]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf-m10300.c
Update year range in copyright notice of binutils files
[thirdparty/binutils-gdb.git] / bfd / elf-m10300.c
CommitLineData
252b5132 1/* Matsushita 10300 specific support for 32-bit ELF
219d1afa 2 Copyright (C) 1996-2018 Free Software Foundation, Inc.
252b5132 3
0112cd26 4 This file is part of BFD, the Binary File Descriptor library.
252b5132 5
0112cd26
NC
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
cd123cb7 8 the Free Software Foundation; either version 3 of the License, or
0112cd26 9 (at your option) any later version.
252b5132 10
0112cd26
NC
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
252b5132 15
0112cd26
NC
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
cd123cb7
NC
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
252b5132 20
252b5132 21#include "sysdep.h"
3db64b00 22#include "bfd.h"
252b5132
RH
23#include "libbfd.h"
24#include "elf-bfd.h"
25#include "elf/mn10300.h"
603b7257 26#include "libiberty.h"
917583ad 27
03a12831
AO
28/* The mn10300 linker needs to keep track of the number of relocs that
29 it decides to copy in check_relocs for each symbol. This is so
30 that it can discard PC relative relocs if it doesn't need them when
31 linking with -Bsymbolic. We store the information in a field
32 extending the regular ELF linker hash table. */
33
603b7257
NC
34struct elf32_mn10300_link_hash_entry
35{
252b5132
RH
36 /* The basic elf link hash table entry. */
37 struct elf_link_hash_entry root;
38
39 /* For function symbols, the number of times this function is
40 called directly (ie by name). */
41 unsigned int direct_calls;
42
43 /* For function symbols, the size of this function's stack
44 (if <= 255 bytes). We stuff this into "call" instructions
45 to this target when it's valid and profitable to do so.
46
47 This does not include stack allocated by movm! */
48 unsigned char stack_size;
49
50 /* For function symbols, arguments (if any) for movm instruction
51 in the prologue. We stuff this value into "call" instructions
52 to the target when it's valid and profitable to do so. */
53 unsigned char movm_args;
54
4cc11e76 55 /* For function symbols, the amount of stack space that would be allocated
252b5132
RH
56 by the movm instruction. This is redundant with movm_args, but we
57 add it to the hash table to avoid computing it over and over. */
58 unsigned char movm_stack_size;
59
60/* When set, convert all "call" instructions to this target into "calls"
61 instructions. */
62#define MN10300_CONVERT_CALL_TO_CALLS 0x1
63
64/* Used to mark functions which have had redundant parts of their
65 prologue deleted. */
66#define MN10300_DELETED_PROLOGUE_BYTES 0x2
67 unsigned char flags;
eb13e63f
DD
68
69 /* Calculated value. */
70 bfd_vma value;
0a22ae8e
NC
71
72#define GOT_UNKNOWN 0
73#define GOT_NORMAL 1
74#define GOT_TLS_GD 2
75#define GOT_TLS_LD 3
76#define GOT_TLS_IE 4
77 /* Used to distinguish GOT entries for TLS types from normal GOT entries. */
78 unsigned char tls_type;
252b5132
RH
79};
80
81/* We derive a hash table from the main elf linker hash table so
82 we can store state variables and a secondary hash table without
83 resorting to global variables. */
603b7257
NC
84struct elf32_mn10300_link_hash_table
85{
252b5132
RH
86 /* The main hash table. */
87 struct elf_link_hash_table root;
88
89 /* A hash table for static functions. We could derive a new hash table
90 instead of using the full elf32_mn10300_link_hash_table if we wanted
91 to save some memory. */
92 struct elf32_mn10300_link_hash_table *static_hash_table;
93
94 /* Random linker state flags. */
95#define MN10300_HASH_ENTRIES_INITIALIZED 0x1
96 char flags;
0a22ae8e
NC
97 struct
98 {
99 bfd_signed_vma refcount;
07d6d2b8
AM
100 bfd_vma offset;
101 char got_allocated;
102 char rel_emitted;
0a22ae8e 103 } tls_ldm_got;
252b5132
RH
104};
105
0a22ae8e
NC
106#define elf_mn10300_hash_entry(ent) ((struct elf32_mn10300_link_hash_entry *)(ent))
107
108struct elf_mn10300_obj_tdata
109{
110 struct elf_obj_tdata root;
111
112 /* tls_type for each local got entry. */
113 char * local_got_tls_type;
114};
115
116#define elf_mn10300_tdata(abfd) \
117 ((struct elf_mn10300_obj_tdata *) (abfd)->tdata.any)
118
119#define elf_mn10300_local_got_tls_type(abfd) \
120 (elf_mn10300_tdata (abfd)->local_got_tls_type)
121
603b7257
NC
122#ifndef streq
123#define streq(a, b) (strcmp ((a),(b)) == 0)
124#endif
125
252b5132
RH
126/* For MN10300 linker hash table. */
127
128/* Get the MN10300 ELF linker hash table from a link_info structure. */
129
130#define elf32_mn10300_hash_table(p) \
4dfe6ac6
NC
131 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
132 == MN10300_ELF_DATA ? ((struct elf32_mn10300_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
133
134#define elf32_mn10300_link_hash_traverse(table, func, info) \
135 (elf_link_hash_traverse \
136 (&(table)->root, \
603b7257 137 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
138 (info)))
139
603b7257
NC
140static reloc_howto_type elf_mn10300_howto_table[] =
141{
252b5132
RH
142 /* Dummy relocation. Does nothing. */
143 HOWTO (R_MN10300_NONE,
144 0,
6346d5ca
AM
145 3,
146 0,
b34976b6 147 FALSE,
252b5132 148 0,
6346d5ca 149 complain_overflow_dont,
252b5132
RH
150 bfd_elf_generic_reloc,
151 "R_MN10300_NONE",
b34976b6 152 FALSE,
252b5132
RH
153 0,
154 0,
b34976b6 155 FALSE),
252b5132
RH
156 /* Standard 32 bit reloc. */
157 HOWTO (R_MN10300_32,
158 0,
159 2,
160 32,
b34976b6 161 FALSE,
252b5132
RH
162 0,
163 complain_overflow_bitfield,
164 bfd_elf_generic_reloc,
165 "R_MN10300_32",
b34976b6 166 FALSE,
252b5132
RH
167 0xffffffff,
168 0xffffffff,
b34976b6 169 FALSE),
252b5132
RH
170 /* Standard 16 bit reloc. */
171 HOWTO (R_MN10300_16,
172 0,
173 1,
174 16,
b34976b6 175 FALSE,
252b5132
RH
176 0,
177 complain_overflow_bitfield,
178 bfd_elf_generic_reloc,
179 "R_MN10300_16",
b34976b6 180 FALSE,
252b5132
RH
181 0xffff,
182 0xffff,
b34976b6 183 FALSE),
252b5132
RH
184 /* Standard 8 bit reloc. */
185 HOWTO (R_MN10300_8,
186 0,
187 0,
188 8,
b34976b6 189 FALSE,
252b5132
RH
190 0,
191 complain_overflow_bitfield,
192 bfd_elf_generic_reloc,
193 "R_MN10300_8",
b34976b6 194 FALSE,
252b5132
RH
195 0xff,
196 0xff,
b34976b6 197 FALSE),
252b5132
RH
198 /* Standard 32bit pc-relative reloc. */
199 HOWTO (R_MN10300_PCREL32,
200 0,
201 2,
202 32,
b34976b6 203 TRUE,
252b5132
RH
204 0,
205 complain_overflow_bitfield,
206 bfd_elf_generic_reloc,
207 "R_MN10300_PCREL32",
b34976b6 208 FALSE,
252b5132
RH
209 0xffffffff,
210 0xffffffff,
b34976b6 211 TRUE),
252b5132
RH
212 /* Standard 16bit pc-relative reloc. */
213 HOWTO (R_MN10300_PCREL16,
214 0,
215 1,
216 16,
b34976b6 217 TRUE,
252b5132
RH
218 0,
219 complain_overflow_bitfield,
220 bfd_elf_generic_reloc,
221 "R_MN10300_PCREL16",
b34976b6 222 FALSE,
252b5132
RH
223 0xffff,
224 0xffff,
b34976b6 225 TRUE),
252b5132
RH
226 /* Standard 8 pc-relative reloc. */
227 HOWTO (R_MN10300_PCREL8,
228 0,
229 0,
230 8,
b34976b6 231 TRUE,
252b5132
RH
232 0,
233 complain_overflow_bitfield,
234 bfd_elf_generic_reloc,
235 "R_MN10300_PCREL8",
b34976b6 236 FALSE,
252b5132
RH
237 0xff,
238 0xff,
b34976b6 239 TRUE),
252b5132 240
603b7257 241 /* GNU extension to record C++ vtable hierarchy. */
252b5132
RH
242 HOWTO (R_MN10300_GNU_VTINHERIT, /* type */
243 0, /* rightshift */
244 0, /* size (0 = byte, 1 = short, 2 = long) */
245 0, /* bitsize */
b34976b6 246 FALSE, /* pc_relative */
252b5132
RH
247 0, /* bitpos */
248 complain_overflow_dont, /* complain_on_overflow */
249 NULL, /* special_function */
250 "R_MN10300_GNU_VTINHERIT", /* name */
b34976b6 251 FALSE, /* partial_inplace */
252b5132
RH
252 0, /* src_mask */
253 0, /* dst_mask */
b34976b6 254 FALSE), /* pcrel_offset */
252b5132
RH
255
256 /* GNU extension to record C++ vtable member usage */
257 HOWTO (R_MN10300_GNU_VTENTRY, /* type */
258 0, /* rightshift */
259 0, /* size (0 = byte, 1 = short, 2 = long) */
260 0, /* bitsize */
b34976b6 261 FALSE, /* pc_relative */
252b5132
RH
262 0, /* bitpos */
263 complain_overflow_dont, /* complain_on_overflow */
264 NULL, /* special_function */
265 "R_MN10300_GNU_VTENTRY", /* name */
b34976b6 266 FALSE, /* partial_inplace */
252b5132
RH
267 0, /* src_mask */
268 0, /* dst_mask */
b34976b6 269 FALSE), /* pcrel_offset */
252b5132
RH
270
271 /* Standard 24 bit reloc. */
272 HOWTO (R_MN10300_24,
273 0,
274 2,
275 24,
b34976b6 276 FALSE,
252b5132
RH
277 0,
278 complain_overflow_bitfield,
279 bfd_elf_generic_reloc,
280 "R_MN10300_24",
b34976b6 281 FALSE,
252b5132
RH
282 0xffffff,
283 0xffffff,
b34976b6 284 FALSE),
03a12831
AO
285 HOWTO (R_MN10300_GOTPC32, /* type */
286 0, /* rightshift */
287 2, /* size (0 = byte, 1 = short, 2 = long) */
288 32, /* bitsize */
289 TRUE, /* pc_relative */
290 0, /* bitpos */
291 complain_overflow_bitfield, /* complain_on_overflow */
292 bfd_elf_generic_reloc, /* */
293 "R_MN10300_GOTPC32", /* name */
294 FALSE, /* partial_inplace */
295 0xffffffff, /* src_mask */
296 0xffffffff, /* dst_mask */
297 TRUE), /* pcrel_offset */
298
299 HOWTO (R_MN10300_GOTPC16, /* type */
300 0, /* rightshift */
301 1, /* size (0 = byte, 1 = short, 2 = long) */
302 16, /* bitsize */
303 TRUE, /* pc_relative */
304 0, /* bitpos */
305 complain_overflow_bitfield, /* complain_on_overflow */
306 bfd_elf_generic_reloc, /* */
307 "R_MN10300_GOTPC16", /* name */
308 FALSE, /* partial_inplace */
309 0xffff, /* src_mask */
310 0xffff, /* dst_mask */
311 TRUE), /* pcrel_offset */
312
313 HOWTO (R_MN10300_GOTOFF32, /* type */
314 0, /* rightshift */
315 2, /* size (0 = byte, 1 = short, 2 = long) */
316 32, /* bitsize */
317 FALSE, /* pc_relative */
318 0, /* bitpos */
319 complain_overflow_bitfield, /* complain_on_overflow */
320 bfd_elf_generic_reloc, /* */
321 "R_MN10300_GOTOFF32", /* name */
322 FALSE, /* partial_inplace */
323 0xffffffff, /* src_mask */
324 0xffffffff, /* dst_mask */
325 FALSE), /* pcrel_offset */
326
327 HOWTO (R_MN10300_GOTOFF24, /* type */
328 0, /* rightshift */
329 2, /* size (0 = byte, 1 = short, 2 = long) */
330 24, /* bitsize */
331 FALSE, /* pc_relative */
332 0, /* bitpos */
333 complain_overflow_bitfield, /* complain_on_overflow */
334 bfd_elf_generic_reloc, /* */
335 "R_MN10300_GOTOFF24", /* name */
336 FALSE, /* partial_inplace */
337 0xffffff, /* src_mask */
338 0xffffff, /* dst_mask */
339 FALSE), /* pcrel_offset */
340
341 HOWTO (R_MN10300_GOTOFF16, /* type */
342 0, /* rightshift */
343 1, /* size (0 = byte, 1 = short, 2 = long) */
344 16, /* bitsize */
345 FALSE, /* pc_relative */
346 0, /* bitpos */
347 complain_overflow_bitfield, /* complain_on_overflow */
348 bfd_elf_generic_reloc, /* */
349 "R_MN10300_GOTOFF16", /* name */
350 FALSE, /* partial_inplace */
351 0xffff, /* src_mask */
352 0xffff, /* dst_mask */
353 FALSE), /* pcrel_offset */
354
355 HOWTO (R_MN10300_PLT32, /* type */
356 0, /* rightshift */
357 2, /* size (0 = byte, 1 = short, 2 = long) */
358 32, /* bitsize */
359 TRUE, /* pc_relative */
360 0, /* bitpos */
361 complain_overflow_bitfield, /* complain_on_overflow */
362 bfd_elf_generic_reloc, /* */
363 "R_MN10300_PLT32", /* name */
364 FALSE, /* partial_inplace */
365 0xffffffff, /* src_mask */
366 0xffffffff, /* dst_mask */
367 TRUE), /* pcrel_offset */
368
369 HOWTO (R_MN10300_PLT16, /* type */
370 0, /* rightshift */
371 1, /* size (0 = byte, 1 = short, 2 = long) */
372 16, /* bitsize */
373 TRUE, /* pc_relative */
374 0, /* bitpos */
375 complain_overflow_bitfield, /* complain_on_overflow */
376 bfd_elf_generic_reloc, /* */
377 "R_MN10300_PLT16", /* name */
378 FALSE, /* partial_inplace */
379 0xffff, /* src_mask */
380 0xffff, /* dst_mask */
381 TRUE), /* pcrel_offset */
382
383 HOWTO (R_MN10300_GOT32, /* type */
384 0, /* rightshift */
385 2, /* size (0 = byte, 1 = short, 2 = long) */
386 32, /* bitsize */
387 FALSE, /* pc_relative */
388 0, /* bitpos */
389 complain_overflow_bitfield, /* complain_on_overflow */
390 bfd_elf_generic_reloc, /* */
391 "R_MN10300_GOT32", /* name */
392 FALSE, /* partial_inplace */
393 0xffffffff, /* src_mask */
394 0xffffffff, /* dst_mask */
395 FALSE), /* pcrel_offset */
396
397 HOWTO (R_MN10300_GOT24, /* type */
398 0, /* rightshift */
399 2, /* size (0 = byte, 1 = short, 2 = long) */
400 24, /* bitsize */
401 FALSE, /* pc_relative */
402 0, /* bitpos */
403 complain_overflow_bitfield, /* complain_on_overflow */
404 bfd_elf_generic_reloc, /* */
405 "R_MN10300_GOT24", /* name */
406 FALSE, /* partial_inplace */
407 0xffffffff, /* src_mask */
408 0xffffffff, /* dst_mask */
409 FALSE), /* pcrel_offset */
410
411 HOWTO (R_MN10300_GOT16, /* type */
412 0, /* rightshift */
413 1, /* size (0 = byte, 1 = short, 2 = long) */
414 16, /* bitsize */
415 FALSE, /* pc_relative */
416 0, /* bitpos */
417 complain_overflow_bitfield, /* complain_on_overflow */
418 bfd_elf_generic_reloc, /* */
419 "R_MN10300_GOT16", /* name */
420 FALSE, /* partial_inplace */
421 0xffffffff, /* src_mask */
422 0xffffffff, /* dst_mask */
423 FALSE), /* pcrel_offset */
424
425 HOWTO (R_MN10300_COPY, /* type */
426 0, /* rightshift */
427 2, /* size (0 = byte, 1 = short, 2 = long) */
428 32, /* bitsize */
429 FALSE, /* pc_relative */
430 0, /* bitpos */
431 complain_overflow_bitfield, /* complain_on_overflow */
432 bfd_elf_generic_reloc, /* */
433 "R_MN10300_COPY", /* name */
434 FALSE, /* partial_inplace */
435 0xffffffff, /* src_mask */
436 0xffffffff, /* dst_mask */
437 FALSE), /* pcrel_offset */
438
439 HOWTO (R_MN10300_GLOB_DAT, /* type */
440 0, /* rightshift */
441 2, /* size (0 = byte, 1 = short, 2 = long) */
442 32, /* bitsize */
443 FALSE, /* pc_relative */
444 0, /* bitpos */
445 complain_overflow_bitfield, /* complain_on_overflow */
446 bfd_elf_generic_reloc, /* */
447 "R_MN10300_GLOB_DAT", /* name */
448 FALSE, /* partial_inplace */
449 0xffffffff, /* src_mask */
450 0xffffffff, /* dst_mask */
451 FALSE), /* pcrel_offset */
452
453 HOWTO (R_MN10300_JMP_SLOT, /* type */
454 0, /* rightshift */
455 2, /* size (0 = byte, 1 = short, 2 = long) */
456 32, /* bitsize */
457 FALSE, /* pc_relative */
458 0, /* bitpos */
459 complain_overflow_bitfield, /* complain_on_overflow */
460 bfd_elf_generic_reloc, /* */
461 "R_MN10300_JMP_SLOT", /* name */
462 FALSE, /* partial_inplace */
463 0xffffffff, /* src_mask */
464 0xffffffff, /* dst_mask */
465 FALSE), /* pcrel_offset */
466
467 HOWTO (R_MN10300_RELATIVE, /* type */
468 0, /* rightshift */
469 2, /* size (0 = byte, 1 = short, 2 = long) */
470 32, /* bitsize */
471 FALSE, /* pc_relative */
472 0, /* bitpos */
473 complain_overflow_bitfield, /* complain_on_overflow */
474 bfd_elf_generic_reloc, /* */
475 "R_MN10300_RELATIVE", /* name */
476 FALSE, /* partial_inplace */
477 0xffffffff, /* src_mask */
478 0xffffffff, /* dst_mask */
479 FALSE), /* pcrel_offset */
bfff1642 480
0a22ae8e
NC
481 HOWTO (R_MN10300_TLS_GD, /* type */
482 0, /* rightshift */
483 2, /* size (0 = byte, 1 = short, 2 = long) */
484 32, /* bitsize */
485 FALSE, /* pc_relative */
486 0, /* bitpos */
487 complain_overflow_bitfield, /* complain_on_overflow */
488 bfd_elf_generic_reloc, /* */
489 "R_MN10300_TLS_GD", /* name */
490 FALSE, /* partial_inplace */
491 0xffffffff, /* src_mask */
492 0xffffffff, /* dst_mask */
493 FALSE), /* pcrel_offset */
494
495 HOWTO (R_MN10300_TLS_LD, /* type */
496 0, /* rightshift */
497 2, /* size (0 = byte, 1 = short, 2 = long) */
498 32, /* bitsize */
499 FALSE, /* pc_relative */
500 0, /* bitpos */
501 complain_overflow_bitfield, /* complain_on_overflow */
502 bfd_elf_generic_reloc, /* */
503 "R_MN10300_TLS_LD", /* name */
504 FALSE, /* partial_inplace */
505 0xffffffff, /* src_mask */
506 0xffffffff, /* dst_mask */
507 FALSE), /* pcrel_offset */
508
509 HOWTO (R_MN10300_TLS_LDO, /* type */
510 0, /* rightshift */
511 2, /* size (0 = byte, 1 = short, 2 = long) */
512 32, /* bitsize */
513 FALSE, /* pc_relative */
514 0, /* bitpos */
515 complain_overflow_bitfield, /* complain_on_overflow */
516 bfd_elf_generic_reloc, /* */
517 "R_MN10300_TLS_LDO", /* name */
518 FALSE, /* partial_inplace */
519 0xffffffff, /* src_mask */
520 0xffffffff, /* dst_mask */
521 FALSE), /* pcrel_offset */
522
523 HOWTO (R_MN10300_TLS_GOTIE, /* type */
524 0, /* rightshift */
525 2, /* size (0 = byte, 1 = short, 2 = long) */
526 32, /* bitsize */
527 FALSE, /* pc_relative */
528 0, /* bitpos */
529 complain_overflow_bitfield, /* complain_on_overflow */
530 bfd_elf_generic_reloc, /* */
531 "R_MN10300_TLS_GOTIE", /* name */
532 FALSE, /* partial_inplace */
533 0xffffffff, /* src_mask */
534 0xffffffff, /* dst_mask */
535 FALSE), /* pcrel_offset */
536
537 HOWTO (R_MN10300_TLS_IE, /* type */
538 0, /* rightshift */
539 2, /* size (0 = byte, 1 = short, 2 = long) */
540 32, /* bitsize */
541 FALSE, /* pc_relative */
542 0, /* bitpos */
543 complain_overflow_bitfield, /* complain_on_overflow */
544 bfd_elf_generic_reloc, /* */
545 "R_MN10300_TLS_IE", /* name */
546 FALSE, /* partial_inplace */
547 0xffffffff, /* src_mask */
548 0xffffffff, /* dst_mask */
549 FALSE), /* pcrel_offset */
550
551 HOWTO (R_MN10300_TLS_LE, /* type */
552 0, /* rightshift */
553 2, /* size (0 = byte, 1 = short, 2 = long) */
554 32, /* bitsize */
555 FALSE, /* pc_relative */
556 0, /* bitpos */
557 complain_overflow_bitfield, /* complain_on_overflow */
558 bfd_elf_generic_reloc, /* */
559 "R_MN10300_TLS_LE", /* name */
560 FALSE, /* partial_inplace */
561 0xffffffff, /* src_mask */
562 0xffffffff, /* dst_mask */
563 FALSE), /* pcrel_offset */
564
565 HOWTO (R_MN10300_TLS_DTPMOD, /* type */
566 0, /* rightshift */
567 2, /* size (0 = byte, 1 = short, 2 = long) */
568 32, /* bitsize */
569 FALSE, /* pc_relative */
570 0, /* bitpos */
571 complain_overflow_bitfield, /* complain_on_overflow */
572 bfd_elf_generic_reloc, /* */
573 "R_MN10300_TLS_DTPMOD", /* name */
574 FALSE, /* partial_inplace */
575 0xffffffff, /* src_mask */
576 0xffffffff, /* dst_mask */
577 FALSE), /* pcrel_offset */
578
579 HOWTO (R_MN10300_TLS_DTPOFF, /* type */
580 0, /* rightshift */
581 2, /* size (0 = byte, 1 = short, 2 = long) */
582 32, /* bitsize */
583 FALSE, /* pc_relative */
584 0, /* bitpos */
585 complain_overflow_bitfield, /* complain_on_overflow */
586 bfd_elf_generic_reloc, /* */
587 "R_MN10300_TLS_DTPOFF", /* name */
588 FALSE, /* partial_inplace */
589 0xffffffff, /* src_mask */
590 0xffffffff, /* dst_mask */
591 FALSE), /* pcrel_offset */
592
593 HOWTO (R_MN10300_TLS_TPOFF, /* type */
594 0, /* rightshift */
595 2, /* size (0 = byte, 1 = short, 2 = long) */
596 32, /* bitsize */
597 FALSE, /* pc_relative */
598 0, /* bitpos */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* */
601 "R_MN10300_TLS_TPOFF", /* name */
602 FALSE, /* partial_inplace */
603 0xffffffff, /* src_mask */
604 0xffffffff, /* dst_mask */
605 FALSE), /* pcrel_offset */
68ffbac6 606
bfff1642
NC
607 HOWTO (R_MN10300_SYM_DIFF, /* type */
608 0, /* rightshift */
609 2, /* size (0 = byte, 1 = short, 2 = long) */
610 32, /* bitsize */
611 FALSE, /* pc_relative */
612 0, /* bitpos */
613 complain_overflow_dont,/* complain_on_overflow */
07d6d2b8 614 NULL, /* special handler. */
bfff1642
NC
615 "R_MN10300_SYM_DIFF", /* name */
616 FALSE, /* partial_inplace */
617 0xffffffff, /* src_mask */
618 0xffffffff, /* dst_mask */
569006e5
NC
619 FALSE), /* pcrel_offset */
620
621 HOWTO (R_MN10300_ALIGN, /* type */
622 0, /* rightshift */
623 0, /* size (0 = byte, 1 = short, 2 = long) */
624 32, /* bitsize */
625 FALSE, /* pc_relative */
626 0, /* bitpos */
627 complain_overflow_dont,/* complain_on_overflow */
07d6d2b8 628 NULL, /* special handler. */
569006e5
NC
629 "R_MN10300_ALIGN", /* name */
630 FALSE, /* partial_inplace */
631 0, /* src_mask */
632 0, /* dst_mask */
bfff1642 633 FALSE) /* pcrel_offset */
252b5132
RH
634};
635
603b7257
NC
636struct mn10300_reloc_map
637{
252b5132
RH
638 bfd_reloc_code_real_type bfd_reloc_val;
639 unsigned char elf_reloc_val;
640};
641
603b7257
NC
642static const struct mn10300_reloc_map mn10300_reloc_map[] =
643{
252b5132
RH
644 { BFD_RELOC_NONE, R_MN10300_NONE, },
645 { BFD_RELOC_32, R_MN10300_32, },
646 { BFD_RELOC_16, R_MN10300_16, },
647 { BFD_RELOC_8, R_MN10300_8, },
648 { BFD_RELOC_32_PCREL, R_MN10300_PCREL32, },
649 { BFD_RELOC_16_PCREL, R_MN10300_PCREL16, },
650 { BFD_RELOC_8_PCREL, R_MN10300_PCREL8, },
651 { BFD_RELOC_24, R_MN10300_24, },
652 { BFD_RELOC_VTABLE_INHERIT, R_MN10300_GNU_VTINHERIT },
653 { BFD_RELOC_VTABLE_ENTRY, R_MN10300_GNU_VTENTRY },
03a12831
AO
654 { BFD_RELOC_32_GOT_PCREL, R_MN10300_GOTPC32 },
655 { BFD_RELOC_16_GOT_PCREL, R_MN10300_GOTPC16 },
656 { BFD_RELOC_32_GOTOFF, R_MN10300_GOTOFF32 },
657 { BFD_RELOC_MN10300_GOTOFF24, R_MN10300_GOTOFF24 },
658 { BFD_RELOC_16_GOTOFF, R_MN10300_GOTOFF16 },
659 { BFD_RELOC_32_PLT_PCREL, R_MN10300_PLT32 },
660 { BFD_RELOC_16_PLT_PCREL, R_MN10300_PLT16 },
661 { BFD_RELOC_MN10300_GOT32, R_MN10300_GOT32 },
662 { BFD_RELOC_MN10300_GOT24, R_MN10300_GOT24 },
663 { BFD_RELOC_MN10300_GOT16, R_MN10300_GOT16 },
664 { BFD_RELOC_MN10300_COPY, R_MN10300_COPY },
665 { BFD_RELOC_MN10300_GLOB_DAT, R_MN10300_GLOB_DAT },
666 { BFD_RELOC_MN10300_JMP_SLOT, R_MN10300_JMP_SLOT },
667 { BFD_RELOC_MN10300_RELATIVE, R_MN10300_RELATIVE },
0a22ae8e
NC
668 { BFD_RELOC_MN10300_TLS_GD, R_MN10300_TLS_GD },
669 { BFD_RELOC_MN10300_TLS_LD, R_MN10300_TLS_LD },
670 { BFD_RELOC_MN10300_TLS_LDO, R_MN10300_TLS_LDO },
671 { BFD_RELOC_MN10300_TLS_GOTIE, R_MN10300_TLS_GOTIE },
672 { BFD_RELOC_MN10300_TLS_IE, R_MN10300_TLS_IE },
673 { BFD_RELOC_MN10300_TLS_LE, R_MN10300_TLS_LE },
674 { BFD_RELOC_MN10300_TLS_DTPMOD, R_MN10300_TLS_DTPMOD },
675 { BFD_RELOC_MN10300_TLS_DTPOFF, R_MN10300_TLS_DTPOFF },
676 { BFD_RELOC_MN10300_TLS_TPOFF, R_MN10300_TLS_TPOFF },
569006e5
NC
677 { BFD_RELOC_MN10300_SYM_DIFF, R_MN10300_SYM_DIFF },
678 { BFD_RELOC_MN10300_ALIGN, R_MN10300_ALIGN }
252b5132
RH
679};
680
03a12831
AO
681/* Create the GOT section. */
682
683static bfd_boolean
603b7257
NC
684_bfd_mn10300_elf_create_got_section (bfd * abfd,
685 struct bfd_link_info * info)
03a12831
AO
686{
687 flagword flags;
688 flagword pltflags;
689 asection * s;
690 struct elf_link_hash_entry * h;
9c5bfbb7 691 const struct elf_backend_data * bed = get_elf_backend_data (abfd);
3d4d4302 692 struct elf_link_hash_table *htab;
03a12831
AO
693 int ptralign;
694
695 /* This function may be called more than once. */
3d4d4302
AM
696 htab = elf_hash_table (info);
697 if (htab->sgot != NULL)
03a12831
AO
698 return TRUE;
699
700 switch (bed->s->arch_size)
701 {
702 case 32:
703 ptralign = 2;
704 break;
705
706 case 64:
707 ptralign = 3;
708 break;
709
710 default:
711 bfd_set_error (bfd_error_bad_value);
712 return FALSE;
713 }
714
715 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
716 | SEC_LINKER_CREATED);
717
718 pltflags = flags;
719 pltflags |= SEC_CODE;
720 if (bed->plt_not_loaded)
721 pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
722 if (bed->plt_readonly)
723 pltflags |= SEC_READONLY;
724
3d4d4302
AM
725 s = bfd_make_section_anyway_with_flags (abfd, ".plt", pltflags);
726 htab->splt = s;
03a12831 727 if (s == NULL
03a12831
AO
728 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
729 return FALSE;
730
d98685ac
AM
731 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
732 .plt section. */
7325306f
RS
733 if (bed->want_plt_sym)
734 {
735 h = _bfd_elf_define_linkage_sym (abfd, info, s,
736 "_PROCEDURE_LINKAGE_TABLE_");
3d4d4302 737 htab->hplt = h;
7325306f
RS
738 if (h == NULL)
739 return FALSE;
740 }
03a12831 741
3d4d4302
AM
742 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
743 htab->sgot = s;
03a12831 744 if (s == NULL
03a12831
AO
745 || ! bfd_set_section_alignment (abfd, s, ptralign))
746 return FALSE;
747
748 if (bed->want_got_plt)
749 {
3d4d4302
AM
750 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
751 htab->sgotplt = s;
03a12831 752 if (s == NULL
03a12831
AO
753 || ! bfd_set_section_alignment (abfd, s, ptralign))
