aboutsummaryrefslogtreecommitdiff
path: root/bfd/elf32-m68k.c
diff options
context:
space:
mode:
Diffstat (limited to 'bfd/elf32-m68k.c')
-rw-r--r--bfd/elf32-m68k.c454
1 files changed, 227 insertions, 227 deletions
diff --git a/bfd/elf32-m68k.c b/bfd/elf32-m68k.c
index edbc3e9..3b4565c 100644
--- a/bfd/elf32-m68k.c
+++ b/bfd/elf32-m68k.c
@@ -28,322 +28,322 @@
#include "cpu-m68k.h"
#include "elf32-m68k.h"
-static bfd_boolean
+static bool
elf_m68k_discard_copies (struct elf_link_hash_entry *, void *);
static reloc_howto_type howto_table[] =
{
- HOWTO(R_68K_NONE, 0, 3, 0, FALSE,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_NONE", FALSE, 0, 0x00000000,FALSE),
- HOWTO(R_68K_32, 0, 2,32, FALSE,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_32", FALSE, 0, 0xffffffff,FALSE),
- HOWTO(R_68K_16, 0, 1,16, FALSE,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_16", FALSE, 0, 0x0000ffff,FALSE),
- HOWTO(R_68K_8, 0, 0, 8, FALSE,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_8", FALSE, 0, 0x000000ff,FALSE),
- HOWTO(R_68K_PC32, 0, 2,32, TRUE, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PC32", FALSE, 0, 0xffffffff,TRUE),
- HOWTO(R_68K_PC16, 0, 1,16, TRUE, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PC16", FALSE, 0, 0x0000ffff,TRUE),
- HOWTO(R_68K_PC8, 0, 0, 8, TRUE, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PC8", FALSE, 0, 0x000000ff,TRUE),
- HOWTO(R_68K_GOT32, 0, 2,32, TRUE, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_GOT32", FALSE, 0, 0xffffffff,TRUE),
- HOWTO(R_68K_GOT16, 0, 1,16, TRUE, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT16", FALSE, 0, 0x0000ffff,TRUE),
- HOWTO(R_68K_GOT8, 0, 0, 8, TRUE, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT8", FALSE, 0, 0x000000ff,TRUE),
- HOWTO(R_68K_GOT32O, 0, 2,32, FALSE,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_GOT32O", FALSE, 0, 0xffffffff,FALSE),
- HOWTO(R_68K_GOT16O, 0, 1,16, FALSE,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT16O", FALSE, 0, 0x0000ffff,FALSE),
- HOWTO(R_68K_GOT8O, 0, 0, 8, FALSE,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT8O", FALSE, 0, 0x000000ff,FALSE),
- HOWTO(R_68K_PLT32, 0, 2,32, TRUE, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PLT32", FALSE, 0, 0xffffffff,TRUE),
- HOWTO(R_68K_PLT16, 0, 1,16, TRUE, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT16", FALSE, 0, 0x0000ffff,TRUE),
- HOWTO(R_68K_PLT8, 0, 0, 8, TRUE, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT8", FALSE, 0, 0x000000ff,TRUE),
- HOWTO(R_68K_PLT32O, 0, 2,32, FALSE,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PLT32O", FALSE, 0, 0xffffffff,FALSE),
- HOWTO(R_68K_PLT16O, 0, 1,16, FALSE,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT16O", FALSE, 0, 0x0000ffff,FALSE),
- HOWTO(R_68K_PLT8O, 0, 0, 8, FALSE,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT8O", FALSE, 0, 0x000000ff,FALSE),
- HOWTO(R_68K_COPY, 0, 0, 0, FALSE,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_COPY", FALSE, 0, 0xffffffff,FALSE),
- HOWTO(R_68K_GLOB_DAT, 0, 2,32, FALSE,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_GLOB_DAT", FALSE, 0, 0xffffffff,FALSE),
- HOWTO(R_68K_JMP_SLOT, 0, 2,32, FALSE,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_JMP_SLOT", FALSE, 0, 0xffffffff,FALSE),
- HOWTO(R_68K_RELATIVE, 0, 2,32, FALSE,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_RELATIVE", FALSE, 0, 0xffffffff,FALSE),
+ HOWTO(R_68K_NONE, 0, 3, 0, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_NONE", false, 0, 0x00000000,false),
+ HOWTO(R_68K_32, 0, 2,32, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_32", false, 0, 0xffffffff,false),
+ HOWTO(R_68K_16, 0, 1,16, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_16", false, 0, 0x0000ffff,false),
+ HOWTO(R_68K_8, 0, 0, 8, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_8", false, 0, 0x000000ff,false),
+ HOWTO(R_68K_PC32, 0, 2,32, true, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PC32", false, 0, 0xffffffff,true),
+ HOWTO(R_68K_PC16, 0, 1,16, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PC16", false, 0, 0x0000ffff,true),
+ HOWTO(R_68K_PC8, 0, 0, 8, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PC8", false, 0, 0x000000ff,true),
+ HOWTO(R_68K_GOT32, 0, 2,32, true, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_GOT32", false, 0, 0xffffffff,true),
+ HOWTO(R_68K_GOT16, 0, 1,16, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT16", false, 0, 0x0000ffff,true),
+ HOWTO(R_68K_GOT8, 0, 0, 8, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT8", false, 0, 0x000000ff,true),
+ HOWTO(R_68K_GOT32O, 0, 2,32, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_GOT32O", false, 0, 0xffffffff,false),
+ HOWTO(R_68K_GOT16O, 0, 1,16, false,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT16O", false, 0, 0x0000ffff,false),
+ HOWTO(R_68K_GOT8O, 0, 0, 8, false,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT8O", false, 0, 0x000000ff,false),
+ HOWTO(R_68K_PLT32, 0, 2,32, true, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PLT32", false, 0, 0xffffffff,true),
+ HOWTO(R_68K_PLT16, 0, 1,16, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT16", false, 0, 0x0000ffff,true),
+ HOWTO(R_68K_PLT8, 0, 0, 8, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT8", false, 0, 0x000000ff,true),
