ca15944e608da0138e36e6713422c5a6d09ac344
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
1 /* Alpha specific support for 64-bit ELF
2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
26 #include "sysdep.h"
27 #include "bfd.h"
28 #include "libbfd.h"
29 #include "elf-bfd.h"
30 #include "ecoff-bfd.h"
31
32 #include "elf/alpha.h"
33
34 #define ALPHAECOFF
35
36 #define NO_COFF_RELOCS
37 #define NO_COFF_SYMBOLS
38 #define NO_COFF_LINENOS
39
40 /* Get the ECOFF swapping routines. Needed for the debug information. */
41 #include "coff/internal.h"
42 #include "coff/sym.h"
43 #include "coff/symconst.h"
44 #include "coff/ecoff.h"
45 #include "coff/alpha.h"
46 #include "aout/ar.h"
47 #include "libcoff.h"
48 #include "libecoff.h"
49 #define ECOFF_64
50 #include "ecoffswap.h"
51
52 \f
53 /* Instruction data for plt generation and relaxation. */
54
55 #define OP_LDA 0x08
56 #define OP_LDAH 0x09
57 #define OP_LDQ 0x29
58 #define OP_BR 0x30
59 #define OP_BSR 0x34
60
61 #define INSN_LDA (OP_LDA << 26)
62 #define INSN_LDAH (OP_LDAH << 26)
63 #define INSN_LDQ (OP_LDQ << 26)
64 #define INSN_BR (OP_BR << 26)
65
66 #define INSN_ADDQ 0x40000400
67 #define INSN_RDUNIQ 0x0000009e
68 #define INSN_SUBQ 0x40000520
69 #define INSN_S4SUBQ 0x40000560
70 #define INSN_UNOP 0x2ffe0000
71
72 #define INSN_JSR 0x68004000
73 #define INSN_JMP 0x68000000
74 #define INSN_JSR_MASK 0xfc00c000
75
76 #define INSN_A(I,A) (I | (A << 21))
77 #define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78 #define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79 #define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80 #define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82 /* PLT/GOT Stuff */
83
84 /* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86 #ifdef USE_SECUREPLT
87 bfd_boolean elf64_alpha_use_secureplt = TRUE;
88 #else
89 bfd_boolean elf64_alpha_use_secureplt = FALSE;
90 #endif
91
92 #define OLD_PLT_HEADER_SIZE 32
93 #define OLD_PLT_ENTRY_SIZE 12
94 #define NEW_PLT_HEADER_SIZE 36
95 #define NEW_PLT_ENTRY_SIZE 4
96
97 #define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99 #define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102 #define MAX_GOT_SIZE (64*1024)
103
104 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
105 \f
106
107 /* Used to implement multiple .got subsections. */
108 struct alpha_elf_got_entry
109 {
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138 };
139
140 struct alpha_elf_reloc_entry
141 {
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
147 /* What kind of relocation? */
148 unsigned int rtype;
149
150 /* Is this against read-only section? */
151 unsigned int reltext : 1;
152
153 /* How many did we find? */
154 unsigned long count;
155 };
156
157 struct alpha_elf_link_hash_entry
158 {
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
167 /* Contexts in which a literal was referenced. */
168 #define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169 #define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170 #define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171 #define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172 #define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173 #define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174 #define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175 #define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176 #define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
177
178 /* Used to implement multiple .got subsections. */
179 struct alpha_elf_got_entry *got_entries;
180
181 /* Used to count non-got, non-plt relocations for delayed sizing
182 of relocation sections. */
183 struct alpha_elf_reloc_entry *reloc_entries;
184 };
185
186 /* Alpha ELF linker hash table. */
187
188 struct alpha_elf_link_hash_table
189 {
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
199 };
200
201 /* Look up an entry in a Alpha ELF linker hash table. */
202
203 #define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208 /* Traverse a Alpha ELF linker hash table. */
209
210 #define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
214 (info)))
215
216 /* Get the Alpha ELF linker hash table from a link_info structure. */
217
218 #define alpha_elf_hash_table(p) \
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
221
222 /* Get the object's symbols as our own entry type. */
223
224 #define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
227 /* Should we do dynamic things to this symbol? This differs from the
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
231
232 static inline bfd_boolean
233 alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
235 {
236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
237 }
238
239 /* Create an entry in a Alpha ELF linker hash table. */
240
241 static struct bfd_hash_entry *
242 elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
245 {
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275 }
276
277 /* Create a Alpha ELF linker hash table. */
278
279 static struct bfd_link_hash_table *
280 elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
281 {
282 struct alpha_elf_link_hash_table *ret;
283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
284
285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
293 {
294 free (ret);
295 return NULL;
296 }
297
298 return &ret->root.root;
299 }
300 \f
301 /* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304 struct alpha_elf_find_line
305 {
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308 };
309
310 /* We have some private fields hanging off of the elf_tdata structure. */
311
312 struct alpha_elf_obj_tdata
313 {
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
335
336 /* For every got, this is the sum of the number of words required
337 to hold all of the member object's local got. */
338 int local_got_size;
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
343 };
344
345 #define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
348 #define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
352
353 static bfd_boolean
354 elf64_alpha_mkobject (bfd *abfd)
355 {
356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
357 ALPHA_ELF_DATA);
358 }
359
360 static bfd_boolean
361 elf64_alpha_object_p (bfd *abfd)
362 {
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365 }
366 \f
367 /* A relocation function which doesn't do anything. */
368
369 static bfd_reloc_status_type
370 elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
372 void * data ATTRIBUTE_UNUSED, asection *sec,
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374 {
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378 }
379
380 /* A relocation function used for an unsupported reloc. */
381
382 static bfd_reloc_status_type
383 elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
385 void * data ATTRIBUTE_UNUSED, asection *sec,
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387 {
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391 }
392
393 /* Do the work of the GPDISP relocation. */
394
395 static bfd_reloc_status_type
396 elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398 {
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431 }
432
433 /* The special function for the GPDISP reloc. */
434
435 static bfd_reloc_status_type
436 elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440 {
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476 }
477
478 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480 #define MINUS_ONE (((bfd_vma)0) - 1)
481
482
483 #define SKIP_HOWTO(N) \
484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
485
486 static reloc_howto_type elf64_alpha_howto_table[] =
487 {
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
492 TRUE, /* pc_relative */
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
497 FALSE, /* partial_inplace */
498 0, /* src_mask */
499 0, /* dst_mask */
500 TRUE), /* pcrel_offset */
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
507 FALSE, /* pc_relative */
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
510 bfd_elf_generic_reloc, /* special_function */
511 "REFLONG", /* name */
512 FALSE, /* partial_inplace */
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
515 FALSE), /* pcrel_offset */
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
522 FALSE, /* pc_relative */
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
525 bfd_elf_generic_reloc, /* special_function */
526 "REFQUAD", /* name */
527 FALSE, /* partial_inplace */
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
530 FALSE), /* pcrel_offset */
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
539 FALSE, /* pc_relative */
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
542 bfd_elf_generic_reloc, /* special_function */
543 "GPREL32", /* name */
544 FALSE, /* partial_inplace */
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
547 FALSE), /* pcrel_offset */
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
552 1, /* size (0 = byte, 1 = short, 2 = long) */
553 16, /* bitsize */
554 FALSE, /* pc_relative */
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
557 bfd_elf_generic_reloc, /* special_function */
558 "ELF_LITERAL", /* name */
559 FALSE, /* partial_inplace */
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
562 FALSE), /* pcrel_offset */
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
573 1, /* size (0 = byte, 1 = short, 2 = long) */
574 32, /* bitsize */
575 FALSE, /* pc_relative */
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
580 FALSE, /* partial_inplace */
581 0, /* src_mask */
582 0, /* dst_mask */
583 FALSE), /* pcrel_offset */
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
605 FALSE, /* pc_relative */
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
610 FALSE, /* partial_inplace */
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
613 TRUE), /* pcrel_offset */
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
620 TRUE, /* pc_relative */
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
623 bfd_elf_generic_reloc, /* special_function */
624 "BRADDR", /* name */
625 FALSE, /* partial_inplace */
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
628 TRUE), /* pcrel_offset */
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
633 1, /* size (0 = byte, 1 = short, 2 = long) */
634 14, /* bitsize */
635 TRUE, /* pc_relative */
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
638 bfd_elf_generic_reloc, /* special_function */
639 "HINT", /* name */
640 FALSE, /* partial_inplace */
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
643 TRUE), /* pcrel_offset */
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
650 TRUE, /* pc_relative */
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
653 bfd_elf_generic_reloc, /* special_function */
654 "SREL16", /* name */
655 FALSE, /* partial_inplace */
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
658 TRUE), /* pcrel_offset */
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
665 TRUE, /* pc_relative */
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
668 bfd_elf_generic_reloc, /* special_function */
669 "SREL32", /* name */
670 FALSE, /* partial_inplace */
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
673 TRUE), /* pcrel_offset */
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
680 TRUE, /* pc_relative */
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
683 bfd_elf_generic_reloc, /* special_function */
684 "SREL64", /* name */
685 FALSE, /* partial_inplace */
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
688 TRUE), /* pcrel_offset */
689
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
700 1, /* size (0 = byte, 1 = short, 2 = long) */
701 16, /* bitsize */
702 FALSE, /* pc_relative */
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
705 bfd_elf_generic_reloc, /* special_function */
706 "GPRELHIGH", /* name */
707 FALSE, /* partial_inplace */
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
710 FALSE), /* pcrel_offset */
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
715 1, /* size (0 = byte, 1 = short, 2 = long) */
716 16, /* bitsize */
717 FALSE, /* pc_relative */
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
720 bfd_elf_generic_reloc, /* special_function */
721 "GPRELLOW", /* name */
722 FALSE, /* partial_inplace */
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
725 FALSE), /* pcrel_offset */
726
727 /* A 16-bit displacement from the GP to the target. */
728 HOWTO (R_ALPHA_GPREL16,
729 0, /* rightshift */
730 1, /* size (0 = byte, 1 = short, 2 = long) */
731 16, /* bitsize */
732 FALSE, /* pc_relative */
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
735 bfd_elf_generic_reloc, /* special_function */
736 "GPREL16", /* name */
737 FALSE, /* partial_inplace */
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
740 FALSE), /* pcrel_offset */
741
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
747
748 /* Misc ELF relocations. */
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
758 FALSE,
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
763 FALSE,
764 0,
765 0,
766 TRUE),
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
773 FALSE,
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
778 FALSE,
779 0,
780 0,
781 TRUE),
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
788 FALSE,
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
793 FALSE,
794 0,
795 0,
796 TRUE),
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
803 FALSE,
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
808 FALSE,
809 0,
810 0,
811 TRUE),
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
818 TRUE, /* pc_relative */
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
821 bfd_elf_generic_reloc, /* special_function */
822 "BRSGP", /* name */
823 FALSE, /* partial_inplace */
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
826 TRUE), /* pcrel_offset */
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
833 FALSE, /* pc_relative */
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
836 bfd_elf_generic_reloc, /* special_function */
837 "TLSGD", /* name */
838 FALSE, /* partial_inplace */
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
841 FALSE), /* pcrel_offset */
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
848 FALSE, /* pc_relative */
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
851 bfd_elf_generic_reloc, /* special_function */
852 "TLSLDM", /* name */
853 FALSE, /* partial_inplace */
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
856 FALSE), /* pcrel_offset */
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
863 FALSE, /* pc_relative */
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
866 bfd_elf_generic_reloc, /* special_function */
867 "DTPMOD64", /* name */
868 FALSE, /* partial_inplace */
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
871 FALSE), /* pcrel_offset */
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
879 FALSE, /* pc_relative */
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
882 bfd_elf_generic_reloc, /* special_function */
883 "GOTDTPREL", /* name */
884 FALSE, /* partial_inplace */
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
887 FALSE), /* pcrel_offset */
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
894 FALSE, /* pc_relative */
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
897 bfd_elf_generic_reloc, /* special_function */
898 "DTPREL64", /* name */
899 FALSE, /* partial_inplace */
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
902 FALSE), /* pcrel_offset */
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
909 FALSE, /* pc_relative */
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
912 bfd_elf_generic_reloc, /* special_function */
913 "DTPRELHI", /* name */
914 FALSE, /* partial_inplace */
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
917 FALSE), /* pcrel_offset */
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
924 FALSE, /* pc_relative */
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
927 bfd_elf_generic_reloc, /* special_function */
928 "DTPRELLO", /* name */
929 FALSE, /* partial_inplace */
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
932 FALSE), /* pcrel_offset */
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
939 FALSE, /* pc_relative */
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
942 bfd_elf_generic_reloc, /* special_function */
943 "DTPREL16", /* name */
944 FALSE, /* partial_inplace */
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
947 FALSE), /* pcrel_offset */
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
955 FALSE, /* pc_relative */
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
958 bfd_elf_generic_reloc, /* special_function */
959 "GOTTPREL", /* name */
960 FALSE, /* partial_inplace */
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
963 FALSE), /* pcrel_offset */
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
970 FALSE, /* pc_relative */
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
973 bfd_elf_generic_reloc, /* special_function */
974 "TPREL64", /* name */
975 FALSE, /* partial_inplace */
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
978 FALSE), /* pcrel_offset */
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
985 FALSE, /* pc_relative */
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
988 bfd_elf_generic_reloc, /* special_function */
989 "TPRELHI", /* name */
990 FALSE, /* partial_inplace */
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
993 FALSE), /* pcrel_offset */
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
1000 FALSE, /* pc_relative */
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
1003 bfd_elf_generic_reloc, /* special_function */
1004 "TPRELLO", /* name */
1005 FALSE, /* partial_inplace */
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
1008 FALSE), /* pcrel_offset */
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
1015 FALSE, /* pc_relative */
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
1018 bfd_elf_generic_reloc, /* special_function */
1019 "TPREL16", /* name */
1020 FALSE, /* partial_inplace */
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
1023 FALSE), /* pcrel_offset */
1024 };
1025
1026 /* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028 struct elf_reloc_map
1029 {
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032 };
1033
1034 static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035 {
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
1066 };
1067
1068 /* Given a BFD reloc type, return a HOWTO structure. */
1069
1070 static reloc_howto_type *
1071 elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
1073 {
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083 }
1084
1085 static reloc_howto_type *
1086 elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088 {
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100 }
1101
1102 /* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
1104 static bfd_boolean
1105 elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
1106 Elf_Internal_Rela *dst)
1107 {
1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
1112 /* xgettext:c-format */
1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1114 abfd, r_type);
1115 bfd_set_error (bfd_error_bad_value);
1116 return FALSE;
1117 }
1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1119 return TRUE;
1120 }
1121
1122 /* These two relocations create a two-word entry in the got. */
1123 #define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
1125
1126 /* This is PT_TLS segment p_vaddr. */
1127 #define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
1129
1130 /* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
1132 #define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
1136 \f
1137 /* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
1139 type. */
1140
1141 static bfd_boolean
1142 elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
1146 {
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
1163
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
1167
1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
1169 {
1170 if (!bfd_set_section_flags (newsect,
1171 bfd_section_flags (newsect) | SEC_DEBUGGING))
1172 return FALSE;
1173 }
1174
1175 return TRUE;
1176 }
1177
1178 /* Convert Alpha specific section flags to bfd internal section flags. */
1179
1180 static bfd_boolean
1181 elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
1182 {
1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1184 hdr->bfd_section->flags |= SEC_SMALL_DATA;
1185
1186 return TRUE;
1187 }
1188
1189 /* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
1191
1192 static bfd_boolean
1193 elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194 {
1195 register const char *name;
1196
1197 name = bfd_section_name (sec);
1198
1199 if (strcmp (name, ".mdebug") == 0)
1200 {
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
1203 entsize of 0. FIXME: Does this matter? */
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
1208 }
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
1215
1216 return TRUE;
1217 }
1218
1219 /* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222 static bfd_boolean
1223 elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228 {
1229 if (sym->st_shndx == SHN_COMMON
1230 && !bfd_link_relocatable (info)
1231 && sym->st_size <= elf_gp_size (abfd))
1232 {
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
1235
1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
1237
1238 if (scomm == NULL)
1239 {
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
1247
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
1251
1252 return TRUE;
1253 }
1254
1255 /* Create the .got section. */
1256
1257 static bfd_boolean
1258 elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260 {
1261 flagword flags;
1262 asection *s;
1263
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
1270 if (s == NULL
1271 || !bfd_set_section_alignment (s, 3))
1272 return FALSE;
1273
1274 alpha_elf_tdata (abfd)->got = s;
1275
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
1281 return TRUE;
1282 }
1283
1284 /* Create all the dynamic sections. */
1285
1286 static bfd_boolean
1287 elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288 {
1289 asection *s;
1290 flagword flags;
1291 struct elf_link_hash_entry *h;
1292
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
1297
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
1302 elf_hash_table (info)->splt = s;
1303 if (s == NULL || ! bfd_set_section_alignment (s, 4))
1304 return FALSE;
1305
1306 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1307 .plt section. */
1308 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1309 "_PROCEDURE_LINKAGE_TABLE_");
1310 elf_hash_table (info)->hplt = h;
1311 if (h == NULL)
1312 return FALSE;
1313
1314 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1315 | SEC_LINKER_CREATED | SEC_READONLY);
1316 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
1317 elf_hash_table (info)->srelplt = s;
1318 if (s == NULL || ! bfd_set_section_alignment (s, 3))
1319 return FALSE;
1320
1321 if (elf64_alpha_use_secureplt)
1322 {
1323 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1324 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
1325 elf_hash_table (info)->sgotplt = s;
1326 if (s == NULL || ! bfd_set_section_alignment (s, 3))
1327 return FALSE;
1328 }
1329
1330 /* We may or may not have created a .got section for this object, but
1331 we definitely havn't done the rest of the work. */
1332
1333 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1334 {
1335 if (!elf64_alpha_create_got_section (abfd, info))
1336 return FALSE;
1337 }
1338
1339 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1340 | SEC_LINKER_CREATED | SEC_READONLY);
1341 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
1342 elf_hash_table (info)->srelgot = s;
1343 if (s == NULL
1344 || !bfd_set_section_alignment (s, 3))
1345 return FALSE;
1346
1347 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1348 dynobj's .got section. We don't do this in the linker script
1349 because we don't want to define the symbol if we are not creating
1350 a global offset table. */
1351 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1352 "_GLOBAL_OFFSET_TABLE_");
1353 elf_hash_table (info)->hgot = h;
1354 if (h == NULL)
1355 return FALSE;
1356
1357 return TRUE;
1358 }
1359 \f
1360 /* Read ECOFF debugging information from a .mdebug section into a
1361 ecoff_debug_info structure. */
1362
1363 static bfd_boolean
1364 elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1365 struct ecoff_debug_info *debug)
1366 {
1367 HDRR *symhdr;
1368 const struct ecoff_debug_swap *swap;
1369 char *ext_hdr = NULL;
1370
1371 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1372 memset (debug, 0, sizeof (*debug));
1373
1374 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1375 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1376 goto error_return;
1377
1378 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1379 swap->external_hdr_size))
1380 goto error_return;
1381
1382 symhdr = &debug->symbolic_header;
1383 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
1384
1385 /* The symbolic header contains absolute file offsets and sizes to
1386 read. */
1387 #define READ(ptr, offset, count, size, type) \
1388 do \
1389 { \
1390 size_t amt; \
1391 debug->ptr = NULL; \
1392 if (symhdr->count == 0) \
1393 break; \
1394 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1395 { \
1396 bfd_set_error (bfd_error_file_too_big); \
1397 goto error_return; \
1398 } \
1399 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
1400 goto error_return; \
1401 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1402 if (debug->ptr == NULL) \
1403 goto error_return; \
1404 } while (0)
1405
1406 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
1407 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1408 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1409 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1410 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
1411 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1412 union aux_ext *);
1413 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1414 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
1415 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1416 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1417 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
1418 #undef READ
1419
1420 debug->fdr = NULL;
1421
1422 return TRUE;
1423
1424 error_return:
1425 if (ext_hdr != NULL)
1426 free (ext_hdr);
1427 if (debug->line != NULL)
1428 free (debug->line);
1429 if (debug->external_dnr != NULL)
1430 free (debug->external_dnr);
1431 if (debug->external_pdr != NULL)
1432 free (debug->external_pdr);
1433 if (debug->external_sym != NULL)
1434 free (debug->external_sym);
1435 if (debug->external_opt != NULL)
1436 free (debug->external_opt);
1437 if (debug->external_aux != NULL)
1438 free (debug->external_aux);
1439 if (debug->ss != NULL)
1440 free (debug->ss);
1441 if (debug->ssext != NULL)
1442 free (debug->ssext);
1443 if (debug->external_fdr != NULL)
1444 free (debug->external_fdr);
1445 if (debug->external_rfd != NULL)
1446 free (debug->external_rfd);
1447 if (debug->external_ext != NULL)
1448 free (debug->external_ext);
1449 return FALSE;
1450 }
1451
1452 /* Alpha ELF local labels start with '$'. */
1453
1454 static bfd_boolean
1455 elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
1456 {
1457 return name[0] == '$';
1458 }
1459
1460 static bfd_boolean
1461 elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1462 asection *section, bfd_vma offset,
1463 const char **filename_ptr,
1464 const char **functionname_ptr,
1465 unsigned int *line_ptr,
1466 unsigned int *discriminator_ptr)
1467 {
1468 asection *msec;
1469
1470 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
1471 filename_ptr, functionname_ptr,
1472 line_ptr, discriminator_ptr,
1473 dwarf_debug_sections,
1474 &elf_tdata (abfd)->dwarf2_find_line_info)
1475 == 1)
1476 return TRUE;
1477
1478 msec = bfd_get_section_by_name (abfd, ".mdebug");
1479 if (msec != NULL)
1480 {
1481 flagword origflags;
1482 struct alpha_elf_find_line *fi;
1483 const struct ecoff_debug_swap * const swap =
1484 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1485
1486 /* If we are called during a link, alpha_elf_final_link may have
1487 cleared the SEC_HAS_CONTENTS field. We force it back on here
1488 if appropriate (which it normally will be). */
1489 origflags = msec->flags;
1490 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1491 msec->flags |= SEC_HAS_CONTENTS;
1492
1493 fi = alpha_elf_tdata (abfd)->find_line_info;
1494 if (fi == NULL)
1495 {
1496 bfd_size_type external_fdr_size;
1497 char *fraw_src;
1498 char *fraw_end;
1499 struct fdr *fdr_ptr;
1500 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
1501
1502 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
1503 if (fi == NULL)
1504 {
1505 msec->flags = origflags;
1506 return FALSE;
1507 }
1508
1509 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1510 {
1511 msec->flags = origflags;
1512 return FALSE;
1513 }
1514
1515 /* Swap in the FDR information. */
1516 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1517 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1518 if (fi->d.fdr == NULL)
1519 {
1520 msec->flags = origflags;
1521 return FALSE;
1522 }
1523 external_fdr_size = swap->external_fdr_size;
1524 fdr_ptr = fi->d.fdr;
1525 fraw_src = (char *) fi->d.external_fdr;
1526 fraw_end = (fraw_src
1527 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1528 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
1529 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
1530
1531 alpha_elf_tdata (abfd)->find_line_info = fi;
1532
1533 /* Note that we don't bother to ever free this information.