754 return FALSE;
755 }
756
757 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
758 (or .got.plt) section. We don't do this in the linker script
759 because we don't want to define the symbol if we are not creating
760 a global offset table. */
d98685ac 761 h = _bfd_elf_define_linkage_sym (abfd, info, s, "_GLOBAL_OFFSET_TABLE_");
3d4d4302 762 htab->hgot = h;
d98685ac
AM
763 if (h == NULL)
764 return FALSE;
03a12831
AO
765
766 /* The first bit of the global offset table is the header. */
3b36f7e6 767 s->size += bed->got_header_size;
03a12831
AO
768
769 return TRUE;
770}
771
252b5132 772static reloc_howto_type *
603b7257
NC
773bfd_elf32_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
774 bfd_reloc_code_real_type code)
252b5132
RH
775{
776 unsigned int i;
777
603b7257
NC
778 for (i = ARRAY_SIZE (mn10300_reloc_map); i--;)
779 if (mn10300_reloc_map[i].bfd_reloc_val == code)
780 return &elf_mn10300_howto_table[mn10300_reloc_map[i].elf_reloc_val];
252b5132
RH
781
782 return NULL;
783}
784
157090f7
AM
785static reloc_howto_type *
786bfd_elf32_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
787 const char *r_name)
788{
789 unsigned int i;
790
603b7257 791 for (i = ARRAY_SIZE (elf_mn10300_howto_table); i--;)
157090f7
AM
792 if (elf_mn10300_howto_table[i].name != NULL
793 && strcasecmp (elf_mn10300_howto_table[i].name, r_name) == 0)
603b7257 794 return elf_mn10300_howto_table + i;
157090f7
AM
795
796 return NULL;
797}
798
252b5132
RH
799/* Set the howto pointer for an MN10300 ELF reloc. */
800
801static void
603b7257
NC
802mn10300_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
803 arelent *cache_ptr,
804 Elf_Internal_Rela *dst)
252b5132
RH
805{
806 unsigned int r_type;
807
808 r_type = ELF32_R_TYPE (dst->r_info);
cd21f5da
NC
809 if (r_type >= R_MN10300_MAX)
810 {
695344c0 811 /* xgettext:c-format */
4eca0228
AM
812 _bfd_error_handler (_("%B: unrecognised MN10300 reloc number: %d"),
813 abfd, r_type);
cd21f5da
NC
814 bfd_set_error (bfd_error_bad_value);
815 r_type = R_MN10300_NONE;
816 }
603b7257 817 cache_ptr->howto = elf_mn10300_howto_table + r_type;
252b5132
RH
818}
819
0a22ae8e 820static int
07d6d2b8
AM
821elf_mn10300_tls_transition (struct bfd_link_info * info,
822 int r_type,
0a22ae8e 823 struct elf_link_hash_entry * h,
07d6d2b8
AM
824 asection * sec,
825 bfd_boolean counting)
0a22ae8e
NC
826{
827 bfd_boolean is_local;
828
829 if (r_type == R_MN10300_TLS_GD
830 && h != NULL
831 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_IE)
832 return R_MN10300_TLS_GOTIE;
833
0e1862bb 834 if (bfd_link_pic (info))
0a22ae8e
NC
835 return r_type;
836
837 if (! (sec->flags & SEC_CODE))
838 return r_type;
839
840 if (! counting && h != NULL && ! elf_hash_table (info)->dynamic_sections_created)
841 is_local = TRUE;
842 else
843 is_local = SYMBOL_CALLS_LOCAL (info, h);
844
845 /* For the main program, these are the transitions we do. */
846 switch (r_type)
847 {
848 case R_MN10300_TLS_GD: return is_local ? R_MN10300_TLS_LE : R_MN10300_TLS_GOTIE;
849 case R_MN10300_TLS_LD: return R_MN10300_NONE;
850 case R_MN10300_TLS_LDO: return R_MN10300_TLS_LE;
851 case R_MN10300_TLS_IE:
852 case R_MN10300_TLS_GOTIE: return is_local ? R_MN10300_TLS_LE : r_type;
853 }
854
855 return r_type;
856}
857
858/* Return the relocation value for @tpoff relocation
859 if STT_TLS virtual address is ADDRESS. */
860
861static bfd_vma
862dtpoff (struct bfd_link_info * info, bfd_vma address)
863{
864 struct elf_link_hash_table *htab = elf_hash_table (info);
865
866 /* If tls_sec is NULL, we should have signalled an error already. */
867 if (htab->tls_sec == NULL)
868 return 0;
869 return address - htab->tls_sec->vma;
870}
871
872/* Return the relocation value for @tpoff relocation
873 if STT_TLS virtual address is ADDRESS. */
874
875static bfd_vma
876tpoff (struct bfd_link_info * info, bfd_vma address)
877{
878 struct elf_link_hash_table *htab = elf_hash_table (info);
879
880 /* If tls_sec is NULL, we should have signalled an error already. */
881 if (htab->tls_sec == NULL)
882 return 0;
883 return address - (htab->tls_size + htab->tls_sec->vma);
884}
885
886/* Returns nonzero if there's a R_MN10300_PLT32 reloc that we now need
887 to skip, after this one. The actual value is the offset between
888 this reloc and the PLT reloc. */
889
890static int
07d6d2b8
AM
891mn10300_do_tls_transition (bfd * input_bfd,
892 unsigned int r_type,
893 unsigned int tls_r_type,
894 bfd_byte * contents,
895 bfd_vma offset)
0a22ae8e
NC
896{
897 bfd_byte *op = contents + offset;
898 int gotreg = 0;
899
900#define TLS_PAIR(r1,r2) ((r1) * R_MN10300_MAX + (r2))
901
902 /* This is common to all GD/LD transitions, so break it out. */
903 if (r_type == R_MN10300_TLS_GD
904 || r_type == R_MN10300_TLS_LD)
905 {
906 op -= 2;
907 /* mov imm,d0. */
908 BFD_ASSERT (bfd_get_8 (input_bfd, op) == 0xFC);
909 BFD_ASSERT (bfd_get_8 (input_bfd, op + 1) == 0xCC);
910 /* add aN,d0. */
911 BFD_ASSERT (bfd_get_8 (input_bfd, op + 6) == 0xF1);
912 gotreg = (bfd_get_8 (input_bfd, op + 7) & 0x0c) >> 2;
913 /* Call. */
914 BFD_ASSERT (bfd_get_8 (input_bfd, op + 8) == 0xDD);
915 }
916
917 switch (TLS_PAIR (r_type, tls_r_type))
918 {
919 case TLS_PAIR (R_MN10300_TLS_GD, R_MN10300_TLS_GOTIE):
920 {
921 /* Keep track of which register we put GOTptr in. */
922 /* mov (_x@indntpoff,a2),a0. */
923 memcpy (op, "\xFC\x20\x00\x00\x00\x00", 6);
924 op[1] |= gotreg;
925 /* add e2,a0. */
926 memcpy (op+6, "\xF9\x78\x28", 3);
927 /* or 0x00000000, d0 - six byte nop. */
928 memcpy (op+9, "\xFC\xE4\x00\x00\x00\x00", 6);
929 }
930 return 7;
931
932 case TLS_PAIR (R_MN10300_TLS_GD, R_MN10300_TLS_LE):
933 {
934 /* Register is *always* a0. */
935 /* mov _x@tpoff,a0. */
936 memcpy (op, "\xFC\xDC\x00\x00\x00\x00", 6);
937 /* add e2,a0. */
938 memcpy (op+6, "\xF9\x78\x28", 3);
939 /* or 0x00000000, d0 - six byte nop. */
940 memcpy (op+9, "\xFC\xE4\x00\x00\x00\x00", 6);
941 }
942 return 7;
943 case TLS_PAIR (R_MN10300_TLS_LD, R_MN10300_NONE):
944 {
945 /* Register is *always* a0. */
946 /* mov e2,a0. */
947 memcpy (op, "\xF5\x88", 2);
948 /* or 0x00000000, d0 - six byte nop. */
949 memcpy (op+2, "\xFC\xE4\x00\x00\x00\x00", 6);
950 /* or 0x00000000, e2 - seven byte nop. */
951 memcpy (op+8, "\xFE\x19\x22\x00\x00\x00\x00", 7);
952 }
953 return 7;
954
955 case TLS_PAIR (R_MN10300_TLS_LDO, R_MN10300_TLS_LE):
956 /* No changes needed, just the reloc change. */
957 return 0;
958
959 /* These are a little tricky, because we have to detect which
960 opcode is being used (they're different sizes, with the reloc
961 at different offsets within the opcode) and convert each
962 accordingly, copying the operands as needed. The conversions
963 we do are as follows (IE,GOTIE,LE):
964
07d6d2b8
AM
965 1111 1100 1010 01Dn [-- abs32 --] MOV (x@indntpoff),Dn
966 1111 1100 0000 DnAm [-- abs32 --] MOV (x@gotntpoff,Am),Dn
967 1111 1100 1100 11Dn [-- abs32 --] MOV x@tpoff,Dn
0a22ae8e 968
07d6d2b8
AM
969 1111 1100 1010 00An [-- abs32 --] MOV (x@indntpoff),An
970 1111 1100 0010 AnAm [-- abs32 --] MOV (x@gotntpoff,Am),An
971 1111 1100 1101 11An [-- abs32 --] MOV x@tpoff,An
0a22ae8e
NC
972
973 1111 1110 0000 1110 Rnnn Xxxx [-- abs32 --] MOV (x@indntpoff),Rn
974 1111 1110 0000 1010 Rnnn Rmmm [-- abs32 --] MOV (x@indntpoff,Rm),Rn
975 1111 1110 0000 1000 Rnnn Xxxx [-- abs32 --] MOV x@tpoff,Rn
976
977 Since the GOT pointer is always $a2, we assume the last
978 normally won't happen, but let's be paranoid and plan for the
979 day that GCC optimizes it somewhow. */
980
981 case TLS_PAIR (R_MN10300_TLS_IE, R_MN10300_TLS_LE):
982 if (op[-2] == 0xFC)
983 {
984 op -= 2;
985 if ((op[1] & 0xFC) == 0xA4) /* Dn */
986 {
987 op[1] &= 0x03; /* Leaves Dn. */
988 op[1] |= 0xCC;
989 }
990 else /* An */
991 {
992 op[1] &= 0x03; /* Leaves An. */
993 op[1] |= 0xDC;
994 }
995 }
996 else if (op[-3] == 0xFE)
997 op[-2] = 0x08;
998 else
999 abort ();
1000 break;
1001
1002 case TLS_PAIR (R_MN10300_TLS_GOTIE, R_MN10300_TLS_LE):
1003 if (op[-2] == 0xFC)
1004 {
1005 op -= 2;
1006 if ((op[1] & 0xF0) == 0x00) /* Dn */
1007 {
1008 op[1] &= 0x0C; /* Leaves Dn. */
1009 op[1] >>= 2;
1010 op[1] |= 0xCC;
1011 }
1012 else /* An */
1013 {
1014 op[1] &= 0x0C; /* Leaves An. */
1015 op[1] >>= 2;
1016 op[1] |= 0xDC;
1017 }
1018 }
1019 else if (op[-3] == 0xFE)
1020 op[-2] = 0x08;
1021 else
1022 abort ();
1023 break;
1024
1025 default:
4eca0228 1026 _bfd_error_handler
695344c0 1027 /* xgettext:c-format */
dae82561
AM
1028 (_("%B: Unsupported transition from %s to %s"),
1029 input_bfd,
0a22ae8e
NC
1030 elf_mn10300_howto_table[r_type].name,
1031 elf_mn10300_howto_table[tls_r_type].name);
1032 break;
1033 }
1034#undef TLS_PAIR
1035 return 0;
1036}
1037
252b5132
RH
1038/* Look through the relocs for a section during the first phase.
1039 Since we don't do .gots or .plts, we just need to consider the
1040 virtual table relocs for gc. */
1041
b34976b6 1042static bfd_boolean
603b7257
NC
1043mn10300_elf_check_relocs (bfd *abfd,
1044 struct bfd_link_info *info,
1045 asection *sec,
1046 const Elf_Internal_Rela *relocs)
252b5132 1047{
0a22ae8e 1048 struct elf32_mn10300_link_hash_table * htab = elf32_mn10300_hash_table (info);
bfff1642 1049 bfd_boolean sym_diff_reloc_seen;
252b5132 1050 Elf_Internal_Shdr *symtab_hdr;
62d7f790 1051 Elf_Internal_Sym * isymbuf = NULL;
5582a088 1052 struct elf_link_hash_entry **sym_hashes;
252b5132
RH
1053 const Elf_Internal_Rela *rel;
1054 const Elf_Internal_Rela *rel_end;
03a12831
AO
1055 bfd * dynobj;
1056 bfd_vma * local_got_offsets;
1057 asection * sgot;
1058 asection * srelgot;
1059 asection * sreloc;
62d7f790 1060 bfd_boolean result = FALSE;
03a12831
AO
1061
1062 sgot = NULL;
1063 srelgot = NULL;
1064 sreloc = NULL;
252b5132 1065
0e1862bb 1066 if (bfd_link_relocatable (info))
b34976b6 1067 return TRUE;
252b5132
RH
1068
1069 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
62d7f790 1070 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
252b5132 1071 sym_hashes = elf_sym_hashes (abfd);
252b5132 1072
03a12831
AO
1073 dynobj = elf_hash_table (info)->dynobj;
1074 local_got_offsets = elf_local_got_offsets (abfd);
252b5132 1075 rel_end = relocs + sec->reloc_count;
bfff1642 1076 sym_diff_reloc_seen = FALSE;
603b7257 1077
252b5132
RH
1078 for (rel = relocs; rel < rel_end; rel++)
1079 {
1080 struct elf_link_hash_entry *h;
1081 unsigned long r_symndx;
62d7f790 1082 unsigned int r_type;
0a22ae8e 1083 int tls_type = GOT_NORMAL;
252b5132
RH
1084
1085 r_symndx = ELF32_R_SYM (rel->r_info);
1086 if (r_symndx < symtab_hdr->sh_info)
1087 h = NULL;
1088 else
973a3492
L
1089 {
1090 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1091 while (h->root.type == bfd_link_hash_indirect
1092 || h->root.type == bfd_link_hash_warning)
1093 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1094 }
252b5132 1095
62d7f790 1096 r_type = ELF32_R_TYPE (rel->r_info);
0a22ae8e 1097 r_type = elf_mn10300_tls_transition (info, r_type, h, sec, TRUE);
62d7f790 1098
03a12831
AO
1099 /* Some relocs require a global offset table. */
1100 if (dynobj == NULL)
1101 {
62d7f790 1102 switch (r_type)
03a12831
AO
1103 {
1104 case R_MN10300_GOT32:
1105 case R_MN10300_GOT24:
1106 case R_MN10300_GOT16:
1107 case R_MN10300_GOTOFF32:
1108 case R_MN10300_GOTOFF24:
1109 case R_MN10300_GOTOFF16:
1110 case R_MN10300_GOTPC32:
1111 case R_MN10300_GOTPC16:
0a22ae8e
NC
1112 case R_MN10300_TLS_GD:
1113 case R_MN10300_TLS_LD:
1114 case R_MN10300_TLS_GOTIE:
1115 case R_MN10300_TLS_IE:
03a12831
AO
1116 elf_hash_table (info)->dynobj = dynobj = abfd;
1117 if (! _bfd_mn10300_elf_create_got_section (dynobj, info))
62d7f790 1118 goto fail;
03a12831
AO
1119 break;
1120
1121 default:
1122 break;
1123 }
1124 }
1125
62d7f790 1126 switch (r_type)
252b5132
RH
1127 {
1128 /* This relocation describes the C++ object vtable hierarchy.
1129 Reconstruct it for later use during GC. */
1130 case R_MN10300_GNU_VTINHERIT:
c152c796 1131 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
62d7f790 1132 goto fail;
252b5132
RH
1133 break;
1134
1135 /* This relocation describes which C++ vtable entries are actually
1136 used. Record for later use during GC. */
1137 case R_MN10300_GNU_VTENTRY:
d17e0c6e
JB
1138 BFD_ASSERT (h != NULL);
1139 if (h != NULL
1140 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
62d7f790 1141 goto fail;
252b5132 1142 break;
62d7f790 1143
0a22ae8e
NC
1144 case R_MN10300_TLS_LD:
1145 htab->tls_ldm_got.refcount ++;
1146 tls_type = GOT_TLS_LD;
1147
1148 if (htab->tls_ldm_got.got_allocated)
1149 break;
1150 goto create_got;
1151
1152 case R_MN10300_TLS_IE:
1153 case R_MN10300_TLS_GOTIE:
0e1862bb 1154 if (bfd_link_pic (info))
0a22ae8e
NC
1155 info->flags |= DF_STATIC_TLS;
1156 /* Fall through */
68ffbac6 1157
0a22ae8e 1158 case R_MN10300_TLS_GD:
03a12831
AO
1159 case R_MN10300_GOT32:
1160 case R_MN10300_GOT24:
1161 case R_MN10300_GOT16:
0a22ae8e 1162 create_got:
03a12831
AO
1163 /* This symbol requires a global offset table entry. */
1164
0a22ae8e
NC
1165 switch (r_type)
1166 {
1167 case R_MN10300_TLS_IE:
1168 case R_MN10300_TLS_GOTIE: tls_type = GOT_TLS_IE; break;
1169 case R_MN10300_TLS_GD: tls_type = GOT_TLS_GD; break;
07d6d2b8 1170 default: tls_type = GOT_NORMAL; break;
0a22ae8e
NC
1171 }
1172
ce558b89
AM
1173 sgot = htab->root.sgot;
1174 srelgot = htab->root.srelgot;
1175 BFD_ASSERT (sgot != NULL && srelgot != NULL);
03a12831 1176
0a22ae8e
NC
1177 if (r_type == R_MN10300_TLS_LD)
1178 {
1179 htab->tls_ldm_got.offset = sgot->size;
1180 htab->tls_ldm_got.got_allocated ++;
1181 }
1182 else if (h != NULL)
03a12831 1183 {
0a22ae8e
NC
1184 if (elf_mn10300_hash_entry (h)->tls_type != tls_type
1185 && elf_mn10300_hash_entry (h)->tls_type != GOT_UNKNOWN)
1186 {
1187 if (tls_type == GOT_TLS_IE
1188 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_GD)
1189 /* No change - this is ok. */;
1190 else if (tls_type == GOT_TLS_GD
1191 && elf_mn10300_hash_entry (h)->tls_type == GOT_TLS_IE)
1192 /* Transition GD->IE. */
1193 tls_type = GOT_TLS_IE;
1194 else
4eca0228 1195 _bfd_error_handler
695344c0 1196 /* xgettext:c-format */
0a22ae8e
NC
1197 (_("%B: %s' accessed both as normal and thread local symbol"),
1198 abfd, h ? h->root.root.string : "<local>");
1199 }
1200
1201 elf_mn10300_hash_entry (h)->tls_type = tls_type;
1202
03a12831
AO
1203 if (h->got.offset != (bfd_vma) -1)
1204 /* We have already allocated space in the .got. */
1205 break;
1206
eea6121a 1207 h->got.offset = sgot->size;
03a12831 1208
0a22ae8e
NC
1209 if (ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1210 /* Make sure this symbol is output as a dynamic symbol. */
1211 && h->dynindx == -1)
03a12831 1212 {
c152c796 1213 if (! bfd_elf_link_record_dynamic_symbol (info, h))
62d7f790 1214 goto fail;
03a12831
AO
1215 }
1216
eea6121a 1217 srelgot->size += sizeof (Elf32_External_Rela);
0a22ae8e
NC
1218 if (r_type == R_MN10300_TLS_GD)
1219 srelgot->size += sizeof (Elf32_External_Rela);
03a12831
AO
1220 }
1221 else
1222 {
1223 /* This is a global offset table entry for a local
3b36f7e6 1224 symbol. */
03a12831
AO
1225 if (local_got_offsets == NULL)
1226 {
1227 size_t size;
1228 unsigned int i;
1229
0a22ae8e 1230 size = symtab_hdr->sh_info * (sizeof (bfd_vma) + sizeof (char));
603b7257 1231 local_got_offsets = bfd_alloc (abfd, size);
03a12831
AO
1232
1233 if (local_got_offsets == NULL)
62d7f790
NC
1234 goto fail;
1235
03a12831 1236 elf_local_got_offsets (abfd) = local_got_offsets;
0a22ae8e
NC
1237 elf_mn10300_local_got_tls_type (abfd)
1238 = (char *) (local_got_offsets + symtab_hdr->sh_info);
03a12831
AO
1239
1240 for (i = 0; i < symtab_hdr->sh_info; i++)
1241 local_got_offsets[i] = (bfd_vma) -1;
1242 }
1243
1244 if (local_got_offsets[r_symndx] != (bfd_vma) -1)
1245 /* We have already allocated space in the .got. */
1246 break;
1247
eea6121a 1248 local_got_offsets[r_symndx] = sgot->size;
03a12831 1249
0e1862bb 1250 if (bfd_link_pic (info))
0a22ae8e
NC
1251 {
1252 /* If we are generating a shared object, we need to
1253 output a R_MN10300_RELATIVE reloc so that the dynamic
1254 linker can adjust this GOT entry. */
1255 srelgot->size += sizeof (Elf32_External_Rela);
1256
1257 if (r_type == R_MN10300_TLS_GD)
1258 /* And a R_MN10300_TLS_DTPOFF reloc as well. */
1259 srelgot->size += sizeof (Elf32_External_Rela);
1260 }
1261
1262 elf_mn10300_local_got_tls_type (abfd) [r_symndx] = tls_type;
03a12831
AO
1263 }
1264
eea6121a 1265 sgot->size += 4;
0a22ae8e
NC
1266 if (r_type == R_MN10300_TLS_GD
1267 || r_type == R_MN10300_TLS_LD)
1268 sgot->size += 4;
1269
1270 goto need_shared_relocs;
03a12831
AO
1271
1272 case R_MN10300_PLT32:
1273 case R_MN10300_PLT16:
1274 /* This symbol requires a procedure linkage table entry. We
1275 actually build the entry in adjust_dynamic_symbol,
1276 because this might be a case of linking PIC code which is
1277 never referenced by a dynamic object, in which case we
1278 don't need to generate a procedure linkage table entry
1279 after all. */
1280
1281 /* If this is a local symbol, we resolve it directly without
1282 creating a procedure linkage table entry. */
1283 if (h == NULL)
1284 continue;
1285
1286 if (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
1287 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN)
1288 break;
1289
f5385ebf 1290 h->needs_plt = 1;
03a12831
AO
1291 break;
1292
03a12831
AO
1293 case R_MN10300_24:
1294 case R_MN10300_16:
1295 case R_MN10300_8:
1296 case R_MN10300_PCREL32:
1297 case R_MN10300_PCREL16:
1298 case R_MN10300_PCREL8:
1299 if (h != NULL)
f5385ebf 1300 h->non_got_ref = 1;
146ccdbb 1301 break;
03a12831 1302
bfff1642
NC
1303 case R_MN10300_SYM_DIFF:
1304 sym_diff_reloc_seen = TRUE;
1305 break;
1306
146ccdbb
AO
1307 case R_MN10300_32:
1308 if (h != NULL)
f5385ebf 1309 h->non_got_ref = 1;
146ccdbb 1310
0a22ae8e 1311 need_shared_relocs:
bfff1642
NC
1312 /* If we are creating a shared library, then we
1313 need to copy the reloc into the shared library. */
0e1862bb 1314 if (bfd_link_pic (info)
bfff1642
NC
1315 && (sec->flags & SEC_ALLOC) != 0
1316 /* Do not generate a dynamic reloc for a
1317 reloc associated with a SYM_DIFF operation. */
1318 && ! sym_diff_reloc_seen)
03a12831 1319 {
bfff1642 1320 asection * sym_section = NULL;
03a12831 1321
bfff1642
NC
1322 /* Find the section containing the
1323 symbol involved in the relocation. */
1324 if (h == NULL)
1325 {
bfff1642
NC
1326 Elf_Internal_Sym * isym;
1327
bfff1642
NC
1328 if (isymbuf == NULL)
1329 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
1330 symtab_hdr->sh_info, 0,
1331 NULL, NULL, NULL);
1332 if (isymbuf)
1333 {
1334 isym = isymbuf + r_symndx;
1335 /* All we care about is whether this local symbol is absolute. */
1336 if (isym->st_shndx == SHN_ABS)
1337 sym_section = bfd_abs_section_ptr;
1338 }
1339 }
1340 else
1341 {
1342 if (h->root.type == bfd_link_hash_defined
1343 || h->root.type == bfd_link_hash_defweak)
1344 sym_section = h->root.u.def.section;
1345 }
03a12831 1346
bfff1642
NC
1347 /* If the symbol is absolute then the relocation can
1348 be resolved during linking and there is no need for
1349 a dynamic reloc. */
1350 if (sym_section != bfd_abs_section_ptr)
1351 {
1352 /* When creating a shared object, we must copy these
1353 reloc types into the output file. We create a reloc
1354 section in dynobj and make room for this reloc. */
03a12831
AO
1355 if (sreloc == NULL)
1356 {
83bac4b0
NC
1357 sreloc = _bfd_elf_make_dynamic_reloc_section
1358 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
bfff1642 1359 if (sreloc == NULL)
83bac4b0 1360 goto fail;
03a12831 1361 }
03a12831 1362
bfff1642
NC
1363 sreloc->size += sizeof (Elf32_External_Rela);
1364 }
03a12831
AO
1365 }
1366
1367 break;
252b5132 1368 }
bfff1642
NC
1369
1370 if (ELF32_R_TYPE (rel->r_info) != R_MN10300_SYM_DIFF)
1371 sym_diff_reloc_seen = FALSE;
252b5132
RH
1372 }
1373
62d7f790
NC
1374 result = TRUE;
1375 fail:
478c006f 1376 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
62d7f790
NC
1377 free (isymbuf);
1378
1379 return result;
252b5132
RH
1380}
1381
1382/* Return the section that should be marked against GC for a given
1383 relocation. */
1384
1385static asection *
07adf181
AM
1386mn10300_elf_gc_mark_hook (asection *sec,
1387 struct bfd_link_info *info,
1388 Elf_Internal_Rela *rel,
1389 struct elf_link_hash_entry *h,
1390 Elf_Internal_Sym *sym)
252b5132
RH
1391{
1392 if (h != NULL)
07adf181
AM
1393 switch (ELF32_R_TYPE (rel->r_info))
1394 {
1395 case R_MN10300_GNU_VTINHERIT:
1396 case R_MN10300_GNU_VTENTRY:
1397 return NULL;
1398 }
1399
1400 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
252b5132
RH
1401}
1402
1403/* Perform a relocation as part of a final link. */
603b7257 1404
252b5132 1405static bfd_reloc_status_type
603b7257
NC
1406mn10300_elf_final_link_relocate (reloc_howto_type *howto,
1407 bfd *input_bfd,
1408 bfd *output_bfd ATTRIBUTE_UNUSED,
1409 asection *input_section,
1410 bfd_byte *contents,
1411 bfd_vma offset,
1412 bfd_vma value,
1413 bfd_vma addend,
1414 struct elf_link_hash_entry * h,
1415 unsigned long symndx,
1416 struct bfd_link_info *info,
1417 asection *sym_sec ATTRIBUTE_UNUSED,
1418 int is_local ATTRIBUTE_UNUSED)
252b5132 1419{
0a22ae8e 1420 struct elf32_mn10300_link_hash_table * htab = elf32_mn10300_hash_table (info);
bfff1642
NC
1421 static asection * sym_diff_section;
1422 static bfd_vma sym_diff_value;
1423 bfd_boolean is_sym_diff_reloc;
252b5132 1424 unsigned long r_type = howto->type;
603b7257 1425 bfd_byte * hit_data = contents + offset;
03a12831 1426 bfd * dynobj;
03a12831
AO
1427 asection * sgot;
1428 asection * splt;
1429 asection * sreloc;
1430
1431 dynobj = elf_hash_table (info)->dynobj;
03a12831
AO
1432 sgot = NULL;
1433 splt = NULL;
1434 sreloc = NULL;
252b5132 1435
146ccdbb
AO
1436 switch (r_type)
1437 {
1438 case R_MN10300_24:
1439 case R_MN10300_16:
1440 case R_MN10300_8:
1441 case R_MN10300_PCREL8:
1442 case R_MN10300_PCREL16:
1443 case R_MN10300_PCREL32:
1444 case R_MN10300_GOTOFF32:
1445 case R_MN10300_GOTOFF24:
1446 case R_MN10300_GOTOFF16:
0e1862bb 1447 if (bfd_link_pic (info)
146ccdbb
AO
1448 && (input_section->flags & SEC_ALLOC) != 0
1449 && h != NULL
7e2294f9 1450 && ! SYMBOL_REFERENCES_LOCAL (info, h))
146ccdbb 1451 return bfd_reloc_dangerous;
1a0670f3 1452 /* Fall through. */
0a22ae8e
NC
1453 case R_MN10300_GOT32:
1454 /* Issue 2052223:
1455 Taking the address of a protected function in a shared library
1456 is illegal. Issue an error message here. */
0e1862bb 1457 if (bfd_link_pic (info)
0a22ae8e
NC
1458 && (input_section->flags & SEC_ALLOC) != 0
1459 && h != NULL
1460 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED
1461 && (h->type == STT_FUNC || h->type == STT_GNU_IFUNC)
1462 && ! SYMBOL_REFERENCES_LOCAL (info, h))
1463 return bfd_reloc_dangerous;
146ccdbb
AO
1464 }
1465
bfff1642
NC
1466 is_sym_diff_reloc = FALSE;
1467 if (sym_diff_section != NULL)
1468 {
1469 BFD_ASSERT (sym_diff_section == input_section);
1470
1471 switch (r_type)
1472 {
1473 case R_MN10300_32:
1474 case R_MN10300_24:
1475 case R_MN10300_16:
1476 case R_MN10300_8:
1477 value -= sym_diff_value;
b5f5fd96
NC
1478 /* If we are computing a 32-bit value for the location lists
1479 and the result is 0 then we add one to the value. A zero
1480 value can result because of linker relaxation deleteing
1481 prologue instructions and using a value of 1 (for the begin
1482 and end offsets in the location list entry) results in a
1483 nul entry which does not prevent the following entries from
1484 being parsed. */
1485 if (r_type == R_MN10300_32
1486 && value == 0
1487 && strcmp (input_section->name, ".debug_loc") == 0)
1488 value = 1;
bfff1642
NC
1489 sym_diff_section = NULL;
1490 is_sym_diff_reloc = TRUE;
1491 break;
1492
1493 default:
1494 sym_diff_section = NULL;
1495 break;
1496 }
1497 }
1498
252b5132
RH
1499 switch (r_type)
1500 {
bfff1642
NC
1501 case R_MN10300_SYM_DIFF:
1502 BFD_ASSERT (addend == 0);
1503 /* Cache the input section and value.
