elf_backend_section_flags and _bfd_elf_init_private_section_data
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
1 /* Alpha specific support for 64-bit ELF
2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
26 #include "sysdep.h"
27 #include "bfd.h"
28 #include "libbfd.h"
29 #include "elf-bfd.h"
30 #include "ecoff-bfd.h"
31
32 #include "elf/alpha.h"
33
34 #define ALPHAECOFF
35
36 #define NO_COFF_RELOCS
37 #define NO_COFF_SYMBOLS
38 #define NO_COFF_LINENOS
39
40 /* Get the ECOFF swapping routines. Needed for the debug information. */
41 #include "coff/internal.h"
42 #include "coff/sym.h"
43 #include "coff/symconst.h"
44 #include "coff/ecoff.h"
45 #include "coff/alpha.h"
46 #include "aout/ar.h"
47 #include "libcoff.h"
48 #include "libecoff.h"
49 #define ECOFF_64
50 #include "ecoffswap.h"
51
52 \f
53 /* Instruction data for plt generation and relaxation. */
54
55 #define OP_LDA 0x08
56 #define OP_LDAH 0x09
57 #define OP_LDQ 0x29
58 #define OP_BR 0x30
59 #define OP_BSR 0x34
60
61 #define INSN_LDA (OP_LDA << 26)
62 #define INSN_LDAH (OP_LDAH << 26)
63 #define INSN_LDQ (OP_LDQ << 26)
64 #define INSN_BR (OP_BR << 26)
65
66 #define INSN_ADDQ 0x40000400
67 #define INSN_RDUNIQ 0x0000009e
68 #define INSN_SUBQ 0x40000520
69 #define INSN_S4SUBQ 0x40000560
70 #define INSN_UNOP 0x2ffe0000
71
72 #define INSN_JSR 0x68004000
73 #define INSN_JMP 0x68000000
74 #define INSN_JSR_MASK 0xfc00c000
75
76 #define INSN_A(I,A) (I | (A << 21))
77 #define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78 #define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79 #define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80 #define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82 /* PLT/GOT Stuff */
83
84 /* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86 #ifdef USE_SECUREPLT
87 bfd_boolean elf64_alpha_use_secureplt = TRUE;
88 #else
89 bfd_boolean elf64_alpha_use_secureplt = FALSE;
90 #endif
91
92 #define OLD_PLT_HEADER_SIZE 32
93 #define OLD_PLT_ENTRY_SIZE 12
94 #define NEW_PLT_HEADER_SIZE 36
95 #define NEW_PLT_ENTRY_SIZE 4
96
97 #define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99 #define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102 #define MAX_GOT_SIZE (64*1024)
103
104 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
105 \f
106
107 /* Used to implement multiple .got subsections. */
108 struct alpha_elf_got_entry
109 {
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138 };
139
140 struct alpha_elf_reloc_entry
141 {
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
147 /* What kind of relocation? */
148 unsigned int rtype;
149
150 /* Is this against read-only section? */
151 unsigned int reltext : 1;
152
153 /* How many did we find? */
154 unsigned long count;
155 };
156
157 struct alpha_elf_link_hash_entry
158 {
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
167 /* Contexts in which a literal was referenced. */
168 #define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169 #define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170 #define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171 #define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172 #define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173 #define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174 #define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175 #define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176 #define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
177
178 /* Used to implement multiple .got subsections. */
179 struct alpha_elf_got_entry *got_entries;
180
181 /* Used to count non-got, non-plt relocations for delayed sizing
182 of relocation sections. */
183 struct alpha_elf_reloc_entry *reloc_entries;
184 };
185
186 /* Alpha ELF linker hash table. */
187
188 struct alpha_elf_link_hash_table
189 {
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
199 };
200
201 /* Look up an entry in a Alpha ELF linker hash table. */
202
203 #define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208 /* Traverse a Alpha ELF linker hash table. */
209
210 #define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
214 (info)))
215
216 /* Get the Alpha ELF linker hash table from a link_info structure. */
217
218 #define alpha_elf_hash_table(p) \
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
221
222 /* Get the object's symbols as our own entry type. */
223
224 #define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
227 /* Should we do dynamic things to this symbol? This differs from the
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
231
232 static inline bfd_boolean
233 alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
235 {
236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
237 }
238
239 /* Create an entry in a Alpha ELF linker hash table. */
240
241 static struct bfd_hash_entry *
242 elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
245 {
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275 }
276
277 /* Create a Alpha ELF linker hash table. */
278
279 static struct bfd_link_hash_table *
280 elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
281 {
282 struct alpha_elf_link_hash_table *ret;
283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
284
285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
293 {
294 free (ret);
295 return NULL;
296 }
297
298 return &ret->root.root;
299 }
300 \f
301 /* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304 struct alpha_elf_find_line
305 {
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308 };
309
310 /* We have some private fields hanging off of the elf_tdata structure. */
311
312 struct alpha_elf_obj_tdata
313 {
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
335
336 /* For every got, this is the sum of the number of words required
337 to hold all of the member object's local got. */
338 int local_got_size;
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
343 };
344
345 #define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
348 #define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
352
353 static bfd_boolean
354 elf64_alpha_mkobject (bfd *abfd)
355 {
356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
357 ALPHA_ELF_DATA);
358 }
359
360 static bfd_boolean
361 elf64_alpha_object_p (bfd *abfd)
362 {
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365 }
366 \f
367 /* A relocation function which doesn't do anything. */
368
369 static bfd_reloc_status_type
370 elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
372 void * data ATTRIBUTE_UNUSED, asection *sec,
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374 {
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378 }
379
380 /* A relocation function used for an unsupported reloc. */
381
382 static bfd_reloc_status_type
383 elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
385 void * data ATTRIBUTE_UNUSED, asection *sec,
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387 {
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391 }
392
393 /* Do the work of the GPDISP relocation. */
394
395 static bfd_reloc_status_type
396 elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398 {
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431 }
432
433 /* The special function for the GPDISP reloc. */
434
435 static bfd_reloc_status_type
436 elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440 {
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476 }
477
478 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480 #define MINUS_ONE (((bfd_vma)0) - 1)
481
482
483 #define SKIP_HOWTO(N) \
484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
485
486 static reloc_howto_type elf64_alpha_howto_table[] =
487 {
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
492 TRUE, /* pc_relative */
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
497 FALSE, /* partial_inplace */
498 0, /* src_mask */
499 0, /* dst_mask */
500 TRUE), /* pcrel_offset */
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
507 FALSE, /* pc_relative */
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
510 bfd_elf_generic_reloc, /* special_function */
511 "REFLONG", /* name */
512 FALSE, /* partial_inplace */
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
515 FALSE), /* pcrel_offset */
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
522 FALSE, /* pc_relative */
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
525 bfd_elf_generic_reloc, /* special_function */
526 "REFQUAD", /* name */
527 FALSE, /* partial_inplace */
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
530 FALSE), /* pcrel_offset */
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
539 FALSE, /* pc_relative */
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
542 bfd_elf_generic_reloc, /* special_function */
543 "GPREL32", /* name */
544 FALSE, /* partial_inplace */
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
547 FALSE), /* pcrel_offset */
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
552 1, /* size (0 = byte, 1 = short, 2 = long) */
553 16, /* bitsize */
554 FALSE, /* pc_relative */
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
557 bfd_elf_generic_reloc, /* special_function */
558 "ELF_LITERAL", /* name */
559 FALSE, /* partial_inplace */
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
562 FALSE), /* pcrel_offset */
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
573 1, /* size (0 = byte, 1 = short, 2 = long) */
574 32, /* bitsize */
575 FALSE, /* pc_relative */
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
580 FALSE, /* partial_inplace */
581 0, /* src_mask */
582 0, /* dst_mask */
583 FALSE), /* pcrel_offset */
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
605 FALSE, /* pc_relative */
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
610 FALSE, /* partial_inplace */
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
613 TRUE), /* pcrel_offset */
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
620 TRUE, /* pc_relative */
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
623 bfd_elf_generic_reloc, /* special_function */
624 "BRADDR", /* name */
625 FALSE, /* partial_inplace */
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
628 TRUE), /* pcrel_offset */
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
633 1, /* size (0 = byte, 1 = short, 2 = long) */
634 14, /* bitsize */
635 TRUE, /* pc_relative */
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
638 bfd_elf_generic_reloc, /* special_function */
639 "HINT", /* name */
640 FALSE, /* partial_inplace */
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
643 TRUE), /* pcrel_offset */
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
650 TRUE, /* pc_relative */
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
653 bfd_elf_generic_reloc, /* special_function */
654 "SREL16", /* name */
655 FALSE, /* partial_inplace */
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
658 TRUE), /* pcrel_offset */
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
665 TRUE, /* pc_relative */
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
668 bfd_elf_generic_reloc, /* special_function */
669 "SREL32", /* name */
670 FALSE, /* partial_inplace */
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
673 TRUE), /* pcrel_offset */
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
680 TRUE, /* pc_relative */
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
683 bfd_elf_generic_reloc, /* special_function */
684 "SREL64", /* name */
685 FALSE, /* partial_inplace */
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
688 TRUE), /* pcrel_offset */
689
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
700 1, /* size (0 = byte, 1 = short, 2 = long) */
701 16, /* bitsize */
702 FALSE, /* pc_relative */
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
705 bfd_elf_generic_reloc, /* special_function */
706 "GPRELHIGH", /* name */
707 FALSE, /* partial_inplace */
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
710 FALSE), /* pcrel_offset */
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
715 1, /* size (0 = byte, 1 = short, 2 = long) */
716 16, /* bitsize */
717 FALSE, /* pc_relative */
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
720 bfd_elf_generic_reloc, /* special_function */
721 "GPRELLOW", /* name */
722 FALSE, /* partial_inplace */
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
725 FALSE), /* pcrel_offset */
726
727 /* A 16-bit displacement from the GP to the target. */
728 HOWTO (R_ALPHA_GPREL16,
729 0, /* rightshift */
730 1, /* size (0 = byte, 1 = short, 2 = long) */
731 16, /* bitsize */
732 FALSE, /* pc_relative */
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
735 bfd_elf_generic_reloc, /* special_function */
736 "GPREL16", /* name */
737 FALSE, /* partial_inplace */
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
740 FALSE), /* pcrel_offset */
741
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
747
748 /* Misc ELF relocations. */
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
758 FALSE,
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
763 FALSE,
764 0,
765 0,
766 TRUE),
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
773 FALSE,
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
778 FALSE,
779 0,
780 0,
781 TRUE),
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
788 FALSE,
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
793 FALSE,
794 0,
795 0,
796 TRUE),
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
803 FALSE,
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
808 FALSE,
809 0,
810 0,
811 TRUE),
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
818 TRUE, /* pc_relative */
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
821 bfd_elf_generic_reloc, /* special_function */
822 "BRSGP", /* name */
823 FALSE, /* partial_inplace */
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
826 TRUE), /* pcrel_offset */
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
833 FALSE, /* pc_relative */
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
836 bfd_elf_generic_reloc, /* special_function */
837 "TLSGD", /* name */
838 FALSE, /* partial_inplace */
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
841 FALSE), /* pcrel_offset */
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
848 FALSE, /* pc_relative */
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
851 bfd_elf_generic_reloc, /* special_function */
852 "TLSLDM", /* name */
853 FALSE, /* partial_inplace */
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
856 FALSE), /* pcrel_offset */
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
863 FALSE, /* pc_relative */
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
866 bfd_elf_generic_reloc, /* special_function */
867 "DTPMOD64", /* name */
868 FALSE, /* partial_inplace */
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
871 FALSE), /* pcrel_offset */
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
879 FALSE, /* pc_relative */
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
882 bfd_elf_generic_reloc, /* special_function */
883 "GOTDTPREL", /* name */
884 FALSE, /* partial_inplace */
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
887 FALSE), /* pcrel_offset */
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
894 FALSE, /* pc_relative */
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
897 bfd_elf_generic_reloc, /* special_function */
898 "DTPREL64", /* name */
899 FALSE, /* partial_inplace */
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
902 FALSE), /* pcrel_offset */
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
909 FALSE, /* pc_relative */
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
912 bfd_elf_generic_reloc, /* special_function */
913 "DTPRELHI", /* name */
914 FALSE, /* partial_inplace */
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
917 FALSE), /* pcrel_offset */
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
924 FALSE, /* pc_relative */
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
927 bfd_elf_generic_reloc, /* special_function */
928 "DTPRELLO", /* name */
929 FALSE, /* partial_inplace */
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
932 FALSE), /* pcrel_offset */
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
939 FALSE, /* pc_relative */
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
942 bfd_elf_generic_reloc, /* special_function */
943 "DTPREL16", /* name */
944 FALSE, /* partial_inplace */
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
947 FALSE), /* pcrel_offset */
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
955 FALSE, /* pc_relative */
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
958 bfd_elf_generic_reloc, /* special_function */
959 "GOTTPREL", /* name */
960 FALSE, /* partial_inplace */
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
963 FALSE), /* pcrel_offset */
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
970 FALSE, /* pc_relative */
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
973 bfd_elf_generic_reloc, /* special_function */
974 "TPREL64", /* name */
975 FALSE, /* partial_inplace */
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
978 FALSE), /* pcrel_offset */
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
985 FALSE, /* pc_relative */
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
988 bfd_elf_generic_reloc, /* special_function */
989 "TPRELHI", /* name */
990 FALSE, /* partial_inplace */
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
993 FALSE), /* pcrel_offset */
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
1000 FALSE, /* pc_relative */
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
1003 bfd_elf_generic_reloc, /* special_function */
1004 "TPRELLO", /* name */
1005 FALSE, /* partial_inplace */
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
1008 FALSE), /* pcrel_offset */
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
1015 FALSE, /* pc_relative */
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
1018 bfd_elf_generic_reloc, /* special_function */
1019 "TPREL16", /* name */
1020 FALSE, /* partial_inplace */
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
1023 FALSE), /* pcrel_offset */
1024 };
1025
1026 /* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028 struct elf_reloc_map
1029 {
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032 };
1033
1034 static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035 {
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
1066 };
1067
1068 /* Given a BFD reloc type, return a HOWTO structure. */
1069
1070 static reloc_howto_type *
1071 elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
1073 {
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083 }
1084
1085 static reloc_howto_type *
1086 elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088 {
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100 }
1101
1102 /* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
1104 static bfd_boolean
1105 elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
1106 Elf_Internal_Rela *dst)
1107 {
1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
1112 /* xgettext:c-format */
1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1114 abfd, r_type);
1115 bfd_set_error (bfd_error_bad_value);
1116 return FALSE;
1117 }
1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1119 return TRUE;
1120 }
1121
1122 /* These two relocations create a two-word entry in the got. */
1123 #define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
1125
1126 /* This is PT_TLS segment p_vaddr. */
1127 #define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
1129
1130 /* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
1132 #define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
1136 \f
1137 /* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
1139 type.
