFO (0, R_XTENSA_NONE
);
7051 pin_internal_relocs (sec
, internal_relocs
);
7056 release_contents (sec
, contents
);
7057 release_internal_relocs (sec
, internal_relocs
);
7062 /* Return TRUE if the asm expansion can be resolved. Generally it can
7063 be resolved on a final link or when a partial link locates it in the
7064 same section as the target. Set "is_reachable" flag if the target of
7065 the call is within the range of a direct call, given the current VMA
7066 for this section and the target section. */
7069 is_resolvable_asm_expansion (bfd
*abfd
,
7072 Elf_Internal_Rela
*irel
,
7073 struct bfd_link_info
*link_info
,
7074 bfd_boolean
*is_reachable_p
)
7076 asection
*target_sec
;
7077 bfd_vma target_offset
;
7079 xtensa_opcode opcode
, direct_call_opcode
;
7080 bfd_vma self_address
;
7081 bfd_vma dest_address
;
7082 bfd_boolean uses_l32r
;
7083 bfd_size_type sec_size
;
7085 *is_reachable_p
= FALSE
;
7087 if (contents
== NULL
)
7090 if (ELF32_R_TYPE (irel
->r_info
) != R_XTENSA_ASM_EXPAND
)
7093 sec_size
= bfd_get_section_limit (abfd
, sec
);
7094 opcode
= get_expanded_call_opcode (contents
+ irel
->r_offset
,
7095 sec_size
- irel
->r_offset
, &uses_l32r
);
7096 /* Optimization of longcalls that use CONST16 is not yet implemented. */
7100 direct_call_opcode
= swap_callx_for_call_opcode (opcode
);
7101 if (direct_call_opcode
== XTENSA_UNDEFINED
)
7104 /* Check and see that the target resolves. */
7105 r_reloc_init (&r_rel
, abfd
, irel
, contents
, sec_size
);
7106 if (!r_reloc_is_defined (&r_rel
))
7109 target_sec
= r_reloc_get_section (&r_rel
);
7110 target_offset
= r_rel
.target_offset
;
7112 /* If the target is in a shared library, then it doesn't reach. This
7113 isn't supposed to come up because the compiler should never generate
7114 non-PIC calls on systems that use shared libraries, but the linker
7115 shouldn't crash regardless. */
7116 if (!target_sec
->output_section
)
7119 /* For relocatable sections, we can only simplify when the output
7120 section of the target is the same as the output section of the
7122 if (link_info
->relocatable
7123 && (target_sec
->output_section
!= sec
->output_section
7124 || is_reloc_sym_weak (abfd
, irel
)))
7127 self_address
= (sec
->output_section
->vma
7128 + sec
->output_offset
+ irel
->r_offset
+ 3);
7129 dest_address
= (target_sec
->output_section
->vma
7130 + target_sec
->output_offset
+ target_offset
);
7132 *is_reachable_p
= pcrel_reloc_fits (direct_call_opcode
, 0,
7133 self_address
, dest_address
);
7135 if ((self_address
>> CALL_SEGMENT_BITS
) !=
7136 (dest_address
>> CALL_SEGMENT_BITS
))
7143 static Elf_Internal_Rela
*
7144 find_associated_l32r_irel (bfd
*abfd
,
7147 Elf_Internal_Rela
*other_irel
,
7148 Elf_Internal_Rela
*internal_relocs
)
7152 for (i
= 0; i
< sec
->reloc_count
; i
++)
7154 Elf_Internal_Rela
*irel
= &internal_relocs
[i
];
7156 if (irel
== other_irel
)
7158 if (irel
->r_offset
!= other_irel
->r_offset
)
7160 if (is_l32r_relocation (abfd
, sec
, contents
, irel
))
7168 static xtensa_opcode
*
7169 build_reloc_opcodes (bfd
*abfd
,
7172 Elf_Internal_Rela
*internal_relocs
)
7175 xtensa_opcode
*reloc_opcodes
=
7176 (xtensa_opcode
*) bfd_malloc (sizeof (xtensa_opcode
) * sec
->reloc_count
);
7177 for (i
= 0; i
< sec
->reloc_count
; i
++)
7179 Elf_Internal_Rela
*irel
= &internal_relocs
[i
];
7180 reloc_opcodes
[i
] = get_relocation_opcode (abfd
, sec
, contents
, irel
);
7182 return reloc_opcodes
;
7186 /* The compute_text_actions function will build a list of potential
7187 transformation actions for code in the extended basic block of each
7188 longcall that is optimized to a direct call. From this list we
7189 generate a set of actions to actually perform that optimizes for
7190 space and, if not using size_opt, maintains branch target
7193 These actions to be performed are placed on a per-section list.
7194 The actual changes are performed by relax_section() in the second
7198 compute_text_actions (bfd
*abfd
,
7200 struct bfd_link_info
*link_info
)
7202 xtensa_opcode
*reloc_opcodes
= NULL
;
7203 xtensa_relax_info
*relax_info
;
7205 Elf_Internal_Rela
*internal_relocs
;
7206 bfd_boolean ok
= TRUE
;
7208 property_table_entry
*prop_table
= 0;
7210 bfd_size_type sec_size
;
7212 relax_info
= get_xtensa_relax_info (sec
);
7213 BFD_ASSERT (relax_info
);
7214 BFD_ASSERT (relax_info
->src_next
== relax_info
->src_count
);
7216 /* Do nothing if the section contains no optimized longcalls. */
7217 if (!relax_info
->is_relaxable_asm_section
)
7220 internal_relocs
= retrieve_internal_relocs (abfd
, sec
,
7221 link_info
->keep_memory
);
7223 if (internal_relocs
)
7224 qsort (internal_relocs
, sec
->reloc_count
, sizeof (Elf_Internal_Rela
),
7225 internal_reloc_compare
);
7227 sec_size
= bfd_get_section_limit (abfd
, sec
);
7228 contents
= retrieve_contents (abfd
, sec
, link_info
->keep_memory
);
7229 if (contents
== NULL
&& sec_size
!= 0)
7235 ptblsize
= xtensa_read_table_entries (abfd
, sec
, &prop_table
,
7236 XTENSA_PROP_SEC_NAME
, FALSE
);
7243 for (i
= 0; i
< sec
->reloc_count
; i
++)
7245 Elf_Internal_Rela
*irel
= &internal_relocs
[i
];
7247 property_table_entry
*the_entry
;
7250 ebb_constraint ebb_table
;
7251 bfd_size_type simplify_size
;
7253 if (irel
&& ELF32_R_TYPE (irel
->r_info
) != R_XTENSA_ASM_SIMPLIFY
)
7255 r_offset
= irel
->r_offset
;
7257 simplify_size
= get_asm_simplify_size (contents
, sec_size
, r_offset
);
7258 if (simplify_size
== 0)
7260 (*_bfd_error_handler
)
7261 (_("%B(%A+0x%lx): could not decode instruction for XTENSA_ASM_SIMPLIFY relocation; possible configuration mismatch"),
7262 sec
->owner
, sec
, r_offset
);
7266 /* If the instruction table is not around, then don't do this
7268 the_entry
= elf_xtensa_find_property_entry (prop_table
, ptblsize
,
7269 sec
->vma
+ irel
->r_offset
);
7270 if (the_entry
== NULL
|| XTENSA_NO_NOP_REMOVAL
)
7272 text_action_add (&relax_info
->action_list
,
7273 ta_convert_longcall
, sec
, r_offset
,
7278 /* If the next longcall happens to be at the same address as an
7279 unreachable section of size 0, then skip forward. */
7280 ptbl_idx
= the_entry
- prop_table
;
7281 while ((the_entry
->flags
& XTENSA_PROP_UNREACHABLE
)
7282 && the_entry
->size
== 0
7283 && ptbl_idx
+ 1 < ptblsize
7284 && (prop_table
[ptbl_idx
+ 1].address
7285 == prop_table
[ptbl_idx
].address
))
7291 if (the_entry
->flags
& XTENSA_PROP_NO_TRANSFORM
)
7292 /* NO_REORDER is OK */
7295 init_ebb_constraint (&ebb_table
);
7296 ebb
= &ebb_table
.ebb
;
7297 init_ebb (ebb
, sec
, contents
, sec_size
, prop_table
, ptblsize
,
7298 internal_relocs
, sec
->reloc_count
);
7299 ebb
->start_offset
= r_offset
+ simplify_size
;
7300 ebb
->end_offset
= r_offset
+ simplify_size
;
7301 ebb
->start_ptbl_idx
= ptbl_idx
;
7302 ebb
->end_ptbl_idx
= ptbl_idx
;
7303 ebb
->start_reloc_idx
= i
;
7304 ebb
->end_reloc_idx
= i
;
7306 /* Precompute the opcode for each relocation. */
7307 if (reloc_opcodes
== NULL
)
7308 reloc_opcodes
= build_reloc_opcodes (abfd
, sec
, contents
,
7311 if (!extend_ebb_bounds (ebb
)
7312 || !compute_ebb_proposed_actions (&ebb_table
)
7313 || !compute_ebb_actions (&ebb_table
)
7314 || !check_section_ebb_pcrels_fit (abfd
, sec
, contents
,
7315 internal_relocs
, &ebb_table
,
7317 || !check_section_ebb_reduces (&ebb_table
))
7319 /* If anything goes wrong or we get unlucky and something does
7320 not fit, with our plan because of expansion between
7321 critical branches, just convert to a NOP. */
7323 text_action_add (&relax_info
->action_list
,
7324 ta_convert_longcall
, sec
, r_offset
, 0);
7325 i
= ebb_table
.ebb
.end_reloc_idx
;
7326 free_ebb_constraint (&ebb_table
);
7330 text_action_add_proposed (&relax_info
->action_list
, &ebb_table
, sec
);
7332 /* Update the index so we do not go looking at the relocations
7333 we have already processed. */
7334 i
= ebb_table
.ebb
.end_reloc_idx
;
7335 free_ebb_constraint (&ebb_table
);
7339 if (relax_info
->action_list
.head
)
7340 print_action_list (stderr
, &relax_info
->action_list
);
7344 release_contents (sec
, contents
);
7345 release_internal_relocs (sec
, internal_relocs
);
7349 free (reloc_opcodes
);
7355 /* Do not widen an instruction if it is preceeded by a
7356 loop opcode. It might cause misalignment. */
7359 prev_instr_is_a_loop (bfd_byte
*contents
,
7360 bfd_size_type content_length
,
7361 bfd_size_type offset
)
7363 xtensa_opcode prev_opcode
;
7367 prev_opcode
= insn_decode_opcode (contents
, content_length
, offset
-3, 0);
7368 return (xtensa_opcode_is_loop (xtensa_default_isa
, prev_opcode
) == 1);
7372 /* Find all of the possible actions for an extended basic block. */
7375 compute_ebb_proposed_actions (ebb_constraint
*ebb_table
)
7377 const ebb_t
*ebb
= &ebb_table
->ebb
;
7378 unsigned rel_idx
= ebb
->start_reloc_idx
;
7379 property_table_entry
*entry
, *start_entry
, *end_entry
;
7381 xtensa_isa isa
= xtensa_default_isa
;
7383 static xtensa_insnbuf insnbuf
= NULL
;
7384 static xtensa_insnbuf slotbuf
= NULL
;
7386 if (insnbuf
== NULL
)
7388 insnbuf
= xtensa_insnbuf_alloc (isa
);
7389 slotbuf
= xtensa_insnbuf_alloc (isa
);
7392 start_entry
= &ebb
->ptbl
[ebb
->start_ptbl_idx
];
7393 end_entry
= &ebb
->ptbl
[ebb
->end_ptbl_idx
];
7395 for (entry
= start_entry
; entry
<= end_entry
; entry
++)
7397 bfd_vma start_offset
, end_offset
;
7398 bfd_size_type insn_len
;
7400 start_offset
= entry
->address
- ebb
->sec
->vma
;
7401 end_offset
= entry
->address
+ entry
->size
- ebb
->sec
->vma
;
7403 if (entry
== start_entry
)
7404 start_offset
= ebb
->start_offset
;
7405 if (entry
== end_entry
)
7406 end_offset
= ebb
->end_offset
;
7407 offset
= start_offset
;
7409 if (offset
== entry
->address
- ebb
->sec
->vma
7410 && (entry
->flags
& XTENSA_PROP_INSN_BRANCH_TARGET
) != 0)
7412 enum ebb_target_enum align_type
= EBB_DESIRE_TGT_ALIGN
;
7413 BFD_ASSERT (offset
!= end_offset
);
7414 if (offset
== end_offset
)
7417 insn_len
= insn_decode_len (ebb
->contents
, ebb
->content_length
,
7422 if (check_branch_target_aligned_address (offset
, insn_len
))
7423 align_type
= EBB_REQUIRE_TGT_ALIGN
;
7425 ebb_propose_action (ebb_table
, align_type
, 0,
7426 ta_none
, offset
, 0, TRUE
);
7429 while (offset
!= end_offset
)
7431 Elf_Internal_Rela
*irel
;
7432 xtensa_opcode opcode
;
7434 while (rel_idx
< ebb
->end_reloc_idx
7435 && (ebb
->relocs
[rel_idx
].r_offset
< offset
7436 || (ebb
->relocs
[rel_idx
].r_offset
== offset
7437 && (ELF32_R_TYPE (ebb
->relocs
[rel_idx
].r_info
)
7438 != R_XTENSA_ASM_SIMPLIFY
))))
7441 /* Check for longcall. */
7442 irel
= &ebb
->relocs
[rel_idx
];
7443 if (irel
->r_offset
== offset
7444 && ELF32_R_TYPE (irel
->r_info
) == R_XTENSA_ASM_SIMPLIFY
)
7446 bfd_size_type simplify_size
;
7448 simplify_size
= get_asm_simplify_size (ebb
->contents
,
7449 ebb
->content_length
,
7451 if (simplify_size
== 0)
7454 ebb_propose_action (ebb_table
, EBB_NO_ALIGN
, 0,
7455 ta_convert_longcall
, offset
, 0, TRUE
);
7457 offset
+= simplify_size
;
7461 if (offset
+ MIN_INSN_LENGTH
> ebb
->content_length
)
7463 xtensa_insnbuf_from_chars (isa
, insnbuf
, &ebb
->contents
[offset
],
7464 ebb
->content_length
- offset
);
7465 fmt
= xtensa_format_decode (isa
, insnbuf
);
7466 if (fmt
== XTENSA_UNDEFINED
)
7468 insn_len
= xtensa_format_length (isa
, fmt
);
7469 if (insn_len
== (bfd_size_type
) XTENSA_UNDEFINED
)
7472 if (xtensa_format_num_slots (isa
, fmt
) != 1)
7478 xtensa_format_get_slot (isa
, fmt
, 0, insnbuf
, slotbuf
);
7479 opcode
= xtensa_opcode_decode (isa
, fmt
, 0, slotbuf
);
7480 if (opcode
== XTENSA_UNDEFINED
)
7483 if ((entry
->flags
& XTENSA_PROP_INSN_NO_DENSITY
) == 0
7484 && (entry
->flags
& XTENSA_PROP_NO_TRANSFORM
) == 0
7485 && can_narrow_instruction (slotbuf
, fmt
, opcode
) != 0)
7487 /* Add an instruction narrow action. */
7488 ebb_propose_action (ebb_table
, EBB_NO_ALIGN
, 0,
7489 ta_narrow_insn
, offset
, 0, FALSE
);
7491 else if ((entry
->flags
& XTENSA_PROP_NO_TRANSFORM
) == 0
7492 && can_widen_instruction (slotbuf
, fmt
, opcode
) != 0
7493 && ! prev_instr_is_a_loop (ebb
->contents
,
7494 ebb
->content_length
, offset
))
7496 /* Add an instruction widen action. */
7497 ebb_propose_action (ebb_table
, EBB_NO_ALIGN
, 0,
7498 ta_widen_insn
, offset
, 0, FALSE
);
7500 else if (xtensa_opcode_is_loop (xtensa_default_isa
, opcode
) == 1)
7502 /* Check for branch targets. */
7503 ebb_propose_action (ebb_table
, EBB_REQUIRE_LOOP_ALIGN
, 0,
7504 ta_none
, offset
, 0, TRUE
);
7511 if (ebb
->ends_unreachable
)
7513 ebb_propose_action (ebb_table
, EBB_NO_ALIGN
, 0,
7514 ta_fill
, ebb
->end_offset
, 0, TRUE
);
7520 (*_bfd_error_handler
)
7521 (_("%B(%A+0x%lx): could not decode instruction; possible configuration mismatch"),
7522 ebb
->sec
->owner
, ebb
->sec
, offset
);
7527 /* After all of the information has collected about the
7528 transformations possible in an EBB, compute the appropriate actions
7529 here in compute_ebb_actions. We still must check later to make
7530 sure that the actions do not break any relocations. The algorithm
7531 used here is pretty greedy. Basically, it removes as many no-ops
7532 as possible so that the end of the EBB has the same alignment
7533 characteristics as the original. First, it uses narrowing, then
7534 fill space at the end of the EBB, and finally widenings. If that
7535 does not work, it tries again with one fewer no-op removed. The
7536 optimization will only be performed if all of the branch targets
7537 that were aligned before transformation are also aligned after the
7540 When the size_opt flag is set, ignore the branch target alignments,
7541 narrow all wide instructions, and remove all no-ops unless the end
7542 of the EBB prevents it. */
7545 compute_ebb_actions (ebb_constraint
*ebb_table
)
7549 int removed_bytes
= 0;
7550 ebb_t
*ebb
= &ebb_table
->ebb
;
7551 unsigned seg_idx_start
= 0;
7552 unsigned seg_idx_end
= 0;
7554 /* We perform this like the assembler relaxation algorithm: Start by
7555 assuming all instructions are narrow and all no-ops removed; then
7558 /* For each segment of this that has a solid constraint, check to
7559 see if there are any combinations that will keep the constraint.