+ HOWTO(R_68K_PLT32O, 0, 2,32, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PLT32O", false, 0, 0xffffffff,false),
+ HOWTO(R_68K_PLT16O, 0, 1,16, false,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT16O", false, 0, 0x0000ffff,false),
+ HOWTO(R_68K_PLT8O, 0, 0, 8, false,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT8O", false, 0, 0x000000ff,false),
+ HOWTO(R_68K_COPY, 0, 0, 0, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_COPY", false, 0, 0xffffffff,false),
+ HOWTO(R_68K_GLOB_DAT, 0, 2,32, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_GLOB_DAT", false, 0, 0xffffffff,false),
+ HOWTO(R_68K_JMP_SLOT, 0, 2,32, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_JMP_SLOT", false, 0, 0xffffffff,false),
+ HOWTO(R_68K_RELATIVE, 0, 2,32, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_RELATIVE", false, 0, 0xffffffff,false),
/* GNU extension to record C++ vtable hierarchy. */
HOWTO (R_68K_GNU_VTINHERIT, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
0, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_dont, /* complain_on_overflow */
NULL, /* special_function */
"R_68K_GNU_VTINHERIT", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0, /* dst_mask */
- FALSE),
+ false),
/* GNU extension to record C++ vtable member usage. */
HOWTO (R_68K_GNU_VTENTRY, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
0, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_dont, /* complain_on_overflow */
_bfd_elf_rel_vtable_reloc_fn, /* special_function */
"R_68K_GNU_VTENTRY", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0, /* dst_mask */
- FALSE),
+ false),
/* TLS general dynamic variable reference. */
HOWTO (R_68K_TLS_GD32, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
32, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_bitfield, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_GD32", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0xffffffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_GD16, /* type */
0, /* rightshift */
1, /* size (0 = byte, 1 = short, 2 = long) */
16, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_GD16", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x0000ffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_GD8, /* type */
0, /* rightshift */
0, /* size (0 = byte, 1 = short, 2 = long) */
8, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_GD8", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x000000ff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
/* TLS local dynamic variable reference. */
HOWTO (R_68K_TLS_LDM32, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
32, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_bitfield, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LDM32", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0xffffffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_LDM16, /* type */
0, /* rightshift */
1, /* size (0 = byte, 1 = short, 2 = long) */
16, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LDM16", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x0000ffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_LDM8, /* type */
0, /* rightshift */
0, /* size (0 = byte, 1 = short, 2 = long) */
8, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LDM8", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x000000ff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_LDO32, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
32, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_bitfield, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LDO32", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0xffffffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_LDO16, /* type */
0, /* rightshift */
1, /* size (0 = byte, 1 = short, 2 = long) */
16, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LDO16", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x0000ffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_LDO8, /* type */
0, /* rightshift */
0, /* size (0 = byte, 1 = short, 2 = long) */
8, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LDO8", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x000000ff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
/* TLS initial execution variable reference. */
HOWTO (R_68K_TLS_IE32, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
32, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_bitfield, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_IE32", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0xffffffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_IE16, /* type */
0, /* rightshift */
1, /* size (0 = byte, 1 = short, 2 = long) */
16, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_IE16", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x0000ffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_IE8, /* type */
0, /* rightshift */
0, /* size (0 = byte, 1 = short, 2 = long) */
8, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_IE8", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x000000ff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
/* TLS local execution variable reference. */
HOWTO (R_68K_TLS_LE32, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
32, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_bitfield, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LE32", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0xffffffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_LE16, /* type */