1504 The offset is unreliable, since relaxation may
1505 have reduced the following reloc's offset. */
1506 sym_diff_section = input_section;
1507 sym_diff_value = value;
1508 return bfd_reloc_ok;
1509
569006e5 1510 case R_MN10300_ALIGN:
252b5132
RH
1511 case R_MN10300_NONE:
1512 return bfd_reloc_ok;
1513
1514 case R_MN10300_32:
0e1862bb 1515 if (bfd_link_pic (info)
bfff1642
NC
1516 /* Do not generate relocs when an R_MN10300_32 has been used
1517 with an R_MN10300_SYM_DIFF to compute a difference of two
1518 symbols. */
535b785f 1519 && !is_sym_diff_reloc
bfff1642
NC
1520 /* Also, do not generate a reloc when the symbol associated
1521 with the R_MN10300_32 reloc is absolute - there is no
1522 need for a run time computation in this case. */
1523 && sym_sec != bfd_abs_section_ptr
1524 /* If the section is not going to be allocated at load time
1525 then there is no need to generate relocs for it. */
03a12831
AO
1526 && (input_section->flags & SEC_ALLOC) != 0)
1527 {
1528 Elf_Internal_Rela outrel;
1529 bfd_boolean skip, relocate;
1530
1531 /* When generating a shared object, these relocations are
1532 copied into the output file to be resolved at run
1533 time. */
1534 if (sreloc == NULL)
1535 {
83bac4b0
NC
1536 sreloc = _bfd_elf_get_dynamic_reloc_section
1537 (input_bfd, input_section, /*rela?*/ TRUE);
1538 if (sreloc == NULL)
03a12831 1539 return FALSE;
03a12831
AO
1540 }
1541
1542 skip = FALSE;
1543
eea6121a
AM
1544 outrel.r_offset = _bfd_elf_section_offset (input_bfd, info,
1545 input_section, offset);
1546 if (outrel.r_offset == (bfd_vma) -1)
1547 skip = TRUE;
03a12831
AO
1548
1549 outrel.r_offset += (input_section->output_section->vma
1550 + input_section->output_offset);
1551
1552 if (skip)
1553 {
1554 memset (&outrel, 0, sizeof outrel);
1555 relocate = FALSE;
1556 }
1557 else
1558 {
1559 /* h->dynindx may be -1 if this symbol was marked to
1560 become local. */
1561 if (h == NULL
7e2294f9 1562 || SYMBOL_REFERENCES_LOCAL (info, h))
03a12831
AO
1563 {
1564 relocate = TRUE;
1565 outrel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
1566 outrel.r_addend = value + addend;
1567 }
1568 else
1569 {
1570 BFD_ASSERT (h->dynindx != -1);
1571 relocate = FALSE;
1572 outrel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_32);
1573 outrel.r_addend = value + addend;
1574 }
1575 }
1576
1577 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
560e09e9
NC
1578 (bfd_byte *) (((Elf32_External_Rela *) sreloc->contents)
1579 + sreloc->reloc_count));
03a12831
AO
1580 ++sreloc->reloc_count;
1581
1582 /* If this reloc is against an external symbol, we do
1583 not want to fiddle with the addend. Otherwise, we
1584 need to include the symbol value so that it becomes
1585 an addend for the dynamic reloc. */
1586 if (! relocate)
1587 return bfd_reloc_ok;
1588 }
252b5132
RH
1589 value += addend;
1590 bfd_put_32 (input_bfd, value, hit_data);
1591 return bfd_reloc_ok;
1592
1593 case R_MN10300_24:
1594 value += addend;
1595
010ac81f 1596 if ((long) value > 0x7fffff || (long) value < -0x800000)
252b5132
RH
1597 return bfd_reloc_overflow;
1598
1599 bfd_put_8 (input_bfd, value & 0xff, hit_data);
1600 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1601 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1602 return bfd_reloc_ok;
1603
1604 case R_MN10300_16:
1605 value += addend;
1606
010ac81f 1607 if ((long) value > 0x7fff || (long) value < -0x8000)
252b5132
RH
1608 return bfd_reloc_overflow;
1609
1610 bfd_put_16 (input_bfd, value, hit_data);
1611 return bfd_reloc_ok;
1612
1613 case R_MN10300_8:
1614 value += addend;
1615
010ac81f 1616 if ((long) value > 0x7f || (long) value < -0x80)
252b5132
RH
1617 return bfd_reloc_overflow;
1618
1619 bfd_put_8 (input_bfd, value, hit_data);
1620 return bfd_reloc_ok;
1621
1622 case R_MN10300_PCREL8:
1623 value -= (input_section->output_section->vma
1624 + input_section->output_offset);
1625 value -= offset;
1626 value += addend;
1627
605d18d4 1628 if ((long) value > 0x7f || (long) value < -0x80)
252b5132
RH
1629 return bfd_reloc_overflow;
1630
1631 bfd_put_8 (input_bfd, value, hit_data);
1632 return bfd_reloc_ok;
1633
1634 case R_MN10300_PCREL16:
1635 value -= (input_section->output_section->vma
1636 + input_section->output_offset);
1637 value -= offset;
1638 value += addend;
1639
605d18d4 1640 if ((long) value > 0x7fff || (long) value < -0x8000)
252b5132
RH
1641 return bfd_reloc_overflow;
1642
1643 bfd_put_16 (input_bfd, value, hit_data);
1644 return bfd_reloc_ok;
1645
1646 case R_MN10300_PCREL32:
1647 value -= (input_section->output_section->vma
1648 + input_section->output_offset);
1649 value -= offset;
1650 value += addend;
1651
1652 bfd_put_32 (input_bfd, value, hit_data);
1653 return bfd_reloc_ok;
1654
1655 case R_MN10300_GNU_VTINHERIT:
1656 case R_MN10300_GNU_VTENTRY:
1657 return bfd_reloc_ok;
1658
03a12831 1659 case R_MN10300_GOTPC32:
0a22ae8e
NC
1660 if (dynobj == NULL)
1661 return bfd_reloc_dangerous;
1662
03a12831 1663 /* Use global offset table as symbol value. */
3d4d4302 1664 value = htab->root.sgot->output_section->vma;
03a12831
AO
1665 value -= (input_section->output_section->vma
1666 + input_section->output_offset);
1667 value -= offset;
1668 value += addend;
1669
1670 bfd_put_32 (input_bfd, value, hit_data);
1671 return bfd_reloc_ok;
3b36f7e6 1672
03a12831 1673 case R_MN10300_GOTPC16:
0a22ae8e
NC
1674 if (dynobj == NULL)
1675 return bfd_reloc_dangerous;
1676
03a12831 1677 /* Use global offset table as symbol value. */
3d4d4302 1678 value = htab->root.sgot->output_section->vma;
03a12831
AO
1679 value -= (input_section->output_section->vma
1680 + input_section->output_offset);
1681 value -= offset;
1682 value += addend;
1683
605d18d4 1684 if ((long) value > 0x7fff || (long) value < -0x8000)
03a12831
AO
1685 return bfd_reloc_overflow;
1686
1687 bfd_put_16 (input_bfd, value, hit_data);
1688 return bfd_reloc_ok;
1689
1690 case R_MN10300_GOTOFF32:
0a22ae8e
NC
1691 if (dynobj == NULL)
1692 return bfd_reloc_dangerous;
1693
3d4d4302 1694 value -= htab->root.sgot->output_section->vma;
03a12831 1695 value += addend;
3b36f7e6 1696
03a12831
AO
1697 bfd_put_32 (input_bfd, value, hit_data);
1698 return bfd_reloc_ok;
1699
1700 case R_MN10300_GOTOFF24:
0a22ae8e
NC
1701 if (dynobj == NULL)
1702 return bfd_reloc_dangerous;
1703
3d4d4302 1704 value -= htab->root.sgot->output_section->vma;
03a12831 1705 value += addend;
3b36f7e6 1706
03a12831
AO
1707 if ((long) value > 0x7fffff || (long) value < -0x800000)
1708 return bfd_reloc_overflow;
1709
1710 bfd_put_8 (input_bfd, value, hit_data);
1711 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1712 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1713 return bfd_reloc_ok;
1714
1715 case R_MN10300_GOTOFF16:
0a22ae8e
NC
1716 if (dynobj == NULL)
1717 return bfd_reloc_dangerous;
1718
3d4d4302 1719 value -= htab->root.sgot->output_section->vma;
03a12831 1720 value += addend;
3b36f7e6 1721
605d18d4 1722 if ((long) value > 0x7fff || (long) value < -0x8000)
03a12831
AO
1723 return bfd_reloc_overflow;
1724
1725 bfd_put_16 (input_bfd, value, hit_data);
1726 return bfd_reloc_ok;
1727
1728 case R_MN10300_PLT32:
1729 if (h != NULL
1730 && ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1731 && ELF_ST_VISIBILITY (h->other) != STV_HIDDEN
1732 && h->plt.offset != (bfd_vma) -1)
1733 {
0a22ae8e
NC
1734 if (dynobj == NULL)
1735 return bfd_reloc_dangerous;
1736
3d4d4302 1737 splt = htab->root.splt;
03a12831
AO
1738 value = (splt->output_section->vma
1739 + splt->output_offset
1740 + h->plt.offset) - value;
1741 }
1742
1743 value -= (input_section->output_section->vma
1744 + input_section->output_offset);
1745 value -= offset;
1746 value += addend;
1747
1748 bfd_put_32 (input_bfd, value, hit_data);
1749 return bfd_reloc_ok;
1750
1751 case R_MN10300_PLT16:
1752 if (h != NULL
1753 && ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
1754 && ELF_ST_VISIBILITY (h->other) != STV_HIDDEN
1755 && h->plt.offset != (bfd_vma) -1)
1756 {
0a22ae8e
NC
1757 if (dynobj == NULL)
1758 return bfd_reloc_dangerous;
1759
3d4d4302 1760 splt = htab->root.splt;
03a12831
AO
1761 value = (splt->output_section->vma
1762 + splt->output_offset
1763 + h->plt.offset) - value;
1764 }
1765
1766 value -= (input_section->output_section->vma
1767 + input_section->output_offset);
1768 value -= offset;
1769 value += addend;
1770
605d18d4 1771 if ((long) value > 0x7fff || (long) value < -0x8000)
03a12831
AO
1772 return bfd_reloc_overflow;
1773
1774 bfd_put_16 (input_bfd, value, hit_data);
1775 return bfd_reloc_ok;
1776
0a22ae8e
NC
1777 case R_MN10300_TLS_LDO:
1778 value = dtpoff (info, value);
1779 bfd_put_32 (input_bfd, value + addend, hit_data);
1780 return bfd_reloc_ok;
1781
1782 case R_MN10300_TLS_LE:
1783 value = tpoff (info, value);
1784 bfd_put_32 (input_bfd, value + addend, hit_data);
1785 return bfd_reloc_ok;
1786
1787 case R_MN10300_TLS_LD:
1788 if (dynobj == NULL)
1789 return bfd_reloc_dangerous;
1790
3d4d4302 1791 sgot = htab->root.sgot;
0a22ae8e
NC
1792 BFD_ASSERT (sgot != NULL);
1793 value = htab->tls_ldm_got.offset + sgot->output_offset;
1794 bfd_put_32 (input_bfd, value, hit_data);
1795
1796 if (!htab->tls_ldm_got.rel_emitted)
1797 {
ce558b89 1798 asection *srelgot = htab->root.srelgot;
0a22ae8e
NC
1799 Elf_Internal_Rela rel;
1800
1801 BFD_ASSERT (srelgot != NULL);
1802 htab->tls_ldm_got.rel_emitted ++;
1803 rel.r_offset = (sgot->output_section->vma
1804 + sgot->output_offset
1805 + htab->tls_ldm_got.offset);
1806 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + htab->tls_ldm_got.offset);
1807 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + htab->tls_ldm_got.offset+4);
1808 rel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD);
1809 rel.r_addend = 0;
1810 bfd_elf32_swap_reloca_out (output_bfd, & rel,
1811 (bfd_byte *) ((Elf32_External_Rela *) srelgot->contents
1812 + srelgot->reloc_count));
1813 ++ srelgot->reloc_count;
1814 }
1815
1816 return bfd_reloc_ok;
1817
1818 case R_MN10300_TLS_GOTIE:
1819 value = tpoff (info, value);
1820 /* Fall Through. */
1821
1822 case R_MN10300_TLS_GD:
1823 case R_MN10300_TLS_IE:
03a12831
AO
1824 case R_MN10300_GOT32:
1825 case R_MN10300_GOT24:
1826 case R_MN10300_GOT16:
0a22ae8e
NC
1827 if (dynobj == NULL)
1828 return bfd_reloc_dangerous;
3b36f7e6 1829
3d4d4302 1830 sgot = htab->root.sgot;
0a22ae8e
NC
1831 if (r_type == R_MN10300_TLS_GD)
1832 value = dtpoff (info, value);
03a12831 1833
0a22ae8e
NC
1834 if (h != NULL)
1835 {
1836 bfd_vma off;
1837
1838 off = h->got.offset;
1839 /* Offsets in the GOT are allocated in check_relocs
1840 which is not called for shared libraries... */
1841 if (off == (bfd_vma) -1)
1842 off = 0;
1843
1844 if (sgot->contents != NULL
1845 && (! elf_hash_table (info)->dynamic_sections_created
1846 || SYMBOL_REFERENCES_LOCAL (info, h)))
1847 /* This is actually a static link, or it is a
1848 -Bsymbolic link and the symbol is defined
1849 locally, or the symbol was forced to be local
1850 because of a version file. We must initialize
1851 this entry in the global offset table.
1852
1853 When doing a dynamic link, we create a .rela.got
1854 relocation entry to initialize the value. This
1855 is done in the finish_dynamic_symbol routine. */
1856 bfd_put_32 (output_bfd, value,
1857 sgot->contents + off);
1858
1859 value = sgot->output_offset + off;
1860 }
1861 else
1862 {
1863 bfd_vma off;
03a12831 1864
0a22ae8e 1865 off = elf_local_got_offsets (input_bfd)[symndx];
03a12831 1866
0a22ae8e
NC
1867 if (off & 1)
1868 bfd_put_32 (output_bfd, value, sgot->contents + (off & ~ 1));
1869 else
1870 {
03a12831
AO
1871 bfd_put_32 (output_bfd, value, sgot->contents + off);
1872
0e1862bb 1873 if (bfd_link_pic (info))
03a12831 1874 {
ce558b89 1875 asection *srelgot = htab->root.srelgot;;
03a12831
AO
1876 Elf_Internal_Rela outrel;
1877
03a12831
AO
1878 BFD_ASSERT (srelgot != NULL);
1879
1880 outrel.r_offset = (sgot->output_section->vma
1881 + sgot->output_offset
1882 + off);
0a22ae8e
NC
1883 switch (r_type)
1884 {
1885 case R_MN10300_TLS_GD:
1886 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPOFF);
1887 outrel.r_offset = (sgot->output_section->vma
1888 + sgot->output_offset
1889 + off + 4);
1890 bfd_elf32_swap_reloca_out (output_bfd, & outrel,
1891 (bfd_byte *) (((Elf32_External_Rela *)
1892 srelgot->contents)
1893 + srelgot->reloc_count));
1894 ++ srelgot->reloc_count;
1895 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_DTPMOD);
1896 break;
1897 case R_MN10300_TLS_GOTIE:
1898 case R_MN10300_TLS_IE:
1899 outrel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_TPOFF);
1900 break;
1901 default:
1902 outrel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
1903 break;
1904 }
1905
03a12831
AO
1906 outrel.r_addend = value;
1907 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
560e09e9
NC
1908 (bfd_byte *) (((Elf32_External_Rela *)
1909 srelgot->contents)
1910 + srelgot->reloc_count));
03a12831 1911 ++ srelgot->reloc_count;
0a22ae8e 1912 elf_local_got_offsets (input_bfd)[symndx] |= 1;
03a12831
AO
1913 }
1914
0a22ae8e 1915 value = sgot->output_offset + (off & ~(bfd_vma) 1);
03a12831 1916 }
0a22ae8e 1917 }
03a12831
AO
1918
1919 value += addend;
1920
0a22ae8e
NC
1921 if (r_type == R_MN10300_TLS_IE)
1922 {
1923 value += sgot->output_section->vma;
1924 bfd_put_32 (input_bfd, value, hit_data);
1925 return bfd_reloc_ok;
1926 }
1927 else if (r_type == R_MN10300_TLS_GOTIE
1928 || r_type == R_MN10300_TLS_GD
1929 || r_type == R_MN10300_TLS_LD)
1930 {
1931 bfd_put_32 (input_bfd, value, hit_data);
1932 return bfd_reloc_ok;
1933 }
1934 else if (r_type == R_MN10300_GOT32)
03a12831
AO
1935 {
1936 bfd_put_32 (input_bfd, value, hit_data);
1937 return bfd_reloc_ok;
1938 }
1939 else if (r_type == R_MN10300_GOT24)
1940 {
1941 if ((long) value > 0x7fffff || (long) value < -0x800000)
1942 return bfd_reloc_overflow;
1943
1944 bfd_put_8 (input_bfd, value & 0xff, hit_data);
1945 bfd_put_8 (input_bfd, (value >> 8) & 0xff, hit_data + 1);
1946 bfd_put_8 (input_bfd, (value >> 16) & 0xff, hit_data + 2);
1947 return bfd_reloc_ok;
1948 }
1949 else if (r_type == R_MN10300_GOT16)
1950 {
605d18d4 1951 if ((long) value > 0x7fff || (long) value < -0x8000)
03a12831
AO
1952 return bfd_reloc_overflow;
1953
1954 bfd_put_16 (input_bfd, value, hit_data);
1955 return bfd_reloc_ok;
1956 }
1957 /* Fall through. */
3b36f7e6 1958
252b5132
RH
1959 default:
1960 return bfd_reloc_notsupported;
1961 }
1962}
252b5132
RH
1963\f
1964/* Relocate an MN10300 ELF section. */
603b7257 1965
b34976b6 1966static bfd_boolean
603b7257
NC
1967mn10300_elf_relocate_section (bfd *output_bfd,
1968 struct bfd_link_info *info,
1969 bfd *input_bfd,
1970 asection *input_section,
1971 bfd_byte *contents,
1972 Elf_Internal_Rela *relocs,
1973 Elf_Internal_Sym *local_syms,
1974 asection **local_sections)
252b5132
RH
1975{
1976 Elf_Internal_Shdr *symtab_hdr;
b2a8e766 1977 struct elf_link_hash_entry **sym_hashes;
252b5132 1978 Elf_Internal_Rela *rel, *relend;
0a22ae8e 1979 Elf_Internal_Rela * trel;
252b5132
RH
1980
1981 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
b2a8e766 1982 sym_hashes = elf_sym_hashes (input_bfd);
252b5132
RH
1983
1984 rel = relocs;
1985 relend = relocs + input_section->reloc_count;
1986 for (; rel < relend; rel++)
1987 {
1988 int r_type;
1989 reloc_howto_type *howto;
1990 unsigned long r_symndx;
1991 Elf_Internal_Sym *sym;
1992 asection *sec;
1993 struct elf32_mn10300_link_hash_entry *h;
1994 bfd_vma relocation;
1995 bfd_reloc_status_type r;
0a22ae8e
NC
1996 int tls_r_type;
1997 bfd_boolean unresolved_reloc = FALSE;
62d887d4 1998 bfd_boolean warned, ignored;
0a22ae8e 1999 struct elf_link_hash_entry * hh;
252b5132 2000
0a22ae8e 2001 relocation = 0;
252b5132
RH
2002 r_symndx = ELF32_R_SYM (rel->r_info);
2003 r_type = ELF32_R_TYPE (rel->r_info);
2004 howto = elf_mn10300_howto_table + r_type;
2005
2006 /* Just skip the vtable gc relocs. */
2007 if (r_type == R_MN10300_GNU_VTINHERIT
2008 || r_type == R_MN10300_GNU_VTENTRY)
2009 continue;
2010
252b5132
RH
2011 h = NULL;
2012 sym = NULL;
2013 sec = NULL;
2014 if (r_symndx < symtab_hdr->sh_info)
0a22ae8e 2015 hh = NULL;
252b5132
RH
2016 else
2017 {
b2a8e766
AM
2018 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2019 r_symndx, symtab_hdr, sym_hashes,
2020 hh, sec, relocation,
62d887d4 2021 unresolved_reloc, warned, ignored);
0a22ae8e
NC
2022 }
2023 h = elf_mn10300_hash_entry (hh);
560e09e9 2024
0a22ae8e
NC
2025 tls_r_type = elf_mn10300_tls_transition (info, r_type, hh, input_section, 0);
2026 if (tls_r_type != r_type)
2027 {
2028 bfd_boolean had_plt;
2029
2030 had_plt = mn10300_do_tls_transition (input_bfd, r_type, tls_r_type,
2031 contents, rel->r_offset);
2032 r_type = tls_r_type;
2033 howto = elf_mn10300_howto_table + r_type;
2034
2035 if (had_plt)
2036 for (trel = rel+1; trel < relend; trel++)
2037 if ((ELF32_R_TYPE (trel->r_info) == R_MN10300_PLT32
2038 || ELF32_R_TYPE (trel->r_info) == R_MN10300_PCREL32)
2039 && rel->r_offset + had_plt == trel->r_offset)
2040 trel->r_info = ELF32_R_INFO (0, R_MN10300_NONE);
2041 }
560e09e9 2042
0a22ae8e
NC
2043 if (r_symndx < symtab_hdr->sh_info)
2044 {
2045 sym = local_syms + r_symndx;
2046 sec = local_sections[r_symndx];
2047 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2048 }
2049 else
2050 {
560e09e9 2051 if ((h->root.root.type == bfd_link_hash_defined
252b5132 2052 || h->root.root.type == bfd_link_hash_defweak)
560e09e9 2053 && ( r_type == R_MN10300_GOTPC32
03a12831
AO
2054 || r_type == R_MN10300_GOTPC16
2055 || (( r_type == R_MN10300_PLT32
2056 || r_type == R_MN10300_PLT16)
2057 && ELF_ST_VISIBILITY (h->root.other) != STV_INTERNAL
2058 && ELF_ST_VISIBILITY (h->root.other) != STV_HIDDEN
2059 && h->root.plt.offset != (bfd_vma) -1)
2060 || (( r_type == R_MN10300_GOT32
2061 || r_type == R_MN10300_GOT24
0a22ae8e
NC
2062 || r_type == R_MN10300_TLS_GD
2063 || r_type == R_MN10300_TLS_LD
2064 || r_type == R_MN10300_TLS_GOTIE
2065 || r_type == R_MN10300_TLS_IE
03a12831
AO
2066 || r_type == R_MN10300_GOT16)
2067 && elf_hash_table (info)->dynamic_sections_created
7e2294f9 2068 && !SYMBOL_REFERENCES_LOCAL (info, hh))
146ccdbb 2069 || (r_type == R_MN10300_32
bfff1642
NC
2070 /* _32 relocs in executables force _COPY relocs,
2071 such that the address of the symbol ends up
2072 being local. */
0e1862bb 2073 && !bfd_link_executable (info)
