/* Ubicom IP2xxx specific support for 32-bit ELF
|
/* Ubicom IP2xxx specific support for 32-bit ELF
|
Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007
|
Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007
|
Free Software Foundation, Inc.
|
Free Software Foundation, Inc.
|
|
|
This file is part of BFD, the Binary File Descriptor library.
|
This file is part of BFD, the Binary File Descriptor library.
|
|
|
This program is free software; you can redistribute it and/or modify
|
This program is free software; you can redistribute it and/or modify
|
it under the terms of the GNU General Public License as published by
|
it under the terms of the GNU General Public License as published by
|
the Free Software Foundation; either version 3 of the License, or
|
the Free Software Foundation; either version 3 of the License, or
|
(at your option) any later version.
|
(at your option) any later version.
|
|
|
This program is distributed in the hope that it will be useful,
|
This program is distributed in the hope that it will be useful,
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
GNU General Public License for more details.
|
GNU General Public License for more details.
|
|
|
You should have received a copy of the GNU General Public License
|
You should have received a copy of the GNU General Public License
|
along with this program; if not, write to the Free Software
|
along with this program; if not, write to the Free Software
|
Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
|
Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
|
MA 02110-1301, USA. */
|
MA 02110-1301, USA. */
|
|
|
#include "sysdep.h"
|
#include "sysdep.h"
|
#include "bfd.h"
|
#include "bfd.h"
|
#include "libbfd.h"
|
#include "libbfd.h"
|
#include "elf-bfd.h"
|
#include "elf-bfd.h"
|
#include "elf/ip2k.h"
|
#include "elf/ip2k.h"
|
|
|
/* Struct used to pass miscellaneous paramaters which
|
/* Struct used to pass miscellaneous paramaters which
|
helps to avoid overly long parameter lists. */
|
helps to avoid overly long parameter lists. */
|
struct misc
|
struct misc
|
{
|
{
|
Elf_Internal_Shdr * symtab_hdr;
|
Elf_Internal_Shdr * symtab_hdr;
|
Elf_Internal_Rela * irelbase;
|
Elf_Internal_Rela * irelbase;
|
bfd_byte * contents;
|
bfd_byte * contents;
|
Elf_Internal_Sym * isymbuf;
|
Elf_Internal_Sym * isymbuf;
|
};
|
};
|
|
|
struct ip2k_opcode
|
struct ip2k_opcode
|
{
|
{
|
unsigned short opcode;
|
unsigned short opcode;
|
unsigned short mask;
|
unsigned short mask;
|
};
|
};
|
|
|
static bfd_boolean ip2k_relaxed = FALSE;
|
static bfd_boolean ip2k_relaxed = FALSE;
|
|
|
static const struct ip2k_opcode ip2k_page_opcode[] =
|
static const struct ip2k_opcode ip2k_page_opcode[] =
|
{
|
{
|
{0x0010, 0xFFF8}, /* Page. */
|
{0x0010, 0xFFF8}, /* Page. */
|
{0x0000, 0x0000},
|
{0x0000, 0x0000},
|
};
|
};
|
|
|
#define IS_PAGE_OPCODE(code) \
|
#define IS_PAGE_OPCODE(code) \
|
ip2k_is_opcode (code, ip2k_page_opcode)
|
ip2k_is_opcode (code, ip2k_page_opcode)
|
|
|
static const struct ip2k_opcode ip2k_jmp_opcode[] =
|
static const struct ip2k_opcode ip2k_jmp_opcode[] =
|
{
|
{
|
{0xE000, 0xE000}, /* Jmp. */
|
{0xE000, 0xE000}, /* Jmp. */
|
{0x0000, 0x0000},
|
{0x0000, 0x0000},
|
};
|
};
|
|
|
#define IS_JMP_OPCODE(code) \
|
#define IS_JMP_OPCODE(code) \
|
ip2k_is_opcode (code, ip2k_jmp_opcode)
|
ip2k_is_opcode (code, ip2k_jmp_opcode)
|
|
|
static const struct ip2k_opcode ip2k_snc_opcode[] =
|
static const struct ip2k_opcode ip2k_snc_opcode[] =
|
{
|
{
|
{0xA00B, 0xFFFF}, /* Snc. */
|
{0xA00B, 0xFFFF}, /* Snc. */
|
{0x0000, 0x0000},
|
{0x0000, 0x0000},
|
};
|
};
|
|
|
#define IS_SNC_OPCODE(code) \
|
#define IS_SNC_OPCODE(code) \
|
ip2k_is_opcode (code, ip2k_snc_opcode)
|
ip2k_is_opcode (code, ip2k_snc_opcode)
|
|
|
static const struct ip2k_opcode ip2k_inc_1sp_opcode[] =
|
static const struct ip2k_opcode ip2k_inc_1sp_opcode[] =
|
{
|
{
|
{0x2B81, 0xFFFF}, /* Inc 1(SP). */
|
{0x2B81, 0xFFFF}, /* Inc 1(SP). */
|
{0x0000, 0x0000},
|
{0x0000, 0x0000},
|
};
|
};
|
|
|
#define IS_INC_1SP_OPCODE(code) \
|
#define IS_INC_1SP_OPCODE(code) \
|
ip2k_is_opcode (code, ip2k_inc_1sp_opcode)
|
ip2k_is_opcode (code, ip2k_inc_1sp_opcode)
|
|
|
static const struct ip2k_opcode ip2k_add_2sp_w_opcode[] =
|
static const struct ip2k_opcode ip2k_add_2sp_w_opcode[] =
|
{
|
{
|
{0x1F82, 0xFFFF}, /* Add 2(SP),w. */
|
{0x1F82, 0xFFFF}, /* Add 2(SP),w. */
|
{0x0000, 0x0000},
|
{0x0000, 0x0000},
|
};
|
};
|
|
|
#define IS_ADD_2SP_W_OPCODE(code) \
|
#define IS_ADD_2SP_W_OPCODE(code) \
|
ip2k_is_opcode (code, ip2k_add_2sp_w_opcode)
|
ip2k_is_opcode (code, ip2k_add_2sp_w_opcode)
|
|
|
static const struct ip2k_opcode ip2k_add_w_wreg_opcode[] =
|
static const struct ip2k_opcode ip2k_add_w_wreg_opcode[] =
|
{
|
{
|
{0x1C0A, 0xFFFF}, /* Add w,wreg. */
|
{0x1C0A, 0xFFFF}, /* Add w,wreg. */
|
{0x1E0A, 0xFFFF}, /* Add wreg,w. */
|
{0x1E0A, 0xFFFF}, /* Add wreg,w. */
|
{0x0000, 0x0000},
|
{0x0000, 0x0000},
|
};
|
};
|
|
|
#define IS_ADD_W_WREG_OPCODE(code) \
|
#define IS_ADD_W_WREG_OPCODE(code) \
|
ip2k_is_opcode (code, ip2k_add_w_wreg_opcode)
|
ip2k_is_opcode (code, ip2k_add_w_wreg_opcode)
|
|
|
static const struct ip2k_opcode ip2k_add_pcl_w_opcode[] =
|
static const struct ip2k_opcode ip2k_add_pcl_w_opcode[] =
|
{
|
{
|
{0x1E09, 0xFFFF}, /* Add pcl,w. */
|
{0x1E09, 0xFFFF}, /* Add pcl,w. */
|
{0x0000, 0x0000},
|
{0x0000, 0x0000},
|
};
|
};
|
|
|
#define IS_ADD_PCL_W_OPCODE(code) \
|
#define IS_ADD_PCL_W_OPCODE(code) \
|
ip2k_is_opcode (code, ip2k_add_pcl_w_opcode)
|
ip2k_is_opcode (code, ip2k_add_pcl_w_opcode)
|
|
|
static const struct ip2k_opcode ip2k_skip_opcodes[] =
|
static const struct ip2k_opcode ip2k_skip_opcodes[] =
|
{
|
{
|
{0xB000, 0xF000}, /* sb */
|
{0xB000, 0xF000}, /* sb */
|
{0xA000, 0xF000}, /* snb */
|
{0xA000, 0xF000}, /* snb */
|
{0x7600, 0xFE00}, /* cse/csne #lit */
|
{0x7600, 0xFE00}, /* cse/csne #lit */
|
{0x5800, 0xFC00}, /* incsnz */
|
{0x5800, 0xFC00}, /* incsnz */
|
{0x4C00, 0xFC00}, /* decsnz */
|
{0x4C00, 0xFC00}, /* decsnz */
|
{0x4000, 0xFC00}, /* cse/csne */
|
{0x4000, 0xFC00}, /* cse/csne */
|
{0x3C00, 0xFC00}, /* incsz */
|
{0x3C00, 0xFC00}, /* incsz */
|
{0x2C00, 0xFC00}, /* decsz */
|
{0x2C00, 0xFC00}, /* decsz */
|
{0x0000, 0x0000},
|
{0x0000, 0x0000},
|
};
|
};
|
|
|
#define IS_SKIP_OPCODE(code) \
|
#define IS_SKIP_OPCODE(code) \
|
ip2k_is_opcode (code, ip2k_skip_opcodes)
|
ip2k_is_opcode (code, ip2k_skip_opcodes)
|
|
|
/* Relocation tables. */
|
/* Relocation tables. */
|
static reloc_howto_type ip2k_elf_howto_table [] =
|
static reloc_howto_type ip2k_elf_howto_table [] =
|
{
|
{
|
#define IP2K_HOWTO(t,rs,s,bs,pr,bp,name,sm,dm) \
|
#define IP2K_HOWTO(t,rs,s,bs,pr,bp,name,sm,dm) \
|
HOWTO(t, /* type */ \
|
HOWTO(t, /* type */ \
|
rs, /* rightshift */ \
|
rs, /* rightshift */ \
|
s, /* size (0 = byte, 1 = short, 2 = long) */ \
|
s, /* size (0 = byte, 1 = short, 2 = long) */ \
|
bs, /* bitsize */ \
|
bs, /* bitsize */ \
|
pr, /* pc_relative */ \
|
pr, /* pc_relative */ \
|
bp, /* bitpos */ \
|
bp, /* bitpos */ \
|
complain_overflow_dont,/* complain_on_overflow */ \
|
complain_overflow_dont,/* complain_on_overflow */ \
|
bfd_elf_generic_reloc,/* special_function */ \
|
bfd_elf_generic_reloc,/* special_function */ \
|
name, /* name */ \
|
name, /* name */ \
|
FALSE, /* partial_inplace */ \
|
FALSE, /* partial_inplace */ \
|
sm, /* src_mask */ \
|
sm, /* src_mask */ \
|
dm, /* dst_mask */ \
|
dm, /* dst_mask */ \
|
pr) /* pcrel_offset */
|
pr) /* pcrel_offset */
|
|
|
/* This reloc does nothing. */
|
/* This reloc does nothing. */
|
IP2K_HOWTO (R_IP2K_NONE, 0,2,32, FALSE, 0, "R_IP2K_NONE", 0, 0),
|
IP2K_HOWTO (R_IP2K_NONE, 0,2,32, FALSE, 0, "R_IP2K_NONE", 0, 0),
|
/* A 16 bit absolute relocation. */
|
/* A 16 bit absolute relocation. */
|
IP2K_HOWTO (R_IP2K_16, 0,1,16, FALSE, 0, "R_IP2K_16", 0, 0xffff),
|
IP2K_HOWTO (R_IP2K_16, 0,1,16, FALSE, 0, "R_IP2K_16", 0, 0xffff),
|
/* A 32 bit absolute relocation. */
|
/* A 32 bit absolute relocation. */
|
IP2K_HOWTO (R_IP2K_32, 0,2,32, FALSE, 0, "R_IP2K_32", 0, 0xffffffff),
|
IP2K_HOWTO (R_IP2K_32, 0,2,32, FALSE, 0, "R_IP2K_32", 0, 0xffffffff),
|
/* A 8-bit data relocation for the FR9 field. Ninth bit is computed specially. */
|
/* A 8-bit data relocation for the FR9 field. Ninth bit is computed specially. */
|
IP2K_HOWTO (R_IP2K_FR9, 0,1,9, FALSE, 0, "R_IP2K_FR9", 0, 0x00ff),
|
IP2K_HOWTO (R_IP2K_FR9, 0,1,9, FALSE, 0, "R_IP2K_FR9", 0, 0x00ff),
|
/* A 4-bit data relocation. */
|
/* A 4-bit data relocation. */
|
IP2K_HOWTO (R_IP2K_BANK, 8,1,4, FALSE, 0, "R_IP2K_BANK", 0, 0x000f),
|
IP2K_HOWTO (R_IP2K_BANK, 8,1,4, FALSE, 0, "R_IP2K_BANK", 0, 0x000f),
|
/* A 13-bit insn relocation - word address => right-shift 1 bit extra. */
|
/* A 13-bit insn relocation - word address => right-shift 1 bit extra. */
|
IP2K_HOWTO (R_IP2K_ADDR16CJP, 1,1,13, FALSE, 0, "R_IP2K_ADDR16CJP", 0, 0x1fff),
|
IP2K_HOWTO (R_IP2K_ADDR16CJP, 1,1,13, FALSE, 0, "R_IP2K_ADDR16CJP", 0, 0x1fff),
|
/* A 3-bit insn relocation - word address => right-shift 1 bit extra. */
|
/* A 3-bit insn relocation - word address => right-shift 1 bit extra. */
|
IP2K_HOWTO (R_IP2K_PAGE3, 14,1,3, FALSE, 0, "R_IP2K_PAGE3", 0, 0x0007),
|
IP2K_HOWTO (R_IP2K_PAGE3, 14,1,3, FALSE, 0, "R_IP2K_PAGE3", 0, 0x0007),
|
/* Two 8-bit data relocations. */
|
/* Two 8-bit data relocations. */
|
IP2K_HOWTO (R_IP2K_LO8DATA, 0,1,8, FALSE, 0, "R_IP2K_LO8DATA", 0, 0x00ff),
|
IP2K_HOWTO (R_IP2K_LO8DATA, 0,1,8, FALSE, 0, "R_IP2K_LO8DATA", 0, 0x00ff),
|
IP2K_HOWTO (R_IP2K_HI8DATA, 8,1,8, FALSE, 0, "R_IP2K_HI8DATA", 0, 0x00ff),
|
IP2K_HOWTO (R_IP2K_HI8DATA, 8,1,8, FALSE, 0, "R_IP2K_HI8DATA", 0, 0x00ff),
|
/* Two 8-bit insn relocations. word address => right-shift 1 bit extra. */
|
/* Two 8-bit insn relocations. word address => right-shift 1 bit extra. */