0, /* rightshift */
1, /* size (0 = byte, 1 = short, 2 = long) */
16, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LE16", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x0000ffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_LE8, /* type */
0, /* rightshift */
0, /* size (0 = byte, 1 = short, 2 = long) */
8, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_signed, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_LE8", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0x000000ff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
/* TLS GD/LD dynamic relocations. */
HOWTO (R_68K_TLS_DTPMOD32, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
32, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_dont, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_DTPMOD32", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0xffffffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_DTPREL32, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
32, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_dont, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_DTPREL32", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0xffffffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
HOWTO (R_68K_TLS_TPREL32, /* type */
0, /* rightshift */
2, /* size (0 = byte, 1 = short, 2 = long) */
32, /* bitsize */
- FALSE, /* pc_relative */
+ false, /* pc_relative */
0, /* bitpos */
complain_overflow_dont, /* complain_on_overflow */
bfd_elf_generic_reloc, /* special_function */
"R_68K_TLS_TPREL32", /* name */
- FALSE, /* partial_inplace */
+ false, /* partial_inplace */
0, /* src_mask */
0xffffffff, /* dst_mask */
- FALSE), /* pcrel_offset */
+ false), /* pcrel_offset */
};
-static bfd_boolean
+static bool
rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
{
unsigned int indx = ELF32_R_TYPE (dst->r_info);
@@ -354,10 +354,10 @@ rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
_bfd_error_handler (_("%pB: unsupported relocation type %#x"),
abfd, indx);
bfd_set_error (bfd_error_bad_value);
- return FALSE;
+ return false;
}
cache_ptr->howto = &howto_table[indx];
- return TRUE;
+ return true;
}
#define elf_info_to_howto rtype_to_howto
@@ -756,7 +756,7 @@ elf_m68k_reloc_got_type (enum elf_m68k_reloc_type r_type)
return R_68K_TLS_IE32;
default:
- BFD_ASSERT (FALSE);
+ BFD_ASSERT (false);
return 0;
}
}
@@ -782,7 +782,7 @@ elf_m68k_reloc_got_offset_size (enum elf_m68k_reloc_type r_type)
return R_8;
default:
- BFD_ASSERT (FALSE);
+ BFD_ASSERT (false);
return 0;
}
}
@@ -804,14 +804,14 @@ elf_m68k_reloc_got_n_slots (enum elf_m68k_reloc_type r_type)
return 2;
default:
- BFD_ASSERT (FALSE);
+ BFD_ASSERT (false);
return 0;
}
}
/* Return TRUE if relocation R_TYPE is a TLS one. */
-static bfd_boolean
+static bool
elf_m68k_reloc_tls_p (enum elf_m68k_reloc_type r_type)
{
switch (r_type)
@@ -822,10 +822,10 @@ elf_m68k_reloc_tls_p (enum elf_m68k_reloc_type r_type)
case R_68K_TLS_IE32: case R_68K_TLS_IE16: case R_68K_TLS_IE8:
case R_68K_TLS_LE32: case R_68K_TLS_LE16: case R_68K_TLS_LE8:
case R_68K_TLS_DTPMOD32: case R_68K_TLS_DTPREL32: case R_68K_TLS_TPREL32:
- return TRUE;
+ return true;
default:
- return FALSE;
+ return false;
}
}
@@ -895,13 +895,13 @@ struct elf_m68k_link_hash_table
/* True, if GP is loaded within each function which uses it.
Set to TRUE when GOT negative offsets or multi-GOT is enabled. */
- bfd_boolean local_gp_p;
+ bool local_gp_p;
/* Switch controlling use of negative offsets to double the size of GOTs. */
- bfd_boolean use_neg_got_offsets_p;
+ bool use_neg_got_offsets_p;
/* Switch controlling generation of multiple GOTs. */
- bfd_boolean allow_multigot_p;
+ bool allow_multigot_p;
/* Multi-GOT data structure. */
struct elf_m68k_multi_got multi_got_;
@@ -992,7 +992,7 @@ elf_m68k_link_hash_table_create (bfd *abfd)
/* Set the right machine number. */
-static bfd_boolean
+static bool
elf32_m68k_object_p (bfd *abfd)
{
unsigned int mach = 0;
@@ -1047,13 +1047,13 @@ elf32_m68k_object_p (bfd *abfd)
mach = bfd_m68k_features_to_mach (features);
bfd_default_set_arch_mach (abfd, bfd_arch_m68k, mach);
- return TRUE;
+ return true;
}
/* Somewhat reverse of elf32_m68k_object_p, this sets the e_flag
field based on the machine number. */
-static bfd_boolean
+static bool
elf_m68k_final_write_processing (bfd *abfd)
{
int mach = bfd_get_mach (abfd);
@@ -1112,23 +1112,23 @@ elf_m68k_final_write_processing (bfd *abfd)
/* Keep m68k-specific flags in the ELF header. */
-static bfd_boolean
+static bool
elf32_m68k_set_private_flags (bfd *abfd, flagword flags)
{
elf_elfheader (abfd)->e_flags = flags;
- elf_flags_init (abfd) = TRUE;
- return TRUE;
+ elf_flags_init (abfd) = true;
+ return true;
}
/* Merge object attributes from IBFD into OBFD. Warn if
there are conflicting attributes. */
-static bfd_boolean
+static bool
m68k_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
{
bfd *obfd = info->output_bfd;
obj_attribute *in_attr, *in_attrs;
obj_attribute *out_attr, *out_attrs;
- bfd_boolean ret = TRUE;
+ bool ret = true;
in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
@@ -1156,7 +1156,7 @@ m68k_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
/* xgettext:c-format */
(_("%pB uses hard float, %pB uses soft float"),
last_fp, ibfd);
- ret = FALSE;
+ ret = false;
}
else if (out_fp == 2 && in_fp == 1)
{