1534 find_nearest_line is either called all the time, as in
1535 objdump -l, so the information should be saved, or it is
1536 rarely called, as in ld error messages, so the memory
1537 wasted is unimportant. Still, it would probably be a
1538 good idea for free_cached_info to throw it away. */
1539 }
1540
1541 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1542 &fi->i, filename_ptr, functionname_ptr,
1543 line_ptr))
1544 {
1545 msec->flags = origflags;
1546 return TRUE;
1547 }
1548
1549 msec->flags = origflags;
1550 }
1551
1552 /* Fall back on the generic ELF find_nearest_line routine. */
1553
1554 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
1555 filename_ptr, functionname_ptr,
1556 line_ptr, discriminator_ptr);
1557 }
1558 \f
1559 /* Structure used to pass information to alpha_elf_output_extsym. */
1560
1561 struct extsym_info
1562 {
1563 bfd *abfd;
1564 struct bfd_link_info *info;
1565 struct ecoff_debug_info *debug;
1566 const struct ecoff_debug_swap *swap;
1567 bfd_boolean failed;
1568 };
1569
1570 static bfd_boolean
1571 elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
1572 {
1573 struct extsym_info *einfo = (struct extsym_info *) data;
1574 bfd_boolean strip;
1575 asection *sec, *output_section;
1576
1577 if (h->root.indx == -2)
1578 strip = FALSE;
1579 else if ((h->root.def_dynamic
1580 || h->root.ref_dynamic
1581 || h->root.root.type == bfd_link_hash_new)
1582 && !h->root.def_regular
1583 && !h->root.ref_regular)
1584 strip = TRUE;
1585 else if (einfo->info->strip == strip_all
1586 || (einfo->info->strip == strip_some
1587 && bfd_hash_lookup (einfo->info->keep_hash,
1588 h->root.root.root.string,
1589 FALSE, FALSE) == NULL))
1590 strip = TRUE;
1591 else
1592 strip = FALSE;
1593
1594 if (strip)
1595 return TRUE;
1596
1597 if (h->esym.ifd == -2)
1598 {
1599 h->esym.jmptbl = 0;
1600 h->esym.cobol_main = 0;
1601 h->esym.weakext = 0;
1602 h->esym.reserved = 0;
1603 h->esym.ifd = ifdNil;
1604 h->esym.asym.value = 0;
1605 h->esym.asym.st = stGlobal;
1606
1607 if (h->root.root.type != bfd_link_hash_defined
1608 && h->root.root.type != bfd_link_hash_defweak)
1609 h->esym.asym.sc = scAbs;
1610 else
1611 {
1612 const char *name;
1613
1614 sec = h->root.root.u.def.section;
1615 output_section = sec->output_section;
1616
1617 /* When making a shared library and symbol h is the one from
1618 the another shared library, OUTPUT_SECTION may be null. */
1619 if (output_section == NULL)
1620 h->esym.asym.sc = scUndefined;
1621 else
1622 {
1623 name = bfd_section_name (output_section);
1624
1625 if (strcmp (name, ".text") == 0)
1626 h->esym.asym.sc = scText;
1627 else if (strcmp (name, ".data") == 0)
1628 h->esym.asym.sc = scData;
1629 else if (strcmp (name, ".sdata") == 0)
1630 h->esym.asym.sc = scSData;
1631 else if (strcmp (name, ".rodata") == 0
1632 || strcmp (name, ".rdata") == 0)
1633 h->esym.asym.sc = scRData;
1634 else if (strcmp (name, ".bss") == 0)
1635 h->esym.asym.sc = scBss;
1636 else if (strcmp (name, ".sbss") == 0)
1637 h->esym.asym.sc = scSBss;
1638 else if (strcmp (name, ".init") == 0)
1639 h->esym.asym.sc = scInit;
1640 else if (strcmp (name, ".fini") == 0)
1641 h->esym.asym.sc = scFini;
1642 else
1643 h->esym.asym.sc = scAbs;
1644 }
1645 }
1646
1647 h->esym.asym.reserved = 0;
1648 h->esym.asym.index = indexNil;
1649 }
1650
1651 if (h->root.root.type == bfd_link_hash_common)
1652 h->esym.asym.value = h->root.root.u.c.size;
1653 else if (h->root.root.type == bfd_link_hash_defined
1654 || h->root.root.type == bfd_link_hash_defweak)
1655 {
1656 if (h->esym.asym.sc == scCommon)
1657 h->esym.asym.sc = scBss;
1658 else if (h->esym.asym.sc == scSCommon)
1659 h->esym.asym.sc = scSBss;
1660
1661 sec = h->root.root.u.def.section;
1662 output_section = sec->output_section;
1663 if (output_section != NULL)
1664 h->esym.asym.value = (h->root.root.u.def.value
1665 + sec->output_offset
1666 + output_section->vma);
1667 else
1668 h->esym.asym.value = 0;
1669 }
1670
1671 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1672 h->root.root.root.string,
1673 &h->esym))
1674 {
1675 einfo->failed = TRUE;
1676 return FALSE;
1677 }
1678
1679 return TRUE;
1680 }
1681 \f
1682 /* Search for and possibly create a got entry. */
1683
1684 static struct alpha_elf_got_entry *
1685 get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1686 unsigned long r_type, unsigned long r_symndx,
1687 bfd_vma r_addend)
1688 {
1689 struct alpha_elf_got_entry *gotent;
1690 struct alpha_elf_got_entry **slot;
1691
1692 if (h)
1693 slot = &h->got_entries;
1694 else
1695 {
1696 /* This is a local .got entry -- record for merge. */
1697
1698 struct alpha_elf_got_entry **local_got_entries;
1699
1700 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1701 if (!local_got_entries)
1702 {
1703 bfd_size_type size;
1704 Elf_Internal_Shdr *symtab_hdr;
1705
1706 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1707 size = symtab_hdr->sh_info;
1708 size *= sizeof (struct alpha_elf_got_entry *);
1709
1710 local_got_entries
1711 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1712 if (!local_got_entries)
1713 return NULL;
1714
1715 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1716 }
1717
1718 slot = &local_got_entries[r_symndx];
1719 }
1720
1721 for (gotent = *slot; gotent ; gotent = gotent->next)
1722 if (gotent->gotobj == abfd
1723 && gotent->reloc_type == r_type
1724 && gotent->addend == r_addend)
1725 break;
1726
1727 if (!gotent)
1728 {
1729 int entry_size;
1730 size_t amt;
1731
1732 amt = sizeof (struct alpha_elf_got_entry);
1733 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1734 if (!gotent)
1735 return NULL;
1736
1737 gotent->gotobj = abfd;
1738 gotent->addend = r_addend;
1739 gotent->got_offset = -1;
1740 gotent->plt_offset = -1;
1741 gotent->use_count = 1;
1742 gotent->reloc_type = r_type;
1743 gotent->reloc_done = 0;
1744 gotent->reloc_xlated = 0;
1745
1746 gotent->next = *slot;
1747 *slot = gotent;
1748
1749 entry_size = alpha_got_entry_size (r_type);
1750 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1751 if (!h)
1752 alpha_elf_tdata(abfd)->local_got_size += entry_size;
1753 }
1754 else
1755 gotent->use_count += 1;
1756
1757 return gotent;
1758 }
1759
1760 static bfd_boolean
1761 elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1762 {
1763 return ((ah->root.type == STT_FUNC
1764 || ah->root.root.type == bfd_link_hash_undefweak
1765 || ah->root.root.type == bfd_link_hash_undefined)
1766 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1767 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
1768 }
1769
1770 /* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1771 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1772 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1773 relocs to be sorted. */
1774
1775 static bfd_boolean
1776 elf64_alpha_sort_relocs_p (asection *sec)
1777 {
1778 return (sec->flags & SEC_CODE) == 0;
1779 }
1780
1781
1782 /* Handle dynamic relocations when doing an Alpha ELF link. */
1783
1784 static bfd_boolean
1785 elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1786 asection *sec, const Elf_Internal_Rela *relocs)
1787 {
1788 bfd *dynobj;
1789 asection *sreloc;
1790 Elf_Internal_Shdr *symtab_hdr;
1791 struct alpha_elf_link_hash_entry **sym_hashes;
1792 const Elf_Internal_Rela *rel, *relend;
1793
1794 if (bfd_link_relocatable (info))
1795 return TRUE;
1796
1797 /* Don't do anything special with non-loaded, non-alloced sections.
1798 In particular, any relocs in such sections should not affect GOT
1799 and PLT reference counting (ie. we don't allow them to create GOT
1800 or PLT entries), there's no possibility or desire to optimize TLS
1801 relocs, and there's not much point in propagating relocs to shared
1802 libs that the dynamic linker won't relocate. */
1803 if ((sec->flags & SEC_ALLOC) == 0)
1804 return TRUE;
1805
1806 BFD_ASSERT (is_alpha_elf (abfd));
1807
1808 dynobj = elf_hash_table (info)->dynobj;
1809 if (dynobj == NULL)
1810 elf_hash_table (info)->dynobj = dynobj = abfd;
1811
1812 sreloc = NULL;
1813 symtab_hdr = &elf_symtab_hdr (abfd);
1814 sym_hashes = alpha_elf_sym_hashes (abfd);
1815
1816 relend = relocs + sec->reloc_count;
1817 for (rel = relocs; rel < relend; ++rel)
1818 {
1819 enum {
1820 NEED_GOT = 1,
1821 NEED_GOT_ENTRY = 2,
1822 NEED_DYNREL = 4
1823 };
1824
1825 unsigned long r_symndx, r_type;
1826 struct alpha_elf_link_hash_entry *h;
1827 unsigned int gotent_flags;
1828 bfd_boolean maybe_dynamic;
1829 unsigned int need;
1830 bfd_vma addend;
1831
1832 r_symndx = ELF64_R_SYM (rel->r_info);
1833 if (r_symndx < symtab_hdr->sh_info)
1834 h = NULL;
1835 else
1836 {
1837 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1838
1839 while (h->root.root.type == bfd_link_hash_indirect
1840 || h->root.root.type == bfd_link_hash_warning)
1841 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
1842
1843 /* PR15323, ref flags aren't set for references in the same
1844 object. */
1845 h->root.ref_regular = 1;
1846 }
1847
1848 /* We can only get preliminary data on whether a symbol is
1849 locally or externally defined, as not all of the input files
1850 have yet been processed. Do something with what we know, as
1851 this may help reduce memory usage and processing time later. */
1852 maybe_dynamic = FALSE;
1853 if (h && ((bfd_link_pic (info)
1854 && (!info->symbolic
1855 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1856 || !h->root.def_regular
1857 || h->root.root.type == bfd_link_hash_defweak))
1858 maybe_dynamic = TRUE;
1859
1860 need = 0;
1861 gotent_flags = 0;
1862 r_type = ELF64_R_TYPE (rel->r_info);
1863 addend = rel->r_addend;
1864
1865 switch (r_type)
1866 {
1867 case R_ALPHA_LITERAL:
1868 need = NEED_GOT | NEED_GOT_ENTRY;
1869
1870 /* Remember how this literal is used from its LITUSEs.