|
IP2K_HOWTO (R_IP2K_LO8INSN, 1,1,8, FALSE, 0, "R_IP2K_LO8INSN", 0, 0x00ff),
|
IP2K_HOWTO (R_IP2K_LO8INSN, 1,1,8, FALSE, 0, "R_IP2K_LO8INSN", 0, 0x00ff),
|
IP2K_HOWTO (R_IP2K_HI8INSN, 9,1,8, FALSE, 0, "R_IP2K_HI8INSN", 0, 0x00ff),
|
IP2K_HOWTO (R_IP2K_HI8INSN, 9,1,8, FALSE, 0, "R_IP2K_HI8INSN", 0, 0x00ff),
|
|
|
/* Special 1 bit relocation for SKIP instructions. */
|
/* Special 1 bit relocation for SKIP instructions. */
|
IP2K_HOWTO (R_IP2K_PC_SKIP, 1,1,1, FALSE, 12, "R_IP2K_PC_SKIP", 0xfffe, 0x1000),
|
IP2K_HOWTO (R_IP2K_PC_SKIP, 1,1,1, FALSE, 12, "R_IP2K_PC_SKIP", 0xfffe, 0x1000),
|
/* 16 bit word address. */
|
/* 16 bit word address. */
|
IP2K_HOWTO (R_IP2K_TEXT, 1,1,16, FALSE, 0, "R_IP2K_TEXT", 0, 0xffff),
|
IP2K_HOWTO (R_IP2K_TEXT, 1,1,16, FALSE, 0, "R_IP2K_TEXT", 0, 0xffff),
|
/* A 7-bit offset relocation for the FR9 field. Eigth and ninth bit comes from insn. */
|
/* A 7-bit offset relocation for the FR9 field. Eigth and ninth bit comes from insn. */
|
IP2K_HOWTO (R_IP2K_FR_OFFSET, 0,1,9, FALSE, 0, "R_IP2K_FR_OFFSET", 0x180, 0x007f),
|
IP2K_HOWTO (R_IP2K_FR_OFFSET, 0,1,9, FALSE, 0, "R_IP2K_FR_OFFSET", 0x180, 0x007f),
|
/* Bits 23:16 of an address. */
|
/* Bits 23:16 of an address. */
|
IP2K_HOWTO (R_IP2K_EX8DATA, 16,1,8, FALSE, 0, "R_IP2K_EX8DATA", 0, 0x00ff),
|
IP2K_HOWTO (R_IP2K_EX8DATA, 16,1,8, FALSE, 0, "R_IP2K_EX8DATA", 0, 0x00ff),
|
};
|
};
|
|
|
|
|
/* Map BFD reloc types to IP2K ELF reloc types. */
|
/* Map BFD reloc types to IP2K ELF reloc types. */
|
|
|
static reloc_howto_type *
|
static reloc_howto_type *
|
ip2k_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
|
ip2k_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
|
bfd_reloc_code_real_type code)
|
bfd_reloc_code_real_type code)
|
{
|
{
|
/* Note that the ip2k_elf_howto_table is indxed by the R_
|
/* Note that the ip2k_elf_howto_table is indxed by the R_
|
constants. Thus, the order that the howto records appear in the
|
constants. Thus, the order that the howto records appear in the
|
table *must* match the order of the relocation types defined in
|
table *must* match the order of the relocation types defined in
|
include/elf/ip2k.h. */
|
include/elf/ip2k.h. */
|
|
|
switch (code)
|
switch (code)
|
{
|
{
|
case BFD_RELOC_NONE:
|
case BFD_RELOC_NONE:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_NONE];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_NONE];
|
case BFD_RELOC_16:
|
case BFD_RELOC_16:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_16];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_16];
|
case BFD_RELOC_32:
|
case BFD_RELOC_32:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_32];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_32];
|
case BFD_RELOC_IP2K_FR9:
|
case BFD_RELOC_IP2K_FR9:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_FR9];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_FR9];
|
case BFD_RELOC_IP2K_BANK:
|
case BFD_RELOC_IP2K_BANK:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_BANK];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_BANK];
|
case BFD_RELOC_IP2K_ADDR16CJP:
|
case BFD_RELOC_IP2K_ADDR16CJP:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_ADDR16CJP];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_ADDR16CJP];
|
case BFD_RELOC_IP2K_PAGE3:
|
case BFD_RELOC_IP2K_PAGE3:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_PAGE3];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_PAGE3];
|
case BFD_RELOC_IP2K_LO8DATA:
|
case BFD_RELOC_IP2K_LO8DATA:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_LO8DATA];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_LO8DATA];
|
case BFD_RELOC_IP2K_HI8DATA:
|
case BFD_RELOC_IP2K_HI8DATA:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_HI8DATA];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_HI8DATA];
|
case BFD_RELOC_IP2K_LO8INSN:
|
case BFD_RELOC_IP2K_LO8INSN:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_LO8INSN];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_LO8INSN];
|
case BFD_RELOC_IP2K_HI8INSN:
|
case BFD_RELOC_IP2K_HI8INSN:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_HI8INSN];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_HI8INSN];
|
case BFD_RELOC_IP2K_PC_SKIP:
|
case BFD_RELOC_IP2K_PC_SKIP:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_PC_SKIP];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_PC_SKIP];
|
case BFD_RELOC_IP2K_TEXT:
|
case BFD_RELOC_IP2K_TEXT:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_TEXT];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_TEXT];
|
case BFD_RELOC_IP2K_FR_OFFSET:
|
case BFD_RELOC_IP2K_FR_OFFSET:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_FR_OFFSET];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_FR_OFFSET];
|
case BFD_RELOC_IP2K_EX8DATA:
|
case BFD_RELOC_IP2K_EX8DATA:
|
return &ip2k_elf_howto_table[ (int) R_IP2K_EX8DATA];
|
return &ip2k_elf_howto_table[ (int) R_IP2K_EX8DATA];
|
default:
|
default:
|
/* Pacify gcc -Wall. */
|
/* Pacify gcc -Wall. */
|
return NULL;
|
return NULL;
|
}
|
}
|
return NULL;
|
return NULL;
|
}
|
}
|
|
|
static reloc_howto_type *
|
static reloc_howto_type *
|
ip2k_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
|
ip2k_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
|
{
|
{
|
unsigned int i;
|
unsigned int i;
|
|
|
for (i = 0;
|
for (i = 0;
|
i < sizeof (ip2k_elf_howto_table) / sizeof (ip2k_elf_howto_table[0]);
|
i < sizeof (ip2k_elf_howto_table) / sizeof (ip2k_elf_howto_table[0]);
|
i++)
|
i++)
|
if (ip2k_elf_howto_table[i].name != NULL
|
if (ip2k_elf_howto_table[i].name != NULL
|
&& strcasecmp (ip2k_elf_howto_table[i].name, r_name) == 0)
|
&& strcasecmp (ip2k_elf_howto_table[i].name, r_name) == 0)
|
return &ip2k_elf_howto_table[i];
|
return &ip2k_elf_howto_table[i];
|
|
|
return NULL;
|
return NULL;
|
}
|
}
|
|
|
static void
|
static void
|
ip2k_get_mem (bfd *abfd ATTRIBUTE_UNUSED,
|
ip2k_get_mem (bfd *abfd ATTRIBUTE_UNUSED,
|
bfd_byte *addr,
|
bfd_byte *addr,
|
int length,
|
int length,
|
bfd_byte *ptr)
|
bfd_byte *ptr)
|
{
|
{
|
while (length --)
|
while (length --)
|
* ptr ++ = bfd_get_8 (abfd, addr ++);
|
* ptr ++ = bfd_get_8 (abfd, addr ++);
|
}
|
}
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_is_opcode (bfd_byte *code, const struct ip2k_opcode *opcodes)
|
ip2k_is_opcode (bfd_byte *code, const struct ip2k_opcode *opcodes)
|
{
|
{
|
unsigned short insn = (code[0] << 8) | code[1];
|
unsigned short insn = (code[0] << 8) | code[1];
|
|
|
while (opcodes->mask != 0)
|
while (opcodes->mask != 0)
|
{
|
{
|
if ((insn & opcodes->mask) == opcodes->opcode)
|
if ((insn & opcodes->mask) == opcodes->opcode)
|
return TRUE;
|
return TRUE;
|
|
|
opcodes ++;
|
opcodes ++;
|
}
|
}
|
|
|
return FALSE;
|
return FALSE;
|
}
|
}
|
|
|
#define PAGENO(ABSADDR) ((ABSADDR) & 0xFFFFC000)
|
#define PAGENO(ABSADDR) ((ABSADDR) & 0xFFFFC000)
|
#define BASEADDR(SEC) ((SEC)->output_section->vma + (SEC)->output_offset)
|
#define BASEADDR(SEC) ((SEC)->output_section->vma + (SEC)->output_offset)
|
|
|
#define UNDEFINED_SYMBOL (~(bfd_vma)0)
|
#define UNDEFINED_SYMBOL (~(bfd_vma)0)
|
|
|
/* Return the value of the symbol associated with the relocation IREL. */
|
/* Return the value of the symbol associated with the relocation IREL. */
|
|
|
static bfd_vma
|
static bfd_vma
|
symbol_value (bfd *abfd,
|
symbol_value (bfd *abfd,
|
Elf_Internal_Shdr *symtab_hdr,
|
Elf_Internal_Shdr *symtab_hdr,
|
Elf_Internal_Sym *isymbuf,
|
Elf_Internal_Sym *isymbuf,
|
Elf_Internal_Rela *irel)
|
Elf_Internal_Rela *irel)
|
{
|
{
|
if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
|
if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
|
{
|
{
|
Elf_Internal_Sym *isym;
|
Elf_Internal_Sym *isym;
|
asection *sym_sec;
|
asection *sym_sec;
|
|
|
isym = isymbuf + ELF32_R_SYM (irel->r_info);
|
isym = isymbuf + ELF32_R_SYM (irel->r_info);
|
if (isym->st_shndx == SHN_UNDEF)
|
if (isym->st_shndx == SHN_UNDEF)
|
sym_sec = bfd_und_section_ptr;
|
sym_sec = bfd_und_section_ptr;
|
else if (isym->st_shndx == SHN_ABS)
|
else if (isym->st_shndx == SHN_ABS)
|
sym_sec = bfd_abs_section_ptr;
|
sym_sec = bfd_abs_section_ptr;
|
else if (isym->st_shndx == SHN_COMMON)
|
else if (isym->st_shndx == SHN_COMMON)
|
sym_sec = bfd_com_section_ptr;
|
sym_sec = bfd_com_section_ptr;
|
else
|
else
|
sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
|
sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
|
|
|
return isym->st_value + BASEADDR (sym_sec);
|
return isym->st_value + BASEADDR (sym_sec);
|
}
|
}
|
else
|
else
|
{
|
{
|
unsigned long indx;
|
unsigned long indx;
|
struct elf_link_hash_entry *h;
|
struct elf_link_hash_entry *h;
|
|
|
indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
|
indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
|
h = elf_sym_hashes (abfd)[indx];
|
h = elf_sym_hashes (abfd)[indx];
|
BFD_ASSERT (h != NULL);
|
BFD_ASSERT (h != NULL);
|
|
|
if (h->root.type != bfd_link_hash_defined
|
if (h->root.type != bfd_link_hash_defined
|
&& h->root.type != bfd_link_hash_defweak)
|
&& h->root.type != bfd_link_hash_defweak)
|
return UNDEFINED_SYMBOL;
|
return UNDEFINED_SYMBOL;
|
|
|
return (h->root.u.def.value + BASEADDR (h->root.u.def.section));
|
return (h->root.u.def.value + BASEADDR (h->root.u.def.section));
|
}
|
}
|
}
|
}
|
|
|
/* Determine if the instruction sequence matches that for
|
/* Determine if the instruction sequence matches that for
|
the prologue of a switch dispatch table with fewer than
|
the prologue of a switch dispatch table with fewer than
|
128 entries.
|
128 entries.
|
|
|
sc
|
sc
|
page $nnn0
|
page $nnn0
|
jmp $nnn0
|
jmp $nnn0
|
add w,wreg
|
add w,wreg
|
add pcl,w
|
add pcl,w
|
addr=>
|
addr=>
|
page $nnn1
|
page $nnn1
|
jmp $nnn1
|
jmp $nnn1
|
page $nnn2
|
page $nnn2
|
jmp $nnn2
|
jmp $nnn2
|
...