1140 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1141 how to. */
1142
1143 static bfd_boolean
1144 elf64_alpha_section_from_shdr (bfd *abfd,
1145 Elf_Internal_Shdr *hdr,
1146 const char *name,
1147 int shindex)
1148 {
1149 asection *newsect;
1150
1151 /* There ought to be a place to keep ELF backend specific flags, but
1152 at the moment there isn't one. We just keep track of the
1153 sections by their name, instead. Fortunately, the ABI gives
1154 suggested names for all the MIPS specific sections, so we will
1155 probably get away with this. */
1156 switch (hdr->sh_type)
1157 {
1158 case SHT_ALPHA_DEBUG:
1159 if (strcmp (name, ".mdebug") != 0)
1160 return FALSE;
1161 break;
1162 default:
1163 return FALSE;
1164 }
1165
1166 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1167 return FALSE;
1168 newsect = hdr->bfd_section;
1169
1170 if (hdr->sh_type == SHT_ALPHA_DEBUG)
1171 {
1172 if (!bfd_set_section_flags (newsect,
1173 bfd_section_flags (newsect) | SEC_DEBUGGING))
1174 return FALSE;
1175 }
1176
1177 return TRUE;
1178 }
1179
1180 /* Convert Alpha specific section flags to bfd internal section flags. */
1181
1182 static bfd_boolean
1183 elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
1184 {
1185 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1186 hdr->bfd_section->flags |= SEC_SMALL_DATA;
1187
1188 return TRUE;
1189 }
1190
1191 /* Set the correct type for an Alpha ELF section. We do this by the
1192 section name, which is a hack, but ought to work. */
1193
1194 static bfd_boolean
1195 elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1196 {
1197 register const char *name;
1198
1199 name = bfd_section_name (sec);
1200
1201 if (strcmp (name, ".mdebug") == 0)
1202 {
1203 hdr->sh_type = SHT_ALPHA_DEBUG;
1204 /* In a shared object on Irix 5.3, the .mdebug section has an
1205 entsize of 0. FIXME: Does this matter? */
1206 if ((abfd->flags & DYNAMIC) != 0 )
1207 hdr->sh_entsize = 0;
1208 else
1209 hdr->sh_entsize = 1;
1210 }
1211 else if ((sec->flags & SEC_SMALL_DATA)
1212 || strcmp (name, ".sdata") == 0
1213 || strcmp (name, ".sbss") == 0
1214 || strcmp (name, ".lit4") == 0
1215 || strcmp (name, ".lit8") == 0)
1216 hdr->sh_flags |= SHF_ALPHA_GPREL;
1217
1218 return TRUE;
1219 }
1220
1221 /* Hook called by the linker routine which adds symbols from an object
1222 file. We use it to put .comm items in .sbss, and not .bss. */
1223
1224 static bfd_boolean
1225 elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1226 Elf_Internal_Sym *sym,
1227 const char **namep ATTRIBUTE_UNUSED,
1228 flagword *flagsp ATTRIBUTE_UNUSED,
1229 asection **secp, bfd_vma *valp)
1230 {
1231 if (sym->st_shndx == SHN_COMMON
1232 && !bfd_link_relocatable (info)
1233 && sym->st_size <= elf_gp_size (abfd))
1234 {
1235 /* Common symbols less than or equal to -G nn bytes are
1236 automatically put into .sbss. */
1237
1238 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
1239
1240 if (scomm == NULL)
1241 {
1242 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1243 (SEC_ALLOC
1244 | SEC_IS_COMMON
1245 | SEC_LINKER_CREATED));
1246 if (scomm == NULL)
1247 return FALSE;
1248 }
1249
1250 *secp = scomm;
1251 *valp = sym->st_size;
1252 }
1253
1254 return TRUE;
1255 }
1256
1257 /* Create the .got section. */
1258
1259 static bfd_boolean
1260 elf64_alpha_create_got_section (bfd *abfd,
1261 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1262 {
1263 flagword flags;
1264 asection *s;
1265
1266 if (! is_alpha_elf (abfd))
1267 return FALSE;
1268
1269 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1270 | SEC_LINKER_CREATED);
1271 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
1272 if (s == NULL
1273 || !bfd_set_section_alignment (s, 3))
1274 return FALSE;
1275
1276 alpha_elf_tdata (abfd)->got = s;
1277
1278 /* Make sure the object's gotobj is set to itself so that we default
1279 to every object with its own .got. We'll merge .gots later once
1280 we've collected each object's info. */
1281 alpha_elf_tdata (abfd)->gotobj = abfd;
1282
1283 return TRUE;
1284 }
1285
1286 /* Create all the dynamic sections. */
1287
1288 static bfd_boolean
1289 elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1290 {
1291 asection *s;
1292 flagword flags;
1293 struct elf_link_hash_entry *h;
1294
1295 if (! is_alpha_elf (abfd))
1296 return FALSE;
1297
1298 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
1299
1300 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1301 | SEC_LINKER_CREATED
1302 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1303 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
1304 elf_hash_table (info)->splt = s;
1305 if (s == NULL || ! bfd_set_section_alignment (s, 4))
1306 return FALSE;
1307
1308 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1309 .plt section. */
1310 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1311 "_PROCEDURE_LINKAGE_TABLE_");
1312 elf_hash_table (info)->hplt = h;
1313 if (h == NULL)
1314 return FALSE;
1315
1316 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1317 | SEC_LINKER_CREATED | SEC_READONLY);
1318 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
1319 elf_hash_table (info)->srelplt = s;
1320 if (s == NULL || ! bfd_set_section_alignment (s, 3))
1321 return FALSE;
1322
1323 if (elf64_alpha_use_secureplt)
1324 {
1325 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1326 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
1327 elf_hash_table (info)->sgotplt = s;
1328 if (s == NULL || ! bfd_set_section_alignment (s, 3))
1329 return FALSE;
1330 }
1331
1332 /* We may or may not have created a .got section for this object, but
1333 we definitely havn't done the rest of the work. */
1334
1335 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1336 {
1337 if (!elf64_alpha_create_got_section (abfd, info))
1338 return FALSE;
1339 }
1340
1341 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1342 | SEC_LINKER_CREATED | SEC_READONLY);
1343 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
1344 elf_hash_table (info)->srelgot = s;
1345 if (s == NULL
1346 || !bfd_set_section_alignment (s, 3))
1347 return FALSE;
1348
1349 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1350 dynobj's .got section. We don't do this in the linker script
1351 because we don't want to define the symbol if we are not creating
1352 a global offset table. */
1353 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1354 "_GLOBAL_OFFSET_TABLE_");
1355 elf_hash_table (info)->hgot = h;
1356 if (h == NULL)
1357 return FALSE;
1358
1359 return TRUE;
1360 }
1361 \f
1362 /* Read ECOFF debugging information from a .mdebug section into a
1363 ecoff_debug_info structure. */
1364
1365 static bfd_boolean
1366 elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1367 struct ecoff_debug_info *debug)
1368 {
1369 HDRR *symhdr;
1370 const struct ecoff_debug_swap *swap;
1371 char *ext_hdr = NULL;
1372
1373 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1374 memset (debug, 0, sizeof (*debug));
1375
1376 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1377 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1378 goto error_return;
1379
1380 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1381 swap->external_hdr_size))
1382 goto error_return;
1383
1384 symhdr = &debug->symbolic_header;
1385 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
1386
1387 /* The symbolic header contains absolute file offsets and sizes to
1388 read. */
1389 #define READ(ptr, offset, count, size, type) \
1390 do \
1391 { \
1392 size_t amt; \
1393 debug->ptr = NULL; \
1394 if (symhdr->count == 0) \
1395 break; \
1396 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1397 { \
1398 bfd_set_error (bfd_error_file_too_big); \
1399 goto error_return; \
1400 } \
1401 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
1402 goto error_return; \
1403 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1404 if (debug->ptr == NULL) \
1405 goto error_return; \
1406 } while (0)
1407
1408 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
1409 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1410 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1411 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1412 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
1413 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1414 union aux_ext *);
1415 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1416 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
1417 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1418 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1419 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
1420 #undef READ
1421
1422 debug->fdr = NULL;
1423
1424 return TRUE;
1425
1426 error_return:
1427 if (ext_hdr != NULL)
1428 free (ext_hdr);
1429 if (debug->line != NULL)
1430 free (debug->line);
1431 if (debug->external_dnr != NULL)
1432 free (debug->external_dnr);
1433 if (debug->external_pdr != NULL)
1434 free (debug->external_pdr);
1435 if (debug->external_sym != NULL)
1436 free (debug->external_sym);
1437 if (debug->external_opt != NULL)
1438 free (debug->external_opt);
1439 if (debug->external_aux != NULL)
1440 free (debug->external_aux);
1441 if (debug->ss != NULL)
1442 free (debug->ss);
1443 if (debug->ssext != NULL)
1444 free (debug->ssext);
1445 if (debug->external_fdr != NULL)
1446 free (debug->external_fdr);
1447 if (debug->external_rfd != NULL)
1448 free (debug->external_rfd);
1449 if (debug->external_ext != NULL)
1450 free (debug->external_ext);
1451 return FALSE;
1452 }
1453
1454 /* Alpha ELF local labels start with '$'. */
1455
1456 static bfd_boolean
1457 elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
1458 {
1459 return name[0] == '$';
1460 }
1461
1462 static bfd_boolean
1463 elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1464 asection *section, bfd_vma offset,
1465 const char **filename_ptr,
1466 const char **functionname_ptr,
1467 unsigned int *line_ptr,
1468 unsigned int *discriminator_ptr)
1469 {
1470 asection *msec;
1471
1472 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
1473 filename_ptr, functionname_ptr,
1474 line_ptr, discriminator_ptr,
1475 dwarf_debug_sections,
1476 &elf_tdata (abfd)->dwarf2_find_line_info)
1477 == 1)
1478 return TRUE;
1479
1480 msec = bfd_get_section_by_name (abfd, ".mdebug");
1481 if (msec != NULL)
1482 {
1483 flagword origflags;
1484 struct alpha_elf_find_line *fi;
1485 const struct ecoff_debug_swap * const swap =
1486 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1487
1488 /* If we are called during a link, alpha_elf_final_link may have
1489 cleared the SEC_HAS_CONTENTS field. We force it back on here
1490 if appropriate (which it normally will be). */
1491 origflags = msec->flags;
1492 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1493 msec->flags |= SEC_HAS_CONTENTS;
1494
1495 fi = alpha_elf_tdata (abfd)->find_line_info;
1496 if (fi == NULL)
1497 {
1498 bfd_size_type external_fdr_size;
1499 char *fraw_src;
1500 char *fraw_end;
1501 struct fdr *fdr_ptr;
1502 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
1503
1504 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
1505 if (fi == NULL)
1506 {
1507 msec->flags = origflags;
1508 return FALSE;
1509 }
1510
1511 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1512 {
1513 msec->flags = origflags;
1514 return FALSE;
1515 }
1516
1517 /* Swap in the FDR information. */
1518 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1519 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1520 if (fi->d.fdr == NULL)
1521 {
1522 msec->flags = origflags;
1523 return FALSE;
1524 }
1525 external_fdr_size = swap->external_fdr_size;
1526 fdr_ptr = fi->d.fdr;
1527 fraw_src = (char *) fi->d.external_fdr;
1528 fraw_end = (fraw_src
1529 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1530 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
1531 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
1532
1533 alpha_elf_tdata (abfd)->find_line_info = fi;
1534
1535 /* Note that we don't bother to ever free this information.
1536 find_nearest_line is either called all the time, as in
1537 objdump -l, so the information should be saved, or it is
1538 rarely called, as in ld error messages, so the memory
1539 wasted is unimportant. Still, it would probably be a
1540 good idea for free_cached_info to throw it away. */
1541 }
1542
1543 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1544 &fi->i, filename_ptr, functionname_ptr,
1545 line_ptr))
1546 {
1547 msec->flags = origflags;
1548 return TRUE;
1549 }
1550
1551 msec->flags = origflags;
1552 }
1553
1554 /* Fall back on the generic ELF find_nearest_line routine. */
1555
1556 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
1557 filename_ptr, functionname_ptr,
1558 line_ptr, discriminator_ptr);
1559 }
1560 \f
1561 /* Structure used to pass information to alpha_elf_output_extsym. */
1562
1563 struct extsym_info
1564 {
1565 bfd *abfd;
1566 struct bfd_link_info *info;
1567 struct ecoff_debug_info *debug;
1568 const struct ecoff_debug_swap *swap;
1569 bfd_boolean failed;
1570 };
1571
1572 static bfd_boolean
1573 elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
1574 {
1575 struct extsym_info *einfo = (struct extsym_info *) data;
1576 bfd_boolean strip;
1577 asection *sec, *output_section;
1578
1579 if (h->root.indx == -2)
1580 strip = FALSE;
1581 else if ((h->root.def_dynamic
1582 || h->root.ref_dynamic
1583 || h->root.root.type == bfd_link_hash_new)
1584 && !h->root.def_regular
1585 && !h->root.ref_regular)
1586 strip = TRUE;
1587 else if (einfo->info->strip == strip_all
1588 || (einfo->info->strip == strip_some
1589 && bfd_hash_lookup (einfo->info->keep_hash,
1590 h->root.root.root.string,
1591 FALSE, FALSE) == NULL))
1592 strip = TRUE;
1593 else
1594 strip = FALSE;
1595
1596 if (strip)
1597 return TRUE;
1598
1599 if (h->esym.ifd == -2)
1600 {
1601 h->esym.jmptbl = 0;
1602 h->esym.cobol_main = 0;
1603 h->esym.weakext = 0;
1604 h->esym.reserved = 0;
1605 h->esym.ifd = ifdNil;
1606 h->esym.asym.value = 0;
1607 h->esym.asym.st = stGlobal;
1608
1609 if (h->root.root.type != bfd_link_hash_defined
1610 && h->root.root.type != bfd_link_hash_defweak)
1611 h->esym.asym.sc = scAbs;
1612 else
1613 {
1614 const char *name;
1615
1616 sec = h->root.root.u.def.section;
1617 output_section = sec->output_section;
1618
1619 /* When making a shared library and symbol h is the one from
1620 the another shared library, OUTPUT_SECTION may be null. */
1621 if (output_section == NULL)
1622 h->esym.asym.sc = scUndefined;
1623 else
1624 {
1625 name = bfd_section_name (output_section);
1626
1627 if (strcmp (name, ".text") == 0)
1628 h->esym.asym.sc = scText;
1629 else if (strcmp (name, ".data") == 0)
1630 h->esym.asym.sc = scData;
1631 else if (strcmp (name, ".sdata") == 0)
1632 h->esym.asym.sc = scSData;
1633 else if (strcmp (name, ".rodata") == 0
1634 || strcmp (name, ".rdata") == 0)
1635 h->esym.asym.sc = scRData;
1636 else if (strcmp (name, ".bss") == 0)
1637 h->esym.asym.sc = scBss;
1638 else if (strcmp (name, ".sbss") == 0)
1639 h->esym.asym.sc = scSBss;
1640 else if (strcmp (name, ".init") == 0)
1641 h->esym.asym.sc = scInit;
1642 else if (strcmp (name, ".fini") == 0)
1643 h->esym.asym.sc = scFini;
1644 else
1645 h->esym.asym.sc = scAbs;
1646 }
1647 }
1648
1649 h->esym.asym.reserved = 0;
1650 h->esym.asym.index = indexNil;
1651 }
1652
1653 if (h->root.root.type == bfd_link_hash_common)
1654 h->esym.asym.value = h->root.root.u.c.size;
1655 else if (h->root.root.type == bfd_link_hash_defined
1656 || h->root.root.type == bfd_link_hash_defweak)
1657 {
1658 if (h->esym.asym.sc == scCommon)
1659 h->esym.asym.sc = scBss;
1660 else if (h->esym.asym.sc == scSCommon)
1661 h->esym.asym.sc = scSBss;
1662
1663 sec = h->root.root.u.def.section;
1664 output_section = sec->output_section;
1665 if (output_section != NULL)
1666 h->esym.asym.value = (h->root.root.u.def.value
1667 + sec->output_offset
1668 + output_section->vma);
1669 else
1670 h->esym.asym.value = 0;
1671 }
1672
1673 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1674 h->root.root.root.string,
1675 &h->esym))
1676 {
1677 einfo->failed = TRUE;
1678 return FALSE;
1679 }
1680
1681 return TRUE;
1682 }
1683 \f
1684 /* Search for and possibly create a got entry. */
1685
1686 static struct alpha_elf_got_entry *
1687 get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1688 unsigned long r_type, unsigned long r_symndx,
1689 bfd_vma r_addend)
1690 {
1691 struct alpha_elf_got_entry *gotent;
1692 struct alpha_elf_got_entry **slot;
1693
1694 if (h)
1695 slot = &h->got_entries;
1696 else
1697 {
1698 /* This is a local .got entry -- record for merge. */
1699
1700 struct alpha_elf_got_entry **local_got_entries;
1701
1702 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1703 if (!local_got_entries)
1704 {
1705 bfd_size_type size;
1706 Elf_Internal_Shdr *symtab_hdr;
1707
1708 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1709 size = symtab_hdr->sh_info;
1710 size *= sizeof (struct alpha_elf_got_entry *);
1711
1712 local_got_entries
1713 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1714 if (!local_got_entries)
1715 return NULL;
1716
1717 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1718 }
1719
1720 slot = &local_got_entries[r_symndx];
1721 }
1722
1723 for (gotent = *slot; gotent ; gotent = gotent->next)
1724 if (gotent->gotobj == abfd
1725 && gotent->reloc_type == r_type
1726 && gotent->addend == r_addend)
1727 break;
1728
1729 if (!gotent)
1730 {
1731 int entry_size;
1732 size_t amt;
1733
1734 amt = sizeof (struct alpha_elf_got_entry);
1735 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1736 if (!gotent)
1737 return NULL;
1738
1739 gotent->gotobj = abfd;
1740 gotent->addend = r_addend;
1741 gotent->got_offset = -1;
1742 gotent->plt_offset = -1;
1743 gotent->use_count = 1;
1744 gotent->reloc_type = r_type;
1745 gotent->reloc_done = 0;
1746 gotent->reloc_xlated = 0;
1747
1748 gotent->next = *slot;
1749 *slot = gotent;
1750
1751 entry_size = alpha_got_entry_size (r_type);
1752 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1753 if (!h)
1754 alpha_elf_tdata(abfd)->local_got_size += entry_size;
1755 }
1756 else
1757 gotent->use_count += 1;
1758
1759 return gotent;
1760 }
1761
1762 static bfd_boolean
1763 elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1764 {
1765 return ((ah->root.type == STT_FUNC
1766 || ah->root.root.type == bfd_link_hash_undefweak
1767 || ah->root.root.type == bfd_link_hash_undefined)
1768 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1769 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
1770 }
1771
1772 /* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1773 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1774 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1775 relocs to be sorted. */
1776
1777 static bfd_boolean
1778 elf64_alpha_sort_relocs_p (asection *sec)
1779 {
1780 return (sec->flags & SEC_CODE) == 0;
1781 }
1782
1783
1784 /* Handle dynamic relocations when doing an Alpha ELF link. */
1785
1786 static bfd_boolean
1787 elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1788 asection *sec, const Elf_Internal_Rela *relocs)
1789 {
1790 bfd *dynobj;
1791 asection *sreloc;
1792 Elf_Internal_Shdr *symtab_hdr;
1793 struct alpha_elf_link_hash_entry **sym_hashes;
1794 const Elf_Internal_Rela *rel, *relend;
1795
1796 if (bfd_link_relocatable (info))
1797 return TRUE;
1798
1799 /* Don't do anything special with non-loaded, non-alloced sections.
1800 In particular, any relocs in such sections should not affect GOT
1801 and PLT reference counting (ie. we don't allow them to create GOT
1802 or PLT entries), there's no possibility or desire to optimize TLS
1803 relocs, and there's not much point in propagating relocs to shared
1804 libs that the dynamic linker won't relocate. */
1805 if ((sec->flags & SEC_ALLOC) == 0)
1806 return TRUE;
1807
1808 BFD_ASSERT (is_alpha_elf (abfd));
1809
1810 dynobj = elf_hash_table (info)->dynobj;
1811 if (dynobj == NULL)
1812 elf_hash_table (info)->dynobj = dynobj = abfd;
1813
1814 sreloc = NULL;
1815 symtab_hdr = &elf_symtab_hdr (abfd);
1816 sym_hashes = alpha_elf_sym_hashes (abfd);
1817
1818 relend = relocs + sec->reloc_count;
1819 for (rel = relocs; rel < relend; ++rel)
1820 {
1821 enum {
1822 NEED_GOT = 1,
1823 NEED_GOT_ENTRY = 2,
1824 NEED_DYNREL = 4
1825 };
1826
1827 unsigned long r_symndx, r_type;
1828 struct alpha_elf_link_hash_entry *h;
1829 unsigned int gotent_flags;
1830 bfd_boolean maybe_dynamic;
1831 unsigned int need;
1832 bfd_vma addend;
1833
1834 r_symndx = ELF64_R_SYM (rel->r_info);
1835 if (r_symndx < symtab_hdr->sh_info)
1836 h = NULL;
1837 else
1838 {
1839 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1840
1841 while (h->root.root.type == bfd_link_hash_indirect
1842 || h->root.root.type == bfd_link_hash_warning)
1843 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
1844
1845 /* PR15323, ref flags aren't set for references in the same
1846 object. */
1847 h->root.ref_regular = 1;
1848 }
1849
1850 /* We can only get preliminary data on whether a symbol is
1851 locally or externally defined, as not all of the input files
1852 have yet been processed. Do something with what we know, as
1853 this may help reduce memory usage and processing time later. */
1854 maybe_dynamic = FALSE;
1855 if (h && ((bfd_link_pic (info)
1856 && (!info->symbolic
1857 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1858 || !h->root.def_regular
1859 || h->root.root.type == bfd_link_hash_defweak))
1860 maybe_dynamic = TRUE;
1861
1862 need = 0;
1863 gotent_flags = 0;
1864 r_type = ELF64_R_TYPE (rel->r_info);
1865 addend = rel->r_addend;
1866
1867 switch (r_type)
1868 {
1869 case R_ALPHA_LITERAL:
1870 need = NEED_GOT | NEED_GOT_ENTRY;
1871
1872 /* Remember how this literal is used from its LITUSEs.