1871 This will be important when it comes to decide if we can
1872 create a .plt entry for a function symbol. */
1873 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
1874 if (rel->r_addend >= 1 && rel->r_addend <= 6)
1875 gotent_flags |= 1 << rel->r_addend;
1876 --rel;
1877
1878 /* No LITUSEs -- presumably the address is used somehow. */
1879 if (gotent_flags == 0)
1880 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1881 break;
1882
1883 case R_ALPHA_GPDISP:
1884 case R_ALPHA_GPREL16:
1885 case R_ALPHA_GPREL32:
1886 case R_ALPHA_GPRELHIGH:
1887 case R_ALPHA_GPRELLOW:
1888 case R_ALPHA_BRSGP:
1889 need = NEED_GOT;
1890 break;
1891
1892 case R_ALPHA_REFLONG:
1893 case R_ALPHA_REFQUAD:
1894 if (bfd_link_pic (info) || maybe_dynamic)
1895 need = NEED_DYNREL;
1896 break;
1897
1898 case R_ALPHA_TLSLDM:
1899 /* The symbol for a TLSLDM reloc is ignored. Collapse the
1900 reloc to the STN_UNDEF (0) symbol so that they all match. */
1901 r_symndx = STN_UNDEF;
1902 h = 0;
1903 maybe_dynamic = FALSE;
1904 /* FALLTHRU */
1905
1906 case R_ALPHA_TLSGD:
1907 case R_ALPHA_GOTDTPREL:
1908 need = NEED_GOT | NEED_GOT_ENTRY;
1909 break;
1910
1911 case R_ALPHA_GOTTPREL:
1912 need = NEED_GOT | NEED_GOT_ENTRY;
1913 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1914 if (bfd_link_pic (info))
1915 info->flags |= DF_STATIC_TLS;
1916 break;
1917
1918 case R_ALPHA_TPREL64:
1919 if (bfd_link_dll (info))
1920 {
1921 info->flags |= DF_STATIC_TLS;
1922 need = NEED_DYNREL;
1923 }
1924 else if (maybe_dynamic)
1925 need = NEED_DYNREL;
1926 break;
1927 }
1928
1929 if (need & NEED_GOT)
1930 {
1931 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1932 {
1933 if (!elf64_alpha_create_got_section (abfd, info))
1934 return FALSE;
1935 }
1936 }
1937
1938 if (need & NEED_GOT_ENTRY)
1939 {
1940 struct alpha_elf_got_entry *gotent;
1941
1942 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1943 if (!gotent)
1944 return FALSE;
1945
1946 if (gotent_flags)
1947 {
1948 gotent->flags |= gotent_flags;
1949 if (h)
1950 {
1951 gotent_flags |= h->flags;
1952 h->flags = gotent_flags;
1953
1954 /* Make a guess as to whether a .plt entry is needed. */
1955 /* ??? It appears that we won't make it into
1956 adjust_dynamic_symbol for symbols that remain
1957 totally undefined. Copying this check here means
1958 we can create a plt entry for them too. */
1959 h->root.needs_plt
1960 = (maybe_dynamic && elf64_alpha_want_plt (h));
1961 }
1962 }
1963 }
1964
1965 if (need & NEED_DYNREL)
1966 {
1967 /* We need to create the section here now whether we eventually
1968 use it or not so that it gets mapped to an output section by
1969 the linker. If not used, we'll kill it in size_dynamic_sections. */
1970 if (sreloc == NULL)
1971 {
1972 sreloc = _bfd_elf_make_dynamic_reloc_section
1973 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1974
1975 if (sreloc == NULL)
1976 return FALSE;
1977 }
1978
1979 if (h)
1980 {
1981 /* Since we havn't seen all of the input symbols yet, we
1982 don't know whether we'll actually need a dynamic relocation
1983 entry for this reloc. So make a record of it. Once we
1984 find out if this thing needs dynamic relocation we'll
1985 expand the relocation sections by the appropriate amount. */
1986
1987 struct alpha_elf_reloc_entry *rent;
1988
1989 for (rent = h->reloc_entries; rent; rent = rent->next)
1990 if (rent->rtype == r_type && rent->srel == sreloc)
1991 break;
1992
1993 if (!rent)
1994 {
1995 size_t amt = sizeof (struct alpha_elf_reloc_entry);
1996 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1997 if (!rent)
1998 return FALSE;
1999
2000 rent->srel = sreloc;
2001 rent->rtype = r_type;
2002 rent->count = 1;
2003 rent->reltext = (sec->flags & SEC_READONLY) != 0;
2004
2005 rent->next = h->reloc_entries;
2006 h->reloc_entries = rent;
2007 }
2008 else
2009 rent->count++;
2010 }
2011 else if (bfd_link_pic (info))
2012 {
2013 /* If this is a shared library, and the section is to be
2014 loaded into memory, we need a RELATIVE reloc. */
2015 sreloc->size += sizeof (Elf64_External_Rela);
2016 if (sec->flags & SEC_READONLY)
2017 info->flags |= DF_TEXTREL;
2018 }
2019 }
2020 }
2021
2022 return TRUE;
2023 }
2024
2025 /* Return the section that should be marked against GC for a given
2026 relocation. */
2027
2028 static asection *
2029 elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2030 Elf_Internal_Rela *rel,
2031 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2032 {
2033 /* These relocations don't really reference a symbol. Instead we store
2034 extra data in their addend slot. Ignore the symbol. */
2035 switch (ELF64_R_TYPE (rel->r_info))
2036 {
2037 case R_ALPHA_LITUSE:
2038 case R_ALPHA_GPDISP:
2039 case R_ALPHA_HINT:
2040 return NULL;
2041 }
2042
2043 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2044 }
2045
2046 /* Adjust a symbol defined by a dynamic object and referenced by a
2047 regular object. The current definition is in some section of the
2048 dynamic object, but we're not including those sections. We have to
2049 change the definition to something the rest of the link can
2050 understand. */
2051
2052 static bfd_boolean
2053 elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2054 struct elf_link_hash_entry *h)
2055 {
2056 bfd *dynobj;
2057 asection *s;
2058 struct alpha_elf_link_hash_entry *ah;
2059
2060 dynobj = elf_hash_table(info)->dynobj;
2061 ah = (struct alpha_elf_link_hash_entry *)h;
2062
2063 /* Now that we've seen all of the input symbols, finalize our decision
2064 about whether this symbol should get a .plt entry. Irritatingly, it
2065 is common for folk to leave undefined symbols in shared libraries,
2066 and they still expect lazy binding; accept undefined symbols in lieu
2067 of STT_FUNC. */
2068 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
2069 {
2070 h->needs_plt = TRUE;
2071
2072 s = elf_hash_table(info)->splt;
2073 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2074 return FALSE;
2075
2076 /* We need one plt entry per got subsection. Delay allocation of
2077 the actual plt entries until size_plt_section, called from
2078 size_dynamic_sections or during relaxation. */
2079
2080 return TRUE;
2081 }
2082 else
2083 h->needs_plt = FALSE;
2084
2085 /* If this is a weak symbol, and there is a real definition, the
2086 processor independent code will have arranged for us to see the
2087 real definition first, and we can just use the same value. */
2088 if (h->is_weakalias)
2089 {
2090 struct elf_link_hash_entry *def = weakdef (h);
2091 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2092 h->root.u.def.section = def->root.u.def.section;
2093 h->root.u.def.value = def->root.u.def.value;
2094 return TRUE;
2095 }
2096
2097 /* This is a reference to a symbol defined by a dynamic object which
2098 is not a function. The Alpha, since it uses .got entries for all
2099 symbols even in regular objects, does not need the hackery of a
2100 .dynbss section and COPY dynamic relocations. */
2101
2102 return TRUE;
2103 }
2104
2105 /* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2106
2107 static void
2108 elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2109 const Elf_Internal_Sym *isym,
2110 bfd_boolean definition,
2111 bfd_boolean dynamic)
2112 {
2113 if (!dynamic && definition)
2114 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2115 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2116 }
2117
2118 /* Symbol versioning can create new symbols, and make our old symbols
2119 indirect to the new ones. Consolidate the got and reloc information
2120 in these situations. */
2121
2122 static void
2123 elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2124 struct elf_link_hash_entry *dir,
2125 struct elf_link_hash_entry *ind)
2126 {
2127 struct alpha_elf_link_hash_entry *hi
2128 = (struct alpha_elf_link_hash_entry *) ind;
2129 struct alpha_elf_link_hash_entry *hs
2130 = (struct alpha_elf_link_hash_entry *) dir;
2131
2132 /* Do the merging in the superclass. */
2133 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
2134
2135 /* Merge the flags. Whee. */
2136 hs->flags |= hi->flags;
2137
2138 /* ??? It's unclear to me what's really supposed to happen when
2139 "merging" defweak and defined symbols, given that we don't
2140 actually throw away the defweak. This more-or-less copies
2141 the logic related to got and plt entries in the superclass. */
2142 if (ind->root.type != bfd_link_hash_indirect)
2143 return;
2144
2145 /* Merge the .got entries. Cannibalize the old symbol's list in
2146 doing so, since we don't need it anymore. */
2147
2148 if (hs->got_entries == NULL)
2149 hs->got_entries = hi->got_entries;
2150 else
2151 {
2152 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2153
2154 gsh = hs->got_entries;
2155 for (gi = hi->got_entries; gi ; gi = gin)
2156 {
2157 gin = gi->next;
2158 for (gs = gsh; gs ; gs = gs->next)
2159 if (gi->gotobj == gs->gotobj
2160 && gi->reloc_type == gs->reloc_type
2161 && gi->addend == gs->addend)
2162 {
2163 gs->use_count += gi->use_count;
2164 goto got_found;
2165 }
2166 gi->next = hs->got_entries;
2167 hs->got_entries = gi;
2168 got_found:;
2169 }
2170 }
2171 hi->got_entries = NULL;
2172
2173 /* And similar for the reloc entries. */
2174
2175 if (hs->reloc_entries == NULL)
2176 hs->reloc_entries = hi->reloc_entries;
2177 else
2178 {
2179 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2180
2181 rsh = hs->reloc_entries;
2182 for (ri = hi->reloc_entries; ri ; ri = rin)
2183 {
2184 rin = ri->next;
2185 for (rs = rsh; rs ; rs = rs->next)
2186 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2187 {
2188 rs->count += ri->count;
2189 goto found_reloc;
2190 }
2191 ri->next = hs->reloc_entries;
2192 hs->reloc_entries = ri;
2193 found_reloc:;
2194 }
2195 }
2196 hi->reloc_entries = NULL;
2197 }
2198
2199 /* Is it possible to merge two object file's .got tables? */
2200
2201 static bfd_boolean
2202 elf64_alpha_can_merge_gots (bfd *a, bfd *b)
2203 {
2204 int total = alpha_elf_tdata (a)->total_got_size;
2205 bfd *bsub;
2206
2207 /* Trivial quick fallout test. */
2208 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2209 return TRUE;
2210
2211 /* By their nature, local .got entries cannot be merged. */
2212 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
2213 return FALSE;
2214
2215 /* Failing the common trivial comparison, we must effectively
2216 perform the merge. Not actually performing the merge means that
2217 we don't have to store undo information in case we fail. */
2218 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2219 {
2220 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2221 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2222 int i, n;
2223
2224 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2225 for (i = 0; i < n; ++i)
2226 {
2227 struct alpha_elf_got_entry *ae, *be;
2228 struct alpha_elf_link_hash_entry *h;
2229
2230 h = hashes[i];
2231 while (h->root.root.type == bfd_link_hash_indirect
2232 || h->root.root.type == bfd_link_hash_warning)
2233 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2234
2235 for (be = h->got_entries; be ; be = be->next)
2236 {
2237 if (be->use_count == 0)
2238 continue;
2239 if (be->gotobj != b)
2240 continue;
2241
2242 for (ae = h->got_entries; ae ; ae = ae->next)
2243 if (ae->gotobj == a
2244 && ae->reloc_type == be->reloc_type
2245 && ae->addend == be->addend)
2246 goto global_found;
2247
2248 total += alpha_got_entry_size (be->reloc_type);
2249 if (total > MAX_GOT_SIZE)
2250 return FALSE;
2251 global_found:;
2252 }
2253 }
2254 }
2255
2256 return TRUE;
2257 }
2258
2259 /* Actually merge two .got tables. */
2260
2261 static void
2262 elf64_alpha_merge_gots (bfd *a, bfd *b)
2263 {
2264 int total = alpha_elf_tdata (a)->total_got_size;
2265 bfd *bsub;
2266
2267 /* Remember local expansion. */
2268 {
2269 int e = alpha_elf_tdata (b)->local_got_size;
2270 total += e;
2271 alpha_elf_tdata (a)->local_got_size += e;
2272 }
2273
2274 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2275 {
2276 struct alpha_elf_got_entry **local_got_entries;
2277 struct alpha_elf_link_hash_entry **hashes;
2278 Elf_Internal_Shdr *symtab_hdr;
2279 int i, n;
2280
2281 /* Let the local .got entries know they are part of a new subsegment. */
2282 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2283 if (local_got_entries)
2284 {
2285 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2286 for (i = 0; i < n; ++i)
2287 {
2288 struct alpha_elf_got_entry *ent;
2289 for (ent = local_got_entries[i]; ent; ent = ent->next)
2290 ent->gotobj = a;
2291 }
2292 }
2293
2294 /* Merge the global .got entries. */
2295 hashes = alpha_elf_sym_hashes (bsub);
2296 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2297
2298 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2299 for (i = 0; i < n; ++i)
2300 {
2301 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2302 struct alpha_elf_link_hash_entry *h;
2303
2304 h = hashes[i];
2305 while (h->root.root.type == bfd_link_hash_indirect
2306 || h->root.root.type == bfd_link_hash_warning)
2307 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2308
2309 pbe = start = &h->got_entries;
2310 while ((be = *pbe) != NULL)
2311 {
2312 if (be->use_count == 0)
2313 {
2314 *pbe = be->next;
2315 memset (be, 0xa5, sizeof (*be));
2316 goto kill;
2317 }
2318 if (be->gotobj != b)
2319 goto next;
2320
2321 for (ae = *start; ae ; ae = ae->next)
2322 if (ae->gotobj == a
2323 && ae->reloc_type == be->reloc_type
2324 && ae->addend == be->addend)
2325 {
2326 ae->flags |= be->flags;
2327 ae->use_count += be->use_count;
2328 *pbe = be->next;
2329 memset (be, 0xa5, sizeof (*be));
2330 goto kill;
2331 }
2332 be->gotobj = a;
2333 total += alpha_got_entry_size (be->reloc_type);
2334
2335 next:;
2336 pbe = &be->next;
2337 kill:;
2338 }
2339 }
2340
2341 alpha_elf_tdata (bsub)->gotobj = a;
2342 }
2343 alpha_elf_tdata (a)->total_got_size = total;
2344
2345 /* Merge the two in_got chains. */
2346 {
2347 bfd *next;
2348
2349 bsub = a;
2350 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2351 bsub = next;
2352
2353 alpha_elf_tdata (bsub)->in_got_link_next = b;
2354 }
2355 }
2356
2357 /* Calculate the offsets for the got entries. */
2358
2359 static bfd_boolean
2360 elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2361 void * arg ATTRIBUTE_UNUSED)
2362 {
2363 struct alpha_elf_got_entry *gotent;
2364
2365 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2366 if (gotent->use_count > 0)
2367 {
2368 struct alpha_elf_obj_tdata *td;
2369 bfd_size_type *plge;
2370
2371 td = alpha_elf_tdata (gotent->gotobj);
2372 plge = &td->got->size;
2373 gotent->got_offset = *plge;
2374 *plge += alpha_got_entry_size (gotent->reloc_type);
2375 }
2376
2377 return TRUE;
2378 }
2379
2380 static void
2381 elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2382 {
2383 bfd *i, *got_list;
2384 struct alpha_elf_link_hash_table * htab;
2385
2386 htab = alpha_elf_hash_table (info);
2387 if (htab == NULL)
2388 return;
2389 got_list = htab->got_list;
2390
2391 /* First, zero out the .got sizes, as we may be recalculating the
2392 .got after optimizing it. */
2393 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2394 alpha_elf_tdata(i)->got->size = 0;
2395
2396 /* Next, fill in the offsets for all the global entries. */
2397 alpha_elf_link_hash_traverse (htab,
2398 elf64_alpha_calc_got_offsets_for_symbol,
2399 NULL);
2400
2401 /* Finally, fill in the offsets for the local entries. */
2402 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2403 {
2404 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2405 bfd *j;
2406
2407 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2408 {
2409 struct alpha_elf_got_entry **local_got_entries, *gotent;
2410 int k, n;
2411
2412 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2413 if (!local_got_entries)
2414 continue;
2415
2416 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2417 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2418 if (gotent->use_count > 0)
2419 {
2420 gotent->got_offset = got_offset;
2421 got_offset += alpha_got_entry_size (gotent->reloc_type);
2422 }
2423 }
2424
2425 alpha_elf_tdata(i)->got->size = got_offset;
2426 }
2427 }
2428
2429 /* Constructs the gots. */
2430
2431 static bfd_boolean
2432 elf64_alpha_size_got_sections (struct bfd_link_info *info,
2433 bfd_boolean may_merge)
2434 {
2435 bfd *i, *got_list, *cur_got_obj = NULL;
2436 struct alpha_elf_link_hash_table * htab;
2437
2438 htab = alpha_elf_hash_table (info);
2439 if (htab == NULL)
2440 return FALSE;
2441 got_list = htab->got_list;
2442
2443 /* On the first time through, pretend we have an existing got list
2444 consisting of all of the input files. */
2445 if (got_list == NULL)
2446 {
2447 for (i = info->input_bfds; i ; i = i->link.next)
2448 {
2449 bfd *this_got;
2450
2451 if (! is_alpha_elf (i))
2452 continue;
2453
2454 this_got = alpha_elf_tdata (i)->gotobj;
2455 if (this_got == NULL)
2456 continue;
2457
2458 /* We are assuming no merging has yet occurred. */
2459 BFD_ASSERT (this_got == i);
2460
2461 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
2462 {
2463 /* Yikes! A single object file has too many entries. */
2464 _bfd_error_handler
2465 /* xgettext:c-format */
2466 (_("%pB: .got subsegment exceeds 64K (size %d)"),
2467 i, alpha_elf_tdata (this_got)->total_got_size);
2468 return FALSE;
2469 }
2470
2471 if (got_list == NULL)
2472 got_list = this_got;
2473 else
2474 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2475 cur_got_obj = this_got;
2476 }
2477
2478 /* Strange degenerate case of no got references. */
2479 if (got_list == NULL)
2480 return TRUE;
2481
2482 htab->got_list = got_list;
2483 }
2484
2485 cur_got_obj = got_list;
2486 if (cur_got_obj == NULL)
2487 return FALSE;
2488
2489 if (may_merge)
2490 {
2491 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2492 while (i != NULL)
2493 {
2494 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2495 {
2496 elf64_alpha_merge_gots (cur_got_obj, i);
2497
2498 alpha_elf_tdata(i)->got->size = 0;
2499 i = alpha_elf_tdata(i)->got_link_next;
2500 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2501 }
2502 else
2503 {
2504 cur_got_obj = i;
2505 i = alpha_elf_tdata(i)->got_link_next;
2506 }
2507 }
2508 }
2509
2510 /* Once the gots have been merged, fill in the got offsets for