|
...
|
page $nnnN
|
page $nnnN
|
jmp $nnnN
|
jmp $nnnN
|
|
|
After relaxation.
|
After relaxation.
|
sc
|
sc
|
page $nnn0
|
page $nnn0
|
jmp $nnn0
|
jmp $nnn0
|
add pcl,w
|
add pcl,w
|
addr=>
|
addr=>
|
jmp $nnn1
|
jmp $nnn1
|
jmp $nnn2
|
jmp $nnn2
|
...
|
...
|
jmp $nnnN */
|
jmp $nnnN */
|
|
|
static int
|
static int
|
ip2k_is_switch_table_128 (bfd *abfd ATTRIBUTE_UNUSED,
|
ip2k_is_switch_table_128 (bfd *abfd ATTRIBUTE_UNUSED,
|
asection *sec,
|
asection *sec,
|
bfd_vma addr,
|
bfd_vma addr,
|
bfd_byte *contents)
|
bfd_byte *contents)
|
{
|
{
|
bfd_byte code[4];
|
bfd_byte code[4];
|
int index = 0;
|
int index = 0;
|
|
|
/* Check current page-jmp. */
|
/* Check current page-jmp. */
|
if (addr + 4 > sec->size)
|
if (addr + 4 > sec->size)
|
return -1;
|
return -1;
|
|
|
ip2k_get_mem (abfd, contents + addr, 4, code);
|
ip2k_get_mem (abfd, contents + addr, 4, code);
|
|
|
if ((! IS_PAGE_OPCODE (code + 0))
|
if ((! IS_PAGE_OPCODE (code + 0))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
return -1;
|
return -1;
|
|
|
/* Search back. */
|
/* Search back. */
|
while (1)
|
while (1)
|
{
|
{
|
if (addr < 4)
|
if (addr < 4)
|
return -1;
|
return -1;
|
|
|
/* Check previous 2 instructions. */
|
/* Check previous 2 instructions. */
|
ip2k_get_mem (abfd, contents + addr - 4, 4, code);
|
ip2k_get_mem (abfd, contents + addr - 4, 4, code);
|
if ((IS_ADD_W_WREG_OPCODE (code + 0))
|
if ((IS_ADD_W_WREG_OPCODE (code + 0))
|
&& (IS_ADD_PCL_W_OPCODE (code + 2)))
|
&& (IS_ADD_PCL_W_OPCODE (code + 2)))
|
return index;
|
return index;
|
|
|
if ((! IS_PAGE_OPCODE (code + 0))
|
if ((! IS_PAGE_OPCODE (code + 0))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
return -1;
|
return -1;
|
|
|
index++;
|
index++;
|
addr -= 4;
|
addr -= 4;
|
}
|
}
|
}
|
}
|
|
|
/* Determine if the instruction sequence matches that for
|
/* Determine if the instruction sequence matches that for
|
the prologue switch dispatch table with fewer than
|
the prologue switch dispatch table with fewer than
|
256 entries but more than 127.
|
256 entries but more than 127.
|
|
|
Before relaxation.
|
Before relaxation.
|
push %lo8insn(label) ; Push address of table
|
push %lo8insn(label) ; Push address of table
|
push %hi8insn(label)
|
push %hi8insn(label)
|
add w,wreg ; index*2 => offset
|
add w,wreg ; index*2 => offset
|
snc ; CARRY SET?
|
snc ; CARRY SET?
|
inc 1(sp) ; Propagate MSB into table address
|
inc 1(sp) ; Propagate MSB into table address
|
add 2(sp),w ; Add low bits of offset to table address
|
add 2(sp),w ; Add low bits of offset to table address
|
snc ; and handle any carry-out
|
snc ; and handle any carry-out
|
inc 1(sp)
|
inc 1(sp)
|
addr=>
|
addr=>
|
page __indjmp ; Do an indirect jump to that location
|
page __indjmp ; Do an indirect jump to that location
|
jmp __indjmp
|
jmp __indjmp
|
label: ; case dispatch table starts here
|
label: ; case dispatch table starts here
|
page $nnn1
|
page $nnn1
|
jmp $nnn1
|
jmp $nnn1
|
page $nnn2
|
page $nnn2
|
jmp $nnn2
|
jmp $nnn2
|
...
|
...
|
page $nnnN
|
page $nnnN
|
jmp $nnnN
|
jmp $nnnN
|
|
|
After relaxation.
|
After relaxation.
|
push %lo8insn(label) ; Push address of table
|
push %lo8insn(label) ; Push address of table
|
push %hi8insn(label)
|
push %hi8insn(label)
|
add 2(sp),w ; Add low bits of offset to table address
|
add 2(sp),w ; Add low bits of offset to table address
|
snc ; and handle any carry-out
|
snc ; and handle any carry-out
|
inc 1(sp)
|
inc 1(sp)
|
addr=>
|
addr=>
|
page __indjmp ; Do an indirect jump to that location
|
page __indjmp ; Do an indirect jump to that location
|
jmp __indjmp
|
jmp __indjmp
|
label: ; case dispatch table starts here
|
label: ; case dispatch table starts here
|
jmp $nnn1
|
jmp $nnn1
|
jmp $nnn2
|
jmp $nnn2
|
...
|
...
|
jmp $nnnN */
|
jmp $nnnN */
|
|
|
static int
|
static int
|
ip2k_is_switch_table_256 (bfd *abfd ATTRIBUTE_UNUSED,
|
ip2k_is_switch_table_256 (bfd *abfd ATTRIBUTE_UNUSED,
|
asection *sec,
|
asection *sec,
|
bfd_vma addr,
|
bfd_vma addr,
|
bfd_byte *contents)
|
bfd_byte *contents)
|
{
|
{
|
bfd_byte code[16];
|
bfd_byte code[16];
|
int index = 0;
|
int index = 0;
|
|
|
/* Check current page-jmp. */
|
/* Check current page-jmp. */
|
if (addr + 4 > sec->size)
|
if (addr + 4 > sec->size)
|
return -1;
|
return -1;
|
|
|
ip2k_get_mem (abfd, contents + addr, 4, code);
|
ip2k_get_mem (abfd, contents + addr, 4, code);
|
if ((! IS_PAGE_OPCODE (code + 0))
|
if ((! IS_PAGE_OPCODE (code + 0))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
return -1;
|
return -1;
|
|
|
/* Search back. */
|
/* Search back. */
|
while (1)
|
while (1)
|
{
|
{
|
if (addr < 16)
|
if (addr < 16)
|
return -1;
|
return -1;
|
|
|
/* Check previous 8 instructions. */
|
/* Check previous 8 instructions. */
|
ip2k_get_mem (abfd, contents + addr - 16, 16, code);
|
ip2k_get_mem (abfd, contents + addr - 16, 16, code);
|
if ((IS_ADD_W_WREG_OPCODE (code + 0))
|
if ((IS_ADD_W_WREG_OPCODE (code + 0))
|
&& (IS_SNC_OPCODE (code + 2))
|
&& (IS_SNC_OPCODE (code + 2))
|
&& (IS_INC_1SP_OPCODE (code + 4))
|
&& (IS_INC_1SP_OPCODE (code + 4))
|
&& (IS_ADD_2SP_W_OPCODE (code + 6))
|
&& (IS_ADD_2SP_W_OPCODE (code + 6))
|
&& (IS_SNC_OPCODE (code + 8))
|
&& (IS_SNC_OPCODE (code + 8))
|
&& (IS_INC_1SP_OPCODE (code + 10))
|
&& (IS_INC_1SP_OPCODE (code + 10))
|
&& (IS_PAGE_OPCODE (code + 12))
|
&& (IS_PAGE_OPCODE (code + 12))
|
&& (IS_JMP_OPCODE (code + 14)))
|
&& (IS_JMP_OPCODE (code + 14)))
|
return index;
|
return index;
|
|
|
if ((IS_ADD_W_WREG_OPCODE (code + 2))
|
if ((IS_ADD_W_WREG_OPCODE (code + 2))
|
&& (IS_SNC_OPCODE (code + 4))
|
&& (IS_SNC_OPCODE (code + 4))
|
&& (IS_INC_1SP_OPCODE (code + 6))
|
&& (IS_INC_1SP_OPCODE (code + 6))
|
&& (IS_ADD_2SP_W_OPCODE (code + 8))
|
&& (IS_ADD_2SP_W_OPCODE (code + 8))
|
&& (IS_SNC_OPCODE (code + 10))
|
&& (IS_SNC_OPCODE (code + 10))
|
&& (IS_INC_1SP_OPCODE (code + 12))
|
&& (IS_INC_1SP_OPCODE (code + 12))
|
&& (IS_JMP_OPCODE (code + 14)))
|
&& (IS_JMP_OPCODE (code + 14)))
|
return index;
|
return index;
|
|
|
if ((! IS_PAGE_OPCODE (code + 0))
|
if ((! IS_PAGE_OPCODE (code + 0))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
return -1;
|
return -1;
|
|
|
index++;
|
index++;
|
addr -= 4;
|
addr -= 4;
|
}
|
}
|
}
|
}
|
|
|
/* Returns the expected page state for the given instruction not including
|
/* Returns the expected page state for the given instruction not including
|
the effect of page instructions. */
|
the effect of page instructions. */
|
|
|
static bfd_vma
|
static bfd_vma
|
ip2k_nominal_page_bits (bfd *abfd ATTRIBUTE_UNUSED,
|
ip2k_nominal_page_bits (bfd *abfd ATTRIBUTE_UNUSED,
|
asection *sec,
|
asection *sec,
|
bfd_vma addr,
|
bfd_vma addr,
|
bfd_byte *contents)
|
bfd_byte *contents)
|
{
|
{
|
bfd_vma page = PAGENO (BASEADDR (sec) + addr);
|
bfd_vma page = PAGENO (BASEADDR (sec) + addr);
|
|
|
/* Check if section flows into this page. If not then the page
|
/* Check if section flows into this page. If not then the page
|
bits are assumed to match the PC. This will be true unless
|
bits are assumed to match the PC. This will be true unless
|
the user has a page instruction without a call/jump, in which
|
the user has a page instruction without a call/jump, in which
|
case they are on their own. */
|
case they are on their own. */
|
if (PAGENO (BASEADDR (sec)) == page)
|
if (PAGENO (BASEADDR (sec)) == page)
|
return page;
|
return page;
|
|
|
/* Section flows across page boundary. The page bits should match
|
/* Section flows across page boundary. The page bits should match
|
the PC unless there is a possible flow from the previous page,
|
the PC unless there is a possible flow from the previous page,
|
in which case it is not possible to determine the value of the
|
in which case it is not possible to determine the value of the
|
page bits. */
|
page bits. */
|
while (PAGENO (BASEADDR (sec) + addr - 2) == page)
|
while (PAGENO (BASEADDR (sec) + addr - 2) == page)
|
{
|
{
|
bfd_byte code[2];
|
bfd_byte code[2];
|
|
|
addr -= 2;
|
addr -= 2;
|
ip2k_get_mem (abfd, contents + addr, 2, code);
|
ip2k_get_mem (abfd, contents + addr, 2, code);
|
if (!IS_PAGE_OPCODE (code))
|
if (!IS_PAGE_OPCODE (code))
|
continue;
|
continue;
|
|
|
/* Found a page instruction, check if jump table. */
|
/* Found a page instruction, check if jump table. */
|
if (ip2k_is_switch_table_128 (abfd, sec, addr, contents) != -1)
|
if (ip2k_is_switch_table_128 (abfd, sec, addr, contents) != -1)
|
/* Jump table => page is conditional. */
|
/* Jump table => page is conditional. */
|
continue;
|
continue;
|
|
|
if (ip2k_is_switch_table_256 (abfd, sec, addr, contents) != -1)
|
if (ip2k_is_switch_table_256 (abfd, sec, addr, contents) != -1)
|
/* Jump table => page is conditional. */
|
/* Jump table => page is conditional. */
|
continue;
|
continue;
|
|
|
/* Found a page instruction, check if conditional. */
|
/* Found a page instruction, check if conditional. */
|
if (addr >= 2)
|
if (addr >= 2)
|
{
|
{
|
ip2k_get_mem (abfd, contents + addr - 2, 2, code);
|
ip2k_get_mem (abfd, contents + addr - 2, 2, code);
|
if (IS_SKIP_OPCODE (code))
|
if (IS_SKIP_OPCODE (code))
|
/* Page is conditional. */
|
/* Page is conditional. */
|
continue;
|
continue;
|
}
|
}
|
|
|
/* Unconditional page instruction => page bits should be correct. */
|
/* Unconditional page instruction => page bits should be correct. */
|
return page;
|
return page;
|
}
|
}
|
|
|
/* Flow from previous page => page bits are impossible to determine. */
|
/* Flow from previous page => page bits are impossible to determine. */
|
return 0;
|
return 0;
|
}
|
}
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_test_page_insn (bfd *abfd ATTRIBUTE_UNUSED,
|
ip2k_test_page_insn (bfd *abfd ATTRIBUTE_UNUSED,
|
asection *sec,
|
asection *sec,
|
Elf_Internal_Rela *irel,
|
Elf_Internal_Rela *irel,
|
struct misc *misc)
|
struct misc *misc)
|
{
|
{
|
bfd_vma symval;
|
bfd_vma symval;
|
|
|
/* Get the value of the symbol referred to by the reloc. */
|
/* Get the value of the symbol referred to by the reloc. */
|
symval = symbol_value (abfd, misc->symtab_hdr, misc->isymbuf, irel);
|
symval = symbol_value (abfd, misc->symtab_hdr, misc->isymbuf, irel);
|
if (symval == UNDEFINED_SYMBOL)
|
if (symval == UNDEFINED_SYMBOL)
|
/* This appears to be a reference to an undefined
|
/* This appears to be a reference to an undefined
|
symbol. Just ignore it--it will be caught by the
|
symbol. Just ignore it--it will be caught by the
|
regular reloc processing. */
|
regular reloc processing. */
|
return FALSE;
|