7e2294f9 2074 && !SYMBOL_REFERENCES_LOCAL (info, hh)
03a12831
AO
2075 && ((input_section->flags & SEC_ALLOC) != 0
2076 /* DWARF will emit R_MN10300_32 relocations
2077 in its sections against symbols defined
2078 externally in shared libraries. We can't
2079 do anything with them here. */
2080 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 2081 && h->root.def_dynamic)))))
560e09e9
NC
2082 /* In these cases, we don't need the relocation
2083 value. We check specially because in some
2084 obscure cases sec->output_section will be NULL. */
03a12831 2085 relocation = 0;
560e09e9 2086
0e1862bb 2087 else if (!bfd_link_relocatable (info) && unresolved_reloc
1d5316ab
AM
2088 && _bfd_elf_section_offset (output_bfd, info, input_section,
2089 rel->r_offset) != (bfd_vma) -1)
2090
4eca0228 2091 _bfd_error_handler
695344c0 2092 /* xgettext:c-format */
d42c267e 2093 (_("%B(%A+%#Lx): unresolvable %s relocation against symbol `%s'"),
843fe662
L
2094 input_bfd,
2095 input_section,
d42c267e 2096 rel->r_offset,
843fe662
L
2097 howto->name,
2098 h->root.root.root.string);
252b5132
RH
2099 }
2100
dbaa2011 2101 if (sec != NULL && discarded_section (sec))
e4067dbb 2102 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 2103 rel, 1, relend, howto, 0, contents);
ab96bf03 2104
0e1862bb 2105 if (bfd_link_relocatable (info))
ab96bf03
AM
2106 continue;
2107
252b5132
RH
2108 r = mn10300_elf_final_link_relocate (howto, input_bfd, output_bfd,
2109 input_section,
2110 contents, rel->r_offset,
2111 relocation, rel->r_addend,
603b7257 2112 (struct elf_link_hash_entry *) h,
03a12831 2113 r_symndx,
252b5132
RH
2114 info, sec, h == NULL);
2115
2116 if (r != bfd_reloc_ok)
2117 {
2118 const char *name;
603b7257 2119 const char *msg = NULL;
252b5132
RH
2120
2121 if (h != NULL)
2122 name = h->root.root.root.string;
2123 else
2124 {
2125 name = (bfd_elf_string_from_elf_section
2126 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2127 if (name == NULL || *name == '\0')
2128 name = bfd_section_name (input_bfd, sec);
2129 }
2130
2131 switch (r)
2132 {
2133 case bfd_reloc_overflow:
1a72702b
AM
2134 (*info->callbacks->reloc_overflow)
2135 (info, (h ? &h->root.root : NULL), name, howto->name,
2136 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
2137 break;
2138
2139 case bfd_reloc_undefined:
1a72702b
AM
2140 (*info->callbacks->undefined_symbol)
2141 (info, name, input_bfd, input_section, rel->r_offset, TRUE);
252b5132
RH
2142 break;
2143
2144 case bfd_reloc_outofrange:
2145 msg = _("internal error: out of range error");
2146 goto common_error;
2147
2148 case bfd_reloc_notsupported:
2149 msg = _("internal error: unsupported relocation error");
2150 goto common_error;
2151
2152 case bfd_reloc_dangerous:
c9b57b7e
DD
2153 if (r_type == R_MN10300_PCREL32)
2154 msg = _("error: inappropriate relocation type for shared"
2155 " library (did you forget -fpic?)");
0a22ae8e 2156 else if (r_type == R_MN10300_GOT32)
695344c0 2157 /* xgettext:c-format */
0a22ae8e
NC
2158 msg = _("%B: taking the address of protected function"
2159 " '%s' cannot be done when making a shared library");
c9b57b7e
DD
2160 else
2161 msg = _("internal error: suspicious relocation type used"
2162 " in shared library");
252b5132
RH
2163 goto common_error;
2164
2165 default:
2166 msg = _("internal error: unknown error");
603b7257 2167 /* Fall through. */
252b5132
RH
2168
2169 common_error:
0a22ae8e
NC
2170 _bfd_error_handler (msg, input_bfd, name);
2171 bfd_set_error (bfd_error_bad_value);
2172 return FALSE;
252b5132
RH
2173 }
2174 }
2175 }
2176
b34976b6 2177 return TRUE;
252b5132
RH
2178}
2179
2180/* Finish initializing one hash table entry. */
603b7257 2181
b34976b6 2182static bfd_boolean
603b7257
NC
2183elf32_mn10300_finish_hash_table_entry (struct bfd_hash_entry *gen_entry,
2184 void * in_args)
252b5132
RH
2185{
2186 struct elf32_mn10300_link_hash_entry *entry;
603b7257 2187 struct bfd_link_info *link_info = (struct bfd_link_info *) in_args;
252b5132
RH
2188 unsigned int byte_count = 0;
2189
010ac81f 2190 entry = (struct elf32_mn10300_link_hash_entry *) gen_entry;
252b5132
RH
2191
2192 /* If we already know we want to convert "call" to "calls" for calls
2193 to this symbol, then return now. */
2194 if (entry->flags == MN10300_CONVERT_CALL_TO_CALLS)
b34976b6 2195 return TRUE;
252b5132
RH
2196
2197 /* If there are no named calls to this symbol, or there's nothing we
1055df0f
AO
2198 can move from the function itself into the "call" instruction,
2199 then note that all "call" instructions should be converted into
2200 "calls" instructions and return. If a symbol is available for
2201 dynamic symbol resolution (overridable or overriding), avoid
2202 custom calling conventions. */
252b5132 2203 if (entry->direct_calls == 0
1055df0f
AO
2204 || (entry->stack_size == 0 && entry->movm_args == 0)
2205 || (elf_hash_table (link_info)->dynamic_sections_created
2206 && ELF_ST_VISIBILITY (entry->root.other) != STV_INTERNAL
2207 && ELF_ST_VISIBILITY (entry->root.other) != STV_HIDDEN))
252b5132
RH
2208 {
2209 /* Make a note that we should convert "call" instructions to "calls"
2210 instructions for calls to this symbol. */
2211 entry->flags |= MN10300_CONVERT_CALL_TO_CALLS;
b34976b6 2212 return TRUE;
252b5132
RH
2213 }
2214
2215 /* We may be able to move some instructions from the function itself into
2216 the "call" instruction. Count how many bytes we might be able to
2217 eliminate in the function itself. */
2218
2219 /* A movm instruction is two bytes. */
2220 if (entry->movm_args)
2221 byte_count += 2;
2222
2223 /* Count the insn to allocate stack space too. */
1a101a42
AM
2224 if (entry->stack_size > 0)
2225 {
2226 if (entry->stack_size <= 128)
2227 byte_count += 3;
2228 else
2229 byte_count += 4;
2230 }
252b5132
RH
2231
2232 /* If using "call" will result in larger code, then turn all
4cc11e76 2233 the associated "call" instructions into "calls" instructions. */
252b5132
RH
2234 if (byte_count < entry->direct_calls)
2235 entry->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2236
2237 /* This routine never fails. */
b34976b6 2238 return TRUE;
252b5132
RH
2239}
2240
eb13e63f 2241/* Used to count hash table entries. */
603b7257 2242
eb13e63f
DD
2243static bfd_boolean
2244elf32_mn10300_count_hash_table_entries (struct bfd_hash_entry *gen_entry ATTRIBUTE_UNUSED,
603b7257 2245 void * in_args)
eb13e63f 2246{
bfff1642 2247 int *count = (int *) in_args;
eb13e63f
DD
2248
2249 (*count) ++;
2250 return TRUE;
2251}
2252
2253/* Used to enumerate hash table entries into a linear array. */
603b7257 2254
eb13e63f
DD
2255static bfd_boolean
2256elf32_mn10300_list_hash_table_entries (struct bfd_hash_entry *gen_entry,
603b7257 2257 void * in_args)
eb13e63f
DD
2258{
2259 struct bfd_hash_entry ***ptr = (struct bfd_hash_entry ***) in_args;
2260
2261 **ptr = gen_entry;
2262 (*ptr) ++;
2263 return TRUE;
2264}
2265
2266/* Used to sort the array created by the above. */
603b7257 2267
eb13e63f
DD
2268static int
2269sort_by_value (const void *va, const void *vb)
2270{
2271 struct elf32_mn10300_link_hash_entry *a
bfff1642 2272 = *(struct elf32_mn10300_link_hash_entry **) va;
eb13e63f 2273 struct elf32_mn10300_link_hash_entry *b
bfff1642 2274 = *(struct elf32_mn10300_link_hash_entry **) vb;
eb13e63f
DD
2275
2276 return a->value - b->value;
2277}
2278
603b7257
NC
2279/* Compute the stack size and movm arguments for the function
2280 referred to by HASH at address ADDR in section with
2281 contents CONTENTS, store the information in the hash table. */
2282
2283static void
2284compute_function_info (bfd *abfd,
2285 struct elf32_mn10300_link_hash_entry *hash,
2286 bfd_vma addr,
2287 unsigned char *contents)
2288{
2289 unsigned char byte1, byte2;
2290 /* We only care about a very small subset of the possible prologue
2291 sequences here. Basically we look for:
2292
2293 movm [d2,d3,a2,a3],sp (optional)
2294 add <size>,sp (optional, and only for sizes which fit in an unsigned
2295 8 bit number)
2296
2297 If we find anything else, we quit. */
2298
2299 /* Look for movm [regs],sp. */
2300 byte1 = bfd_get_8 (abfd, contents + addr);
2301 byte2 = bfd_get_8 (abfd, contents + addr + 1);
2302
2303 if (byte1 == 0xcf)
2304 {
2305 hash->movm_args = byte2;
2306 addr += 2;
2307 byte1 = bfd_get_8 (abfd, contents + addr);
2308 byte2 = bfd_get_8 (abfd, contents + addr + 1);
2309 }
2310
2311 /* Now figure out how much stack space will be allocated by the movm
2312 instruction. We need this kept separate from the function's normal
2313 stack space. */
2314 if (hash->movm_args)
2315 {
2316 /* Space for d2. */
2317 if (hash->movm_args & 0x80)
2318 hash->movm_stack_size += 4;
2319
2320 /* Space for d3. */
2321 if (hash->movm_args & 0x40)
2322 hash->movm_stack_size += 4;
2323
2324 /* Space for a2. */
2325 if (hash->movm_args & 0x20)
2326 hash->movm_stack_size += 4;
2327
2328 /* Space for a3. */
2329 if (hash->movm_args & 0x10)
2330 hash->movm_stack_size += 4;
2331
2332 /* "other" space. d0, d1, a0, a1, mdr, lir, lar, 4 byte pad. */
2333 if (hash->movm_args & 0x08)
2334 hash->movm_stack_size += 8 * 4;
2335
2336 if (bfd_get_mach (abfd) == bfd_mach_am33
2337 || bfd_get_mach (abfd) == bfd_mach_am33_2)
2338 {
2339 /* "exother" space. e0, e1, mdrq, mcrh, mcrl, mcvf */
2340 if (hash->movm_args & 0x1)
2341 hash->movm_stack_size += 6 * 4;
2342
2343 /* exreg1 space. e4, e5, e6, e7 */
2344 if (hash->movm_args & 0x2)
2345 hash->movm_stack_size += 4 * 4;
2346
2347 /* exreg0 space. e2, e3 */
2348 if (hash->movm_args & 0x4)
2349 hash->movm_stack_size += 2 * 4;
2350 }
2351 }
2352
2353 /* Now look for the two stack adjustment variants. */
2354 if (byte1 == 0xf8 && byte2 == 0xfe)
2355 {
2356 int temp = bfd_get_8 (abfd, contents + addr + 2);
2357 temp = ((temp & 0xff) ^ (~0x7f)) + 0x80;
2358
2359 hash->stack_size = -temp;
2360 }
2361 else if (byte1 == 0xfa && byte2 == 0xfe)
2362 {
2363 int temp = bfd_get_16 (abfd, contents + addr + 2);
2364 temp = ((temp & 0xffff) ^ (~0x7fff)) + 0x8000;
2365 temp = -temp;
2366
2367 if (temp < 255)
2368 hash->stack_size = temp;
2369 }
2370
2371 /* If the total stack to be allocated by the call instruction is more
2372 than 255 bytes, then we can't remove the stack adjustment by using
2373 "call" (we might still be able to remove the "movm" instruction. */
2374 if (hash->stack_size + hash->movm_stack_size > 255)
2375 hash->stack_size = 0;
2376}
2377
2378/* Delete some bytes from a section while relaxing. */
2379
2380static bfd_boolean
2381mn10300_elf_relax_delete_bytes (bfd *abfd,
2382 asection *sec,
2383 bfd_vma addr,
2384 int count)
2385{
2386 Elf_Internal_Shdr *symtab_hdr;
2387 unsigned int sec_shndx;
2388 bfd_byte *contents;
2389 Elf_Internal_Rela *irel, *irelend;
2390 Elf_Internal_Rela *irelalign;
2391 bfd_vma toaddr;
2392 Elf_Internal_Sym *isym, *isymend;
2393 struct elf_link_hash_entry **sym_hashes;
2394 struct elf_link_hash_entry **end_hashes;
2395 unsigned int symcount;
2396
2397 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
2398
2399 contents = elf_section_data (sec)->this_hdr.contents;
2400
603b7257
NC
2401 irelalign = NULL;
2402 toaddr = sec->size;
2403
2404 irel = elf_section_data (sec)->relocs;
2405 irelend = irel + sec->reloc_count;
2406
cf4a529b
NC
2407 if (sec->reloc_count > 0)
2408 {
2409 /* If there is an align reloc at the end of the section ignore it.
2410 GAS creates these relocs for reasons of its own, and they just
2411 serve to keep the section artifically inflated. */
2412 if (ELF32_R_TYPE ((irelend - 1)->r_info) == (int) R_MN10300_ALIGN)
2413 --irelend;
68ffbac6 2414
de194d85 2415 /* The deletion must stop at the next ALIGN reloc for an alignment
b5f5fd96
NC
2416 power larger than, or not a multiple of, the number of bytes we
2417 are deleting. */
cf4a529b 2418 for (; irel < irelend; irel++)
b5f5fd96
NC
2419 {
2420 int alignment = 1 << irel->r_addend;
2421
2422 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN
2423 && irel->r_offset > addr
2424 && irel->r_offset < toaddr
2425 && (count < alignment
2426 || alignment % count != 0))
2427 {
2428 irelalign = irel;
2429 toaddr = irel->r_offset;
2430 break;
2431 }
2432 }
cf4a529b 2433 }
569006e5 2434
603b7257
NC
2435 /* Actually delete the bytes. */
2436 memmove (contents + addr, contents + addr + count,
2437 (size_t) (toaddr - addr - count));
569006e5
NC
2438
2439 /* Adjust the section's size if we are shrinking it, or else
2440 pad the bytes between the end of the shrunken region and
2441 the start of the next region with NOP codes. */
2442 if (irelalign == NULL)
2443 {
2444 sec->size -= count;
2445 /* Include symbols at the end of the section, but
2446 not at the end of a sub-region of the section. */
2447 toaddr ++;
2448 }
2449 else
2450 {
2451 int i;
2452
2453#define NOP_OPCODE 0xcb
2454
2455 for (i = 0; i < count; i ++)
2456 bfd_put_8 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
2457 }
603b7257
NC
2458
2459 /* Adjust all the relocs. */
2460 for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
2461 {
2462 /* Get the new reloc address. */
2463 if ((irel->r_offset > addr
b5f5fd96
NC
2464 && irel->r_offset < toaddr)
2465 || (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN
2466 && irel->r_offset == toaddr))
603b7257
NC
2467 irel->r_offset -= count;
2468 }
2469
b5f5fd96
NC
2470 /* Adjust the local symbols in the section, reducing their value
2471 by the number of bytes deleted. Note - symbols within the deleted
2472 region are moved to the address of the start of the region, which
2473 actually means that they will address the byte beyond the end of
2474 the region once the deletion has been completed. */
603b7257
NC
2475 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2476 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
2477 for (isymend = isym + symtab_hdr->sh_info; isym < isymend; isym++)
2478 {
2479 if (isym->st_shndx == sec_shndx
2480 && isym->st_value > addr
569006e5 2481 && isym->st_value < toaddr)
b5f5fd96
NC
2482 {
2483 if (isym->st_value < addr + count)
2484 isym->st_value = addr;
2485 else
2486 isym->st_value -= count;
2487 }
bfff1642
NC
2488 /* Adjust the function symbol's size as well. */
2489 else if (isym->st_shndx == sec_shndx
2490 && ELF_ST_TYPE (isym->st_info) == STT_FUNC
2491 && isym->st_value + isym->st_size > addr
569006e5 2492 && isym->st_value + isym->st_size < toaddr)
bfff1642 2493 isym->st_size -= count;
603b7257
NC
2494 }
2495
2496 /* Now adjust the global symbols defined in this section. */
2497 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2498 - symtab_hdr->sh_info);
2499 sym_hashes = elf_sym_hashes (abfd);
2500 end_hashes = sym_hashes + symcount;
2501 for (; sym_hashes < end_hashes; sym_hashes++)
2502 {
2503 struct elf_link_hash_entry *sym_hash = *sym_hashes;
2504
2505 if ((sym_hash->root.type == bfd_link_hash_defined
2506 || sym_hash->root.type == bfd_link_hash_defweak)
2507 && sym_hash->root.u.def.section == sec
2508 && sym_hash->root.u.def.value > addr
569006e5 2509 && sym_hash->root.u.def.value < toaddr)
b5f5fd96
NC
2510 {
2511 if (sym_hash->root.u.def.value < addr + count)
2512 sym_hash->root.u.def.value = addr;
2513 else
2514 sym_hash->root.u.def.value -= count;
2515 }
bfff1642
NC
2516 /* Adjust the function symbol's size as well. */
2517 else if (sym_hash->root.type == bfd_link_hash_defined
2518 && sym_hash->root.u.def.section == sec
2519 && sym_hash->type == STT_FUNC
2520 && sym_hash->root.u.def.value + sym_hash->size > addr
569006e5 2521 && sym_hash->root.u.def.value + sym_hash->size < toaddr)
bfff1642 2522 sym_hash->size -= count;
603b7257
NC
2523 }
2524
b5f5fd96
NC
2525 /* See if we can move the ALIGN reloc forward.
2526 We have adjusted r_offset for it already. */
2527 if (irelalign != NULL)
2528 {
2529 bfd_vma alignto, alignaddr;
2530
2531 if ((int) irelalign->r_addend > 0)
2532 {
2533 /* This is the old address. */
2534 alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
2535 /* This is where the align points to now. */
2536 alignaddr = BFD_ALIGN (irelalign->r_offset,
2537 1 << irelalign->r_addend);
2538 if (alignaddr < alignto)
2539 /* Tail recursion. */
2540 return mn10300_elf_relax_delete_bytes (abfd, sec, alignaddr,
2541 (int) (alignto - alignaddr));
2542 }
2543 }
2544
603b7257
NC
2545 return TRUE;
2546}
2547
2548/* Return TRUE if a symbol exists at the given address, else return
2549 FALSE. */
2550
2551static bfd_boolean
2552mn10300_elf_symbol_address_p (bfd *abfd,
2553 asection *sec,
2554 Elf_Internal_Sym *isym,
2555 bfd_vma addr)
2556{
2557 Elf_Internal_Shdr *symtab_hdr;
2558 unsigned int sec_shndx;
2559 Elf_Internal_Sym *isymend;
2560 struct elf_link_hash_entry **sym_hashes;
2561 struct elf_link_hash_entry **end_hashes;
2562 unsigned int symcount;
2563
2564 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
2565
2566 /* Examine all the symbols. */
2567 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2568 for (isymend = isym + symtab_hdr->sh_info; isym < isymend; isym++)
2569 if (isym->st_shndx == sec_shndx
2570 && isym->st_value == addr)
2571 return TRUE;
2572
2573 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2574 - symtab_hdr->sh_info);
2575 sym_hashes = elf_sym_hashes (abfd);
2576 end_hashes = sym_hashes + symcount;
2577 for (; sym_hashes < end_hashes; sym_hashes++)
2578 {
2579 struct elf_link_hash_entry *sym_hash = *sym_hashes;
2580
2581 if ((sym_hash->root.type == bfd_link_hash_defined
2582 || sym_hash->root.type == bfd_link_hash_defweak)
2583 && sym_hash->root.u.def.section == sec
2584 && sym_hash->root.u.def.value == addr)
2585 return TRUE;
2586 }
2587
2588 return FALSE;
2589}
eb13e63f 2590
252b5132
RH
2591/* This function handles relaxing for the mn10300.
2592
4cc11e76 2593 There are quite a few relaxing opportunities available on the mn10300:
252b5132 2594
07d6d2b8 2595 * calls:32 -> calls:16 2 bytes
252b5132
RH
2596 * call:32 -> call:16 2 bytes
2597
2598 * call:32 -> calls:32 1 byte
2599 * call:16 -> calls:16 1 byte
2600 * These are done anytime using "calls" would result
2601 in smaller code, or when necessary to preserve the
2602 meaning of the program.
2603
2604 * call:32 varies
2605 * call:16
2606 * In some circumstances we can move instructions
2607 from a function prologue into a "call" instruction.
2608 This is only done if the resulting code is no larger
2609 than the original code.