7561 for (seg_idx_end
= 0; seg_idx_end
< ebb_table
->action_count
; seg_idx_end
++)
7563 bfd_boolean requires_text_end_align
= FALSE
;
7564 unsigned longcall_count
= 0;
7565 unsigned longcall_convert_count
= 0;
7566 unsigned narrowable_count
= 0;
7567 unsigned narrowable_convert_count
= 0;
7568 unsigned widenable_count
= 0;
7569 unsigned widenable_convert_count
= 0;
7571 proposed_action
*action
= NULL
;
7572 int align
= (1 << ebb_table
->ebb
.sec
->alignment_power
);
7574 seg_idx_start
= seg_idx_end
;
7576 for (i
= seg_idx_start
; i
< ebb_table
->action_count
; i
++)
7578 action
= &ebb_table
->actions
[i
];
7579 if (action
->action
== ta_convert_longcall
)
7581 if (action
->action
== ta_narrow_insn
)
7583 if (action
->action
== ta_widen_insn
)
7585 if (action
->action
== ta_fill
)
7587 if (action
->align_type
== EBB_REQUIRE_LOOP_ALIGN
)
7589 if (action
->align_type
== EBB_REQUIRE_TGT_ALIGN
7590 && !elf32xtensa_size_opt
)
7595 if (seg_idx_end
== ebb_table
->action_count
&& !ebb
->ends_unreachable
)
7596 requires_text_end_align
= TRUE
;
7598 if (elf32xtensa_size_opt
&& !requires_text_end_align
7599 && action
->align_type
!= EBB_REQUIRE_LOOP_ALIGN
7600 && action
->align_type
!= EBB_REQUIRE_TGT_ALIGN
)
7602 longcall_convert_count
= longcall_count
;
7603 narrowable_convert_count
= narrowable_count
;
7604 widenable_convert_count
= 0;
7608 /* There is a constraint. Convert the max number of longcalls. */
7609 narrowable_convert_count
= 0;
7610 longcall_convert_count
= 0;
7611 widenable_convert_count
= 0;
7613 for (j
= 0; j
< longcall_count
; j
++)
7615 int removed
= (longcall_count
- j
) * 3 & (align
- 1);
7616 unsigned desire_narrow
= (align
- removed
) & (align
- 1);
7617 unsigned desire_widen
= removed
;
7618 if (desire_narrow
<= narrowable_count
)
7620 narrowable_convert_count
= desire_narrow
;
7621 narrowable_convert_count
+=
7622 (align
* ((narrowable_count
- narrowable_convert_count
)
7624 longcall_convert_count
= (longcall_count
- j
);
7625 widenable_convert_count
= 0;
7628 if (desire_widen
<= widenable_count
&& !elf32xtensa_size_opt
)
7630 narrowable_convert_count
= 0;
7631 longcall_convert_count
= longcall_count
- j
;
7632 widenable_convert_count
= desire_widen
;
7638 /* Now the number of conversions are saved. Do them. */
7639 for (i
= seg_idx_start
; i
< seg_idx_end
; i
++)
7641 action
= &ebb_table
->actions
[i
];
7642 switch (action
->action
)
7644 case ta_convert_longcall
:
7645 if (longcall_convert_count
!= 0)
7647 action
->action
= ta_remove_longcall
;
7648 action
->do_action
= TRUE
;
7649 action
->removed_bytes
+= 3;
7650 longcall_convert_count
--;
7653 case ta_narrow_insn
:
7654 if (narrowable_convert_count
!= 0)
7656 action
->do_action
= TRUE
;
7657 action
->removed_bytes
+= 1;
7658 narrowable_convert_count
--;
7662 if (widenable_convert_count
!= 0)
7664 action
->do_action
= TRUE
;
7665 action
->removed_bytes
-= 1;
7666 widenable_convert_count
--;
7675 /* Now we move on to some local opts. Try to remove each of the
7676 remaining longcalls. */
7678 if (ebb_table
->ebb
.ends_section
|| ebb_table
->ebb
.ends_unreachable
)
7681 for (i
= 0; i
< ebb_table
->action_count
; i
++)
7683 int old_removed_bytes
= removed_bytes
;
7684 proposed_action
*action
= &ebb_table
->actions
[i
];
7686 if (action
->do_action
&& action
->action
== ta_convert_longcall
)
7688 bfd_boolean bad_alignment
= FALSE
;
7690 for (j
= i
+ 1; j
< ebb_table
->action_count
; j
++)
7692 proposed_action
*new_action
= &ebb_table
->actions
[j
];
7693 bfd_vma offset
= new_action
->offset
;
7694 if (new_action
->align_type
== EBB_REQUIRE_TGT_ALIGN
)
7696 if (!check_branch_target_aligned
7697 (ebb_table
->ebb
.contents
,
7698 ebb_table
->ebb
.content_length
,
7699 offset
, offset
- removed_bytes
))
7701 bad_alignment
= TRUE
;
7705 if (new_action
->align_type
== EBB_REQUIRE_LOOP_ALIGN
)
7707 if (!check_loop_aligned (ebb_table
->ebb
.contents
,
7708 ebb_table
->ebb
.content_length
,
7710 offset
- removed_bytes
))
7712 bad_alignment
= TRUE
;
7716 if (new_action
->action
== ta_narrow_insn
7717 && !new_action
->do_action
7718 && ebb_table
->ebb
.sec
->alignment_power
== 2)
7720 /* Narrow an instruction and we are done. */
7721 new_action
->do_action
= TRUE
;
7722 new_action
->removed_bytes
+= 1;
7723 bad_alignment
= FALSE
;
7726 if (new_action
->action
== ta_widen_insn
7727 && new_action
->do_action
7728 && ebb_table
->ebb
.sec
->alignment_power
== 2)
7730 /* Narrow an instruction and we are done. */
7731 new_action
->do_action
= FALSE
;
7732 new_action
->removed_bytes
+= 1;
7733 bad_alignment
= FALSE
;
7736 if (new_action
->do_action
)
7737 removed_bytes
+= new_action
->removed_bytes
;
7741 action
->removed_bytes
+= 3;
7742 action
->action
= ta_remove_longcall
;
7743 action
->do_action
= TRUE
;
7746 removed_bytes
= old_removed_bytes
;
7747 if (action
->do_action
)
7748 removed_bytes
+= action
->removed_bytes
;
7753 for (i
= 0; i
< ebb_table
->action_count
; ++i
)
7755 proposed_action
*action
= &ebb_table
->actions
[i
];
7756 if (action
->do_action
)
7757 removed_bytes
+= action
->removed_bytes
;
7760 if ((removed_bytes
% (1 << ebb_table
->ebb
.sec
->alignment_power
)) != 0
7761 && ebb
->ends_unreachable
)
7763 proposed_action
*action
;
7767 BFD_ASSERT (ebb_table
->action_count
!= 0);
7768 action
= &ebb_table
->actions
[ebb_table
->action_count
- 1];
7769 BFD_ASSERT (action
->action
== ta_fill
);
7770 BFD_ASSERT (ebb
->ends_unreachable
->flags
& XTENSA_PROP_UNREACHABLE
);
7772 extra_space
= compute_fill_extra_space (ebb
->ends_unreachable
);
7773 br
= action
->removed_bytes
+ removed_bytes
+ extra_space
;
7774 br
= br
& ((1 << ebb
->sec
->alignment_power
) - 1);
7776 action
->removed_bytes
= extra_space
- br
;
7782 /* The xlate_map is a sorted array of address mappings designed to
7783 answer the offset_with_removed_text() query with a binary search instead
7784 of a linear search through the section's action_list. */
7786 typedef struct xlate_map_entry xlate_map_entry_t
;
7787 typedef struct xlate_map xlate_map_t
;
7789 struct xlate_map_entry
7791 unsigned orig_address
;
7792 unsigned new_address
;
7798 unsigned entry_count
;
7799 xlate_map_entry_t
*entry
;
7804 xlate_compare (const void *a_v
, const void *b_v
)
7806 const xlate_map_entry_t
*a
= (const xlate_map_entry_t
*) a_v
;
7807 const xlate_map_entry_t
*b
= (const xlate_map_entry_t
*) b_v
;
7808 if (a
->orig_address
< b
->orig_address
)
7810 if (a
->orig_address
> (b
->orig_address
+ b
->size
- 1))
7817 xlate_offset_with_removed_text (const xlate_map_t
*map
,
7818 text_action_list
*action_list
,
7822 xlate_map_entry_t
*e
;
7825 return offset_with_removed_text (action_list
, offset
);
7827 if (map
->entry_count
== 0)
7830 r
= bsearch (&offset
, map
->entry
, map
->entry_count
,
7831 sizeof (xlate_map_entry_t
), &xlate_compare
);
7832 e
= (xlate_map_entry_t
*) r
;
7834 BFD_ASSERT (e
!= NULL
);
7837 return e
->new_address
- e
->orig_address
+ offset
;
7841 /* Build a binary searchable offset translation map from a section's
7844 static xlate_map_t
*
7845 build_xlate_map (asection
*sec
, xtensa_relax_info
*relax_info
)
7847 xlate_map_t
*map
= (xlate_map_t
*) bfd_malloc (sizeof (xlate_map_t
));
7848 text_action_list
*action_list
= &relax_info
->action_list
;
7849 unsigned num_actions
= 0;
7852 xlate_map_entry_t
*current_entry
;
7857 num_actions
= action_list_count (action_list
);
7858 map
->entry
= (xlate_map_entry_t
*)
7859 bfd_malloc (sizeof (xlate_map_entry_t
) * (num_actions
+ 1));
7860 if (map
->entry
== NULL
)
7865 map
->entry_count
= 0;
7868 current_entry
= &map
->entry
[0];
7870 current_entry
->orig_address
= 0;
7871 current_entry
->new_address
= 0;
7872 current_entry
->size
= 0;
7874 for (r
= action_list
->head
; r
!= NULL
; r
= r
->next
)
7876 unsigned orig_size
= 0;
7880 case ta_remove_insn
:
7881 case ta_convert_longcall
:
7882 case ta_remove_literal
:
7883 case ta_add_literal
:
7885 case ta_remove_longcall
:
7888 case ta_narrow_insn
:
7897 current_entry
->size
=
7898 r
->offset
+ orig_size
- current_entry
->orig_address
;
7899 if (current_entry
->size
!= 0)
7904 current_entry
->orig_address
= r
->offset
+ orig_size
;
7905 removed
+= r
->removed_bytes
;
7906 current_entry
->new_address
= r
->offset
+ orig_size
- removed
;
7907 current_entry
->size
= 0;
7910 current_entry
->size
= (bfd_get_section_limit (sec
->owner
, sec
)
7911 - current_entry
->orig_address
);
7912 if (current_entry
->size
!= 0)
7919 /* Free an offset translation map. */
7922 free_xlate_map (xlate_map_t
*map
)
7924 if (map
&& map
->entry
)
7931 /* Use check_section_ebb_pcrels_fit to make sure that all of the
7932 relocations in a section will fit if a proposed set of actions
7936 check_section_ebb_pcrels_fit (bfd
*abfd
,
7939 Elf_Internal_Rela
*internal_relocs
,
7940 const ebb_constraint
*constraint
,
7941 const xtensa_opcode
*reloc_opcodes
)
7944 Elf_Internal_Rela
*irel
;
7945 xlate_map_t
*xmap
= NULL
;
7946 bfd_boolean ok
= TRUE
;
7947 xtensa_relax_info
*relax_info
;
7949 relax_info
= get_xtensa_relax_info (sec
);
7951 if (relax_info
&& sec
->reloc_count
> 100)
7953 xmap
= build_xlate_map (sec
, relax_info
);
7954 /* NULL indicates out of memory, but the slow version
7955 can still be used. */
7958 for (i
= 0; i
< sec
->reloc_count
; i
++)
7961 bfd_vma orig_self_offset
, orig_target_offset
;
7962 bfd_vma self_offset
, target_offset
;
7964 reloc_howto_type
*howto
;
7965 int self_removed_bytes
, target_removed_bytes
;
7967 irel
= &internal_relocs
[i
];
7968 r_type
= ELF32_R_TYPE (irel
->r_info
);
7970 howto
= &elf_howto_table
[r_type
];
7971 /* We maintain the required invariant: PC-relative relocations
7972 that fit before linking must fit after linking. Thus we only
7973 need to deal with relocations to the same section that are
7975 if (r_type
== R_XTENSA_ASM_SIMPLIFY
7976 || r_type
== R_XTENSA_32_PCREL
7977 || !howto
->pc_relative
)
7980 r_reloc_init (&r_rel
, abfd
, irel
, contents
,
7981 bfd_get_section_limit (abfd
, sec
));
7983 if (r_reloc_get_section (&r_rel
) != sec
)
7986 orig_self_offset
= irel
->r_offset
;
7987 orig_target_offset
= r_rel
.target_offset
;
7989 self_offset
= orig_self_offset
;
7990 target_offset
= orig_target_offset
;
7995 xlate_offset_with_removed_text (xmap
, &relax_info
->action_list
,
7998 xlate_offset_with_removed_text (xmap
, &relax_info
->action_list
,
7999 orig_target_offset
);
8002 self_removed_bytes
= 0;
8003 target_removed_bytes
= 0;
8005 for (j
= 0; j
< constraint
->action_count
; ++j
)
8007 proposed_action
*action
= &constraint
->actions
[j
];
8008 bfd_vma offset
= action
->offset
;
8009 int removed_bytes
= action
->removed_bytes
;
8010 if (offset
< orig_self_offset
8011 || (offset