@@ -1164,7 +1164,7 @@ m68k_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
/* xgettext:c-format */
(_("%pB uses hard float, %pB uses soft float"),
ibfd, last_fp);
- ret = FALSE;
+ ret = false;
}
}
@@ -1172,7 +1172,7 @@ m68k_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
{
out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
bfd_set_error (bfd_error_bad_value);
- return FALSE;
+ return false;
}
/* Merge Tag_compatibility attributes and any common GNU ones. */
@@ -1181,7 +1181,7 @@ m68k_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
/* Merge backend specific data from an object file to the output
object file when linking. */
-static bfd_boolean
+static bool
elf32_m68k_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
{
bfd *obfd = info->output_bfd;
@@ -1195,24 +1195,24 @@ elf32_m68k_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
|| bfd_get_flavour (obfd) != bfd_target_elf_flavour)
/* PR 24523: For non-ELF files do not try to merge any private
data, but also do not prevent the link from succeeding. */
- return TRUE;
+ return true;
/* Get the merged machine. This checks for incompatibility between
Coldfire & non-Coldfire flags, incompability between different
Coldfire ISAs, and incompability between different MAC types. */
- arch_info = bfd_arch_get_compatible (ibfd, obfd, FALSE);
+ arch_info = bfd_arch_get_compatible (ibfd, obfd, false);
if (!arch_info)
- return FALSE;
+ return false;
bfd_set_arch_mach (obfd, bfd_arch_m68k, arch_info->mach);
if (!m68k_elf_merge_obj_attributes (ibfd, info))
- return FALSE;
+ return false;
in_flags = elf_elfheader (ibfd)->e_flags;
if (!elf_flags_init (obfd))
{
- elf_flags_init (obfd) = TRUE;
+ elf_flags_init (obfd) = true;
out_flags = in_flags;
}
else
@@ -1243,12 +1243,12 @@ elf32_m68k_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
}
elf_elfheader (obfd)->e_flags = out_flags;
- return TRUE;
+ return true;
}
/* Display the flags field. */
-static bfd_boolean
+static bool
elf32_m68k_print_private_bfd_data (bfd *abfd, void * ptr)
{
FILE *file = (FILE *) ptr;
@@ -1335,7 +1335,7 @@ elf32_m68k_print_private_bfd_data (bfd *abfd, void * ptr)
fputc ('\n', file);
- return TRUE;
+ return true;
}
/* Multi-GOT support implementation design:
@@ -1881,7 +1881,7 @@ struct elf_m68k_can_merge_gots_arg
struct bfd_link_info *info;
/* Error flag. */
- bfd_boolean error_p;
+ bool error_p;
};
/* Process a single entry from the small GOT to see if it should be added
@@ -1934,7 +1934,7 @@ elf_m68k_can_merge_gots_1 (void **_entry_ptr, void *_arg)
arg->info);
if (entry == NULL)
{
- arg->error_p = TRUE;
+ arg->error_p = true;
return 0;
}
@@ -1949,7 +1949,7 @@ elf_m68k_can_merge_gots_1 (void **_entry_ptr, void *_arg)
in BIG GOT to accumulate information from SMALL.
INFO is the context where memory should be allocated. */
-static bfd_boolean
+static bool
elf_m68k_can_merge_gots (struct elf_m68k_got *big,
const struct elf_m68k_got *small,
struct bfd_link_info *info,
@@ -1962,12 +1962,12 @@ elf_m68k_can_merge_gots (struct elf_m68k_got *big,
arg_.big = big;
arg_.diff = diff;
arg_.info = info;
- arg_.error_p = FALSE;
+ arg_.error_p = false;
htab_traverse_noresize (small->entries, elf_m68k_can_merge_gots_1, &arg_);
if (arg_.error_p)
{
diff->offset = 0;
- return FALSE;
+ return false;
}
/* Check for overflow. */
@@ -1975,9 +1975,9 @@ elf_m68k_can_merge_gots (struct elf_m68k_got *big,
> ELF_M68K_R_8_MAX_N_SLOTS_IN_GOT (info))
|| (big->n_slots[R_16] + arg_.diff->n_slots[R_16]
> ELF_M68K_R_8_16_MAX_N_SLOTS_IN_GOT (info)))
- return FALSE;
+ return false;
- return TRUE;
+ return true;
}
struct elf_m68k_merge_gots_arg
@@ -1989,7 +1989,7 @@ struct elf_m68k_merge_gots_arg
struct bfd_link_info *info;
/* Error flag. */
- bfd_boolean error_p;
+ bool error_p;
};
/* Process a single entry from DIFF got. Add or update corresponding
@@ -2009,7 +2009,7 @@ elf_m68k_merge_gots_1 (void **entry_ptr, void *_arg)
arg->info);
if (to == NULL)
{
- arg->error_p = TRUE;
+ arg->error_p = true;
return 0;
}
@@ -2023,7 +2023,7 @@ elf_m68k_merge_gots_1 (void **entry_ptr, void *_arg)
/* Merge data from DIFF to BIG. INFO is context where memory should be
allocated. */
-static bfd_boolean
+static bool
elf_m68k_merge_gots (struct elf_m68k_got *big,
struct elf_m68k_got *diff,
struct bfd_link_info *info)
@@ -2036,10 +2036,10 @@ elf_m68k_merge_gots (struct elf_m68k_got *big,
/* Merge entries. */
arg_.big = big;
arg_.info = info;
- arg_.error_p = FALSE;
+ arg_.error_p = false;
htab_traverse_noresize (diff->entries, elf_m68k_merge_gots_1, &arg_);
if (arg_.error_p)
- return FALSE;
+ return false;
/* Merge counters. */
big->n_slots[R_8] += diff->n_slots[R_8];
@@ -2062,7 +2062,7 @@ elf_m68k_merge_gots (struct elf_m68k_got *big,
&& (big->n_slots[R_16]
<= ELF_M68K_R_8_16_MAX_N_SLOTS_IN_GOT (info))));
- return TRUE;
+ return true;
}
struct elf_m68k_finalize_got_offsets_arg
@@ -2165,7 +2165,7 @@ elf_m68k_finalize_got_offsets_1 (void **entry_ptr, void *_arg)
static void
elf_m68k_finalize_got_offsets (struct elf_m68k_got *got,
- bfd_boolean use_neg_got_offsets_p,
+ bool use_neg_got_offsets_p,
struct elf_m68k_link_hash_entry **symndx2h,
bfd_vma *final_offset, bfd_vma *n_ldm_entries)
{
@@ -2278,7 +2278,7 @@ struct elf_m68k_partition_multi_got_arg
bfd_vma slots_relas_diff;
/* Error flag. */
- bfd_boolean error_p;
+ bool error_p;
/* Mapping from global symndx to global symbols.