2610
252b5132
RH
2611 * jmp:32 -> jmp:16 2 bytes
2612 * jmp:16 -> bra:8 1 byte
2613
2614 * If the previous instruction is a conditional branch
2615 around the jump/bra, we may be able to reverse its condition
2616 and change its target to the jump's target. The jump/bra
2617 can then be deleted. 2 bytes
2618
2619 * mov abs32 -> mov abs16 1 or 2 bytes
2620
2621 * Most instructions which accept imm32 can relax to imm16 1 or 2 bytes
2622 - Most instructions which accept imm16 can relax to imm8 1 or 2 bytes
2623
2624 * Most instructions which accept d32 can relax to d16 1 or 2 bytes
2625 - Most instructions which accept d16 can relax to d8 1 or 2 bytes
2626
2627 We don't handle imm16->imm8 or d16->d8 as they're very rare
2628 and somewhat more difficult to support. */
2629
b34976b6 2630static bfd_boolean
603b7257
NC
2631mn10300_elf_relax_section (bfd *abfd,
2632 asection *sec,
2633 struct bfd_link_info *link_info,
2634 bfd_boolean *again)
252b5132
RH
2635{
2636 Elf_Internal_Shdr *symtab_hdr;
2637 Elf_Internal_Rela *internal_relocs = NULL;
252b5132
RH
2638 Elf_Internal_Rela *irel, *irelend;
2639 bfd_byte *contents = NULL;
6cdc0ccc 2640 Elf_Internal_Sym *isymbuf = NULL;
252b5132 2641 struct elf32_mn10300_link_hash_table *hash_table;
6cdc0ccc 2642 asection *section = sec;
fc91707c 2643 bfd_vma align_gap_adjustment;
252b5132 2644
0e1862bb 2645 if (bfd_link_relocatable (link_info))
c8a1f254
NS
2646 (*link_info->callbacks->einfo)
2647 (_("%P%F: --relax and -r may not be used together\n"));
2648
252b5132 2649 /* Assume nothing changes. */
b34976b6 2650 *again = FALSE;
252b5132
RH
2651
2652 /* We need a pointer to the mn10300 specific hash table. */
2653 hash_table = elf32_mn10300_hash_table (link_info);
4dfe6ac6
NC
2654 if (hash_table == NULL)
2655 return FALSE;
252b5132
RH
2656
2657 /* Initialize fields in each hash table entry the first time through. */
2658 if ((hash_table->flags & MN10300_HASH_ENTRIES_INITIALIZED) == 0)
2659 {
2660 bfd *input_bfd;
2661
2662 /* Iterate over all the input bfds. */
2663 for (input_bfd = link_info->input_bfds;
2664 input_bfd != NULL;
c72f2fb2 2665 input_bfd = input_bfd->link.next)
252b5132 2666 {
252b5132
RH
2667 /* We're going to need all the symbols for each bfd. */
2668 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6cdc0ccc 2669 if (symtab_hdr->sh_info != 0)
9ad5cbcf 2670 {
6cdc0ccc
AM
2671 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
2672 if (isymbuf == NULL)
2673 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2674 symtab_hdr->sh_info, 0,
2675 NULL, NULL, NULL);
2676 if (isymbuf == NULL)
010ac81f
KH
2677 goto error_return;
2678 }
252b5132
RH
2679
2680 /* Iterate over each section in this bfd. */
2681 for (section = input_bfd->sections;
2682 section != NULL;
2683 section = section->next)
2684 {
2685 struct elf32_mn10300_link_hash_entry *hash;
86033394 2686 asection *sym_sec = NULL;
252b5132
RH
2687 const char *sym_name;
2688 char *new_name;
252b5132 2689
e948afaf 2690 /* If there's nothing to do in this section, skip it. */
eb13e63f
DD
2691 if (! ((section->flags & SEC_RELOC) != 0
2692 && section->reloc_count != 0))
2693 continue;
2694 if ((section->flags & SEC_ALLOC) == 0)
e948afaf
AO
2695 continue;
2696
252b5132
RH
2697 /* Get cached copy of section contents if it exists. */
2698 if (elf_section_data (section)->this_hdr.contents != NULL)
2699 contents = elf_section_data (section)->this_hdr.contents;
eea6121a 2700 else if (section->size != 0)
252b5132
RH
2701 {
2702 /* Go get them off disk. */
eea6121a
AM
2703 if (!bfd_malloc_and_get_section (input_bfd, section,
2704 &contents))
252b5132
RH
2705 goto error_return;
2706 }
2707 else
6cdc0ccc 2708 contents = NULL;
252b5132
RH
2709
2710 /* If there aren't any relocs, then there's nothing to do. */
2711 if ((section->flags & SEC_RELOC) != 0
2712 && section->reloc_count != 0)
2713 {
252b5132 2714 /* Get a copy of the native relocations. */
603b7257
NC
2715 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, section,
2716 NULL, NULL,
2717 link_info->keep_memory);
252b5132
RH
2718 if (internal_relocs == NULL)
2719 goto error_return;
252b5132
RH
2720
2721 /* Now examine each relocation. */
2722 irel = internal_relocs;
2723 irelend = irel + section->reloc_count;
2724 for (; irel < irelend; irel++)
2725 {
2726 long r_type;
2727 unsigned long r_index;
2728 unsigned char code;
2729
2730 r_type = ELF32_R_TYPE (irel->r_info);
2731 r_index = ELF32_R_SYM (irel->r_info);
2732
010ac81f 2733 if (r_type < 0 || r_type >= (int) R_MN10300_MAX)
252b5132
RH
2734 goto error_return;
2735
2736 /* We need the name and hash table entry of the target
2737 symbol! */
2738 hash = NULL;
252b5132
RH
2739 sym_sec = NULL;
2740
2741 if (r_index < symtab_hdr->sh_info)
2742 {
2743 /* A local symbol. */
6cdc0ccc 2744 Elf_Internal_Sym *isym;
dc810e39
AM
2745 struct elf_link_hash_table *elftab;
2746 bfd_size_type amt;
252b5132 2747
6cdc0ccc
AM
2748 isym = isymbuf + r_index;
2749 if (isym->st_shndx == SHN_UNDEF)
252b5132 2750 sym_sec = bfd_und_section_ptr;
6cdc0ccc 2751 else if (isym->st_shndx == SHN_ABS)
252b5132 2752 sym_sec = bfd_abs_section_ptr;
6cdc0ccc 2753 else if (isym->st_shndx == SHN_COMMON)
252b5132 2754 sym_sec = bfd_com_section_ptr;
9ad5cbcf
AM
2755 else
2756 sym_sec
2757 = bfd_section_from_elf_index (input_bfd,
6cdc0ccc 2758 isym->st_shndx);
a7c10850 2759
9ad5cbcf
AM
2760 sym_name
2761 = bfd_elf_string_from_elf_section (input_bfd,
2762 (symtab_hdr
2763 ->sh_link),
6cdc0ccc 2764 isym->st_name);
252b5132
RH
2765
2766 /* If it isn't a function, then we don't care
2767 about it. */
6cdc0ccc 2768 if (ELF_ST_TYPE (isym->st_info) != STT_FUNC)
252b5132
RH
2769 continue;
2770
2771 /* Tack on an ID so we can uniquely identify this
2772 local symbol in the global hash table. */
dc810e39
AM
2773 amt = strlen (sym_name) + 10;
2774 new_name = bfd_malloc (amt);
bfff1642 2775 if (new_name == NULL)
252b5132
RH
2776 goto error_return;
2777
f60ca5e3 2778 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
252b5132
RH
2779 sym_name = new_name;
2780
dc810e39
AM
2781 elftab = &hash_table->static_hash_table->root;
2782 hash = ((struct elf32_mn10300_link_hash_entry *)
2783 elf_link_hash_lookup (elftab, sym_name,
b34976b6 2784 TRUE, TRUE, FALSE));
252b5132
RH
2785 free (new_name);
2786 }
2787 else
2788 {
2789 r_index -= symtab_hdr->sh_info;
2790 hash = (struct elf32_mn10300_link_hash_entry *)
2791 elf_sym_hashes (input_bfd)[r_index];
2792 }
2793
eb13e63f
DD
2794 sym_name = hash->root.root.root.string;
2795 if ((section->flags & SEC_CODE) != 0)
2796 {
2797 /* If this is not a "call" instruction, then we
2798 should convert "call" instructions to "calls"
2799 instructions. */
2800 code = bfd_get_8 (input_bfd,
2801 contents + irel->r_offset - 1);
2802 if (code != 0xdd && code != 0xcd)
2803 hash->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2804 }
252b5132 2805
6cdc0ccc
AM
2806 /* If this is a jump/call, then bump the
2807 direct_calls counter. Else force "call" to
2808 "calls" conversions. */
252b5132 2809 if (r_type == R_MN10300_PCREL32
03a12831
AO
2810 || r_type == R_MN10300_PLT32
2811 || r_type == R_MN10300_PLT16
252b5132
RH
2812 || r_type == R_MN10300_PCREL16)
2813 hash->direct_calls++;
2814 else
2815 hash->flags |= MN10300_CONVERT_CALL_TO_CALLS;
2816 }
2817 }
2818
2819 /* Now look at the actual contents to get the stack size,
2820 and a list of what registers were saved in the prologue
2821 (ie movm_args). */
2822 if ((section->flags & SEC_CODE) != 0)
2823 {
6cdc0ccc 2824 Elf_Internal_Sym *isym, *isymend;
9ad5cbcf 2825 unsigned int sec_shndx;
6cdc0ccc
AM
2826 struct elf_link_hash_entry **hashes;
2827 struct elf_link_hash_entry **end_hashes;
2828 unsigned int symcount;
252b5132 2829
9ad5cbcf
AM
2830 sec_shndx = _bfd_elf_section_from_bfd_section (input_bfd,
2831 section);
252b5132 2832
1055df0f
AO
2833 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2834 - symtab_hdr->sh_info);
2835 hashes = elf_sym_hashes (input_bfd);
2836 end_hashes = hashes + symcount;
2837
252b5132
RH
2838 /* Look at each function defined in this section and
2839 update info for that function. */
6cdc0ccc
AM
2840 isymend = isymbuf + symtab_hdr->sh_info;
2841 for (isym = isymbuf; isym < isymend; isym++)
252b5132 2842 {
6cdc0ccc
AM
2843 if (isym->st_shndx == sec_shndx
2844 && ELF_ST_TYPE (isym->st_info) == STT_FUNC)
252b5132 2845 {
dc810e39
AM
2846 struct elf_link_hash_table *elftab;
2847 bfd_size_type amt;
1055df0f
AO
2848 struct elf_link_hash_entry **lhashes = hashes;
2849
2850 /* Skip a local symbol if it aliases a
2851 global one. */
2852 for (; lhashes < end_hashes; lhashes++)
2853 {
2854 hash = (struct elf32_mn10300_link_hash_entry *) *lhashes;
2855 if ((hash->root.root.type == bfd_link_hash_defined
2856 || hash->root.root.type == bfd_link_hash_defweak)
2857 && hash->root.root.u.def.section == section
2858 && hash->root.type == STT_FUNC
2859 && hash->root.root.u.def.value == isym->st_value)
2860 break;
2861 }
2862 if (lhashes != end_hashes)
2863 continue;
dc810e39 2864
6cdc0ccc 2865 if (isym->st_shndx == SHN_UNDEF)
252b5132 2866 sym_sec = bfd_und_section_ptr;
6cdc0ccc 2867 else if (isym->st_shndx == SHN_ABS)
252b5132 2868 sym_sec = bfd_abs_section_ptr;
6cdc0ccc 2869 else if (isym->st_shndx == SHN_COMMON)
252b5132 2870 sym_sec = bfd_com_section_ptr;
9ad5cbcf
AM
2871 else
2872 sym_sec
2873 = bfd_section_from_elf_index (input_bfd,
6cdc0ccc 2874 isym->st_shndx);
252b5132 2875
dc810e39
AM
2876 sym_name = (bfd_elf_string_from_elf_section
2877 (input_bfd, symtab_hdr->sh_link,
6cdc0ccc 2878 isym->st_name));
252b5132
RH
2879
2880 /* Tack on an ID so we can uniquely identify this
2881 local symbol in the global hash table. */
dc810e39
AM
2882 amt = strlen (sym_name) + 10;
2883 new_name = bfd_malloc (amt);
bfff1642 2884 if (new_name == NULL)
252b5132
RH
2885 goto error_return;
2886
f60ca5e3 2887 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
252b5132
RH
2888 sym_name = new_name;
2889
dc810e39
AM
2890 elftab = &hash_table->static_hash_table->root;
2891 hash = ((struct elf32_mn10300_link_hash_entry *)
2892 elf_link_hash_lookup (elftab, sym_name,
b34976b6 2893 TRUE, TRUE, FALSE));
252b5132
RH
2894 free (new_name);
2895 compute_function_info (input_bfd, hash,
6cdc0ccc 2896 isym->st_value, contents);
eb13e63f 2897 hash->value = isym->st_value;
252b5132
RH
2898 }
2899 }
2900
6cdc0ccc 2901 for (; hashes < end_hashes; hashes++)
252b5132 2902 {
6cdc0ccc 2903 hash = (struct elf32_mn10300_link_hash_entry *) *hashes;
9ad5cbcf
AM
2904 if ((hash->root.root.type == bfd_link_hash_defined
2905 || hash->root.root.type == bfd_link_hash_defweak)
2906 && hash->root.root.u.def.section == section
9bb351fd 2907 && hash->root.type == STT_FUNC)
252b5132
RH
2908 compute_function_info (input_bfd, hash,
2909 (hash)->root.root.u.def.value,
2910 contents);
2911 }
2912 }
2913
2914 /* Cache or free any memory we allocated for the relocs. */
6cdc0ccc
AM
2915 if (internal_relocs != NULL
2916 && elf_section_data (section)->relocs != internal_relocs)
2917 free (internal_relocs);
2918 internal_relocs = NULL;
252b5132
RH
2919
2920 /* Cache or free any memory we allocated for the contents. */
6cdc0ccc
AM
2921 if (contents != NULL
2922 && elf_section_data (section)->this_hdr.contents != contents)
252b5132
RH
2923 {
2924 if (! link_info->keep_memory)
6cdc0ccc 2925 free (contents);
252b5132
RH
2926 else
2927 {
2928 /* Cache the section contents for elf_link_input_bfd. */
2929 elf_section_data (section)->this_hdr.contents = contents;
2930 }
252b5132 2931 }
6cdc0ccc 2932 contents = NULL;
9ad5cbcf
AM
2933 }
2934
252b5132 2935 /* Cache or free any memory we allocated for the symbols. */
6cdc0ccc
AM
2936 if (isymbuf != NULL
2937 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132
RH
2938 {
2939 if (! link_info->keep_memory)
6cdc0ccc 2940 free (isymbuf);
252b5132
RH
2941 else
2942 {
2943 /* Cache the symbols for elf_link_input_bfd. */
6cdc0ccc 2944 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 2945 }
252b5132 2946 }
6cdc0ccc 2947 isymbuf = NULL;
252b5132
RH
2948 }
2949
2950 /* Now iterate on each symbol in the hash table and perform
2951 the final initialization steps on each. */
2952 elf32_mn10300_link_hash_traverse (hash_table,
2953 elf32_mn10300_finish_hash_table_entry,
1055df0f 2954 link_info);
252b5132
RH
2955 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2956 elf32_mn10300_finish_hash_table_entry,
1055df0f 2957 link_info);
252b5132 2958
eb13e63f
DD
2959 {
2960 /* This section of code collects all our local symbols, sorts
2961 them by value, and looks for multiple symbols referring to
2962 the same address. For those symbols, the flags are merged.
2963 At this point, the only flag that can be set is
2964 MN10300_CONVERT_CALL_TO_CALLS, so we simply OR the flags
2965 together. */
2966 int static_count = 0, i;
2967 struct elf32_mn10300_link_hash_entry **entries;
2968 struct elf32_mn10300_link_hash_entry **ptr;
2969
2970 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2971 elf32_mn10300_count_hash_table_entries,
2972 &static_count);
2973
603b7257 2974 entries = bfd_malloc (static_count * sizeof (* ptr));
eb13e63f
DD
2975
2976 ptr = entries;
2977 elf32_mn10300_link_hash_traverse (hash_table->static_hash_table,
2978 elf32_mn10300_list_hash_table_entries,
603b7257 2979 & ptr);
eb13e63f 2980
603b7257 2981 qsort (entries, static_count, sizeof (entries[0]), sort_by_value);
eb13e63f 2982
603b7257 2983 for (i = 0; i < static_count - 1; i++)
eb13e63f
DD
2984 if (entries[i]->value && entries[i]->value == entries[i+1]->value)
2985 {
2986 int v = entries[i]->flags;
2987 int j;
603b7257
NC
2988
2989 for (j = i + 1; j < static_count && entries[j]->value == entries[i]->value; j++)
eb13e63f 2990 v |= entries[j]->flags;
603b7257
NC
2991
2992 for (j = i; j < static_count && entries[j]->value == entries[i]->value; j++)
eb13e63f 2993 entries[j]->flags = v;
603b7257
NC
2994
2995 i = j - 1;
eb13e63f
DD
2996 }
2997 }
2998
252b5132
RH
2999 /* All entries in the hash table are fully initialized. */
3000 hash_table->flags |= MN10300_HASH_ENTRIES_INITIALIZED;
3001
3002 /* Now that everything has been initialized, go through each
3003 code section and delete any prologue insns which will be
3004 redundant because their operations will be performed by
3005 a "call" instruction. */
3006 for (input_bfd = link_info->input_bfds;
3007 input_bfd != NULL;
c72f2fb2 3008 input_bfd = input_bfd->link.next)
252b5132 3009 {
9ad5cbcf 3010 /* We're going to need all the local symbols for each bfd. */
252b5132 3011 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6cdc0ccc 3012 if (symtab_hdr->sh_info != 0)
9ad5cbcf 3013 {
6cdc0ccc
AM
3014 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3015 if (isymbuf == NULL)
3016 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
3017 symtab_hdr->sh_info, 0,
3018 NULL, NULL, NULL);
3019 if (isymbuf == NULL)
9ad5cbcf 3020 goto error_return;
010ac81f 3021 }
252b5132
RH
3022
3023 /* Walk over each section in this bfd. */
3024 for (section = input_bfd->sections;
3025 section != NULL;
3026 section = section->next)
3027 {
9ad5cbcf 3028 unsigned int sec_shndx;
6cdc0ccc
AM
3029 Elf_Internal_Sym *isym, *isymend;
3030 struct elf_link_hash_entry **hashes;
3031 struct elf_link_hash_entry **end_hashes;
3032 unsigned int symcount;
252b5132
RH
3033
3034 /* Skip non-code sections and empty sections. */
eea6121a 3035 if ((section->flags & SEC_CODE) == 0 || section->size == 0)
252b5132
RH
3036 continue;
3037
3038 if (section->reloc_count != 0)
3039 {
010ac81f 3040 /* Get a copy of the native relocations. */
603b7257
NC
3041 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, section,
3042 NULL, NULL,
3043 link_info->keep_memory);
010ac81f
KH
3044 if (internal_relocs == NULL)
3045 goto error_return;
252b5132
RH
3046 }
3047
3048 /* Get cached copy of section contents if it exists. */
3049 if (elf_section_data (section)->this_hdr.contents != NULL)
3050 contents = elf_section_data (section)->this_hdr.contents;
3051 else
3052 {
3053 /* Go get them off disk. */
eea6121a
AM
3054 if (!bfd_malloc_and_get_section (input_bfd, section,
3055 &contents))
252b5132
RH
3056 goto error_return;
3057 }
3058
9ad5cbcf
AM
3059 sec_shndx = _bfd_elf_section_from_bfd_section (input_bfd,
3060 section);
252b5132
RH
3061
3062 /* Now look for any function in this section which needs
3063 insns deleted from its prologue. */
6cdc0ccc
AM
3064 isymend = isymbuf + symtab_hdr->sh_info;
3065 for (isym = isymbuf; isym < isymend; isym++)
252b5132 3066 {
252b5132 3067 struct elf32_mn10300_link_hash_entry *sym_hash;
86033394 3068 asection *sym_sec = NULL;
252b5132 3069 const char *sym_name;
252b5132 3070 char *new_name;
dc810e39
AM
3071 struct elf_link_hash_table *elftab;
3072 bfd_size_type amt;
252b5132 3073
6cdc0ccc 3074 if (isym->st_shndx != sec_shndx)
252b5132
RH
3075 continue;
3076
6cdc0ccc 3077 if (isym->st_shndx == SHN_UNDEF)
252b5132 3078 sym_sec = bfd_und_section_ptr;
6cdc0ccc 3079 else if (isym->st_shndx == SHN_ABS)
252b5132 3080 sym_sec = bfd_abs_section_ptr;
6cdc0ccc 3081 else if (isym->st_shndx == SHN_COMMON)
252b5132 3082 sym_sec = bfd_com_section_ptr;
86033394 3083 else
9ad5cbcf 3084 sym_sec
6cdc0ccc 3085 = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
a7c10850 3086
9ad5cbcf
AM
3087 sym_name
3088 = bfd_elf_string_from_elf_section (input_bfd,
3089 symtab_hdr->sh_link,
6cdc0ccc 3090 isym->st_name);
252b5132
RH
3091
3092 /* Tack on an ID so we can uniquely identify this
3093 local symbol in the global hash table. */
dc810e39
AM
3094 amt = strlen (sym_name) + 10;
3095 new_name = bfd_malloc (amt);
bfff1642 3096 if (new_name == NULL)
252b5132 3097 goto error_return;
f60ca5e3 3098 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
252b5132
RH
3099 sym_name = new_name;
3100
603b7257
NC
3101 elftab = & hash_table->static_hash_table->root;
3102 sym_hash = (struct elf32_mn10300_link_hash_entry *)
3103 elf_link_hash_lookup (elftab, sym_name,
3104 FALSE, FALSE, FALSE);
252b5132
RH
3105
3106 free (new_name);
3107 if (sym_hash == NULL)
3108 continue;
3109
9ad5cbcf
AM
3110 if (! (sym_hash->flags & MN10300_CONVERT_CALL_TO_CALLS)
3111 && ! (sym_hash->flags & MN10300_DELETED_PROLOGUE_BYTES))
252b5132
RH
3112 {
3113 int bytes = 0;
3114
3115 /* Note that we've changed things. */
3116 elf_section_data (section)->relocs = internal_relocs;
252b5132 3117 elf_section_data (section)->this_hdr.contents = contents;
6cdc0ccc 3118 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
3119
3120 /* Count how many bytes we're going to delete. */
3121 if (sym_hash->movm_args)
3122 bytes += 2;
3123
1a101a42
AM
3124 if (sym_hash->stack_size > 0)
3125 {
3126 if (sym_hash->stack_size <= 128)
3127 bytes += 3;
3128 else
3129 bytes += 4;
3130 }
252b5132
RH
3131
3132 /* Note that we've deleted prologue bytes for this
3133 function. */
3134 sym_hash->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3135
3136 /* Actually delete the bytes. */
3137 if (!mn10300_elf_relax_delete_bytes (input_bfd,
3138 section,
6cdc0ccc 3139 isym->st_value,
252b5132
RH
3140 bytes))
3141 goto error_return;
3142
3143 /* Something changed. Not strictly necessary, but
3144 may lead to more relaxing opportunities. */
b34976b6 3145 *again = TRUE;
252b5132
RH
3146 }
3147 }
3148
3149 /* Look for any global functions in this section which
3150 need insns deleted from their prologues. */
6cdc0ccc 3151 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
9ad5cbcf 3152 - symtab_hdr->sh_info);
709e685d 3153 hashes = elf_sym_hashes (input_bfd);
6cdc0ccc
AM
3154 end_hashes = hashes + symcount;
3155 for (; hashes < end_hashes; hashes++)
252b5132 3156 {
252b5132
RH
3157 struct elf32_mn10300_link_hash_entry *sym_hash;
3158
6cdc0ccc 3159 sym_hash = (struct elf32_mn10300_link_hash_entry *) *hashes;
9ad5cbcf
AM
3160 if ((sym_hash->root.root.type == bfd_link_hash_defined
3161 || sym_hash->root.root.type == bfd_link_hash_defweak)
3162 && sym_hash->root.root.u.def.section == section
3163 && ! (sym_hash->flags & MN10300_CONVERT_CALL_TO_CALLS)
3164 && ! (sym_hash->flags & MN10300_DELETED_PROLOGUE_BYTES))
252b5132
RH
3165 {
3166 int bytes = 0;
9ad5cbcf 3167 bfd_vma symval;
0a22ae8e 3168 struct elf_link_hash_entry **hh;
252b5132
RH
3169
3170 /* Note that we've changed things. */
3171 elf_section_data (section)->relocs = internal_relocs;
252b5132 3172 elf_section_data (section)->this_hdr.contents = contents;
6cdc0ccc 3173 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
3174
3175 /* Count how many bytes we're going to delete. */
3176 if (sym_hash->movm_args)
3177 bytes += 2;
3178
1a101a42
AM
3179 if (sym_hash->stack_size > 0)
3180 {
3181 if (sym_hash->stack_size <= 128)
3182 bytes += 3;
3183 else
3184 bytes += 4;
3185 }
252b5132
RH
3186
3187 /* Note that we've deleted prologue bytes for this
3188 function. */
3189 sym_hash->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3190
3191 /* Actually delete the bytes. */
9ad5cbcf 3192 symval = sym_hash->root.root.u.def.value;
252b5132
RH
3193 if (!mn10300_elf_relax_delete_bytes (input_bfd,
3194 section,
9ad5cbcf 3195 symval,
252b5132
RH
3196 bytes))
3197 goto error_return;
3198
0a22ae8e
NC
3199 /* There may be other C++ functions symbols with the same
3200 address. If so then mark these as having had their
3201 prologue bytes deleted as well. */
3202 for (hh = elf_sym_hashes (input_bfd); hh < end_hashes; hh++)
3203 {
3204 struct elf32_mn10300_link_hash_entry *h;
3205
3206 h = (struct elf32_mn10300_link_hash_entry *) * hh;
3207
3208 if (h != sym_hash
3209 && (h->root.root.type == bfd_link_hash_defined
3210 || h->root.root.type == bfd_link_hash_defweak)
3211 && h->root.root.u.def.section == section
3212 && ! (h->flags & MN10300_CONVERT_CALL_TO_CALLS)
3213 && h->root.root.u.def.value == symval
3214 && h->root.type == STT_FUNC)
3215 h->flags |= MN10300_DELETED_PROLOGUE_BYTES;
3216 }
3217
252b5132
RH
3218 /* Something changed. Not strictly necessary, but
3219 may lead to more relaxing opportunities. */
b34976b6 3220 *again = TRUE;
252b5132
RH
3221 }
3222 }
3223
3224 /* Cache or free any memory we allocated for the relocs. */
6cdc0ccc
AM
3225 if (internal_relocs != NULL
3226 && elf_section_data (section)->relocs != internal_relocs)
3227 free (internal_relocs);
3228 internal_relocs = NULL;
252b5132
RH
3229
3230 /* Cache or free any memory we allocated for the contents. */
6cdc0ccc
AM
3231 if (contents != NULL
3232 && elf_section_data (section)->this_hdr.contents != contents)
252b5132
RH
3233 {
3234 if (! link_info->keep_memory)
6cdc0ccc 3235 free (contents);
252b5132 3236 else
603b7257
NC
3237 /* Cache the section contents for elf_link_input_bfd. */
3238 elf_section_data (section)->this_hdr.contents = contents;
252b5132 3239 }
6cdc0ccc 3240 contents = NULL;
9ad5cbcf
AM
3241 }
3242
252b5132 3243 /* Cache or free any memory we allocated for the symbols. */
6cdc0ccc
AM
3244 if (isymbuf != NULL
3245 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132
RH
3246 {
3247 if (! link_info->keep_memory)
6cdc0ccc
AM
3248 free (isymbuf);
3249 else
603b7257
NC
3250 /* Cache the symbols for elf_link_input_bfd. */
3251 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3252 }
6cdc0ccc 3253 isymbuf = NULL;
252b5132
RH
3254 }
3255 }
3256
252b5132
RH
3257 /* (Re)initialize for the basic instruction shortening/relaxing pass. */
3258 contents = NULL;
252b5132 3259 internal_relocs = NULL;
6cdc0ccc
AM
3260 isymbuf = NULL;
3261 /* For error_return. */
3262 section = sec;
252b5132 3263
1049f94e 3264 /* We don't have to do anything for a relocatable link, if
252b5132
RH
3265 this section does not have relocs, or if this is not a
3266 code section. */
0e1862bb 3267 if (bfd_link_relocatable (link_info)
252b5132
RH
3268 || (sec->flags & SEC_RELOC) == 0
3269 || sec->reloc_count == 0
3270 || (sec->flags & SEC_CODE) == 0)
b34976b6 3271 return TRUE;
252b5132 3272
252b5132
RH
3273 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3274
3275 /* Get a copy of the native relocations. */
603b7257
NC
3276 internal_relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
3277 link_info->keep_memory);
252b5132
RH
3278 if (internal_relocs == NULL)
3279 goto error_return;
252b5132 3280
fc91707c
NC
3281 /* Scan for worst case alignment gap changes. Note that this logic
3282 is not ideal; what we should do is run this scan for every
3283 opcode/address range and adjust accordingly, but that's
3284 expensive. Worst case is that for an alignment of N bytes, we
3285 move by 2*N-N-1 bytes, assuming we have aligns of 1, 2, 4, 8, etc
3286 all before it. Plus, this still doesn't cover cross-section
3287 jumps with section alignment. */
3288 irelend = internal_relocs + sec->reloc_count;
3289 align_gap_adjustment = 0;
3290 for (irel = internal_relocs; irel < irelend; irel++)
3291 {
3292 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_ALIGN)
3293 {
3294 bfd_vma adj = 1 << irel->r_addend;
3295 bfd_vma aend = irel->r_offset;
3296
3297 aend = BFD_ALIGN (aend, 1 << irel->r_addend);
e23f1610 3298 adj = 2 * adj - adj - 1;
fc91707c
NC
3299
3300 /* Record the biggest adjustmnet. Skip any alignment at the
3301 end of our section. */
3302 if (align_gap_adjustment < adj
3303 && aend < sec->output_section->vma + sec->output_offset + sec->size)
3304 align_gap_adjustment = adj;
3305 }
3306 }
3307
252b5132
RH
3308 /* Walk through them looking for relaxing opportunities. */
3309 irelend = internal_relocs + sec->reloc_count;
3310 for (irel = internal_relocs; irel < irelend; irel++)
3311 {
3312 bfd_vma symval;
605d18d4
DD
3313 bfd_signed_vma jump_offset;
3314 asection *sym_sec = NULL;
252b5132
RH
3315 struct elf32_mn10300_link_hash_entry *h = NULL;
3316
3317 /* If this isn't something that can be relaxed, then ignore
3318 this reloc. */
3319 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_NONE
3320 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_8
3321 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_MAX)
3322 continue;
3323
3324 /* Get the section contents if we haven't done so already. */
3325 if (contents == NULL)
3326 {
3327 /* Get cached copy if it exists. */
3328 if (elf_section_data (sec)->this_hdr.contents != NULL)
3329 contents = elf_section_data (sec)->this_hdr.contents;
3330 else
3331 {
3332 /* Go get them off disk. */
eea6121a 3333 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
3334 goto error_return;
3335 }
3336 }
3337
b34976b6 3338 /* Read this BFD's symbols if we haven't done so already. */
6cdc0ccc 3339 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
252b5132 3340 {
6cdc0ccc
AM
3341 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3342 if (isymbuf == NULL)
3343 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3344 symtab_hdr->sh_info, 0,
3345 NULL, NULL, NULL);
3346 if (isymbuf == NULL)
3347 goto error_return;
252b5132
RH
3348 }
3349
3350 /* Get the value of the symbol referred to by the reloc. */
3351 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
3352 {
6cdc0ccc 3353 Elf_Internal_Sym *isym;
252b5132
RH
3354 const char *sym_name;
3355 char *new_name;
3356
3357 /* A local symbol. */
6cdc0ccc
AM
3358 isym = isymbuf + ELF32_R_SYM (irel->r_info);
3359 if (isym->st_shndx == SHN_UNDEF)
252b5132 3360 sym_sec = bfd_und_section_ptr;
6cdc0ccc 3361 else if (isym->st_shndx == SHN_ABS)
252b5132 3362 sym_sec = bfd_abs_section_ptr;
6cdc0ccc 3363 else if (isym->st_shndx == SHN_COMMON)
252b5132 3364 sym_sec = bfd_com_section_ptr;
86033394 3365 else
6cdc0ccc 3366 sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7c10850 3367
252b5132
RH
3368 sym_name = bfd_elf_string_from_elf_section (abfd,
3369 symtab_hdr->sh_link,
6cdc0ccc 3370 isym->st_name);
252b5132 3371
dd90f1b2 3372 if ((sym_sec->flags & SEC_MERGE)
dbaa2011 3373 && sym_sec->sec_info_type == SEC_INFO_TYPE_MERGE)
dd90f1b2 3374 {
2709f570
NC
3375 symval = isym->st_value;
3376
3377 /* GAS may reduce relocations against symbols in SEC_MERGE
3378 sections to a relocation against the section symbol when
3379 the original addend was zero. When the reloc is against
3380 a section symbol we should include the addend in the
3381 offset passed to _bfd_merged_section_offset, since the
3382 location of interest is the original symbol. On the
3383 other hand, an access to "sym+addend" where "sym" is not
3384 a section symbol should not include the addend; Such an
3385 access is presumed to be an offset from "sym"; The
3386 location of interest is just "sym". */
3387 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
3388 symval += irel->r_addend;
3389
281153f3
NC
3390 symval = _bfd_merged_section_offset (abfd, & sym_sec,
3391 elf_section_data (sym_sec)->sec_info,
3392 symval);
2709f570
NC
3393
3394 if (ELF_ST_TYPE (isym->st_info) != STT_SECTION)
3395 symval += irel->r_addend;
3396
3397 symval += sym_sec->output_section->vma
3398 + sym_sec->output_offset - irel->r_addend;
dd90f1b2
DD
3399 }
3400 else
bfff1642
NC
3401 symval = (isym->st_value
3402 + sym_sec->output_section->vma
3403 + sym_sec->output_offset);
603b7257 3404
252b5132
RH
3405 /* Tack on an ID so we can uniquely identify this
3406 local symbol in the global hash table. */
dc810e39 3407 new_name = bfd_malloc ((bfd_size_type) strlen (sym_name) + 10);
bfff1642 3408 if (new_name == NULL)
252b5132 3409 goto error_return;
f60ca5e3 3410 sprintf (new_name, "%s_%08x", sym_name, sym_sec->id);
252b5132
RH
3411 sym_name = new_name;
3412
3413 h = (struct elf32_mn10300_link_hash_entry *)
3414 elf_link_hash_lookup (&hash_table->static_hash_table->root,
b34976b6 3415 sym_name, FALSE, FALSE, FALSE);
252b5132
RH
3416 free (new_name);
3417 }
3418 else
3419 {
3420 unsigned long indx;
3421
3422 /* An external symbol. */
3423 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
3424 h = (struct elf32_mn10300_link_hash_entry *)
3425 (elf_sym_hashes (abfd)[indx]);
3426 BFD_ASSERT (h != NULL);
3427 if (h->root.root.type != bfd_link_hash_defined
3428 && h->root.root.type != bfd_link_hash_defweak)
603b7257
NC
3429 /* This appears to be a reference to an undefined
3430 symbol. Just ignore it--it will be caught by the
3431 regular reloc processing. */
3432 continue;
252b5132 3433
bfff1642
NC
3434 /* Check for a reference to a discarded symbol and ignore it. */
3435 if (h->root.root.u.def.section->output_section == NULL)
3436 continue;
3437
605d18d4
DD
3438 sym_sec = h->root.root.u.def.section->output_section;
3439
252b5132
RH
3440 symval = (h->root.root.u.def.value
3441 + h->root.root.u.def.section->output_section->vma
3442 + h->root.root.u.def.section->output_offset);
3443 }
3444
3445 /* For simplicity of coding, we are going to modify the section
3446 contents, the section relocs, and the BFD symbol table. We
3447 must tell the rest of the code not to free up this
3448 information. It would be possible to instead create a table
3449 of changes which have to be made, as is done in coff-mips.c;
3450 that would be more work, but would require less memory when
3451 the linker is run. */
3452
3453 /* Try to turn a 32bit pc-relative branch/call into a 16bit pc-relative
3454 branch/call, also deal with "call" -> "calls" conversions and
3455 insertion of prologue data into "call" instructions. */
03a12831
AO
3456 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL32
3457 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PLT32)
252b5132
RH
3458 {
3459 bfd_vma value = symval;
3460
03a12831
AO
3461 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PLT32
3462 && h != NULL
3463 && ELF_ST_VISIBILITY (h->root.other) != STV_INTERNAL
3464 && ELF_ST_VISIBILITY (h->root.other) != STV_HIDDEN
3465 && h->root.plt.offset != (bfd_vma) -1)
3466 {
3467 asection * splt;
3468
3d4d4302 3469 splt = hash_table->root.splt;
03a12831
AO
3470 value = ((splt->output_section->vma
3471 + splt->output_offset
3472 + h->root.plt.offset)
3473 - (sec->output_section->vma
3474 + sec->output_offset
3475 + irel->r_offset));
3476 }
3477
252b5132
RH
3478 /* If we've got a "call" instruction that needs to be turned
3479 into a "calls" instruction, do so now. It saves a byte. */
3480 if (h && (h->flags & MN10300_CONVERT_CALL_TO_CALLS))
3481 {
3482 unsigned char code;
3483
3484 /* Get the opcode. */
3485 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3486
3487 /* Make sure we're working with a "call" instruction! */
3488 if (code == 0xdd)
3489 {
3490 /* Note that we've changed the relocs, section contents,
3491 etc. */
3492 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3493 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 3494 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
3495
3496 /* Fix the opcode. */
3497 bfd_put_8 (abfd, 0xfc, contents + irel->r_offset - 1);
3498 bfd_put_8 (abfd, 0xff, contents + irel->r_offset);
3499
3500 /* Fix irel->r_offset and irel->r_addend. */
3501 irel->r_offset += 1;
3502 irel->r_addend += 1;
3503
3504 /* Delete one byte of data. */
3505 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3506 irel->r_offset + 3, 1))
3507 goto error_return;
3508
3509 /* That will change things, so, we should relax again.