2511 everything therein. */
2512 elf64_alpha_calc_got_offsets (info);
2513
2514 return TRUE;
2515 }
2516
2517 static bfd_boolean
2518 elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2519 void * data)
2520 {
2521 asection *splt = (asection *) data;
2522 struct alpha_elf_got_entry *gotent;
2523 bfd_boolean saw_one = FALSE;
2524
2525 /* If we didn't need an entry before, we still don't. */
2526 if (!h->root.needs_plt)
2527 return TRUE;
2528
2529 /* For each LITERAL got entry still in use, allocate a plt entry. */
2530 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2531 if (gotent->reloc_type == R_ALPHA_LITERAL
2532 && gotent->use_count > 0)
2533 {
2534 if (splt->size == 0)
2535 splt->size = PLT_HEADER_SIZE;
2536 gotent->plt_offset = splt->size;
2537 splt->size += PLT_ENTRY_SIZE;
2538 saw_one = TRUE;
2539 }
2540
2541 /* If there weren't any, there's no longer a need for the PLT entry. */
2542 if (!saw_one)
2543 h->root.needs_plt = FALSE;
2544
2545 return TRUE;
2546 }
2547
2548 /* Called from relax_section to rebuild the PLT in light of potential changes
2549 in the function's status. */
2550
2551 static void
2552 elf64_alpha_size_plt_section (struct bfd_link_info *info)
2553 {
2554 asection *splt, *spltrel, *sgotplt;
2555 unsigned long entries;
2556 struct alpha_elf_link_hash_table * htab;
2557
2558 htab = alpha_elf_hash_table (info);
2559 if (htab == NULL)
2560 return;
2561
2562 splt = elf_hash_table(info)->splt;
2563 if (splt == NULL)
2564 return;
2565
2566 splt->size = 0;
2567
2568 alpha_elf_link_hash_traverse (htab,
2569 elf64_alpha_size_plt_section_1, splt);
2570
2571 /* Every plt entry requires a JMP_SLOT relocation. */
2572 spltrel = elf_hash_table(info)->srelplt;
2573 entries = 0;
2574 if (splt->size)
2575 {
2576 if (elf64_alpha_use_secureplt)
2577 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2578 else
2579 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2580 }
2581 spltrel->size = entries * sizeof (Elf64_External_Rela);
2582
2583 /* When using the secureplt, we need two words somewhere in the data
2584 segment for the dynamic linker to tell us where to go. This is the
2585 entire contents of the .got.plt section. */
2586 if (elf64_alpha_use_secureplt)
2587 {
2588 sgotplt = elf_hash_table(info)->sgotplt;
2589 sgotplt->size = entries ? 16 : 0;
2590 }
2591 }
2592
2593 static bfd_boolean
2594 elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2595 struct bfd_link_info *info)
2596 {
2597 bfd *i;
2598 struct alpha_elf_link_hash_table * htab;
2599
2600 if (bfd_link_relocatable (info))
2601 return TRUE;
2602
2603 htab = alpha_elf_hash_table (info);
2604 if (htab == NULL)
2605 return FALSE;
2606
2607 if (!elf64_alpha_size_got_sections (info, TRUE))
2608 return FALSE;
2609
2610 /* Allocate space for all of the .got subsections. */
2611 i = htab->got_list;
2612 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
2613 {
2614 asection *s = alpha_elf_tdata(i)->got;
2615 if (s->size > 0)
2616 {
2617 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2618 if (s->contents == NULL)
2619 return FALSE;
2620 }
2621 }
2622
2623 return TRUE;
2624 }
2625
2626 /* The number of dynamic relocations required by a static relocation. */
2627
2628 static int
2629 alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
2630 {
2631 switch (r_type)
2632 {
2633 /* May appear in GOT entries. */
2634 case R_ALPHA_TLSGD:
2635 return (dynamic ? 2 : shared ? 1 : 0);
2636 case R_ALPHA_TLSLDM:
2637 return shared;
2638 case R_ALPHA_LITERAL:
2639 return dynamic || shared;
2640 case R_ALPHA_GOTTPREL:
2641 return dynamic || (shared && !pie);
2642 case R_ALPHA_GOTDTPREL:
2643 return dynamic;
2644
2645 /* May appear in data sections. */
2646 case R_ALPHA_REFLONG:
2647 case R_ALPHA_REFQUAD:
2648 return dynamic || shared;
2649 case R_ALPHA_TPREL64:
2650 return dynamic || (shared && !pie);
2651
2652 /* Everything else is illegal. We'll issue an error during
2653 relocate_section. */
2654 default:
2655 return 0;
2656 }
2657 }
2658
2659 /* Work out the sizes of the dynamic relocation entries. */
2660
2661 static bfd_boolean
2662 elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2663 struct bfd_link_info *info)
2664 {
2665 bfd_boolean dynamic;
2666 struct alpha_elf_reloc_entry *relent;
2667 unsigned long entries;
2668
2669 /* If the symbol was defined as a common symbol in a regular object
2670 file, and there was no definition in any dynamic object, then the
2671 linker will have allocated space for the symbol in a common
2672 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2673 set. This is done for dynamic symbols in
2674 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2675 symbols, somehow. */
2676 if (!h->root.def_regular
2677 && h->root.ref_regular
2678 && !h->root.def_dynamic
2679 && (h->root.root.type == bfd_link_hash_defined
2680 || h->root.root.type == bfd_link_hash_defweak)
2681 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2682 h->root.def_regular = 1;
2683
2684 /* If the symbol is dynamic, we'll need all the relocations in their
2685 natural form. If this is a shared object, and it has been forced
2686 local, we'll need the same number of RELATIVE relocations. */
2687 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2688
2689 /* If the symbol is a hidden undefined weak, then we never have any
2690 relocations. Avoid the loop which may want to add RELATIVE relocs
2691 based on bfd_link_pic (info). */
2692 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2693 return TRUE;
2694
2695 for (relent = h->reloc_entries; relent; relent = relent->next)
2696 {
2697 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
2698 bfd_link_pic (info),
2699 bfd_link_pie (info));
2700 if (entries)
2701 {
2702 relent->srel->size +=
2703 entries * sizeof (Elf64_External_Rela) * relent->count;
2704 if (relent->reltext)
2705 info->flags |= DT_TEXTREL;
2706 }
2707 }
2708
2709 return TRUE;
2710 }
2711
2712 /* Subroutine of elf64_alpha_size_rela_got_section for doing the
2713 global symbols. */
2714
2715 static bfd_boolean
2716 elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2717 struct bfd_link_info *info)
2718 {
2719 bfd_boolean dynamic;
2720 struct alpha_elf_got_entry *gotent;
2721 unsigned long entries;
2722
2723 /* If we're using a plt for this symbol, then all of its relocations
2724 for its got entries go into .rela.plt. */
2725 if (h->root.needs_plt)
2726 return TRUE;
2727
2728 /* If the symbol is dynamic, we'll need all the relocations in their
2729 natural form. If this is a shared object, and it has been forced
2730 local, we'll need the same number of RELATIVE relocations. */
2731 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2732
2733 /* If the symbol is a hidden undefined weak, then we never have any
2734 relocations. Avoid the loop which may want to add RELATIVE relocs
2735 based on bfd_link_pic (info). */
2736 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2737 return TRUE;
2738
2739 entries = 0;
2740 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2741 if (gotent->use_count > 0)
2742 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
2743 bfd_link_pic (info),
2744 bfd_link_pie (info));
2745
2746 if (entries > 0)
2747 {
2748 asection *srel = elf_hash_table(info)->srelgot;
2749 BFD_ASSERT (srel != NULL);
2750 srel->size += sizeof (Elf64_External_Rela) * entries;
2751 }
2752
2753 return TRUE;
2754 }
2755
2756 /* Set the sizes of the dynamic relocation sections. */
2757
2758 static void
2759 elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
2760 {
2761 unsigned long entries;
2762 bfd *i;
2763 asection *srel;
2764 struct alpha_elf_link_hash_table * htab;
2765
2766 htab = alpha_elf_hash_table (info);
2767 if (htab == NULL)
2768 return;
2769
2770 /* Shared libraries often require RELATIVE relocs, and some relocs
2771 require attention for the main application as well. */
2772
2773 entries = 0;
2774 for (i = htab->got_list;
2775 i ; i = alpha_elf_tdata(i)->got_link_next)
2776 {
2777 bfd *j;
2778
2779 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2780 {
2781 struct alpha_elf_got_entry **local_got_entries, *gotent;
2782 int k, n;
2783
2784 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2785 if (!local_got_entries)
2786 continue;
2787
2788 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2789 for (gotent = local_got_entries[k];
2790 gotent ; gotent = gotent->next)
2791 if (gotent->use_count > 0)
2792 entries += (alpha_dynamic_entries_for_reloc
2793 (gotent->reloc_type, 0, bfd_link_pic (info),
2794 bfd_link_pie (info)));
2795 }
2796 }
2797
2798 srel = elf_hash_table(info)->srelgot;
2799 if (!srel)
2800 {
2801 BFD_ASSERT (entries == 0);
2802 return;
2803 }
2804 srel->size = sizeof (Elf64_External_Rela) * entries;
2805
2806 /* Now do the non-local symbols. */
2807 alpha_elf_link_hash_traverse (htab,
2808 elf64_alpha_size_rela_got_1, info);
2809 }
2810
2811 /* Set the sizes of the dynamic sections. */
2812
2813 static bfd_boolean
2814 elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2815 struct bfd_link_info *info)
2816 {
2817 bfd *dynobj;
2818 asection *s;
2819 bfd_boolean relplt, relocs;
2820 struct alpha_elf_link_hash_table * htab;
2821
2822 htab = alpha_elf_hash_table (info);
2823 if (htab == NULL)
2824 return FALSE;
2825
2826 dynobj = elf_hash_table(info)->dynobj;
2827 BFD_ASSERT(dynobj != NULL);
2828
2829 if (elf_hash_table (info)->dynamic_sections_created)
2830 {
2831 /* Set the contents of the .interp section to the interpreter. */
2832 if (bfd_link_executable (info) && !info->nointerp)
2833 {
2834 s = bfd_get_linker_section (dynobj, ".interp");
2835 BFD_ASSERT (s != NULL);
2836 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2837 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2838 }
2839
2840 /* Now that we've seen all of the input files, we can decide which
2841 symbols need dynamic relocation entries and which don't. We've
2842 collected information in check_relocs that we can now apply to
2843 size the dynamic relocation sections. */
2844 alpha_elf_link_hash_traverse (htab,
2845 elf64_alpha_calc_dynrel_sizes, info);
2846
2847 elf64_alpha_size_rela_got_section (info);
2848 elf64_alpha_size_plt_section (info);
2849 }
2850 /* else we're not dynamic and by definition we don't need such things. */
2851
2852 /* The check_relocs and adjust_dynamic_symbol entry points have
2853 determined the sizes of the various dynamic sections. Allocate
2854 memory for them. */
2855 relplt = FALSE;
2856 relocs = FALSE;
2857 for (s = dynobj->sections; s != NULL; s = s->next)
2858 {
2859 const char *name;
2860
2861 if (!(s->flags & SEC_LINKER_CREATED))
2862 continue;
2863
2864 /* It's OK to base decisions on the section name, because none
2865 of the dynobj section names depend upon the input files. */
2866 name = bfd_section_name (s);
2867
2868 if (CONST_STRNEQ (name, ".rela"))
2869 {
2870 if (s->size != 0)
2871 {
2872 if (strcmp (name, ".rela.plt") == 0)
2873 relplt = TRUE;
2874 else
2875 relocs = TRUE;
2876
2877 /* We use the reloc_count field as a counter if we need
2878 to copy relocs into the output file. */
2879 s->reloc_count = 0;
2880 }
2881 }
2882 else if (! CONST_STRNEQ (name, ".got")
2883 && strcmp (name, ".plt") != 0
2884 && strcmp (name, ".dynbss") != 0)
2885 {
2886 /* It's not one of our dynamic sections, so don't allocate space. */
2887 continue;
2888 }
2889
2890 if (s->size == 0)
2891 {
2892 /* If we don't need this section, strip it from the output file.
2893 This is to handle .rela.bss and .rela.plt. We must create it
2894 in create_dynamic_sections, because it must be created before
2895 the linker maps input sections to output sections. The
2896 linker does that before adjust_dynamic_symbol is called, and
2897 it is that function which decides whether anything needs to
2898 go into these sections. */
2899 if (!CONST_STRNEQ (name, ".got"))
2900 s->flags |= SEC_EXCLUDE;
2901 }
2902 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
2903 {
2904 /* Allocate memory for the section contents. */
2905 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2906 if (s->contents == NULL)
2907 return FALSE;
2908 }
2909 }
2910
2911 if (elf_hash_table (info)->dynamic_sections_created)
2912 {
2913 /* Add some entries to the .dynamic section. We fill in the
2914 values later, in elf64_alpha_finish_dynamic_sections, but we
2915 must add the entries now so that we get the correct size for
2916 the .dynamic section. The DT_DEBUG entry is filled in by the
2917 dynamic linker and used by the debugger. */
2918 #define add_dynamic_entry(TAG, VAL) \
2919 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2920
2921 if (bfd_link_executable (info))
2922 {
2923 if (!add_dynamic_entry (DT_DEBUG, 0))
2924 return FALSE;
2925 }
2926
2927 if (relplt)
2928 {
2929 if (!add_dynamic_entry (DT_PLTGOT, 0)
2930 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2931 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2932 || !add_dynamic_entry (DT_JMPREL, 0))
2933 return FALSE;
2934
2935 if (elf64_alpha_use_secureplt
2936 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2937 return FALSE;
2938 }
2939
2940 if (relocs)
2941 {
2942 if (!add_dynamic_entry (DT_RELA, 0)
2943 || !add_dynamic_entry (DT_RELASZ, 0)
2944 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2945 return FALSE;
2946
2947 if (info->flags & DF_TEXTREL)
2948 {
2949 if (!add_dynamic_entry (DT_TEXTREL, 0))
2950 return FALSE;
2951 }
2952 }
2953 }
2954 #undef add_dynamic_entry
2955
2956 return TRUE;
2957 }
2958 \f
2959 /* These functions do relaxation for Alpha ELF.
2960
2961 Currently I'm only handling what I can do with existing compiler
2962 and assembler support, which means no instructions are removed,
2963 though some may be nopped. At this time GCC does not emit enough
2964 information to do all of the relaxing that is possible. It will
2965 take some not small amount of work for that to happen.
2966
2967 There are a couple of interesting papers that I once read on this
2968 subject, that I cannot find references to at the moment, that
2969 related to Alpha in particular. They are by David Wall, then of
2970 DEC WRL. */
2971
2972 struct alpha_relax_info
2973 {
2974 bfd *abfd;
2975 asection *sec;
2976 bfd_byte *contents;
2977 Elf_Internal_Shdr *symtab_hdr;
2978 Elf_Internal_Rela *relocs, *relend;
2979 struct bfd_link_info *link_info;
2980 bfd_vma gp;
2981 bfd *gotobj;
2982 asection *tsec;
2983 struct alpha_elf_link_hash_entry *h;
2984 struct alpha_elf_got_entry **first_gotent;
2985 struct alpha_elf_got_entry *gotent;
2986 bfd_boolean changed_contents;
2987 bfd_boolean changed_relocs;
2988 unsigned char other;
2989 };
2990
2991 static Elf_Internal_Rela *
2992 elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2993 Elf_Internal_Rela *relend,
2994 bfd_vma offset, int type)
2995 {
2996 while (rel < relend)
2997 {
2998 if (rel->r_offset == offset
2999 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3000 return rel;
3001 ++rel;
3002 }
3003 return NULL;
3004 }
3005
3006 static bfd_boolean
3007 elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3008 Elf_Internal_Rela *irel, unsigned long r_type)
3009 {
3010 unsigned int insn;
3011 bfd_signed_vma disp;
3012
3013 /* Get the instruction. */
3014 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
3015
3016 if (insn >> 26 != OP_LDQ)
3017 {
3018 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
3019 _bfd_error_handler
3020 /* xgettext:c-format */
3021 (_("%pB: %pA+%#" PRIx64 ": warning: "
3022 "%s relocation against unexpected insn"),
3023 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
3024 return TRUE;
3025 }
3026
3027 /* Can't relax dynamic symbols. */
3028 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3029 return TRUE;
3030
3031 /* Can't use local-exec relocations in shared libraries. */
3032 if (r_type == R_ALPHA_GOTTPREL
3033 && bfd_link_dll (info->link_info))
3034 return TRUE;
3035
3036 if (r_type == R_ALPHA_LITERAL)
3037 {
3038 /* Look for nice constant addresses. This includes the not-uncommon
3039 special case of 0 for undefweak symbols. */
3040 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3041 || (!bfd_link_pic (info->link_info)
3042 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3043 {
3044 disp = 0;
3045 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3046 insn |= (symval & 0xffff);
3047 r_type = R_ALPHA_NONE;
3048 }
3049 else
3050 {
3051 /* We may only create GPREL relocs during the second pass. */
3052 if (info->link_info->relax_pass == 0)
3053 return TRUE;
3054
3055 disp = symval - info->gp;
3056 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3057 r_type = R_ALPHA_GPREL16;
3058 }
3059 }
3060 else
3061 {
3062 bfd_vma dtp_base, tp_base;
3063
3064 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3065 dtp_base = alpha_get_dtprel_base (info->link_info);
3066 tp_base = alpha_get_tprel_base (info->link_info);
3067 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
3068
3069 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3070
3071 switch (r_type)
3072 {
3073 case R_ALPHA_GOTDTPREL:
3074 r_type = R_ALPHA_DTPREL16;
3075 break;
3076 case R_ALPHA_GOTTPREL:
3077 r_type = R_ALPHA_TPREL16;
3078 break;
3079 default:
3080 BFD_ASSERT (0);
3081 return FALSE;
3082 }
3083 }
3084
3085 if (disp < -0x8000 || disp >= 0x8000)
3086 return TRUE;
3087
3088 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3089 info->changed_contents = TRUE;
3090
3091 /* Reduce the use count on this got entry by one, possibly
3092 eliminating it. */
3093 if (--info->gotent->use_count == 0)
3094 {
3095 int sz = alpha_got_entry_size (r_type);
3096 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3097 if (!info->h)
3098 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3099 }
3100
3101 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3102 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3103 info->changed_relocs = TRUE;
3104
3105 /* ??? Search forward through this basic block looking for insns
3106 that use the target register. Stop after an insn modifying the
3107 register is seen, or after a branch or call.
3108
3109 Any such memory load insn may be substituted by a load directly
3110 off the GP. This allows the memory load insn to be issued before
3111 the calculated GP register would otherwise be ready.