== orig_self_offset
&& action
->action
== ta_fill
8012 && action
->removed_bytes
< 0))
8013 self_removed_bytes
+= removed_bytes
;
8014 if (offset
< orig_target_offset
8015 || (offset
== orig_target_offset
&& action
->action
== ta_fill
8016 && action
->removed_bytes
< 0))
8017 target_removed_bytes
+= removed_bytes
;
8019 self_offset
-= self_removed_bytes
;
8020 target_offset
-= target_removed_bytes
;
8022 /* Try to encode it. Get the operand and check. */
8023 if (is_alt_relocation (ELF32_R_TYPE (irel
->r_info
)))
8025 /* None of the current alternate relocs are PC-relative,
8026 and only PC-relative relocs matter here. */
8030 xtensa_opcode opcode
;
8034 opcode
= reloc_opcodes
[i
];
8036 opcode
= get_relocation_opcode (abfd
, sec
, contents
, irel
);
8037 if (opcode
== XTENSA_UNDEFINED
)
8043 opnum
= get_relocation_opnd (opcode
, ELF32_R_TYPE (irel
->r_info
));
8044 if (opnum
== XTENSA_UNDEFINED
)
8050 if (!pcrel_reloc_fits (opcode
, opnum
, self_offset
, target_offset
))
8059 free_xlate_map (xmap
);
8066 check_section_ebb_reduces (const ebb_constraint
*constraint
)
8071 for (i
= 0; i
< constraint
->action_count
; i
++)
8073 const proposed_action
*action
= &constraint
->actions
[i
];
8074 if (action
->do_action
)
8075 removed
+= action
->removed_bytes
;
8085 text_action_add_proposed (text_action_list
*l
,
8086 const ebb_constraint
*ebb_table
,
8091 for (i
= 0; i
< ebb_table
->action_count
; i
++)
8093 proposed_action
*action
= &ebb_table
->actions
[i
];
8095 if (!action
->do_action
)
8097 switch (action
->action
)
8099 case ta_remove_insn
:
8100 case ta_remove_longcall
:
8101 case ta_convert_longcall
:
8102 case ta_narrow_insn
:
8105 case ta_remove_literal
:
8106 text_action_add (l
, action
->action
, sec
, action
->offset
,
8107 action
->removed_bytes
);
8120 compute_fill_extra_space (property_table_entry
*entry
)
8122 int fill_extra_space
;
8127 if ((entry
->flags
& XTENSA_PROP_UNREACHABLE
) == 0)
8130 fill_extra_space
= entry
->size
;
8131 if ((entry
->flags
& XTENSA_PROP_ALIGN
) != 0)
8133 /* Fill bytes for alignment:
8134 (2**n)-1 - (addr + (2**n)-1) & (2**n -1) */
8135 int pow
= GET_XTENSA_PROP_ALIGNMENT (entry
->flags
);
8136 int nsm
= (1 << pow
) - 1;
8137 bfd_vma addr
= entry
->address
+ entry
->size
;
8138 bfd_vma align_fill
= nsm
- ((addr
+ nsm
) & nsm
);
8139 fill_extra_space
+= align_fill
;
8141 return fill_extra_space
;
8145 /* First relaxation pass. */
8147 /* If the section contains relaxable literals, check each literal to
8148 see if it has the same value as another literal that has already
8149 been seen, either in the current section or a previous one. If so,
8150 add an entry to the per-section list of removed literals. The
8151 actual changes are deferred until the next pass. */
8154 compute_removed_literals (bfd
*abfd
,
8156 struct bfd_link_info
*link_info
,
8157 value_map_hash_table
*values
)
8159 xtensa_relax_info
*relax_info
;
8161 Elf_Internal_Rela
*internal_relocs
;
8162 source_reloc
*src_relocs
, *rel
;
8163 bfd_boolean ok
= TRUE
;
8164 property_table_entry
*prop_table
= NULL
;
8167 bfd_boolean last_loc_is_prev
= FALSE
;
8168 bfd_vma last_target_offset
= 0;
8169 section_cache_t target_sec_cache
;
8170 bfd_size_type sec_size
;
8172 init_section_cache (&target_sec_cache
);
8174 /* Do nothing if it is not a relaxable literal section. */
8175 relax_info
= get_xtensa_relax_info (sec
);
8176 BFD_ASSERT (relax_info
);
8177 if (!relax_info
->is_relaxable_literal_section
)
8180 internal_relocs
= retrieve_internal_relocs (abfd
, sec
,
8181 link_info
->keep_memory
);
8183 sec_size
= bfd_get_section_limit (abfd
, sec
);
8184 contents
= retrieve_contents (abfd
, sec
, link_info
->keep_memory
);
8185 if (contents
== NULL
&& sec_size
!= 0)
8191 /* Sort the source_relocs by target offset. */
8192 src_relocs
= relax_info
->src_relocs
;
8193 qsort (src_relocs
, relax_info
->src_count
,
8194 sizeof (source_reloc
), source_reloc_compare
);
8195 qsort (internal_relocs
, sec
->reloc_count
, sizeof (Elf_Internal_Rela
),
8196 internal_reloc_compare
);
8198 ptblsize
= xtensa_read_table_entries (abfd
, sec
, &prop_table
,
8199 XTENSA_PROP_SEC_NAME
, FALSE
);
8207 for (i
= 0; i
< relax_info
->src_count
; i
++)
8209 Elf_Internal_Rela
*irel
= NULL
;
8211 rel
= &src_relocs
[i
];
8212 if (get_l32r_opcode () != rel
->opcode
)
8214 irel
= get_irel_at_offset (sec
, internal_relocs
,
8215 rel
->r_rel
.target_offset
);
8217 /* If the relocation on this is not a simple R_XTENSA_32 or
8218 R_XTENSA_PLT then do not consider it. This may happen when
8219 the difference of two symbols is used in a literal. */
8220 if (irel
&& (ELF32_R_TYPE (irel
->r_info
) != R_XTENSA_32
8221 && ELF32_R_TYPE (irel
->r_info
) != R_XTENSA_PLT
))
8224 /* If the target_offset for this relocation is the same as the
8225 previous relocation, then we've already considered whether the
8226 literal can be coalesced. Skip to the next one.... */
8227 if (i
!= 0 && prev_i
!= -1
8228 && src_relocs
[i
-1].r_rel
.target_offset
== rel
->r_rel
.target_offset
)
8232 if (last_loc_is_prev
&&
8233 last_target_offset
+ 4 != rel
->r_rel
.target_offset
)
8234 last_loc_is_prev
= FALSE
;
8236 /* Check if the relocation was from an L32R that is being removed
8237 because a CALLX was converted to a direct CALL, and check if
8238 there are no other relocations to the literal. */
8239 if (is_removable_literal (rel
, i
, src_relocs
, relax_info
->src_count
,
8240 sec
, prop_table
, ptblsize
))
8242 if (!remove_dead_literal (abfd
, sec
, link_info
, internal_relocs
,
8243 irel
, rel
, prop_table
, ptblsize
))
8248 last_target_offset
= rel
->r_rel
.target_offset
;
8252 if (!identify_literal_placement (abfd
, sec
, contents
, link_info
,
8254 &last_loc_is_prev
, irel
,
8255 relax_info
->src_count
- i
, rel
,
8256 prop_table
, ptblsize
,
8257 &target_sec_cache
, rel
->is_abs_literal
))
8262 last_target_offset
= rel
->r_rel
.target_offset
;
8266 print_removed_literals (stderr
, &relax_info
->removed_list
);
8267 print_action_list (stderr
, &relax_info
->action_list
);
8273 free_section_cache (&target_sec_cache
);
8275 release_contents (sec
, contents
);
8276 release_internal_relocs (sec
, internal_relocs
);
8281 static Elf_Internal_Rela
*
8282 get_irel_at_offset (asection
*sec
,
8283 Elf_Internal_Rela
*internal_relocs
,
8287 Elf_Internal_Rela
*irel
;
8289 Elf_Internal_Rela key
;
8291 if (!internal_relocs
)
8294 key
.r_offset
= offset
;
8295 irel
= bsearch (&key
, internal_relocs
, sec
->reloc_count
,
8296 sizeof (Elf_Internal_Rela
), internal_reloc_matches
);
8300 /* bsearch does not guarantee which will be returned if there are
8301 multiple matches. We need the first that is not an alignment. */
8302 i
= irel
- internal_relocs
;
8305 if (internal_relocs
[i
-1].r_offset
!= offset
)
8309 for ( ; i
< sec
->reloc_count
; i
++)
8311 irel
= &internal_relocs
[i
];
8312 r_type
= ELF32_R_TYPE (irel
->r_info
);
8313 if (irel
->r_offset
== offset
&& r_type
!= R_XTENSA_NONE
)
8322 is_removable_literal (const source_reloc
*rel
,
8324 const source_reloc
*src_relocs
,
8327 property_table_entry
*prop_table
,
8330 const source_reloc
*curr_rel
;
8331 property_table_entry
*entry
;
8336 entry
= elf_xtensa_find_property_entry (prop_table
, ptblsize
,
8337 sec
->vma
+ rel
->r_rel
.target_offset
);
8338 if (entry
&& (entry
->flags
& XTENSA_PROP_NO_TRANSFORM
))
8341 for (++i
; i
< src_count
; ++i
)
8343 curr_rel
= &src_relocs
[i
];
8344 /* If all others have the same target offset.... */
8345 if (curr_rel
->r_rel
.target_offset
!= rel
->r_rel
.target_offset
)
8348 if (!curr_rel
->is_null
8349 && !xtensa_is_property_section (curr_rel
->source_sec
)
8350 && !(curr_rel
->source_sec
->flags
& SEC_DEBUGGING
))
8358 remove_dead_literal (bfd
*abfd
,
8360 struct bfd_link_info
*link_info
,
8361 Elf_Internal_Rela
*internal_relocs
,
8362 Elf_Internal_Rela
*irel
,
8364 property_table_entry
*prop_table
,
8367 property_table_entry
*entry
;
8368 xtensa_relax_info
*relax_info
;
8370 relax_info
= get_xtensa_relax_info (sec
);
8374 entry
= elf_xtensa_find_property_entry (prop_table
, ptblsize
,
8375 sec
->vma
+ rel
->r_rel
.target_offset
);
8377 /* Mark the unused literal so that it will be removed. */
8378 add_removed_literal (&relax_info
->removed_list
, &rel
->r_rel
, NULL
);
8380 text_action_add (&relax_info
->action_list
,
8381 ta_remove_literal
, sec
, rel
->r_rel
.target_offset
, 4);
8383 /* If the section is 4-byte aligned, do not add fill. */
8384 if (sec
->alignment_power
> 2)
8386 int fill_extra_space
;
8387 bfd_vma entry_sec_offset
;
8389 property_table_entry
*the_add_entry
;
8393 entry_sec_offset
= entry
->address
- sec
->vma
+ entry
->size
;
8395 entry_sec_offset
= rel
->r_rel
.target_offset
+ 4;
8397 /* If the literal range is at the end of the section,
8399 the_add_entry
= elf_xtensa_find_property_entry (prop_table
, ptblsize
,
8401 fill_extra_space
= compute_fill_extra_space (the_add_entry
);
8403 fa
= find_fill_action (&relax_info
->action_list
, sec
, entry_sec_offset
);
8404 removed_diff
= compute_removed_action_diff (fa
, sec
, entry_sec_offset
,
8405 -4, fill_extra_space
);
8407 adjust_fill_action (fa
, removed_diff
);
8409 text_action_add (&relax_info
->action_list
,
8410 ta_fill
, sec
, entry_sec_offset
, removed_diff
);
8413 /* Zero out the relocation on this literal location. */
8416 if (elf_hash_table (link_info
)->dynamic_sections_created
)
8417 shrink_dynamic_reloc_sections (link_info
, abfd
, sec
, irel
);
8419 irel
->r_info
= ELF32_R_INFO (0, R_XTENSA_NONE
);
8420 pin_internal_relocs (sec
, internal_relocs
);
8423 /* Do not modify "last_loc_is_prev". */
8429 identify_literal_placement (bfd
*abfd
,
8432 struct bfd_link_info
*link_info
,
8433 value_map_hash_table
*values
,
8434 bfd_boolean
*last_loc_is_prev_p
,
8435 Elf_Internal_Rela
*irel
,
8436 int remaining_src_rels
,
8438 property_table_entry
*prop_table
,
8440 section_cache_t
*target_sec_cache
,
8441 bfd_boolean is_abs_literal
)
8445 xtensa_relax_info
*relax_info
;
8446 bfd_boolean literal_placed
= FALSE
;
8448 unsigned long value
;
8449 bfd_boolean final_static_link
;
8450 bfd_size_type sec_size
;
8452 relax_info
= get_xtensa_relax_info (sec
);
8456 sec_size
= bfd_get_section_limit (abfd
, sec
);
8459 (!link_info
->relocatable
8460 && !elf_hash_table (link_info
)->dynamic_sections_created
);
8462 /* The placement algorithm first checks to see if the literal is
8463 already in the value map. If so and the value map is reachable
8464 from all uses, then the literal is moved to that location. If
8465 not, then we identify the last location where a fresh literal was
8466 placed. If the literal can be safely moved there, then we do so.