return FALSE;
|
|
|
/* Test if we can delete this page instruction. */
|
/* Test if we can delete this page instruction. */
|
if (PAGENO (symval + irel->r_addend) !=
|
if (PAGENO (symval + irel->r_addend) !=
|
ip2k_nominal_page_bits (abfd, sec, irel->r_offset, misc->contents))
|
ip2k_nominal_page_bits (abfd, sec, irel->r_offset, misc->contents))
|
return FALSE;
|
return FALSE;
|
|
|
return TRUE;
|
return TRUE;
|
}
|
}
|
|
|
/* Parts of a Stabs entry. */
|
/* Parts of a Stabs entry. */
|
|
|
#define STRDXOFF 0
|
#define STRDXOFF 0
|
#define TYPEOFF 4
|
#define TYPEOFF 4
|
#define OTHEROFF 5
|
#define OTHEROFF 5
|
#define DESCOFF 6
|
#define DESCOFF 6
|
#define VALOFF 8
|
#define VALOFF 8
|
#define STABSIZE 12
|
#define STABSIZE 12
|
|
|
/* Adjust all the relocations entries after adding or inserting instructions. */
|
/* Adjust all the relocations entries after adding or inserting instructions. */
|
|
|
static void
|
static void
|
adjust_all_relocations (bfd *abfd,
|
adjust_all_relocations (bfd *abfd,
|
asection *sec,
|
asection *sec,
|
bfd_vma addr,
|
bfd_vma addr,
|
bfd_vma endaddr,
|
bfd_vma endaddr,
|
int count,
|
int count,
|
int noadj)
|
int noadj)
|
{
|
{
|
Elf_Internal_Shdr *symtab_hdr;
|
Elf_Internal_Shdr *symtab_hdr;
|
Elf_Internal_Sym *isymbuf, *isym, *isymend;
|
Elf_Internal_Sym *isymbuf, *isym, *isymend;
|
unsigned int shndx;
|
unsigned int shndx;
|
bfd_byte *contents;
|
bfd_byte *contents;
|
Elf_Internal_Rela *irel, *irelend, *irelbase;
|
Elf_Internal_Rela *irel, *irelend, *irelbase;
|
struct elf_link_hash_entry **sym_hashes;
|
struct elf_link_hash_entry **sym_hashes;
|
struct elf_link_hash_entry **end_hashes;
|
struct elf_link_hash_entry **end_hashes;
|
unsigned int symcount;
|
unsigned int symcount;
|
asection *stab;
|
asection *stab;
|
|
|
symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
|
symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
|
isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
|
isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
|
|
|
shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
|
shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
|
|
|
contents = elf_section_data (sec)->this_hdr.contents;
|
contents = elf_section_data (sec)->this_hdr.contents;
|
|
|
irelbase = elf_section_data (sec)->relocs;
|
irelbase = elf_section_data (sec)->relocs;
|
irelend = irelbase + sec->reloc_count;
|
irelend = irelbase + sec->reloc_count;
|
|
|
for (irel = irelbase; irel < irelend; irel++)
|
for (irel = irelbase; irel < irelend; irel++)
|
{
|
{
|
if (ELF32_R_TYPE (irel->r_info) != R_IP2K_NONE)
|
if (ELF32_R_TYPE (irel->r_info) != R_IP2K_NONE)
|
{
|
{
|
/* Get the value of the symbol referred to by the reloc. */
|
/* Get the value of the symbol referred to by the reloc. */
|
if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
|
if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
|
{
|
{
|
asection *sym_sec;
|
asection *sym_sec;
|
|
|
/* A local symbol. */
|
/* A local symbol. */
|
isym = isymbuf + ELF32_R_SYM (irel->r_info);
|
isym = isymbuf + ELF32_R_SYM (irel->r_info);
|
sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
|
sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
|
|
|
if (isym->st_shndx == shndx)
|
if (isym->st_shndx == shndx)
|
{
|
{
|
bfd_vma baseaddr = BASEADDR (sec);
|
bfd_vma baseaddr = BASEADDR (sec);
|
bfd_vma symval = BASEADDR (sym_sec) + isym->st_value
|
bfd_vma symval = BASEADDR (sym_sec) + isym->st_value
|
+ irel->r_addend;
|
+ irel->r_addend;
|
|
|
if ((baseaddr + addr + noadj) <= symval
|
if ((baseaddr + addr + noadj) <= symval
|
&& symval < (baseaddr + endaddr))
|
&& symval < (baseaddr + endaddr))
|
irel->r_addend += count;
|
irel->r_addend += count;
|
}
|
}
|
}
|
}
|
}
|
}
|
|
|
/* Do this only for PC space relocations. */
|
/* Do this only for PC space relocations. */
|
if (addr <= irel->r_offset && irel->r_offset < endaddr)
|
if (addr <= irel->r_offset && irel->r_offset < endaddr)
|
irel->r_offset += count;
|
irel->r_offset += count;
|
}
|
}
|
|
|
/* Now fix the stab relocations. */
|
/* Now fix the stab relocations. */
|
stab = bfd_get_section_by_name (abfd, ".stab");
|
stab = bfd_get_section_by_name (abfd, ".stab");
|
if (stab)
|
if (stab)
|
{
|
{
|
bfd_byte *stabcontents, *stabend, *stabp;
|
bfd_byte *stabcontents, *stabend, *stabp;
|
bfd_size_type stab_size = stab->rawsize ? stab->rawsize : stab->size;
|
bfd_size_type stab_size = stab->rawsize ? stab->rawsize : stab->size;
|
|
|
irelbase = elf_section_data (stab)->relocs;
|
irelbase = elf_section_data (stab)->relocs;
|
irelend = irelbase + stab->reloc_count;
|
irelend = irelbase + stab->reloc_count;
|
|
|
/* Pull out the contents of the stab section. */
|
/* Pull out the contents of the stab section. */
|
if (elf_section_data (stab)->this_hdr.contents != NULL)
|
if (elf_section_data (stab)->this_hdr.contents != NULL)
|
stabcontents = elf_section_data (stab)->this_hdr.contents;
|
stabcontents = elf_section_data (stab)->this_hdr.contents;
|
else
|
else
|
{
|
{
|
if (!bfd_malloc_and_get_section (abfd, stab, &stabcontents))
|
if (!bfd_malloc_and_get_section (abfd, stab, &stabcontents))
|
{
|
{
|
if (stabcontents != NULL)
|
if (stabcontents != NULL)
|
free (stabcontents);
|
free (stabcontents);
|
return;
|
return;
|
}
|
}
|
|
|
/* We need to remember this. */
|
/* We need to remember this. */
|
elf_section_data (stab)->this_hdr.contents = stabcontents;
|
elf_section_data (stab)->this_hdr.contents = stabcontents;
|
}
|
}
|
|
|
stabend = stabcontents + stab_size;
|
stabend = stabcontents + stab_size;
|
|
|
for (irel = irelbase; irel < irelend; irel++)
|
for (irel = irelbase; irel < irelend; irel++)
|
{
|
{
|
if (ELF32_R_TYPE (irel->r_info) != R_IP2K_NONE)
|
if (ELF32_R_TYPE (irel->r_info) != R_IP2K_NONE)
|
{
|
{
|
/* Get the value of the symbol referred to by the reloc. */
|
/* Get the value of the symbol referred to by the reloc. */
|
if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
|
if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
|
{
|
{
|
asection *sym_sec;
|
asection *sym_sec;
|
|
|
/* A local symbol. */
|
/* A local symbol. */
|
isym = isymbuf + ELF32_R_SYM (irel->r_info);
|
isym = isymbuf + ELF32_R_SYM (irel->r_info);
|
sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
|
sym_sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
|
|
|
if (sym_sec == sec)
|
if (sym_sec == sec)
|
{
|
{
|
const char *name;
|
const char *name;
|
unsigned long strx;
|
unsigned long strx;
|
unsigned char type, other;
|
unsigned char type, other;
|
unsigned short desc;
|
unsigned short desc;
|
bfd_vma value;
|
bfd_vma value;
|
bfd_vma baseaddr = BASEADDR (sec);
|
bfd_vma baseaddr = BASEADDR (sec);
|
bfd_vma symval = BASEADDR (sym_sec) + isym->st_value
|
bfd_vma symval = BASEADDR (sym_sec) + isym->st_value
|
+ irel->r_addend;
|
+ irel->r_addend;
|
|
|
if ((baseaddr + addr) <= symval
|
if ((baseaddr + addr) <= symval
|
&& symval <= (baseaddr + endaddr))
|
&& symval <= (baseaddr + endaddr))
|
irel->r_addend += count;
|
irel->r_addend += count;
|
|
|
/* Go hunt up a function and fix its line info if needed. */
|
/* Go hunt up a function and fix its line info if needed. */
|
stabp = stabcontents + irel->r_offset - 8;
|
stabp = stabcontents + irel->r_offset - 8;
|
|
|
/* Go pullout the stab entry. */
|
/* Go pullout the stab entry. */
|
strx = bfd_h_get_32 (abfd, stabp + STRDXOFF);
|
strx = bfd_h_get_32 (abfd, stabp + STRDXOFF);
|
type = bfd_h_get_8 (abfd, stabp + TYPEOFF);
|
type = bfd_h_get_8 (abfd, stabp + TYPEOFF);
|
other = bfd_h_get_8 (abfd, stabp + OTHEROFF);
|
other = bfd_h_get_8 (abfd, stabp + OTHEROFF);
|
desc = bfd_h_get_16 (abfd, stabp + DESCOFF);
|
desc = bfd_h_get_16 (abfd, stabp + DESCOFF);
|
value = bfd_h_get_32 (abfd, stabp + VALOFF);
|
value = bfd_h_get_32 (abfd, stabp + VALOFF);
|
|
|
name = bfd_get_stab_name (type);
|
name = bfd_get_stab_name (type);
|
|
|
if (strcmp (name, "FUN") == 0)
|
if (strcmp (name, "FUN") == 0)
|
{
|
{
|
int function_adjusted = 0;
|
int function_adjusted = 0;
|
|
|
if (symval > (baseaddr + addr))
|
if (symval > (baseaddr + addr))
|
/* Not in this function. */
|
/* Not in this function. */
|
continue;
|
continue;
|
|
|
/* Hey we got a function hit. */
|
/* Hey we got a function hit. */
|
stabp += STABSIZE;
|
stabp += STABSIZE;
|
for (;stabp < stabend; stabp += STABSIZE)
|
for (;stabp < stabend; stabp += STABSIZE)
|
{
|
{
|
/* Go pullout the stab entry. */
|
/* Go pullout the stab entry. */
|
strx = bfd_h_get_32 (abfd, stabp + STRDXOFF);
|
strx = bfd_h_get_32 (abfd, stabp + STRDXOFF);
|
type = bfd_h_get_8 (abfd, stabp + TYPEOFF);
|
type = bfd_h_get_8 (abfd, stabp + TYPEOFF);
|
other = bfd_h_get_8 (abfd, stabp + OTHEROFF);
|
other = bfd_h_get_8 (abfd, stabp + OTHEROFF);
|
desc = bfd_h_get_16 (abfd, stabp + DESCOFF);
|
desc = bfd_h_get_16 (abfd, stabp + DESCOFF);
|
value = bfd_h_get_32 (abfd, stabp + VALOFF);
|
value = bfd_h_get_32 (abfd, stabp + VALOFF);
|
|
|
name = bfd_get_stab_name (type);
|
name = bfd_get_stab_name (type);
|
|
|
if (strcmp (name, "FUN") == 0)
|
if (strcmp (name, "FUN") == 0)
|
{
|
{
|
/* Hit another function entry. */
|
/* Hit another function entry. */
|
if (function_adjusted)
|
if (function_adjusted)
|
{
|
{
|
/* Adjust the value. */
|
/* Adjust the value. */
|
value += count;
|
value += count;
|
|
|
/* We need to put it back. */
|
/* We need to put it back. */
|
bfd_h_put_32 (abfd, value,stabp + VALOFF);
|
bfd_h_put_32 (abfd, value,stabp + VALOFF);
|
}
|
}
|
|
|
/* And then bale out. */
|
/* And then bale out. */
|
break;
|
break;
|
}
|
}
|
|
|
if (strcmp (name, "SLINE") == 0)
|
if (strcmp (name, "SLINE") == 0)
|
{
|
{
|
/* Got a line entry. */
|
/* Got a line entry. */
|
if ((baseaddr + addr) <= (symval + value))
|
if ((baseaddr + addr) <= (symval + value))
|
{
|
{
|
/* Adjust the line entry. */
|
/* Adjust the line entry. */
|
value += count;
|
value += count;
|
|
|
/* We need to put it back. */
|
/* We need to put it back. */
|
bfd_h_put_32 (abfd, value,stabp + VALOFF);
|
bfd_h_put_32 (abfd, value,stabp + VALOFF);
|
function_adjusted = 1;
|
function_adjusted = 1;
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
}
|
|
|
/* When adding an instruction back it is sometimes necessary to move any
|
/* When adding an instruction back it is sometimes necessary to move any
|
global or local symbol that was referencing the first instruction of
|
global or local symbol that was referencing the first instruction of
|
the moved block to refer to the first instruction of the inserted block.