3510 Note that this is not required, and it may be slow. */
b34976b6 3511 *again = TRUE;
252b5132
RH
3512 }
3513 }
3514 else if (h)
3515 {
3516 /* We've got a "call" instruction which needs some data
3517 from target function filled in. */
3518 unsigned char code;
3519
3520 /* Get the opcode. */
3521 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3522
3523 /* Insert data from the target function into the "call"
3524 instruction if needed. */
3525 if (code == 0xdd)
3526 {
3527 bfd_put_8 (abfd, h->movm_args, contents + irel->r_offset + 4);
3528 bfd_put_8 (abfd, h->stack_size + h->movm_stack_size,
3529 contents + irel->r_offset + 5);
3530 }
3531 }
3532
3533 /* Deal with pc-relative gunk. */
3534 value -= (sec->output_section->vma + sec->output_offset);
3535 value -= irel->r_offset;
3536 value += irel->r_addend;
3537
3538 /* See if the value will fit in 16 bits, note the high value is
3539 0x7fff + 2 as the target will be two bytes closer if we are
605d18d4
DD
3540 able to relax, if it's in the same section. */
3541 if (sec->output_section == sym_sec->output_section)
3542 jump_offset = 0x8001;
3543 else
3544 jump_offset = 0x7fff;
3545
fc91707c
NC
3546 /* Account for jumps across alignment boundaries using
3547 align_gap_adjustment. */
605d18d4 3548 if ((bfd_signed_vma) value < jump_offset - (bfd_signed_vma) align_gap_adjustment
fc91707c 3549 && ((bfd_signed_vma) value > -0x8000 + (bfd_signed_vma) align_gap_adjustment))
252b5132
RH
3550 {
3551 unsigned char code;
3552
3553 /* Get the opcode. */
3554 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3555
3556 if (code != 0xdc && code != 0xdd && code != 0xff)
3557 continue;
3558
3559 /* Note that we've changed the relocs, section contents, etc. */
3560 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3561 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 3562 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
3563
3564 /* Fix the opcode. */
3565 if (code == 0xdc)
3566 bfd_put_8 (abfd, 0xcc, contents + irel->r_offset - 1);
3567 else if (code == 0xdd)
3568 bfd_put_8 (abfd, 0xcd, contents + irel->r_offset - 1);
3569 else if (code == 0xff)
3570 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
3571
3572 /* Fix the relocation's type. */
3573 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
03a12831
AO
3574 (ELF32_R_TYPE (irel->r_info)
3575 == (int) R_MN10300_PLT32)
3576 ? R_MN10300_PLT16 :
252b5132
RH
3577 R_MN10300_PCREL16);
3578
3579 /* Delete two bytes of data. */
3580 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3581 irel->r_offset + 1, 2))
3582 goto error_return;
3583
3584 /* That will change things, so, we should relax again.
3585 Note that this is not required, and it may be slow. */
b34976b6 3586 *again = TRUE;
252b5132
RH
3587 }
3588 }
3589
3590 /* Try to turn a 16bit pc-relative branch into a 8bit pc-relative
3591 branch. */
3592 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL16)
3593 {
3594 bfd_vma value = symval;
3595
3596 /* If we've got a "call" instruction that needs to be turned
3597 into a "calls" instruction, do so now. It saves a byte. */
3598 if (h && (h->flags & MN10300_CONVERT_CALL_TO_CALLS))
3599 {
3600 unsigned char code;
3601
3602 /* Get the opcode. */
3603 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3604
3605 /* Make sure we're working with a "call" instruction! */
3606 if (code == 0xcd)
3607 {
3608 /* Note that we've changed the relocs, section contents,
3609 etc. */
3610 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3611 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 3612 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
3613
3614 /* Fix the opcode. */
3615 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 1);
3616 bfd_put_8 (abfd, 0xff, contents + irel->r_offset);
3617
3618 /* Fix irel->r_offset and irel->r_addend. */
3619 irel->r_offset += 1;
3620 irel->r_addend += 1;
3621
3622 /* Delete one byte of data. */
3623 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3624 irel->r_offset + 1, 1))
3625 goto error_return;
3626
3627 /* That will change things, so, we should relax again.
3628 Note that this is not required, and it may be slow. */
b34976b6 3629 *again = TRUE;
252b5132
RH
3630 }
3631 }
3632 else if (h)
3633 {
3634 unsigned char code;
3635
3636 /* Get the opcode. */
3637 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3638
3639 /* Insert data from the target function into the "call"
3640 instruction if needed. */
3641 if (code == 0xcd)
3642 {
3643 bfd_put_8 (abfd, h->movm_args, contents + irel->r_offset + 2);
3644 bfd_put_8 (abfd, h->stack_size + h->movm_stack_size,
3645 contents + irel->r_offset + 3);
3646 }
3647 }
3648
3649 /* Deal with pc-relative gunk. */
3650 value -= (sec->output_section->vma + sec->output_offset);
3651 value -= irel->r_offset;
3652 value += irel->r_addend;
3653
3654 /* See if the value will fit in 8 bits, note the high value is
3655 0x7f + 1 as the target will be one bytes closer if we are
3656 able to relax. */
010ac81f 3657 if ((long) value < 0x80 && (long) value > -0x80)
252b5132
RH
3658 {
3659 unsigned char code;
3660
3661 /* Get the opcode. */
3662 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3663
3664 if (code != 0xcc)
3665 continue;
3666
3667 /* Note that we've changed the relocs, section contents, etc. */
3668 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3669 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 3670 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
3671
3672 /* Fix the opcode. */
3673 bfd_put_8 (abfd, 0xca, contents + irel->r_offset - 1);
3674
3675 /* Fix the relocation's type. */
3676 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3677 R_MN10300_PCREL8);
3678
3679 /* Delete one byte of data. */
3680 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3681 irel->r_offset + 1, 1))
3682 goto error_return;
3683
3684 /* That will change things, so, we should relax again.
3685 Note that this is not required, and it may be slow. */
b34976b6 3686 *again = TRUE;
252b5132
RH
3687 }
3688 }
3689
3690 /* Try to eliminate an unconditional 8 bit pc-relative branch
3691 which immediately follows a conditional 8 bit pc-relative
3692 branch around the unconditional branch.
3693
3694 original: new:
3695 bCC lab1 bCC' lab2
3696 bra lab2
3697 lab1: lab1:
3698
252b5132
RH
3699 This happens when the bCC can't reach lab2 at assembly time,
3700 but due to other relaxations it can reach at link time. */
3701 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_PCREL8)
3702 {
3703 Elf_Internal_Rela *nrel;
3704 bfd_vma value = symval;
3705 unsigned char code;
3706
3707 /* Deal with pc-relative gunk. */
3708 value -= (sec->output_section->vma + sec->output_offset);
3709 value -= irel->r_offset;
3710 value += irel->r_addend;
3711
3712 /* Do nothing if this reloc is the last byte in the section. */
eea6121a 3713 if (irel->r_offset == sec->size)
252b5132
RH
3714 continue;
3715
3716 /* See if the next instruction is an unconditional pc-relative
3717 branch, more often than not this test will fail, so we
3718 test it first to speed things up. */
3719 code = bfd_get_8 (abfd, contents + irel->r_offset + 1);
3720 if (code != 0xca)
3721 continue;
3722
3723 /* Also make sure the next relocation applies to the next
3724 instruction and that it's a pc-relative 8 bit branch. */
3725 nrel = irel + 1;
3726 if (nrel == irelend
3727 || irel->r_offset + 2 != nrel->r_offset
3728 || ELF32_R_TYPE (nrel->r_info) != (int) R_MN10300_PCREL8)
3729 continue;
3730
3731 /* Make sure our destination immediately follows the
3732 unconditional branch. */
3733 if (symval != (sec->output_section->vma + sec->output_offset
3734 + irel->r_offset + 3))
3735 continue;
3736
3737 /* Now make sure we are a conditional branch. This may not
3738 be necessary, but why take the chance.
3739
3740 Note these checks assume that R_MN10300_PCREL8 relocs
3741 only occur on bCC and bCCx insns. If they occured
3742 elsewhere, we'd need to know the start of this insn
3743 for this check to be accurate. */
3744 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
3745 if (code != 0xc0 && code != 0xc1 && code != 0xc2
3746 && code != 0xc3 && code != 0xc4 && code != 0xc5
3747 && code != 0xc6 && code != 0xc7 && code != 0xc8
3748 && code != 0xc9 && code != 0xe8 && code != 0xe9
3749 && code != 0xea && code != 0xeb)
3750 continue;
3751
3752 /* We also have to be sure there is no symbol/label
3753 at the unconditional branch. */
6cdc0ccc
AM
3754 if (mn10300_elf_symbol_address_p (abfd, sec, isymbuf,
3755 irel->r_offset + 1))
252b5132
RH
3756 continue;
3757
3758 /* Note that we've changed the relocs, section contents, etc. */
3759 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3760 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 3761 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
3762
3763 /* Reverse the condition of the first branch. */
3764 switch (code)
3765 {
010ac81f
KH
3766 case 0xc8:
3767 code = 0xc9;
3768 break;
3769 case 0xc9:
3770 code = 0xc8;
3771 break;
3772 case 0xc0:
3773 code = 0xc2;
3774 break;
3775 case 0xc2:
3776 code = 0xc0;
3777 break;
3778 case 0xc3:
3779 code = 0xc1;
3780 break;
3781 case 0xc1:
3782 code = 0xc3;
3783 break;
3784 case 0xc4:
3785 code = 0xc6;
3786 break;
3787 case 0xc6:
3788 code = 0xc4;
3789 break;
3790 case 0xc7:
3791 code = 0xc5;
3792 break;
3793 case 0xc5:
3794 code = 0xc7;
3795 break;
3796 case 0xe8:
3797 code = 0xe9;
3798 break;
3799 case 0x9d:
3800 code = 0xe8;
3801 break;
3802 case 0xea:
3803 code = 0xeb;
3804 break;
3805 case 0xeb:
3806 code = 0xea;
3807 break;
252b5132
RH
3808 }
3809 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
3810
3811 /* Set the reloc type and symbol for the first branch
3812 from the second branch. */
3813 irel->r_info = nrel->r_info;
3814
3815 /* Make the reloc for the second branch a null reloc. */
3816 nrel->r_info = ELF32_R_INFO (ELF32_R_SYM (nrel->r_info),
3817 R_MN10300_NONE);
3818
3819 /* Delete two bytes of data. */
3820 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3821 irel->r_offset + 1, 2))
3822 goto error_return;
3823
3824 /* That will change things, so, we should relax again.
3825 Note that this is not required, and it may be slow. */
b34976b6 3826 *again = TRUE;
252b5132
RH
3827 }
3828
31f8dc8f
JL
3829 /* Try to turn a 24 immediate, displacement or absolute address
3830 into a 8 immediate, displacement or absolute address. */
3831 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_24)
3832 {
3833 bfd_vma value = symval;
3834 value += irel->r_addend;
3835
3836 /* See if the value will fit in 8 bits. */
010ac81f 3837 if ((long) value < 0x7f && (long) value > -0x80)
31f8dc8f
JL
3838 {
3839 unsigned char code;
3840
3841 /* AM33 insns which have 24 operands are 6 bytes long and
3842 will have 0xfd as the first byte. */
3843
3844 /* Get the first opcode. */
3845 code = bfd_get_8 (abfd, contents + irel->r_offset - 3);
3846
3847 if (code == 0xfd)
3848 {
010ac81f
KH
3849 /* Get the second opcode. */
3850 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
31f8dc8f
JL
3851
3852 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3853 equivalent instructions exists. */
3b36f7e6 3854 if (code != 0x6b && code != 0x7b
31f8dc8f
JL
3855 && code != 0x8b && code != 0x9b
3856 && ((code & 0x0f) == 0x09 || (code & 0x0f) == 0x08
3857 || (code & 0x0f) == 0x0a || (code & 0x0f) == 0x0b
3858 || (code & 0x0f) == 0x0e))
3859 {
3860 /* Not safe if the high bit is on as relaxing may
3b36f7e6
AM
3861 move the value out of high mem and thus not fit
3862 in a signed 8bit value. This is currently over
3863 conservative. */
31f8dc8f
JL
3864 if ((value & 0x80) == 0)
3865 {
3866 /* Note that we've changed the relocation contents,
3867 etc. */
3868 elf_section_data (sec)->relocs = internal_relocs;
31f8dc8f 3869 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 3870 symtab_hdr->contents = (unsigned char *) isymbuf;
31f8dc8f
JL
3871
3872 /* Fix the opcode. */
3873 bfd_put_8 (abfd, 0xfb, contents + irel->r_offset - 3);
3874 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
3875
3876 /* Fix the relocation's type. */
010ac81f
KH
3877 irel->r_info =
3878 ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
3879 R_MN10300_8);
31f8dc8f
JL
3880
3881 /* Delete two bytes of data. */
3882 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3883 irel->r_offset + 1, 2))
3884 goto error_return;
3885
3886 /* That will change things, so, we should relax
3887 again. Note that this is not required, and it
010ac81f 3888 may be slow. */
b34976b6 3889 *again = TRUE;
31f8dc8f
JL
3890 break;
3891 }
3892 }
31f8dc8f
JL
3893 }
3894 }
3895 }
252b5132
RH
3896
3897 /* Try to turn a 32bit immediate, displacement or absolute address
3898 into a 16bit immediate, displacement or absolute address. */
03a12831
AO
3899 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_32
3900 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOT32
eb13e63f 3901 || ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTOFF32)
252b5132
RH
3902 {
3903 bfd_vma value = symval;
03a12831
AO
3904
3905 if (ELF32_R_TYPE (irel->r_info) != (int) R_MN10300_32)
3906 {
3907 asection * sgot;
3908
3d4d4302 3909 sgot = hash_table->root.sgot;
03a12831
AO
3910 if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOT32)
3911 {
3912 value = sgot->output_offset;
3913
3914 if (h)
3915 value += h->root.got.offset;
3916 else
3917 value += (elf_local_got_offsets
3918 (abfd)[ELF32_R_SYM (irel->r_info)]);
3919 }
3920 else if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTOFF32)
3921 value -= sgot->output_section->vma;
3922 else if (ELF32_R_TYPE (irel->r_info) == (int) R_MN10300_GOTPC32)
3923 value = (sgot->output_section->vma
3924 - (sec->output_section->vma
3925 + sec->output_offset
3926 + irel->r_offset));
3927 else
3928 abort ();
3929 }
3930
252b5132
RH
3931 value += irel->r_addend;
3932
31f8dc8f
JL
3933 /* See if the value will fit in 24 bits.
3934 We allow any 16bit match here. We prune those we can't
3935 handle below. */
010ac81f 3936 if ((long) value < 0x7fffff && (long) value > -0x800000)
31f8dc8f
JL
3937 {
3938 unsigned char code;
3939
3940 /* AM33 insns which have 32bit operands are 7 bytes long and
3941 will have 0xfe as the first byte. */
3942
3943 /* Get the first opcode. */
3944 code = bfd_get_8 (abfd, contents + irel->r_offset - 3);
3945
3946 if (code == 0xfe)
3947 {
3b36f7e6
AM
3948 /* Get the second opcode. */
3949 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
31f8dc8f
JL
3950
3951 /* All the am33 32 -> 24 relaxing possibilities. */
3952 /* We can not relax 0x6b, 0x7b, 0x8b, 0x9b as no 24bit
3953 equivalent instructions exists. */
010ac81f 3954 if (code != 0x6b && code != 0x7b
31f8dc8f 3955 && code != 0x8b && code != 0x9b
03a12831
AO
3956 && (ELF32_R_TYPE (irel->r_info)
3957 != (int) R_MN10300_GOTPC32)
31f8dc8f
JL
3958 && ((code & 0x0f) == 0x09 || (code & 0x0f) == 0x08
3959 || (code & 0x0f) == 0x0a || (code & 0x0f) == 0x0b
3960 || (code & 0x0f) == 0x0e))
3961 {
3962 /* Not safe if the high bit is on as relaxing may
3b36f7e6
AM
3963 move the value out of high mem and thus not fit
3964 in a signed 16bit value. This is currently over
3965 conservative. */
31f8dc8f
JL
3966 if ((value & 0x8000) == 0)
3967 {
3968 /* Note that we've changed the relocation contents,
3969 etc. */
3970 elf_section_data (sec)->relocs = internal_relocs;
31f8dc8f 3971 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 3972 symtab_hdr->contents = (unsigned char *) isymbuf;
31f8dc8f
JL
3973
3974 /* Fix the opcode. */
3975 bfd_put_8 (abfd, 0xfd, contents + irel->r_offset - 3);
3976 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
3977
3978 /* Fix the relocation's type. */
010ac81f
KH
3979 irel->r_info =
3980 ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
03a12831
AO
3981 (ELF32_R_TYPE (irel->r_info)
3982 == (int) R_MN10300_GOTOFF32)
3983 ? R_MN10300_GOTOFF24
3984 : (ELF32_R_TYPE (irel->r_info)
3985 == (int) R_MN10300_GOT32)
3986 ? R_MN10300_GOT24 :
010ac81f 3987 R_MN10300_24);
31f8dc8f
JL
3988
3989 /* Delete one byte of data. */
3990 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
3991 irel->r_offset + 3, 1))
3992 goto error_return;
3993
3994 /* That will change things, so, we should relax
3995 again. Note that this is not required, and it
010ac81f 3996 may be slow. */
b34976b6 3997 *again = TRUE;
31f8dc8f
JL
3998 break;
3999 }
4000 }
31f8dc8f
JL
4001 }
4002 }
252b5132
RH
4003
4004 /* See if the value will fit in 16 bits.
4005 We allow any 16bit match here. We prune those we can't
4006 handle below. */
010ac81f 4007 if ((long) value < 0x7fff && (long) value > -0x8000)
252b5132
RH
4008 {
4009 unsigned char code;
4010
4011 /* Most insns which have 32bit operands are 6 bytes long;
4012 exceptions are pcrel insns and bit insns.
4013
4014 We handle pcrel insns above. We don't bother trying
4015 to handle the bit insns here.
4016
4017 The first byte of the remaining insns will be 0xfc. */
4018
4019 /* Get the first opcode. */
4020 code = bfd_get_8 (abfd, contents + irel->r_offset - 2);
4021
4022 if (code != 0xfc)
4023 continue;
4024
4025 /* Get the second opcode. */
4026 code = bfd_get_8 (abfd, contents + irel->r_offset - 1);
4027
4028 if ((code & 0xf0) < 0x80)
4029 switch (code & 0xf0)
4030 {
4031 /* mov (d32,am),dn -> mov (d32,am),dn
4032 mov dm,(d32,am) -> mov dn,(d32,am)
4033 mov (d32,am),an -> mov (d32,am),an
4034 mov dm,(d32,am) -> mov dn,(d32,am)
4035 movbu (d32,am),dn -> movbu (d32,am),dn
4036 movbu dm,(d32,am) -> movbu dn,(d32,am)
4037 movhu (d32,am),dn -> movhu (d32,am),dn
4038 movhu dm,(d32,am) -> movhu dn,(d32,am) */
4039 case 0x00:
4040 case 0x10:
4041 case 0x20:
4042 case 0x30:
4043 case 0x40:
4044 case 0x50:
4045 case 0x60:
4046 case 0x70:
4047 /* Not safe if the high bit is on as relaxing may
4048 move the value out of high mem and thus not fit
4049 in a signed 16bit value. */
4050 if (code == 0xcc
4051 && (value & 0x8000))
4052 continue;
4053
4054 /* Note that we've changed the relocation contents, etc. */
4055 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4056 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 4057 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
4058
4059 /* Fix the opcode. */
4060 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4061 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4062
4063 /* Fix the relocation's type. */
4064 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
03a12831
AO
4065 (ELF32_R_TYPE (irel->r_info)
4066 == (int) R_MN10300_GOTOFF32)
4067 ? R_MN10300_GOTOFF16
4068 : (ELF32_R_TYPE (irel->r_info)
4069 == (int) R_MN10300_GOT32)
4070 ? R_MN10300_GOT16
4071 : (ELF32_R_TYPE (irel->r_info)
4072 == (int) R_MN10300_GOTPC32)
4073 ? R_MN10300_GOTPC16 :
252b5132
RH
4074 R_MN10300_16);
4075
4076 /* Delete two bytes of data. */
4077 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4078 irel->r_offset + 2, 2))
4079 goto error_return;
4080
4081 /* That will change things, so, we should relax again.
4082 Note that this is not required, and it may be slow. */
b34976b6 4083 *again = TRUE;
252b5132
RH
4084 break;
4085 }
4086 else if ((code & 0xf0) == 0x80
4087 || (code & 0xf0) == 0x90)
4088 switch (code & 0xf3)
4089 {
4090 /* mov dn,(abs32) -> mov dn,(abs16)
4091 movbu dn,(abs32) -> movbu dn,(abs16)
4092 movhu dn,(abs32) -> movhu dn,(abs16) */
4093 case 0x81:
4094 case 0x82:
4095 case 0x83:
4096 /* Note that we've changed the relocation contents, etc. */
4097 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4098 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 4099 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
4100
4101 if ((code & 0xf3) == 0x81)
4102 code = 0x01 + (code & 0x0c);
4103 else if ((code & 0xf3) == 0x82)
4104 code = 0x02 + (code & 0x0c);
4105 else if ((code & 0xf3) == 0x83)
4106 code = 0x03 + (code & 0x0c);
4107 else
4108 abort ();
4109
4110 /* Fix the opcode. */
4111 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
4112
4113 /* Fix the relocation's type. */
4114 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
03a12831
AO
4115 (ELF32_R_TYPE (irel->r_info)
4116 == (int) R_MN10300_GOTOFF32)
4117 ? R_MN10300_GOTOFF16
4118 : (ELF32_R_TYPE (irel->r_info)
4119 == (int) R_MN10300_GOT32)
4120 ? R_MN10300_GOT16
4121 : (ELF32_R_TYPE (irel->r_info)
4122 == (int) R_MN10300_GOTPC32)
4123 ? R_MN10300_GOTPC16 :
252b5132
RH
4124 R_MN10300_16);
4125
4126 /* The opcode got shorter too, so we have to fix the
4127 addend and offset too! */
4128 irel->r_offset -= 1;
4129
4130 /* Delete three bytes of data. */
4131 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4132 irel->r_offset + 1, 3))
4133 goto error_return;
4134
4135 /* That will change things, so, we should relax again.
4136 Note that this is not required, and it may be slow. */
b34976b6 4137 *again = TRUE;
252b5132
RH
4138 break;
4139
4140 /* mov am,(abs32) -> mov am,(abs16)
4141 mov am,(d32,sp) -> mov am,(d16,sp)
4142 mov dm,(d32,sp) -> mov dm,(d32,sp)
4143 movbu dm,(d32,sp) -> movbu dm,(d32,sp)
4144 movhu dm,(d32,sp) -> movhu dm,(d32,sp) */
4145 case 0x80:
4146 case 0x90:
4147 case 0x91:
4148 case 0x92:
4149 case 0x93:
2a0fa943
AO
4150 /* sp-based offsets are zero-extended. */
4151 if (code >= 0x90 && code <= 0x93
bfff1642 4152 && (long) value < 0)
2a0fa943
AO
4153 continue;
4154
252b5132
RH
4155 /* Note that we've changed the relocation contents, etc. */
4156 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4157 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 4158 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
4159
4160 /* Fix the opcode. */
4161 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4162 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4163
4164 /* Fix the relocation's type. */
4165 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
03a12831
AO
4166 (ELF32_R_TYPE (irel->r_info)
4167 == (int) R_MN10300_GOTOFF32)
4168 ? R_MN10300_GOTOFF16
4169 : (ELF32_R_TYPE (irel->r_info)
4170 == (int) R_MN10300_GOT32)
4171 ? R_MN10300_GOT16
4172 : (ELF32_R_TYPE (irel->r_info)
4173 == (int) R_MN10300_GOTPC32)
4174 ? R_MN10300_GOTPC16 :
252b5132
RH
4175 R_MN10300_16);
4176
4177 /* Delete two bytes of data. */
4178 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4179 irel->r_offset + 2, 2))
4180 goto error_return;
4181
4182 /* That will change things, so, we should relax again.