This is used to build lists of got entries for global symbols. */
@@ -2345,7 +2345,7 @@ elf_m68k_partition_multi_got_1 (void **_entry, void *_arg)
if (diff->offset == 0)
/* Offset set to 0 in the diff_ indicates an error. */
{
- arg->error_p = TRUE;
+ arg->error_p = true;
goto final_return;
}
@@ -2369,7 +2369,7 @@ elf_m68k_partition_multi_got_1 (void **_entry, void *_arg)
arg->current_got = elf_m68k_create_empty_got (arg->info);
if (arg->current_got == NULL)
{
- arg->error_p = TRUE;
+ arg->error_p = true;
goto final_return;
}
@@ -2382,7 +2382,7 @@ elf_m68k_partition_multi_got_1 (void **_entry, void *_arg)
{
if (!elf_m68k_merge_gots (arg->current_got, diff, arg->info))
{
- arg->error_p = TRUE;
+ arg->error_p = true;
goto final_return;
}
@@ -2416,7 +2416,7 @@ elf_m68k_partition_multi_got_1 (void **_entry, void *_arg)
/* Helper function to build symndx2h mapping. */
-static bfd_boolean
+static bool
elf_m68k_init_symndx2h_1 (struct elf_link_hash_entry *_h,
void *_arg)
{
@@ -2435,14 +2435,14 @@ elf_m68k_init_symndx2h_1 (struct elf_link_hash_entry *_h,
arg->symndx2h[h->got_entry_key] = h;
}
- return TRUE;
+ return true;
}
/* Merge GOTs of some BFDs, assign offsets to GOT entries and build
lists of GOT entries for global symbols.
Calculate sizes of .got and .rela.got sections. */
-static bfd_boolean
+static bool
elf_m68k_partition_multi_got (struct bfd_link_info *info)
{
struct elf_m68k_multi_got *multi_got;
@@ -2455,7 +2455,7 @@ elf_m68k_partition_multi_got (struct bfd_link_info *info)
arg_.info = info;
arg_.n_slots = 0;
arg_.slots_relas_diff = 0;
- arg_.error_p = FALSE;
+ arg_.error_p = false;
if (multi_got->bfd2got != NULL)
{
@@ -2464,7 +2464,7 @@ elf_m68k_partition_multi_got (struct bfd_link_info *info)
arg_.symndx2h = bfd_zmalloc (multi_got->global_symndx
* sizeof (*arg_.symndx2h));
if (arg_.symndx2h == NULL)
- return FALSE;
+ return false;
elf_link_hash_traverse (elf_hash_table (info),
elf_m68k_init_symndx2h_1, &arg_);
@@ -2478,7 +2478,7 @@ elf_m68k_partition_multi_got (struct bfd_link_info *info)
free (arg_.symndx2h);
arg_.symndx2h = NULL;
- return FALSE;
+ return false;
}
/* Finish up last current_got. */
@@ -2510,7 +2510,7 @@ elf_m68k_partition_multi_got (struct bfd_link_info *info)
else
BFD_ASSERT (multi_got->bfd2got == NULL);
- return TRUE;
+ return true;
}
/* Copy any information related to dynamic linking from a pre-existing
@@ -2558,7 +2558,7 @@ elf_m68k_copy_indirect_symbol (struct bfd_link_info *info,
allocate space in the global offset table or procedure linkage
table. */
-static bfd_boolean
+static bool
elf_m68k_check_relocs (bfd *abfd,
struct bfd_link_info *info,
asection *sec,
@@ -2573,7 +2573,7 @@ elf_m68k_check_relocs (bfd *abfd,
struct elf_m68k_got *got;
if (bfd_link_relocatable (info))
- return TRUE;
+ return true;
dynobj = elf_hash_table (info)->dynobj;
symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
@@ -2643,7 +2643,7 @@ elf_m68k_check_relocs (bfd *abfd,
/* Create the .got section. */
elf_hash_table (info)->dynobj = dynobj = abfd;
if (!_bfd_elf_create_got_section (dynobj, info))
- return FALSE;
+ return false;
}
if (got == NULL)
@@ -2654,7 +2654,7 @@ elf_m68k_check_relocs (bfd *abfd,
= elf_m68k_get_bfd2got_entry (elf_m68k_multi_got (info),
abfd, FIND_OR_CREATE, info);
if (bfd2got_entry == NULL)
- return FALSE;
+ return false;
got = bfd2got_entry->got;
BFD_ASSERT (got != NULL);
@@ -2668,7 +2668,7 @@ elf_m68k_check_relocs (bfd *abfd,
ELF32_R_TYPE (rel->r_info),
r_symndx, info);
if (got_entry == NULL)
- return FALSE;
+ return false;
if (got_entry->u.s1.refcount == 1)
{
@@ -2678,7 +2678,7 @@ elf_m68k_check_relocs (bfd *abfd,
&& !h->forced_local)
{
if (!bfd_elf_link_record_dynamic_symbol (info, h))
- return FALSE;
+ return false;
}
}
}
@@ -2715,7 +2715,7 @@ elf_m68k_check_relocs (bfd *abfd,
local symbol. FIXME: does it? How to handle it if
it does make sense? */
bfd_set_error (bfd_error_bad_value);
- return FALSE;
+ return false;
}
/* Make sure this symbol is output as a dynamic symbol. */
@@ -2723,7 +2723,7 @@ elf_m68k_check_relocs (bfd *abfd,
&& !h->forced_local)
{
if (!bfd_elf_link_record_dynamic_symbol (info, h))
- return FALSE;
+ return false;
}
h->needs_plt = 1;
@@ -2791,10 +2791,10 @@ elf_m68k_check_relocs (bfd *abfd,
if (sreloc == NULL)
{
sreloc = _bfd_elf_make_dynamic_reloc_section
- (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
+ (sec, dynobj, 2, abfd, /*rela?*/ true);
if (sreloc == NULL)
- return FALSE;
+ return false;
}
if (sec->flags & SEC_READONLY
@@ -2837,7 +2837,7 @@ elf_m68k_check_relocs (bfd *abfd,
isym = bfd_sym_from_r_symndx (&elf_m68k_hash_table (info)->root.sym_cache,
abfd, r_symndx);
if (isym == NULL)
- return FALSE;
+ return false;
s = bfd_section_from_elf_index (abfd, isym->st_shndx);
if (s == NULL)
@@ -2856,7 +2856,7 @@ elf_m68k_check_relocs (bfd *abfd,
p = ((struct elf_m68k_pcrel_relocs_copied *)
bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
if (p == NULL)
- return FALSE;
+ return false;
p->next = *head;
*head = p;
p->section = sreloc;
@@ -2873,14 +2873,14 @@ elf_m68k_check_relocs (bfd *abfd,
Reconstruct it for later use during GC. */
case R_68K_GNU_VTINHERIT:
if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
- return FALSE;
+ return false;
break;
/* This relocation describes which C++ vtable entries are actually
used. Record for later use during GC. */
case R_68K_GNU_VTENTRY:
if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
- return FALSE;
+ return false;
break;
default:
@@ -2888,7 +2888,7 @@ elf_m68k_check_relocs (bfd *abfd,
}
}
- return TRUE;
+ return true;
}
/* Return the section that should be marked against GC for a given
@@ -2933,16 +2933,16 @@ elf_m68k_get_plt_info (bfd *output_bfd)
and the input sections have been assigned to output sections.