1873 This will be important when it comes to decide if we can
1874 create a .plt entry for a function symbol. */
1875 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
1876 if (rel->r_addend >= 1 && rel->r_addend <= 6)
1877 gotent_flags |= 1 << rel->r_addend;
1878 --rel;
1879
1880 /* No LITUSEs -- presumably the address is used somehow. */
1881 if (gotent_flags == 0)
1882 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1883 break;
1884
1885 case R_ALPHA_GPDISP:
1886 case R_ALPHA_GPREL16:
1887 case R_ALPHA_GPREL32:
1888 case R_ALPHA_GPRELHIGH:
1889 case R_ALPHA_GPRELLOW:
1890 case R_ALPHA_BRSGP:
1891 need = NEED_GOT;
1892 break;
1893
1894 case R_ALPHA_REFLONG:
1895 case R_ALPHA_REFQUAD:
1896 if (bfd_link_pic (info) || maybe_dynamic)
1897 need = NEED_DYNREL;
1898 break;
1899
1900 case R_ALPHA_TLSLDM:
1901 /* The symbol for a TLSLDM reloc is ignored. Collapse the
1902 reloc to the STN_UNDEF (0) symbol so that they all match. */
1903 r_symndx = STN_UNDEF;
1904 h = 0;
1905 maybe_dynamic = FALSE;
1906 /* FALLTHRU */
1907
1908 case R_ALPHA_TLSGD:
1909 case R_ALPHA_GOTDTPREL:
1910 need = NEED_GOT | NEED_GOT_ENTRY;
1911 break;
1912
1913 case R_ALPHA_GOTTPREL:
1914 need = NEED_GOT | NEED_GOT_ENTRY;
1915 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1916 if (bfd_link_pic (info))
1917 info->flags |= DF_STATIC_TLS;
1918 break;
1919
1920 case R_ALPHA_TPREL64:
1921 if (bfd_link_dll (info))
1922 {
1923 info->flags |= DF_STATIC_TLS;
1924 need = NEED_DYNREL;
1925 }
1926 else if (maybe_dynamic)
1927 need = NEED_DYNREL;
1928 break;
1929 }
1930
1931 if (need & NEED_GOT)
1932 {
1933 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1934 {
1935 if (!elf64_alpha_create_got_section (abfd, info))
1936 return FALSE;
1937 }
1938 }
1939
1940 if (need & NEED_GOT_ENTRY)
1941 {
1942 struct alpha_elf_got_entry *gotent;
1943
1944 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1945 if (!gotent)
1946 return FALSE;
1947
1948 if (gotent_flags)
1949 {
1950 gotent->flags |= gotent_flags;
1951 if (h)
1952 {
1953 gotent_flags |= h->flags;
1954 h->flags = gotent_flags;
1955
1956 /* Make a guess as to whether a .plt entry is needed. */
1957 /* ??? It appears that we won't make it into
1958 adjust_dynamic_symbol for symbols that remain
1959 totally undefined. Copying this check here means
1960 we can create a plt entry for them too. */
1961 h->root.needs_plt
1962 = (maybe_dynamic && elf64_alpha_want_plt (h));
1963 }
1964 }
1965 }
1966
1967 if (need & NEED_DYNREL)
1968 {
1969 /* We need to create the section here now whether we eventually
1970 use it or not so that it gets mapped to an output section by
1971 the linker. If not used, we'll kill it in size_dynamic_sections. */
1972 if (sreloc == NULL)
1973 {
1974 sreloc = _bfd_elf_make_dynamic_reloc_section
1975 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1976
1977 if (sreloc == NULL)
1978 return FALSE;
1979 }
1980
1981 if (h)
1982 {
1983 /* Since we havn't seen all of the input symbols yet, we
1984 don't know whether we'll actually need a dynamic relocation
1985 entry for this reloc. So make a record of it. Once we
1986 find out if this thing needs dynamic relocation we'll
1987 expand the relocation sections by the appropriate amount. */
1988
1989 struct alpha_elf_reloc_entry *rent;
1990
1991 for (rent = h->reloc_entries; rent; rent = rent->next)
1992 if (rent->rtype == r_type && rent->srel == sreloc)
1993 break;
1994
1995 if (!rent)
1996 {
1997 size_t amt = sizeof (struct alpha_elf_reloc_entry);
1998 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1999 if (!rent)
2000 return FALSE;
2001
2002 rent->srel = sreloc;
2003 rent->rtype = r_type;
2004 rent->count = 1;
2005 rent->reltext = (sec->flags & SEC_READONLY) != 0;
2006
2007 rent->next = h->reloc_entries;
2008 h->reloc_entries = rent;
2009 }
2010 else
2011 rent->count++;
2012 }
2013 else if (bfd_link_pic (info))
2014 {
2015 /* If this is a shared library, and the section is to be
2016 loaded into memory, we need a RELATIVE reloc. */
2017 sreloc->size += sizeof (Elf64_External_Rela);
2018 if (sec->flags & SEC_READONLY)
2019 info->flags |= DF_TEXTREL;
2020 }
2021 }
2022 }
2023
2024 return TRUE;
2025 }
2026
2027 /* Return the section that should be marked against GC for a given
2028 relocation. */
2029
2030 static asection *
2031 elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2032 Elf_Internal_Rela *rel,
2033 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2034 {
2035 /* These relocations don't really reference a symbol. Instead we store
2036 extra data in their addend slot. Ignore the symbol. */
2037 switch (ELF64_R_TYPE (rel->r_info))
2038 {
2039 case R_ALPHA_LITUSE:
2040 case R_ALPHA_GPDISP:
2041 case R_ALPHA_HINT:
2042 return NULL;
2043 }
2044
2045 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2046 }
2047
2048 /* Adjust a symbol defined by a dynamic object and referenced by a
2049 regular object. The current definition is in some section of the
2050 dynamic object, but we're not including those sections. We have to
2051 change the definition to something the rest of the link can
2052 understand. */
2053
2054 static bfd_boolean
2055 elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2056 struct elf_link_hash_entry *h)
2057 {
2058 bfd *dynobj;
2059 asection *s;
2060 struct alpha_elf_link_hash_entry *ah;
2061
2062 dynobj = elf_hash_table(info)->dynobj;
2063 ah = (struct alpha_elf_link_hash_entry *)h;
2064
2065 /* Now that we've seen all of the input symbols, finalize our decision
2066 about whether this symbol should get a .plt entry. Irritatingly, it
2067 is common for folk to leave undefined symbols in shared libraries,
2068 and they still expect lazy binding; accept undefined symbols in lieu
2069 of STT_FUNC. */
2070 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
2071 {
2072 h->needs_plt = TRUE;
2073
2074 s = elf_hash_table(info)->splt;
2075 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2076 return FALSE;
2077
2078 /* We need one plt entry per got subsection. Delay allocation of
2079 the actual plt entries until size_plt_section, called from
2080 size_dynamic_sections or during relaxation. */
2081
2082 return TRUE;
2083 }
2084 else
2085 h->needs_plt = FALSE;
2086
2087 /* If this is a weak symbol, and there is a real definition, the
2088 processor independent code will have arranged for us to see the
2089 real definition first, and we can just use the same value. */
2090 if (h->is_weakalias)
2091 {
2092 struct elf_link_hash_entry *def = weakdef (h);
2093 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2094 h->root.u.def.section = def->root.u.def.section;
2095 h->root.u.def.value = def->root.u.def.value;
2096 return TRUE;
2097 }
2098
2099 /* This is a reference to a symbol defined by a dynamic object which
2100 is not a function. The Alpha, since it uses .got entries for all
2101 symbols even in regular objects, does not need the hackery of a
2102 .dynbss section and COPY dynamic relocations. */
2103
2104 return TRUE;
2105 }
2106
2107 /* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2108
2109 static void
2110 elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2111 const Elf_Internal_Sym *isym,
2112 bfd_boolean definition,
2113 bfd_boolean dynamic)
2114 {
2115 if (!dynamic && definition)
2116 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2117 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2118 }
2119
2120 /* Symbol versioning can create new symbols, and make our old symbols
2121 indirect to the new ones. Consolidate the got and reloc information
2122 in these situations. */
2123
2124 static void
2125 elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2126 struct elf_link_hash_entry *dir,
2127 struct elf_link_hash_entry *ind)
2128 {
2129 struct alpha_elf_link_hash_entry *hi
2130 = (struct alpha_elf_link_hash_entry *) ind;
2131 struct alpha_elf_link_hash_entry *hs
2132 = (struct alpha_elf_link_hash_entry *) dir;
2133
2134 /* Do the merging in the superclass. */
2135 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
2136
2137 /* Merge the flags. Whee. */
2138 hs->flags |= hi->flags;
2139
2140 /* ??? It's unclear to me what's really supposed to happen when
2141 "merging" defweak and defined symbols, given that we don't
2142 actually throw away the defweak. This more-or-less copies
2143 the logic related to got and plt entries in the superclass. */
2144 if (ind->root.type != bfd_link_hash_indirect)
2145 return;
2146
2147 /* Merge the .got entries. Cannibalize the old symbol's list in
2148 doing so, since we don't need it anymore. */
2149
2150 if (hs->got_entries == NULL)
2151 hs->got_entries = hi->got_entries;
2152 else
2153 {
2154 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2155
2156 gsh = hs->got_entries;
2157 for (gi = hi->got_entries; gi ; gi = gin)
2158 {
2159 gin = gi->next;
2160 for (gs = gsh; gs ; gs = gs->next)
2161 if (gi->gotobj == gs->gotobj
2162 && gi->reloc_type == gs->reloc_type
2163 && gi->addend == gs->addend)
2164 {
2165 gs->use_count += gi->use_count;
2166 goto got_found;
2167 }
2168 gi->next = hs->got_entries;
2169 hs->got_entries = gi;
2170 got_found:;
2171 }
2172 }
2173 hi->got_entries = NULL;
2174
2175 /* And similar for the reloc entries. */
2176
2177 if (hs->reloc_entries == NULL)
2178 hs->reloc_entries = hi->reloc_entries;
2179 else
2180 {
2181 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2182
2183 rsh = hs->reloc_entries;
2184 for (ri = hi->reloc_entries; ri ; ri = rin)
2185 {
2186 rin = ri->next;
2187 for (rs = rsh; rs ; rs = rs->next)
2188 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2189 {
2190 rs->count += ri->count;
2191 goto found_reloc;
2192 }
2193 ri->next = hs->reloc_entries;
2194 hs->reloc_entries = ri;
2195 found_reloc:;
2196 }
2197 }
2198 hi->reloc_entries = NULL;
2199 }
2200
2201 /* Is it possible to merge two object file's .got tables? */
2202
2203 static bfd_boolean
2204 elf64_alpha_can_merge_gots (bfd *a, bfd *b)
2205 {
2206 int total = alpha_elf_tdata (a)->total_got_size;
2207 bfd *bsub;
2208
2209 /* Trivial quick fallout test. */
2210 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2211 return TRUE;
2212
2213 /* By their nature, local .got entries cannot be merged. */
2214 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
2215 return FALSE;
2216
2217 /* Failing the common trivial comparison, we must effectively
2218 perform the merge. Not actually performing the merge means that
2219 we don't have to store undo information in case we fail. */
2220 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2221 {
2222 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2223 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2224 int i, n;
2225
2226 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2227 for (i = 0; i < n; ++i)
2228 {
2229 struct alpha_elf_got_entry *ae, *be;
2230 struct alpha_elf_link_hash_entry *h;
2231
2232 h = hashes[i];
2233 while (h->root.root.type == bfd_link_hash_indirect
2234 || h->root.root.type == bfd_link_hash_warning)
2235 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2236
2237 for (be = h->got_entries; be ; be = be->next)
2238 {
2239 if (be->use_count == 0)
2240 continue;
2241 if (be->gotobj != b)
2242 continue;
2243
2244 for (ae = h->got_entries; ae ; ae = ae->next)
2245 if (ae->gotobj == a
2246 && ae->reloc_type == be->reloc_type
2247 && ae->addend == be->addend)
2248 goto global_found;
2249
2250 total += alpha_got_entry_size (be->reloc_type);
2251 if (total > MAX_GOT_SIZE)
2252 return FALSE;
2253 global_found:;
2254 }
2255 }
2256 }
2257
2258 return TRUE;
2259 }
2260
2261 /* Actually merge two .got tables. */
2262
2263 static void
2264 elf64_alpha_merge_gots (bfd *a, bfd *b)
2265 {
2266 int total = alpha_elf_tdata (a)->total_got_size;
2267 bfd *bsub;
2268
2269 /* Remember local expansion. */
2270 {
2271 int e = alpha_elf_tdata (b)->local_got_size;
2272 total += e;
2273 alpha_elf_tdata (a)->local_got_size += e;
2274 }
2275
2276 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2277 {
2278 struct alpha_elf_got_entry **local_got_entries;
2279 struct alpha_elf_link_hash_entry **hashes;
2280 Elf_Internal_Shdr *symtab_hdr;
2281 int i, n;
2282
2283 /* Let the local .got entries know they are part of a new subsegment. */
2284 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2285 if (local_got_entries)
2286 {
2287 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2288 for (i = 0; i < n; ++i)
2289 {
2290 struct alpha_elf_got_entry *ent;
2291 for (ent = local_got_entries[i]; ent; ent = ent->next)
2292 ent->gotobj = a;
2293 }
2294 }
2295
2296 /* Merge the global .got entries. */
2297 hashes = alpha_elf_sym_hashes (bsub);
2298 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2299
2300 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2301 for (i = 0; i < n; ++i)
2302 {
2303 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2304 struct alpha_elf_link_hash_entry *h;
2305
2306 h = hashes[i];
2307 while (h->root.root.type == bfd_link_hash_indirect
2308 || h->root.root.type == bfd_link_hash_warning)
2309 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2310
2311 pbe = start = &h->got_entries;
2312 while ((be = *pbe) != NULL)
2313 {
2314 if (be->use_count == 0)
2315 {
2316 *pbe = be->next;
2317 memset (be, 0xa5, sizeof (*be));
2318 goto kill;
2319 }
2320 if (be->gotobj != b)
2321 goto next;
2322
2323 for (ae = *start; ae ; ae = ae->next)
2324 if (ae->gotobj == a
2325 && ae->reloc_type == be->reloc_type
2326 && ae->addend == be->addend)
2327 {
2328 ae->flags |= be->flags;
2329 ae->use_count += be->use_count;
2330 *pbe = be->next;
2331 memset (be, 0xa5, sizeof (*be));
2332 goto kill;
2333 }
2334 be->gotobj = a;
2335 total += alpha_got_entry_size (be->reloc_type);
2336
2337 next:;
2338 pbe = &be->next;
2339 kill:;
2340 }
2341 }
2342
2343 alpha_elf_tdata (bsub)->gotobj = a;
2344 }
2345 alpha_elf_tdata (a)->total_got_size = total;
2346
2347 /* Merge the two in_got chains. */
2348 {
2349 bfd *next;
2350
2351 bsub = a;
2352 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2353 bsub = next;
2354
2355 alpha_elf_tdata (bsub)->in_got_link_next = b;
2356 }
2357 }
2358
2359 /* Calculate the offsets for the got entries. */
2360
2361 static bfd_boolean
2362 elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2363 void * arg ATTRIBUTE_UNUSED)
2364 {
2365 struct alpha_elf_got_entry *gotent;
2366
2367 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2368 if (gotent->use_count > 0)
2369 {
2370 struct alpha_elf_obj_tdata *td;
2371 bfd_size_type *plge;
2372
2373 td = alpha_elf_tdata (gotent->gotobj);
2374 plge = &td->got->size;
2375 gotent->got_offset = *plge;
2376 *plge += alpha_got_entry_size (gotent->reloc_type);
2377 }
2378
2379 return TRUE;
2380 }
2381
2382 static void
2383 elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2384 {
2385 bfd *i, *got_list;
2386 struct alpha_elf_link_hash_table * htab;
2387
2388 htab = alpha_elf_hash_table (info);
2389 if (htab == NULL)
2390 return;
2391 got_list = htab->got_list;
2392
2393 /* First, zero out the .got sizes, as we may be recalculating the
2394 .got after optimizing it. */
2395 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2396 alpha_elf_tdata(i)->got->size = 0;
2397
2398 /* Next, fill in the offsets for all the global entries. */
2399 alpha_elf_link_hash_traverse (htab,
2400 elf64_alpha_calc_got_offsets_for_symbol,
2401 NULL);
2402
2403 /* Finally, fill in the offsets for the local entries. */
2404 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2405 {
2406 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2407 bfd *j;
2408
2409 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2410 {
2411 struct alpha_elf_got_entry **local_got_entries, *gotent;
2412 int k, n;
2413
2414 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2415 if (!local_got_entries)
2416 continue;
2417
2418 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2419 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2420 if (gotent->use_count > 0)
2421 {
2422 gotent->got_offset = got_offset;
2423 got_offset += alpha_got_entry_size (gotent->reloc_type);
2424 }
2425 }
2426
2427 alpha_elf_tdata(i)->got->size = got_offset;
2428 }
2429 }
2430
2431 /* Constructs the gots. */
2432
2433 static bfd_boolean
2434 elf64_alpha_size_got_sections (struct bfd_link_info *info,
2435 bfd_boolean may_merge)
2436 {
2437 bfd *i, *got_list, *cur_got_obj = NULL;
2438 struct alpha_elf_link_hash_table * htab;
2439
2440 htab = alpha_elf_hash_table (info);
2441 if (htab == NULL)
2442 return FALSE;
2443 got_list = htab->got_list;
2444
2445 /* On the first time through, pretend we have an existing got list
2446 consisting of all of the input files. */
2447 if (got_list == NULL)
2448 {
2449 for (i = info->input_bfds; i ; i = i->link.next)
2450 {
2451 bfd *this_got;
2452
2453 if (! is_alpha_elf (i))
2454 continue;
2455
2456 this_got = alpha_elf_tdata (i)->gotobj;
2457 if (this_got == NULL)
2458 continue;
2459
2460 /* We are assuming no merging has yet occurred. */
2461 BFD_ASSERT (this_got == i);
2462
2463 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
2464 {
2465 /* Yikes! A single object file has too many entries. */
2466 _bfd_error_handler
2467 /* xgettext:c-format */
2468 (_("%pB: .got subsegment exceeds 64K (size %d)"),
2469 i, alpha_elf_tdata (this_got)->total_got_size);
2470 return FALSE;
2471 }
2472
2473 if (got_list == NULL)
2474 got_list = this_got;
2475 else
2476 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2477 cur_got_obj = this_got;
2478 }
2479
2480 /* Strange degenerate case of no got references. */
2481 if (got_list == NULL)
2482 return TRUE;
2483
2484 htab->got_list = got_list;
2485 }
2486
2487 cur_got_obj = got_list;
2488 if (cur_got_obj == NULL)
2489 return FALSE;
2490
2491 if (may_merge)
2492 {
2493 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2494 while (i != NULL)
2495 {
2496 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2497 {
2498 elf64_alpha_merge_gots (cur_got_obj, i);
2499
2500 alpha_elf_tdata(i)->got->size = 0;
2501 i = alpha_elf_tdata(i)->got_link_next;
2502 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2503 }
2504 else
2505 {
2506 cur_got_obj = i;
2507 i = alpha_elf_tdata(i)->got_link_next;
2508 }
2509 }
2510 }
2511
2512 /* Once the gots have been merged, fill in the got offsets for