3112
3113 Any such jsr insn can be replaced by a bsr if it is in range.
3114
3115 This would mean that we'd have to _add_ relocations, the pain of
3116 which gives one pause. */
3117
3118 return TRUE;
3119 }
3120
3121 static bfd_vma
3122 elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
3123 {
3124 /* If the function has the same gp, and we can identify that the
3125 function does not use its function pointer, we can eliminate the
3126 address load. */
3127
3128 /* If the symbol is marked NOPV, we are being told the function never
3129 needs its procedure value. */
3130 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3131 return symval;
3132
3133 /* If the symbol is marked STD_GP, we are being told the function does
3134 a normal ldgp in the first two words. */
3135 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3136 ;
3137
3138 /* Otherwise, we may be able to identify a GP load in the first two
3139 words, which we can then skip. */
3140 else
3141 {
3142 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3143 bfd_vma ofs;
3144
3145 /* Load the relocations from the section that the target symbol is in. */
3146 if (info->sec == info->tsec)
3147 {
3148 tsec_relocs = info->relocs;
3149 tsec_relend = info->relend;
3150 tsec_free = NULL;
3151 }
3152 else
3153 {
3154 tsec_relocs = (_bfd_elf_link_read_relocs
3155 (info->abfd, info->tsec, NULL,
3156 (Elf_Internal_Rela *) NULL,
3157 info->link_info->keep_memory));
3158 if (tsec_relocs == NULL)
3159 return 0;
3160 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3161 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3162 ? NULL
3163 : tsec_relocs);
3164 }
3165
3166 /* Recover the symbol's offset within the section. */
3167 ofs = (symval - info->tsec->output_section->vma
3168 - info->tsec->output_offset);
3169
3170 /* Look for a GPDISP reloc. */
3171 gpdisp = (elf64_alpha_find_reloc_at_ofs
3172 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
3173
3174 if (!gpdisp || gpdisp->r_addend != 4)
3175 {
3176 if (tsec_free)
3177 free (tsec_free);
3178 return 0;
3179 }
3180 if (tsec_free)
3181 free (tsec_free);
3182 }
3183
3184 /* We've now determined that we can skip an initial gp load. Verify
3185 that the call and the target use the same gp. */
3186 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
3187 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3188 return 0;
3189
3190 return symval + 8;
3191 }
3192
3193 static bfd_boolean
3194 elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3195 bfd_vma symval, Elf_Internal_Rela *irel)
3196 {
3197 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3198 int flags;
3199 bfd_signed_vma disp;
3200 bfd_boolean fits16;
3201 bfd_boolean fits32;
3202 bfd_boolean lit_reused = FALSE;
3203 bfd_boolean all_optimized = TRUE;
3204 bfd_boolean changed_contents;
3205 bfd_boolean changed_relocs;
3206 bfd_byte *contents = info->contents;
3207 bfd *abfd = info->abfd;
3208 bfd_vma sec_output_vma;
3209 unsigned int lit_insn;
3210 int relax_pass;
3211
3212 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
3213 if (lit_insn >> 26 != OP_LDQ)
3214 {
3215 _bfd_error_handler
3216 /* xgettext:c-format */
3217 (_("%pB: %pA+%#" PRIx64 ": warning: "
3218 "%s relocation against unexpected insn"),
3219 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
3220 return TRUE;
3221 }
3222
3223 /* Can't relax dynamic symbols. */
3224 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3225 return TRUE;
3226
3227 changed_contents = info->changed_contents;
3228 changed_relocs = info->changed_relocs;
3229 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3230 relax_pass = info->link_info->relax_pass;
3231
3232 /* Summarize how this particular LITERAL is used. */
3233 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
3234 {
3235 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
3236 break;
3237 if (erel->r_addend <= 6)
3238 flags |= 1 << erel->r_addend;
3239 }
3240
3241 /* A little preparation for the loop... */
3242 disp = symval - info->gp;
3243
3244 for (urel = irel+1; urel < erel; ++urel)
3245 {
3246 bfd_vma urel_r_offset = urel->r_offset;
3247 unsigned int insn;
3248 int insn_disp;
3249 bfd_signed_vma xdisp;
3250 Elf_Internal_Rela nrel;
3251
3252 insn = bfd_get_32 (abfd, contents + urel_r_offset);
3253
3254 switch (urel->r_addend)
3255 {
3256 case LITUSE_ALPHA_ADDR:
3257 default:
3258 /* This type is really just a placeholder to note that all
3259 uses cannot be optimized, but to still allow some. */
3260 all_optimized = FALSE;
3261 break;
3262
3263 case LITUSE_ALPHA_BASE:
3264 /* We may only create GPREL relocs during the second pass. */
3265 if (relax_pass == 0)
3266 {
3267 all_optimized = FALSE;
3268 break;
3269 }
3270
3271 /* We can always optimize 16-bit displacements. */
3272
3273 /* Extract the displacement from the instruction, sign-extending
3274 it if necessary, then test whether it is within 16 or 32 bits
3275 displacement from GP. */
3276 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3277
3278 xdisp = disp + insn_disp;
3279 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3280 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3281 && xdisp < 0x7fff8000);
3282
3283 if (fits16)
3284 {
3285 /* Take the op code and dest from this insn, take the base
3286 register from the literal insn. Leave the offset alone. */
3287 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
3288 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3289 changed_contents = TRUE;
3290
3291 nrel = *urel;
3292 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3293 R_ALPHA_GPREL16);
3294 nrel.r_addend = irel->r_addend;
3295
3296 /* As we adjust, move the reloc to the end so that we don't
3297 break the LITERAL+LITUSE chain. */
3298 if (urel < --erel)
3299 *urel-- = *erel;
3300 *erel = nrel;
3301 changed_relocs = TRUE;
3302 }
3303
3304 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3305 else if (fits32 && !(flags & ~6))
3306 {
3307 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
3308
3309 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3310 R_ALPHA_GPRELHIGH);
3311 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
3312 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
3313 lit_reused = TRUE;
3314 changed_contents = TRUE;
3315
3316 /* Since all relocs must be optimized, don't bother swapping
3317 this relocation to the end. */
3318 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3319 R_ALPHA_GPRELLOW);
3320 urel->r_addend = irel->r_addend;
3321 changed_relocs = TRUE;
3322 }
3323 else
3324 all_optimized = FALSE;
3325 break;
3326
3327 case LITUSE_ALPHA_BYTOFF:
3328 /* We can always optimize byte instructions. */
3329
3330 /* FIXME: sanity check the insn for byte op. Check that the
3331 literal dest reg is indeed Rb in the byte insn. */
3332
3333 insn &= ~ (unsigned) 0x001ff000;
3334 insn |= ((symval & 7) << 13) | 0x1000;
3335 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3336 changed_contents = TRUE;
3337
3338 nrel = *urel;
3339 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3340 nrel.r_addend = 0;
3341
3342 /* As we adjust, move the reloc to the end so that we don't
3343 break the LITERAL+LITUSE chain. */
3344 if (urel < --erel)
3345 *urel-- = *erel;
3346 *erel = nrel;
3347 changed_relocs = TRUE;
3348 break;
3349
3350 case LITUSE_ALPHA_JSR:
3351 case LITUSE_ALPHA_TLSGD:
3352 case LITUSE_ALPHA_TLSLDM:
3353 case LITUSE_ALPHA_JSRDIRECT:
3354 {
3355 bfd_vma optdest, org;
3356 bfd_signed_vma odisp;
3357
3358 /* For undefined weak symbols, we're mostly interested in getting
3359 rid of the got entry whenever possible, so optimize this to a
3360 use of the zero register. */
3361 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3362 {
3363 insn |= 31 << 16;
3364 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3365
3366 changed_contents = TRUE;
3367 break;
3368 }
3369
3370 /* If not zero, place to jump without needing pv. */
3371 optdest = elf64_alpha_relax_opt_call (info, symval);
3372 org = sec_output_vma + urel_r_offset + 4;
3373 odisp = (optdest ? optdest : symval) - org;
3374
3375 if (odisp >= -0x400000 && odisp < 0x400000)
3376 {
3377 Elf_Internal_Rela *xrel;
3378
3379 /* Preserve branch prediction call stack when possible. */
3380 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3381 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3382 else
3383 insn = (OP_BR << 26) | (insn & 0x03e00000);
3384 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3385 changed_contents = TRUE;
3386
3387 nrel = *urel;
3388 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3389 R_ALPHA_BRADDR);
3390 nrel.r_addend = irel->r_addend;
3391
3392 if (optdest)
3393 nrel.r_addend += optdest - symval;
3394 else
3395 all_optimized = FALSE;
3396
3397 /* Kill any HINT reloc that might exist for this insn. */
3398 xrel = (elf64_alpha_find_reloc_at_ofs
3399 (info->relocs, info->relend, urel_r_offset,
3400 R_ALPHA_HINT));
3401 if (xrel)
3402 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3403
3404 /* As we adjust, move the reloc to the end so that we don't
3405 break the LITERAL+LITUSE chain. */
3406 if (urel < --erel)
3407 *urel-- = *erel;
3408 *erel = nrel;
3409
3410 info->changed_relocs = TRUE;
3411 }
3412 else
3413 all_optimized = FALSE;
3414
3415 /* Even if the target is not in range for a direct branch,
3416 if we share a GP, we can eliminate the gp reload. */
3417 if (optdest)
3418 {
3419 Elf_Internal_Rela *gpdisp
3420 = (elf64_alpha_find_reloc_at_ofs
3421 (info->relocs, irelend, urel_r_offset + 4,
3422 R_ALPHA_GPDISP));
3423 if (gpdisp)
3424 {
3425 bfd_byte *p_ldah = contents + gpdisp->r_offset;
3426 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
3427 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3428 unsigned int lda = bfd_get_32 (abfd, p_lda);
3429
3430 /* Verify that the instruction is "ldah $29,0($26)".
3431 Consider a function that ends in a noreturn call,
3432 and that the next function begins with an ldgp,
3433 and that by accident there is no padding between.
3434 In that case the insn would use $27 as the base. */
3435 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3436 {
3437 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3438 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
3439
3440 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3441 changed_contents = TRUE;
3442 changed_relocs = TRUE;
3443 }
3444 }
3445 }
3446 }
3447 break;
3448 }
3449 }
3450
3451 /* If we reused the literal instruction, we must have optimized all. */
3452 BFD_ASSERT(!lit_reused || all_optimized);
3453
3454 /* If all cases were optimized, we can reduce the use count on this
3455 got entry by one, possibly eliminating it. */
3456 if (all_optimized)
3457 {
3458 if (--info->gotent->use_count == 0)
3459 {
3460 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3461 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3462 if (!info->h)
3463 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3464 }
3465
3466 /* If the literal instruction is no longer needed (it may have been
3467 reused. We can eliminate it. */
3468 /* ??? For now, I don't want to deal with compacting the section,
3469 so just nop it out. */
3470 if (!lit_reused)
3471 {
3472 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3473 changed_relocs = TRUE;
3474
3475 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3476 changed_contents = TRUE;
3477 }
3478 }
3479
3480 info->changed_contents = changed_contents;
3481 info->changed_relocs = changed_relocs;
3482
3483 if (all_optimized || relax_pass == 0)
3484 return TRUE;
3485 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
3486 }
3487
3488 static bfd_boolean
3489 elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3490 Elf_Internal_Rela *irel, bfd_boolean is_gd)
3491 {
3492 bfd_byte *pos[5];
3493 unsigned int insn, tlsgd_reg;
3494 Elf_Internal_Rela *gpdisp, *hint;
3495 bfd_boolean dynamic, use_gottprel;
3496 unsigned long new_symndx;
3497
3498 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
3499
3500 /* If a TLS symbol is accessed using IE at least once, there is no point
3501 to use dynamic model for it. */
3502 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3503 ;
3504
3505 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3506 then we might as well relax to IE. */
3507 else if (bfd_link_pic (info->link_info) && !dynamic
3508 && (info->link_info->flags & DF_STATIC_TLS))
3509 ;
3510
3511 /* Otherwise we must be building an executable to do anything. */
3512 else if (bfd_link_pic (info->link_info))
3513 return TRUE;
3514
3515 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3516 the matching LITUSE_TLS relocations. */
3517 if (irel + 2 >= info->relend)
3518 return TRUE;
3519 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3520 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3521 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3522 return TRUE;
3523
3524 /* There must be a GPDISP relocation positioned immediately after the
3525 LITUSE relocation. */
3526 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3527 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3528 if (!gpdisp)
3529 return TRUE;
3530
3531 pos[0] = info->contents + irel[0].r_offset;
3532 pos[1] = info->contents + irel[1].r_offset;
3533 pos[2] = info->contents + irel[2].r_offset;
3534 pos[3] = info->contents + gpdisp->r_offset;
3535 pos[4] = pos[3] + gpdisp->r_addend;
3536
3537 /* Beware of the compiler hoisting part of the sequence out a loop
3538 and adjusting the destination register for the TLSGD insn. If this
3539 happens, there will be a move into $16 before the JSR insn, so only
3540 transformations of the first insn pair should use this register. */
3541 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3542 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3543
3544 /* Generally, the positions are not allowed to be out of order, lest the
3545 modified insn sequence have different register lifetimes. We can make
3546 an exception when pos 1 is adjacent to pos 0. */
3547 if (pos[1] + 4 == pos[0])
3548 {
3549 bfd_byte *tmp = pos[0];
3550 pos[0] = pos[1];
3551 pos[1] = tmp;
3552 }
3553 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3554 return TRUE;
3555
3556 /* Reduce the use count on the LITERAL relocation. Do this before we
3557 smash the symndx when we adjust the relocations below. */
3558 {
3559 struct alpha_elf_got_entry *lit_gotent;
3560 struct alpha_elf_link_hash_entry *lit_h;
3561 unsigned long indx;
3562
3563 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3564 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3565 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
3566
3567 while (lit_h->root.root.type == bfd_link_hash_indirect
3568 || lit_h->root.root.type == bfd_link_hash_warning)
3569 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
3570
3571 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3572 lit_gotent = lit_gotent->next)
3573 if (lit_gotent->gotobj == info->gotobj
3574 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3575 && lit_gotent->addend == irel[1].r_addend)
3576 break;
3577 BFD_ASSERT (lit_gotent);
3578
3579 if (--lit_gotent->use_count == 0)
3580 {
3581 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3582 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3583 }
3584 }
3585
3586 /* Change
3587
3588 lda $16,x($gp) !tlsgd!1
3589 ldq $27,__tls_get_addr($gp) !literal!1
3590 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3591 ldah $29,0($26) !gpdisp!2
3592 lda $29,0($29) !gpdisp!2
3593 to
3594 ldq $16,x($gp) !gottprel
3595 unop
3596 call_pal rduniq
3597 addq $16,$0,$0
3598 unop
3599 or the first pair to
3600 lda $16,x($gp) !tprel
3601 unop
3602 or
3603 ldah $16,x($gp) !tprelhi
3604 lda $16,x($16) !tprello
3605
3606 as appropriate. */
3607
3608 use_gottprel = FALSE;
3609 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
3610
3611 /* Some compilers warn about a Boolean-looking expression being
3612 used in a switch. The explicit cast silences them. */
3613 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
3614 {
3615 case 1:
3616 {
3617 bfd_vma tp_base;
3618 bfd_signed_vma disp;
3619
3620 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3621 tp_base = alpha_get_tprel_base (info->link_info);
3622 disp = symval - tp_base;
3623
3624 if (disp >= -0x8000 && disp < 0x8000)
3625 {
3626 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
3627 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3628 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3629
3630 irel[0].r_offset = pos[0] - info->contents;
3631 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3632 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3633 break;
3634 }
3635 else if (disp >= -(bfd_signed_vma) 0x80000000
3636 && disp < (bfd_signed_vma) 0x7fff8000
3637 && pos[0] + 4 == pos[1])
3638 {
3639 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
3640 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3641 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
3642 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3643
3644 irel[0].r_offset = pos[0] - info->contents;
3645 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3646 irel[1].r_offset = pos[1] - info->contents;
3647 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3648 break;
3649 }
3650 }
3651 /* FALLTHRU */
3652
3653 default:
3654 use_gottprel = TRUE;
3655
3656 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
3657 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3658 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3659
3660 irel[0].r_offset = pos[0] - info->contents;
3661 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3662 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3663 break;
3664 }
3665
3666 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
3667
3668 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3669 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3670
3671 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
3672
3673 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3674 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3675
3676 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3677 irel[2].r_offset, R_ALPHA_HINT);
3678 if (hint)
3679 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3680
3681 info->changed_contents = TRUE;
3682 info->changed_relocs = TRUE;
3683
3684 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3685 if (--info->gotent->use_count == 0)
3686 {
3687 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3688 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3689 if (!info->h)
3690 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3691 }
3692
3693 /* If we've switched to a GOTTPREL relocation, increment the reference
3694 count on that got entry. */
3695 if (use_gottprel)
3696 {
3697 struct alpha_elf_got_entry *tprel_gotent;
3698
3699 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3700 tprel_gotent = tprel_gotent->next)
3701 if (tprel_gotent->gotobj == info->gotobj
3702 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3703 && tprel_gotent->addend == irel->r_addend)
3704 break;
3705 if (tprel_gotent)
3706 tprel_gotent->use_count++;
3707 else
3708 {
3709 if (info->gotent->use_count == 0)
3710 tprel_gotent = info->gotent;
3711 else
3712 {
3713 tprel_gotent = (struct alpha_elf_got_entry *)