It's a convenient place to determine the PLT style. */
-static bfd_boolean
+static bool
elf_m68k_always_size_sections (bfd *output_bfd, struct bfd_link_info *info)
{
/* Bind input BFDs to GOTs and calculate sizes of .got and .rela.got
sections. */
if (!elf_m68k_partition_multi_got (info))
- return FALSE;
+ return false;
elf_m68k_hash_table (info)->plt_info = elf_m68k_get_plt_info (output_bfd);
- return TRUE;
+ return true;
}
/* Adjust a symbol defined by a dynamic object and referenced by a
@@ -2951,7 +2951,7 @@ elf_m68k_always_size_sections (bfd *output_bfd, struct bfd_link_info *info)
change the definition to something the rest of the link can
understand. */
-static bfd_boolean
+static bool
elf_m68k_adjust_dynamic_symbol (struct bfd_link_info *info,
struct elf_link_hash_entry *h)
{
@@ -2993,7 +2993,7 @@ elf_m68k_adjust_dynamic_symbol (struct bfd_link_info *info,
linkage table, and we can just do a PCxx reloc instead. */
h->plt.offset = (bfd_vma) -1;
h->needs_plt = 0;
- return TRUE;
+ return true;
}
/* Make sure this symbol is output as a dynamic symbol. */
@@ -3001,7 +3001,7 @@ elf_m68k_adjust_dynamic_symbol (struct bfd_link_info *info,
&& !h->forced_local)
{
if (! bfd_elf_link_record_dynamic_symbol (info, h))
- return FALSE;
+ return false;
}
s = htab->root.splt;
@@ -3040,7 +3040,7 @@ elf_m68k_adjust_dynamic_symbol (struct bfd_link_info *info,
BFD_ASSERT (s != NULL);
s->size += sizeof (Elf32_External_Rela);
- return TRUE;
+ return true;
}
/* Reinitialize the plt offset now that it is not used as a reference
@@ -3056,7 +3056,7 @@ elf_m68k_adjust_dynamic_symbol (struct bfd_link_info *info,
BFD_ASSERT (def->root.type == bfd_link_hash_defined);
h->root.u.def.section = def->root.u.def.section;
h->root.u.def.value = def->root.u.def.value;
- return TRUE;
+ return true;
}
/* This is a reference to a symbol defined by a dynamic object which
@@ -3067,12 +3067,12 @@ elf_m68k_adjust_dynamic_symbol (struct bfd_link_info *info,
For such cases we need not do anything here; the relocations will
be handled correctly by relocate_section. */
if (bfd_link_pic (info))
- return TRUE;
+ return true;
/* If there are no references to this symbol that do not use the
GOT, we don't need to generate a copy reloc. */
if (!h->non_got_ref)
- return TRUE;
+ return true;
/* We must allocate the symbol in our .dynbss section, which will
become part of the .bss section of the executable. There will be
@@ -3106,13 +3106,13 @@ elf_m68k_adjust_dynamic_symbol (struct bfd_link_info *info,
/* Set the sizes of the dynamic sections. */
-static bfd_boolean
+static bool
elf_m68k_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
struct bfd_link_info *info)
{
bfd *dynobj;
asection *s;
- bfd_boolean relocs;
+ bool relocs;
dynobj = elf_hash_table (info)->dynobj;
BFD_ASSERT (dynobj != NULL);
@@ -3154,7 +3154,7 @@ elf_m68k_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
/* The check_relocs and adjust_dynamic_symbol entry points have
determined the sizes of the various dynamic sections. Allocate
memory for them. */
- relocs = FALSE;
+ relocs = false;
for (s = dynobj->sections; s != NULL; s = s->next)
{
const char *name;
@@ -3175,7 +3175,7 @@ elf_m68k_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
{
if (s->size != 0)
{
- relocs = TRUE;
+ relocs = true;
/* We use the reloc_count field as a counter if we need
to copy relocs into the output file. */
@@ -3215,7 +3215,7 @@ elf_m68k_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
contents to zero. */
s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
if (s->contents == NULL)
- return FALSE;
+ return false;
}
return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
@@ -3234,7 +3234,7 @@ elf_m68k_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
against a readonly section, and set the DF_TEXTREL flag in this
case. */
-static bfd_boolean
+static bool
elf_m68k_discard_copies (struct elf_link_hash_entry *h,
void * inf)
{
@@ -3265,10 +3265,10 @@ elf_m68k_discard_copies (struct elf_link_hash_entry *h,
&& !h->forced_local)
{
if (! bfd_elf_link_record_dynamic_symbol (info, h))
- return FALSE;
+ return false;
}
- return TRUE;
+ return true;
}
for (s = elf_m68k_hash_entry (h)->pcrel_relocs_copied;
@@ -3276,7 +3276,7 @@ elf_m68k_discard_copies (struct elf_link_hash_entry *h,
s = s->next)
s->section->size -= s->count * sizeof (Elf32_External_Rela);