8467 If not, then we assume that the literal is not to move and leave
8468 the literal where it is, marking it as the last literal
8471 /* Find the literal value. */
8473 r_reloc_init (&r_rel
, abfd
, irel
, contents
, sec_size
);
8476 BFD_ASSERT (rel
->r_rel
.target_offset
< sec_size
);
8477 value
= bfd_get_32 (abfd
, contents
+ rel
->r_rel
.target_offset
);
8479 init_literal_value (&val
, &r_rel
, value
, is_abs_literal
);
8481 /* Check if we've seen another literal with the same value that
8482 is in the same output section. */
8483 val_map
= value_map_get_cached_value (values
, &val
, final_static_link
);
8486 && (r_reloc_get_section (&val_map
->loc
)->output_section
8487 == sec
->output_section
)
8488 && relocations_reach (rel
, remaining_src_rels
, &val_map
->loc
)
8489 && coalesce_shared_literal (sec
, rel
, prop_table
, ptblsize
, val_map
))
8491 /* No change to last_loc_is_prev. */
8492 literal_placed
= TRUE
;
8495 /* For relocatable links, do not try to move literals. To do it
8496 correctly might increase the number of relocations in an input
8497 section making the default relocatable linking fail. */
8498 if (!link_info
->relocatable
&& !literal_placed
8499 && values
->has_last_loc
&& !(*last_loc_is_prev_p
))
8501 asection
*target_sec
= r_reloc_get_section (&values
->last_loc
);
8502 if (target_sec
&& target_sec
->output_section
== sec
->output_section
)
8504 /* Increment the virtual offset. */
8505 r_reloc try_loc
= values
->last_loc
;
8506 try_loc
.virtual_offset
+= 4;
8508 /* There is a last loc that was in the same output section. */
8509 if (relocations_reach (rel
, remaining_src_rels
, &try_loc
)
8510 && move_shared_literal (sec
, link_info
, rel
,
8511 prop_table
, ptblsize
,
8512 &try_loc
, &val
, target_sec_cache
))
8514 values
->last_loc
.virtual_offset
+= 4;
8515 literal_placed
= TRUE
;
8517 val_map
= add_value_map (values
, &val
, &try_loc
,
8520 val_map
->loc
= try_loc
;
8525 if (!literal_placed
)
8527 /* Nothing worked, leave the literal alone but update the last loc. */
8528 values
->has_last_loc
= TRUE
;
8529 values
->last_loc
= rel
->r_rel
;
8531 val_map
= add_value_map (values
, &val
, &rel
->r_rel
, final_static_link
);
8533 val_map
->loc
= rel
->r_rel
;
8534 *last_loc_is_prev_p
= TRUE
;
8541 /* Check if the original relocations (presumably on L32R instructions)
8542 identified by reloc[0..N] can be changed to reference the literal
8543 identified by r_rel. If r_rel is out of range for any of the
8544 original relocations, then we don't want to coalesce the original
8545 literal with the one at r_rel. We only check reloc[0..N], where the
8546 offsets are all the same as for reloc[0] (i.e., they're all
8547 referencing the same literal) and where N is also bounded by the
8548 number of remaining entries in the "reloc" array. The "reloc" array
8549 is sorted by target offset so we know all the entries for the same
8550 literal will be contiguous. */
8553 relocations_reach (source_reloc
*reloc
,
8554 int remaining_relocs
,
8555 const r_reloc
*r_rel
)
8557 bfd_vma from_offset
, source_address
, dest_address
;
8561 if (!r_reloc_is_defined (r_rel
))
8564 sec
= r_reloc_get_section (r_rel
);
8565 from_offset
= reloc
[0].r_rel
.target_offset
;
8567 for (i
= 0; i
< remaining_relocs
; i
++)
8569 if (reloc
[i
].r_rel
.target_offset
!= from_offset
)
8572 /* Ignore relocations that have been removed. */
8573 if (reloc
[i
].is_null
)
8576 /* The original and new output section for these must be the same
8577 in order to coalesce. */
8578 if (r_reloc_get_section (&reloc
[i
].r_rel
)->output_section
8579 != sec
->output_section
)
8582 /* Absolute literals in the same output section can always be
8584 if (reloc
[i
].is_abs_literal
)
8587 /* A literal with no PC-relative relocations can be moved anywhere. */
8588 if (reloc
[i
].opnd
!= -1)
8590 /* Otherwise, check to see that it fits. */
8591 source_address
= (reloc
[i
].source_sec
->output_section
->vma
8592 + reloc
[i
].source_sec
->output_offset
8593 + reloc
[i
].r_rel
.rela
.r_offset
);
8594 dest_address
= (sec
->output_section
->vma
8595 + sec
->output_offset
8596 + r_rel
->target_offset
);
8598 if (!pcrel_reloc_fits (reloc
[i
].opcode
, reloc
[i
].opnd
,
8599 source_address
, dest_address
))
8608 /* Move a literal to another literal location because it is
8609 the same as the other literal value. */
8612 coalesce_shared_literal (asection
*sec
,
8614 property_table_entry
*prop_table
,
8618 property_table_entry
*entry
;
8620 property_table_entry
*the_add_entry
;
8622 xtensa_relax_info
*relax_info
;
8624 relax_info
= get_xtensa_relax_info (sec
);
8628 entry
= elf_xtensa_find_property_entry
8629 (prop_table
, ptblsize
, sec
->vma
+ rel
->r_rel
.target_offset
);
8630 if (entry
&& (entry
->flags
& XTENSA_PROP_NO_TRANSFORM
))
8633 /* Mark that the literal will be coalesced. */
8634 add_removed_literal (&relax_info
->removed_list
, &rel
->r_rel
, &val_map
->loc
);
8636 text_action_add (&relax_info
->action_list
,
8637 ta_remove_literal
, sec
, rel
->r_rel
.target_offset
, 4);
8639 /* If the section is 4-byte aligned, do not add fill. */
8640 if (sec
->alignment_power
> 2)
8642 int fill_extra_space
;
8643 bfd_vma entry_sec_offset
;
8646 entry_sec_offset
= entry
->address
- sec
->vma
+ entry
->size
;
8648 entry_sec_offset
= rel
->r_rel
.target_offset
+ 4;
8650 /* If the literal range is at the end of the section,
8652 fill_extra_space
= 0;
8653 the_add_entry
= elf_xtensa_find_property_entry (prop_table
, ptblsize
,
8655 if (the_add_entry
&& (the_add_entry
->flags
& XTENSA_PROP_UNREACHABLE
))
8656 fill_extra_space
= the_add_entry
->size
;
8658 fa
= find_fill_action (&relax_info
->action_list
, sec
, entry_sec_offset
);
8659 removed_diff
= compute_removed_action_diff (fa
, sec
, entry_sec_offset
,
8660 -4, fill_extra_space
);
8662 adjust_fill_action (fa
, removed_diff
);
8664 text_action_add (&relax_info
->action_list
,
8665 ta_fill
, sec
, entry_sec_offset
, removed_diff
);
8672 /* Move a literal to another location. This may actually increase the
8673 total amount of space used because of alignments so we need to do
8674 this carefully. Also, it may make a branch go out of range. */
8677 move_shared_literal (asection
*sec
,
8678 struct bfd_link_info
*link_info
,
8680 property_table_entry
*prop_table
,
8682 const r_reloc
*target_loc
,
8683 const literal_value
*lit_value
,
8684 section_cache_t
*target_sec_cache
)
8686 property_table_entry
*the_add_entry
, *src_entry
, *target_entry
= NULL
;
8687 text_action
*fa
, *target_fa
;
8689 xtensa_relax_info
*relax_info
, *target_relax_info
;
8690 asection
*target_sec
;
8692 ebb_constraint ebb_table
;
8693 bfd_boolean relocs_fit
;
8695 /* If this routine always returns FALSE, the literals that cannot be
8696 coalesced will not be moved. */
8697 if (elf32xtensa_no_literal_movement
)
8700 relax_info
= get_xtensa_relax_info (sec
);
8704 target_sec
= r_reloc_get_section (target_loc
);
8705 target_relax_info
= get_xtensa_relax_info (target_sec
);
8707 /* Literals to undefined sections may not be moved because they
8708 must report an error. */
8709 if (bfd_is_und_section (target_sec
))
8712 src_entry
= elf_xtensa_find_property_entry
8713 (prop_table
, ptblsize
, sec
->vma
+ rel
->r_rel
.target_offset
);
8715 if (!section_cache_section (target_sec_cache
, target_sec
, link_info
))
8718 target_entry
= elf_xtensa_find_property_entry
8719 (target_sec_cache
->ptbl
, target_sec_cache
->pte_count
,
8720 target_sec
->vma
+ target_loc
->target_offset
);
8725 /* Make sure that we have not broken any branches. */
8728 init_ebb_constraint (&ebb_table
);
8729 ebb
= &ebb_table
.ebb
;
8730 init_ebb (ebb
, target_sec_cache
->sec
, target_sec_cache
->contents
,
8731 target_sec_cache
->content_length
,
8732 target_sec_cache
->ptbl
, target_sec_cache
->pte_count
,
8733 target_sec_cache
->relocs
, target_sec_cache
->reloc_count
);
8735 /* Propose to add 4 bytes + worst-case alignment size increase to
8737 ebb_propose_action (&ebb_table
, EBB_NO_ALIGN
, 0,
8738 ta_fill
, target_loc
->target_offset
,
8739 -4 - (1 << target_sec
->alignment_power
), TRUE
);
8741 /* Check all of the PC-relative relocations to make sure they still fit. */
8742 relocs_fit
= check_section_ebb_pcrels_fit (target_sec
->owner
, target_sec
,
8743 target_sec_cache
->contents
,
8744 target_sec_cache
->relocs
,
8750 text_action_add_literal (&target_relax_info
->action_list
,
8751 ta_add_literal
, target_loc
, lit_value
, -4);
8753 if (target_sec
->alignment_power
> 2 && target_entry
!= src_entry
)
8755 /* May need to add or remove some fill to maintain alignment. */
8756 int fill_extra_space
;
8757 bfd_vma entry_sec_offset
;
8760 target_entry
->address
- target_sec
->vma
+ target_entry
->size
;
8762 /* If the literal range is at the end of the section,
8764 fill_extra_space
= 0;
8766 elf_xtensa_find_property_entry (target_sec_cache
->ptbl
,
8767 target_sec_cache
->pte_count
,
8769 if (the_add_entry
&& (the_add_entry
->flags
& XTENSA_PROP_UNREACHABLE
))
8770 fill_extra_space
= the_add_entry
->size
;
8772 target_fa
= find_fill_action (&target_relax_info
->action_list
,
8773 target_sec
, entry_sec_offset
);
8774 removed_diff
= compute_removed_action_diff (target_fa
, target_sec
,
8775 entry_sec_offset
, 4,
8778 adjust_fill_action (target_fa
, removed_diff
);
8780 text_action_add (&target_relax_info
->action_list
,
8781 ta_fill
, target_sec
, entry_sec_offset
, removed_diff
);
8784 /* Mark that the literal will be moved to the new location. */
8785 add_removed_literal (&relax_info
->removed_list
, &rel
->r_rel
, target_loc
);
8787 /* Remove the literal. */
8788 text_action_add (&relax_info
->action_list
,
8789 ta_remove_literal
, sec
, rel
->r_rel
.target_offset
, 4);
8791 /* If the section is 4-byte aligned, do not add fill. */
8792 if (sec
->alignment_power
> 2 && target_entry
!= src_entry
)
8794 int fill_extra_space
;
8795 bfd_vma entry_sec_offset
;
8798 entry_sec_offset
= src_entry
->address
- sec
->vma
+ src_entry
->size
;
8800 entry_sec_offset
= rel
->r_rel
.target_offset
+4;
8802 /* If the literal range is at the end of the section,
8804 fill_extra_space
= 0;
8805 the_add_entry
= elf_xtensa_find_property_entry (prop_table
, ptblsize
,
8807 if (the_add_entry
&& (the_add_entry
->flags
& XTENSA_PROP_UNREACHABLE
))
8808 fill_extra_space
= the_add_entry
->size
;
8810 fa
= find_fill_action (&relax_info
->action_list
, sec
, entry_sec_offset
);
8811 removed_diff
= compute_removed_action_diff (fa
, sec
, entry_sec_offset
,
8812 -4, fill_extra_space
);
8814 adjust_fill_action (fa
, removed_diff
);
8816 text_action_add (&relax_info
->action_list
,
8817 ta_fill
, sec
, entry_sec_offset
, removed_diff
);
8824 /* Second relaxation pass. */
8826 /* Modify all of the relocations to point to the right spot, and if this
8827 is a relaxable section, delete the unwanted literals and fix the
8831 relax_section (bfd
*abfd
, asection
*sec
, struct bfd_link_info
*link_info
)
8833 Elf_Internal_Rela
*internal_relocs
;
8834 xtensa_relax_info
*relax_info
;
8836 bfd_boolean ok
= TRUE
;
8838 bfd_boolean rv
= FALSE
;
8839 bfd_boolean virtual_action
;
8840 bfd_size_type sec_size
;
8842 sec_size
= bfd_get_section_limit (abfd
, sec
);
8843 relax_info
= get_xtensa_relax_info (sec
);
8844 BFD_ASSERT (relax_info
);
8846 /* First translate any of the fixes that have been added already. */
8847 translate_section_fixes (sec
);
8849 /* Handle property sections (e.g., literal tables) specially. */
8850 if (xtensa_is_property_section (sec
))
8852 BFD_ASSERT (!relax_info
->is_relaxable_literal_section
);
8853 return relax_property_section (abfd
, sec
, link_info
);
8856 internal_relocs
= retrieve_internal_relocs (abfd
, sec
,
8857 link_info
->keep_memory
);
8858 if (!internal_relocs
&& !relax_info
->action_list
.head
)
8861 contents
= retrieve_contents (abfd
, sec
, link_info
->keep_memory
);
8862 if (contents
== NULL
&& sec_size
!= 0)
8868 if (internal_relocs
)
8870 for (i
= 0; i
< sec
->reloc_count
; i
++)
8872 Elf_Internal_Rela
*irel
;
8873 xtensa_relax_info
*target_relax_info
;
8874 bfd_vma source_offset
, old_source_offset
;
8877 asection
*target_sec
;
8879 /* Locally change the source address.