2513 everything therein. */
2514 elf64_alpha_calc_got_offsets (info);
2515
2516 return TRUE;
2517 }
2518
2519 static bfd_boolean
2520 elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2521 void * data)
2522 {
2523 asection *splt = (asection *) data;
2524 struct alpha_elf_got_entry *gotent;
2525 bfd_boolean saw_one = FALSE;
2526
2527 /* If we didn't need an entry before, we still don't. */
2528 if (!h->root.needs_plt)
2529 return TRUE;
2530
2531 /* For each LITERAL got entry still in use, allocate a plt entry. */
2532 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2533 if (gotent->reloc_type == R_ALPHA_LITERAL
2534 && gotent->use_count > 0)
2535 {
2536 if (splt->size == 0)
2537 splt->size = PLT_HEADER_SIZE;
2538 gotent->plt_offset = splt->size;
2539 splt->size += PLT_ENTRY_SIZE;
2540 saw_one = TRUE;
2541 }
2542
2543 /* If there weren't any, there's no longer a need for the PLT entry. */
2544 if (!saw_one)
2545 h->root.needs_plt = FALSE;
2546
2547 return TRUE;
2548 }
2549
2550 /* Called from relax_section to rebuild the PLT in light of potential changes
2551 in the function's status. */
2552
2553 static void
2554 elf64_alpha_size_plt_section (struct bfd_link_info *info)
2555 {
2556 asection *splt, *spltrel, *sgotplt;
2557 unsigned long entries;
2558 struct alpha_elf_link_hash_table * htab;
2559
2560 htab = alpha_elf_hash_table (info);
2561 if (htab == NULL)
2562 return;
2563
2564 splt = elf_hash_table(info)->splt;
2565 if (splt == NULL)
2566 return;
2567
2568 splt->size = 0;
2569
2570 alpha_elf_link_hash_traverse (htab,
2571 elf64_alpha_size_plt_section_1, splt);
2572
2573 /* Every plt entry requires a JMP_SLOT relocation. */
2574 spltrel = elf_hash_table(info)->srelplt;
2575 entries = 0;
2576 if (splt->size)
2577 {
2578 if (elf64_alpha_use_secureplt)
2579 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2580 else
2581 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2582 }
2583 spltrel->size = entries * sizeof (Elf64_External_Rela);
2584
2585 /* When using the secureplt, we need two words somewhere in the data
2586 segment for the dynamic linker to tell us where to go. This is the
2587 entire contents of the .got.plt section. */
2588 if (elf64_alpha_use_secureplt)
2589 {
2590 sgotplt = elf_hash_table(info)->sgotplt;
2591 sgotplt->size = entries ? 16 : 0;
2592 }
2593 }
2594
2595 static bfd_boolean
2596 elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2597 struct bfd_link_info *info)
2598 {
2599 bfd *i;
2600 struct alpha_elf_link_hash_table * htab;
2601
2602 if (bfd_link_relocatable (info))
2603 return TRUE;
2604
2605 htab = alpha_elf_hash_table (info);
2606 if (htab == NULL)
2607 return FALSE;
2608
2609 if (!elf64_alpha_size_got_sections (info, TRUE))
2610 return FALSE;
2611
2612 /* Allocate space for all of the .got subsections. */
2613 i = htab->got_list;
2614 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
2615 {
2616 asection *s = alpha_elf_tdata(i)->got;
2617 if (s->size > 0)
2618 {
2619 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2620 if (s->contents == NULL)
2621 return FALSE;
2622 }
2623 }
2624
2625 return TRUE;
2626 }
2627
2628 /* The number of dynamic relocations required by a static relocation. */
2629
2630 static int
2631 alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
2632 {
2633 switch (r_type)
2634 {
2635 /* May appear in GOT entries. */
2636 case R_ALPHA_TLSGD:
2637 return (dynamic ? 2 : shared ? 1 : 0);
2638 case R_ALPHA_TLSLDM:
2639 return shared;
2640 case R_ALPHA_LITERAL:
2641 return dynamic || shared;
2642 case R_ALPHA_GOTTPREL:
2643 return dynamic || (shared && !pie);
2644 case R_ALPHA_GOTDTPREL:
2645 return dynamic;
2646
2647 /* May appear in data sections. */
2648 case R_ALPHA_REFLONG:
2649 case R_ALPHA_REFQUAD:
2650 return dynamic || shared;
2651 case R_ALPHA_TPREL64:
2652 return dynamic || (shared && !pie);
2653
2654 /* Everything else is illegal. We'll issue an error during
2655 relocate_section. */
2656 default:
2657 return 0;
2658 }
2659 }
2660
2661 /* Work out the sizes of the dynamic relocation entries. */
2662
2663 static bfd_boolean
2664 elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2665 struct bfd_link_info *info)
2666 {
2667 bfd_boolean dynamic;
2668 struct alpha_elf_reloc_entry *relent;
2669 unsigned long entries;
2670
2671 /* If the symbol was defined as a common symbol in a regular object
2672 file, and there was no definition in any dynamic object, then the
2673 linker will have allocated space for the symbol in a common
2674 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2675 set. This is done for dynamic symbols in
2676 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2677 symbols, somehow. */
2678 if (!h->root.def_regular
2679 && h->root.ref_regular
2680 && !h->root.def_dynamic
2681 && (h->root.root.type == bfd_link_hash_defined
2682 || h->root.root.type == bfd_link_hash_defweak)
2683 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2684 h->root.def_regular = 1;
2685
2686 /* If the symbol is dynamic, we'll need all the relocations in their
2687 natural form. If this is a shared object, and it has been forced
2688 local, we'll need the same number of RELATIVE relocations. */
2689 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2690
2691 /* If the symbol is a hidden undefined weak, then we never have any
2692 relocations. Avoid the loop which may want to add RELATIVE relocs
2693 based on bfd_link_pic (info). */
2694 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2695 return TRUE;
2696
2697 for (relent = h->reloc_entries; relent; relent = relent->next)
2698 {
2699 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
2700 bfd_link_pic (info),
2701 bfd_link_pie (info));
2702 if (entries)
2703 {
2704 relent->srel->size +=
2705 entries * sizeof (Elf64_External_Rela) * relent->count;
2706 if (relent->reltext)
2707 info->flags |= DT_TEXTREL;
2708 }
2709 }
2710
2711 return TRUE;
2712 }
2713
2714 /* Subroutine of elf64_alpha_size_rela_got_section for doing the
2715 global symbols. */
2716
2717 static bfd_boolean
2718 elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2719 struct bfd_link_info *info)
2720 {
2721 bfd_boolean dynamic;
2722 struct alpha_elf_got_entry *gotent;
2723 unsigned long entries;
2724
2725 /* If we're using a plt for this symbol, then all of its relocations
2726 for its got entries go into .rela.plt. */
2727 if (h->root.needs_plt)
2728 return TRUE;
2729
2730 /* If the symbol is dynamic, we'll need all the relocations in their
2731 natural form. If this is a shared object, and it has been forced
2732 local, we'll need the same number of RELATIVE relocations. */
2733 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2734
2735 /* If the symbol is a hidden undefined weak, then we never have any
2736 relocations. Avoid the loop which may want to add RELATIVE relocs
2737 based on bfd_link_pic (info). */
2738 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2739 return TRUE;
2740
2741 entries = 0;
2742 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2743 if (gotent->use_count > 0)
2744 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
2745 bfd_link_pic (info),
2746 bfd_link_pie (info));
2747
2748 if (entries > 0)
2749 {
2750 asection *srel = elf_hash_table(info)->srelgot;
2751 BFD_ASSERT (srel != NULL);
2752 srel->size += sizeof (Elf64_External_Rela) * entries;
2753 }
2754
2755 return TRUE;
2756 }
2757
2758 /* Set the sizes of the dynamic relocation sections. */
2759
2760 static void
2761 elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
2762 {
2763 unsigned long entries;
2764 bfd *i;
2765 asection *srel;
2766 struct alpha_elf_link_hash_table * htab;
2767
2768 htab = alpha_elf_hash_table (info);
2769 if (htab == NULL)
2770 return;
2771
2772 /* Shared libraries often require RELATIVE relocs, and some relocs
2773 require attention for the main application as well. */
2774
2775 entries = 0;
2776 for (i = htab->got_list;
2777 i ; i = alpha_elf_tdata(i)->got_link_next)
2778 {
2779 bfd *j;
2780
2781 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2782 {
2783 struct alpha_elf_got_entry **local_got_entries, *gotent;
2784 int k, n;
2785
2786 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2787 if (!local_got_entries)
2788 continue;
2789
2790 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2791 for (gotent = local_got_entries[k];
2792 gotent ; gotent = gotent->next)
2793 if (gotent->use_count > 0)
2794 entries += (alpha_dynamic_entries_for_reloc
2795 (gotent->reloc_type, 0, bfd_link_pic (info),
2796 bfd_link_pie (info)));
2797 }
2798 }
2799
2800 srel = elf_hash_table(info)->srelgot;
2801 if (!srel)
2802 {
2803 BFD_ASSERT (entries == 0);
2804 return;
2805 }
2806 srel->size = sizeof (Elf64_External_Rela) * entries;
2807
2808 /* Now do the non-local symbols. */
2809 alpha_elf_link_hash_traverse (htab,
2810 elf64_alpha_size_rela_got_1, info);
2811 }
2812
2813 /* Set the sizes of the dynamic sections. */
2814
2815 static bfd_boolean
2816 elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2817 struct bfd_link_info *info)
2818 {
2819 bfd *dynobj;
2820 asection *s;
2821 bfd_boolean relplt, relocs;
2822 struct alpha_elf_link_hash_table * htab;
2823
2824 htab = alpha_elf_hash_table (info);
2825 if (htab == NULL)
2826 return FALSE;
2827
2828 dynobj = elf_hash_table(info)->dynobj;
2829 BFD_ASSERT(dynobj != NULL);
2830
2831 if (elf_hash_table (info)->dynamic_sections_created)
2832 {
2833 /* Set the contents of the .interp section to the interpreter. */
2834 if (bfd_link_executable (info) && !info->nointerp)
2835 {
2836 s = bfd_get_linker_section (dynobj, ".interp");
2837 BFD_ASSERT (s != NULL);
2838 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2839 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2840 }
2841
2842 /* Now that we've seen all of the input files, we can decide which
2843 symbols need dynamic relocation entries and which don't. We've
2844 collected information in check_relocs that we can now apply to
2845 size the dynamic relocation sections. */
2846 alpha_elf_link_hash_traverse (htab,
2847 elf64_alpha_calc_dynrel_sizes, info);
2848
2849 elf64_alpha_size_rela_got_section (info);
2850 elf64_alpha_size_plt_section (info);
2851 }
2852 /* else we're not dynamic and by definition we don't need such things. */
2853
2854 /* The check_relocs and adjust_dynamic_symbol entry points have
2855 determined the sizes of the various dynamic sections. Allocate
2856 memory for them. */
2857 relplt = FALSE;
2858 relocs = FALSE;
2859 for (s = dynobj->sections; s != NULL; s = s->next)
2860 {
2861 const char *name;
2862
2863 if (!(s->flags & SEC_LINKER_CREATED))
2864 continue;
2865
2866 /* It's OK to base decisions on the section name, because none
2867 of the dynobj section names depend upon the input files. */
2868 name = bfd_section_name (s);
2869
2870 if (CONST_STRNEQ (name, ".rela"))
2871 {
2872 if (s->size != 0)
2873 {
2874 if (strcmp (name, ".rela.plt") == 0)
2875 relplt = TRUE;
2876 else
2877 relocs = TRUE;
2878
2879 /* We use the reloc_count field as a counter if we need
2880 to copy relocs into the output file. */
2881 s->reloc_count = 0;
2882 }
2883 }
2884 else if (! CONST_STRNEQ (name, ".got")
2885 && strcmp (name, ".plt") != 0
2886 && strcmp (name, ".dynbss") != 0)
2887 {
2888 /* It's not one of our dynamic sections, so don't allocate space. */
2889 continue;
2890 }
2891
2892 if (s->size == 0)
2893 {
2894 /* If we don't need this section, strip it from the output file.
2895 This is to handle .rela.bss and .rela.plt. We must create it
2896 in create_dynamic_sections, because it must be created before
2897 the linker maps input sections to output sections. The
2898 linker does that before adjust_dynamic_symbol is called, and
2899 it is that function which decides whether anything needs to
2900 go into these sections. */
2901 if (!CONST_STRNEQ (name, ".got"))
2902 s->flags |= SEC_EXCLUDE;
2903 }
2904 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
2905 {
2906 /* Allocate memory for the section contents. */
2907 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2908 if (s->contents == NULL)
2909 return FALSE;
2910 }
2911 }
2912
2913 if (elf_hash_table (info)->dynamic_sections_created)
2914 {
2915 /* Add some entries to the .dynamic section. We fill in the
2916 values later, in elf64_alpha_finish_dynamic_sections, but we
2917 must add the entries now so that we get the correct size for
2918 the .dynamic section. The DT_DEBUG entry is filled in by the
2919 dynamic linker and used by the debugger. */
2920 #define add_dynamic_entry(TAG, VAL) \
2921 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2922
2923 if (bfd_link_executable (info))
2924 {
2925 if (!add_dynamic_entry (DT_DEBUG, 0))
2926 return FALSE;
2927 }
2928
2929 if (relplt)
2930 {
2931 if (!add_dynamic_entry (DT_PLTGOT, 0)
2932 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2933 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2934 || !add_dynamic_entry (DT_JMPREL, 0))
2935 return FALSE;
2936
2937 if (elf64_alpha_use_secureplt
2938 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2939 return FALSE;
2940 }
2941
2942 if (relocs)
2943 {
2944 if (!add_dynamic_entry (DT_RELA, 0)
2945 || !add_dynamic_entry (DT_RELASZ, 0)
2946 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2947 return FALSE;
2948
2949 if (info->flags & DF_TEXTREL)
2950 {
2951 if (!add_dynamic_entry (DT_TEXTREL, 0))
2952 return FALSE;
2953 }
2954 }
2955 }
2956 #undef add_dynamic_entry
2957
2958 return TRUE;
2959 }
2960 \f
2961 /* These functions do relaxation for Alpha ELF.
2962
2963 Currently I'm only handling what I can do with existing compiler
2964 and assembler support, which means no instructions are removed,
2965 though some may be nopped. At this time GCC does not emit enough
2966 information to do all of the relaxing that is possible. It will
2967 take some not small amount of work for that to happen.
2968
2969 There are a couple of interesting papers that I once read on this
2970 subject, that I cannot find references to at the moment, that
2971 related to Alpha in particular. They are by David Wall, then of
2972 DEC WRL. */
2973
2974 struct alpha_relax_info
2975 {
2976 bfd *abfd;
2977 asection *sec;
2978 bfd_byte *contents;
2979 Elf_Internal_Shdr *symtab_hdr;
2980 Elf_Internal_Rela *relocs, *relend;
2981 struct bfd_link_info *link_info;
2982 bfd_vma gp;
2983 bfd *gotobj;
2984 asection *tsec;
2985 struct alpha_elf_link_hash_entry *h;
2986 struct alpha_elf_got_entry **first_gotent;
2987 struct alpha_elf_got_entry *gotent;
2988 bfd_boolean changed_contents;
2989 bfd_boolean changed_relocs;
2990 unsigned char other;
2991 };
2992
2993 static Elf_Internal_Rela *
2994 elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2995 Elf_Internal_Rela *relend,
2996 bfd_vma offset, int type)
2997 {
2998 while (rel < relend)
2999 {
3000 if (rel->r_offset == offset
3001 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3002 return rel;
3003 ++rel;
3004 }
3005 return NULL;
3006 }
3007
3008 static bfd_boolean
3009 elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3010 Elf_Internal_Rela *irel, unsigned long r_type)
3011 {
3012 unsigned int insn;
3013 bfd_signed_vma disp;
3014
3015 /* Get the instruction. */
3016 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
3017
3018 if (insn >> 26 != OP_LDQ)
3019 {
3020 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
3021 _bfd_error_handler
3022 /* xgettext:c-format */
3023 (_("%pB: %pA+%#" PRIx64 ": warning: "
3024 "%s relocation against unexpected insn"),
3025 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
3026 return TRUE;
3027 }
3028
3029 /* Can't relax dynamic symbols. */
3030 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3031 return TRUE;
3032
3033 /* Can't use local-exec relocations in shared libraries. */
3034 if (r_type == R_ALPHA_GOTTPREL
3035 && bfd_link_dll (info->link_info))
3036 return TRUE;
3037
3038 if (r_type == R_ALPHA_LITERAL)
3039 {
3040 /* Look for nice constant addresses. This includes the not-uncommon
3041 special case of 0 for undefweak symbols. */
3042 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3043 || (!bfd_link_pic (info->link_info)
3044 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3045 {
3046 disp = 0;
3047 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3048 insn |= (symval & 0xffff);
3049 r_type = R_ALPHA_NONE;
3050 }
3051 else
3052 {
3053 /* We may only create GPREL relocs during the second pass. */
3054 if (info->link_info->relax_pass == 0)
3055 return TRUE;
3056
3057 disp = symval - info->gp;
3058 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3059 r_type = R_ALPHA_GPREL16;
3060 }
3061 }
3062 else
3063 {
3064 bfd_vma dtp_base, tp_base;
3065
3066 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3067 dtp_base = alpha_get_dtprel_base (info->link_info);
3068 tp_base = alpha_get_tprel_base (info->link_info);
3069 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
3070
3071 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3072
3073 switch (r_type)
3074 {
3075 case R_ALPHA_GOTDTPREL:
3076 r_type = R_ALPHA_DTPREL16;
3077 break;
3078 case R_ALPHA_GOTTPREL:
3079 r_type = R_ALPHA_TPREL16;
3080 break;
3081 default:
3082 BFD_ASSERT (0);
3083 return FALSE;
3084 }
3085 }
3086
3087 if (disp < -0x8000 || disp >= 0x8000)
3088 return TRUE;
3089
3090 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3091 info->changed_contents = TRUE;
3092
3093 /* Reduce the use count on this got entry by one, possibly
3094 eliminating it. */
3095 if (--info->gotent->use_count == 0)
3096 {
3097 int sz = alpha_got_entry_size (r_type);
3098 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3099 if (!info->h)
3100 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3101 }
3102
3103 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3104 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3105 info->changed_relocs = TRUE;
3106
3107 /* ??? Search forward through this basic block looking for insns
3108 that use the target register. Stop after an insn modifying the
3109 register is seen, or after a branch or call.
3110
3111 Any such memory load insn may be substituted by a load directly
3112 off the GP. This allows the memory load insn to be issued before
3113 the calculated GP register would otherwise be ready.