4183 Note that this is not required, and it may be slow. */
b34976b6 4184 *again = TRUE;
252b5132
RH
4185 break;
4186 }
4187 else if ((code & 0xf0) < 0xf0)
4188 switch (code & 0xfc)
4189 {
4190 /* mov imm32,dn -> mov imm16,dn
4191 mov imm32,an -> mov imm16,an
4192 mov (abs32),dn -> mov (abs16),dn
4193 movbu (abs32),dn -> movbu (abs16),dn
4194 movhu (abs32),dn -> movhu (abs16),dn */
4195 case 0xcc:
4196 case 0xdc:
4197 case 0xa4:
4198 case 0xa8:
4199 case 0xac:
4200 /* Not safe if the high bit is on as relaxing may
4201 move the value out of high mem and thus not fit
4202 in a signed 16bit value. */
4203 if (code == 0xcc
4204 && (value & 0x8000))
4205 continue;
4206
6746a626
NC
4207 /* "mov imm16, an" zero-extends the immediate. */
4208 if ((code & 0xfc) == 0xdc
bfff1642 4209 && (long) value < 0)
2a0fa943
AO
4210 continue;
4211
252b5132
RH
4212 /* Note that we've changed the relocation contents, etc. */
4213 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4214 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 4215 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
4216
4217 if ((code & 0xfc) == 0xcc)
4218 code = 0x2c + (code & 0x03);
4219 else if ((code & 0xfc) == 0xdc)
4220 code = 0x24 + (code & 0x03);
4221 else if ((code & 0xfc) == 0xa4)
4222 code = 0x30 + (code & 0x03);
4223 else if ((code & 0xfc) == 0xa8)
4224 code = 0x34 + (code & 0x03);
4225 else if ((code & 0xfc) == 0xac)
4226 code = 0x38 + (code & 0x03);
4227 else
4228 abort ();
4229
4230 /* Fix the opcode. */
4231 bfd_put_8 (abfd, code, contents + irel->r_offset - 2);
4232
4233 /* Fix the relocation's type. */
4234 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
03a12831
AO
4235 (ELF32_R_TYPE (irel->r_info)
4236 == (int) R_MN10300_GOTOFF32)
4237 ? R_MN10300_GOTOFF16
4238 : (ELF32_R_TYPE (irel->r_info)
4239 == (int) R_MN10300_GOT32)
4240 ? R_MN10300_GOT16
4241 : (ELF32_R_TYPE (irel->r_info)
4242 == (int) R_MN10300_GOTPC32)
4243 ? R_MN10300_GOTPC16 :
252b5132
RH
4244 R_MN10300_16);
4245
4246 /* The opcode got shorter too, so we have to fix the
4247 addend and offset too! */
4248 irel->r_offset -= 1;
4249
4250 /* Delete three bytes of data. */
4251 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4252 irel->r_offset + 1, 3))
4253 goto error_return;
4254
4255 /* That will change things, so, we should relax again.
4256 Note that this is not required, and it may be slow. */
b34976b6 4257 *again = TRUE;
252b5132
RH
4258 break;
4259
4260 /* mov (abs32),an -> mov (abs16),an
2a0fa943
AO
4261 mov (d32,sp),an -> mov (d16,sp),an
4262 mov (d32,sp),dn -> mov (d16,sp),dn
4263 movbu (d32,sp),dn -> movbu (d16,sp),dn
4264 movhu (d32,sp),dn -> movhu (d16,sp),dn
252b5132
RH
4265 add imm32,dn -> add imm16,dn
4266 cmp imm32,dn -> cmp imm16,dn
4267 add imm32,an -> add imm16,an
4268 cmp imm32,an -> cmp imm16,an
2a0fa943
AO
4269 and imm32,dn -> and imm16,dn
4270 or imm32,dn -> or imm16,dn
4271 xor imm32,dn -> xor imm16,dn
4272 btst imm32,dn -> btst imm16,dn */
252b5132
RH
4273
4274 case 0xa0:
4275 case 0xb0:
4276 case 0xb1:
4277 case 0xb2:
4278 case 0xb3:
4279 case 0xc0:
4280 case 0xc8:
4281
4282 case 0xd0:
4283 case 0xd8:
4284 case 0xe0:
4285 case 0xe1:
4286 case 0xe2:
4287 case 0xe3:
2a0fa943
AO
4288 /* cmp imm16, an zero-extends the immediate. */
4289 if (code == 0xdc
bfff1642 4290 && (long) value < 0)
2a0fa943
AO
4291 continue;
4292
4293 /* So do sp-based offsets. */
4294 if (code >= 0xb0 && code <= 0xb3
bfff1642 4295 && (long) value < 0)
2a0fa943
AO
4296 continue;
4297
252b5132
RH
4298 /* Note that we've changed the relocation contents, etc. */
4299 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4300 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 4301 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
4302
4303 /* Fix the opcode. */
4304 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4305 bfd_put_8 (abfd, code, contents + irel->r_offset - 1);
4306
4307 /* Fix the relocation's type. */
4308 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
03a12831
AO
4309 (ELF32_R_TYPE (irel->r_info)
4310 == (int) R_MN10300_GOTOFF32)
4311 ? R_MN10300_GOTOFF16
4312 : (ELF32_R_TYPE (irel->r_info)
4313 == (int) R_MN10300_GOT32)
4314 ? R_MN10300_GOT16
4315 : (ELF32_R_TYPE (irel->r_info)
4316 == (int) R_MN10300_GOTPC32)
4317 ? R_MN10300_GOTPC16 :
252b5132
RH
4318 R_MN10300_16);
4319
4320 /* Delete two bytes of data. */
4321 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4322 irel->r_offset + 2, 2))
4323 goto error_return;
4324
4325 /* That will change things, so, we should relax again.
4326 Note that this is not required, and it may be slow. */
b34976b6 4327 *again = TRUE;
252b5132
RH
4328 break;
4329 }
4330 else if (code == 0xfe)
4331 {
4332 /* add imm32,sp -> add imm16,sp */
4333
4334 /* Note that we've changed the relocation contents, etc. */
4335 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4336 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 4337 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
4338
4339 /* Fix the opcode. */
4340 bfd_put_8 (abfd, 0xfa, contents + irel->r_offset - 2);
4341 bfd_put_8 (abfd, 0xfe, contents + irel->r_offset - 1);
4342
4343 /* Fix the relocation's type. */
4344 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
03a12831
AO
4345 (ELF32_R_TYPE (irel->r_info)
4346 == (int) R_MN10300_GOT32)
4347 ? R_MN10300_GOT16
4348 : (ELF32_R_TYPE (irel->r_info)
4349 == (int) R_MN10300_GOTOFF32)
4350 ? R_MN10300_GOTOFF16
4351 : (ELF32_R_TYPE (irel->r_info)
4352 == (int) R_MN10300_GOTPC32)
4353 ? R_MN10300_GOTPC16 :
010ac81f 4354 R_MN10300_16);
252b5132
RH
4355
4356 /* Delete two bytes of data. */
4357 if (!mn10300_elf_relax_delete_bytes (abfd, sec,
4358 irel->r_offset + 2, 2))
4359 goto error_return;
4360
4361 /* That will change things, so, we should relax again.
4362 Note that this is not required, and it may be slow. */
b34976b6 4363 *again = TRUE;
252b5132
RH
4364 break;
4365 }
4366 }
4367 }
4368 }
4369
6cdc0ccc
AM
4370 if (isymbuf != NULL
4371 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132
RH
4372 {
4373 if (! link_info->keep_memory)
6cdc0ccc 4374 free (isymbuf);
252b5132
RH
4375 else
4376 {
6cdc0ccc
AM
4377 /* Cache the symbols for elf_link_input_bfd. */
4378 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 4379 }
9ad5cbcf
AM
4380 }
4381
6cdc0ccc
AM
4382 if (contents != NULL
4383 && elf_section_data (sec)->this_hdr.contents != contents)
252b5132
RH
4384 {
4385 if (! link_info->keep_memory)
6cdc0ccc
AM
4386 free (contents);
4387 else
252b5132 4388 {
6cdc0ccc
AM
4389 /* Cache the section contents for elf_link_input_bfd. */
4390 elf_section_data (sec)->this_hdr.contents = contents;
252b5132 4391 }
252b5132
RH
4392 }
4393
6cdc0ccc
AM
4394 if (internal_relocs != NULL
4395 && elf_section_data (sec)->relocs != internal_relocs)
4396 free (internal_relocs);
4397
b34976b6 4398 return TRUE;
252b5132
RH
4399
4400 error_return:
6cdc0ccc
AM
4401 if (isymbuf != NULL
4402 && symtab_hdr->contents != (unsigned char *) isymbuf)
4403 free (isymbuf);
4404 if (contents != NULL
4405 && elf_section_data (section)->this_hdr.contents != contents)
4406 free (contents);
4407 if (internal_relocs != NULL
4408 && elf_section_data (section)->relocs != internal_relocs)
4409 free (internal_relocs);
9ad5cbcf 4410
b34976b6 4411 return FALSE;
252b5132
RH
4412}
4413
252b5132
RH
4414/* This is a version of bfd_generic_get_relocated_section_contents
4415 which uses mn10300_elf_relocate_section. */
4416
4417static bfd_byte *
603b7257
NC
4418mn10300_elf_get_relocated_section_contents (bfd *output_bfd,
4419 struct bfd_link_info *link_info,
4420 struct bfd_link_order *link_order,
4421 bfd_byte *data,
4422 bfd_boolean relocatable,
4423 asymbol **symbols)
252b5132
RH
4424{
4425 Elf_Internal_Shdr *symtab_hdr;
4426 asection *input_section = link_order->u.indirect.section;
4427 bfd *input_bfd = input_section->owner;
4428 asection **sections = NULL;
4429 Elf_Internal_Rela *internal_relocs = NULL;
6cdc0ccc 4430 Elf_Internal_Sym *isymbuf = NULL;
252b5132
RH
4431
4432 /* We only need to handle the case of relaxing, or of having a
4433 particular set of section contents, specially. */
1049f94e 4434 if (relocatable
252b5132
RH
4435 || elf_section_data (input_section)->this_hdr.contents == NULL)
4436 return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
4437 link_order, data,
1049f94e 4438 relocatable,
252b5132
RH
4439 symbols);
4440
4441 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4442
4443 memcpy (data, elf_section_data (input_section)->this_hdr.contents,
eea6121a 4444 (size_t) input_section->size);
252b5132
RH
4445
4446 if ((input_section->flags & SEC_RELOC) != 0
4447 && input_section->reloc_count > 0)
4448 {
252b5132 4449 asection **secpp;
6cdc0ccc 4450 Elf_Internal_Sym *isym, *isymend;
9ad5cbcf 4451 bfd_size_type amt;
252b5132 4452
603b7257
NC
4453 internal_relocs = _bfd_elf_link_read_relocs (input_bfd, input_section,
4454 NULL, NULL, FALSE);
252b5132
RH
4455 if (internal_relocs == NULL)
4456 goto error_return;
4457
6cdc0ccc
AM
4458 if (symtab_hdr->sh_info != 0)
4459 {
4460 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
4461 if (isymbuf == NULL)
4462 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
4463 symtab_hdr->sh_info, 0,
4464 NULL, NULL, NULL);
4465 if (isymbuf == NULL)
4466 goto error_return;
4467 }
252b5132 4468
9ad5cbcf
AM
4469 amt = symtab_hdr->sh_info;
4470 amt *= sizeof (asection *);
603b7257 4471 sections = bfd_malloc (amt);
9ad5cbcf 4472 if (sections == NULL && amt != 0)
252b5132
RH
4473 goto error_return;
4474
6cdc0ccc
AM
4475 isymend = isymbuf + symtab_hdr->sh_info;
4476 for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
252b5132
RH
4477 {
4478 asection *isec;
4479
6cdc0ccc 4480 if (isym->st_shndx == SHN_UNDEF)
252b5132 4481 isec = bfd_und_section_ptr;
6cdc0ccc 4482 else if (isym->st_shndx == SHN_ABS)
252b5132 4483 isec = bfd_abs_section_ptr;
6cdc0ccc 4484 else if (isym->st_shndx == SHN_COMMON)
252b5132
RH
4485 isec = bfd_com_section_ptr;
4486 else
6cdc0ccc 4487 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
252b5132
RH
4488
4489 *secpp = isec;
4490 }
4491
4492 if (! mn10300_elf_relocate_section (output_bfd, link_info, input_bfd,
603b7257
NC
4493 input_section, data, internal_relocs,
4494 isymbuf, sections))
252b5132
RH
4495 goto error_return;
4496
4497 if (sections != NULL)
4498 free (sections);
6cdc0ccc
AM
4499 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
4500 free (isymbuf);
252b5132
RH
4501 if (internal_relocs != elf_section_data (input_section)->relocs)
4502 free (internal_relocs);
252b5132
RH
4503 }
4504
4505 return data;
4506
4507 error_return:
6cdc0ccc
AM
4508 if (sections != NULL)
4509 free (sections);
4510 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
4511 free (isymbuf);
252b5132
RH
4512 if (internal_relocs != NULL
4513 && internal_relocs != elf_section_data (input_section)->relocs)
4514 free (internal_relocs);
252b5132
RH
4515 return NULL;
4516}
4517
4518/* Assorted hash table functions. */
4519
4520/* Initialize an entry in the link hash table. */
4521
4522/* Create an entry in an MN10300 ELF linker hash table. */
4523
4524static struct bfd_hash_entry *
603b7257
NC
4525elf32_mn10300_link_hash_newfunc (struct bfd_hash_entry *entry,
4526 struct bfd_hash_table *table,
4527 const char *string)
252b5132
RH
4528{
4529 struct elf32_mn10300_link_hash_entry *ret =
4530 (struct elf32_mn10300_link_hash_entry *) entry;
4531
4532 /* Allocate the structure if it has not already been allocated by a
4533 subclass. */
603b7257
NC
4534 if (ret == NULL)
4535 ret = (struct elf32_mn10300_link_hash_entry *)
4536 bfd_hash_allocate (table, sizeof (* ret));
4537 if (ret == NULL)
252b5132
RH
4538 return (struct bfd_hash_entry *) ret;
4539
4540 /* Call the allocation method of the superclass. */
603b7257 4541 ret = (struct elf32_mn10300_link_hash_entry *)
252b5132 4542 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
603b7257
NC
4543 table, string);
4544 if (ret != NULL)
252b5132
RH
4545 {
4546 ret->direct_calls = 0;
4547 ret->stack_size = 0;
5354b572 4548 ret->movm_args = 0;
252b5132
RH
4549 ret->movm_stack_size = 0;
4550 ret->flags = 0;
eb13e63f 4551 ret->value = 0;
0a22ae8e 4552 ret->tls_type = GOT_UNKNOWN;
252b5132
RH
4553 }
4554
4555 return (struct bfd_hash_entry *) ret;
4556}
4557
0a22ae8e 4558static void
07d6d2b8
AM
4559_bfd_mn10300_copy_indirect_symbol (struct bfd_link_info * info,
4560 struct elf_link_hash_entry * dir,
4561 struct elf_link_hash_entry * ind)
0a22ae8e
NC
4562{
4563 struct elf32_mn10300_link_hash_entry * edir;
4564 struct elf32_mn10300_link_hash_entry * eind;
4565
4566 edir = elf_mn10300_hash_entry (dir);
4567 eind = elf_mn10300_hash_entry (ind);
4568
4569 if (ind->root.type == bfd_link_hash_indirect
4570 && dir->got.refcount <= 0)
4571 {
4572 edir->tls_type = eind->tls_type;
4573 eind->tls_type = GOT_UNKNOWN;
4574 }
4575 edir->direct_calls = eind->direct_calls;
4576 edir->stack_size = eind->stack_size;
4577 edir->movm_args = eind->movm_args;
4578 edir->movm_stack_size = eind->movm_stack_size;
4579 edir->flags = eind->flags;
4580
4581 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
4582}
4583
68faa637
AM
4584/* Destroy an mn10300 ELF linker hash table. */
4585
4586static void
d495ab0d 4587elf32_mn10300_link_hash_table_free (bfd *obfd)
68faa637
AM
4588{
4589 struct elf32_mn10300_link_hash_table *ret
d495ab0d 4590 = (struct elf32_mn10300_link_hash_table *) obfd->link.hash;
68faa637 4591
d495ab0d
AM
4592 obfd->link.hash = &ret->static_hash_table->root.root;
4593 _bfd_elf_link_hash_table_free (obfd);
4594 obfd->is_linker_output = TRUE;
4595 obfd->link.hash = &ret->root.root;
4596 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
4597}
4598
252b5132
RH
4599/* Create an mn10300 ELF linker hash table. */
4600
4601static struct bfd_link_hash_table *
603b7257 4602elf32_mn10300_link_hash_table_create (bfd *abfd)
252b5132
RH
4603{
4604 struct elf32_mn10300_link_hash_table *ret;
603b7257 4605 bfd_size_type amt = sizeof (* ret);
252b5132 4606
7bf52ea2 4607 ret = bfd_zmalloc (amt);
603b7257 4608 if (ret == NULL)
252b5132
RH
4609 return NULL;
4610
dc810e39 4611 amt = sizeof (struct elf_link_hash_table);
7bf52ea2 4612 ret->static_hash_table = bfd_zmalloc (amt);
252b5132
RH
4613 if (ret->static_hash_table == NULL)
4614 {
e2d34d7d 4615 free (ret);
252b5132
RH
4616 return NULL;
4617 }
4618
66eb6687
AM
4619 if (!_bfd_elf_link_hash_table_init (&ret->static_hash_table->root, abfd,
4620 elf32_mn10300_link_hash_newfunc,
4dfe6ac6
NC
4621 sizeof (struct elf32_mn10300_link_hash_entry),
4622 MN10300_ELF_DATA))
252b5132 4623 {
e2d34d7d
DJ
4624 free (ret->static_hash_table);
4625 free (ret);
252b5132
RH
4626 return NULL;
4627 }
d495ab0d
AM
4628
4629 abfd->is_linker_output = FALSE;
4630 abfd->link.hash = NULL;
4631 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
4632 elf32_mn10300_link_hash_newfunc,
4633 sizeof (struct elf32_mn10300_link_hash_entry),
4634 MN10300_ELF_DATA))
4635 {
4636 abfd->is_linker_output = TRUE;
4637 abfd->link.hash = &ret->static_hash_table->root.root;
4638 _bfd_elf_link_hash_table_free (abfd);
4639 free (ret);
4640 return NULL;
4641 }
4642 ret->root.root.hash_table_free = elf32_mn10300_link_hash_table_free;
4643
4644 ret->tls_ldm_got.offset = -1;
4645
603b7257 4646 return & ret->root.root;
252b5132
RH
4647}
4648
dc810e39 4649static unsigned long
603b7257 4650elf_mn10300_mach (flagword flags)
252b5132
RH
4651{
4652 switch (flags & EF_MN10300_MACH)
4653 {
010ac81f
KH
4654 case E_MN10300_MACH_MN10300:
4655 default:
4656 return bfd_mach_mn10300;
252b5132 4657
010ac81f
KH
4658 case E_MN10300_MACH_AM33:
4659 return bfd_mach_am33;
b08fa4d3
AO
4660
4661 case E_MN10300_MACH_AM33_2:
4662 return bfd_mach_am33_2;
252b5132
RH
4663 }
4664}
4665
4666/* The final processing done just before writing out a MN10300 ELF object
4667 file. This gets the MN10300 architecture right based on the machine
4668 number. */
4669
603b7257
NC
4670static void
4671_bfd_mn10300_elf_final_write_processing (bfd *abfd,
4672 bfd_boolean linker ATTRIBUTE_UNUSED)
252b5132
RH
4673{
4674 unsigned long val;
252b5132
RH
4675
4676 switch (bfd_get_mach (abfd))
4677 {
010ac81f
KH
4678 default:
4679 case bfd_mach_mn10300:
4680 val = E_MN10300_MACH_MN10300;
4681 break;
4682
4683 case bfd_mach_am33:
4684 val = E_MN10300_MACH_AM33;
4685 break;
b08fa4d3
AO
4686
4687 case bfd_mach_am33_2:
4688 val = E_MN10300_MACH_AM33_2;
4689 break;
252b5132
RH
4690 }
4691
4692 elf_elfheader (abfd)->e_flags &= ~ (EF_MN10300_MACH);
4693 elf_elfheader (abfd)->e_flags |= val;
4694}
4695
603b7257
NC
4696static bfd_boolean
4697_bfd_mn10300_elf_object_p (bfd *abfd)
252b5132
RH
4698{
4699 bfd_default_set_arch_mach (abfd, bfd_arch_mn10300,
010ac81f 4700 elf_mn10300_mach (elf_elfheader (abfd)->e_flags));
b34976b6 4701 return TRUE;
252b5132
RH
4702}
4703
4704/* Merge backend specific data from an object file to the output
4705 object file when linking. */
4706
603b7257 4707static bfd_boolean
50e03d47 4708_bfd_mn10300_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
252b5132 4709{
50e03d47
AM
4710 bfd *obfd = info->output_bfd;
4711
252b5132
RH
4712 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4713 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 4714 return TRUE;
252b5132
RH
4715
4716 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
4717 && bfd_get_mach (obfd) < bfd_get_mach (ibfd))
4718 {
4719 if (! bfd_set_arch_mach (obfd, bfd_get_arch (ibfd),
3b36f7e6
AM
4720 bfd_get_mach (ibfd)))
4721 return FALSE;
252b5132
RH
4722 }
4723
b34976b6 4724 return TRUE;
252b5132
RH
4725}
4726
603b7257
NC
4727#define PLT0_ENTRY_SIZE 15
4728#define PLT_ENTRY_SIZE 20
4729#define PIC_PLT_ENTRY_SIZE 24
03a12831
AO
4730
4731static const bfd_byte elf_mn10300_plt0_entry[PLT0_ENTRY_SIZE] =
4732{
4733 0xfc, 0xa0, 0, 0, 0, 0, /* mov (.got+8),a0 */
4734 0xfe, 0xe, 0x10, 0, 0, 0, 0, /* mov (.got+4),r1 */
4735 0xf0, 0xf4, /* jmp (a0) */
4736};
4737
4738static const bfd_byte elf_mn10300_plt_entry[PLT_ENTRY_SIZE] =
4739{
4740 0xfc, 0xa0, 0, 0, 0, 0, /* mov (nameN@GOT + .got),a0 */
4741 0xf0, 0xf4, /* jmp (a0) */
4742 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4743 0xdc, 0, 0, 0, 0, /* jmp .plt0 */
4744};
4745
4746static const bfd_byte elf_mn10300_pic_plt_entry[PIC_PLT_ENTRY_SIZE] =
4747{
4748 0xfc, 0x22, 0, 0, 0, 0, /* mov (nameN@GOT,a2),a0 */
4749 0xf0, 0xf4, /* jmp (a0) */
4750 0xfe, 8, 0, 0, 0, 0, 0, /* mov reloc-table-address,r0 */
4751 0xf8, 0x22, 8, /* mov (8,a2),a0 */
4752 0xfb, 0xa, 0x1a, 4, /* mov (4,a2),r1 */
4753 0xf0, 0xf4, /* jmp (a0) */
4754};
4755
4756/* Return size of the first PLT entry. */
4757#define elf_mn10300_sizeof_plt0(info) \
0e1862bb 4758 (bfd_link_pic (info) ? PIC_PLT_ENTRY_SIZE : PLT0_ENTRY_SIZE)
03a12831
AO
4759
4760/* Return size of a PLT entry. */
4761#define elf_mn10300_sizeof_plt(info) \
0e1862bb 4762 (bfd_link_pic (info) ? PIC_PLT_ENTRY_SIZE : PLT_ENTRY_SIZE)
03a12831
AO
4763
4764/* Return offset of the PLT0 address in an absolute PLT entry. */
4765#define elf_mn10300_plt_plt0_offset(info) 16
4766
4767/* Return offset of the linker in PLT0 entry. */
4768#define elf_mn10300_plt0_linker_offset(info) 2
4769
4770/* Return offset of the GOT id in PLT0 entry. */
4771#define elf_mn10300_plt0_gotid_offset(info) 9
4772
603b7257 4773/* Return offset of the temporary in PLT entry. */
03a12831
AO
4774#define elf_mn10300_plt_temp_offset(info) 8
4775
4776/* Return offset of the symbol in PLT entry. */
4777#define elf_mn10300_plt_symbol_offset(info) 2
4778
4779/* Return offset of the relocation in PLT entry. */
4780#define elf_mn10300_plt_reloc_offset(info) 11
4781
4782/* The name of the dynamic interpreter. This is put in the .interp
4783 section. */
4784
4785#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
4786
4787/* Create dynamic sections when linking against a dynamic object. */
4788
4789static bfd_boolean
603b7257 4790_bfd_mn10300_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
03a12831
AO
4791{
4792 flagword flags;
4793 asection * s;
9c5bfbb7 4794 const struct elf_backend_data * bed = get_elf_backend_data (abfd);
3d4d4302 4795 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
03a12831
AO
4796 int ptralign = 0;
4797
4798 switch (bed->s->arch_size)
4799 {
4800 case 32:
4801 ptralign = 2;
4802 break;
4803
4804 case 64:
4805 ptralign = 3;
4806 break;
4807
4808 default:
4809 bfd_set_error (bfd_error_bad_value);
4810 return FALSE;
4811 }
4812
4813 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
4814 .rel[a].bss sections. */
03a12831
AO
4815 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4816 | SEC_LINKER_CREATED);
4817
3d4d4302
AM
4818 s = bfd_make_section_anyway_with_flags (abfd,
4819 (bed->default_use_rela_p
4820 ? ".rela.plt" : ".rel.plt"),
4821 flags | SEC_READONLY);
4822 htab->root.srelplt = s;
03a12831 4823 if (s == NULL
03a12831
AO
4824 || ! bfd_set_section_alignment (abfd, s, ptralign))
4825 return FALSE;
4826
4827 if (! _bfd_mn10300_elf_create_got_section (abfd, info))
4828 return FALSE;
4829
03a12831
AO
4830 if (bed->want_dynbss)
4831 {
4832 /* The .dynbss section is a place to put symbols which are defined
4833 by dynamic objects, are referenced by regular objects, and are
4834 not functions. We must allocate space for them in the process
4835 image and use a R_*_COPY reloc to tell the dynamic linker to
4836 initialize them at run time. The linker script puts the .dynbss
4837 section into the .bss section of the final image. */
3d4d4302
AM
4838 s = bfd_make_section_anyway_with_flags (abfd, ".dynbss",
4839 SEC_ALLOC | SEC_LINKER_CREATED);
3496cb2a 4840 if (s == NULL)
03a12831
AO
4841 return FALSE;
4842
4843 /* The .rel[a].bss section holds copy relocs. This section is not
4844 normally needed. We need to create it here, though, so that the
4845 linker will map it to an output section. We can't just create it
4846 only if we need it, because we will not know whether we need it
4847 until we have seen all the input files, and the first time the
4848 main linker code calls BFD after examining all the input files
4849 (size_dynamic_sections) the input sections have already been
4850 mapped to the output sections. If the section turns out not to
4851 be needed, we can discard it later. We will never need this
4852 section when generating a shared object, since they do not use
4853 copy relocs. */
0e1862bb 4854 if (! bfd_link_pic (info))
03a12831 4855 {
3d4d4302
AM
4856 s = bfd_make_section_anyway_with_flags (abfd,
4857 (bed->default_use_rela_p
4858 ? ".rela.bss" : ".rel.bss"),
4859 flags | SEC_READONLY);
03a12831 4860 if (s == NULL
03a12831
AO
4861 || ! bfd_set_section_alignment (abfd, s, ptralign))
4862 return FALSE;
4863 }
4864 }
4865
4866 return TRUE;
4867}
4868\f
4869/* Adjust a symbol defined by a dynamic object and referenced by a
4870 regular object. The current definition is in some section of the
4871 dynamic object, but we're not including those sections. We have to
4872 change the definition to something the rest of the link can
4873 understand. */
4874
4875static bfd_boolean
603b7257
NC
4876_bfd_mn10300_elf_adjust_dynamic_symbol (struct bfd_link_info * info,
4877 struct elf_link_hash_entry * h)
03a12831 4878{
3d4d4302 4879 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
03a12831
AO
4880 bfd * dynobj;
4881 asection * s;
03a12831 4882
3d4d4302 4883 dynobj = htab->root.dynobj;
03a12831
AO
4884
4885 /* Make sure we know what is going on here. */
4886 BFD_ASSERT (dynobj != NULL
f5385ebf 4887 && (h->needs_plt
60d67dc8 4888 || h->is_weakalias
f5385ebf
AM
4889 || (h->def_dynamic
4890 && h->ref_regular
4891 && !h->def_regular)));
03a12831
AO
4892
4893 /* If this is a function, put it in the procedure linkage table. We
4894 will fill in the contents of the procedure linkage table later,
4895 when we know the address of the .got section. */
4896 if (h->type == STT_FUNC
f5385ebf 4897 || h->needs_plt)
03a12831 4898 {
0e1862bb 4899 if (! bfd_link_pic (info)
f5385ebf
AM
4900 && !h->def_dynamic
4901 && !h->ref_dynamic)
03a12831
AO
4902 {
4903 /* This case can occur if we saw a PLT reloc in an input
4904 file, but the symbol was never referred to by a dynamic
4905 object. In such a case, we don't actually need to build
4906 a procedure linkage table, and we can just do a REL32
4907 reloc instead. */
f5385ebf 4908 BFD_ASSERT (h->needs_plt);
03a12831
AO
4909 return TRUE;
4910 }
4911
4912 /* Make sure this symbol is output as a dynamic symbol. */
4913 if (h->dynindx == -1)
4914 {
c152c796 4915 if (! bfd_elf_link_record_dynamic_symbol (info, h))
03a12831
AO
4916 return FALSE;
4917 }
4918
3d4d4302 4919 s = htab->root.splt;
03a12831
AO
4920 BFD_ASSERT (s != NULL);
4921
4922 /* If this is the first .plt entry, make room for the special
4923 first entry. */
eea6121a
AM
4924 if (s->size == 0)
4925 s->size += elf_mn10300_sizeof_plt0 (info);
03a12831
AO
4926
4927 /* If this symbol is not defined in a regular file, and we are
4928 not generating a shared library, then set the symbol to this
4929 location in the .plt. This is required to make function
4930 pointers compare as equal between the normal executable and
4931 the shared library. */
0e1862bb 4932 if (! bfd_link_pic (info)
f5385ebf 4933 && !h->def_regular)
03a12831
AO
4934 {
4935 h->root.u.def.section = s;
eea6121a 4936 h->root.u.def.value = s->size;
03a12831
AO
4937 }
4938
eea6121a 4939 h->plt.offset = s->size;
03a12831
AO
4940
4941 /* Make room for this entry. */
eea6121a 4942 s->size += elf_mn10300_sizeof_plt (info);
03a12831
AO
4943
4944 /* We also need to make an entry in the .got.plt section, which
4945 will be placed in the .got section by the linker script. */
3d4d4302 4946 s = htab->root.sgotplt;
03a12831 4947 BFD_ASSERT (s != NULL);
eea6121a 4948 s->size += 4;
03a12831
AO
4949
4950 /* We also need to make an entry in the .rela.plt section. */
ce558b89 4951 s = htab->root.srelplt;
03a12831 4952 BFD_ASSERT (s != NULL);
eea6121a 4953 s->size += sizeof (Elf32_External_Rela);
03a12831
AO
4954
4955 return TRUE;
4956 }
4957
4958 /* If this is a weak symbol, and there is a real definition, the
4959 processor independent code will have arranged for us to see the
4960 real definition first, and we can just use the same value. */
60d67dc8 4961 if (h->is_weakalias)
03a12831 4962 {
60d67dc8
AM
4963 struct elf_link_hash_entry *def = weakdef (h);
4964 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4965 h->root.u.def.section = def->root.u.def.section;
4966 h->root.u.def.value = def->root.u.def.value;
03a12831
AO
4967 return TRUE;
4968 }
4969
4970 /* This is a reference to a symbol defined by a dynamic object which
4971 is not a function. */
4972
4973 /* If we are creating a shared library, we must presume that the
4974 only references to the symbol are via the global offset table.