|
the moved block to refer to the first instruction of the inserted block.
|
|
|
For example adding a PAGE instruction before a CALL or JMP requires
|
For example adding a PAGE instruction before a CALL or JMP requires
|
that any label on the CALL or JMP is moved to the PAGE insn. */
|
that any label on the CALL or JMP is moved to the PAGE insn. */
|
addr += noadj;
|
addr += noadj;
|
|
|
/* Adjust the local symbols defined in this section. */
|
/* Adjust the local symbols defined in this section. */
|
isymend = isymbuf + symtab_hdr->sh_info;
|
isymend = isymbuf + symtab_hdr->sh_info;
|
for (isym = isymbuf; isym < isymend; isym++)
|
for (isym = isymbuf; isym < isymend; isym++)
|
{
|
{
|
if (isym->st_shndx == shndx
|
if (isym->st_shndx == shndx
|
&& addr <= isym->st_value
|
&& addr <= isym->st_value
|
&& isym->st_value < endaddr)
|
&& isym->st_value < endaddr)
|
isym->st_value += count;
|
isym->st_value += count;
|
}
|
}
|
|
|
/* Now adjust the global symbols defined in this section. */
|
/* Now adjust the global symbols defined in this section. */
|
symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
|
symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
|
- symtab_hdr->sh_info);
|
- symtab_hdr->sh_info);
|
sym_hashes = elf_sym_hashes (abfd);
|
sym_hashes = elf_sym_hashes (abfd);
|
end_hashes = sym_hashes + symcount;
|
end_hashes = sym_hashes + symcount;
|
for (; sym_hashes < end_hashes; sym_hashes++)
|
for (; sym_hashes < end_hashes; sym_hashes++)
|
{
|
{
|
struct elf_link_hash_entry *sym_hash = *sym_hashes;
|
struct elf_link_hash_entry *sym_hash = *sym_hashes;
|
|
|
if ((sym_hash->root.type == bfd_link_hash_defined
|
if ((sym_hash->root.type == bfd_link_hash_defined
|
|| sym_hash->root.type == bfd_link_hash_defweak)
|
|| sym_hash->root.type == bfd_link_hash_defweak)
|
&& sym_hash->root.u.def.section == sec)
|
&& sym_hash->root.u.def.section == sec)
|
{
|
{
|
if (addr <= sym_hash->root.u.def.value
|
if (addr <= sym_hash->root.u.def.value
|
&& sym_hash->root.u.def.value < endaddr)
|
&& sym_hash->root.u.def.value < endaddr)
|
sym_hash->root.u.def.value += count;
|
sym_hash->root.u.def.value += count;
|
}
|
}
|
}
|
}
|
|
|
return;
|
return;
|
}
|
}
|
|
|
/* Delete some bytes from a section while relaxing. */
|
/* Delete some bytes from a section while relaxing. */
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_elf_relax_delete_bytes (bfd *abfd,
|
ip2k_elf_relax_delete_bytes (bfd *abfd,
|
asection *sec,
|
asection *sec,
|
bfd_vma addr,
|
bfd_vma addr,
|
int count)
|
int count)
|
{
|
{
|
bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
|
bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
|
bfd_vma endaddr = sec->size;
|
bfd_vma endaddr = sec->size;
|
|
|
/* Actually delete the bytes. */
|
/* Actually delete the bytes. */
|
memmove (contents + addr, contents + addr + count,
|
memmove (contents + addr, contents + addr + count,
|
endaddr - addr - count);
|
endaddr - addr - count);
|
|
|
sec->size -= count;
|
sec->size -= count;
|
|
|
adjust_all_relocations (abfd, sec, addr + count, endaddr, -count, 0);
|
adjust_all_relocations (abfd, sec, addr + count, endaddr, -count, 0);
|
return TRUE;
|
return TRUE;
|
}
|
}
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_delete_page_insn (bfd *abfd ATTRIBUTE_UNUSED,
|
ip2k_delete_page_insn (bfd *abfd ATTRIBUTE_UNUSED,
|
asection *sec,
|
asection *sec,
|
Elf_Internal_Rela *irel,
|
Elf_Internal_Rela *irel,
|
bfd_boolean *again,
|
bfd_boolean *again,
|
struct misc *misc)
|
struct misc *misc)
|
{
|
{
|
/* Note that we've changed the relocs, section contents, etc. */
|
/* Note that we've changed the relocs, section contents, etc. */
|
elf_section_data (sec)->relocs = misc->irelbase;
|
elf_section_data (sec)->relocs = misc->irelbase;
|
elf_section_data (sec)->this_hdr.contents = misc->contents;
|
elf_section_data (sec)->this_hdr.contents = misc->contents;
|
misc->symtab_hdr->contents = (bfd_byte *) misc->isymbuf;
|
misc->symtab_hdr->contents = (bfd_byte *) misc->isymbuf;
|
|
|
/* Fix the relocation's type. */
|
/* Fix the relocation's type. */
|
irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info), R_IP2K_NONE);
|
irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info), R_IP2K_NONE);
|
|
|
/* Delete the PAGE insn. */
|
/* Delete the PAGE insn. */
|
if (!ip2k_elf_relax_delete_bytes (abfd, sec, irel->r_offset, 2))
|
if (!ip2k_elf_relax_delete_bytes (abfd, sec, irel->r_offset, 2))
|
return FALSE;
|
return FALSE;
|
|
|
/* Modified => will need to iterate relaxation again. */
|
/* Modified => will need to iterate relaxation again. */
|
*again = TRUE;
|
*again = TRUE;
|
|
|
return TRUE;
|
return TRUE;
|
}
|
}
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_relax_switch_table_128 (bfd *abfd ATTRIBUTE_UNUSED,
|
ip2k_relax_switch_table_128 (bfd *abfd ATTRIBUTE_UNUSED,
|
asection *sec,
|
asection *sec,
|
Elf_Internal_Rela *irel,
|
Elf_Internal_Rela *irel,
|
bfd_boolean *again,
|
bfd_boolean *again,
|
struct misc *misc)
|
struct misc *misc)
|
{
|
{
|
Elf_Internal_Rela *irelend = misc->irelbase + sec->reloc_count;
|
Elf_Internal_Rela *irelend = misc->irelbase + sec->reloc_count;
|
Elf_Internal_Rela *ireltest = irel;
|
Elf_Internal_Rela *ireltest = irel;
|
bfd_byte code[4];
|
bfd_byte code[4];
|
bfd_vma addr;
|
bfd_vma addr;
|
|
|
/* Test all page instructions. */
|
/* Test all page instructions. */
|
addr = irel->r_offset;
|
addr = irel->r_offset;
|
while (1)
|
while (1)
|
{
|
{
|
if (addr + 4 > sec->size)
|
if (addr + 4 > sec->size)
|
break;
|
break;
|
|
|
ip2k_get_mem (abfd, misc->contents + addr, 4, code);
|
ip2k_get_mem (abfd, misc->contents + addr, 4, code);
|
if ((! IS_PAGE_OPCODE (code + 0))
|
if ((! IS_PAGE_OPCODE (code + 0))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
break;
|
break;
|
|
|
/* Validate relocation entry (every entry should have a matching
|
/* Validate relocation entry (every entry should have a matching
|
relocation entry). */
|
relocation entry). */
|
if (ireltest >= irelend)
|
if (ireltest >= irelend)
|
{
|
{
|
_bfd_error_handler (_("ip2k relaxer: switch table without complete matching relocation information."));
|
_bfd_error_handler (_("ip2k relaxer: switch table without complete matching relocation information."));
|
return FALSE;
|
return FALSE;
|
}
|
}
|
|
|
if (ireltest->r_offset != addr)
|
if (ireltest->r_offset != addr)
|
{
|
{
|
_bfd_error_handler (_("ip2k relaxer: switch table without complete matching relocation information."));
|
_bfd_error_handler (_("ip2k relaxer: switch table without complete matching relocation information."));
|
return FALSE;
|
return FALSE;
|
}
|
}
|
|
|
if (! ip2k_test_page_insn (abfd, sec, ireltest, misc))
|
if (! ip2k_test_page_insn (abfd, sec, ireltest, misc))
|
/* Un-removable page insn => nothing can be done. */
|
/* Un-removable page insn => nothing can be done. */
|
return TRUE;
|
return TRUE;
|
|
|
addr += 4;
|
addr += 4;
|
ireltest += 2;
|
ireltest += 2;
|
}
|
}
|
|
|
/* Relaxable. Adjust table header. */
|
/* Relaxable. Adjust table header. */
|
ip2k_get_mem (abfd, misc->contents + irel->r_offset - 4, 4, code);
|
ip2k_get_mem (abfd, misc->contents + irel->r_offset - 4, 4, code);
|
if ((! IS_ADD_W_WREG_OPCODE (code + 0))
|
if ((! IS_ADD_W_WREG_OPCODE (code + 0))
|
|| (! IS_ADD_PCL_W_OPCODE (code + 2)))
|
|| (! IS_ADD_PCL_W_OPCODE (code + 2)))
|
{
|
{
|
_bfd_error_handler (_("ip2k relaxer: switch table header corrupt."));
|
_bfd_error_handler (_("ip2k relaxer: switch table header corrupt."));
|
return FALSE;
|
return FALSE;
|
}
|
}
|
|
|
if (!ip2k_elf_relax_delete_bytes (abfd, sec, irel->r_offset - 4, 2))
|
if (!ip2k_elf_relax_delete_bytes (abfd, sec, irel->r_offset - 4, 2))
|
return FALSE;
|
return FALSE;
|
|
|
*again = TRUE;
|
*again = TRUE;
|
|
|
/* Delete all page instructions in table. */
|
/* Delete all page instructions in table. */
|
while (irel < ireltest)
|
while (irel < ireltest)
|
{
|
{
|
if (!ip2k_delete_page_insn (abfd, sec, irel, again, misc))
|
if (!ip2k_delete_page_insn (abfd, sec, irel, again, misc))
|
return FALSE;
|
return FALSE;
|
irel += 2;
|
irel += 2;
|
}
|
}
|
|
|
return TRUE;
|
return TRUE;
|
}
|
}
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_relax_switch_table_256 (bfd *abfd ATTRIBUTE_UNUSED,
|
ip2k_relax_switch_table_256 (bfd *abfd ATTRIBUTE_UNUSED,
|
asection *sec,
|
asection *sec,
|
Elf_Internal_Rela *irel,
|
Elf_Internal_Rela *irel,
|
bfd_boolean *again,
|
bfd_boolean *again,
|
struct misc *misc)
|
struct misc *misc)
|
{
|
{
|
Elf_Internal_Rela *irelend = misc->irelbase + sec->reloc_count;
|
Elf_Internal_Rela *irelend = misc->irelbase + sec->reloc_count;
|
Elf_Internal_Rela *ireltest = irel;
|
Elf_Internal_Rela *ireltest = irel;
|
bfd_byte code[12];
|
bfd_byte code[12];
|
bfd_vma addr;
|
bfd_vma addr;
|
|
|
/* Test all page instructions. */
|
/* Test all page instructions. */
|
addr = irel->r_offset;
|
addr = irel->r_offset;
|
|
|
while (1)
|
while (1)
|
{
|
{
|
if (addr + 4 > sec->size)
|
if (addr + 4 > sec->size)
|
break;
|
break;
|
|
|
ip2k_get_mem (abfd, misc->contents + addr, 4, code);
|
ip2k_get_mem (abfd, misc->contents + addr, 4, code);
|
|
|
if ((! IS_PAGE_OPCODE (code + 0))
|
if ((! IS_PAGE_OPCODE (code + 0))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
|| (! IS_JMP_OPCODE (code + 2)))
|
break;
|
break;
|
|
|
/* Validate relocation entry (every entry should have a matching
|
/* Validate relocation entry (every entry should have a matching
|
relocation entry). */
|
relocation entry). */
|
if (ireltest >= irelend)
|
if (ireltest >= irelend)
|
{
|
{
|
_bfd_error_handler (_("ip2k relaxer: switch table without complete matching relocation information."));
|
_bfd_error_handler (_("ip2k relaxer: switch table without complete matching relocation information."));
|
return FALSE;
|
return FALSE;
|
}
|
}
|
|
|
if (ireltest->r_offset != addr)
|
if (ireltest->r_offset != addr)
|
{
|
{
|
_bfd_error_handler (_("ip2k relaxer: switch table without complete matching relocation information."));
|
_bfd_error_handler (_("ip2k relaxer: switch table without complete matching relocation information."));
|
return FALSE;
|
return FALSE;
|
}
|
}
|
|
|
if (!ip2k_test_page_insn (abfd, sec, ireltest, misc))
|
if (!ip2k_test_page_insn (abfd, sec, ireltest, misc))
|
/* Un-removable page insn => nothing can be done. */
|
/* Un-removable page insn => nothing can be done. */
|
return TRUE;
|
return TRUE;
|
|
|
addr += 4;
|
addr += 4;
|
ireltest += 2;
|
ireltest += 2;
|
}
|
}
|
|
|
/* Relaxable. Adjust table header. */
|
/* Relaxable. Adjust table header. */
|
ip2k_get_mem (abfd, misc->contents + irel->r_offset - 4, 2, code);
|
ip2k_get_mem (abfd, misc->contents + irel->r_offset - 4, 2, code);
|
if (IS_PAGE_OPCODE (code))
|
if (IS_PAGE_OPCODE (code))
|
addr = irel->r_offset - 16;
|
addr = irel->r_offset - 16;
|
else
|
else
|
addr = irel->r_offset - 14;
|
addr = irel->r_offset - 14;
|
|
|
ip2k_get_mem (abfd, misc->contents + addr, 12, code);
|
ip2k_get_mem (abfd, misc->contents + addr, 12, code);
|
if ((!IS_ADD_W_WREG_OPCODE (code + 0))
|
if ((!IS_ADD_W_WREG_OPCODE (code + 0))
|
|| (!IS_SNC_OPCODE (code + 2))