3114
3115 Any such jsr insn can be replaced by a bsr if it is in range.
3116
3117 This would mean that we'd have to _add_ relocations, the pain of
3118 which gives one pause. */
3119
3120 return TRUE;
3121 }
3122
3123 static bfd_vma
3124 elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
3125 {
3126 /* If the function has the same gp, and we can identify that the
3127 function does not use its function pointer, we can eliminate the
3128 address load. */
3129
3130 /* If the symbol is marked NOPV, we are being told the function never
3131 needs its procedure value. */
3132 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3133 return symval;
3134
3135 /* If the symbol is marked STD_GP, we are being told the function does
3136 a normal ldgp in the first two words. */
3137 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3138 ;
3139
3140 /* Otherwise, we may be able to identify a GP load in the first two
3141 words, which we can then skip. */
3142 else
3143 {
3144 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3145 bfd_vma ofs;
3146
3147 /* Load the relocations from the section that the target symbol is in. */
3148 if (info->sec == info->tsec)
3149 {
3150 tsec_relocs = info->relocs;
3151 tsec_relend = info->relend;
3152 tsec_free = NULL;
3153 }
3154 else
3155 {
3156 tsec_relocs = (_bfd_elf_link_read_relocs
3157 (info->abfd, info->tsec, NULL,
3158 (Elf_Internal_Rela *) NULL,
3159 info->link_info->keep_memory));
3160 if (tsec_relocs == NULL)
3161 return 0;
3162 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3163 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3164 ? NULL
3165 : tsec_relocs);
3166 }
3167
3168 /* Recover the symbol's offset within the section. */
3169 ofs = (symval - info->tsec->output_section->vma
3170 - info->tsec->output_offset);
3171
3172 /* Look for a GPDISP reloc. */
3173 gpdisp = (elf64_alpha_find_reloc_at_ofs
3174 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
3175
3176 if (!gpdisp || gpdisp->r_addend != 4)
3177 {
3178 if (tsec_free)
3179 free (tsec_free);
3180 return 0;
3181 }
3182 if (tsec_free)
3183 free (tsec_free);
3184 }
3185
3186 /* We've now determined that we can skip an initial gp load. Verify
3187 that the call and the target use the same gp. */
3188 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
3189 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3190 return 0;
3191
3192 return symval + 8;
3193 }
3194
3195 static bfd_boolean
3196 elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3197 bfd_vma symval, Elf_Internal_Rela *irel)
3198 {
3199 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3200 int flags;
3201 bfd_signed_vma disp;
3202 bfd_boolean fits16;
3203 bfd_boolean fits32;
3204 bfd_boolean lit_reused = FALSE;
3205 bfd_boolean all_optimized = TRUE;
3206 bfd_boolean changed_contents;
3207 bfd_boolean changed_relocs;
3208 bfd_byte *contents = info->contents;
3209 bfd *abfd = info->abfd;
3210 bfd_vma sec_output_vma;
3211 unsigned int lit_insn;
3212 int relax_pass;
3213
3214 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
3215 if (lit_insn >> 26 != OP_LDQ)
3216 {
3217 _bfd_error_handler
3218 /* xgettext:c-format */
3219 (_("%pB: %pA+%#" PRIx64 ": warning: "
3220 "%s relocation against unexpected insn"),
3221 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
3222 return TRUE;
3223 }
3224
3225 /* Can't relax dynamic symbols. */
3226 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3227 return TRUE;
3228
3229 changed_contents = info->changed_contents;
3230 changed_relocs = info->changed_relocs;
3231 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3232 relax_pass = info->link_info->relax_pass;
3233
3234 /* Summarize how this particular LITERAL is used. */
3235 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
3236 {
3237 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
3238 break;
3239 if (erel->r_addend <= 6)
3240 flags |= 1 << erel->r_addend;
3241 }
3242
3243 /* A little preparation for the loop... */
3244 disp = symval - info->gp;
3245
3246 for (urel = irel+1; urel < erel; ++urel)
3247 {
3248 bfd_vma urel_r_offset = urel->r_offset;
3249 unsigned int insn;
3250 int insn_disp;
3251 bfd_signed_vma xdisp;
3252 Elf_Internal_Rela nrel;
3253
3254 insn = bfd_get_32 (abfd, contents + urel_r_offset);
3255
3256 switch (urel->r_addend)
3257 {
3258 case LITUSE_ALPHA_ADDR:
3259 default:
3260 /* This type is really just a placeholder to note that all
3261 uses cannot be optimized, but to still allow some. */
3262 all_optimized = FALSE;
3263 break;
3264
3265 case LITUSE_ALPHA_BASE:
3266 /* We may only create GPREL relocs during the second pass. */
3267 if (relax_pass == 0)
3268 {
3269 all_optimized = FALSE;
3270 break;
3271 }
3272
3273 /* We can always optimize 16-bit displacements. */
3274
3275 /* Extract the displacement from the instruction, sign-extending
3276 it if necessary, then test whether it is within 16 or 32 bits
3277 displacement from GP. */
3278 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3279
3280 xdisp = disp + insn_disp;
3281 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3282 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3283 && xdisp < 0x7fff8000);
3284
3285 if (fits16)
3286 {
3287 /* Take the op code and dest from this insn, take the base
3288 register from the literal insn. Leave the offset alone. */
3289 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
3290 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3291 changed_contents = TRUE;
3292
3293 nrel = *urel;
3294 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3295 R_ALPHA_GPREL16);
3296 nrel.r_addend = irel->r_addend;
3297
3298 /* As we adjust, move the reloc to the end so that we don't
3299 break the LITERAL+LITUSE chain. */
3300 if (urel < --erel)
3301 *urel-- = *erel;
3302 *erel = nrel;
3303 changed_relocs = TRUE;
3304 }
3305
3306 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3307 else if (fits32 && !(flags & ~6))
3308 {
3309 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
3310
3311 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3312 R_ALPHA_GPRELHIGH);
3313 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
3314 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
3315 lit_reused = TRUE;
3316 changed_contents = TRUE;
3317
3318 /* Since all relocs must be optimized, don't bother swapping
3319 this relocation to the end. */
3320 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3321 R_ALPHA_GPRELLOW);
3322 urel->r_addend = irel->r_addend;
3323 changed_relocs = TRUE;
3324 }
3325 else
3326 all_optimized = FALSE;
3327 break;
3328
3329 case LITUSE_ALPHA_BYTOFF:
3330 /* We can always optimize byte instructions. */
3331
3332 /* FIXME: sanity check the insn for byte op. Check that the
3333 literal dest reg is indeed Rb in the byte insn. */
3334
3335 insn &= ~ (unsigned) 0x001ff000;
3336 insn |= ((symval & 7) << 13) | 0x1000;
3337 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3338 changed_contents = TRUE;
3339
3340 nrel = *urel;
3341 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3342 nrel.r_addend = 0;
3343
3344 /* As we adjust, move the reloc to the end so that we don't
3345 break the LITERAL+LITUSE chain. */
3346 if (urel < --erel)
3347 *urel-- = *erel;
3348 *erel = nrel;
3349 changed_relocs = TRUE;
3350 break;
3351
3352 case LITUSE_ALPHA_JSR:
3353 case LITUSE_ALPHA_TLSGD:
3354 case LITUSE_ALPHA_TLSLDM:
3355 case LITUSE_ALPHA_JSRDIRECT:
3356 {
3357 bfd_vma optdest, org;
3358 bfd_signed_vma odisp;
3359
3360 /* For undefined weak symbols, we're mostly interested in getting
3361 rid of the got entry whenever possible, so optimize this to a
3362 use of the zero register. */
3363 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3364 {
3365 insn |= 31 << 16;
3366 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3367
3368 changed_contents = TRUE;
3369 break;
3370 }
3371
3372 /* If not zero, place to jump without needing pv. */
3373 optdest = elf64_alpha_relax_opt_call (info, symval);
3374 org = sec_output_vma + urel_r_offset + 4;
3375 odisp = (optdest ? optdest : symval) - org;
3376
3377 if (odisp >= -0x400000 && odisp < 0x400000)
3378 {
3379 Elf_Internal_Rela *xrel;
3380
3381 /* Preserve branch prediction call stack when possible. */
3382 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3383 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3384 else
3385 insn = (OP_BR << 26) | (insn & 0x03e00000);
3386 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3387 changed_contents = TRUE;
3388
3389 nrel = *urel;
3390 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3391 R_ALPHA_BRADDR);
3392 nrel.r_addend = irel->r_addend;
3393
3394 if (optdest)
3395 nrel.r_addend += optdest - symval;
3396 else
3397 all_optimized = FALSE;
3398
3399 /* Kill any HINT reloc that might exist for this insn. */
3400 xrel = (elf64_alpha_find_reloc_at_ofs
3401 (info->relocs, info->relend, urel_r_offset,
3402 R_ALPHA_HINT));
3403 if (xrel)
3404 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3405
3406 /* As we adjust, move the reloc to the end so that we don't
3407 break the LITERAL+LITUSE chain. */
3408 if (urel < --erel)
3409 *urel-- = *erel;
3410 *erel = nrel;
3411
3412 info->changed_relocs = TRUE;
3413 }
3414 else
3415 all_optimized = FALSE;
3416
3417 /* Even if the target is not in range for a direct branch,
3418 if we share a GP, we can eliminate the gp reload. */
3419 if (optdest)
3420 {
3421 Elf_Internal_Rela *gpdisp
3422 = (elf64_alpha_find_reloc_at_ofs
3423 (info->relocs, irelend, urel_r_offset + 4,
3424 R_ALPHA_GPDISP));
3425 if (gpdisp)
3426 {
3427 bfd_byte *p_ldah = contents + gpdisp->r_offset;
3428 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
3429 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3430 unsigned int lda = bfd_get_32 (abfd, p_lda);
3431
3432 /* Verify that the instruction is "ldah $29,0($26)".
3433 Consider a function that ends in a noreturn call,
3434 and that the next function begins with an ldgp,
3435 and that by accident there is no padding between.
3436 In that case the insn would use $27 as the base. */
3437 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3438 {
3439 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3440 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
3441
3442 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3443 changed_contents = TRUE;
3444 changed_relocs = TRUE;
3445 }
3446 }
3447 }
3448 }
3449 break;
3450 }
3451 }
3452
3453 /* If we reused the literal instruction, we must have optimized all. */
3454 BFD_ASSERT(!lit_reused || all_optimized);
3455
3456 /* If all cases were optimized, we can reduce the use count on this
3457 got entry by one, possibly eliminating it. */
3458 if (all_optimized)
3459 {
3460 if (--info->gotent->use_count == 0)
3461 {
3462 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3463 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3464 if (!info->h)
3465 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3466 }
3467
3468 /* If the literal instruction is no longer needed (it may have been
3469 reused. We can eliminate it. */
3470 /* ??? For now, I don't want to deal with compacting the section,
3471 so just nop it out. */
3472 if (!lit_reused)
3473 {
3474 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3475 changed_relocs = TRUE;
3476
3477 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3478 changed_contents = TRUE;
3479 }
3480 }
3481
3482 info->changed_contents = changed_contents;
3483 info->changed_relocs = changed_relocs;
3484
3485 if (all_optimized || relax_pass == 0)
3486 return TRUE;
3487 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
3488 }
3489
3490 static bfd_boolean
3491 elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3492 Elf_Internal_Rela *irel, bfd_boolean is_gd)
3493 {
3494 bfd_byte *pos[5];
3495 unsigned int insn, tlsgd_reg;
3496 Elf_Internal_Rela *gpdisp, *hint;
3497 bfd_boolean dynamic, use_gottprel;
3498 unsigned long new_symndx;
3499
3500 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
3501
3502 /* If a TLS symbol is accessed using IE at least once, there is no point
3503 to use dynamic model for it. */
3504 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3505 ;
3506
3507 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3508 then we might as well relax to IE. */
3509 else if (bfd_link_pic (info->link_info) && !dynamic
3510 && (info->link_info->flags & DF_STATIC_TLS))
3511 ;
3512
3513 /* Otherwise we must be building an executable to do anything. */
3514 else if (bfd_link_pic (info->link_info))
3515 return TRUE;
3516
3517 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3518 the matching LITUSE_TLS relocations. */
3519 if (irel + 2 >= info->relend)
3520 return TRUE;
3521 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3522 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3523 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3524 return TRUE;
3525
3526 /* There must be a GPDISP relocation positioned immediately after the
3527 LITUSE relocation. */
3528 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3529 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3530 if (!gpdisp)
3531 return TRUE;
3532
3533 pos[0] = info->contents + irel[0].r_offset;
3534 pos[1] = info->contents + irel[1].r_offset;
3535 pos[2] = info->contents + irel[2].r_offset;
3536 pos[3] = info->contents + gpdisp->r_offset;
3537 pos[4] = pos[3] + gpdisp->r_addend;
3538
3539 /* Beware of the compiler hoisting part of the sequence out a loop
3540 and adjusting the destination register for the TLSGD insn. If this
3541 happens, there will be a move into $16 before the JSR insn, so only
3542 transformations of the first insn pair should use this register. */
3543 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3544 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3545
3546 /* Generally, the positions are not allowed to be out of order, lest the
3547 modified insn sequence have different register lifetimes. We can make
3548 an exception when pos 1 is adjacent to pos 0. */
3549 if (pos[1] + 4 == pos[0])
3550 {
3551 bfd_byte *tmp = pos[0];
3552 pos[0] = pos[1];
3553 pos[1] = tmp;
3554 }
3555 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3556 return TRUE;
3557
3558 /* Reduce the use count on the LITERAL relocation. Do this before we
3559 smash the symndx when we adjust the relocations below. */
3560 {
3561 struct alpha_elf_got_entry *lit_gotent;
3562 struct alpha_elf_link_hash_entry *lit_h;
3563 unsigned long indx;
3564
3565 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3566 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3567 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
3568
3569 while (lit_h->root.root.type == bfd_link_hash_indirect
3570 || lit_h->root.root.type == bfd_link_hash_warning)
3571 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
3572
3573 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3574 lit_gotent = lit_gotent->next)
3575 if (lit_gotent->gotobj == info->gotobj
3576 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3577 && lit_gotent->addend == irel[1].r_addend)
3578 break;
3579 BFD_ASSERT (lit_gotent);
3580
3581 if (--lit_gotent->use_count == 0)
3582 {
3583 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3584 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3585 }
3586 }
3587
3588 /* Change
3589
3590 lda $16,x($gp) !tlsgd!1
3591 ldq $27,__tls_get_addr($gp) !literal!1
3592 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3593 ldah $29,0($26) !gpdisp!2
3594 lda $29,0($29) !gpdisp!2
3595 to
3596 ldq $16,x($gp) !gottprel
3597 unop
3598 call_pal rduniq
3599 addq $16,$0,$0
3600 unop
3601 or the first pair to
3602 lda $16,x($gp) !tprel
3603 unop
3604 or
3605 ldah $16,x($gp) !tprelhi
3606 lda $16,x($16) !tprello
3607
3608 as appropriate. */
3609
3610 use_gottprel = FALSE;
3611 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
3612
3613 /* Some compilers warn about a Boolean-looking expression being
3614 used in a switch. The explicit cast silences them. */
3615 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
3616 {
3617 case 1:
3618 {
3619 bfd_vma tp_base;
3620 bfd_signed_vma disp;
3621
3622 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3623 tp_base = alpha_get_tprel_base (info->link_info);
3624 disp = symval - tp_base;
3625
3626 if (disp >= -0x8000 && disp < 0x8000)
3627 {
3628 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
3629 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3630 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3631
3632 irel[0].r_offset = pos[0] - info->contents;
3633 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3634 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3635 break;
3636 }
3637 else if (disp >= -(bfd_signed_vma) 0x80000000
3638 && disp < (bfd_signed_vma) 0x7fff8000
3639 && pos[0] + 4 == pos[1])
3640 {
3641 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
3642 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3643 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
3644 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3645
3646 irel[0].r_offset = pos[0] - info->contents;
3647 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3648 irel[1].r_offset = pos[1] - info->contents;
3649 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3650 break;
3651 }
3652 }
3653 /* FALLTHRU */
3654
3655 default:
3656 use_gottprel = TRUE;
3657
3658 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
3659 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3660 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3661
3662 irel[0].r_offset = pos[0] - info->contents;
3663 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3664 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3665 break;
3666 }
3667
3668 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
3669
3670 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3671 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3672
3673 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
3674
3675 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3676 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3677
3678 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3679 irel[2].r_offset, R_ALPHA_HINT);
3680 if (hint)
3681 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3682
3683 info->changed_contents = TRUE;
3684 info->changed_relocs = TRUE;
3685
3686 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3687 if (--info->gotent->use_count == 0)
3688 {
3689 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3690 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3691 if (!info->h)
3692 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3693 }
3694
3695 /* If we've switched to a GOTTPREL relocation, increment the reference
3696 count on that got entry. */
3697 if (use_gottprel)
3698 {
3699 struct alpha_elf_got_entry *tprel_gotent;
3700
3701 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3702 tprel_gotent = tprel_gotent->next)
3703 if (tprel_gotent->gotobj == info->gotobj
3704 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3705 && tprel_gotent->addend == irel->r_addend)
3706 break;
3707 if (tprel_gotent)
3708 tprel_gotent->use_count++;
3709 else
3710 {
3711 if (info->gotent->use_count == 0)
3712 tprel_gotent = info->gotent;
3713 else
3714 {
3715 tprel_gotent = (struct alpha_elf_got_entry *)