4975 For such cases we need not do anything here; the relocations will
4976 be handled correctly by relocate_section. */
0e1862bb 4977 if (bfd_link_pic (info))
03a12831
AO
4978 return TRUE;
4979
4980 /* If there are no references to this symbol that do not use the
4981 GOT, we don't need to generate a copy reloc. */
f5385ebf 4982 if (!h->non_got_ref)
03a12831
AO
4983 return TRUE;
4984
4985 /* We must allocate the symbol in our .dynbss section, which will
4986 become part of the .bss section of the executable. There will be
4987 an entry for this symbol in the .dynsym section. The dynamic
4988 object will contain position independent code, so all references
4989 from the dynamic object to this symbol will go through the global
4990 offset table. The dynamic linker will use the .dynsym entry to
4991 determine the address it must put in the global offset table, so
4992 both the dynamic object and the regular object will refer to the
4993 same memory location for the variable. */
4994
3d4d4302 4995 s = bfd_get_linker_section (dynobj, ".dynbss");
03a12831
AO
4996 BFD_ASSERT (s != NULL);
4997
4998 /* We must generate a R_MN10300_COPY reloc to tell the dynamic linker to
4999 copy the initial value out of the dynamic object and into the
5000 runtime process image. We need to remember the offset into the
5001 .rela.bss section we are going to use. */
1d7e9d18 5002 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
03a12831
AO
5003 {
5004 asection * srel;
5005
3d4d4302 5006 srel = bfd_get_linker_section (dynobj, ".rela.bss");
03a12831 5007 BFD_ASSERT (srel != NULL);
eea6121a 5008 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 5009 h->needs_copy = 1;
03a12831
AO
5010 }
5011
6cabe1ea 5012 return _bfd_elf_adjust_dynamic_copy (info, h, s);
03a12831
AO
5013}
5014
03a12831
AO
5015/* Set the sizes of the dynamic sections. */
5016
5017static bfd_boolean
603b7257
NC
5018_bfd_mn10300_elf_size_dynamic_sections (bfd * output_bfd,
5019 struct bfd_link_info * info)
03a12831 5020{
0a22ae8e 5021 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
03a12831
AO
5022 bfd * dynobj;
5023 asection * s;
5024 bfd_boolean plt;
5025 bfd_boolean relocs;
5026 bfd_boolean reltext;
5027
3d4d4302 5028 dynobj = htab->root.dynobj;
03a12831
AO
5029 BFD_ASSERT (dynobj != NULL);
5030
5031 if (elf_hash_table (info)->dynamic_sections_created)
5032 {
5033 /* Set the contents of the .interp section to the interpreter. */
1a9ccd70 5034 if (bfd_link_executable (info) && !info->nointerp)
03a12831 5035 {
3d4d4302 5036 s = bfd_get_linker_section (dynobj, ".interp");
03a12831 5037 BFD_ASSERT (s != NULL);
eea6121a 5038 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
03a12831
AO
5039 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5040 }
5041 }
5042 else
5043 {
5044 /* We may have created entries in the .rela.got section.
5045 However, if we are not creating the dynamic sections, we will
5046 not actually use these entries. Reset the size of .rela.got,
5047 which will cause it to get stripped from the output file
5048 below. */
3d4d4302 5049 s = htab->root.sgot;
03a12831 5050 if (s != NULL)
eea6121a 5051 s->size = 0;
03a12831
AO
5052 }
5053
0a22ae8e
NC
5054 if (htab->tls_ldm_got.refcount > 0)
5055 {
ce558b89 5056 s = htab->root.srelgot;
0a22ae8e
NC
5057 BFD_ASSERT (s != NULL);
5058 s->size += sizeof (Elf32_External_Rela);
5059 }
5060
03a12831
AO
5061 /* The check_relocs and adjust_dynamic_symbol entry points have
5062 determined the sizes of the various dynamic sections. Allocate
5063 memory for them. */
5064 plt = FALSE;
5065 relocs = FALSE;
5066 reltext = FALSE;
5067 for (s = dynobj->sections; s != NULL; s = s->next)
5068 {
5069 const char * name;
03a12831
AO
5070
5071 if ((s->flags & SEC_LINKER_CREATED) == 0)
5072 continue;
5073
5074 /* It's OK to base decisions on the section name, because none
5075 of the dynobj section names depend upon the input files. */
5076 name = bfd_get_section_name (dynobj, s);
5077
603b7257 5078 if (streq (name, ".plt"))
03a12831 5079 {
c456f082
AM
5080 /* Remember whether there is a PLT. */
5081 plt = s->size != 0;
03a12831 5082 }
0112cd26 5083 else if (CONST_STRNEQ (name, ".rela"))
03a12831 5084 {
c456f082 5085 if (s->size != 0)
03a12831
AO
5086 {
5087 asection * target;
5088
5089 /* Remember whether there are any reloc sections other
5090 than .rela.plt. */
603b7257 5091 if (! streq (name, ".rela.plt"))
03a12831
AO
5092 {
5093 const char * outname;
5094
5095 relocs = TRUE;
5096
5097 /* If this relocation section applies to a read only
5098 section, then we probably need a DT_TEXTREL
5099 entry. The entries in the .rela.plt section
5100 really apply to the .got section, which we
5101 created ourselves and so know is not readonly. */
5102 outname = bfd_get_section_name (output_bfd,
5103 s->output_section);
5104 target = bfd_get_section_by_name (output_bfd, outname + 5);
5105 if (target != NULL
5106 && (target->flags & SEC_READONLY) != 0
5107 && (target->flags & SEC_ALLOC) != 0)
5108 reltext = TRUE;
5109 }
5110
5111 /* We use the reloc_count field as a counter if we need
5112 to copy relocs into the output file. */
5113 s->reloc_count = 0;
5114 }
5115 }
0112cd26 5116 else if (! CONST_STRNEQ (name, ".got")
603b7257 5117 && ! streq (name, ".dynbss"))
03a12831
AO
5118 /* It's not one of our sections, so don't allocate space. */
5119 continue;
5120
c456f082 5121 if (s->size == 0)
03a12831 5122 {
c456f082
AM
5123 /* If we don't need this section, strip it from the
5124 output file. This is mostly to handle .rela.bss and
5125 .rela.plt. We must create both sections in
5126 create_dynamic_sections, because they must be created
5127 before the linker maps input sections to output
5128 sections. The linker does that before
5129 adjust_dynamic_symbol is called, and it is that
5130 function which decides whether anything needs to go
5131 into these sections. */
8423293d 5132 s->flags |= SEC_EXCLUDE;
03a12831
AO
5133 continue;
5134 }
5135
c456f082
AM
5136 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5137 continue;
5138
03a12831
AO
5139 /* Allocate memory for the section contents. We use bfd_zalloc
5140 here in case unused entries are not reclaimed before the
5141 section's contents are written out. This should not happen,
5142 but this way if it does, we get a R_MN10300_NONE reloc
5143 instead of garbage. */
603b7257 5144 s->contents = bfd_zalloc (dynobj, s->size);
c456f082 5145 if (s->contents == NULL)
03a12831
AO
5146 return FALSE;
5147 }
5148
5149 if (elf_hash_table (info)->dynamic_sections_created)
5150 {
5151 /* Add some entries to the .dynamic section. We fill in the
5152 values later, in _bfd_mn10300_elf_finish_dynamic_sections,
5153 but we must add the entries now so that we get the correct
5154 size for the .dynamic section. The DT_DEBUG entry is filled
5155 in by the dynamic linker and used by the debugger. */
0e1862bb 5156 if (! bfd_link_pic (info))
03a12831 5157 {
5a580b3a 5158 if (!_bfd_elf_add_dynamic_entry (info, DT_DEBUG, 0))
03a12831
AO
5159 return FALSE;
5160 }
5161
5162 if (plt)
5163 {
5a580b3a
AM
5164 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0)
5165 || !_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
5166 || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_RELA)
5167 || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
03a12831
AO
5168 return FALSE;
5169 }
5170
5171 if (relocs)
5172 {
5a580b3a
AM
5173 if (!_bfd_elf_add_dynamic_entry (info, DT_RELA, 0)
5174 || !_bfd_elf_add_dynamic_entry (info, DT_RELASZ, 0)
5175 || !_bfd_elf_add_dynamic_entry (info, DT_RELAENT,
5176 sizeof (Elf32_External_Rela)))
03a12831
AO
5177 return FALSE;
5178 }
5179
5180 if (reltext)
5181 {
5a580b3a 5182 if (!_bfd_elf_add_dynamic_entry (info, DT_TEXTREL, 0))
03a12831
AO
5183 return FALSE;
5184 }
5185 }
5186
5187 return TRUE;
5188}
5189
5190/* Finish up dynamic symbol handling. We set the contents of various
5191 dynamic sections here. */
5192
5193static bfd_boolean
603b7257
NC
5194_bfd_mn10300_elf_finish_dynamic_symbol (bfd * output_bfd,
5195 struct bfd_link_info * info,
5196 struct elf_link_hash_entry * h,
5197 Elf_Internal_Sym * sym)
03a12831 5198{
3d4d4302 5199 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
03a12831
AO
5200 bfd * dynobj;
5201
3d4d4302 5202 dynobj = htab->root.dynobj;
03a12831
AO
5203
5204 if (h->plt.offset != (bfd_vma) -1)
5205 {
07d6d2b8
AM
5206 asection * splt;
5207 asection * sgot;
5208 asection * srel;
5209 bfd_vma plt_index;
5210 bfd_vma got_offset;
03a12831
AO
5211 Elf_Internal_Rela rel;
5212
5213 /* This symbol has an entry in the procedure linkage table. Set
5214 it up. */
5215
5216 BFD_ASSERT (h->dynindx != -1);
5217
3d4d4302
AM
5218 splt = htab->root.splt;
5219 sgot = htab->root.sgotplt;
ce558b89 5220 srel = htab->root.srelplt;
03a12831
AO
5221 BFD_ASSERT (splt != NULL && sgot != NULL && srel != NULL);
5222
5223 /* Get the index in the procedure linkage table which
5224 corresponds to this symbol. This is the index of this symbol
5225 in all the symbols for which we are making plt entries. The
5226 first entry in the procedure linkage table is reserved. */
5227 plt_index = ((h->plt.offset - elf_mn10300_sizeof_plt0 (info))
5228 / elf_mn10300_sizeof_plt (info));
5229
5230 /* Get the offset into the .got table of the entry that
5231 corresponds to this function. Each .got entry is 4 bytes.
5232 The first three are reserved. */
5233 got_offset = (plt_index + 3) * 4;
5234
5235 /* Fill in the entry in the procedure linkage table. */
0e1862bb 5236 if (! bfd_link_pic (info))
03a12831
AO
5237 {
5238 memcpy (splt->contents + h->plt.offset, elf_mn10300_plt_entry,
5239 elf_mn10300_sizeof_plt (info));
5240 bfd_put_32 (output_bfd,
5241 (sgot->output_section->vma
5242 + sgot->output_offset
5243 + got_offset),
5244 (splt->contents + h->plt.offset
5245 + elf_mn10300_plt_symbol_offset (info)));
5246
5247 bfd_put_32 (output_bfd,
5248 (1 - h->plt.offset - elf_mn10300_plt_plt0_offset (info)),
5249 (splt->contents + h->plt.offset
5250 + elf_mn10300_plt_plt0_offset (info)));
5251 }
5252 else
5253 {
5254 memcpy (splt->contents + h->plt.offset, elf_mn10300_pic_plt_entry,
5255 elf_mn10300_sizeof_plt (info));
5256
5257 bfd_put_32 (output_bfd, got_offset,
5258 (splt->contents + h->plt.offset
5259 + elf_mn10300_plt_symbol_offset (info)));
5260 }
5261
5262 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
5263 (splt->contents + h->plt.offset
5264 + elf_mn10300_plt_reloc_offset (info)));
5265
5266 /* Fill in the entry in the global offset table. */
5267 bfd_put_32 (output_bfd,
5268 (splt->output_section->vma
5269 + splt->output_offset
5270 + h->plt.offset
5271 + elf_mn10300_plt_temp_offset (info)),
5272 sgot->contents + got_offset);
5273
5274 /* Fill in the entry in the .rela.plt section. */
5275 rel.r_offset = (sgot->output_section->vma
5276 + sgot->output_offset
5277 + got_offset);
5278 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_JMP_SLOT);
5279 rel.r_addend = 0;
5280 bfd_elf32_swap_reloca_out (output_bfd, &rel,
560e09e9
NC
5281 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5282 + plt_index));
03a12831 5283
f5385ebf 5284 if (!h->def_regular)
03a12831
AO
5285 /* Mark the symbol as undefined, rather than as defined in
5286 the .plt section. Leave the value alone. */
5287 sym->st_shndx = SHN_UNDEF;
5288 }
5289
5290 if (h->got.offset != (bfd_vma) -1)
5291 {
07d6d2b8
AM
5292 asection * sgot;
5293 asection * srel;
03a12831
AO
5294 Elf_Internal_Rela rel;
5295
5296 /* This symbol has an entry in the global offset table. Set it up. */
3d4d4302 5297 sgot = htab->root.sgot;
ce558b89 5298 srel = htab->root.srelgot;
03a12831
AO
5299 BFD_ASSERT (sgot != NULL && srel != NULL);
5300
5301 rel.r_offset = (sgot->output_section->vma
5302 + sgot->output_offset
603b7257 5303 + (h->got.offset & ~1));
03a12831 5304
0a22ae8e 5305 switch (elf_mn10300_hash_entry (h)->tls_type)
03a12831 5306 {
0a22ae8e 5307 case GOT_TLS_GD:
03a12831 5308 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
0a22ae8e
NC
5309 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset + 4);
5310 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_DTPMOD);
5311 rel.r_addend = 0;
5312 bfd_elf32_swap_reloca_out (output_bfd, & rel,
5313 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5314 + srel->reloc_count));
5315 ++ srel->reloc_count;
5316 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_DTPOFF);
5317 rel.r_offset += 4;
03a12831 5318 rel.r_addend = 0;
0a22ae8e
NC
5319 break;
5320
5321 case GOT_TLS_IE:
5322 /* We originally stored the addend in the GOT, but at this
5323 point, we want to move it to the reloc instead as that's
5324 where the dynamic linker wants it. */
5325 rel.r_addend = bfd_get_32 (output_bfd, sgot->contents + h->got.offset);
5326 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5327 if (h->dynindx == -1)
5328 rel.r_info = ELF32_R_INFO (0, R_MN10300_TLS_TPOFF);
5329 else
5330 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_TLS_TPOFF);
5331 break;
5332
5333 default:
5334 /* If this is a -Bsymbolic link, and the symbol is defined
5335 locally, we just want to emit a RELATIVE reloc. Likewise if
5336 the symbol was forced to be local because of a version file.
5337 The entry in the global offset table will already have been
5338 initialized in the relocate_section function. */
0e1862bb 5339 if (bfd_link_pic (info)
0a22ae8e
NC
5340 && (info->symbolic || h->dynindx == -1)
5341 && h->def_regular)
5342 {
5343 rel.r_info = ELF32_R_INFO (0, R_MN10300_RELATIVE);
5344 rel.r_addend = (h->root.u.def.value
5345 + h->root.u.def.section->output_section->vma
5346 + h->root.u.def.section->output_offset);
5347 }
5348 else
5349 {
5350 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5351 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_GLOB_DAT);
5352 rel.r_addend = 0;
5353 }
03a12831
AO
5354 }
5355
0a22ae8e
NC
5356 if (ELF32_R_TYPE (rel.r_info) != R_MN10300_NONE)
5357 {
5358 bfd_elf32_swap_reloca_out (output_bfd, &rel,
5359 (bfd_byte *) ((Elf32_External_Rela *) srel->contents
5360 + srel->reloc_count));
5361 ++ srel->reloc_count;
5362 }
03a12831
AO
5363 }
5364
f5385ebf 5365 if (h->needs_copy)
03a12831 5366 {
07d6d2b8 5367 asection * s;
03a12831
AO
5368 Elf_Internal_Rela rel;
5369
5370 /* This symbol needs a copy reloc. Set it up. */
5371 BFD_ASSERT (h->dynindx != -1
5372 && (h->root.type == bfd_link_hash_defined
5373 || h->root.type == bfd_link_hash_defweak));
5374
3d4d4302 5375 s = bfd_get_linker_section (dynobj, ".rela.bss");
03a12831
AO
5376 BFD_ASSERT (s != NULL);
5377
5378 rel.r_offset = (h->root.u.def.value
5379 + h->root.u.def.section->output_section->vma
5380 + h->root.u.def.section->output_offset);
5381 rel.r_info = ELF32_R_INFO (h->dynindx, R_MN10300_COPY);
5382 rel.r_addend = 0;
603b7257 5383 bfd_elf32_swap_reloca_out (output_bfd, & rel,
560e09e9
NC
5384 (bfd_byte *) ((Elf32_External_Rela *) s->contents
5385 + s->reloc_count));
03a12831
AO
5386 ++ s->reloc_count;
5387 }
5388
5389 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 5390 if (h == elf_hash_table (info)->hdynamic
22edb2f1 5391 || h == elf_hash_table (info)->hgot)
03a12831
AO
5392 sym->st_shndx = SHN_ABS;
5393
5394 return TRUE;
5395}
5396
5397/* Finish up the dynamic sections. */
5398
5399static bfd_boolean
603b7257
NC
5400_bfd_mn10300_elf_finish_dynamic_sections (bfd * output_bfd,
5401 struct bfd_link_info * info)
03a12831
AO
5402{
5403 bfd * dynobj;
5404 asection * sgot;
5405 asection * sdyn;
3d4d4302 5406 struct elf32_mn10300_link_hash_table *htab = elf32_mn10300_hash_table (info);
03a12831 5407
3d4d4302
AM
5408 dynobj = htab->root.dynobj;
5409 sgot = htab->root.sgotplt;
03a12831 5410 BFD_ASSERT (sgot != NULL);
3d4d4302 5411 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
03a12831
AO
5412
5413 if (elf_hash_table (info)->dynamic_sections_created)
5414 {
07d6d2b8 5415 asection * splt;
03a12831
AO
5416 Elf32_External_Dyn * dyncon;
5417 Elf32_External_Dyn * dynconend;
5418
5419 BFD_ASSERT (sdyn != NULL);
5420
5421 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 5422 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
03a12831
AO
5423
5424 for (; dyncon < dynconend; dyncon++)
5425 {
5426 Elf_Internal_Dyn dyn;
03a12831
AO
5427 asection * s;
5428
5429 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5430
5431 switch (dyn.d_tag)
5432 {
5433 default:
5434 break;
5435
5436 case DT_PLTGOT:
ce558b89 5437 s = htab->root.sgot;
03a12831
AO
5438 goto get_vma;
5439
5440 case DT_JMPREL:
ce558b89 5441 s = htab->root.srelplt;
03a12831 5442 get_vma:
4ade44b7 5443 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
03a12831
AO
5444 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5445 break;
5446
5447 case DT_PLTRELSZ:
ce558b89 5448 s = htab->root.srelplt;
eea6121a 5449 dyn.d_un.d_val = s->size;
03a12831
AO
5450 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5451 break;
03a12831
AO
5452 }
5453 }
5454
5455 /* Fill in the first entry in the procedure linkage table. */
3d4d4302 5456 splt = htab->root.splt;
eea6121a 5457 if (splt && splt->size > 0)
03a12831 5458 {
0e1862bb 5459 if (bfd_link_pic (info))
03a12831
AO
5460 {
5461 memcpy (splt->contents, elf_mn10300_pic_plt_entry,
5462 elf_mn10300_sizeof_plt (info));
5463 }
5464 else
5465 {
5466 memcpy (splt->contents, elf_mn10300_plt0_entry, PLT0_ENTRY_SIZE);
5467 bfd_put_32 (output_bfd,
5468 sgot->output_section->vma + sgot->output_offset + 4,
5469 splt->contents + elf_mn10300_plt0_gotid_offset (info));
5470 bfd_put_32 (output_bfd,
5471 sgot->output_section->vma + sgot->output_offset + 8,
5472 splt->contents + elf_mn10300_plt0_linker_offset (info));
5473 }
5474
5475 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5476 really seem like the right value. */
5477 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
0a22ae8e
NC
5478
5479 /* UnixWare sets the entsize of .plt to 4, but this is incorrect
5480 as it means that the size of the PLT0 section (15 bytes) is not
5481 a multiple of the sh_entsize. Some ELF tools flag this as an
5482 error. We could pad PLT0 to 16 bytes, but that would introduce
5483 compatibilty issues with previous toolchains, so instead we
5484 just set the entry size to 1. */
5485 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 1;
03a12831
AO
5486 }
5487 }
5488
5489 /* Fill in the first three entries in the global offset table. */
eea6121a 5490 if (sgot->size > 0)
03a12831
AO
5491 {
5492 if (sdyn == NULL)
5493 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
5494 else
5495 bfd_put_32 (output_bfd,
5496 sdyn->output_section->vma + sdyn->output_offset,
5497 sgot->contents);
5498 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
5499 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
5500 }
5501
5502 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
5503
5504 return TRUE;
5505}
5506
a873f25a
AO
5507/* Classify relocation types, such that combreloc can sort them
5508 properly. */
5509
5510static enum elf_reloc_type_class
7e612e98
AM
5511_bfd_mn10300_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5512 const asection *rel_sec ATTRIBUTE_UNUSED,
5513 const Elf_Internal_Rela *rela)
a873f25a
AO
5514{
5515 switch ((int) ELF32_R_TYPE (rela->r_info))
5516 {
603b7257
NC
5517 case R_MN10300_RELATIVE: return reloc_class_relative;
5518 case R_MN10300_JMP_SLOT: return reloc_class_plt;
5519 case R_MN10300_COPY: return reloc_class_copy;
5520 default: return reloc_class_normal;
a873f25a
AO
5521 }
5522}
5523
997fbe36
NC
5524/* Allocate space for an MN10300 extension to the bfd elf data structure. */
5525
5526static bfd_boolean
5527mn10300_elf_mkobject (bfd *abfd)
5528{
0a22ae8e 5529 return bfd_elf_allocate_object (abfd, sizeof (struct elf_mn10300_obj_tdata),
997fbe36
NC
5530 MN10300_ELF_DATA);
5531}
5532
5533#define bfd_elf32_mkobject mn10300_elf_mkobject
5534
73c3cd1c 5535#ifndef ELF_ARCH
6d00b590 5536#define TARGET_LITTLE_SYM mn10300_elf32_vec
252b5132
RH
5537#define TARGET_LITTLE_NAME "elf32-mn10300"
5538#define ELF_ARCH bfd_arch_mn10300
ae95ffa6 5539#define ELF_TARGET_ID MN10300_ELF_DATA
6f4514dc
AO
5540#define ELF_MACHINE_CODE EM_MN10300
5541#define ELF_MACHINE_ALT1 EM_CYGNUS_MN10300
252b5132 5542#define ELF_MAXPAGESIZE 0x1000
73c3cd1c 5543#endif
252b5132
RH
5544
5545#define elf_info_to_howto mn10300_info_to_howto
5546#define elf_info_to_howto_rel 0
5547#define elf_backend_can_gc_sections 1
b491616a 5548#define elf_backend_rela_normal 1
252b5132
RH
5549#define elf_backend_check_relocs mn10300_elf_check_relocs
5550#define elf_backend_gc_mark_hook mn10300_elf_gc_mark_hook
5551#define elf_backend_relocate_section mn10300_elf_relocate_section
5552#define bfd_elf32_bfd_relax_section mn10300_elf_relax_section
5553#define bfd_elf32_bfd_get_relocated_section_contents \
5554 mn10300_elf_get_relocated_section_contents
5555#define bfd_elf32_bfd_link_hash_table_create \
5556 elf32_mn10300_link_hash_table_create
5557
73c3cd1c 5558#ifndef elf_symbol_leading_char
252b5132 5559#define elf_symbol_leading_char '_'
73c3cd1c 5560#endif
252b5132
RH
5561
5562/* So we can set bits in e_flags. */
5563#define elf_backend_final_write_processing \
3b36f7e6
AM
5564 _bfd_mn10300_elf_final_write_processing
5565#define elf_backend_object_p _bfd_mn10300_elf_object_p
252b5132
RH
5566
5567#define bfd_elf32_bfd_merge_private_bfd_data \
3b36f7e6 5568 _bfd_mn10300_elf_merge_private_bfd_data
252b5132 5569
03a12831
AO
5570#define elf_backend_can_gc_sections 1
5571#define elf_backend_create_dynamic_sections \
5572 _bfd_mn10300_elf_create_dynamic_sections
5573#define elf_backend_adjust_dynamic_symbol \
5574 _bfd_mn10300_elf_adjust_dynamic_symbol
5575#define elf_backend_size_dynamic_sections \
5576 _bfd_mn10300_elf_size_dynamic_sections
74541ad4
AM
5577#define elf_backend_omit_section_dynsym \
5578 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
03a12831
AO
5579#define elf_backend_finish_dynamic_symbol \
5580 _bfd_mn10300_elf_finish_dynamic_symbol
5581#define elf_backend_finish_dynamic_sections \
5582 _bfd_mn10300_elf_finish_dynamic_sections
0a22ae8e
NC
5583#define elf_backend_copy_indirect_symbol \
5584 _bfd_mn10300_copy_indirect_symbol
a873f25a
AO
5585#define elf_backend_reloc_type_class \
5586 _bfd_mn10300_elf_reloc_type_class
5587
03a12831
AO
5588#define elf_backend_want_got_plt 1
5589#define elf_backend_plt_readonly 1
5590#define elf_backend_want_plt_sym 0
5591#define elf_backend_got_header_size 12
64f52338 5592#define elf_backend_dtrel_excludes_plt 1
03a12831 5593
252b5132 5594#include "elf32-target.h"