8880 Translate the target to the new target address.
8881 If it points to this section and has been removed,
8885 irel
= &internal_relocs
[i
];
8886 source_offset
= irel
->r_offset
;
8887 old_source_offset
= source_offset
;
8889 r_type
= ELF32_R_TYPE (irel
->r_info
);
8890 r_reloc_init (&r_rel
, abfd
, irel
, contents
,
8891 bfd_get_section_limit (abfd
, sec
));
8893 /* If this section could have changed then we may need to
8894 change the relocation's offset. */
8896 if (relax_info
->is_relaxable_literal_section
8897 || relax_info
->is_relaxable_asm_section
)
8899 pin_internal_relocs (sec
, internal_relocs
);
8901 if (r_type
!= R_XTENSA_NONE
8902 && find_removed_literal (&relax_info
->removed_list
,
8905 /* Remove this relocation. */
8906 if (elf_hash_table (link_info
)->dynamic_sections_created
)
8907 shrink_dynamic_reloc_sections (link_info
, abfd
, sec
, irel
);
8908 irel
->r_info
= ELF32_R_INFO (0, R_XTENSA_NONE
);
8909 irel
->r_offset
= offset_with_removed_text
8910 (&relax_info
->action_list
, irel
->r_offset
);
8914 if (r_type
== R_XTENSA_ASM_SIMPLIFY
)
8916 text_action
*action
=
8917 find_insn_action (&relax_info
->action_list
,
8919 if (action
&& (action
->action
== ta_convert_longcall
8920 || action
->action
== ta_remove_longcall
))
8922 bfd_reloc_status_type retval
;
8923 char *error_message
= NULL
;
8925 retval
= contract_asm_expansion (contents
, sec_size
,
8926 irel
, &error_message
);
8927 if (retval
!= bfd_reloc_ok
)
8929 (*link_info
->callbacks
->reloc_dangerous
)
8930 (link_info
, error_message
, abfd
, sec
,
8934 /* Update the action so that the code that moves
8935 the contents will do the right thing. */
8936 if (action
->action
== ta_remove_longcall
)
8937 action
->action
= ta_remove_insn
;
8939 action
->action
= ta_none
;
8940 /* Refresh the info in the r_rel. */
8941 r_reloc_init (&r_rel
, abfd
, irel
, contents
, sec_size
);
8942 r_type
= ELF32_R_TYPE (irel
->r_info
);
8946 source_offset
= offset_with_removed_text
8947 (&relax_info
->action_list
, irel
->r_offset
);
8948 irel
->r_offset
= source_offset
;
8951 /* If the target section could have changed then
8952 we may need to change the relocation's target offset. */
8954 target_sec
= r_reloc_get_section (&r_rel
);
8956 /* For a reference to a discarded section from a DWARF section,
8957 i.e., where action_discarded is PRETEND, the symbol will
8958 eventually be modified to refer to the kept section (at least if
8959 the kept and discarded sections are the same size). Anticipate
8960 that here and adjust things accordingly. */
8961 if (! elf_xtensa_ignore_discarded_relocs (sec
)
8962 && elf_xtensa_action_discarded (sec
) == PRETEND
8963 && sec
->sec_info_type
!= SEC_INFO_TYPE_STABS
8964 && target_sec
!= NULL
8965 && discarded_section (target_sec
))
8967 /* It would be natural to call _bfd_elf_check_kept_section
8968 here, but it's not exported from elflink.c. It's also a
8969 fairly expensive check. Adjusting the relocations to the
8970 discarded section is fairly harmless; it will only adjust
8971 some addends and difference values. If it turns out that
8972 _bfd_elf_check_kept_section fails later, it won't matter,
8973 so just compare the section names to find the right group
8975 asection
*kept
= target_sec
->kept_section
;
8978 if ((kept
->flags
& SEC_GROUP
) != 0)
8980 asection
*first
= elf_next_in_group (kept
);
8981 asection
*s
= first
;
8986 if (strcmp (s
->name
, target_sec
->name
) == 0)
8991 s
= elf_next_in_group (s
);
8998 && ((target_sec
->rawsize
!= 0
8999 ? target_sec
->rawsize
: target_sec
->size
)
9000 == (kept
->rawsize
!= 0 ? kept
->rawsize
: kept
->size
)))
9004 target_relax_info
= get_xtensa_relax_info (target_sec
);
9005 if (target_relax_info
9006 && (target_relax_info
->is_relaxable_literal_section
9007 || target_relax_info
->is_relaxable_asm_section
))
9010 target_sec
= translate_reloc (&r_rel
, &new_reloc
, target_sec
);
9012 if (r_type
== R_XTENSA_DIFF8
9013 || r_type
== R_XTENSA_DIFF16
9014 || r_type
== R_XTENSA_DIFF32
)
9016 bfd_signed_vma diff_value
= 0;
9017 bfd_vma new_end_offset
, diff_mask
= 0;
9019 if (bfd_get_section_limit (abfd
, sec
) < old_source_offset
)
9021 (*link_info
->callbacks
->reloc_dangerous
)
9022 (link_info
, _("invalid relocation address"),
9023 abfd
, sec
, old_source_offset
);
9029 case R_XTENSA_DIFF8
:
9031 bfd_get_signed_8 (abfd
, &contents
[old_source_offset
]);
9033 case R_XTENSA_DIFF16
:
9035 bfd_get_signed_16 (abfd
, &contents
[old_source_offset
]);
9037 case R_XTENSA_DIFF32
:
9039 bfd_get_signed_32 (abfd
, &contents
[old_source_offset
]);
9043 new_end_offset
= offset_with_removed_text
9044 (&target_relax_info
->action_list
,
9045 r_rel
.target_offset
+ diff_value
);
9046 diff_value
= new_end_offset
- new_reloc
.target_offset
;
9050 case R_XTENSA_DIFF8
:
9052 bfd_put_signed_8 (abfd
, diff_value
,
9053 &contents
[old_source_offset
]);
9055 case R_XTENSA_DIFF16
:
9057 bfd_put_signed_16 (abfd
, diff_value
,
9058 &contents
[old_source_offset
]);
9060 case R_XTENSA_DIFF32
:
9061 diff_mask
= 0x7fffffff;
9062 bfd_put_signed_32 (abfd
, diff_value
,
9063 &contents
[old_source_offset
]);
9067 /* Check for overflow. Sign bits must be all zeroes or all ones */
9068 if ((diff_value
& ~diff_mask
) != 0 &&
9069 (diff_value
& ~diff_mask
) != (-1 & ~diff_mask
))
9071 (*link_info
->callbacks
->reloc_dangerous
)
9072 (link_info
, _("overflow after relaxation"),
9073 abfd
, sec
, old_source_offset
);
9077 pin_contents (sec
, contents
);
9080 /* If the relocation still references a section in the same
9081 input file, modify the relocation directly instead of
9082 adding a "fix" record. */
9083 if (target_sec
->owner
== abfd
)
9085 unsigned r_symndx
= ELF32_R_SYM (new_reloc
.rela
.r_info
);
9086 irel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
9087 irel
->r_addend
= new_reloc
.rela
.r_addend
;
9088 pin_internal_relocs (sec
, internal_relocs
);
9092 bfd_vma addend_displacement
;
9095 addend_displacement
=
9096 new_reloc
.target_offset
+ new_reloc
.virtual_offset
;
9097 fix
= reloc_bfd_fix_init (sec
, source_offset
, r_type
,
9099 addend_displacement
, TRUE
);
9106 if ((relax_info
->is_relaxable_literal_section
9107 || relax_info
->is_relaxable_asm_section
)
9108 && relax_info
->action_list
.head
)
9110 /* Walk through the planned actions and build up a table
9111 of move, copy and fill records. Use the move, copy and
9112 fill records to perform the actions once. */
9115 bfd_size_type final_size
, copy_size
, orig_insn_size
;
9116 bfd_byte
*scratch
= NULL
;
9117 bfd_byte
*dup_contents
= NULL
;
9118 bfd_size_type orig_size
= sec
->size
;
9119 bfd_vma orig_dot
= 0;
9120 bfd_vma orig_dot_copied
= 0; /* Byte copied already from
9121 orig dot in physical memory. */
9122 bfd_vma orig_dot_vo
= 0; /* Virtual offset from orig_dot. */
9123 bfd_vma dup_dot
= 0;
9125 text_action
*action
= relax_info
->action_list
.head
;
9127 final_size
= sec
->size
;
9128 for (action
= relax_info
->action_list
.head
; action
;
9129 action
= action
->next
)
9131 final_size
-= action
->removed_bytes
;
9134 scratch
= (bfd_byte
*) bfd_zmalloc (final_size
);
9135 dup_contents
= (bfd_byte
*) bfd_zmalloc (final_size
);
9137 /* The dot is the current fill location. */
9139 print_action_list (stderr
, &relax_info
->action_list
);
9142 for (action
= relax_info
->action_list
.head
; action
;
9143 action
= action
->next
)
9145 virtual_action
= FALSE
;
9146 if (action
->offset
> orig_dot
)
9148 orig_dot
+= orig_dot_copied
;
9149 orig_dot_copied
= 0;
9151 /* Out of the virtual world. */
9154 if (action
->offset
> orig_dot
)
9156 copy_size
= action
->offset
- orig_dot
;
9157 memmove (&dup_contents
[dup_dot
], &contents
[orig_dot
], copy_size
);
9158 orig_dot
+= copy_size
;
9159 dup_dot
+= copy_size
;
9160 BFD_ASSERT (action
->offset
== orig_dot
);
9162 else if (action
->offset
< orig_dot
)
9164 if (action
->action
== ta_fill
9165 && action
->offset
- action
->removed_bytes
== orig_dot
)
9167 /* This is OK because the fill only effects the dup_dot. */
9169 else if (action
->action
== ta_add_literal
)
9171 /* TBD. Might need to handle this. */
9174 if (action
->offset
== orig_dot
)
9176 if (action
->virtual_offset
> orig_dot_vo
)
9178 if (orig_dot_vo
== 0)
9180 /* Need to copy virtual_offset bytes. Probably four. */
9181 copy_size
= action
->virtual_offset
- orig_dot_vo
;
9182 memmove (&dup_contents
[dup_dot
],
9183 &contents
[orig_dot
], copy_size
);
9184 orig_dot_copied
= copy_size
;
9185 dup_dot
+= copy_size
;
9187 virtual_action
= TRUE
;
9190 BFD_ASSERT (action
->virtual_offset
<= orig_dot_vo
);
9192 switch (action
->action
)
9194 case ta_remove_literal
:
9195 case ta_remove_insn
:
9196 BFD_ASSERT (action
->removed_bytes
>= 0);
9197 orig_dot
+= action
->removed_bytes
;
9200 case ta_narrow_insn
:
9203 memmove (scratch
, &contents
[orig_dot
], orig_insn_size
);
9204 BFD_ASSERT (action
->removed_bytes
== 1);
9205 rv
= narrow_instruction (scratch
, final_size
, 0);
9207 memmove (&dup_contents
[dup_dot
], scratch
, copy_size
);
9208 orig_dot
+= orig_insn_size
;
9209 dup_dot
+= copy_size
;
9213 if (action
->removed_bytes
>= 0)
9214 orig_dot
+= action
->removed_bytes
;
9217 /* Already zeroed in dup_contents. Just bump the
9219 dup_dot
+= (-action
->removed_bytes
);
9224 BFD_ASSERT (action
->removed_bytes
== 0);
9227 case ta_convert_longcall
:
9228 case ta_remove_longcall
:
9229 /* These will be removed or converted before we get here. */
9236 memmove (scratch
, &contents
[orig_dot
], orig_insn_size
);
9237 BFD_ASSERT (action
->removed_bytes
== -1);
9238 rv
= widen_instruction (scratch
, final_size
, 0);
9240 memmove (&dup_contents
[dup_dot
], scratch
, copy_size
);
9241 orig_dot
+= orig_insn_size
;
9242 dup_dot
+= copy_size
;
9245 case ta_add_literal
:
9248 BFD_ASSERT (action
->removed_bytes
== -4);
9249 /* TBD -- place the literal value here and insert
9251 memset (&dup_contents
[dup_dot
], 0, 4);
9252 pin_internal_relocs (sec
, internal_relocs
);
9253 pin_contents (sec
, contents
);
9255 if (!move_literal (abfd
, link_info
, sec
, dup_dot
, dup_contents
,
9256 relax_info
, &internal_relocs
, &action
->value
))
9260 orig_dot_vo
+= copy_size
;
9262 orig_dot
+= orig_insn_size
;
9263 dup_dot
+= copy_size
;
9267 /* Not implemented yet. */
9272 removed
+= action
->removed_bytes
;
9273 BFD_ASSERT (dup_dot
<= final_size
);
9274 BFD_ASSERT (orig_dot
<= orig_size
);
9277 orig_dot
+= orig_dot_copied
;
9278 orig_dot_copied
= 0;
9280 if (orig_dot
!= orig_size
)
9282 copy_size
= orig_size
- orig_dot
;
9283 BFD_ASSERT (orig_size
> orig_dot
);
9284 BFD_ASSERT (dup_dot
+ copy_size
== final_size
);
9285 memmove (&dup_contents
[dup_dot
], &contents
[orig_dot
], copy_size
);
9286 orig_dot
+= copy_size
;
9287 dup_dot
+= copy_size
;
9289 BFD_ASSERT (orig_size
== orig_dot
);
9290 BFD_ASSERT (final_size
== dup_dot
);
9292 /* Move the dup_contents back. */
9293 if (final_size
> orig_size
)
9295 /* Contents need to be reallocated. Swap the dup_contents into
9297 sec
->contents
= dup_contents
;
9299 contents
= dup_contents
;
9300 pin_contents (sec
, contents
);
9304 BFD_ASSERT (final_size
<= orig_size
);
9305 memset (contents
, 0, orig_size
);
9306 memcpy (contents
, dup_contents
, final_size
);
9307 free (dup_contents
);
9310 pin_contents (sec
, contents
);
9312 if (sec
->rawsize
== 0)
9313 sec
->rawsize
= sec
->size
;
9314 sec
->size
= final_size
;
9318 release_internal_relocs (sec
, internal_relocs
);
9319 release_contents (sec
, contents
);
9325 translate_section_fixes (asection
*sec
)
9327 xtensa_relax_info
*relax_info
;
9330 relax_info
= get_xtensa_relax_info (sec
);
9334 for (r
= relax_info
->fix_list
; r
!= NULL
; r
= r
->next
)
9335 if (!translate_reloc_bfd_fix (r
))
9342 /* Translate a fix given the mapping in the relax info for the target
9343 section. If it has already been translated, no work is required. */
9346 translate_reloc_bfd_fix (reloc_bfd_fix
*fix
)
9348 reloc_bfd_fix new_fix
;
9350 xtensa_relax_info
*relax_info
;
9351 removed_literal
*removed
;
9352 bfd_vma new_offset
, target_offset
;
9354 if (fix
->translated
)
9357 sec
= fix
->target_sec
;
9358 target_offset
= fix
->target_offset
;
9360 relax_info
= get_xtensa_relax_info (sec
);
9363 fix
->translated
= TRUE
;
9369 /* The fix does not need to be translated if the section cannot change. */
9370 if (!relax_info
->is_relaxable_literal_section
9371 && !relax_info
->is_relaxable_asm_section
)
9373 fix
->translated
= TRUE
;
9377 /* If the literal has been moved and this relocation was on an
9378 opcode, then the relocation should move to the new literal
9379 location. Otherwise, the relocation should move within the
9383 if (is_operand_relocation (fix
->src_type
))
9385 /* Check if the original relocation is against a literal being
9387 removed
= find_removed_literal (&relax_info
->removed_list
,
9395 /* The fact that there is still a relocation to this literal indicates
9396 that the literal is being coalesced, not simply removed. */
9397 BFD_ASSERT (removed
->to
.abfd
!= NULL
);
9399 /* This was moved to some other address (possibly another section). */
9400 new_sec
= r_reloc_get_section (&removed
->to
);
9404 relax_info
= get_xtensa_relax_info (sec
);
9406 (!relax_info
->is_relaxable_literal_section
9407 && !relax_info
->is_relaxable_asm_section
))
9409 target_offset
= removed
->to
.target_offset
;
9410 new_fix
.target_sec
= new_sec
;
9411 new_fix
.target_offset
= target_offset
;
9412 new_fix
.translated
= TRUE
;
9417 target_offset
= removed
->to
.target_offset
;
9418 new_fix
.target_sec
= new_sec
;
9421 /* The target address may have been moved within its section. */
9422 new_offset
= offset_with_removed_text (&relax_info
->action_list
,
9425 new_fix
.target_offset
= new_offset
;
9426 new_fix
.target_offset
= new_offset
;
9427 new_fix
.translated
= TRUE
;
9433 /* Fix up a relocation to take account of removed literals. */
9436 translate_reloc (const r_reloc
*orig_rel
, r_reloc
*new_rel
, asection
*sec
)
9438 xtensa_relax_info