3714 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3715 if (!tprel_gotent)
3716 return FALSE;
3717
3718 tprel_gotent->next = *info->first_gotent;
3719 *info->first_gotent = tprel_gotent;
3720
3721 tprel_gotent->gotobj = info->gotobj;
3722 tprel_gotent->addend = irel->r_addend;
3723 tprel_gotent->got_offset = -1;
3724 tprel_gotent->reloc_done = 0;
3725 tprel_gotent->reloc_xlated = 0;
3726 }
3727
3728 tprel_gotent->use_count = 1;
3729 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3730 }
3731 }
3732
3733 return TRUE;
3734 }
3735
3736 static bfd_boolean
3737 elf64_alpha_relax_section (bfd *abfd, asection *sec,
3738 struct bfd_link_info *link_info, bfd_boolean *again)
3739 {
3740 Elf_Internal_Shdr *symtab_hdr;
3741 Elf_Internal_Rela *internal_relocs;
3742 Elf_Internal_Rela *irel, *irelend;
3743 Elf_Internal_Sym *isymbuf = NULL;
3744 struct alpha_elf_got_entry **local_got_entries;
3745 struct alpha_relax_info info;
3746 struct alpha_elf_link_hash_table * htab;
3747 int relax_pass;
3748
3749 htab = alpha_elf_hash_table (link_info);
3750 if (htab == NULL)
3751 return FALSE;
3752
3753 /* There's nothing to change, yet. */
3754 *again = FALSE;
3755
3756 if (bfd_link_relocatable (link_info)
3757 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3758 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3759 || sec->reloc_count == 0)
3760 return TRUE;
3761
3762 BFD_ASSERT (is_alpha_elf (abfd));
3763 relax_pass = link_info->relax_pass;
3764
3765 /* Make sure our GOT and PLT tables are up-to-date. */
3766 if (htab->relax_trip != link_info->relax_trip)
3767 {
3768 htab->relax_trip = link_info->relax_trip;
3769
3770 /* This should never fail after the initial round, since the only error
3771 is GOT overflow, and relaxation only shrinks the table. However, we
3772 may only merge got sections during the first pass. If we merge
3773 sections after we've created GPREL relocs, the GP for the merged
3774 section backs up which may put the relocs out of range. */
3775 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
3776 abort ();
3777 if (elf_hash_table (link_info)->dynamic_sections_created)
3778 {
3779 elf64_alpha_size_plt_section (link_info);
3780 elf64_alpha_size_rela_got_section (link_info);
3781 }
3782 }
3783
3784 symtab_hdr = &elf_symtab_hdr (abfd);
3785 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
3786
3787 /* Load the relocations for this section. */
3788 internal_relocs = (_bfd_elf_link_read_relocs
3789 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
3790 link_info->keep_memory));
3791 if (internal_relocs == NULL)
3792 return FALSE;
3793
3794 memset(&info, 0, sizeof (info));
3795 info.abfd = abfd;
3796 info.sec = sec;
3797 info.link_info = link_info;
3798 info.symtab_hdr = symtab_hdr;
3799 info.relocs = internal_relocs;
3800 info.relend = irelend = internal_relocs + sec->reloc_count;
3801
3802 /* Find the GP for this object. Do not store the result back via
3803 _bfd_set_gp_value, since this could change again before final. */
3804 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3805 if (info.gotobj)
3806 {
3807 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3808 info.gp = (sgot->output_section->vma
3809 + sgot->output_offset
3810 + 0x8000);
3811 }
3812
3813 /* Get the section contents. */
3814 if (elf_section_data (sec)->this_hdr.contents != NULL)
3815 info.contents = elf_section_data (sec)->this_hdr.contents;
3816 else
3817 {
3818 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3819 goto error_return;
3820 }
3821
3822 for (irel = internal_relocs; irel < irelend; irel++)
3823 {
3824 bfd_vma symval;
3825 struct alpha_elf_got_entry *gotent;
3826 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3827 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3828
3829 /* Early exit for unhandled or unrelaxable relocations. */
3830 if (r_type != R_ALPHA_LITERAL)
3831 {
3832 /* We complete everything except LITERAL in the first pass. */
3833 if (relax_pass != 0)
3834 continue;
3835 if (r_type == R_ALPHA_TLSLDM)
3836 {
3837 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3838 reloc to the STN_UNDEF (0) symbol so that they all match. */
3839 r_symndx = STN_UNDEF;
3840 }
3841 else if (r_type != R_ALPHA_GOTDTPREL
3842 && r_type != R_ALPHA_GOTTPREL
3843 && r_type != R_ALPHA_TLSGD)
3844 continue;
3845 }
3846
3847 /* Get the value of the symbol referred to by the reloc. */
3848 if (r_symndx < symtab_hdr->sh_info)
3849 {
3850 /* A local symbol. */
3851 Elf_Internal_Sym *isym;
3852
3853 /* Read this BFD's local symbols. */
3854 if (isymbuf == NULL)
3855 {
3856 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3857 if (isymbuf == NULL)
3858 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3859 symtab_hdr->sh_info, 0,
3860 NULL, NULL, NULL);
3861 if (isymbuf == NULL)
3862 goto error_return;
3863 }
3864
3865 isym = isymbuf + r_symndx;
3866
3867 /* Given the symbol for a TLSLDM reloc is ignored, this also
3868 means forcing the symbol value to the tp base. */
3869 if (r_type == R_ALPHA_TLSLDM)
3870 {
3871 info.tsec = bfd_abs_section_ptr;
3872 symval = alpha_get_tprel_base (info.link_info);
3873 }
3874 else
3875 {
3876 symval = isym->st_value;
3877 if (isym->st_shndx == SHN_UNDEF)
3878 continue;
3879 else if (isym->st_shndx == SHN_ABS)
3880 info.tsec = bfd_abs_section_ptr;
3881 else if (isym->st_shndx == SHN_COMMON)
3882 info.tsec = bfd_com_section_ptr;
3883 else
3884 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3885 }
3886
3887 info.h = NULL;
3888 info.other = isym->st_other;
3889 if (local_got_entries)
3890 info.first_gotent = &local_got_entries[r_symndx];
3891 else
3892 {
3893 info.first_gotent = &info.gotent;
3894 info.gotent = NULL;
3895 }
3896 }
3897 else
3898 {
3899 unsigned long indx;
3900 struct alpha_elf_link_hash_entry *h;
3901
3902 indx = r_symndx - symtab_hdr->sh_info;
3903 h = alpha_elf_sym_hashes (abfd)[indx];
3904 BFD_ASSERT (h != NULL);
3905
3906 while (h->root.root.type == bfd_link_hash_indirect
3907 || h->root.root.type == bfd_link_hash_warning)
3908 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
3909
3910 /* If the symbol is undefined, we can't do anything with it. */
3911 if (h->root.root.type == bfd_link_hash_undefined)
3912 continue;
3913
3914 /* If the symbol isn't defined in the current module,
3915 again we can't do anything. */
3916 if (h->root.root.type == bfd_link_hash_undefweak)
3917 {
3918 info.tsec = bfd_abs_section_ptr;
3919 symval = 0;
3920 }
3921 else if (!h->root.def_regular)
3922 {
3923 /* Except for TLSGD relocs, which can sometimes be
3924 relaxed to GOTTPREL relocs. */
3925 if (r_type != R_ALPHA_TLSGD)
3926 continue;
3927 info.tsec = bfd_abs_section_ptr;
3928 symval = 0;
3929 }
3930 else
3931 {
3932 info.tsec = h->root.root.u.def.section;
3933 symval = h->root.root.u.def.value;
3934 }
3935
3936 info.h = h;
3937 info.other = h->root.other;
3938 info.first_gotent = &h->got_entries;
3939 }
3940
3941 /* Search for the got entry to be used by this relocation. */
3942 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3943 if (gotent->gotobj == info.gotobj
3944 && gotent->reloc_type == r_type
3945 && gotent->addend == irel->r_addend)
3946 break;
3947 info.gotent = gotent;
3948
3949 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3950 symval += irel->r_addend;
3951
3952 switch (r_type)
3953 {
3954 case R_ALPHA_LITERAL:
3955 BFD_ASSERT(info.gotent != NULL);
3956
3957 /* If there exist LITUSE relocations immediately following, this
3958 opens up all sorts of interesting optimizations, because we
3959 now know every location that this address load is used. */
3960 if (irel+1 < irelend
3961 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
3962 {
3963 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3964 goto error_return;
3965 }
3966 else
3967 {
3968 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3969 goto error_return;
3970 }
3971 break;
3972
3973 case R_ALPHA_GOTDTPREL:
3974 case R_ALPHA_GOTTPREL:
3975 BFD_ASSERT(info.gotent != NULL);
3976 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3977 goto error_return;
3978 break;
3979
3980 case R_ALPHA_TLSGD:
3981 case R_ALPHA_TLSLDM:
3982 BFD_ASSERT(info.gotent != NULL);
3983 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3984 r_type == R_ALPHA_TLSGD))
3985 goto error_return;
3986 break;
3987 }
3988 }
3989
3990 if (isymbuf != NULL
3991 && symtab_hdr->contents != (unsigned char *) isymbuf)
3992 {
3993 if (!link_info->keep_memory)
3994 free (isymbuf);
3995 else
3996 {
3997 /* Cache the symbols for elf_link_input_bfd. */
3998 symtab_hdr->contents = (unsigned char *) isymbuf;
3999 }
4000 }
4001
4002 if (info.contents != NULL
4003 && elf_section_data (sec)->this_hdr.contents != info.contents)
4004 {
4005 if (!info.changed_contents && !link_info->keep_memory)
4006 free (info.contents);
4007 else
4008 {
4009 /* Cache the section contents for elf_link_input_bfd. */
4010 elf_section_data (sec)->this_hdr.contents = info.contents;
4011 }
4012 }
4013
4014 if (elf_section_data (sec)->relocs != internal_relocs)
4015 {
4016 if (!info.changed_relocs)
4017 free (internal_relocs);
4018 else
4019 elf_section_data (sec)->relocs = internal_relocs;
4020 }
4021
4022 *again = info.changed_contents || info.changed_relocs;
4023
4024 return TRUE;
4025
4026 error_return:
4027 if (isymbuf != NULL
4028 && symtab_hdr->contents != (unsigned char *) isymbuf)
4029 free (isymbuf);
4030 if (info.contents != NULL
4031 && elf_section_data (sec)->this_hdr.contents != info.contents)
4032 free (info.contents);
4033 if (internal_relocs != NULL
4034 && elf_section_data (sec)->relocs != internal_relocs)
4035 free (internal_relocs);
4036 return FALSE;
4037 }
4038 \f
4039 /* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4040 into the next available slot in SREL. */
4041
4042 static void
4043 elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4044 asection *sec, asection *srel, bfd_vma offset,
4045 long dynindx, long rtype, bfd_vma addend)
4046 {
4047 Elf_Internal_Rela outrel;
4048 bfd_byte *loc;
4049
4050 BFD_ASSERT (srel != NULL);
4051
4052 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4053 outrel.r_addend = addend;
4054
4055 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4056 if ((offset | 1) != (bfd_vma) -1)
4057 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4058 else
4059 memset (&outrel, 0, sizeof (outrel));
4060
4061 loc = srel->contents;
4062 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4063 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
4064 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
4065 }
4066
4067 /* Relocate an Alpha ELF section for a relocatable link.
4068
4069 We don't have to change anything unless the reloc is against a section
4070 symbol, in which case we have to adjust according to where the section
4071 symbol winds up in the output section. */
4072
4073 static bfd_boolean
4074 elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4075 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4076 bfd *input_bfd, asection *input_section,
4077 bfd_byte *contents ATTRIBUTE_UNUSED,
4078 Elf_Internal_Rela *relocs,
4079 Elf_Internal_Sym *local_syms,
4080 asection **local_sections)
4081 {
4082 unsigned long symtab_hdr_sh_info;
4083 Elf_Internal_Rela *rel;
4084 Elf_Internal_Rela *relend;
4085 struct elf_link_hash_entry **sym_hashes;
4086 bfd_boolean ret_val = TRUE;
4087
4088 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
4089 sym_hashes = elf_sym_hashes (input_bfd);
4090
4091 relend = relocs + input_section->reloc_count;
4092 for (rel = relocs; rel < relend; rel++)
4093 {
4094 unsigned long r_symndx;
4095 Elf_Internal_Sym *sym;
4096 asection *sec;
4097 unsigned long r_type;
4098
4099 r_type = ELF64_R_TYPE (rel->r_info);
4100 if (r_type >= R_ALPHA_max)
4101 {
4102 _bfd_error_handler
4103 /* xgettext:c-format */
4104 (_("%pB: unsupported relocation type %#x"),
4105 input_bfd, (int) r_type);
4106 bfd_set_error (bfd_error_bad_value);
4107 ret_val = FALSE;
4108 continue;
4109 }
4110
4111 /* The symbol associated with GPDISP and LITUSE is
4112 immaterial. Only the addend is significant. */
4113 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4114 continue;
4115
4116 r_symndx = ELF64_R_SYM (rel->r_info);
4117 if (r_symndx < symtab_hdr_sh_info)
4118 {
4119 sym = local_syms + r_symndx;
4120 sec = local_sections[r_symndx];
4121 }
4122 else
4123 {
4124 struct elf_link_hash_entry *h;
4125
4126 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4127
4128 while (h->root.type == bfd_link_hash_indirect
4129 || h->root.type == bfd_link_hash_warning)
4130 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4131
4132 if (h->root.type != bfd_link_hash_defined
4133 && h->root.type != bfd_link_hash_defweak)
4134 continue;
4135
4136 sym = NULL;
4137 sec = h->root.u.def.section;
4138 }
4139
4140 if (sec != NULL && discarded_section (sec))
4141 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4142 rel, 1, relend,
4143 elf64_alpha_howto_table + r_type, 0,
4144 contents);
4145
4146 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4147 rel->r_addend += sec->output_offset;
4148 }
4149
4150 return ret_val;
4151 }
4152
4153 /* Relocate an Alpha ELF section. */
4154
4155 static bfd_boolean
4156 elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4157 bfd *input_bfd, asection *input_section,
4158 bfd_byte *contents, Elf_Internal_Rela *relocs,
4159 Elf_Internal_Sym *local_syms,
4160 asection **local_sections)
4161 {
4162 Elf_Internal_Shdr *symtab_hdr;
4163 Elf_Internal_Rela *rel;
4164 Elf_Internal_Rela *relend;
4165 asection *sgot, *srel, *srelgot;
4166 bfd *dynobj, *gotobj;
4167 bfd_vma gp, tp_base, dtp_base;
4168 struct alpha_elf_got_entry **local_got_entries;
4169 bfd_boolean ret_val;
4170
4171 BFD_ASSERT (is_alpha_elf (input_bfd));
4172
4173 /* Handle relocatable links with a smaller loop. */
4174 if (bfd_link_relocatable (info))
4175 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4176 input_section, contents, relocs,
4177 local_syms, local_sections);
4178
4179 /* This is a final link. */
4180
4181 ret_val = TRUE;
4182
4183 symtab_hdr = &elf_symtab_hdr (input_bfd);
4184
4185 dynobj = elf_hash_table (info)->dynobj;
4186 srelgot = elf_hash_table (info)->srelgot;
4187
4188 if (input_section->flags & SEC_ALLOC)
4189 {
4190 const char *section_name;
4191 section_name = (bfd_elf_string_from_elf_section
4192 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
4193 _bfd_elf_single_rel_hdr (input_section)->sh_name));
4194 BFD_ASSERT(section_name != NULL);
4195 srel = bfd_get_linker_section (dynobj, section_name);
4196 }
4197 else
4198 srel = NULL;
4199
4200 /* Find the gp value for this input bfd. */
4201 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4202 if (gotobj)
4203 {
4204 sgot = alpha_elf_tdata (gotobj)->got;
4205 gp = _bfd_get_gp_value (gotobj);
4206 if (gp == 0)
4207 {
4208 gp = (sgot->output_section->vma
4209 + sgot->output_offset
4210 + 0x8000);
4211 _bfd_set_gp_value (gotobj, gp);
4212 }
4213 }
4214 else
4215 {
4216 sgot = NULL;
4217 gp = 0;
4218 }
4219
4220 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4221
4222 if (elf_hash_table (info)->tls_sec != NULL)
4223 {
4224 dtp_base = alpha_get_dtprel_base (info);
4225 tp_base = alpha_get_tprel_base (info);
4226 }
4227 else
4228 dtp_base = tp_base = 0;
4229
4230 relend = relocs + input_section->reloc_count;
4231 for (rel = relocs; rel < relend; rel++)
4232 {
4233 struct alpha_elf_link_hash_entry *h = NULL;
4234 struct alpha_elf_got_entry *gotent;
4235 bfd_reloc_status_type r;
4236 reloc_howto_type *howto;
4237 unsigned long r_symndx;
4238 Elf_Internal_Sym *sym = NULL;
4239 asection *sec = NULL;
4240 bfd_vma value;
4241 bfd_vma addend;
4242 bfd_boolean dynamic_symbol_p;
4243 bfd_boolean unresolved_reloc = FALSE;
4244 bfd_boolean undef_weak_ref = FALSE;
4245 unsigned long r_type;
4246
4247 r_type = ELF64_R_TYPE(rel->r_info);
4248 if (r_type >= R_ALPHA_max)
4249 {
4250 _bfd_error_handler
4251 /* xgettext:c-format */
4252 (_("%pB: unsupported relocation type %#x"),
4253 input_bfd, (int) r_type);
4254 bfd_set_error (bfd_error_bad_value);
4255 ret_val = FALSE;
4256 continue;
4257 }
4258
4259 howto = elf64_alpha_howto_table + r_type;
4260 r_symndx = ELF64_R_SYM(rel->r_info);
4261
4262 /* The symbol for a TLSLDM reloc is ignored. Collapse the
4263 reloc to the STN_UNDEF (0) symbol so that they all match. */
4264 if (r_type == R_ALPHA_TLSLDM)
4265 r_symndx = STN_UNDEF;
4266
4267 if (r_symndx < symtab_hdr->sh_info)
4268 {
4269 asection *msec;
4270 sym = local_syms + r_symndx;
4271 sec = local_sections[r_symndx];
4272 msec = sec;
4273 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
4274
4275 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
4276 this is hackery from relax_section. Force the value to
4277 be the tls module base. */
4278 if (r_symndx == STN_UNDEF
4279 && (r_type == R_ALPHA_TLSLDM
4280 || r_type == R_ALPHA_GOTTPREL
4281 || r_type == R_ALPHA_TPREL64
4282 || r_type == R_ALPHA_TPRELHI
4283 || r_type == R_ALPHA_TPRELLO
4284 || r_type == R_ALPHA_TPREL16))
4285 value = dtp_base;
4286
4287 if (local_got_entries)
4288 gotent = local_got_entries[r_symndx];
4289 else
4290 gotent = NULL;
4291
4292 /* Need to adjust local GOT entries' addends for SEC_MERGE
4293 unless it has been done already. */
4294 if ((sec->flags & SEC_MERGE)
4295 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
4296 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
4297 && gotent
4298 && !gotent->reloc_xlated)
4299 {
4300 struct alpha_elf_got_entry *ent;
4301
4302 for (ent = gotent; ent; ent = ent->next)
4303 {
4304 ent->reloc_xlated = 1;
4305 if (ent->use_count == 0)
4306 continue;
4307 msec = sec;
4308 ent->addend =
4309 _bfd_merged_section_offset (output_bfd, &msec,
4310 elf_section_data (sec)->
4311 sec_info,
4312 sym->st_value + ent->addend);
4313 ent->addend -= sym->st_value;
4314 ent->addend += msec->output_section->vma
4315 + msec->output_offset
4316 - sec->output_section->vma
4317 - sec->output_offset;
4318 }
4319 }
4320
4321 dynamic_symbol_p = FALSE;
4322 }
4323 else
4324 {
4325 bfd_boolean warned, ignored;
4326 struct elf_link_hash_entry *hh;
4327 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4328
4329 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4330 r_symndx, symtab_hdr, sym_hashes,
4331 hh, sec, value,
4332 unresolved_reloc, warned, ignored);
4333
4334 if (warned)
4335 continue;
4336
4337 if (value == 0
4338 && ! unresolved_reloc
4339 && hh->root.type == bfd_link_hash_undefweak)
4340 undef_weak_ref = TRUE;
4341
4342 h = (struct alpha_elf_link_hash_entry *) hh;
4343 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4344 gotent = h->got_entries;
4345 }
4346
4347 if (sec != NULL && discarded_section (sec))
4348 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4349 rel, 1, relend, howto, 0, contents);
4350
4351 addend = rel->r_addend;
4352 value += addend;
4353
4354 /* Search for the proper got entry. */
4355 for (; gotent ; gotent = gotent->next)
4356 if (gotent->gotobj == gotobj
4357 && gotent->reloc_type == r_type
4358 && gotent->addend == addend)
4359 break;
4360
4361 switch (r_type)
4362 {
4363 case R_ALPHA_GPDISP:
4364 {
4365 bfd_byte *p_ldah, *p_lda;
4366
4367 BFD_ASSERT(gp != 0);
4368
4369 value = (input_section->output_section->vma
4370 + input_section->output_offset
4371 + rel->r_offset);
4372
4373 p_ldah = contents + rel->r_offset;
4374 p_lda = p_ldah + rel->r_addend;
4375