3716 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3717 if (!tprel_gotent)
3718 return FALSE;
3719
3720 tprel_gotent->next = *info->first_gotent;
3721 *info->first_gotent = tprel_gotent;
3722
3723 tprel_gotent->gotobj = info->gotobj;
3724 tprel_gotent->addend = irel->r_addend;
3725 tprel_gotent->got_offset = -1;
3726 tprel_gotent->reloc_done = 0;
3727 tprel_gotent->reloc_xlated = 0;
3728 }
3729
3730 tprel_gotent->use_count = 1;
3731 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3732 }
3733 }
3734
3735 return TRUE;
3736 }
3737
3738 static bfd_boolean
3739 elf64_alpha_relax_section (bfd *abfd, asection *sec,
3740 struct bfd_link_info *link_info, bfd_boolean *again)
3741 {
3742 Elf_Internal_Shdr *symtab_hdr;
3743 Elf_Internal_Rela *internal_relocs;
3744 Elf_Internal_Rela *irel, *irelend;
3745 Elf_Internal_Sym *isymbuf = NULL;
3746 struct alpha_elf_got_entry **local_got_entries;
3747 struct alpha_relax_info info;
3748 struct alpha_elf_link_hash_table * htab;
3749 int relax_pass;
3750
3751 htab = alpha_elf_hash_table (link_info);
3752 if (htab == NULL)
3753 return FALSE;
3754
3755 /* There's nothing to change, yet. */
3756 *again = FALSE;
3757
3758 if (bfd_link_relocatable (link_info)
3759 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3760 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3761 || sec->reloc_count == 0)
3762 return TRUE;
3763
3764 BFD_ASSERT (is_alpha_elf (abfd));
3765 relax_pass = link_info->relax_pass;
3766
3767 /* Make sure our GOT and PLT tables are up-to-date. */
3768 if (htab->relax_trip != link_info->relax_trip)
3769 {
3770 htab->relax_trip = link_info->relax_trip;
3771
3772 /* This should never fail after the initial round, since the only error
3773 is GOT overflow, and relaxation only shrinks the table. However, we
3774 may only merge got sections during the first pass. If we merge
3775 sections after we've created GPREL relocs, the GP for the merged
3776 section backs up which may put the relocs out of range. */
3777 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
3778 abort ();
3779 if (elf_hash_table (link_info)->dynamic_sections_created)
3780 {
3781 elf64_alpha_size_plt_section (link_info);
3782 elf64_alpha_size_rela_got_section (link_info);
3783 }
3784 }
3785
3786 symtab_hdr = &elf_symtab_hdr (abfd);
3787 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
3788
3789 /* Load the relocations for this section. */
3790 internal_relocs = (_bfd_elf_link_read_relocs
3791 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
3792 link_info->keep_memory));
3793 if (internal_relocs == NULL)
3794 return FALSE;
3795
3796 memset(&info, 0, sizeof (info));
3797 info.abfd = abfd;
3798 info.sec = sec;
3799 info.link_info = link_info;
3800 info.symtab_hdr = symtab_hdr;
3801 info.relocs = internal_relocs;
3802 info.relend = irelend = internal_relocs + sec->reloc_count;
3803
3804 /* Find the GP for this object. Do not store the result back via
3805 _bfd_set_gp_value, since this could change again before final. */
3806 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3807 if (info.gotobj)
3808 {
3809 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3810 info.gp = (sgot->output_section->vma
3811 + sgot->output_offset
3812 + 0x8000);
3813 }
3814
3815 /* Get the section contents. */
3816 if (elf_section_data (sec)->this_hdr.contents != NULL)
3817 info.contents = elf_section_data (sec)->this_hdr.contents;
3818 else
3819 {
3820 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3821 goto error_return;
3822 }
3823
3824 for (irel = internal_relocs; irel < irelend; irel++)
3825 {
3826 bfd_vma symval;
3827 struct alpha_elf_got_entry *gotent;
3828 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3829 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3830
3831 /* Early exit for unhandled or unrelaxable relocations. */
3832 if (r_type != R_ALPHA_LITERAL)
3833 {
3834 /* We complete everything except LITERAL in the first pass. */
3835 if (relax_pass != 0)
3836 continue;
3837 if (r_type == R_ALPHA_TLSLDM)
3838 {
3839 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3840 reloc to the STN_UNDEF (0) symbol so that they all match. */
3841 r_symndx = STN_UNDEF;
3842 }
3843 else if (r_type != R_ALPHA_GOTDTPREL
3844 && r_type != R_ALPHA_GOTTPREL
3845 && r_type != R_ALPHA_TLSGD)
3846 continue;
3847 }
3848
3849 /* Get the value of the symbol referred to by the reloc. */
3850 if (r_symndx < symtab_hdr->sh_info)
3851 {
3852 /* A local symbol. */
3853 Elf_Internal_Sym *isym;
3854
3855 /* Read this BFD's local symbols. */
3856 if (isymbuf == NULL)
3857 {
3858 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3859 if (isymbuf == NULL)
3860 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3861 symtab_hdr->sh_info, 0,
3862 NULL, NULL, NULL);
3863 if (isymbuf == NULL)
3864 goto error_return;
3865 }
3866
3867 isym = isymbuf + r_symndx;
3868
3869 /* Given the symbol for a TLSLDM reloc is ignored, this also
3870 means forcing the symbol value to the tp base. */
3871 if (r_type == R_ALPHA_TLSLDM)
3872 {
3873 info.tsec = bfd_abs_section_ptr;
3874 symval = alpha_get_tprel_base (info.link_info);
3875 }
3876 else
3877 {
3878 symval = isym->st_value;
3879 if (isym->st_shndx == SHN_UNDEF)
3880 continue;
3881 else if (isym->st_shndx == SHN_ABS)
3882 info.tsec = bfd_abs_section_ptr;
3883 else if (isym->st_shndx == SHN_COMMON)
3884 info.tsec = bfd_com_section_ptr;
3885 else
3886 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3887 }
3888
3889 info.h = NULL;
3890 info.other = isym->st_other;
3891 if (local_got_entries)
3892 info.first_gotent = &local_got_entries[r_symndx];
3893 else
3894 {
3895 info.first_gotent = &info.gotent;
3896 info.gotent = NULL;
3897 }
3898 }
3899 else
3900 {
3901 unsigned long indx;
3902 struct alpha_elf_link_hash_entry *h;
3903
3904 indx = r_symndx - symtab_hdr->sh_info;
3905 h = alpha_elf_sym_hashes (abfd)[indx];
3906 BFD_ASSERT (h != NULL);
3907
3908 while (h->root.root.type == bfd_link_hash_indirect
3909 || h->root.root.type == bfd_link_hash_warning)
3910 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
3911
3912 /* If the symbol is undefined, we can't do anything with it. */
3913 if (h->root.root.type == bfd_link_hash_undefined)
3914 continue;
3915
3916 /* If the symbol isn't defined in the current module,
3917 again we can't do anything. */
3918 if (h->root.root.type == bfd_link_hash_undefweak)
3919 {
3920 info.tsec = bfd_abs_section_ptr;
3921 symval = 0;
3922 }
3923 else if (!h->root.def_regular)
3924 {
3925 /* Except for TLSGD relocs, which can sometimes be
3926 relaxed to GOTTPREL relocs. */
3927 if (r_type != R_ALPHA_TLSGD)
3928 continue;
3929 info.tsec = bfd_abs_section_ptr;
3930 symval = 0;
3931 }
3932 else
3933 {
3934 info.tsec = h->root.root.u.def.section;
3935 symval = h->root.root.u.def.value;
3936 }
3937
3938 info.h = h;
3939 info.other = h->root.other;
3940 info.first_gotent = &h->got_entries;
3941 }
3942
3943 /* Search for the got entry to be used by this relocation. */
3944 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3945 if (gotent->gotobj == info.gotobj
3946 && gotent->reloc_type == r_type
3947 && gotent->addend == irel->r_addend)
3948 break;
3949 info.gotent = gotent;
3950
3951 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3952 symval += irel->r_addend;
3953
3954 switch (r_type)
3955 {
3956 case R_ALPHA_LITERAL:
3957 BFD_ASSERT(info.gotent != NULL);
3958
3959 /* If there exist LITUSE relocations immediately following, this
3960 opens up all sorts of interesting optimizations, because we
3961 now know every location that this address load is used. */
3962 if (irel+1 < irelend
3963 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
3964 {
3965 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3966 goto error_return;
3967 }
3968 else
3969 {
3970 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3971 goto error_return;
3972 }
3973 break;
3974
3975 case R_ALPHA_GOTDTPREL:
3976 case R_ALPHA_GOTTPREL:
3977 BFD_ASSERT(info.gotent != NULL);
3978 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3979 goto error_return;
3980 break;
3981
3982 case R_ALPHA_TLSGD:
3983 case R_ALPHA_TLSLDM:
3984 BFD_ASSERT(info.gotent != NULL);
3985 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3986 r_type == R_ALPHA_TLSGD))
3987 goto error_return;
3988 break;
3989 }
3990 }
3991
3992 if (isymbuf != NULL
3993 && symtab_hdr->contents != (unsigned char *) isymbuf)
3994 {
3995 if (!link_info->keep_memory)
3996 free (isymbuf);
3997 else
3998 {
3999 /* Cache the symbols for elf_link_input_bfd. */
4000 symtab_hdr->contents = (unsigned char *) isymbuf;
4001 }
4002 }
4003
4004 if (info.contents != NULL
4005 && elf_section_data (sec)->this_hdr.contents != info.contents)
4006 {
4007 if (!info.changed_contents && !link_info->keep_memory)
4008 free (info.contents);
4009 else
4010 {
4011 /* Cache the section contents for elf_link_input_bfd. */
4012 elf_section_data (sec)->this_hdr.contents = info.contents;
4013 }
4014 }
4015
4016 if (elf_section_data (sec)->relocs != internal_relocs)
4017 {
4018 if (!info.changed_relocs)
4019 free (internal_relocs);
4020 else
4021 elf_section_data (sec)->relocs = internal_relocs;
4022 }
4023
4024 *again = info.changed_contents || info.changed_relocs;
4025
4026 return TRUE;
4027
4028 error_return:
4029 if (isymbuf != NULL
4030 && symtab_hdr->contents != (unsigned char *) isymbuf)
4031 free (isymbuf);
4032 if (info.contents != NULL
4033 && elf_section_data (sec)->this_hdr.contents != info.contents)
4034 free (info.contents);
4035 if (internal_relocs != NULL
4036 && elf_section_data (sec)->relocs != internal_relocs)
4037 free (internal_relocs);
4038 return FALSE;
4039 }
4040 \f
4041 /* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4042 into the next available slot in SREL. */
4043
4044 static void
4045 elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4046 asection *sec, asection *srel, bfd_vma offset,
4047 long dynindx, long rtype, bfd_vma addend)
4048 {
4049 Elf_Internal_Rela outrel;
4050 bfd_byte *loc;
4051
4052 BFD_ASSERT (srel != NULL);
4053
4054 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4055 outrel.r_addend = addend;
4056
4057 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4058 if ((offset | 1) != (bfd_vma) -1)
4059 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4060 else
4061 memset (&outrel, 0, sizeof (outrel));
4062
4063 loc = srel->contents;
4064 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4065 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
4066 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
4067 }
4068
4069 /* Relocate an Alpha ELF section for a relocatable link.
4070
4071 We don't have to change anything unless the reloc is against a section
4072 symbol, in which case we have to adjust according to where the section
4073 symbol winds up in the output section. */
4074
4075 static bfd_boolean
4076 elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4077 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4078 bfd *input_bfd, asection *input_section,
4079 bfd_byte *contents ATTRIBUTE_UNUSED,
4080 Elf_Internal_Rela *relocs,
4081 Elf_Internal_Sym *local_syms,
4082 asection **local_sections)
4083 {
4084 unsigned long symtab_hdr_sh_info;
4085 Elf_Internal_Rela *rel;
4086 Elf_Internal_Rela *relend;
4087 struct elf_link_hash_entry **sym_hashes;
4088 bfd_boolean ret_val = TRUE;
4089
4090 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
4091 sym_hashes = elf_sym_hashes (input_bfd);
4092
4093 relend = relocs + input_section->reloc_count;
4094 for (rel = relocs; rel < relend; rel++)
4095 {
4096 unsigned long r_symndx;
4097 Elf_Internal_Sym *sym;
4098 asection *sec;
4099 unsigned long r_type;
4100
4101 r_type = ELF64_R_TYPE (rel->r_info);
4102 if (r_type >= R_ALPHA_max)
4103 {
4104 _bfd_error_handler
4105 /* xgettext:c-format */
4106 (_("%pB: unsupported relocation type %#x"),
4107 input_bfd, (int) r_type);
4108 bfd_set_error (bfd_error_bad_value);
4109 ret_val = FALSE;
4110 continue;
4111 }
4112
4113 /* The symbol associated with GPDISP and LITUSE is
4114 immaterial. Only the addend is significant. */
4115 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4116 continue;
4117
4118 r_symndx = ELF64_R_SYM (rel->r_info);
4119 if (r_symndx < symtab_hdr_sh_info)
4120 {
4121 sym = local_syms + r_symndx;
4122 sec = local_sections[r_symndx];
4123 }
4124 else
4125 {
4126 struct elf_link_hash_entry *h;
4127
4128 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4129
4130 while (h->root.type == bfd_link_hash_indirect
4131 || h->root.type == bfd_link_hash_warning)
4132 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4133
4134 if (h->root.type != bfd_link_hash_defined
4135 && h->root.type != bfd_link_hash_defweak)
4136 continue;
4137
4138 sym = NULL;
4139 sec = h->root.u.def.section;
4140 }
4141
4142 if (sec != NULL && discarded_section (sec))
4143 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4144 rel, 1, relend,
4145 elf64_alpha_howto_table + r_type, 0,
4146 contents);
4147
4148 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4149 rel->r_addend += sec->output_offset;
4150 }
4151
4152 return ret_val;
4153 }
4154
4155 /* Relocate an Alpha ELF section. */
4156
4157 static bfd_boolean
4158 elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4159 bfd *input_bfd, asection *input_section,
4160 bfd_byte *contents, Elf_Internal_Rela *relocs,
4161 Elf_Internal_Sym *local_syms,
4162 asection **local_sections)
4163 {
4164 Elf_Internal_Shdr *symtab_hdr;
4165 Elf_Internal_Rela *rel;
4166 Elf_Internal_Rela *relend;
4167 asection *sgot, *srel, *srelgot;
4168 bfd *dynobj, *gotobj;
4169 bfd_vma gp, tp_base, dtp_base;
4170 struct alpha_elf_got_entry **local_got_entries;
4171 bfd_boolean ret_val;
4172
4173 BFD_ASSERT (is_alpha_elf (input_bfd));
4174
4175 /* Handle relocatable links with a smaller loop. */
4176 if (bfd_link_relocatable (info))
4177 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4178 input_section, contents, relocs,
4179 local_syms, local_sections);
4180
4181 /* This is a final link. */
4182
4183 ret_val = TRUE;
4184
4185 symtab_hdr = &elf_symtab_hdr (input_bfd);
4186
4187 dynobj = elf_hash_table (info)->dynobj;
4188 srelgot = elf_hash_table (info)->srelgot;
4189
4190 if (input_section->flags & SEC_ALLOC)
4191 {
4192 const char *section_name;
4193 section_name = (bfd_elf_string_from_elf_section
4194 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
4195 _bfd_elf_single_rel_hdr (input_section)->sh_name));
4196 BFD_ASSERT(section_name != NULL);
4197 srel = bfd_get_linker_section (dynobj, section_name);
4198 }
4199 else
4200 srel = NULL;
4201
4202 /* Find the gp value for this input bfd. */
4203 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4204 if (gotobj)
4205 {
4206 sgot = alpha_elf_tdata (gotobj)->got;
4207 gp = _bfd_get_gp_value (gotobj);
4208 if (gp == 0)
4209 {
4210 gp = (sgot->output_section->vma
4211 + sgot->output_offset
4212 + 0x8000);
4213 _bfd_set_gp_value (gotobj, gp);
4214 }
4215 }
4216 else
4217 {
4218 sgot = NULL;
4219 gp = 0;
4220 }
4221
4222 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4223
4224 if (elf_hash_table (info)->tls_sec != NULL)
4225 {
4226 dtp_base = alpha_get_dtprel_base (info);
4227 tp_base = alpha_get_tprel_base (info);
4228 }
4229 else
4230 dtp_base = tp_base = 0;
4231
4232 relend = relocs + input_section->reloc_count;
4233 for (rel = relocs; rel < relend; rel++)
4234 {
4235 struct alpha_elf_link_hash_entry *h = NULL;
4236 struct alpha_elf_got_entry *gotent;
4237 bfd_reloc_status_type r;
4238 reloc_howto_type *howto;
4239 unsigned long r_symndx;
4240 Elf_Internal_Sym *sym = NULL;
4241 asection *sec = NULL;
4242 bfd_vma value;
4243 bfd_vma addend;
4244 bfd_boolean dynamic_symbol_p;
4245 bfd_boolean unresolved_reloc = FALSE;
4246 bfd_boolean undef_weak_ref = FALSE;
4247 unsigned long r_type;
4248
4249 r_type = ELF64_R_TYPE(rel->r_info);
4250 if (r_type >= R_ALPHA_max)
4251 {
4252 _bfd_error_handler
4253 /* xgettext:c-format */
4254 (_("%pB: unsupported relocation type %#x"),
4255 input_bfd, (int) r_type);
4256 bfd_set_error (bfd_error_bad_value);
4257 ret_val = FALSE;
4258 continue;
4259 }
4260
4261 howto = elf64_alpha_howto_table + r_type;
4262 r_symndx = ELF64_R_SYM(rel->r_info);
4263
4264 /* The symbol for a TLSLDM reloc is ignored. Collapse the
4265 reloc to the STN_UNDEF (0) symbol so that they all match. */
4266 if (r_type == R_ALPHA_TLSLDM)
4267 r_symndx = STN_UNDEF;
4268
4269 if (r_symndx < symtab_hdr->sh_info)
4270 {
4271 asection *msec;
4272 sym = local_syms + r_symndx;
4273 sec = local_sections[r_symndx];
4274 msec = sec;
4275 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
4276
4277 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
4278 this is hackery from relax_section. Force the value to
4279 be the tls module base. */
4280 if (r_symndx == STN_UNDEF
4281 && (r_type == R_ALPHA_TLSLDM
4282 || r_type == R_ALPHA_GOTTPREL
4283 || r_type == R_ALPHA_TPREL64
4284 || r_type == R_ALPHA_TPRELHI
4285 || r_type == R_ALPHA_TPRELLO
4286 || r_type == R_ALPHA_TPREL16))
4287 value = dtp_base;
4288
4289 if (local_got_entries)
4290 gotent = local_got_entries[r_symndx];
4291 else
4292 gotent = NULL;
4293
4294 /* Need to adjust local GOT entries' addends for SEC_MERGE
4295 unless it has been done already. */
4296 if ((sec->flags & SEC_MERGE)
4297 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
4298 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
4299 && gotent
4300 && !gotent->reloc_xlated)
4301 {
4302 struct alpha_elf_got_entry *ent;
4303
4304 for (ent = gotent; ent; ent = ent->next)
4305 {
4306 ent->reloc_xlated = 1;
4307 if (ent->use_count == 0)
4308 continue;
4309 msec = sec;
4310 ent->addend =
4311 _bfd_merged_section_offset (output_bfd, &msec,
4312 elf_section_data (sec)->
4313 sec_info,
4314 sym->st_value + ent->addend);
4315 ent->addend -= sym->st_value;
4316 ent->addend += msec->output_section->vma
4317 + msec->output_offset
4318 - sec->output_section->vma
4319 - sec->output_offset;
4320 }
4321 }
4322
4323 dynamic_symbol_p = FALSE;
4324 }
4325 else
4326 {
4327 bfd_boolean warned, ignored;
4328 struct elf_link_hash_entry *hh;
4329 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4330
4331 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4332 r_symndx, symtab_hdr, sym_hashes,
4333 hh, sec, value,
4334 unresolved_reloc, warned, ignored);
4335
4336 if (warned)
4337 continue;
4338
4339 if (value == 0
4340 && ! unresolved_reloc
4341 && hh->root.type == bfd_link_hash_undefweak)
4342 undef_weak_ref = TRUE;
4343
4344 h = (struct alpha_elf_link_hash_entry *) hh;
4345 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4346 gotent = h->got_entries;
4347 }
4348
4349 if (sec != NULL && discarded_section (sec))
4350 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4351 rel, 1, relend, howto, 0, contents);
4352
4353 addend = rel->r_addend;
4354 value += addend;
4355
4356 /* Search for the proper got entry. */
4357 for (; gotent ; gotent = gotent->next)
4358 if (gotent->gotobj == gotobj
4359 && gotent->reloc_type == r_type
4360 && gotent->addend == addend)
4361 break;
4362
4363 switch (r_type)
4364 {
4365 case R_ALPHA_GPDISP:
4366 {
4367 bfd_byte *p_ldah, *p_lda;
4368
4369 BFD_ASSERT(gp != 0);
4370
4371 value = (input_section->output_section->vma
4372 + input_section->output_offset
4373 + rel->r_offset);
4374
4375 p_ldah = contents + rel->r_offset;
4376 p_lda = p_ldah + rel->r_addend;
4377