|
|| (!IS_SNC_OPCODE (code + 2))
|
|| (!IS_INC_1SP_OPCODE (code + 4))
|
|| (!IS_INC_1SP_OPCODE (code + 4))
|
|| (!IS_ADD_2SP_W_OPCODE (code + 6))
|
|| (!IS_ADD_2SP_W_OPCODE (code + 6))
|
|| (!IS_SNC_OPCODE (code + 8))
|
|| (!IS_SNC_OPCODE (code + 8))
|
|| (!IS_INC_1SP_OPCODE (code + 10)))
|
|| (!IS_INC_1SP_OPCODE (code + 10)))
|
{
|
{
|
_bfd_error_handler (_("ip2k relaxer: switch table header corrupt."));
|
_bfd_error_handler (_("ip2k relaxer: switch table header corrupt."));
|
return FALSE;
|
return FALSE;
|
}
|
}
|
|
|
/* Delete first 3 opcodes. */
|
/* Delete first 3 opcodes. */
|
if (!ip2k_elf_relax_delete_bytes (abfd, sec, addr + 0, 6))
|
if (!ip2k_elf_relax_delete_bytes (abfd, sec, addr + 0, 6))
|
return FALSE;
|
return FALSE;
|
|
|
*again = TRUE;
|
*again = TRUE;
|
|
|
/* Delete all page instructions in table. */
|
/* Delete all page instructions in table. */
|
while (irel < ireltest)
|
while (irel < ireltest)
|
{
|
{
|
if (!ip2k_delete_page_insn (abfd, sec, irel, again, misc))
|
if (!ip2k_delete_page_insn (abfd, sec, irel, again, misc))
|
return FALSE;
|
return FALSE;
|
irel += 2;
|
irel += 2;
|
}
|
}
|
|
|
return TRUE;
|
return TRUE;
|
}
|
}
|
|
|
/* This function handles relaxation of a section in a specific page. */
|
/* This function handles relaxation of a section in a specific page. */
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_elf_relax_section_page (bfd *abfd,
|
ip2k_elf_relax_section_page (bfd *abfd,
|
asection *sec,
|
asection *sec,
|
bfd_boolean *again,
|
bfd_boolean *again,
|
struct misc *misc,
|
struct misc *misc,
|
unsigned long page_start,
|
unsigned long page_start,
|
unsigned long page_end)
|
unsigned long page_end)
|
{
|
{
|
Elf_Internal_Rela *irelend = misc->irelbase + sec->reloc_count;
|
Elf_Internal_Rela *irelend = misc->irelbase + sec->reloc_count;
|
Elf_Internal_Rela *irel;
|
Elf_Internal_Rela *irel;
|
int switch_table_128;
|
int switch_table_128;
|
int switch_table_256;
|
int switch_table_256;
|
|
|
/* Walk thru the section looking for relaxation opportunities. */
|
/* Walk thru the section looking for relaxation opportunities. */
|
for (irel = misc->irelbase; irel < irelend; irel++)
|
for (irel = misc->irelbase; irel < irelend; irel++)
|
{
|
{
|
if (ELF32_R_TYPE (irel->r_info) != (int) R_IP2K_PAGE3)
|
if (ELF32_R_TYPE (irel->r_info) != (int) R_IP2K_PAGE3)
|
/* Ignore non page instructions. */
|
/* Ignore non page instructions. */
|
continue;
|
continue;
|
|
|
if (BASEADDR (sec) + irel->r_offset < page_start)
|
if (BASEADDR (sec) + irel->r_offset < page_start)
|
/* Ignore page instructions on earlier page - they have
|
/* Ignore page instructions on earlier page - they have
|
already been processed. Remember that there is code flow
|
already been processed. Remember that there is code flow
|
that crosses a page boundary. */
|
that crosses a page boundary. */
|
continue;
|
continue;
|
|
|
if (BASEADDR (sec) + irel->r_offset > page_end)
|
if (BASEADDR (sec) + irel->r_offset > page_end)
|
/* Flow beyond end of page => nothing more to do for this page. */
|
/* Flow beyond end of page => nothing more to do for this page. */
|
return TRUE;
|
return TRUE;
|
|
|
/* Detect switch tables. */
|
/* Detect switch tables. */
|
switch_table_128 = ip2k_is_switch_table_128 (abfd, sec, irel->r_offset, misc->contents);
|
switch_table_128 = ip2k_is_switch_table_128 (abfd, sec, irel->r_offset, misc->contents);
|
switch_table_256 = ip2k_is_switch_table_256 (abfd, sec, irel->r_offset, misc->contents);
|
switch_table_256 = ip2k_is_switch_table_256 (abfd, sec, irel->r_offset, misc->contents);
|
|
|
if ((switch_table_128 > 0) || (switch_table_256 > 0))
|
if ((switch_table_128 > 0) || (switch_table_256 > 0))
|
/* If the index is greater than 0 then it has already been processed. */
|
/* If the index is greater than 0 then it has already been processed. */
|
continue;
|
continue;
|
|
|
if (switch_table_128 == 0)
|
if (switch_table_128 == 0)
|
{
|
{
|
if (!ip2k_relax_switch_table_128 (abfd, sec, irel, again, misc))
|
if (!ip2k_relax_switch_table_128 (abfd, sec, irel, again, misc))
|
return FALSE;
|
return FALSE;
|
|
|
continue;
|
continue;
|
}
|
}
|
|
|
if (switch_table_256 == 0)
|
if (switch_table_256 == 0)
|
{
|
{
|
if (!ip2k_relax_switch_table_256 (abfd, sec, irel, again, misc))
|
if (!ip2k_relax_switch_table_256 (abfd, sec, irel, again, misc))
|
return FALSE;
|
return FALSE;
|
|
|
continue;
|
continue;
|
}
|
}
|
|
|
/* Simple relax. */
|
/* Simple relax. */
|
if (ip2k_test_page_insn (abfd, sec, irel, misc))
|
if (ip2k_test_page_insn (abfd, sec, irel, misc))
|
{
|
{
|
if (!ip2k_delete_page_insn (abfd, sec, irel, again, misc))
|
if (!ip2k_delete_page_insn (abfd, sec, irel, again, misc))
|
return FALSE;
|
return FALSE;
|
|
|
continue;
|
continue;
|
}
|
}
|
}
|
}
|
|
|
return TRUE;
|
return TRUE;
|
}
|
}
|
|
|
/* This function handles relaxing for the ip2k.
|
/* This function handles relaxing for the ip2k.
|
|
|
Principle: Start with the first page and remove page instructions that
|
Principle: Start with the first page and remove page instructions that
|
are not require on this first page. By removing page instructions more
|
are not require on this first page. By removing page instructions more
|
code will fit into this page - repeat until nothing more can be achieved
|
code will fit into this page - repeat until nothing more can be achieved
|
for this page. Move on to the next page.
|
for this page. Move on to the next page.
|
|
|
Processing the pages one at a time from the lowest page allows a removal
|
Processing the pages one at a time from the lowest page allows a removal
|
only policy to be used - pages can be removed but are never reinserted. */
|
only policy to be used - pages can be removed but are never reinserted. */
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_elf_relax_section (bfd *abfd,
|
ip2k_elf_relax_section (bfd *abfd,
|
asection *sec,
|
asection *sec,
|
struct bfd_link_info *link_info,
|
struct bfd_link_info *link_info,
|
bfd_boolean *again)
|
bfd_boolean *again)
|
{
|
{
|
Elf_Internal_Shdr *symtab_hdr;
|
Elf_Internal_Shdr *symtab_hdr;
|
Elf_Internal_Rela *internal_relocs;
|
Elf_Internal_Rela *internal_relocs;
|
bfd_byte *contents = NULL;
|
bfd_byte *contents = NULL;
|
Elf_Internal_Sym *isymbuf = NULL;
|
Elf_Internal_Sym *isymbuf = NULL;
|
static asection * first_section = NULL;
|
static asection * first_section = NULL;
|
static unsigned long search_addr;
|
static unsigned long search_addr;
|
static unsigned long page_start = 0;
|
static unsigned long page_start = 0;
|
static unsigned long page_end = 0;
|
static unsigned long page_end = 0;
|
static unsigned int pass = 0;
|
static unsigned int pass = 0;
|
static bfd_boolean new_pass = FALSE;
|
static bfd_boolean new_pass = FALSE;
|
static bfd_boolean changed = FALSE;
|
static bfd_boolean changed = FALSE;
|
struct misc misc;
|
struct misc misc;
|
asection *stab;
|
asection *stab;
|
|
|
/* Assume nothing changes. */
|
/* Assume nothing changes. */
|
*again = FALSE;
|
*again = FALSE;
|
|
|
if (first_section == NULL)
|
if (first_section == NULL)
|
{
|
{
|
ip2k_relaxed = TRUE;
|
ip2k_relaxed = TRUE;
|
first_section = sec;
|
first_section = sec;
|
}
|
}
|
|
|
if (first_section == sec)
|
if (first_section == sec)
|
{
|
{
|
pass++;
|
pass++;
|
new_pass = TRUE;
|
new_pass = TRUE;
|
}
|
}
|
|
|
/* We don't have to do anything for a relocatable link,
|
/* We don't have to do anything for a relocatable link,
|
if this section does not have relocs, or if this is
|
if this section does not have relocs, or if this is
|
not a code section. */
|
not a code section. */
|
if (link_info->relocatable
|
if (link_info->relocatable
|
|| (sec->flags & SEC_RELOC) == 0
|
|| (sec->flags & SEC_RELOC) == 0
|
|| sec->reloc_count == 0
|
|| sec->reloc_count == 0
|
|| (sec->flags & SEC_CODE) == 0)
|
|| (sec->flags & SEC_CODE) == 0)
|
return TRUE;
|
return TRUE;
|
|
|
symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
|
symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
|
|
|
internal_relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
|
internal_relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
|
link_info->keep_memory);
|
link_info->keep_memory);
|
if (internal_relocs == NULL)
|
if (internal_relocs == NULL)
|
goto error_return;
|
goto error_return;
|
|
|
/* Make sure the stac.rela stuff gets read in. */
|
/* Make sure the stac.rela stuff gets read in. */
|
stab = bfd_get_section_by_name (abfd, ".stab");
|
stab = bfd_get_section_by_name (abfd, ".stab");
|
|
|
if (stab)
|
if (stab)
|
{
|
{
|
/* So stab does exits. */
|
/* So stab does exits. */
|
Elf_Internal_Rela * irelbase;
|
Elf_Internal_Rela * irelbase;
|
|
|
irelbase = _bfd_elf_link_read_relocs (abfd, stab, NULL, NULL,
|
irelbase = _bfd_elf_link_read_relocs (abfd, stab, NULL, NULL,
|
link_info->keep_memory);
|
link_info->keep_memory);
|
}
|
}
|
|
|
/* Get section contents cached copy if it exists. */
|
/* Get section contents cached copy if it exists. */
|
if (contents == NULL)
|
if (contents == NULL)
|
{
|
{
|
/* Get cached copy if it exists. */
|
/* Get cached copy if it exists. */
|
if (elf_section_data (sec)->this_hdr.contents != NULL)
|
if (elf_section_data (sec)->this_hdr.contents != NULL)
|
contents = elf_section_data (sec)->this_hdr.contents;
|
contents = elf_section_data (sec)->this_hdr.contents;
|
else
|
else
|
{
|
{
|
/* Go get them off disk. */
|
/* Go get them off disk. */
|
if (!bfd_malloc_and_get_section (abfd, sec, &contents))
|
if (!bfd_malloc_and_get_section (abfd, sec, &contents))
|
goto error_return;
|
goto error_return;
|
}
|
}
|
}
|
}
|
|
|
/* Read this BFD's symbols cached copy if it exists. */
|
/* Read this BFD's symbols cached copy if it exists. */
|
if (isymbuf == NULL && symtab_hdr->sh_info != 0)
|
if (isymbuf == NULL && symtab_hdr->sh_info != 0)
|
{
|
{
|
isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
|
isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
|
if (isymbuf == NULL)
|
if (isymbuf == NULL)
|
isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
|
isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
|
symtab_hdr->sh_info, 0,
|
symtab_hdr->sh_info, 0,
|
NULL, NULL, NULL);
|
NULL, NULL, NULL);
|
if (isymbuf == NULL)
|
if (isymbuf == NULL)
|
goto error_return;
|
goto error_return;
|
}
|
}
|
|
|
misc.symtab_hdr = symtab_hdr;
|
misc.symtab_hdr = symtab_hdr;
|
misc.isymbuf = isymbuf;
|
misc.isymbuf = isymbuf;
|
misc.irelbase = internal_relocs;
|
misc.irelbase = internal_relocs;
|
misc.contents = contents;
|
misc.contents = contents;
|
|
|
/* This is where all the relaxation actually get done. */
|
/* This is where all the relaxation actually get done. */
|
if ((pass == 1) || (new_pass && !changed))
|
if ((pass == 1) || (new_pass && !changed))
|
{
|
{
|
/* On the first pass we simply search for the lowest page that
|
/* On the first pass we simply search for the lowest page that
|
we havn't relaxed yet. Note that the pass count is reset
|
we havn't relaxed yet. Note that the pass count is reset
|
each time a page is complete in order to move on to the next page.