*relax_info
;
9439 removed_literal
*removed
;
9440 bfd_vma target_offset
, base_offset
;
9443 *new_rel
= *orig_rel
;
9445 if (!r_reloc_is_defined (orig_rel
))
9448 relax_info
= get_xtensa_relax_info (sec
);
9449 BFD_ASSERT (relax_info
&& (relax_info
->is_relaxable_literal_section
9450 || relax_info
->is_relaxable_asm_section
));
9452 target_offset
= orig_rel
->target_offset
;
9455 if (is_operand_relocation (ELF32_R_TYPE (orig_rel
->rela
.r_info
)))
9457 /* Check if the original relocation is against a literal being
9459 removed
= find_removed_literal (&relax_info
->removed_list
,
9462 if (removed
&& removed
->to
.abfd
)
9466 /* The fact that there is still a relocation to this literal indicates
9467 that the literal is being coalesced, not simply removed. */
9468 BFD_ASSERT (removed
->to
.abfd
!= NULL
);
9470 /* This was moved to some other address
9471 (possibly in another section). */
9472 *new_rel
= removed
->to
;
9473 new_sec
= r_reloc_get_section (new_rel
);
9477 relax_info
= get_xtensa_relax_info (sec
);
9479 || (!relax_info
->is_relaxable_literal_section
9480 && !relax_info
->is_relaxable_asm_section
))
9483 target_offset
= new_rel
->target_offset
;
9486 /* Find the base offset of the reloc symbol, excluding any addend from the
9487 reloc or from the section contents (for a partial_inplace reloc). Then
9488 find the adjusted values of the offsets due to relaxation. The base
9489 offset is needed to determine the change to the reloc's addend; the reloc
9490 addend should not be adjusted due to relaxations located before the base
9493 base_offset
= r_reloc_get_target_offset (new_rel
) - new_rel
->rela
.r_addend
;
9494 act
= relax_info
->action_list
.head
;
9495 if (base_offset
<= target_offset
)
9497 int base_removed
= removed_by_actions (&act
, base_offset
, FALSE
);
9498 int addend_removed
= removed_by_actions (&act
, target_offset
, FALSE
);
9499 new_rel
->target_offset
= target_offset
- base_removed
- addend_removed
;
9500 new_rel
->rela
.r_addend
-= addend_removed
;
9504 /* Handle a negative addend. The base offset comes first. */
9505 int tgt_removed
= removed_by_actions (&act
, target_offset
, FALSE
);
9506 int addend_removed
= removed_by_actions (&act
, base_offset
, FALSE
);
9507 new_rel
->target_offset
= target_offset
- tgt_removed
;
9508 new_rel
->rela
.r_addend
+= addend_removed
;
9515 /* For dynamic links, there may be a dynamic relocation for each
9516 literal. The number of dynamic relocations must be computed in
9517 size_dynamic_sections, which occurs before relaxation. When a
9518 literal is removed, this function checks if there is a corresponding
9519 dynamic relocation and shrinks the size of the appropriate dynamic
9520 relocation section accordingly. At this point, the contents of the
9521 dynamic relocation sections have not yet been filled in, so there's
9522 nothing else that needs to be done. */
9525 shrink_dynamic_reloc_sections (struct bfd_link_info
*info
,
9527 asection
*input_section
,
9528 Elf_Internal_Rela
*rel
)
9530 struct elf_xtensa_link_hash_table
*htab
;
9531 Elf_Internal_Shdr
*symtab_hdr
;
9532 struct elf_link_hash_entry
**sym_hashes
;
9533 unsigned long r_symndx
;
9535 struct elf_link_hash_entry
*h
;
9536 bfd_boolean dynamic_symbol
;
9538 htab
= elf_xtensa_hash_table (info
);
9542 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
9543 sym_hashes
= elf_sym_hashes (abfd
);
9545 r_type
= ELF32_R_TYPE (rel
->r_info
);
9546 r_symndx
= ELF32_R_SYM (rel
->r_info
);
9548 if (r_symndx
< symtab_hdr
->sh_info
)
9551 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
9553 dynamic_symbol
= elf_xtensa_dynamic_symbol_p (h
, info
);
9555 if ((r_type
== R_XTENSA_32
|| r_type
== R_XTENSA_PLT
)
9556 && (input_section
->flags
& SEC_ALLOC
) != 0
9557 && (dynamic_symbol
|| info
->shared
))
9560 bfd_boolean is_plt
= FALSE
;
9562 if (dynamic_symbol
&& r_type
== R_XTENSA_PLT
)
9564 srel
= htab
->srelplt
;
9568 srel
= htab
->srelgot
;
9570 /* Reduce size of the .rela.* section by one reloc. */
9571 BFD_ASSERT (srel
!= NULL
);
9572 BFD_ASSERT (srel
->size
>= sizeof (Elf32_External_Rela
));
9573 srel
->size
-= sizeof (Elf32_External_Rela
);
9577 asection
*splt
, *sgotplt
, *srelgot
;
9578 int reloc_index
, chunk
;
9580 /* Find the PLT reloc index of the entry being removed. This
9581 is computed from the size of ".rela.plt". It is needed to
9582 figure out which PLT chunk to resize. Usually "last index
9583 = size - 1" since the index starts at zero, but in this
9584 context, the size has just been decremented so there's no
9585 need to subtract one. */
9586 reloc_index
= srel
->size
/ sizeof (Elf32_External_Rela
);
9588 chunk
= reloc_index
/ PLT_ENTRIES_PER_CHUNK
;
9589 splt
= elf_xtensa_get_plt_section (info
, chunk
);
9590 sgotplt
= elf_xtensa_get_gotplt_section (info
, chunk
);
9591 BFD_ASSERT (splt
!= NULL
&& sgotplt
!= NULL
);
9593 /* Check if an entire PLT chunk has just been eliminated. */
9594 if (reloc_index
% PLT_ENTRIES_PER_CHUNK
== 0)
9596 /* The two magic GOT entries for that chunk can go away. */
9597 srelgot
= htab
->srelgot
;
9598 BFD_ASSERT (srelgot
!= NULL
);
9599 srelgot
->reloc_count
-= 2;
9600 srelgot
->size
-= 2 * sizeof (Elf32_External_Rela
);
9603 /* There should be only one entry left (and it will be
9605 BFD_ASSERT (sgotplt
->size
== 4);
9606 BFD_ASSERT (splt
->size
== PLT_ENTRY_SIZE
);
9609 BFD_ASSERT (sgotplt
->size
>= 4);
9610 BFD_ASSERT (splt
->size
>= PLT_ENTRY_SIZE
);
9613 splt
->size
-= PLT_ENTRY_SIZE
;
9619 /* Take an r_rel and move it to another section. This usually
9620 requires extending the interal_relocation array and pinning it. If
9621 the original r_rel is from the same BFD, we can complete this here.
9622 Otherwise, we add a fix record to let the final link fix the
9623 appropriate address. Contents and internal relocations for the
9624 section must be pinned after calling this routine. */
9627 move_literal (bfd
*abfd
,
9628 struct bfd_link_info
*link_info
,
9632 xtensa_relax_info
*relax_info
,
9633 Elf_Internal_Rela
**internal_relocs_p
,
9634 const literal_value
*lit
)
9636 Elf_Internal_Rela
*new_relocs
= NULL
;
9637 size_t new_relocs_count
= 0;
9638 Elf_Internal_Rela this_rela
;
9639 const r_reloc
*r_rel
;
9641 r_rel
= &lit
->r_rel
;
9642 BFD_ASSERT (elf_section_data (sec
)->relocs
== *internal_relocs_p
);
9644 if (r_reloc_is_const (r_rel
))
9645 bfd_put_32 (abfd
, lit
->value
, contents
+ offset
);
9653 r_type
= ELF32_R_TYPE (r_rel
->rela
.r_info
);
9655 /* This is the difficult case. We have to create a fix up. */
9656 this_rela
.r_offset
= offset
;
9657 this_rela
.r_info
= ELF32_R_INFO (0, r_type
);
9658 this_rela
.r_addend
=
9659 r_rel
->target_offset
- r_reloc_get_target_offset (r_rel
);
9660 bfd_put_32 (abfd
, lit
->value
, contents
+ offset
);
9662 /* Currently, we cannot move relocations during a relocatable link. */
9663 BFD_ASSERT (!link_info
->relocatable
);
9664 fix
= reloc_bfd_fix_init (sec
, offset
, r_type
,
9665 r_reloc_get_section (r_rel
),
9666 r_rel
->target_offset
+ r_rel
->virtual_offset
,
9668 /* We also need to mark that relocations are needed here. */
9669 sec
->flags
|= SEC_RELOC
;
9671 translate_reloc_bfd_fix (fix
);
9672 /* This fix has not yet been translated. */
9675 /* Add the relocation. If we have already allocated our own
9676 space for the relocations and we have room for more, then use
9677 it. Otherwise, allocate new space and move the literals. */
9678 insert_at
= sec
->reloc_count
;
9679 for (i
= 0; i
< sec
->reloc_count
; ++i
)
9681 if (this_rela
.r_offset
< (*internal_relocs_p
)[i
].r_offset
)
9688 if (*internal_relocs_p
!= relax_info
->allocated_relocs
9689 || sec
->reloc_count
+ 1 > relax_info
->allocated_relocs_count
)
9691 BFD_ASSERT (relax_info
->allocated_relocs
== NULL
9692 || sec
->reloc_count
== relax_info
->relocs_count
);
9694 if (relax_info
->allocated_relocs_count
== 0)
9695 new_relocs_count
= (sec
->reloc_count
+ 2) * 2;
9697 new_relocs_count
= (relax_info
->allocated_relocs_count
+ 2) * 2;
9699 new_relocs
= (Elf_Internal_Rela
*)
9700 bfd_zmalloc (sizeof (Elf_Internal_Rela
) * (new_relocs_count
));
9704 /* We could handle this more quickly by finding the split point. */
9706 memcpy (new_relocs
, *internal_relocs_p
,
9707 insert_at
* sizeof (Elf_Internal_Rela
));
9709 new_relocs
[insert_at
] = this_rela
;
9711 if (insert_at
!= sec
->reloc_count
)
9712 memcpy (new_relocs
+ insert_at
+ 1,
9713 (*internal_relocs_p
) + insert_at
,
9714 (sec
->reloc_count
- insert_at
)
9715 * sizeof (Elf_Internal_Rela
));
9717 if (*internal_relocs_p
!= relax_info
->allocated_relocs
)
9719 /* The first time we re-allocate, we can only free the
9720 old relocs if they were allocated with bfd_malloc.
9721 This is not true when keep_memory is in effect. */
9722 if (!link_info
->keep_memory
)
9723 free (*internal_relocs_p
);
9726 free (*internal_relocs_p
);
9727 relax_info
->allocated_relocs
= new_relocs
;
9728 relax_info
->allocated_relocs_count
= new_relocs_count
;
9729 elf_section_data (sec
)->relocs
= new_relocs
;
9731 relax_info
->relocs_count
= sec
->reloc_count
;
9732 *internal_relocs_p
= new_relocs
;
9736 if (insert_at
!= sec
->reloc_count
)
9739 for (idx
= sec
->reloc_count
; idx
> insert_at
; idx
--)
9740 (*internal_relocs_p
)[idx
] = (*internal_relocs_p
)[idx
-1];
9742 (*internal_relocs_p
)[insert_at
] = this_rela
;
9744 if (relax_info
->allocated_relocs
)
9745 relax_info
->relocs_count
= sec
->reloc_count
;
9752 /* This is similar to relax_section except that when a target is moved,
9753 we shift addresses up. We also need to modify the size. This
9754 algorithm does NOT allow for relocations into the middle of the
9755 property sections. */
9758 relax_property_section (bfd
*abfd
,
9760 struct bfd_link_info
*link_info
)
9762 Elf_Internal_Rela
*internal_relocs
;
9765 bfd_boolean ok
= TRUE
;
9766 bfd_boolean is_full_prop_section
;
9767 size_t last_zfill_target_offset
= 0;
9768 asection
*last_zfill_target_sec
= NULL
;
9769 bfd_size_type sec_size
;
9770 bfd_size_type entry_size
;
9772 sec_size
= bfd_get_section_limit (abfd
, sec
);
9773 internal_relocs
= retrieve_internal_relocs (abfd
, sec
,
9774 link_info
->keep_memory
);
9775 contents
= retrieve_contents (abfd
, sec
, link_info
->keep_memory
);
9776 if (contents
== NULL
&& sec_size
!= 0)
9782 is_full_prop_section
= xtensa_is_proptable_section (sec
);
9783 if (is_full_prop_section
)
9788 if (internal_relocs
)
9790 for (i
= 0; i
< sec
->reloc_count
; i
++)
9792 Elf_Internal_Rela
*irel
;
9793 xtensa_relax_info
*target_relax_info
;
9795 asection
*target_sec
;
9797 bfd_byte
*size_p
, *flags_p
;
9799 /* Locally change the source address.
9800 Translate the target to the new target address.
9801 If it points to this section and has been removed, MOVE IT.
9802 Also, don't forget to modify the associated SIZE at
9805 irel
= &internal_relocs
[i
];
9806 r_type
= ELF32_R_TYPE (irel
->r_info
);
9807 if (r_type
== R_XTENSA_NONE
)
9810 /* Find the literal value. */
9811 r_reloc_init (&val
.r_rel
, abfd
, irel
, contents
, sec_size
);
9812 size_p
= &contents
[irel
->r_offset
+ 4];
9814 if (is_full_prop_section
)
9815 flags_p
= &contents
[irel
->r_offset
+ 8];
9816 BFD_ASSERT (irel
->r_offset
+ entry_size
<= sec_size
);
9818 target_sec
= r_reloc_get_section (&val
.r_rel
);
9819 target_relax_info
= get_xtensa_relax_info (target_sec
);
9821 if (target_relax_info
9822 && (target_relax_info
->is_relaxable_literal_section
9823 || target_relax_info
->is_relaxable_asm_section
))
9825 /* Translate the relocation's destination. */
9826 bfd_vma old_offset
= val
.r_rel
.target_offset
;
9828 long old_size
, new_size
;
9829 text_action
*act
= target_relax_info
->action_list
.head
;
9830 new_offset
= old_offset
-
9831 removed_by_actions (&act
, old_offset
, FALSE
);
9833 /* Assert that we are not out of bounds. */
9834 old_size
= bfd_get_32 (abfd
, size_p
);
9835 new_size
= old_size
;
9839 /* Only the first zero-sized unreachable entry is
9840 allowed to expand. In this case the new offset
9841 should be the offset before the fill and the new
9842 size is the expansion size. For other zero-sized
9843 entries the resulting size should be zero with an
9844 offset before or after the fill address depending
9845 on whether the expanding unreachable entry
9847 if (last_zfill_target_sec
== 0
9848 || last_zfill_target_sec
!= target_sec
9849 || last_zfill_target_offset
!= old_offset
)
9851 bfd_vma new_end_offset
= new_offset
;
9853 /* Recompute the new_offset, but this time don't
9854 include any fill inserted by relaxation. */
9855 act
= target_relax_info
->action_list
.head
;
9856 new_offset
= old_offset
-
9857 removed_by_actions (&act
, old_offset
, TRUE
);
9859 /* If it is not unreachable and we have not yet
9860 seen an unreachable at this address, place it
9861 before the fill address. */
9862 if (flags_p
&& (bfd_get_32 (abfd
, flags_p
)
9863 & XTENSA_PROP_UNREACHABLE
) != 0)
9865 new_size
= new_end_offset
- new_offset
;
9867 last_zfill_target_sec
= target_sec
;
9868 last_zfill_target_offset
= old_offset
;
9874 removed_by_actions (&act
, old_offset
+ old_size
, TRUE
);
9876 if (new_size
!= old_size
)
9878 bfd_put_32 (abfd
, new_size
, size_p
);
9879 pin_contents (sec
, contents
);
9882 if (new_offset
!= old_offset
)
9884 bfd_vma diff
= new_offset
- old_offset
;
9885 irel
->r_addend
+= diff
;
9886 pin_internal_relocs (sec
, internal_relocs
);
9892 /* Combine adjacent property table entries. This is also done in
9893 finish_dynamic_sections() but at that point it's too late to
9894 reclaim the space in the output section, so we do this twice. */
9896 if (internal_relocs
&& (!link_info
->relocatable
9897 || xtensa_is_littable_section (sec
)))
9899 Elf_Internal_Rela
*last_irel
= NULL
;
9900 Elf_Internal_Rela
*irel
, *next_rel
, *rel_end
;
9901 int removed_bytes
= 0;
9903 flagword predef_flags
;
9905 predef_flags
= xtensa_get_property_predef_flags (sec
);
9907 /* Walk over memory and relocations at the same time.