4376 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
4377 p_ldah, p_lda);
4378 }
4379 break;
4380
4381 case R_ALPHA_LITERAL:
4382 BFD_ASSERT(sgot != NULL);
4383 BFD_ASSERT(gp != 0);
4384 BFD_ASSERT(gotent != NULL);
4385 BFD_ASSERT(gotent->use_count >= 1);
4386
4387 if (!gotent->reloc_done)
4388 {
4389 gotent->reloc_done = 1;
4390
4391 bfd_put_64 (output_bfd, value,
4392 sgot->contents + gotent->got_offset);
4393
4394 /* If the symbol has been forced local, output a
4395 RELATIVE reloc, otherwise it will be handled in
4396 finish_dynamic_symbol. */
4397 if (bfd_link_pic (info)
4398 && !dynamic_symbol_p
4399 && !undef_weak_ref)
4400 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4401 gotent->got_offset, 0,
4402 R_ALPHA_RELATIVE, value);
4403 }
4404
4405 value = (sgot->output_section->vma
4406 + sgot->output_offset
4407 + gotent->got_offset);
4408 value -= gp;
4409 goto default_reloc;
4410
4411 case R_ALPHA_GPREL32:
4412 case R_ALPHA_GPREL16:
4413 case R_ALPHA_GPRELLOW:
4414 if (dynamic_symbol_p)
4415 {
4416 _bfd_error_handler
4417 /* xgettext:c-format */
4418 (_("%pB: gp-relative relocation against dynamic symbol %s"),
4419 input_bfd, h->root.root.root.string);
4420 ret_val = FALSE;
4421 }
4422 BFD_ASSERT(gp != 0);
4423 value -= gp;
4424 goto default_reloc;
4425
4426 case R_ALPHA_GPRELHIGH:
4427 if (dynamic_symbol_p)
4428 {
4429 _bfd_error_handler
4430 /* xgettext:c-format */
4431 (_("%pB: gp-relative relocation against dynamic symbol %s"),
4432 input_bfd, h->root.root.root.string);
4433 ret_val = FALSE;
4434 }
4435 BFD_ASSERT(gp != 0);
4436 value -= gp;
4437 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4438 goto default_reloc;
4439
4440 case R_ALPHA_HINT:
4441 /* A call to a dynamic symbol is definitely out of range of
4442 the 16-bit displacement. Don't bother writing anything. */
4443 if (dynamic_symbol_p)
4444 {
4445 r = bfd_reloc_ok;
4446 break;
4447 }
4448 /* The regular PC-relative stuff measures from the start of
4449 the instruction rather than the end. */
4450 value -= 4;
4451 goto default_reloc;
4452
4453 case R_ALPHA_BRADDR:
4454 if (dynamic_symbol_p)
4455 {
4456 _bfd_error_handler
4457 /* xgettext:c-format */
4458 (_("%pB: pc-relative relocation against dynamic symbol %s"),
4459 input_bfd, h->root.root.root.string);
4460 ret_val = FALSE;
4461 }
4462 /* The regular PC-relative stuff measures from the start of
4463 the instruction rather than the end. */
4464 value -= 4;
4465 goto default_reloc;
4466
4467 case R_ALPHA_BRSGP:
4468 {
4469 int other;
4470 const char *name;
4471
4472 /* The regular PC-relative stuff measures from the start of
4473 the instruction rather than the end. */
4474 value -= 4;
4475
4476 /* The source and destination gp must be the same. Note that
4477 the source will always have an assigned gp, since we forced
4478 one in check_relocs, but that the destination may not, as
4479 it might not have had any relocations at all. Also take
4480 care not to crash if H is an undefined symbol. */
4481 if (h != NULL && sec != NULL
4482 && alpha_elf_tdata (sec->owner)->gotobj
4483 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4484 {
4485 _bfd_error_handler
4486 /* xgettext:c-format */
4487 (_("%pB: change in gp: BRSGP %s"),
4488 input_bfd, h->root.root.root.string);
4489 ret_val = FALSE;
4490 }
4491
4492 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4493 if (h != NULL)
4494 other = h->root.other;
4495 else
4496 other = sym->st_other;
4497 switch (other & STO_ALPHA_STD_GPLOAD)
4498 {
4499 case STO_ALPHA_NOPV:
4500 break;
4501 case STO_ALPHA_STD_GPLOAD:
4502 value += 8;
4503 break;
4504 default:
4505 if (h != NULL)
4506 name = h->root.root.root.string;
4507 else
4508 {
4509 name = (bfd_elf_string_from_elf_section
4510 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4511 if (name == NULL)
4512 name = _("<unknown>");
4513 else if (name[0] == 0)
4514 name = bfd_section_name (sec);
4515 }
4516 _bfd_error_handler
4517 /* xgettext:c-format */
4518 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
4519 input_bfd, name);
4520 ret_val = FALSE;
4521 break;
4522 }
4523
4524 goto default_reloc;
4525 }
4526
4527 case R_ALPHA_REFLONG:
4528 case R_ALPHA_REFQUAD:
4529 case R_ALPHA_DTPREL64:
4530 case R_ALPHA_TPREL64:
4531 {
4532 long dynindx, dyntype = r_type;
4533 bfd_vma dynaddend;
4534
4535 /* Careful here to remember RELATIVE relocations for global
4536 variables for symbolic shared objects. */
4537
4538 if (dynamic_symbol_p)
4539 {
4540 BFD_ASSERT(h->root.dynindx != -1);
4541 dynindx = h->root.dynindx;
4542 dynaddend = addend;
4543 addend = 0, value = 0;
4544 }
4545 else if (r_type == R_ALPHA_DTPREL64)
4546 {
4547 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4548 value -= dtp_base;
4549 goto default_reloc;
4550 }
4551 else if (r_type == R_ALPHA_TPREL64)
4552 {
4553 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4554 if (!bfd_link_dll (info))
4555 {
4556 value -= tp_base;
4557 goto default_reloc;
4558 }
4559 dynindx = 0;
4560 dynaddend = value - dtp_base;
4561 }
4562 else if (bfd_link_pic (info)
4563 && r_symndx != STN_UNDEF
4564 && (input_section->flags & SEC_ALLOC)
4565 && !undef_weak_ref
4566 && !(unresolved_reloc
4567 && (_bfd_elf_section_offset (output_bfd, info,
4568 input_section,
4569 rel->r_offset)
4570 == (bfd_vma) -1)))
4571 {
4572 if (r_type == R_ALPHA_REFLONG)
4573 {
4574 _bfd_error_handler
4575 /* xgettext:c-format */
4576 (_("%pB: unhandled dynamic relocation against %s"),
4577 input_bfd,
4578 h->root.root.root.string);
4579 ret_val = FALSE;
4580 }
4581 dynindx = 0;
4582 dyntype = R_ALPHA_RELATIVE;
4583 dynaddend = value;
4584 }
4585 else
4586 goto default_reloc;
4587
4588 if (input_section->flags & SEC_ALLOC)
4589 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4590 srel, rel->r_offset, dynindx,
4591 dyntype, dynaddend);
4592 }
4593 goto default_reloc;
4594
4595 case R_ALPHA_SREL16:
4596 case R_ALPHA_SREL32:
4597 case R_ALPHA_SREL64:
4598 if (dynamic_symbol_p)
4599 {
4600 _bfd_error_handler
4601 /* xgettext:c-format */
4602 (_("%pB: pc-relative relocation against dynamic symbol %s"),
4603 input_bfd, h->root.root.root.string);
4604 ret_val = FALSE;
4605 }
4606 else if (bfd_link_pic (info)
4607 && undef_weak_ref)
4608 {
4609 _bfd_error_handler
4610 /* xgettext:c-format */
4611 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
4612 input_bfd, h->root.root.root.string);
4613 ret_val = FALSE;
4614 }
4615
4616
4617 /* ??? .eh_frame references to discarded sections will be smashed
4618 to relocations against SHN_UNDEF. The .eh_frame format allows
4619 NULL to be encoded as 0 in any format, so this works here. */
4620 if (r_symndx == STN_UNDEF
4621 || (unresolved_reloc
4622 && _bfd_elf_section_offset (output_bfd, info,
4623 input_section,
4624 rel->r_offset) == (bfd_vma) -1))
4625 howto = (elf64_alpha_howto_table
4626 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4627 goto default_reloc;
4628
4629 case R_ALPHA_TLSLDM:
4630 /* Ignore the symbol for the relocation. The result is always
4631 the current module. */
4632 dynamic_symbol_p = 0;
4633 /* FALLTHRU */
4634
4635 case R_ALPHA_TLSGD:
4636 if (!gotent->reloc_done)
4637 {
4638 gotent->reloc_done = 1;
4639
4640 /* Note that the module index for the main program is 1. */
4641 bfd_put_64 (output_bfd,
4642 !bfd_link_pic (info) && !dynamic_symbol_p,
4643 sgot->contents + gotent->got_offset);
4644
4645 /* If the symbol has been forced local, output a
4646 DTPMOD64 reloc, otherwise it will be handled in
4647 finish_dynamic_symbol. */
4648 if (bfd_link_pic (info) && !dynamic_symbol_p)
4649 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4650 gotent->got_offset, 0,
4651 R_ALPHA_DTPMOD64, 0);
4652
4653 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4654 value = 0;
4655 else
4656 {
4657 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4658 value -= dtp_base;
4659 }
4660 bfd_put_64 (output_bfd, value,
4661 sgot->contents + gotent->got_offset + 8);
4662 }
4663
4664 value = (sgot->output_section->vma
4665 + sgot->output_offset
4666 + gotent->got_offset);
4667 value -= gp;
4668 goto default_reloc;
4669
4670 case R_ALPHA_DTPRELHI:
4671 case R_ALPHA_DTPRELLO:
4672 case R_ALPHA_DTPREL16:
4673 if (dynamic_symbol_p)
4674 {
4675 _bfd_error_handler
4676 /* xgettext:c-format */
4677 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
4678 input_bfd, h->root.root.root.string);
4679 ret_val = FALSE;
4680 }
4681 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4682 value -= dtp_base;
4683 if (r_type == R_ALPHA_DTPRELHI)
4684 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4685 goto default_reloc;
4686
4687 case R_ALPHA_TPRELHI:
4688 case R_ALPHA_TPRELLO:
4689 case R_ALPHA_TPREL16:
4690 if (bfd_link_dll (info))
4691 {
4692 _bfd_error_handler
4693 /* xgettext:c-format */
4694 (_("%pB: TLS local exec code cannot be linked into shared objects"),
4695 input_bfd);
4696 ret_val = FALSE;
4697 }
4698 else if (dynamic_symbol_p)
4699 {
4700 _bfd_error_handler
4701 /* xgettext:c-format */
4702 (_("%pB: tp-relative relocation against dynamic symbol %s"),
4703 input_bfd, h->root.root.root.string);
4704 ret_val = FALSE;
4705 }
4706 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4707 value -= tp_base;
4708 if (r_type == R_ALPHA_TPRELHI)
4709 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4710 goto default_reloc;
4711
4712 case R_ALPHA_GOTDTPREL:
4713 case R_ALPHA_GOTTPREL:
4714 BFD_ASSERT(sgot != NULL);
4715 BFD_ASSERT(gp != 0);
4716 BFD_ASSERT(gotent != NULL);
4717 BFD_ASSERT(gotent->use_count >= 1);
4718
4719 if (!gotent->reloc_done)
4720 {
4721 gotent->reloc_done = 1;
4722
4723 if (dynamic_symbol_p)
4724 value = 0;
4725 else
4726 {
4727 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4728 if (r_type == R_ALPHA_GOTDTPREL)
4729 value -= dtp_base;
4730 else if (bfd_link_executable (info))
4731 value -= tp_base;
4732 else
4733 {
4734 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4735 gotent->got_offset, 0,
4736 R_ALPHA_TPREL64,
4737 value - dtp_base);
4738 value = 0;
4739 }
4740 }
4741 bfd_put_64 (output_bfd, value,
4742 sgot->contents + gotent->got_offset);
4743 }
4744
4745 value = (sgot->output_section->vma
4746 + sgot->output_offset
4747 + gotent->got_offset);
4748 value -= gp;
4749 goto default_reloc;
4750
4751 default:
4752 default_reloc:
4753 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4754 contents, rel->r_offset, value, 0);
4755 break;
4756 }
4757
4758 switch (r)
4759 {
4760 case bfd_reloc_ok:
4761 break;
4762
4763 case bfd_reloc_overflow:
4764 {
4765 const char *name;
4766
4767 /* Don't warn if the overflow is due to pc relative reloc
4768 against discarded section. Section optimization code should
4769 handle it. */
4770
4771 if (r_symndx < symtab_hdr->sh_info
4772 && sec != NULL && howto->pc_relative
4773 && discarded_section (sec))
4774 break;
4775
4776 if (h != NULL)
4777 name = NULL;
4778 else
4779 {
4780 name = (bfd_elf_string_from_elf_section
4781 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4782 if (name == NULL)
4783 return FALSE;
4784 if (*name == '\0')
4785 name = bfd_section_name (sec);
4786 }
4787 (*info->callbacks->reloc_overflow)
4788 (info, (h ? &h->root.root : NULL), name, howto->name,
4789 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4790 }
4791 break;
4792
4793 default:
4794 case bfd_reloc_outofrange:
4795 abort ();
4796 }
4797 }
4798
4799 return ret_val;
4800 }
4801
4802 /* Finish up dynamic symbol handling. We set the contents of various
4803 dynamic sections here. */
4804
4805 static bfd_boolean
4806 elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4807 struct elf_link_hash_entry *h,
4808 Elf_Internal_Sym *sym)
4809 {
4810 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
4811
4812 if (h->needs_plt)
4813 {
4814 /* Fill in the .plt entry for this symbol. */
4815 asection *splt, *sgot, *srel;
4816 Elf_Internal_Rela outrel;
4817 bfd_byte *loc;
4818 bfd_vma got_addr, plt_addr;
4819 bfd_vma plt_index;
4820 struct alpha_elf_got_entry *gotent;
4821
4822 BFD_ASSERT (h->dynindx != -1);
4823
4824 splt = elf_hash_table (info)->splt;
4825 BFD_ASSERT (splt != NULL);
4826 srel = elf_hash_table (info)->srelplt;
4827 BFD_ASSERT (srel != NULL);
4828
4829 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4830 if (gotent->reloc_type == R_ALPHA_LITERAL
4831 && gotent->use_count > 0)
4832 {
4833 unsigned int insn;
4834 int disp;
4835
4836 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4837 BFD_ASSERT (sgot != NULL);
4838
4839 BFD_ASSERT (gotent->got_offset != -1);
4840 BFD_ASSERT (gotent->plt_offset != -1);
4841
4842 got_addr = (sgot->output_section->vma
4843 + sgot->output_offset
4844 + gotent->got_offset);
4845 plt_addr = (splt->output_section->vma
4846 + splt->output_offset
4847 + gotent->plt_offset);
4848
4849 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
4850
4851 /* Fill in the entry in the procedure linkage table. */
4852 if (elf64_alpha_use_secureplt)
4853 {
4854 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4855 insn = INSN_AD (INSN_BR, 31, disp);
4856 bfd_put_32 (output_bfd, insn,
4857 splt->contents + gotent->plt_offset);
4858
4859 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4860 / NEW_PLT_ENTRY_SIZE);
4861 }
4862 else
4863 {
4864 disp = -(gotent->plt_offset + 4);
4865 insn = INSN_AD (INSN_BR, 28, disp);
4866 bfd_put_32 (output_bfd, insn,
4867 splt->contents + gotent->plt_offset);
4868 bfd_put_32 (output_bfd, INSN_UNOP,
4869 splt->contents + gotent->plt_offset + 4);
4870 bfd_put_32 (output_bfd, INSN_UNOP,
4871 splt->contents + gotent->plt_offset + 8);
4872
4873 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4874 / OLD_PLT_ENTRY_SIZE);
4875 }
4876
4877 /* Fill in the entry in the .rela.plt section. */
4878 outrel.r_offset = got_addr;
4879 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4880 outrel.r_addend = 0;
4881
4882 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4883 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
4884
4885 /* Fill in the entry in the .got. */
4886 bfd_put_64 (output_bfd, plt_addr,
4887 sgot->contents + gotent->got_offset);
4888 }
4889 }
4890 else if (alpha_elf_dynamic_symbol_p (h, info))
4891 {
4892 /* Fill in the dynamic relocations for this symbol's .got entries. */
4893 asection *srel;
4894 struct alpha_elf_got_entry *gotent;
4895
4896 srel = elf_hash_table (info)->srelgot;
4897 BFD_ASSERT (srel != NULL);
4898
4899 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4900 gotent != NULL;
4901 gotent = gotent->next)
4902 {
4903 asection *sgot;
4904 long r_type;
4905
4906 if (gotent->use_count == 0)
4907 continue;
4908
4909 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4910
4911 r_type = gotent->reloc_type;
4912 switch (r_type)
4913 {
4914 case R_ALPHA_LITERAL:
4915 r_type = R_ALPHA_GLOB_DAT;
4916 break;
4917 case R_ALPHA_TLSGD:
4918 r_type = R_ALPHA_DTPMOD64;
4919 break;
4920 case R_ALPHA_GOTDTPREL:
4921 r_type = R_ALPHA_DTPREL64;
4922 break;
4923 case R_ALPHA_GOTTPREL:
4924 r_type = R_ALPHA_TPREL64;
4925 break;
4926 case R_ALPHA_TLSLDM:
4927 default:
4928 abort ();
4929 }
4930
4931 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4932 gotent->got_offset, h->dynindx,
4933 r_type, gotent->addend);
4934
4935 if (gotent->reloc_type == R_ALPHA_TLSGD)
4936 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4937 gotent->got_offset + 8, h->dynindx,
4938 R_ALPHA_DTPREL64, gotent->addend);
4939 }
4940 }
4941
4942 /* Mark some specially defined symbols as absolute. */
4943 if (h == elf_hash_table (info)->hdynamic
4944 || h == elf_hash_table (info)->hgot
4945 || h == elf_hash_table (info)->hplt)
4946 sym->st_shndx = SHN_ABS;
4947
4948 return TRUE;
4949 }
4950
4951 /* Finish up the dynamic sections. */
4952
4953 static bfd_boolean
4954 elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4955 struct bfd_link_info *info)
4956 {
4957 bfd *dynobj;
4958 asection *sdyn;
4959
4960 dynobj = elf_hash_table (info)->dynobj;
4961 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
4962
4963 if (elf_hash_table (info)->dynamic_sections_created)
4964 {
4965 asection *splt, *sgotplt, *srelaplt;
4966 Elf64_External_Dyn *dyncon, *dynconend;
4967 bfd_vma plt_vma, gotplt_vma;
4968
4969 splt = elf_hash_table (info)->splt;
4970 srelaplt = elf_hash_table (info)->srelplt;
4971 BFD_ASSERT (splt != NULL && sdyn != NULL);
4972
4973 plt_vma = splt->output_section->vma + splt->output_offset;
4974
4975 gotplt_vma = 0;
4976 if (elf64_alpha_use_secureplt)
4977 {
4978 sgotplt = elf_hash_table (info)->sgotplt;
4979 BFD_ASSERT (sgotplt != NULL);
4980 if (sgotplt->size > 0)
4981 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4982 }
4983
4984 dyncon = (Elf64_External_Dyn *) sdyn->contents;
4985 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
4986 for (; dyncon < dynconend; dyncon++)
4987 {
4988 Elf_Internal_Dyn dyn;
4989
4990 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4991
4992 switch (dyn.d_tag)
4993 {
4994 case DT_PLTGOT:
4995 dyn.d_un.d_ptr
4996 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4997 break;
4998 case DT_PLTRELSZ:
4999 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5000 break;
5001 case DT_JMPREL:
5002 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
5003 + srelaplt->output_offset) : 0;
5004 break;
5005 }
5006
5007 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5008 }
5009
5010 /* Initialize the plt header. */
5011 if (splt->size > 0)
5012 {
5013 unsigned int insn;
5014 int ofs;
5015
5016 if (elf64_alpha_use_secureplt)
5017 {
5018 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5019
5020 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5021 bfd_put_32 (output_bfd, insn, splt->contents);
5022
5023 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5024 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5025
5026 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5027 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5028
5029 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5030 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5031
5032 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5033 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5034
5035 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5036 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5037
5038 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5039 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5040
5041 insn = INSN_AB (INSN_JMP, 31, 27);
5042 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5043
5044 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5045 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5046 }
5047 else
5048 {
5049 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5050 bfd_put_32 (output_bfd, insn, splt->contents);
5051
5052 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5053 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5054
5055 insn = INSN_UNOP;
5056 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5057
5058 insn = INSN_AB (INSN_JMP, 27, 27);
5059 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5060
5061 /* The next two words will be filled in by ld.so. */
5062 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5063 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5064 }
5065
5066 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
5067 }
5068 }
5069
5070 return TRUE;
5071 }
5072
5073 /* We need to use a special link routine to handle the .mdebug section.