|
each time a page is complete in order to move on to the next page.
|
If we can't find any more pages then we are finished. */
|
If we can't find any more pages then we are finished. */
|
if (new_pass)
|
if (new_pass)
|
{
|
{
|
pass = 1;
|
pass = 1;
|
new_pass = FALSE;
|
new_pass = FALSE;
|
changed = TRUE; /* Pre-initialize to break out of pass 1. */
|
changed = TRUE; /* Pre-initialize to break out of pass 1. */
|
search_addr = 0xFFFFFFFF;
|
search_addr = 0xFFFFFFFF;
|
}
|
}
|
|
|
if ((BASEADDR (sec) + sec->size < search_addr)
|
if ((BASEADDR (sec) + sec->size < search_addr)
|
&& (BASEADDR (sec) + sec->size > page_end))
|
&& (BASEADDR (sec) + sec->size > page_end))
|
{
|
{
|
if (BASEADDR (sec) <= page_end)
|
if (BASEADDR (sec) <= page_end)
|
search_addr = page_end + 1;
|
search_addr = page_end + 1;
|
else
|
else
|
search_addr = BASEADDR (sec);
|
search_addr = BASEADDR (sec);
|
|
|
/* Found a page => more work to do. */
|
/* Found a page => more work to do. */
|
*again = TRUE;
|
*again = TRUE;
|
}
|
}
|
}
|
}
|
else
|
else
|
{
|
{
|
if (new_pass)
|
if (new_pass)
|
{
|
{
|
new_pass = FALSE;
|
new_pass = FALSE;
|
changed = FALSE;
|
changed = FALSE;
|
page_start = PAGENO (search_addr);
|
page_start = PAGENO (search_addr);
|
page_end = page_start | 0x00003FFF;
|
page_end = page_start | 0x00003FFF;
|
}
|
}
|
|
|
/* Only process sections in range. */
|
/* Only process sections in range. */
|
if ((BASEADDR (sec) + sec->size >= page_start)
|
if ((BASEADDR (sec) + sec->size >= page_start)
|
&& (BASEADDR (sec) <= page_end))
|
&& (BASEADDR (sec) <= page_end))
|
{
|
{
|
if (!ip2k_elf_relax_section_page (abfd, sec, &changed, &misc, page_start, page_end))
|
if (!ip2k_elf_relax_section_page (abfd, sec, &changed, &misc, page_start, page_end))
|
return FALSE;
|
return FALSE;
|
}
|
}
|
*again = TRUE;
|
*again = TRUE;
|
}
|
}
|
|
|
/* Perform some house keeping after relaxing the section. */
|
/* Perform some house keeping after relaxing the section. */
|
|
|
if (isymbuf != NULL
|
if (isymbuf != NULL
|
&& symtab_hdr->contents != (unsigned char *) isymbuf)
|
&& symtab_hdr->contents != (unsigned char *) isymbuf)
|
{
|
{
|
if (! link_info->keep_memory)
|
if (! link_info->keep_memory)
|
free (isymbuf);
|
free (isymbuf);
|
else
|
else
|
symtab_hdr->contents = (unsigned char *) isymbuf;
|
symtab_hdr->contents = (unsigned char *) isymbuf;
|
}
|
}
|
|
|
if (contents != NULL
|
if (contents != NULL
|
&& elf_section_data (sec)->this_hdr.contents != contents)
|
&& elf_section_data (sec)->this_hdr.contents != contents)
|
{
|
{
|
if (! link_info->keep_memory)
|
if (! link_info->keep_memory)
|
free (contents);
|
free (contents);
|
else
|
else
|
{
|
{
|
/* Cache the section contents for elf_link_input_bfd. */
|
/* Cache the section contents for elf_link_input_bfd. */
|
elf_section_data (sec)->this_hdr.contents = contents;
|
elf_section_data (sec)->this_hdr.contents = contents;
|
}
|
}
|
}
|
}
|
|
|
if (internal_relocs != NULL
|
if (internal_relocs != NULL
|
&& elf_section_data (sec)->relocs != internal_relocs)
|
&& elf_section_data (sec)->relocs != internal_relocs)
|
free (internal_relocs);
|
free (internal_relocs);
|
|
|
return TRUE;
|
return TRUE;
|
|
|
error_return:
|
error_return:
|
if (isymbuf != NULL
|
if (isymbuf != NULL
|
&& symtab_hdr->contents != (unsigned char *) isymbuf)
|
&& symtab_hdr->contents != (unsigned char *) isymbuf)
|
free (isymbuf);
|
free (isymbuf);
|
if (contents != NULL
|
if (contents != NULL
|
&& elf_section_data (sec)->this_hdr.contents != contents)
|
&& elf_section_data (sec)->this_hdr.contents != contents)
|
free (contents);
|
free (contents);
|
if (internal_relocs != NULL
|
if (internal_relocs != NULL
|
&& elf_section_data (sec)->relocs != internal_relocs)
|
&& elf_section_data (sec)->relocs != internal_relocs)
|
free (internal_relocs);
|
free (internal_relocs);
|
return FALSE;
|
return FALSE;
|
}
|
}
|
|
|
/* Set the howto pointer for a IP2K ELF reloc. */
|
/* Set the howto pointer for a IP2K ELF reloc. */
|
|
|
static void
|
static void
|
ip2k_info_to_howto_rela (bfd * abfd ATTRIBUTE_UNUSED,
|
ip2k_info_to_howto_rela (bfd * abfd ATTRIBUTE_UNUSED,
|
arelent * cache_ptr,
|
arelent * cache_ptr,
|
Elf_Internal_Rela * dst)
|
Elf_Internal_Rela * dst)
|
{
|
{
|
unsigned int r_type;
|
unsigned int r_type;
|
|
|
r_type = ELF32_R_TYPE (dst->r_info);
|
r_type = ELF32_R_TYPE (dst->r_info);
|
cache_ptr->howto = & ip2k_elf_howto_table [r_type];
|
cache_ptr->howto = & ip2k_elf_howto_table [r_type];
|
}
|
}
|
|
|
/* Perform a single relocation.
|
/* Perform a single relocation.
|
By default we use the standard BFD routines. */
|
By default we use the standard BFD routines. */
|
|
|
static bfd_reloc_status_type
|
static bfd_reloc_status_type
|
ip2k_final_link_relocate (reloc_howto_type * howto,
|
ip2k_final_link_relocate (reloc_howto_type * howto,
|
bfd * input_bfd,
|
bfd * input_bfd,
|
asection * input_section,
|
asection * input_section,
|
bfd_byte * contents,
|
bfd_byte * contents,
|
Elf_Internal_Rela * rel,
|
Elf_Internal_Rela * rel,
|
bfd_vma relocation)
|
bfd_vma relocation)
|
{
|
{
|
static bfd_vma page_addr = 0;
|
static bfd_vma page_addr = 0;
|
|
|
bfd_reloc_status_type r = bfd_reloc_ok;
|
bfd_reloc_status_type r = bfd_reloc_ok;
|
switch (howto->type)
|
switch (howto->type)
|
{
|
{
|
/* Handle data space relocations. */
|
/* Handle data space relocations. */
|
case R_IP2K_FR9:
|
case R_IP2K_FR9:
|
case R_IP2K_BANK:
|
case R_IP2K_BANK:
|
if ((relocation & IP2K_DATA_MASK) == IP2K_DATA_VALUE)
|
if ((relocation & IP2K_DATA_MASK) == IP2K_DATA_VALUE)
|
relocation &= ~IP2K_DATA_MASK;
|
relocation &= ~IP2K_DATA_MASK;
|
else
|
else
|
r = bfd_reloc_notsupported;
|
r = bfd_reloc_notsupported;
|
break;
|
break;
|
|
|
case R_IP2K_LO8DATA:
|
case R_IP2K_LO8DATA:
|
case R_IP2K_HI8DATA:
|
case R_IP2K_HI8DATA:
|
case R_IP2K_EX8DATA:
|
case R_IP2K_EX8DATA:
|
break;
|
break;
|
|
|
/* Handle insn space relocations. */
|
/* Handle insn space relocations. */
|
case R_IP2K_PAGE3:
|
case R_IP2K_PAGE3:
|
page_addr = BASEADDR (input_section) + rel->r_offset;
|
page_addr = BASEADDR (input_section) + rel->r_offset;
|
if ((relocation & IP2K_INSN_MASK) == IP2K_INSN_VALUE)
|
if ((relocation & IP2K_INSN_MASK) == IP2K_INSN_VALUE)
|
relocation &= ~IP2K_INSN_MASK;
|
relocation &= ~IP2K_INSN_MASK;
|
else
|
else
|
r = bfd_reloc_notsupported;
|
r = bfd_reloc_notsupported;
|
break;
|
break;
|
|
|
case R_IP2K_ADDR16CJP:
|
case R_IP2K_ADDR16CJP:
|
if (BASEADDR (input_section) + rel->r_offset != page_addr + 2)
|
if (BASEADDR (input_section) + rel->r_offset != page_addr + 2)
|
{
|
{
|
/* No preceding page instruction, verify that it isn't needed. */
|
/* No preceding page instruction, verify that it isn't needed. */
|
if (PAGENO (relocation + rel->r_addend) !=
|
if (PAGENO (relocation + rel->r_addend) !=
|
ip2k_nominal_page_bits (input_bfd, input_section,
|
ip2k_nominal_page_bits (input_bfd, input_section,
|
rel->r_offset, contents))
|
rel->r_offset, contents))
|
_bfd_error_handler (_("ip2k linker: missing page instruction at 0x%08lx (dest = 0x%08lx)."),
|
_bfd_error_handler (_("ip2k linker: missing page instruction at 0x%08lx (dest = 0x%08lx)."),
|
BASEADDR (input_section) + rel->r_offset,
|
BASEADDR (input_section) + rel->r_offset,
|
relocation + rel->r_addend);
|
relocation + rel->r_addend);
|
}
|
}
|
else if (ip2k_relaxed)
|
else if (ip2k_relaxed)
|
{
|
{
|
/* Preceding page instruction. Verify that the page instruction is
|
/* Preceding page instruction. Verify that the page instruction is
|
really needed. One reason for the relaxation to miss a page is if
|
really needed. One reason for the relaxation to miss a page is if
|
the section is not marked as executable. */
|
the section is not marked as executable. */
|
if (!ip2k_is_switch_table_128 (input_bfd, input_section,
|
if (!ip2k_is_switch_table_128 (input_bfd, input_section,
|
rel->r_offset - 2, contents)
|
rel->r_offset - 2, contents)
|
&& !ip2k_is_switch_table_256 (input_bfd, input_section,
|
&& !ip2k_is_switch_table_256 (input_bfd, input_section,
|
rel->r_offset - 2, contents)
|
rel->r_offset - 2, contents)
|
&& (PAGENO (relocation + rel->r_addend) ==
|
&& (PAGENO (relocation + rel->r_addend) ==
|
ip2k_nominal_page_bits (input_bfd, input_section,
|
ip2k_nominal_page_bits (input_bfd, input_section,
|
rel->r_offset - 2, contents)))
|
rel->r_offset - 2, contents)))
|
_bfd_error_handler (_("ip2k linker: redundant page instruction at 0x%08lx (dest = 0x%08lx)."),
|
_bfd_error_handler (_("ip2k linker: redundant page instruction at 0x%08lx (dest = 0x%08lx)."),
|
page_addr,
|
page_addr,
|
relocation + rel->r_addend);
|
relocation + rel->r_addend);
|
}
|
}
|
if ((relocation & IP2K_INSN_MASK) == IP2K_INSN_VALUE)
|
if ((relocation & IP2K_INSN_MASK) == IP2K_INSN_VALUE)
|
relocation &= ~IP2K_INSN_MASK;
|
relocation &= ~IP2K_INSN_MASK;
|
else
|
else
|
r = bfd_reloc_notsupported;
|
r = bfd_reloc_notsupported;
|
break;
|
break;
|
|
|
case R_IP2K_LO8INSN:
|
case R_IP2K_LO8INSN:
|
case R_IP2K_HI8INSN:
|
case R_IP2K_HI8INSN:
|
case R_IP2K_PC_SKIP:
|
case R_IP2K_PC_SKIP:
|
if ((relocation & IP2K_INSN_MASK) == IP2K_INSN_VALUE)
|
if ((relocation & IP2K_INSN_MASK) == IP2K_INSN_VALUE)
|
relocation &= ~IP2K_INSN_MASK;
|
relocation &= ~IP2K_INSN_MASK;
|
else
|
else
|
r = bfd_reloc_notsupported;
|
r = bfd_reloc_notsupported;
|
break;
|
break;
|
|
|
case R_IP2K_16:
|
case R_IP2K_16:
|
/* If this is a relocation involving a TEXT
|
/* If this is a relocation involving a TEXT
|
symbol, reduce it to a word address. */
|
symbol, reduce it to a word address. */
|
if ((relocation & IP2K_INSN_MASK) == IP2K_INSN_VALUE)
|
if ((relocation & IP2K_INSN_MASK) == IP2K_INSN_VALUE)
|
howto = &ip2k_elf_howto_table[ (int) R_IP2K_TEXT];
|
howto = &ip2k_elf_howto_table[ (int) R_IP2K_TEXT];
|
break;
|
break;
|
|
|
/* Pass others through. */
|
/* Pass others through. */
|
default:
|
default:
|
break;
|
break;
|
}
|
}
|
|
|
/* Only install relocation if above tests did not disqualify it. */
|
/* Only install relocation if above tests did not disqualify it. */
|
if (r == bfd_reloc_ok)
|
if (r == bfd_reloc_ok)
|
r = _bfd_final_link_relocate (howto, input_bfd, input_section,
|
r = _bfd_final_link_relocate (howto, input_bfd, input_section,
|
contents, rel->r_offset,
|
contents, rel->r_offset,
|
relocation, rel->r_addend);
|
relocation, rel->r_addend);
|
|
|
return r;
|
return r;
|
}
|
}
|
|
|
/* Relocate a IP2K ELF section.