9908 This REQUIRES that the internal_relocs be sorted by offset. */
9909 qsort (internal_relocs
, sec
->reloc_count
, sizeof (Elf_Internal_Rela
),
9910 internal_reloc_compare
);
9912 pin_internal_relocs (sec
, internal_relocs
);
9913 pin_contents (sec
, contents
);
9915 next_rel
= internal_relocs
;
9916 rel_end
= internal_relocs
+ sec
->reloc_count
;
9918 BFD_ASSERT (sec
->size
% entry_size
== 0);
9920 for (offset
= 0; offset
< sec
->size
; offset
+= entry_size
)
9922 Elf_Internal_Rela
*offset_rel
, *extra_rel
;
9923 bfd_vma bytes_to_remove
, size
, actual_offset
;
9924 bfd_boolean remove_this_rel
;
9927 /* Find the first relocation for the entry at the current offset.
9928 Adjust the offsets of any extra relocations for the previous
9933 for (irel
= next_rel
; irel
< rel_end
; irel
++)
9935 if ((irel
->r_offset
== offset
9936 && ELF32_R_TYPE (irel
->r_info
) != R_XTENSA_NONE
)
9937 || irel
->r_offset
> offset
)
9942 irel
->r_offset
-= removed_bytes
;
9946 /* Find the next relocation (if there are any left). */
9950 for (irel
= offset_rel
+ 1; irel
< rel_end
; irel
++)
9952 if (ELF32_R_TYPE (irel
->r_info
) != R_XTENSA_NONE
)
9960 /* Check if there are relocations on the current entry. There
9961 should usually be a relocation on the offset field. If there
9962 are relocations on the size or flags, then we can't optimize
9963 this entry. Also, find the next relocation to examine on the
9967 if (offset_rel
->r_offset
>= offset
+ entry_size
)
9969 next_rel
= offset_rel
;
9970 /* There are no relocations on the current entry, but we
9971 might still be able to remove it if the size is zero. */
9974 else if (offset_rel
->r_offset
> offset
9976 && extra_rel
->r_offset
< offset
+ entry_size
))
9978 /* There is a relocation on the size or flags, so we can't
9979 do anything with this entry. Continue with the next. */
9980 next_rel
= offset_rel
;
9985 BFD_ASSERT (offset_rel
->r_offset
== offset
);
9986 offset_rel
->r_offset
-= removed_bytes
;
9987 next_rel
= offset_rel
+ 1;
9993 remove_this_rel
= FALSE
;
9994 bytes_to_remove
= 0;
9995 actual_offset
= offset
- removed_bytes
;
9996 size
= bfd_get_32 (abfd
, &contents
[actual_offset
+ 4]);
9998 if (is_full_prop_section
)
9999 flags
= bfd_get_32 (abfd
, &contents
[actual_offset
+ 8]);
10001 flags
= predef_flags
;
10004 && (flags
& XTENSA_PROP_ALIGN
) == 0
10005 && (flags
& XTENSA_PROP_UNREACHABLE
) == 0)
10007 /* Always remove entries with zero size and no alignment. */
10008 bytes_to_remove
= entry_size
;
10010 remove_this_rel
= TRUE
;
10012 else if (offset_rel
10013 && ELF32_R_TYPE (offset_rel
->r_info
) == R_XTENSA_32
)
10017 flagword old_flags
;
10019 bfd_get_32 (abfd
, &contents
[last_irel
->r_offset
+ 4]);
10020 bfd_vma old_address
=
10021 (last_irel
->r_addend
10022 + bfd_get_32 (abfd
, &contents
[last_irel
->r_offset
]));
10023 bfd_vma new_address
=
10024 (offset_rel
->r_addend
10025 + bfd_get_32 (abfd
, &contents
[actual_offset
]));
10026 if (is_full_prop_section
)
10027 old_flags
= bfd_get_32
10028 (abfd
, &contents
[last_irel
->r_offset
+ 8]);
10030 old_flags
= predef_flags
;
10032 if ((ELF32_R_SYM (offset_rel
->r_info
)
10033 == ELF32_R_SYM (last_irel
->r_info
))
10034 && old_address
+ old_size
== new_address
10035 && old_flags
== flags
10036 && (old_flags
& XTENSA_PROP_INSN_BRANCH_TARGET
) == 0
10037 && (old_flags
& XTENSA_PROP_INSN_LOOP_TARGET
) == 0)
10039 /* Fix the old size. */
10040 bfd_put_32 (abfd
, old_size
+ size
,
10041 &contents
[last_irel
->r_offset
+ 4]);
10042 bytes_to_remove
= entry_size
;
10043 remove_this_rel
= TRUE
;
10046 last_irel
= offset_rel
;
10049 last_irel
= offset_rel
;
10052 if (remove_this_rel
)
10054 offset_rel
->r_info
= ELF32_R_INFO (0, R_XTENSA_NONE
);
10055 offset_rel
->r_offset
= 0;
10058 if (bytes_to_remove
!= 0)
10060 removed_bytes
+= bytes_to_remove
;
10061 if (offset
+ bytes_to_remove
< sec
->size
)
10062 memmove (&contents
[actual_offset
],
10063 &contents
[actual_offset
+ bytes_to_remove
],
10064 sec
->size
- offset
- bytes_to_remove
);
10070 /* Fix up any extra relocations on the last entry. */
10071 for (irel
= next_rel
; irel
< rel_end
; irel
++)
10072 irel
->r_offset
-= removed_bytes
;
10074 /* Clear the removed bytes. */
10075 memset (&contents
[sec
->size
- removed_bytes
], 0, removed_bytes
);
10077 if (sec
->rawsize
== 0)
10078 sec
->rawsize
= sec
->size
;
10079 sec
->size
-= removed_bytes
;
10081 if (xtensa_is_littable_section (sec
))
10083 asection
*sgotloc
= elf_xtensa_hash_table (link_info
)->sgotloc
;
10085 sgotloc
->size
-= removed_bytes
;
10091 release_internal_relocs (sec
, internal_relocs
);
10092 release_contents (sec
, contents
);
10097 /* Third relaxation pass. */
10099 /* Change symbol values to account for removed literals. */
10102 relax_section_symbols (bfd
*abfd
, asection
*sec
)
10104 xtensa_relax_info
*relax_info
;
10105 unsigned int sec_shndx
;
10106 Elf_Internal_Shdr
*symtab_hdr
;
10107 Elf_Internal_Sym
*isymbuf
;
10108 unsigned i
, num_syms
, num_locals
;
10110 relax_info
= get_xtensa_relax_info (sec
);
10111 BFD_ASSERT (relax_info
);
10113 if (!relax_info
->is_relaxable_literal_section
10114 && !relax_info
->is_relaxable_asm_section
)
10117 sec_shndx
= _bfd_elf_section_from_bfd_section (abfd
, sec
);
10119 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
10120 isymbuf
= retrieve_local_syms (abfd
);
10122 num_syms
= symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
);
10123 num_locals
= symtab_hdr
->sh_info
;
10125 /* Adjust the local symbols defined in this section. */
10126 for (i
= 0; i
< num_locals
; i
++)
10128 Elf_Internal_Sym
*isym
= &isymbuf
[i
];
10130 if (isym
->st_shndx
== sec_shndx
)
10132 text_action
*act
= relax_info
->action_list
.head
;
10133 bfd_vma orig_addr
= isym
->st_value
;
10135 isym
->st_value
-= removed_by_actions (&act
, orig_addr
, FALSE
);
10137 if (ELF32_ST_TYPE (isym
->st_info
) == STT_FUNC
)
10139 removed_by_actions (&act
, orig_addr
+ isym
->st_size
, FALSE
);
10143 /* Now adjust the global symbols defined in this section. */
10144 for (i
= 0; i
< (num_syms
- num_locals
); i
++)
10146 struct elf_link_hash_entry
*sym_hash
;
10148 sym_hash
= elf_sym_hashes (abfd
)[i
];
10150 if (sym_hash
->root
.type
== bfd_link_hash_warning
)
10151 sym_hash
= (struct elf_link_hash_entry
*) sym_hash
->root
.u
.i
.link
;
10153 if ((sym_hash
->root
.type
== bfd_link_hash_defined
10154 || sym_hash
->root
.type
== bfd_link_hash_defweak
)
10155 && sym_hash
->root
.u
.def
.section
== sec
)
10157 text_action
*act
= relax_info
->action_list
.head
;
10158 bfd_vma orig_addr
= sym_hash
->root
.u
.def
.value
;
10160 sym_hash
->root
.u
.def
.value
-=
10161 removed_by_actions (&act
, orig_addr
, FALSE
);
10163 if (sym_hash
->type
== STT_FUNC
)
10165 removed_by_actions (&act
, orig_addr
+ sym_hash
->size
, FALSE
);
10173 /* "Fix" handling functions, called while performing relocations. */
10176 do_fix_for_relocatable_link (Elf_Internal_Rela
*rel
,
10178 asection
*input_section
,
10179 bfd_byte
*contents
)
10182 asection
*sec
, *old_sec
;
10183 bfd_vma old_offset
;
10184 int r_type
= ELF32_R_TYPE (rel
->r_info
);
10185 reloc_bfd_fix
*fix
;
10187 if (r_type
== R_XTENSA_NONE
)
10190 fix
= get_bfd_fix (input_section
, rel
->r_offset
, r_type
);
10194 r_reloc_init (&r_rel
, input_bfd
, rel
, contents
,
10195 bfd_get_section_limit (input_bfd
, input_section
));
10196 old_sec
= r_reloc_get_section (&r_rel
);
10197 old_offset
= r_rel
.target_offset
;
10199 if (!old_sec
|| !r_reloc_is_defined (&r_rel
))
10201 if (r_type
!= R_XTENSA_ASM_EXPAND
)
10203 (*_bfd_error_handler
)
10204 (_("%B(%A+0x%lx): unexpected fix for %s relocation"),
10205 input_bfd
, input_section
, rel
->r_offset
,
10206 elf_howto_table
[r_type
].name
);
10209 /* Leave it be. Resolution will happen in a later stage. */
10213 sec
= fix
->target_sec
;
10214 rel
->r_addend
+= ((sec
->output_offset
+ fix
->target_offset
)
10215 - (old_sec
->output_offset
+ old_offset
));
10222 do_fix_for_final_link (Elf_Internal_Rela
*rel
,
10224 asection
*input_section
,
10225 bfd_byte
*contents
,
10226 bfd_vma
*relocationp
)
10229 int r_type
= ELF32_R_TYPE (rel
->r_info
);
10230 reloc_bfd_fix
*fix
;
10231 bfd_vma fixup_diff
;
10233 if (r_type
== R_XTENSA_NONE
)
10236 fix
= get_bfd_fix (input_section
, rel
->r_offset
, r_type
);
10240 sec
= fix
->target_sec
;
10242 fixup_diff
= rel
->r_addend
;
10243 if (elf_howto_table
[fix
->src_type
].partial_inplace
)
10245 bfd_vma inplace_val
;
10246 BFD_ASSERT (fix
->src_offset
10247 < bfd_get_section_limit (input_bfd
, input_section
));
10248 inplace_val
= bfd_get_32 (input_bfd
, &contents
[fix
->src_offset
]);
10249 fixup_diff
+= inplace_val
;
10252 *relocationp
= (sec
->output_section
->vma
10253 + sec
->output_offset
10254 + fix
->target_offset
- fixup_diff
);
10258 /* Miscellaneous utility functions.... */
10261 elf_xtensa_get_plt_section (struct bfd_link_info
*info
, int chunk
)
10263 struct elf_xtensa_link_hash_table
*htab
;
10269 htab
= elf_xtensa_hash_table (info
);
10276 dynobj
= elf_hash_table (info
)->dynobj
;
10277 sprintf (plt_name
, ".plt.%u", chunk
);
10278 return bfd_get_linker_section (dynobj
, plt_name
);
10283 elf_xtensa_get_gotplt_section (struct bfd_link_info
*info
, int chunk
)
10285 struct elf_xtensa_link_hash_table
*htab
;
10291 htab
= elf_xtensa_hash_table (info
);
10294 return htab
->sgotplt
;
10297 dynobj
= elf_hash_table (info
)->dynobj
;
10298 sprintf (got_name
, ".got.plt.%u", chunk
);
10299 return bfd_get_linker_section (dynobj
, got_name
);
10303 /* Get the input section for a given symbol index.
10305 . a section symbol, return the section;
10306 . a common symbol, return the common section;
10307 . an undefined symbol, return the undefined section;
10308 . an indirect symbol, follow the links;
10309 . an absolute value, return the absolute section. */
10312 get_elf_r_symndx_section (bfd
*abfd
, unsigned long r_symndx
)
10314 Elf_Internal_Shdr
*symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
10315 asection
*target_sec
= NULL
;
10316 if (r_symndx
< symtab_hdr
->sh_info
)
10318 Elf_Internal_Sym
*isymbuf
;
10319 unsigned int section_index
;
10321 isymbuf
= retrieve_local_syms (abfd
);
10322 section_index
= isymbuf
[r_symndx
].st_shndx
;
10324 if (section_index
== SHN_UNDEF
)
10325 target_sec
= bfd_und_section_ptr
;
10326 else if (section_index
== SHN_ABS
)
10327 target_sec
= bfd_abs_section_ptr
;
10328 else if (section_index
== SHN_COMMON
)
10329 target_sec
= bfd_com_section_ptr
;
10331 target_sec
= bfd_section_from_elf_index (abfd
, section_index
);
10335 unsigned long indx
= r_symndx
- symtab_hdr
->sh_info
;
10336 struct elf_link_hash_entry
*h
= elf_sym_hashes (abfd
)[indx
];
10338 while (h
->root
.type
== bfd_link_hash_indirect
10339 || h
->root
.type
== bfd_link_hash_warning
)
10340 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
10342 switch (h
->root
.type
)
10344 case bfd_link_hash_defined
:
10345 case bfd_link_hash_defweak
:
10346 target_sec
= h
->root
.u
.def
.section
;
10348 case bfd_link_hash_common
:
10349 target_sec
= bfd_com_section_ptr
;
10351 case bfd_link_hash_undefined
:
10352 case bfd_link_hash_undefweak
:
10353 target_sec
= bfd_und_section_ptr
;
10355 default: /* New indirect warning. */
10356 target_sec
= bfd_und_section_ptr
;
10364 static struct elf_link_hash_entry
*
10365 get_elf_r_symndx_hash_entry (bfd
*abfd
, unsigned long r_symndx
)
10367 unsigned long indx
;
10368 struct elf_link_hash_entry
*h
;
10369 Elf_Internal_Shdr
*symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
10371 if (r_symndx
< symtab_hdr
->sh_info
)
10374 indx
= r_symndx
- symtab_hdr
->sh_info
;
10375 h
= elf_sym_hashes (abfd
)[indx
];
10376 while (h
->root
.type
== bfd_link_hash_indirect
10377 || h
->root
.type
== bfd_link_hash_warning
)
10378 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
10383 /* Get the section-relative offset for a symbol number. */
10386 get_elf_r_symndx_offset (bfd
*abfd
, unsigned long r_symndx
)
10388 Elf_Internal_Shdr
*symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
10389 bfd_vma offset
= 0;
10391 if (r_symndx
< symtab_hdr
->sh_info
)
10393 Elf_Internal_Sym
*isymbuf
;
10394 isymbuf
= retrieve_local_syms (abfd
);
10395 offset
= isymbuf
[r_symndx
].st_value
;
10399 unsigned long indx
= r_symndx
- symtab_hdr
->sh_info
;
10400 struct elf_link_hash_entry
*h
=
10401 elf_sym_hashes (abfd
)[indx
];
10403 while (h
->root
.type
== bfd_link_hash_indirect
10404 || h
->root
.type
== bfd_link_hash_warning
)
10405 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
10406 if (h
->root
.type
== bfd_link_hash_defined
10407 || h
->root
.type
== bfd_link_hash_defweak
)
10408 offset
= h
->root
.u
.def
.value
;
10415 is_reloc_sym_weak (bfd
*abfd
, Elf_Internal_Rela
*rel
)
10417 unsigned long r_symndx
= ELF32_R_SYM (rel
->r_info
);
10418 struct elf_link_hash_entry
*h
;
10420 h
= get_elf_r_symndx_hash_entry (abfd
, r_symndx
);
10421 if (h
&& h
->root
.type
== bfd_link_hash_defweak
)
10428 pcrel_reloc_fits (xtensa_opcode opc
,
10430 bfd_vma self_address
,
10431 bfd_vma dest_address
)
10433 xtensa_isa isa
= xtensa_default_isa
;
10434 uint32 valp
= dest_address
;
10435 if (xtensa_operand_do_reloc (isa
, opc
, opnd
, &valp
, self_address
)
10436 || xtensa_operand_encode (isa
, opc
, opnd
, &valp
))
10443 xtensa_is_property_section (asection
*sec
)
10445 if (xtensa_is_insntable_section (sec
)
10446 || xtensa_is_littable_section (sec
)
10447 || xtensa_is_proptable_section (sec
))
10455 xtensa_is_insntable_section (asection
*sec
)
10457 if (CONST_STRNEQ (sec
->name
, XTENSA_INSN_SEC_NAME
)
10458 || CONST_STRNEQ (sec
->name
, ".gnu.linkonce.x."))