- return TRUE;
+ return true;
}
@@ -3353,7 +3353,7 @@ elf_m68k_init_got_entry_static (struct bfd_link_info *info,
break;
default:
- BFD_ASSERT (FALSE);
+ BFD_ASSERT (false);
}
}
@@ -3404,7 +3404,7 @@ elf_m68k_init_got_entry_local_shared (struct bfd_link_info *info,
break;
default:
- BFD_ASSERT (FALSE);
+ BFD_ASSERT (false);
}
/* Offset of the GOT entry. */
@@ -3461,15 +3461,15 @@ elf_m68k_relocate_section (bfd *output_bfd,
Elf_Internal_Sym *sym;
asection *sec;
bfd_vma relocation;
- bfd_boolean unresolved_reloc;
+ bool unresolved_reloc;
bfd_reloc_status_type r;
- bfd_boolean resolved_to_zero;
+ bool resolved_to_zero;
r_type = ELF32_R_TYPE (rel->r_info);
if (r_type < 0 || r_type >= (int) R_68K_max)
{
bfd_set_error (bfd_error_bad_value);
- return FALSE;
+ return false;
}
howto = howto_table + r_type;
@@ -3478,7 +3478,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
h = NULL;
sym = NULL;
sec = NULL;
- unresolved_reloc = FALSE;
+ unresolved_reloc = false;
if (r_symndx < symtab_hdr->sh_info)
{
@@ -3488,7 +3488,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
}
else
{
- bfd_boolean warned, ignored;
+ bool warned, ignored;
RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
r_symndx, symtab_hdr, sym_hashes,
@@ -3619,7 +3619,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
itself. */
&& elf_m68k_reloc_got_type (r_type) != R_68K_TLS_LDM32)
{
- bfd_boolean dyn;
+ bool dyn;
dyn = elf_hash_table (info)->dynamic_sections_created;
if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
@@ -3654,7 +3654,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
*off_ptr |= 1;
}
else
- unresolved_reloc = FALSE;
+ unresolved_reloc = false;
}
else if (bfd_link_pic (info)) /* && h == NULL */
/* Process local symbol during dynamic link. */
@@ -3735,7 +3735,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
input_bfd, input_section, (uint64_t) rel->r_offset,
howto->name);
- return FALSE;
+ return false;
}
else
relocation -= tpoff_base (info);
@@ -3768,7 +3768,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
relocation = (splt->output_section->vma
+ splt->output_offset
+ h->plt.offset);
- unresolved_reloc = FALSE;
+ unresolved_reloc = false;
break;
case R_68K_PLT8O:
@@ -3782,7 +3782,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
BFD_ASSERT (splt != NULL);
relocation = h->plt.offset;
- unresolved_reloc = FALSE;
+ unresolved_reloc = false;
/* This relocation does not use the addend. */
rel->r_addend = 0;
@@ -3809,22 +3809,22 @@ elf_m68k_relocate_section (bfd *output_bfd,
{
Elf_Internal_Rela outrel;
bfd_byte *loc;
- bfd_boolean skip, relocate;
+ bool skip, relocate;
/* When generating a shared object, these relocations
are copied into the output file to be resolved at run
time. */
- skip = FALSE;
- relocate = FALSE;
+ skip = false;
+ relocate = false;
outrel.r_offset =
_bfd_elf_section_offset (output_bfd, info, input_section,
rel->r_offset);
if (outrel.r_offset == (bfd_vma) -1)
- skip = TRUE;
+ skip = true;
else if (outrel.r_offset == (bfd_vma) -2)
- skip = TRUE, relocate = TRUE;
+ skip = true, relocate = true;
outrel.r_offset += (input_section->output_section->vma
+ input_section->output_offset);
@@ -3849,7 +3849,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
if (r_type == R_68K_32)
{
- relocate = TRUE;
+ relocate = true;
outrel.r_info = ELF32_R_INFO (0, R_68K_RELATIVE);
}
else
@@ -3861,7 +3861,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
else if (sec == NULL || sec->owner == NULL)
{
bfd_set_error (bfd_error_bad_value);
- return FALSE;
+ return false;
}
else
{
@@ -3933,7 +3933,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
(uint64_t) rel->r_offset,
howto->name,
h->root.root.string);
- return FALSE;
+ return false;
}
if (r_symndx != STN_UNDEF
@@ -3990,7 +3990,7 @@ elf_m68k_relocate_section (bfd *output_bfd,
symtab_hdr->sh_link,
sym->st_name);
if (name == NULL)
- return FALSE;
+ return false;
if (*name == '\0')
name = bfd_section_name (sec);
}
@@ -4006,12 +4006,12 @@ elf_m68k_relocate_section (bfd *output_bfd,
(_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
input_bfd, input_section,
(uint64_t) rel->r_offset, name, (int) r);
- return FALSE;
+ return false;
}
}
}
- return TRUE;
+ return true;
}
/* Install an M_68K_PC32 relocation against VALUE at offset OFFSET
@@ -4032,7 +4032,7 @@ elf_m68k_install_pc32 (asection *sec, bfd_vma offset, bfd_vma value)