|
/* Relocate a IP2K ELF section.
|
|
|
The RELOCATE_SECTION function is called by the new ELF backend linker
|
The RELOCATE_SECTION function is called by the new ELF backend linker
|
to handle the relocations for a section.
|
to handle the relocations for a section.
|
|
|
The relocs are always passed as Rela structures; if the section
|
The relocs are always passed as Rela structures; if the section
|
actually uses Rel structures, the r_addend field will always be
|
actually uses Rel structures, the r_addend field will always be
|
zero.
|
zero.
|
|
|
This function is responsible for adjusting the section contents as
|
This function is responsible for adjusting the section contents as
|
necessary, and (if using Rela relocs and generating a relocatable
|
necessary, and (if using Rela relocs and generating a relocatable
|
output file) adjusting the reloc addend as necessary.
|
output file) adjusting the reloc addend as necessary.
|
|
|
This function does not have to worry about setting the reloc
|
This function does not have to worry about setting the reloc
|
address or the reloc symbol index.
|
address or the reloc symbol index.
|
|
|
LOCAL_SYMS is a pointer to the swapped in local symbols.
|
LOCAL_SYMS is a pointer to the swapped in local symbols.
|
|
|
LOCAL_SECTIONS is an array giving the section in the input file
|
LOCAL_SECTIONS is an array giving the section in the input file
|
corresponding to the st_shndx field of each local symbol.
|
corresponding to the st_shndx field of each local symbol.
|
|
|
The global hash table entry for the global symbols can be found
|
The global hash table entry for the global symbols can be found
|
via elf_sym_hashes (input_bfd).
|
via elf_sym_hashes (input_bfd).
|
|
|
When generating relocatable output, this function must handle
|
When generating relocatable output, this function must handle
|
STB_LOCAL/STT_SECTION symbols specially. The output symbol is
|
STB_LOCAL/STT_SECTION symbols specially. The output symbol is
|
going to be the section symbol corresponding to the output
|
going to be the section symbol corresponding to the output
|
section, which means that the addend must be adjusted
|
section, which means that the addend must be adjusted
|
accordingly. */
|
accordingly. */
|
|
|
static bfd_boolean
|
static bfd_boolean
|
ip2k_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED,
|
ip2k_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED,
|
struct bfd_link_info *info,
|
struct bfd_link_info *info,
|
bfd *input_bfd,
|
bfd *input_bfd,
|
asection *input_section,
|
asection *input_section,
|
bfd_byte *contents,
|
bfd_byte *contents,
|
Elf_Internal_Rela *relocs,
|
Elf_Internal_Rela *relocs,
|
Elf_Internal_Sym *local_syms,
|
Elf_Internal_Sym *local_syms,
|
asection **local_sections)
|
asection **local_sections)
|
{
|
{
|
Elf_Internal_Shdr *symtab_hdr;
|
Elf_Internal_Shdr *symtab_hdr;
|
struct elf_link_hash_entry **sym_hashes;
|
struct elf_link_hash_entry **sym_hashes;
|
Elf_Internal_Rela *rel;
|
Elf_Internal_Rela *rel;
|
Elf_Internal_Rela *relend;
|
Elf_Internal_Rela *relend;
|
|
|
symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
|
symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
|
sym_hashes = elf_sym_hashes (input_bfd);
|
sym_hashes = elf_sym_hashes (input_bfd);
|
relend = relocs + input_section->reloc_count;
|
relend = relocs + input_section->reloc_count;
|
|
|
for (rel = relocs; rel < relend; rel ++)
|
for (rel = relocs; rel < relend; rel ++)
|
{
|
{
|
reloc_howto_type * howto;
|
reloc_howto_type * howto;
|
unsigned long r_symndx;
|
unsigned long r_symndx;
|
Elf_Internal_Sym * sym;
|
Elf_Internal_Sym * sym;
|
asection * sec;
|
asection * sec;
|
struct elf_link_hash_entry * h;
|
struct elf_link_hash_entry * h;
|
bfd_vma relocation;
|
bfd_vma relocation;
|
bfd_reloc_status_type r;
|
bfd_reloc_status_type r;
|
const char * name = NULL;
|
const char * name = NULL;
|
int r_type;
|
int r_type;
|
|
|
r_type = ELF32_R_TYPE (rel->r_info);
|
r_type = ELF32_R_TYPE (rel->r_info);
|
r_symndx = ELF32_R_SYM (rel->r_info);
|
r_symndx = ELF32_R_SYM (rel->r_info);
|
howto = ip2k_elf_howto_table + ELF32_R_TYPE (rel->r_info);
|
howto = ip2k_elf_howto_table + ELF32_R_TYPE (rel->r_info);
|
h = NULL;
|
h = NULL;
|
sym = NULL;
|
sym = NULL;
|
sec = NULL;
|
sec = NULL;
|
|
|
if (r_symndx < symtab_hdr->sh_info)
|
if (r_symndx < symtab_hdr->sh_info)
|
{
|
{
|
sym = local_syms + r_symndx;
|
sym = local_syms + r_symndx;
|
sec = local_sections [r_symndx];
|
sec = local_sections [r_symndx];
|
relocation = BASEADDR (sec) + sym->st_value;
|
relocation = BASEADDR (sec) + sym->st_value;
|
|
|
name = bfd_elf_string_from_elf_section
|
name = bfd_elf_string_from_elf_section
|
(input_bfd, symtab_hdr->sh_link, sym->st_name);
|
(input_bfd, symtab_hdr->sh_link, sym->st_name);
|
name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name;
|
name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name;
|
}
|
}
|
else
|
else
|
{
|
{
|
bfd_boolean warned;
|
bfd_boolean warned;
|
bfd_boolean unresolved_reloc;
|
bfd_boolean unresolved_reloc;
|
|
|
RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
|
RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
|
r_symndx, symtab_hdr, sym_hashes,
|
r_symndx, symtab_hdr, sym_hashes,
|
h, sec, relocation,
|
h, sec, relocation,
|
unresolved_reloc, warned);
|
unresolved_reloc, warned);
|
|
|
name = h->root.root.string;
|
name = h->root.root.string;
|
}
|
}
|
|
|
if (sec != NULL && elf_discarded_section (sec))
|
if (sec != NULL && elf_discarded_section (sec))
|
{
|
{
|
/* For relocs against symbols from removed linkonce sections,
|
/* For relocs against symbols from removed linkonce sections,
|
or sections discarded by a linker script, we just want the
|
or sections discarded by a linker script, we just want the
|
section contents zeroed. Avoid any special processing. */
|
section contents zeroed. Avoid any special processing. */
|
_bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
|
_bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
|
rel->r_info = 0;
|
rel->r_info = 0;
|
rel->r_addend = 0;
|
rel->r_addend = 0;
|
continue;
|
continue;
|
}
|
}
|
|
|
if (info->relocatable)
|
if (info->relocatable)
|
continue;
|
continue;
|
|
|
/* Finally, the sole IP2K-specific part. */
|
/* Finally, the sole IP2K-specific part. */
|
r = ip2k_final_link_relocate (howto, input_bfd, input_section,
|
r = ip2k_final_link_relocate (howto, input_bfd, input_section,
|
contents, rel, relocation);
|
contents, rel, relocation);
|
|
|
if (r != bfd_reloc_ok)
|
if (r != bfd_reloc_ok)
|
{
|
{
|
const char * msg = NULL;
|
const char * msg = NULL;
|
|
|
switch (r)
|
switch (r)
|
{
|
{
|
case bfd_reloc_overflow:
|
case bfd_reloc_overflow:
|
r = info->callbacks->reloc_overflow
|
r = info->callbacks->reloc_overflow
|
(info, (h ? &h->root : NULL), name, howto->name,
|
(info, (h ? &h->root : NULL), name, howto->name,
|
(bfd_vma) 0, input_bfd, input_section, rel->r_offset);
|
(bfd_vma) 0, input_bfd, input_section, rel->r_offset);
|
break;
|
break;
|
|
|
case bfd_reloc_undefined:
|
case bfd_reloc_undefined:
|
r = info->callbacks->undefined_symbol
|
r = info->callbacks->undefined_symbol
|
(info, name, input_bfd, input_section, rel->r_offset, TRUE);
|
(info, name, input_bfd, input_section, rel->r_offset, TRUE);
|
break;
|
break;
|
|
|
case bfd_reloc_outofrange:
|
case bfd_reloc_outofrange:
|
msg = _("internal error: out of range error");
|
msg = _("internal error: out of range error");
|
break;
|
break;
|
|
|
/* This is how ip2k_final_link_relocate tells us of a non-kosher
|
/* This is how ip2k_final_link_relocate tells us of a non-kosher
|
reference between insn & data address spaces. */
|
reference between insn & data address spaces. */
|
case bfd_reloc_notsupported:
|
case bfd_reloc_notsupported:
|
if (sym != NULL) /* Only if it's not an unresolved symbol. */
|
if (sym != NULL) /* Only if it's not an unresolved symbol. */
|
msg = _("unsupported relocation between data/insn address spaces");
|
msg = _("unsupported relocation between data/insn address spaces");
|
break;
|
break;
|
|
|
case bfd_reloc_dangerous:
|
case bfd_reloc_dangerous:
|
msg = _("internal error: dangerous relocation");
|
msg = _("internal error: dangerous relocation");
|
break;
|
break;
|
|
|
default:
|
default:
|
msg = _("internal error: unknown error");
|
msg = _("internal error: unknown error");
|
break;
|
break;
|
}
|
}
|
|
|
if (msg)
|
if (msg)
|
r = info->callbacks->warning
|
r = info->callbacks->warning
|
(info, msg, name, input_bfd, input_section, rel->r_offset);
|
(info, msg, name, input_bfd, input_section, rel->r_offset);
|
|
|
if (! r)
|
if (! r)
|
return FALSE;
|
return FALSE;
|
}
|
}
|
}
|
}
|
|
|
return TRUE;
|
return TRUE;
|
}
|
}
|
|
|
#define TARGET_BIG_SYM bfd_elf32_ip2k_vec
|
#define TARGET_BIG_SYM bfd_elf32_ip2k_vec
|
#define TARGET_BIG_NAME "elf32-ip2k"
|
#define TARGET_BIG_NAME "elf32-ip2k"
|
|
|
#define ELF_ARCH bfd_arch_ip2k
|
#define ELF_ARCH bfd_arch_ip2k
|
#define ELF_MACHINE_CODE EM_IP2K
|
#define ELF_MACHINE_CODE EM_IP2K
|
#define ELF_MACHINE_ALT1 EM_IP2K_OLD
|
#define ELF_MACHINE_ALT1 EM_IP2K_OLD
|
#define ELF_MAXPAGESIZE 1 /* No pages on the IP2K. */
|
#define ELF_MAXPAGESIZE 1 /* No pages on the IP2K. */
|
|
|
#define elf_info_to_howto_rel NULL
|
#define elf_info_to_howto_rel NULL
|
#define elf_info_to_howto ip2k_info_to_howto_rela
|
#define elf_info_to_howto ip2k_info_to_howto_rela
|
|
|
#define elf_backend_can_gc_sections 1
|
#define elf_backend_can_gc_sections 1
|
#define elf_backend_rela_normal 1
|
#define elf_backend_rela_normal 1
|
#define elf_backend_relocate_section ip2k_elf_relocate_section
|
#define elf_backend_relocate_section ip2k_elf_relocate_section
|
|
|
#define elf_symbol_leading_char '_'
|
#define elf_symbol_leading_char '_'
|
#define bfd_elf32_bfd_reloc_type_lookup ip2k_reloc_type_lookup
|
#define bfd_elf32_bfd_reloc_type_lookup ip2k_reloc_type_lookup
|
#define bfd_elf32_bfd_reloc_name_lookup ip2k_reloc_name_lookup
|
#define bfd_elf32_bfd_reloc_name_lookup ip2k_reloc_name_lookup
|
#define bfd_elf32_bfd_relax_section ip2k_elf_relax_section
|
#define bfd_elf32_bfd_relax_section ip2k_elf_relax_section
|
|
|
#include "elf32-target.h"
|
#include "elf32-target.h"
|
|
|