4378 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
4379 p_ldah, p_lda);
4380 }
4381 break;
4382
4383 case R_ALPHA_LITERAL:
4384 BFD_ASSERT(sgot != NULL);
4385 BFD_ASSERT(gp != 0);
4386 BFD_ASSERT(gotent != NULL);
4387 BFD_ASSERT(gotent->use_count >= 1);
4388
4389 if (!gotent->reloc_done)
4390 {
4391 gotent->reloc_done = 1;
4392
4393 bfd_put_64 (output_bfd, value,
4394 sgot->contents + gotent->got_offset);
4395
4396 /* If the symbol has been forced local, output a
4397 RELATIVE reloc, otherwise it will be handled in
4398 finish_dynamic_symbol. */
4399 if (bfd_link_pic (info)
4400 && !dynamic_symbol_p
4401 && !undef_weak_ref)
4402 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4403 gotent->got_offset, 0,
4404 R_ALPHA_RELATIVE, value);
4405 }
4406
4407 value = (sgot->output_section->vma
4408 + sgot->output_offset
4409 + gotent->got_offset);
4410 value -= gp;
4411 goto default_reloc;
4412
4413 case R_ALPHA_GPREL32:
4414 case R_ALPHA_GPREL16:
4415 case R_ALPHA_GPRELLOW:
4416 if (dynamic_symbol_p)
4417 {
4418 _bfd_error_handler
4419 /* xgettext:c-format */
4420 (_("%pB: gp-relative relocation against dynamic symbol %s"),
4421 input_bfd, h->root.root.root.string);
4422 ret_val = FALSE;
4423 }
4424 BFD_ASSERT(gp != 0);
4425 value -= gp;
4426 goto default_reloc;
4427
4428 case R_ALPHA_GPRELHIGH:
4429 if (dynamic_symbol_p)
4430 {
4431 _bfd_error_handler
4432 /* xgettext:c-format */
4433 (_("%pB: gp-relative relocation against dynamic symbol %s"),
4434 input_bfd, h->root.root.root.string);
4435 ret_val = FALSE;
4436 }
4437 BFD_ASSERT(gp != 0);
4438 value -= gp;
4439 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4440 goto default_reloc;
4441
4442 case R_ALPHA_HINT:
4443 /* A call to a dynamic symbol is definitely out of range of
4444 the 16-bit displacement. Don't bother writing anything. */
4445 if (dynamic_symbol_p)
4446 {
4447 r = bfd_reloc_ok;
4448 break;
4449 }
4450 /* The regular PC-relative stuff measures from the start of
4451 the instruction rather than the end. */
4452 value -= 4;
4453 goto default_reloc;
4454
4455 case R_ALPHA_BRADDR:
4456 if (dynamic_symbol_p)
4457 {
4458 _bfd_error_handler
4459 /* xgettext:c-format */
4460 (_("%pB: pc-relative relocation against dynamic symbol %s"),
4461 input_bfd, h->root.root.root.string);
4462 ret_val = FALSE;
4463 }
4464 /* The regular PC-relative stuff measures from the start of
4465 the instruction rather than the end. */
4466 value -= 4;
4467 goto default_reloc;
4468
4469 case R_ALPHA_BRSGP:
4470 {
4471 int other;
4472 const char *name;
4473
4474 /* The regular PC-relative stuff measures from the start of
4475 the instruction rather than the end. */
4476 value -= 4;
4477
4478 /* The source and destination gp must be the same. Note that
4479 the source will always have an assigned gp, since we forced
4480 one in check_relocs, but that the destination may not, as
4481 it might not have had any relocations at all. Also take
4482 care not to crash if H is an undefined symbol. */
4483 if (h != NULL && sec != NULL
4484 && alpha_elf_tdata (sec->owner)->gotobj
4485 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4486 {
4487 _bfd_error_handler
4488 /* xgettext:c-format */
4489 (_("%pB: change in gp: BRSGP %s"),
4490 input_bfd, h->root.root.root.string);
4491 ret_val = FALSE;
4492 }
4493
4494 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4495 if (h != NULL)
4496 other = h->root.other;
4497 else
4498 other = sym->st_other;
4499 switch (other & STO_ALPHA_STD_GPLOAD)
4500 {
4501 case STO_ALPHA_NOPV:
4502 break;
4503 case STO_ALPHA_STD_GPLOAD:
4504 value += 8;
4505 break;
4506 default:
4507 if (h != NULL)
4508 name = h->root.root.root.string;
4509 else
4510 {
4511 name = (bfd_elf_string_from_elf_section
4512 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4513 if (name == NULL)
4514 name = _("<unknown>");
4515 else if (name[0] == 0)
4516 name = bfd_section_name (sec);
4517 }
4518 _bfd_error_handler
4519 /* xgettext:c-format */
4520 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
4521 input_bfd, name);
4522 ret_val = FALSE;
4523 break;
4524 }
4525
4526 goto default_reloc;
4527 }
4528
4529 case R_ALPHA_REFLONG:
4530 case R_ALPHA_REFQUAD:
4531 case R_ALPHA_DTPREL64:
4532 case R_ALPHA_TPREL64:
4533 {
4534 long dynindx, dyntype = r_type;
4535 bfd_vma dynaddend;
4536
4537 /* Careful here to remember RELATIVE relocations for global
4538 variables for symbolic shared objects. */
4539
4540 if (dynamic_symbol_p)
4541 {
4542 BFD_ASSERT(h->root.dynindx != -1);
4543 dynindx = h->root.dynindx;
4544 dynaddend = addend;
4545 addend = 0, value = 0;
4546 }
4547 else if (r_type == R_ALPHA_DTPREL64)
4548 {
4549 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4550 value -= dtp_base;
4551 goto default_reloc;
4552 }
4553 else if (r_type == R_ALPHA_TPREL64)
4554 {
4555 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4556 if (!bfd_link_dll (info))
4557 {
4558 value -= tp_base;
4559 goto default_reloc;
4560 }
4561 dynindx = 0;
4562 dynaddend = value - dtp_base;
4563 }
4564 else if (bfd_link_pic (info)
4565 && r_symndx != STN_UNDEF
4566 && (input_section->flags & SEC_ALLOC)
4567 && !undef_weak_ref
4568 && !(unresolved_reloc
4569 && (_bfd_elf_section_offset (output_bfd, info,
4570 input_section,
4571 rel->r_offset)
4572 == (bfd_vma) -1)))
4573 {
4574 if (r_type == R_ALPHA_REFLONG)
4575 {
4576 _bfd_error_handler
4577 /* xgettext:c-format */
4578 (_("%pB: unhandled dynamic relocation against %s"),
4579 input_bfd,
4580 h->root.root.root.string);
4581 ret_val = FALSE;
4582 }
4583 dynindx = 0;
4584 dyntype = R_ALPHA_RELATIVE;
4585 dynaddend = value;
4586 }
4587 else
4588 goto default_reloc;
4589
4590 if (input_section->flags & SEC_ALLOC)
4591 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4592 srel, rel->r_offset, dynindx,
4593 dyntype, dynaddend);
4594 }
4595 goto default_reloc;
4596
4597 case R_ALPHA_SREL16:
4598 case R_ALPHA_SREL32:
4599 case R_ALPHA_SREL64:
4600 if (dynamic_symbol_p)
4601 {
4602 _bfd_error_handler
4603 /* xgettext:c-format */
4604 (_("%pB: pc-relative relocation against dynamic symbol %s"),
4605 input_bfd, h->root.root.root.string);
4606 ret_val = FALSE;
4607 }
4608 else if (bfd_link_pic (info)
4609 && undef_weak_ref)
4610 {
4611 _bfd_error_handler
4612 /* xgettext:c-format */
4613 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
4614 input_bfd, h->root.root.root.string);
4615 ret_val = FALSE;
4616 }
4617
4618
4619 /* ??? .eh_frame references to discarded sections will be smashed
4620 to relocations against SHN_UNDEF. The .eh_frame format allows
4621 NULL to be encoded as 0 in any format, so this works here. */
4622 if (r_symndx == STN_UNDEF
4623 || (unresolved_reloc
4624 && _bfd_elf_section_offset (output_bfd, info,
4625 input_section,
4626 rel->r_offset) == (bfd_vma) -1))
4627 howto = (elf64_alpha_howto_table
4628 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4629 goto default_reloc;
4630
4631 case R_ALPHA_TLSLDM:
4632 /* Ignore the symbol for the relocation. The result is always
4633 the current module. */
4634 dynamic_symbol_p = 0;
4635 /* FALLTHRU */
4636
4637 case R_ALPHA_TLSGD:
4638 if (!gotent->reloc_done)
4639 {
4640 gotent->reloc_done = 1;
4641
4642 /* Note that the module index for the main program is 1. */
4643 bfd_put_64 (output_bfd,
4644 !bfd_link_pic (info) && !dynamic_symbol_p,
4645 sgot->contents + gotent->got_offset);
4646
4647 /* If the symbol has been forced local, output a
4648 DTPMOD64 reloc, otherwise it will be handled in
4649 finish_dynamic_symbol. */
4650 if (bfd_link_pic (info) && !dynamic_symbol_p)
4651 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4652 gotent->got_offset, 0,
4653 R_ALPHA_DTPMOD64, 0);
4654
4655 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4656 value = 0;
4657 else
4658 {
4659 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4660 value -= dtp_base;
4661 }
4662 bfd_put_64 (output_bfd, value,
4663 sgot->contents + gotent->got_offset + 8);
4664 }
4665
4666 value = (sgot->output_section->vma
4667 + sgot->output_offset
4668 + gotent->got_offset);
4669 value -= gp;
4670 goto default_reloc;
4671
4672 case R_ALPHA_DTPRELHI:
4673 case R_ALPHA_DTPRELLO:
4674 case R_ALPHA_DTPREL16:
4675 if (dynamic_symbol_p)
4676 {
4677 _bfd_error_handler
4678 /* xgettext:c-format */
4679 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
4680 input_bfd, h->root.root.root.string);
4681 ret_val = FALSE;
4682 }
4683 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4684 value -= dtp_base;
4685 if (r_type == R_ALPHA_DTPRELHI)
4686 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4687 goto default_reloc;
4688
4689 case R_ALPHA_TPRELHI:
4690 case R_ALPHA_TPRELLO:
4691 case R_ALPHA_TPREL16:
4692 if (bfd_link_dll (info))
4693 {
4694 _bfd_error_handler
4695 /* xgettext:c-format */
4696 (_("%pB: TLS local exec code cannot be linked into shared objects"),
4697 input_bfd);
4698 ret_val = FALSE;
4699 }
4700 else if (dynamic_symbol_p)
4701 {
4702 _bfd_error_handler
4703 /* xgettext:c-format */
4704 (_("%pB: tp-relative relocation against dynamic symbol %s"),
4705 input_bfd, h->root.root.root.string);
4706 ret_val = FALSE;
4707 }
4708 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4709 value -= tp_base;
4710 if (r_type == R_ALPHA_TPRELHI)
4711 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4712 goto default_reloc;
4713
4714 case R_ALPHA_GOTDTPREL:
4715 case R_ALPHA_GOTTPREL:
4716 BFD_ASSERT(sgot != NULL);
4717 BFD_ASSERT(gp != 0);
4718 BFD_ASSERT(gotent != NULL);
4719 BFD_ASSERT(gotent->use_count >= 1);
4720
4721 if (!gotent->reloc_done)
4722 {
4723 gotent->reloc_done = 1;
4724
4725 if (dynamic_symbol_p)
4726 value = 0;
4727 else
4728 {
4729 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4730 if (r_type == R_ALPHA_GOTDTPREL)
4731 value -= dtp_base;
4732 else if (bfd_link_executable (info))
4733 value -= tp_base;
4734 else
4735 {
4736 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4737 gotent->got_offset, 0,
4738 R_ALPHA_TPREL64,
4739 value - dtp_base);
4740 value = 0;
4741 }
4742 }
4743 bfd_put_64 (output_bfd, value,
4744 sgot->contents + gotent->got_offset);
4745 }
4746
4747 value = (sgot->output_section->vma
4748 + sgot->output_offset
4749 + gotent->got_offset);
4750 value -= gp;
4751 goto default_reloc;
4752
4753 default:
4754 default_reloc:
4755 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4756 contents, rel->r_offset, value, 0);
4757 break;
4758 }
4759
4760 switch (r)
4761 {
4762 case bfd_reloc_ok:
4763 break;
4764
4765 case bfd_reloc_overflow:
4766 {
4767 const char *name;
4768
4769 /* Don't warn if the overflow is due to pc relative reloc
4770 against discarded section. Section optimization code should
4771 handle it. */
4772
4773 if (r_symndx < symtab_hdr->sh_info
4774 && sec != NULL && howto->pc_relative
4775 && discarded_section (sec))
4776 break;
4777
4778 if (h != NULL)
4779 name = NULL;
4780 else
4781 {
4782 name = (bfd_elf_string_from_elf_section
4783 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4784 if (name == NULL)
4785 return FALSE;
4786 if (*name == '\0')
4787 name = bfd_section_name (sec);
4788 }
4789 (*info->callbacks->reloc_overflow)
4790 (info, (h ? &h->root.root : NULL), name, howto->name,
4791 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4792 }
4793 break;
4794
4795 default:
4796 case bfd_reloc_outofrange:
4797 abort ();
4798 }
4799 }
4800
4801 return ret_val;
4802 }
4803
4804 /* Finish up dynamic symbol handling. We set the contents of various
4805 dynamic sections here. */
4806
4807 static bfd_boolean
4808 elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4809 struct elf_link_hash_entry *h,
4810 Elf_Internal_Sym *sym)
4811 {
4812 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
4813
4814 if (h->needs_plt)
4815 {
4816 /* Fill in the .plt entry for this symbol. */
4817 asection *splt, *sgot, *srel;
4818 Elf_Internal_Rela outrel;
4819 bfd_byte *loc;
4820 bfd_vma got_addr, plt_addr;
4821 bfd_vma plt_index;
4822 struct alpha_elf_got_entry *gotent;
4823
4824 BFD_ASSERT (h->dynindx != -1);
4825
4826 splt = elf_hash_table (info)->splt;
4827 BFD_ASSERT (splt != NULL);
4828 srel = elf_hash_table (info)->srelplt;
4829 BFD_ASSERT (srel != NULL);
4830
4831 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4832 if (gotent->reloc_type == R_ALPHA_LITERAL
4833 && gotent->use_count > 0)
4834 {
4835 unsigned int insn;
4836 int disp;
4837
4838 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4839 BFD_ASSERT (sgot != NULL);
4840
4841 BFD_ASSERT (gotent->got_offset != -1);
4842 BFD_ASSERT (gotent->plt_offset != -1);
4843
4844 got_addr = (sgot->output_section->vma
4845 + sgot->output_offset
4846 + gotent->got_offset);
4847 plt_addr = (splt->output_section->vma
4848 + splt->output_offset
4849 + gotent->plt_offset);
4850
4851 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
4852
4853 /* Fill in the entry in the procedure linkage table. */
4854 if (elf64_alpha_use_secureplt)
4855 {
4856 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4857 insn = INSN_AD (INSN_BR, 31, disp);
4858 bfd_put_32 (output_bfd, insn,
4859 splt->contents + gotent->plt_offset);
4860
4861 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4862 / NEW_PLT_ENTRY_SIZE);
4863 }
4864 else
4865 {
4866 disp = -(gotent->plt_offset + 4);
4867 insn = INSN_AD (INSN_BR, 28, disp);
4868 bfd_put_32 (output_bfd, insn,
4869 splt->contents + gotent->plt_offset);
4870 bfd_put_32 (output_bfd, INSN_UNOP,
4871 splt->contents + gotent->plt_offset + 4);
4872 bfd_put_32 (output_bfd, INSN_UNOP,
4873 splt->contents + gotent->plt_offset + 8);
4874
4875 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4876 / OLD_PLT_ENTRY_SIZE);
4877 }
4878
4879 /* Fill in the entry in the .rela.plt section. */
4880 outrel.r_offset = got_addr;
4881 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4882 outrel.r_addend = 0;
4883
4884 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4885 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
4886
4887 /* Fill in the entry in the .got. */
4888 bfd_put_64 (output_bfd, plt_addr,
4889 sgot->contents + gotent->got_offset);
4890 }
4891 }
4892 else if (alpha_elf_dynamic_symbol_p (h, info))
4893 {
4894 /* Fill in the dynamic relocations for this symbol's .got entries. */
4895 asection *srel;
4896 struct alpha_elf_got_entry *gotent;
4897
4898 srel = elf_hash_table (info)->srelgot;
4899 BFD_ASSERT (srel != NULL);
4900
4901 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4902 gotent != NULL;
4903 gotent = gotent->next)
4904 {
4905 asection *sgot;
4906 long r_type;
4907
4908 if (gotent->use_count == 0)
4909 continue;
4910
4911 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4912
4913 r_type = gotent->reloc_type;
4914 switch (r_type)
4915 {
4916 case R_ALPHA_LITERAL:
4917 r_type = R_ALPHA_GLOB_DAT;
4918 break;
4919 case R_ALPHA_TLSGD:
4920 r_type = R_ALPHA_DTPMOD64;
4921 break;
4922 case R_ALPHA_GOTDTPREL:
4923 r_type = R_ALPHA_DTPREL64;
4924 break;
4925 case R_ALPHA_GOTTPREL:
4926 r_type = R_ALPHA_TPREL64;
4927 break;
4928 case R_ALPHA_TLSLDM:
4929 default:
4930 abort ();
4931 }
4932
4933 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4934 gotent->got_offset, h->dynindx,
4935 r_type, gotent->addend);
4936
4937 if (gotent->reloc_type == R_ALPHA_TLSGD)
4938 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4939 gotent->got_offset + 8, h->dynindx,
4940 R_ALPHA_DTPREL64, gotent->addend);
4941 }
4942 }
4943
4944 /* Mark some specially defined symbols as absolute. */
4945 if (h == elf_hash_table (info)->hdynamic
4946 || h == elf_hash_table (info)->hgot
4947 || h == elf_hash_table (info)->hplt)
4948 sym->st_shndx = SHN_ABS;
4949
4950 return TRUE;
4951 }
4952
4953 /* Finish up the dynamic sections. */
4954
4955 static bfd_boolean
4956 elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4957 struct bfd_link_info *info)
4958 {
4959 bfd *dynobj;
4960 asection *sdyn;
4961
4962 dynobj = elf_hash_table (info)->dynobj;
4963 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
4964
4965 if (elf_hash_table (info)->dynamic_sections_created)
4966 {
4967 asection *splt, *sgotplt, *srelaplt;
4968 Elf64_External_Dyn *dyncon, *dynconend;
4969 bfd_vma plt_vma, gotplt_vma;
4970
4971 splt = elf_hash_table (info)->splt;
4972 srelaplt = elf_hash_table (info)->srelplt;
4973 BFD_ASSERT (splt != NULL && sdyn != NULL);
4974
4975 plt_vma = splt->output_section->vma + splt->output_offset;
4976
4977 gotplt_vma = 0;
4978 if (elf64_alpha_use_secureplt)
4979 {
4980 sgotplt = elf_hash_table (info)->sgotplt;
4981 BFD_ASSERT (sgotplt != NULL);
4982 if (sgotplt->size > 0)
4983 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4984 }
4985
4986 dyncon = (Elf64_External_Dyn *) sdyn->contents;
4987 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
4988 for (; dyncon < dynconend; dyncon++)
4989 {
4990 Elf_Internal_Dyn dyn;
4991
4992 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4993
4994 switch (dyn.d_tag)
4995 {
4996 case DT_PLTGOT:
4997 dyn.d_un.d_ptr
4998 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4999 break;
5000 case DT_PLTRELSZ:
5001 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5002 break;
5003 case DT_JMPREL:
5004 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
5005 + srelaplt->output_offset) : 0;
5006 break;
5007 }
5008
5009 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5010 }
5011
5012 /* Initialize the plt header. */
5013 if (splt->size > 0)
5014 {
5015 unsigned int insn;
5016 int ofs;
5017
5018 if (elf64_alpha_use_secureplt)
5019 {
5020 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5021
5022 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5023 bfd_put_32 (output_bfd, insn, splt->contents);
5024
5025 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5026 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5027
5028 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5029 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5030
5031 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5032 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5033
5034 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5035 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5036
5037 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5038 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5039
5040 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5041 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5042
5043 insn = INSN_AB (INSN_JMP, 31, 27);
5044 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5045
5046 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5047 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5048 }
5049 else
5050 {
5051 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5052 bfd_put_32 (output_bfd, insn, splt->contents);
5053
5054 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5055 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5056
5057 insn = INSN_UNOP;
5058 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5059
5060 insn = INSN_AB (INSN_JMP, 27, 27);
5061 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5062
5063 /* The next two words will be filled in by ld.so. */
5064 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5065 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5066 }
5067
5068 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
5069 }
5070 }
5071
5072 return TRUE;
5073 }
5074
5075 /* We need to use a special link routine to handle the .mdebug section.