5074 We need to merge all instances of these sections together, not write
5075 them all out sequentially. */
5076
5077 static bfd_boolean
5078 elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
5079 {
5080 asection *o;
5081 struct bfd_link_order *p;
5082 asection *mdebug_sec;
5083 struct ecoff_debug_info debug;
5084 const struct ecoff_debug_swap *swap
5085 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5086 HDRR *symhdr = &debug.symbolic_header;
5087 void * mdebug_handle = NULL;
5088 struct alpha_elf_link_hash_table * htab;
5089
5090 htab = alpha_elf_hash_table (info);
5091 if (htab == NULL)
5092 return FALSE;
5093
5094 /* Go through the sections and collect the mdebug information. */
5095 mdebug_sec = NULL;
5096 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5097 {
5098 if (strcmp (o->name, ".mdebug") == 0)
5099 {
5100 struct extsym_info einfo;
5101
5102 /* We have found the .mdebug section in the output file.
5103 Look through all the link_orders comprising it and merge
5104 the information together. */
5105 symhdr->magic = swap->sym_magic;
5106 /* FIXME: What should the version stamp be? */
5107 symhdr->vstamp = 0;
5108 symhdr->ilineMax = 0;
5109 symhdr->cbLine = 0;
5110 symhdr->idnMax = 0;
5111 symhdr->ipdMax = 0;
5112 symhdr->isymMax = 0;
5113 symhdr->ioptMax = 0;
5114 symhdr->iauxMax = 0;
5115 symhdr->issMax = 0;
5116 symhdr->issExtMax = 0;
5117 symhdr->ifdMax = 0;
5118 symhdr->crfd = 0;
5119 symhdr->iextMax = 0;
5120
5121 /* We accumulate the debugging information itself in the
5122 debug_info structure. */
5123 debug.line = NULL;
5124 debug.external_dnr = NULL;
5125 debug.external_pdr = NULL;
5126 debug.external_sym = NULL;
5127 debug.external_opt = NULL;
5128 debug.external_aux = NULL;
5129 debug.ss = NULL;
5130 debug.ssext = debug.ssext_end = NULL;
5131 debug.external_fdr = NULL;
5132 debug.external_rfd = NULL;
5133 debug.external_ext = debug.external_ext_end = NULL;
5134
5135 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
5136 if (mdebug_handle == NULL)
5137 return FALSE;
5138
5139 if (1)
5140 {
5141 asection *s;
5142 EXTR esym;
5143 bfd_vma last = 0;
5144 unsigned int i;
5145 static const char * const name[] =
5146 {
5147 ".text", ".init", ".fini", ".data",
5148 ".rodata", ".sdata", ".sbss", ".bss"
5149 };
5150 static const int sc[] = { scText, scInit, scFini, scData,
5151 scRData, scSData, scSBss, scBss };
5152
5153 esym.jmptbl = 0;
5154 esym.cobol_main = 0;
5155 esym.weakext = 0;
5156 esym.reserved = 0;
5157 esym.ifd = ifdNil;
5158 esym.asym.iss = issNil;
5159 esym.asym.st = stLocal;
5160 esym.asym.reserved = 0;
5161 esym.asym.index = indexNil;
5162 for (i = 0; i < 8; i++)
5163 {
5164 esym.asym.sc = sc[i];
5165 s = bfd_get_section_by_name (abfd, name[i]);
5166 if (s != NULL)
5167 {
5168 esym.asym.value = s->vma;
5169 last = s->vma + s->size;
5170 }
5171 else
5172 esym.asym.value = last;
5173
5174 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5175 name[i], &esym))
5176 return FALSE;
5177 }
5178 }
5179
5180 for (p = o->map_head.link_order;
5181 p != (struct bfd_link_order *) NULL;
5182 p = p->next)
5183 {
5184 asection *input_section;
5185 bfd *input_bfd;
5186 const struct ecoff_debug_swap *input_swap;
5187 struct ecoff_debug_info input_debug;
5188 char *eraw_src;
5189 char *eraw_end;
5190
5191 if (p->type != bfd_indirect_link_order)
5192 {
5193 if (p->type == bfd_data_link_order)
5194 continue;
5195 abort ();
5196 }
5197
5198 input_section = p->u.indirect.section;
5199 input_bfd = input_section->owner;
5200
5201 if (! is_alpha_elf (input_bfd))
5202 /* I don't know what a non ALPHA ELF bfd would be
5203 doing with a .mdebug section, but I don't really
5204 want to deal with it. */
5205 continue;
5206
5207 input_swap = (get_elf_backend_data (input_bfd)
5208 ->elf_backend_ecoff_debug_swap);
5209
5210 BFD_ASSERT (p->size == input_section->size);
5211
5212 /* The ECOFF linking code expects that we have already
5213 read in the debugging information and set up an
5214 ecoff_debug_info structure, so we do that now. */
5215 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5216 &input_debug))
5217 return FALSE;
5218
5219 if (! (bfd_ecoff_debug_accumulate
5220 (mdebug_handle, abfd, &debug, swap, input_bfd,
5221 &input_debug, input_swap, info)))
5222 return FALSE;
5223
5224 /* Loop through the external symbols. For each one with
5225 interesting information, try to find the symbol in
5226 the linker global hash table and save the information
5227 for the output external symbols. */
5228 eraw_src = (char *) input_debug.external_ext;
5229 eraw_end = (eraw_src
5230 + (input_debug.symbolic_header.iextMax
5231 * input_swap->external_ext_size));
5232 for (;
5233 eraw_src < eraw_end;
5234 eraw_src += input_swap->external_ext_size)
5235 {
5236 EXTR ext;
5237 const char *name;
5238 struct alpha_elf_link_hash_entry *h;
5239
5240 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
5241 if (ext.asym.sc == scNil
5242 || ext.asym.sc == scUndefined
5243 || ext.asym.sc == scSUndefined)
5244 continue;
5245
5246 name = input_debug.ssext + ext.asym.iss;
5247 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
5248 if (h == NULL || h->esym.ifd != -2)
5249 continue;
5250
5251 if (ext.ifd != -1)
5252 {
5253 BFD_ASSERT (ext.ifd
5254 < input_debug.symbolic_header.ifdMax);
5255 ext.ifd = input_debug.ifdmap[ext.ifd];
5256 }
5257
5258 h->esym = ext;
5259 }
5260
5261 /* Free up the information we just read. */
5262 free (input_debug.line);
5263 free (input_debug.external_dnr);
5264 free (input_debug.external_pdr);
5265 free (input_debug.external_sym);
5266 free (input_debug.external_opt);
5267 free (input_debug.external_aux);
5268 free (input_debug.ss);
5269 free (input_debug.ssext);
5270 free (input_debug.external_fdr);
5271 free (input_debug.external_rfd);
5272 free (input_debug.external_ext);
5273
5274 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5275 elf_link_input_bfd ignores this section. */
5276 input_section->flags &=~ SEC_HAS_CONTENTS;
5277 }
5278
5279 /* Build the external symbol information. */
5280 einfo.abfd = abfd;
5281 einfo.info = info;
5282 einfo.debug = &debug;
5283 einfo.swap = swap;
5284 einfo.failed = FALSE;
5285 elf_link_hash_traverse (elf_hash_table (info),
5286 elf64_alpha_output_extsym,
5287 &einfo);
5288 if (einfo.failed)
5289 return FALSE;
5290
5291 /* Set the size of the .mdebug section. */
5292 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
5293
5294 /* Skip this section later on (I don't think this currently
5295 matters, but someday it might). */
5296 o->map_head.link_order = (struct bfd_link_order *) NULL;
5297
5298 mdebug_sec = o;
5299 }
5300 }
5301
5302 /* Invoke the regular ELF backend linker to do all the work. */
5303 if (! bfd_elf_final_link (abfd, info))
5304 return FALSE;
5305
5306 /* Now write out the computed sections. */
5307
5308 /* The .got subsections... */
5309 {
5310 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
5311 for (i = htab->got_list;
5312 i != NULL;
5313 i = alpha_elf_tdata(i)->got_link_next)
5314 {
5315 asection *sgot;
5316
5317 /* elf_bfd_final_link already did everything in dynobj. */
5318 if (i == dynobj)
5319 continue;
5320
5321 sgot = alpha_elf_tdata(i)->got;
5322 if (! bfd_set_section_contents (abfd, sgot->output_section,
5323 sgot->contents,
5324 (file_ptr) sgot->output_offset,
5325 sgot->size))
5326 return FALSE;
5327 }
5328 }
5329
5330 if (mdebug_sec != (asection *) NULL)
5331 {
5332 BFD_ASSERT (abfd->output_has_begun);
5333 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5334 swap, info,
5335 mdebug_sec->filepos))
5336 return FALSE;
5337
5338 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5339 }
5340
5341 return TRUE;
5342 }
5343
5344 static enum elf_reloc_type_class
5345 elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5346 const asection *rel_sec ATTRIBUTE_UNUSED,
5347 const Elf_Internal_Rela *rela)
5348 {
5349 switch ((int) ELF64_R_TYPE (rela->r_info))
5350 {
5351 case R_ALPHA_RELATIVE:
5352 return reloc_class_relative;
5353 case R_ALPHA_JMP_SLOT:
5354 return reloc_class_plt;
5355 case R_ALPHA_COPY:
5356 return reloc_class_copy;
5357 default:
5358 return reloc_class_normal;
5359 }
5360 }
5361 \f
5362 static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
5363 {
5364 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5365 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5366 { NULL, 0, 0, 0, 0 }
5367 };
5368
5369 /* ECOFF swapping routines. These are used when dealing with the
5370 .mdebug section, which is in the ECOFF debugging format. Copied
5371 from elf32-mips.c. */
5372 static const struct ecoff_debug_swap
5373 elf64_alpha_ecoff_debug_swap =
5374 {
5375 /* Symbol table magic number. */
5376 magicSym2,
5377 /* Alignment of debugging information. E.g., 4. */
5378 8,
5379 /* Sizes of external symbolic information. */
5380 sizeof (struct hdr_ext),
5381 sizeof (struct dnr_ext),
5382 sizeof (struct pdr_ext),
5383 sizeof (struct sym_ext),
5384 sizeof (struct opt_ext),
5385 sizeof (struct fdr_ext),
5386 sizeof (struct rfd_ext),
5387 sizeof (struct ext_ext),
5388 /* Functions to swap in external symbolic data. */
5389 ecoff_swap_hdr_in,
5390 ecoff_swap_dnr_in,
5391 ecoff_swap_pdr_in,
5392 ecoff_swap_sym_in,
5393 ecoff_swap_opt_in,
5394 ecoff_swap_fdr_in,
5395 ecoff_swap_rfd_in,
5396 ecoff_swap_ext_in,
5397 _bfd_ecoff_swap_tir_in,
5398 _bfd_ecoff_swap_rndx_in,
5399 /* Functions to swap out external symbolic data. */
5400 ecoff_swap_hdr_out,
5401 ecoff_swap_dnr_out,
5402 ecoff_swap_pdr_out,
5403 ecoff_swap_sym_out,
5404 ecoff_swap_opt_out,
5405 ecoff_swap_fdr_out,
5406 ecoff_swap_rfd_out,
5407 ecoff_swap_ext_out,
5408 _bfd_ecoff_swap_tir_out,
5409 _bfd_ecoff_swap_rndx_out,
5410 /* Function to read in symbolic data. */
5411 elf64_alpha_read_ecoff_info
5412 };
5413 \f
5414 /* Use a non-standard hash bucket size of 8. */
5415
5416 static const struct elf_size_info alpha_elf_size_info =
5417 {
5418 sizeof (Elf64_External_Ehdr),
5419 sizeof (Elf64_External_Phdr),
5420 sizeof (Elf64_External_Shdr),
5421 sizeof (Elf64_External_Rel),
5422 sizeof (Elf64_External_Rela),
5423 sizeof (Elf64_External_Sym),
5424 sizeof (Elf64_External_Dyn),
5425 sizeof (Elf_External_Note),
5426 8,
5427 1,
5428 64, 3,
5429 ELFCLASS64, EV_CURRENT,
5430 bfd_elf64_write_out_phdrs,
5431 bfd_elf64_write_shdrs_and_ehdr,
5432 bfd_elf64_checksum_contents,
5433 bfd_elf64_write_relocs,
5434 bfd_elf64_swap_symbol_in,
5435 bfd_elf64_swap_symbol_out,
5436 bfd_elf64_slurp_reloc_table,
5437 bfd_elf64_slurp_symbol_table,
5438 bfd_elf64_swap_dyn_in,
5439 bfd_elf64_swap_dyn_out,
5440 bfd_elf64_swap_reloc_in,
5441 bfd_elf64_swap_reloc_out,
5442 bfd_elf64_swap_reloca_in,
5443 bfd_elf64_swap_reloca_out
5444 };
5445
5446 #define TARGET_LITTLE_SYM alpha_elf64_vec
5447 #define TARGET_LITTLE_NAME "elf64-alpha"
5448 #define ELF_ARCH bfd_arch_alpha
5449 #define ELF_TARGET_ID ALPHA_ELF_DATA
5450 #define ELF_MACHINE_CODE EM_ALPHA
5451 #define ELF_MAXPAGESIZE 0x10000
5452 #define ELF_COMMONPAGESIZE 0x2000
5453
5454 #define bfd_elf64_bfd_link_hash_table_create \
5455 elf64_alpha_bfd_link_hash_table_create
5456
5457 #define bfd_elf64_bfd_reloc_type_lookup \
5458 elf64_alpha_bfd_reloc_type_lookup
5459 #define bfd_elf64_bfd_reloc_name_lookup \
5460 elf64_alpha_bfd_reloc_name_lookup
5461 #define elf_info_to_howto \
5462 elf64_alpha_info_to_howto
5463
5464 #define bfd_elf64_mkobject \
5465 elf64_alpha_mkobject
5466 #define elf_backend_object_p \
5467 elf64_alpha_object_p
5468
5469 #define elf_backend_section_from_shdr \
5470 elf64_alpha_section_from_shdr
5471 #define elf_backend_section_flags \
5472 elf64_alpha_section_flags
5473 #define elf_backend_fake_sections \
5474 elf64_alpha_fake_sections
5475
5476 #define bfd_elf64_bfd_is_local_label_name \
5477 elf64_alpha_is_local_label_name
5478 #define bfd_elf64_find_nearest_line \
5479 elf64_alpha_find_nearest_line
5480 #define bfd_elf64_bfd_relax_section \
5481 elf64_alpha_relax_section
5482
5483 #define elf_backend_add_symbol_hook \
5484 elf64_alpha_add_symbol_hook
5485 #define elf_backend_relocs_compatible \
5486 _bfd_elf_relocs_compatible
5487 #define elf_backend_sort_relocs_p \
5488 elf64_alpha_sort_relocs_p
5489 #define elf_backend_check_relocs \
5490 elf64_alpha_check_relocs
5491 #define elf_backend_create_dynamic_sections \
5492 elf64_alpha_create_dynamic_sections
5493 #define elf_backend_adjust_dynamic_symbol \
5494 elf64_alpha_adjust_dynamic_symbol
5495 #define elf_backend_merge_symbol_attribute \
5496 elf64_alpha_merge_symbol_attribute
5497 #define elf_backend_copy_indirect_symbol \
5498 elf64_alpha_copy_indirect_symbol
5499 #define elf_backend_always_size_sections \
5500 elf64_alpha_always_size_sections
5501 #define elf_backend_size_dynamic_sections \
5502 elf64_alpha_size_dynamic_sections
5503 #define elf_backend_omit_section_dynsym \
5504 _bfd_elf_omit_section_dynsym_all
5505 #define elf_backend_relocate_section \
5506 elf64_alpha_relocate_section
5507 #define elf_backend_finish_dynamic_symbol \
5508 elf64_alpha_finish_dynamic_symbol
5509 #define elf_backend_finish_dynamic_sections \
5510 elf64_alpha_finish_dynamic_sections
5511 #define bfd_elf64_bfd_final_link \
5512 elf64_alpha_final_link
5513 #define elf_backend_reloc_type_class \
5514 elf64_alpha_reloc_type_class
5515
5516 #define elf_backend_can_gc_sections 1
5517 #define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5518
5519 #define elf_backend_ecoff_debug_swap \
5520 &elf64_alpha_ecoff_debug_swap
5521
5522 #define elf_backend_size_info \
5523 alpha_elf_size_info
5524
5525 #define elf_backend_special_sections \
5526 elf64_alpha_special_sections
5527
5528 /* A few constants that determine how the .plt section is set up. */
5529 #define elf_backend_want_got_plt 0
5530 #define elf_backend_plt_readonly 0
5531 #define elf_backend_want_plt_sym 1
5532 #define elf_backend_got_header_size 0
5533 #define elf_backend_dtrel_excludes_plt 1
5534
5535 #include "elf64-target.h"
5536 \f
5537 /* FreeBSD support. */
5538
5539 #undef TARGET_LITTLE_SYM
5540 #define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
5541 #undef TARGET_LITTLE_NAME
5542 #define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
5543 #undef ELF_OSABI
5544 #define ELF_OSABI ELFOSABI_FREEBSD
5545
5546 /* The kernel recognizes executables as valid only if they carry a
5547 "FreeBSD" label in the ELF header. So we put this label on all
5548 executables and (for simplicity) also all other object files. */
5549
5550 static bfd_boolean
5551 elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
5552 {
5553 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5554
5555 if (!_bfd_elf_init_file_header (abfd, info))
5556 return FALSE;
5557
5558 i_ehdrp = elf_elfheader (abfd);
5559
5560 /* Put an ABI label supported by FreeBSD >= 4.1. */
5561 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
5562 #ifdef OLD_FREEBSD_ABI_LABEL
5563 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5564 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5565 #endif
5566 return TRUE;
5567 }
5568
5569 #undef elf_backend_init_file_header
5570 #define elf_backend_init_file_header \
5571 elf64_alpha_fbsd_init_file_header
5572
5573 #undef elf64_bed
5574 #define elf64_bed elf64_alpha_fbsd_bed
5575
5576 #include "elf64-target.h"
This page took 0.247229 seconds and 3 git commands to generate.