10466 xtensa_is_littable_section (asection
*sec
)
10468 if (CONST_STRNEQ (sec
->name
, XTENSA_LIT_SEC_NAME
)
10469 || CONST_STRNEQ (sec
->name
, ".gnu.linkonce.p."))
10477 xtensa_is_proptable_section (asection
*sec
)
10479 if (CONST_STRNEQ (sec
->name
, XTENSA_PROP_SEC_NAME
)
10480 || CONST_STRNEQ (sec
->name
, ".gnu.linkonce.prop."))
10488 internal_reloc_compare (const void *ap
, const void *bp
)
10490 const Elf_Internal_Rela
*a
= (const Elf_Internal_Rela
*) ap
;
10491 const Elf_Internal_Rela
*b
= (const Elf_Internal_Rela
*) bp
;
10493 if (a
->r_offset
!= b
->r_offset
)
10494 return (a
->r_offset
- b
->r_offset
);
10496 /* We don't need to sort on these criteria for correctness,
10497 but enforcing a more strict ordering prevents unstable qsort
10498 from behaving differently with different implementations.
10499 Without the code below we get correct but different results
10500 on Solaris 2.7 and 2.8. We would like to always produce the
10501 same results no matter the host. */
10503 if (a
->r_info
!= b
->r_info
)
10504 return (a
->r_info
- b
->r_info
);
10506 return (a
->r_addend
- b
->r_addend
);
10511 internal_reloc_matches (const void *ap
, const void *bp
)
10513 const Elf_Internal_Rela
*a
= (const Elf_Internal_Rela
*) ap
;
10514 const Elf_Internal_Rela
*b
= (const Elf_Internal_Rela
*) bp
;
10516 /* Check if one entry overlaps with the other; this shouldn't happen
10517 except when searching for a match. */
10518 return (a
->r_offset
- b
->r_offset
);
10522 /* Predicate function used to look up a section in a particular group. */
10525 match_section_group (bfd
*abfd ATTRIBUTE_UNUSED
, asection
*sec
, void *inf
)
10527 const char *gname
= inf
;
10528 const char *group_name
= elf_group_name (sec
);
10530 return (group_name
== gname
10531 || (group_name
!= NULL
10533 && strcmp (group_name
, gname
) == 0));
10537 static int linkonce_len
= sizeof (".gnu.linkonce.") - 1;
10540 xtensa_property_section_name (asection
*sec
, const char *base_name
)
10542 const char *suffix
, *group_name
;
10543 char *prop_sec_name
;
10545 group_name
= elf_group_name (sec
);
10548 suffix
= strrchr (sec
->name
, '.');
10549 if (suffix
== sec
->name
)
10551 prop_sec_name
= (char *) bfd_malloc (strlen (base_name
) + 1
10552 + (suffix
? strlen (suffix
) : 0));
10553 strcpy (prop_sec_name
, base_name
);
10555 strcat (prop_sec_name
, suffix
);
10557 else if (strncmp (sec
->name
, ".gnu.linkonce.", linkonce_len
) == 0)
10559 char *linkonce_kind
= 0;
10561 if (strcmp (base_name
, XTENSA_INSN_SEC_NAME
) == 0)
10562 linkonce_kind
= "x.";
10563 else if (strcmp (base_name
, XTENSA_LIT_SEC_NAME
) == 0)
10564 linkonce_kind
= "p.";
10565 else if (strcmp (base_name
, XTENSA_PROP_SEC_NAME
) == 0)
10566 linkonce_kind
= "prop.";
10570 prop_sec_name
= (char *) bfd_malloc (strlen (sec
->name
)
10571 + strlen (linkonce_kind
) + 1);
10572 memcpy (prop_sec_name
, ".gnu.linkonce.", linkonce_len
);
10573 strcpy (prop_sec_name
+ linkonce_len
, linkonce_kind
);
10575 suffix
= sec
->name
+ linkonce_len
;
10576 /* For backward compatibility, replace "t." instead of inserting
10577 the new linkonce_kind (but not for "prop" sections). */
10578 if (CONST_STRNEQ (suffix
, "t.") && linkonce_kind
[1] == '.')
10580 strcat (prop_sec_name
+ linkonce_len
, suffix
);
10583 prop_sec_name
= strdup (base_name
);
10585 return prop_sec_name
;
10590 xtensa_get_property_section (asection
*sec
, const char *base_name
)
10592 char *prop_sec_name
;
10593 asection
*prop_sec
;
10595 prop_sec_name
= xtensa_property_section_name (sec
, base_name
);
10596 prop_sec
= bfd_get_section_by_name_if (sec
->owner
, prop_sec_name
,
10597 match_section_group
,
10598 (void *) elf_group_name (sec
));
10599 free (prop_sec_name
);
10605 xtensa_make_property_section (asection
*sec
, const char *base_name
)
10607 char *prop_sec_name
;
10608 asection
*prop_sec
;
10610 /* Check if the section already exists. */
10611 prop_sec_name
= xtensa_property_section_name (sec
, base_name
);
10612 prop_sec
= bfd_get_section_by_name_if (sec
->owner
, prop_sec_name
,
10613 match_section_group
,
10614 (void *) elf_group_name (sec
));
10615 /* If not, create it. */
10618 flagword flags
= (SEC_RELOC
| SEC_HAS_CONTENTS
| SEC_READONLY
);
10619 flags
|= (bfd_get_section_flags (sec
->owner
, sec
)
10620 & (SEC_LINK_ONCE
| SEC_LINK_DUPLICATES
));
10622 prop_sec
= bfd_make_section_anyway_with_flags
10623 (sec
->owner
, strdup (prop_sec_name
), flags
);
10627 elf_group_name (prop_sec
) = elf_group_name (sec
);
10630 free (prop_sec_name
);
10636 xtensa_get_property_predef_flags (asection
*sec
)
10638 if (xtensa_is_insntable_section (sec
))
10639 return (XTENSA_PROP_INSN
10640 | XTENSA_PROP_NO_TRANSFORM
10641 | XTENSA_PROP_INSN_NO_REORDER
);
10643 if (xtensa_is_littable_section (sec
))
10644 return (XTENSA_PROP_LITERAL
10645 | XTENSA_PROP_NO_TRANSFORM
10646 | XTENSA_PROP_INSN_NO_REORDER
);
10652 /* Other functions called directly by the linker. */
10655 xtensa_callback_required_dependence (bfd
*abfd
,
10657 struct bfd_link_info
*link_info
,
10658 deps_callback_t callback
,
10661 Elf_Internal_Rela
*internal_relocs
;
10662 bfd_byte
*contents
;
10664 bfd_boolean ok
= TRUE
;
10665 bfd_size_type sec_size
;
10667 sec_size
= bfd_get_section_limit (abfd
, sec
);
10669 /* ".plt*" sections have no explicit relocations but they contain L32R
10670 instructions that reference the corresponding ".got.plt*" sections. */
10671 if ((sec
->flags
& SEC_LINKER_CREATED
) != 0
10672 && CONST_STRNEQ (sec
->name
, ".plt"))
10676 /* Find the corresponding ".got.plt*" section. */
10677 if (sec
->name
[4] == '\0')
10678 sgotplt
= bfd_get_linker_section (sec
->owner
, ".got.plt");
10684 BFD_ASSERT (sec
->name
[4] == '.');
10685 chunk
= strtol (&sec
->name
[5], NULL
, 10);
10687 sprintf (got_name
, ".got.plt.%u", chunk
);
10688 sgotplt
= bfd_get_linker_section (sec
->owner
, got_name
);
10690 BFD_ASSERT (sgotplt
);
10692 /* Assume worst-case offsets: L32R at the very end of the ".plt"
10693 section referencing a literal at the very beginning of
10694 ".got.plt". This is very close to the real dependence, anyway. */
10695 (*callback
) (sec
, sec_size
, sgotplt
, 0, closure
);
10698 /* Only ELF files are supported for Xtensa. Check here to avoid a segfault
10699 when building uclibc, which runs "ld -b binary /dev/null". */
10700 if (bfd_get_flavour (abfd
) != bfd_target_elf_flavour
)
10703 internal_relocs
= retrieve_internal_relocs (abfd
, sec
,
10704 link_info
->keep_memory
);
10705 if (internal_relocs
== NULL
10706 || sec
->reloc_count
== 0)
10709 /* Cache the contents for the duration of this scan. */
10710 contents
= retrieve_contents (abfd
, sec
, link_info
->keep_memory
);
10711 if (contents
== NULL
&& sec_size
!= 0)
10717 if (!xtensa_default_isa
)
10718 xtensa_default_isa
= xtensa_isa_init (0, 0);
10720 for (i
= 0; i
< sec
->reloc_count
; i
++)
10722 Elf_Internal_Rela
*irel
= &internal_relocs
[i
];
10723 if (is_l32r_relocation (abfd
, sec
, contents
, irel
))
10726 asection
*target_sec
;
10727 bfd_vma target_offset
;
10729 r_reloc_init (&l32r_rel
, abfd
, irel
, contents
, sec_size
);
10732 /* L32Rs must be local to the input file. */
10733 if (r_reloc_is_defined (&l32r_rel
))
10735 target_sec
= r_reloc_get_section (&l32r_rel
);
10736 target_offset
= l32r_rel
.target_offset
;
10738 (*callback
) (sec
, irel
->r_offset
, target_sec
, target_offset
,
10744 release_internal_relocs (sec
, internal_relocs
);
10745 release_contents (sec
, contents
);
10749 /* The default literal sections should always be marked as "code" (i.e.,
10750 SHF_EXECINSTR). This is particularly important for the Linux kernel
10751 module loader so that the literals are not placed after the text. */
10752 static const struct bfd_elf_special_section elf_xtensa_special_sections
[] =
10754 { STRING_COMMA_LEN (".fini.literal"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_EXECINSTR
},
10755 { STRING_COMMA_LEN (".init.literal"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_EXECINSTR
},
10756 { STRING_COMMA_LEN (".literal"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_EXECINSTR
},
10757 { STRING_COMMA_LEN (".xtensa.info"), 0, SHT_NOTE
, 0 },
10758 { NULL
, 0, 0, 0, 0 }
10761 #define ELF_TARGET_ID XTENSA_ELF_DATA
10763 #define TARGET_LITTLE_SYM xtensa_elf32_le_vec
10764 #define TARGET_LITTLE_NAME "elf32-xtensa-le"
10765 #define TARGET_BIG_SYM xtensa_elf32_be_vec
10766 #define TARGET_BIG_NAME "elf32-xtensa-be"
10767 #define ELF_ARCH bfd_arch_xtensa
10769 #define ELF_MACHINE_CODE EM_XTENSA
10770 #define ELF_MACHINE_ALT1 EM_XTENSA_OLD
10773 #define ELF_MAXPAGESIZE (1 << XCHAL_MMU_MIN_PTE_PAGE_SIZE)
10774 #else /* !XCHAL_HAVE_MMU */
10775 #define ELF_MAXPAGESIZE 1
10776 #endif /* !XCHAL_HAVE_MMU */
10777 #endif /* ELF_ARCH */
10779 #define elf_backend_can_gc_sections 1
10780 #define elf_backend_can_refcount 1
10781 #define elf_backend_plt_readonly 1
10782 #define elf_backend_got_header_size 4
10783 #define elf_backend_want_dynbss 0
10784 #define elf_backend_want_got_plt 1
10786 #define elf_info_to_howto elf_xtensa_info_to_howto_rela
10788 #define bfd_elf32_mkobject elf_xtensa_mkobject
10790 #define bfd_elf32_bfd_merge_private_bfd_data elf_xtensa_merge_private_bfd_data
10791 #define bfd_elf32_new_section_hook elf_xtensa_new_section_hook
10792 #define bfd_elf32_bfd_print_private_bfd_data elf_xtensa_print_private_bfd_data
10793 #define bfd_elf32_bfd_relax_section elf_xtensa_relax_section
10794 #define bfd_elf32_bfd_reloc_type_lookup elf_xtensa_reloc_type_lookup
10795 #define bfd_elf32_bfd_reloc_name_lookup \
10796 elf_xtensa_reloc_name_lookup
10797 #define bfd_elf32_bfd_set_private_flags elf_xtensa_set_private_flags
10798 #define bfd_elf32_bfd_link_hash_table_create elf_xtensa_link_hash_table_create
10800 #define elf_backend_adjust_dynamic_symbol elf_xtensa_adjust_dynamic_symbol
10801 #define elf_backend_check_relocs elf_xtensa_check_relocs
10802 #define elf_backend_create_dynamic_sections elf_xtensa_create_dynamic_sections
10803 #define elf_backend_discard_info elf_xtensa_discard_info
10804 #define elf_backend_ignore_discarded_relocs elf_xtensa_ignore_discarded_relocs
10805 #define elf_backend_final_write_processing elf_xtensa_final_write_processing
10806 #define elf_backend_finish_dynamic_sections elf_xtensa_finish_dynamic_sections
10807 #define elf_backend_finish_dynamic_symbol elf_xtensa_finish_dynamic_symbol
10808 #define elf_backend_gc_mark_hook elf_xtensa_gc_mark_hook
10809 #define elf_backend_gc_sweep_hook elf_xtensa_gc_sweep_hook
10810 #define elf_backend_grok_prstatus elf_xtensa_grok_prstatus
10811 #define elf_backend_grok_psinfo elf_xtensa_grok_psinfo
10812 #define elf_backend_hide_symbol elf_xtensa_hide_symbol
10813 #define elf_backend_object_p elf_xtensa_object_p
10814 #define elf_backend_reloc_type_class elf_xtensa_reloc_type_class
10815 #define elf_backend_relocate_section elf_xtensa_relocate_section
10816 #define elf_backend_size_dynamic_sections elf_xtensa_size_dynamic_sections
10817 #define elf_backend_always_size_sections elf_xtensa_always_size_sections
10818 #define elf_backend_omit_section_dynsym \
10819 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
10820 #define elf_backend_special_sections elf_xtensa_special_sections
10821 #define elf_backend_action_discarded elf_xtensa_action_discarded
10822 #define elf_backend_copy_indirect_symbol elf_xtensa_copy_indirect_symbol
10824 #include "elf32-target.h"