5076 We need to merge all instances of these sections together, not write
5077 them all out sequentially. */
5078
5079 static bfd_boolean
5080 elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
5081 {
5082 asection *o;
5083 struct bfd_link_order *p;
5084 asection *mdebug_sec;
5085 struct ecoff_debug_info debug;
5086 const struct ecoff_debug_swap *swap
5087 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5088 HDRR *symhdr = &debug.symbolic_header;
5089 void * mdebug_handle = NULL;
5090 struct alpha_elf_link_hash_table * htab;
5091
5092 htab = alpha_elf_hash_table (info);
5093 if (htab == NULL)
5094 return FALSE;
5095
5096 /* Go through the sections and collect the mdebug information. */
5097 mdebug_sec = NULL;
5098 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5099 {
5100 if (strcmp (o->name, ".mdebug") == 0)
5101 {
5102 struct extsym_info einfo;
5103
5104 /* We have found the .mdebug section in the output file.
5105 Look through all the link_orders comprising it and merge
5106 the information together. */
5107 symhdr->magic = swap->sym_magic;
5108 /* FIXME: What should the version stamp be? */
5109 symhdr->vstamp = 0;
5110 symhdr->ilineMax = 0;
5111 symhdr->cbLine = 0;
5112 symhdr->idnMax = 0;
5113 symhdr->ipdMax = 0;
5114 symhdr->isymMax = 0;
5115 symhdr->ioptMax = 0;
5116 symhdr->iauxMax = 0;
5117 symhdr->issMax = 0;
5118 symhdr->issExtMax = 0;
5119 symhdr->ifdMax = 0;
5120 symhdr->crfd = 0;
5121 symhdr->iextMax = 0;
5122
5123 /* We accumulate the debugging information itself in the
5124 debug_info structure. */
5125 debug.line = NULL;
5126 debug.external_dnr = NULL;
5127 debug.external_pdr = NULL;
5128 debug.external_sym = NULL;
5129 debug.external_opt = NULL;
5130 debug.external_aux = NULL;
5131 debug.ss = NULL;
5132 debug.ssext = debug.ssext_end = NULL;
5133 debug.external_fdr = NULL;
5134 debug.external_rfd = NULL;
5135 debug.external_ext = debug.external_ext_end = NULL;
5136
5137 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
5138 if (mdebug_handle == NULL)
5139 return FALSE;
5140
5141 if (1)
5142 {
5143 asection *s;
5144 EXTR esym;
5145 bfd_vma last = 0;
5146 unsigned int i;
5147 static const char * const name[] =
5148 {
5149 ".text", ".init", ".fini", ".data",
5150 ".rodata", ".sdata", ".sbss", ".bss"
5151 };
5152 static const int sc[] = { scText, scInit, scFini, scData,
5153 scRData, scSData, scSBss, scBss };
5154
5155 esym.jmptbl = 0;
5156 esym.cobol_main = 0;
5157 esym.weakext = 0;
5158 esym.reserved = 0;
5159 esym.ifd = ifdNil;
5160 esym.asym.iss = issNil;
5161 esym.asym.st = stLocal;
5162 esym.asym.reserved = 0;
5163 esym.asym.index = indexNil;
5164 for (i = 0; i < 8; i++)
5165 {
5166 esym.asym.sc = sc[i];
5167 s = bfd_get_section_by_name (abfd, name[i]);
5168 if (s != NULL)
5169 {
5170 esym.asym.value = s->vma;
5171 last = s->vma + s->size;
5172 }
5173 else
5174 esym.asym.value = last;
5175
5176 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5177 name[i], &esym))
5178 return FALSE;
5179 }
5180 }
5181
5182 for (p = o->map_head.link_order;
5183 p != (struct bfd_link_order *) NULL;
5184 p = p->next)
5185 {
5186 asection *input_section;
5187 bfd *input_bfd;
5188 const struct ecoff_debug_swap *input_swap;
5189 struct ecoff_debug_info input_debug;
5190 char *eraw_src;
5191 char *eraw_end;
5192
5193 if (p->type != bfd_indirect_link_order)
5194 {
5195 if (p->type == bfd_data_link_order)
5196 continue;
5197 abort ();
5198 }
5199
5200 input_section = p->u.indirect.section;
5201 input_bfd = input_section->owner;
5202
5203 if (! is_alpha_elf (input_bfd))
5204 /* I don't know what a non ALPHA ELF bfd would be
5205 doing with a .mdebug section, but I don't really
5206 want to deal with it. */
5207 continue;
5208
5209 input_swap = (get_elf_backend_data (input_bfd)
5210 ->elf_backend_ecoff_debug_swap);
5211
5212 BFD_ASSERT (p->size == input_section->size);
5213
5214 /* The ECOFF linking code expects that we have already
5215 read in the debugging information and set up an
5216 ecoff_debug_info structure, so we do that now. */
5217 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5218 &input_debug))
5219 return FALSE;
5220
5221 if (! (bfd_ecoff_debug_accumulate
5222 (mdebug_handle, abfd, &debug, swap, input_bfd,
5223 &input_debug, input_swap, info)))
5224 return FALSE;
5225
5226 /* Loop through the external symbols. For each one with
5227 interesting information, try to find the symbol in
5228 the linker global hash table and save the information
5229 for the output external symbols. */
5230 eraw_src = (char *) input_debug.external_ext;
5231 eraw_end = (eraw_src
5232 + (input_debug.symbolic_header.iextMax
5233 * input_swap->external_ext_size));
5234 for (;
5235 eraw_src < eraw_end;
5236 eraw_src += input_swap->external_ext_size)
5237 {
5238 EXTR ext;
5239 const char *name;
5240 struct alpha_elf_link_hash_entry *h;
5241
5242 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
5243 if (ext.asym.sc == scNil
5244 || ext.asym.sc == scUndefined
5245 || ext.asym.sc == scSUndefined)
5246 continue;
5247
5248 name = input_debug.ssext + ext.asym.iss;
5249 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
5250 if (h == NULL || h->esym.ifd != -2)
5251 continue;
5252
5253 if (ext.ifd != -1)
5254 {
5255 BFD_ASSERT (ext.ifd
5256 < input_debug.symbolic_header.ifdMax);
5257 ext.ifd = input_debug.ifdmap[ext.ifd];
5258 }
5259
5260 h->esym = ext;
5261 }
5262
5263 /* Free up the information we just read. */
5264 free (input_debug.line);
5265 free (input_debug.external_dnr);
5266 free (input_debug.external_pdr);
5267 free (input_debug.external_sym);
5268 free (input_debug.external_opt);
5269 free (input_debug.external_aux);
5270 free (input_debug.ss);
5271 free (input_debug.ssext);
5272 free (input_debug.external_fdr);
5273 free (input_debug.external_rfd);
5274 free (input_debug.external_ext);
5275
5276 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5277 elf_link_input_bfd ignores this section. */
5278 input_section->flags &=~ SEC_HAS_CONTENTS;
5279 }
5280
5281 /* Build the external symbol information. */
5282 einfo.abfd = abfd;
5283 einfo.info = info;
5284 einfo.debug = &debug;
5285 einfo.swap = swap;
5286 einfo.failed = FALSE;
5287 elf_link_hash_traverse (elf_hash_table (info),
5288 elf64_alpha_output_extsym,
5289 &einfo);
5290 if (einfo.failed)
5291 return FALSE;
5292
5293 /* Set the size of the .mdebug section. */
5294 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
5295
5296 /* Skip this section later on (I don't think this currently
5297 matters, but someday it might). */
5298 o->map_head.link_order = (struct bfd_link_order *) NULL;
5299
5300 mdebug_sec = o;
5301 }
5302 }
5303
5304 /* Invoke the regular ELF backend linker to do all the work. */
5305 if (! bfd_elf_final_link (abfd, info))
5306 return FALSE;
5307
5308 /* Now write out the computed sections. */
5309
5310 /* The .got subsections... */
5311 {
5312 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
5313 for (i = htab->got_list;
5314 i != NULL;
5315 i = alpha_elf_tdata(i)->got_link_next)
5316 {
5317 asection *sgot;
5318
5319 /* elf_bfd_final_link already did everything in dynobj. */
5320 if (i == dynobj)
5321 continue;
5322
5323 sgot = alpha_elf_tdata(i)->got;
5324 if (! bfd_set_section_contents (abfd, sgot->output_section,
5325 sgot->contents,
5326 (file_ptr) sgot->output_offset,
5327 sgot->size))
5328 return FALSE;
5329 }
5330 }
5331
5332 if (mdebug_sec != (asection *) NULL)
5333 {
5334 BFD_ASSERT (abfd->output_has_begun);
5335 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5336 swap, info,
5337 mdebug_sec->filepos))
5338 return FALSE;
5339
5340 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5341 }
5342
5343 return TRUE;
5344 }
5345
5346 static enum elf_reloc_type_class
5347 elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5348 const asection *rel_sec ATTRIBUTE_UNUSED,
5349 const Elf_Internal_Rela *rela)
5350 {
5351 switch ((int) ELF64_R_TYPE (rela->r_info))
5352 {
5353 case R_ALPHA_RELATIVE:
5354 return reloc_class_relative;
5355 case R_ALPHA_JMP_SLOT:
5356 return reloc_class_plt;
5357 case R_ALPHA_COPY:
5358 return reloc_class_copy;
5359 default:
5360 return reloc_class_normal;
5361 }
5362 }
5363 \f
5364 static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
5365 {
5366 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5367 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5368 { NULL, 0, 0, 0, 0 }
5369 };
5370
5371 /* ECOFF swapping routines. These are used when dealing with the
5372 .mdebug section, which is in the ECOFF debugging format. Copied
5373 from elf32-mips.c. */
5374 static const struct ecoff_debug_swap
5375 elf64_alpha_ecoff_debug_swap =
5376 {
5377 /* Symbol table magic number. */
5378 magicSym2,
5379 /* Alignment of debugging information. E.g., 4. */
5380 8,
5381 /* Sizes of external symbolic information. */
5382 sizeof (struct hdr_ext),
5383 sizeof (struct dnr_ext),
5384 sizeof (struct pdr_ext),
5385 sizeof (struct sym_ext),
5386 sizeof (struct opt_ext),
5387 sizeof (struct fdr_ext),
5388 sizeof (struct rfd_ext),
5389 sizeof (struct ext_ext),
5390 /* Functions to swap in external symbolic data. */
5391 ecoff_swap_hdr_in,
5392 ecoff_swap_dnr_in,
5393 ecoff_swap_pdr_in,
5394 ecoff_swap_sym_in,
5395 ecoff_swap_opt_in,
5396 ecoff_swap_fdr_in,
5397 ecoff_swap_rfd_in,
5398 ecoff_swap_ext_in,
5399 _bfd_ecoff_swap_tir_in,
5400 _bfd_ecoff_swap_rndx_in,
5401 /* Functions to swap out external symbolic data. */
5402 ecoff_swap_hdr_out,
5403 ecoff_swap_dnr_out,
5404 ecoff_swap_pdr_out,
5405 ecoff_swap_sym_out,
5406 ecoff_swap_opt_out,
5407 ecoff_swap_fdr_out,
5408 ecoff_swap_rfd_out,
5409 ecoff_swap_ext_out,
5410 _bfd_ecoff_swap_tir_out,
5411 _bfd_ecoff_swap_rndx_out,
5412 /* Function to read in symbolic data. */
5413 elf64_alpha_read_ecoff_info
5414 };
5415 \f
5416 /* Use a non-standard hash bucket size of 8. */
5417
5418 static const struct elf_size_info alpha_elf_size_info =
5419 {
5420 sizeof (Elf64_External_Ehdr),
5421 sizeof (Elf64_External_Phdr),
5422 sizeof (Elf64_External_Shdr),
5423 sizeof (Elf64_External_Rel),
5424 sizeof (Elf64_External_Rela),
5425 sizeof (Elf64_External_Sym),
5426 sizeof (Elf64_External_Dyn),
5427 sizeof (Elf_External_Note),
5428 8,
5429 1,
5430 64, 3,
5431 ELFCLASS64, EV_CURRENT,
5432 bfd_elf64_write_out_phdrs,
5433 bfd_elf64_write_shdrs_and_ehdr,
5434 bfd_elf64_checksum_contents,
5435 bfd_elf64_write_relocs,
5436 bfd_elf64_swap_symbol_in,
5437 bfd_elf64_swap_symbol_out,
5438 bfd_elf64_slurp_reloc_table,
5439 bfd_elf64_slurp_symbol_table,
5440 bfd_elf64_swap_dyn_in,
5441 bfd_elf64_swap_dyn_out,
5442 bfd_elf64_swap_reloc_in,
5443 bfd_elf64_swap_reloc_out,
5444 bfd_elf64_swap_reloca_in,
5445 bfd_elf64_swap_reloca_out
5446 };
5447
5448 #define TARGET_LITTLE_SYM alpha_elf64_vec
5449 #define TARGET_LITTLE_NAME "elf64-alpha"
5450 #define ELF_ARCH bfd_arch_alpha
5451 #define ELF_TARGET_ID ALPHA_ELF_DATA
5452 #define ELF_MACHINE_CODE EM_ALPHA
5453 #define ELF_MAXPAGESIZE 0x10000
5454 #define ELF_COMMONPAGESIZE 0x2000
5455
5456 #define bfd_elf64_bfd_link_hash_table_create \
5457 elf64_alpha_bfd_link_hash_table_create
5458
5459 #define bfd_elf64_bfd_reloc_type_lookup \
5460 elf64_alpha_bfd_reloc_type_lookup
5461 #define bfd_elf64_bfd_reloc_name_lookup \
5462 elf64_alpha_bfd_reloc_name_lookup
5463 #define elf_info_to_howto \
5464 elf64_alpha_info_to_howto
5465
5466 #define bfd_elf64_mkobject \
5467 elf64_alpha_mkobject
5468 #define elf_backend_object_p \
5469 elf64_alpha_object_p
5470
5471 #define elf_backend_section_from_shdr \
5472 elf64_alpha_section_from_shdr
5473 #define elf_backend_section_flags \
5474 elf64_alpha_section_flags
5475 #define elf_backend_fake_sections \
5476 elf64_alpha_fake_sections
5477
5478 #define bfd_elf64_bfd_is_local_label_name \
5479 elf64_alpha_is_local_label_name
5480 #define bfd_elf64_find_nearest_line \
5481 elf64_alpha_find_nearest_line
5482 #define bfd_elf64_bfd_relax_section \
5483 elf64_alpha_relax_section
5484
5485 #define elf_backend_add_symbol_hook \
5486 elf64_alpha_add_symbol_hook
5487 #define elf_backend_relocs_compatible \
5488 _bfd_elf_relocs_compatible
5489 #define elf_backend_sort_relocs_p \
5490 elf64_alpha_sort_relocs_p
5491 #define elf_backend_check_relocs \
5492 elf64_alpha_check_relocs
5493 #define elf_backend_create_dynamic_sections \
5494 elf64_alpha_create_dynamic_sections
5495 #define elf_backend_adjust_dynamic_symbol \
5496 elf64_alpha_adjust_dynamic_symbol
5497 #define elf_backend_merge_symbol_attribute \
5498 elf64_alpha_merge_symbol_attribute
5499 #define elf_backend_copy_indirect_symbol \
5500 elf64_alpha_copy_indirect_symbol
5501 #define elf_backend_always_size_sections \
5502 elf64_alpha_always_size_sections
5503 #define elf_backend_size_dynamic_sections \
5504 elf64_alpha_size_dynamic_sections
5505 #define elf_backend_omit_section_dynsym \
5506 _bfd_elf_omit_section_dynsym_all
5507 #define elf_backend_relocate_section \
5508 elf64_alpha_relocate_section
5509 #define elf_backend_finish_dynamic_symbol \
5510 elf64_alpha_finish_dynamic_symbol
5511 #define elf_backend_finish_dynamic_sections \
5512 elf64_alpha_finish_dynamic_sections
5513 #define bfd_elf64_bfd_final_link \
5514 elf64_alpha_final_link
5515 #define elf_backend_reloc_type_class \
5516 elf64_alpha_reloc_type_class
5517
5518 #define elf_backend_can_gc_sections 1
5519 #define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5520
5521 #define elf_backend_ecoff_debug_swap \
5522 &elf64_alpha_ecoff_debug_swap
5523
5524 #define elf_backend_size_info \
5525 alpha_elf_size_info
5526
5527 #define elf_backend_special_sections \
5528 elf64_alpha_special_sections
5529
5530 /* A few constants that determine how the .plt section is set up. */
5531 #define elf_backend_want_got_plt 0
5532 #define elf_backend_plt_readonly 0
5533 #define elf_backend_want_plt_sym 1
5534 #define elf_backend_got_header_size 0
5535 #define elf_backend_dtrel_excludes_plt 1
5536
5537 #include "elf64-target.h"
5538 \f
5539 /* FreeBSD support. */
5540
5541 #undef TARGET_LITTLE_SYM
5542 #define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
5543 #undef TARGET_LITTLE_NAME
5544 #define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
5545 #undef ELF_OSABI
5546 #define ELF_OSABI ELFOSABI_FREEBSD
5547
5548 /* The kernel recognizes executables as valid only if they carry a
5549 "FreeBSD" label in the ELF header. So we put this label on all
5550 executables and (for simplicity) also all other object files. */
5551
5552 static bfd_boolean
5553 elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
5554 {
5555 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5556
5557 if (!_bfd_elf_init_file_header (abfd, info))
5558 return FALSE;
5559
5560 i_ehdrp = elf_elfheader (abfd);
5561
5562 /* Put an ABI label supported by FreeBSD >= 4.1. */
5563 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
5564 #ifdef OLD_FREEBSD_ABI_LABEL
5565 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5566 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5567 #endif
5568 return TRUE;
5569 }
5570
5571 #undef elf_backend_init_file_header
5572 #define elf_backend_init_file_header \
5573 elf64_alpha_fbsd_init_file_header
5574
5575 #undef elf64_bed
5576 #define elf64_bed elf64_alpha_fbsd_bed
5577
5578 #include "elf64-target.h"
This page took 0.147615 seconds and 5 git commands to generate.