/* Finish up dynamic symbol handling. We set the contents of various
dynamic sections here. */
-static bfd_boolean
+static bool
elf_m68k_finish_dynamic_symbol (bfd *output_bfd,
struct bfd_link_info *info,
struct elf_link_hash_entry *h,
@@ -4175,7 +4175,7 @@ elf_m68k_finish_dynamic_symbol (bfd *output_bfd,
break;
default:
- BFD_ASSERT (FALSE);
+ BFD_ASSERT (false);
}
elf_m68k_init_got_entry_local_shared (info,
@@ -4229,7 +4229,7 @@ elf_m68k_finish_dynamic_symbol (bfd *output_bfd,
break;
default:
- BFD_ASSERT (FALSE);
+ BFD_ASSERT (false);
break;
}
}
@@ -4262,12 +4262,12 @@ elf_m68k_finish_dynamic_symbol (bfd *output_bfd,
bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
}
- return TRUE;
+ return true;
}
/* Finish up the dynamic sections. */
-static bfd_boolean
+static bool
elf_m68k_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
{
bfd *dynobj;
@@ -4358,7 +4358,7 @@ elf_m68k_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
- return TRUE;
+ return true;
}
/* Given a .data section and a .emreloc in-memory section, store
@@ -4368,7 +4368,7 @@ elf_m68k_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
after the add_symbols entry point has been called for all the
objects, and before the final_link entry point is called. */
-bfd_boolean
+bool
bfd_m68k_elf32_create_embedded_relocs (bfd *abfd, struct bfd_link_info *info,
asection *datasec, asection *relsec,
char **errmsg)
@@ -4385,7 +4385,7 @@ bfd_m68k_elf32_create_embedded_relocs (bfd *abfd, struct bfd_link_info *info,
*errmsg = NULL;
if (datasec->reloc_count == 0)
- return TRUE;
+ return true;
symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
@@ -4469,14 +4469,14 @@ bfd_m68k_elf32_create_embedded_relocs (bfd *abfd, struct bfd_link_info *info,
free (isymbuf);
if (elf_section_data (datasec)->relocs != internal_relocs)
free (internal_relocs);
- return TRUE;
+ return true;
error_return:
if (symtab_hdr->contents != (unsigned char *) isymbuf)
free (isymbuf);
if (elf_section_data (datasec)->relocs != internal_relocs)
free (internal_relocs);
- return FALSE;
+ return false;
}
/* Set target options. */
@@ -4485,35 +4485,35 @@ void
bfd_elf_m68k_set_target_options (struct bfd_link_info *info, int got_handling)
{
struct elf_m68k_link_hash_table *htab;
- bfd_boolean use_neg_got_offsets_p;
- bfd_boolean allow_multigot_p;
- bfd_boolean local_gp_p;
+ bool use_neg_got_offsets_p;
+ bool allow_multigot_p;
+ bool local_gp_p;
switch (got_handling)
{
case 0:
/* --got=single. */
- local_gp_p = FALSE;
- use_neg_got_offsets_p = FALSE;
- allow_multigot_p = FALSE;
+ local_gp_p = false;
+ use_neg_got_offsets_p = false;
+ allow_multigot_p = false;
break;
case 1:
/* --got=negative. */
- local_gp_p = TRUE;
- use_neg_got_offsets_p = TRUE;
- allow_multigot_p = FALSE;
+ local_gp_p = true;
+ use_neg_got_offsets_p = true;
+ allow_multigot_p = false;
break;
case 2:
/* --got=multigot. */
- local_gp_p = TRUE;
- use_neg_got_offsets_p = TRUE;
- allow_multigot_p = TRUE;
+ local_gp_p = true;
+ use_neg_got_offsets_p = true;
+ allow_multigot_p = true;
break;
default:
- BFD_ASSERT (FALSE);
+ BFD_ASSERT (false);
return;
}
@@ -4556,7 +4556,7 @@ elf_m68k_plt_sym_val (bfd_vma i, const asection *plt,
/* Support for core dump NOTE sections. */
-static bfd_boolean
+static bool
elf_m68k_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
{
int offset;
@@ -4565,7 +4565,7 @@ elf_m68k_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
switch (note->descsz)
{
default:
- return FALSE;
+ return false;
case 154: /* Linux/m68k */
/* pr_cursig */
@@ -4586,13 +4586,13 @@ elf_m68k_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
size, note->descpos + offset);
}
-static bfd_boolean
+static bool
elf_m68k_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
{
switch (note->descsz)
{
default:
- return FALSE;
+ return false;
case 124: /* Linux/m68k elf_prpsinfo. */
elf_tdata (abfd)->core->pid
@@ -4614,7 +4614,7 @@ elf_m68k_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
command[n - 1] = '\0';
}
- return TRUE;
+ return true;
}
#define TARGET_BIG_SYM m68k_elf32_vec
@@ -4664,6 +4664,6 @@ elf_m68k_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
#define elf_backend_rela_normal 1
#define elf_backend_dtrel_excludes_plt 1
-#define elf_backend_linux_prpsinfo32_ugid16 TRUE
+#define elf_backend_linux_prpsinfo32_ugid16 true
#include "elf32-target.h"