gdb: add target_ops::supports_displaced_step
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
1 /* Alpha specific support for 64-bit ELF
2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
26 #include "sysdep.h"
27 #include "bfd.h"
28 #include "libbfd.h"
29 #include "elf-bfd.h"
30 #include "ecoff-bfd.h"
31
32 #include "elf/alpha.h"
33
34 #define ALPHAECOFF
35
36 #define NO_COFF_RELOCS
37 #define NO_COFF_SYMBOLS
38 #define NO_COFF_LINENOS
39
40 /* Get the ECOFF swapping routines. Needed for the debug information. */
41 #include "coff/internal.h"
42 #include "coff/sym.h"
43 #include "coff/symconst.h"
44 #include "coff/ecoff.h"
45 #include "coff/alpha.h"
46 #include "aout/ar.h"
47 #include "libcoff.h"
48 #include "libecoff.h"
49 #define ECOFF_64
50 #include "ecoffswap.h"
51
52 \f
53 /* Instruction data for plt generation and relaxation. */
54
55 #define OP_LDA 0x08
56 #define OP_LDAH 0x09
57 #define OP_LDQ 0x29
58 #define OP_BR 0x30
59 #define OP_BSR 0x34
60
61 #define INSN_LDA (OP_LDA << 26)
62 #define INSN_LDAH (OP_LDAH << 26)
63 #define INSN_LDQ (OP_LDQ << 26)
64 #define INSN_BR (OP_BR << 26)
65
66 #define INSN_ADDQ 0x40000400
67 #define INSN_RDUNIQ 0x0000009e
68 #define INSN_SUBQ 0x40000520
69 #define INSN_S4SUBQ 0x40000560
70 #define INSN_UNOP 0x2ffe0000
71
72 #define INSN_JSR 0x68004000
73 #define INSN_JMP 0x68000000
74 #define INSN_JSR_MASK 0xfc00c000
75
76 #define INSN_A(I,A) (I | (A << 21))
77 #define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78 #define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79 #define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80 #define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82 /* PLT/GOT Stuff */
83
84 /* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86 #ifdef USE_SECUREPLT
87 bfd_boolean elf64_alpha_use_secureplt = TRUE;
88 #else
89 bfd_boolean elf64_alpha_use_secureplt = FALSE;
90 #endif
91
92 #define OLD_PLT_HEADER_SIZE 32
93 #define OLD_PLT_ENTRY_SIZE 12
94 #define NEW_PLT_HEADER_SIZE 36
95 #define NEW_PLT_ENTRY_SIZE 4
96
97 #define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99 #define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102 #define MAX_GOT_SIZE (64*1024)
103
104 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
105 \f
106
107 /* Used to implement multiple .got subsections. */
108 struct alpha_elf_got_entry
109 {
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138 };
139
140 struct alpha_elf_reloc_entry
141 {
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
147 /* Which section this relocation is against? */
148 asection *sec;
149
150 /* How many did we find? */
151 unsigned long count;
152
153 /* What kind of relocation? */
154 unsigned int rtype;
155 };
156
157 struct alpha_elf_link_hash_entry
158 {
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
167 /* Contexts in which a literal was referenced. */
168 #define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169 #define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170 #define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171 #define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172 #define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173 #define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174 #define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175 #define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176 #define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
177
178 /* Used to implement multiple .got subsections. */
179 struct alpha_elf_got_entry *got_entries;
180
181 /* Used to count non-got, non-plt relocations for delayed sizing
182 of relocation sections. */
183 struct alpha_elf_reloc_entry *reloc_entries;
184 };
185
186 /* Alpha ELF linker hash table. */
187
188 struct alpha_elf_link_hash_table
189 {
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
199 };
200
201 /* Look up an entry in a Alpha ELF linker hash table. */
202
203 #define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208 /* Traverse a Alpha ELF linker hash table. */
209
210 #define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
214 (info)))
215
216 /* Get the Alpha ELF linker hash table from a link_info structure. */
217
218 #define alpha_elf_hash_table(p) \
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
221
222 /* Get the object's symbols as our own entry type. */
223
224 #define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
227 /* Should we do dynamic things to this symbol? This differs from the
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
231
232 static inline bfd_boolean
233 alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
235 {
236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
237 }
238
239 /* Create an entry in a Alpha ELF linker hash table. */
240
241 static struct bfd_hash_entry *
242 elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
245 {
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275 }
276
277 /* Create a Alpha ELF linker hash table. */
278
279 static struct bfd_link_hash_table *
280 elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
281 {
282 struct alpha_elf_link_hash_table *ret;
283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
284
285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
293 {
294 free (ret);
295 return NULL;
296 }
297
298 return &ret->root.root;
299 }
300 \f
301 /* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304 struct alpha_elf_find_line
305 {
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308 };
309
310 /* We have some private fields hanging off of the elf_tdata structure. */
311
312 struct alpha_elf_obj_tdata
313 {
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
335
336 /* For every got, this is the sum of the number of words required
337 to hold all of the member object's local got. */
338 int local_got_size;
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
343 };
344
345 #define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
348 #define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
352
353 static bfd_boolean
354 elf64_alpha_mkobject (bfd *abfd)
355 {
356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
357 ALPHA_ELF_DATA);
358 }
359
360 static bfd_boolean
361 elf64_alpha_object_p (bfd *abfd)
362 {
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365 }
366 \f
367 /* A relocation function which doesn't do anything. */
368
369 static bfd_reloc_status_type
370 elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
372 void * data ATTRIBUTE_UNUSED, asection *sec,
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374 {
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378 }
379
380 /* A relocation function used for an unsupported reloc. */
381
382 static bfd_reloc_status_type
383 elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
385 void * data ATTRIBUTE_UNUSED, asection *sec,
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387 {
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391 }
392
393 /* Do the work of the GPDISP relocation. */
394
395 static bfd_reloc_status_type
396 elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398 {
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431 }
432
433 /* The special function for the GPDISP reloc. */
434
435 static bfd_reloc_status_type
436 elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440 {
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476 }
477
478 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480 #define MINUS_ONE (((bfd_vma)0) - 1)
481
482
483 #define SKIP_HOWTO(N) \
484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
485
486 static reloc_howto_type elf64_alpha_howto_table[] =
487 {
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
492 TRUE, /* pc_relative */
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
497 FALSE, /* partial_inplace */
498 0, /* src_mask */
499 0, /* dst_mask */
500 TRUE), /* pcrel_offset */
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
507 FALSE, /* pc_relative */
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
510 bfd_elf_generic_reloc, /* special_function */
511 "REFLONG", /* name */
512 FALSE, /* partial_inplace */
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
515 FALSE), /* pcrel_offset */
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
522 FALSE, /* pc_relative */
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
525 bfd_elf_generic_reloc, /* special_function */
526 "REFQUAD", /* name */
527 FALSE, /* partial_inplace */
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
530 FALSE), /* pcrel_offset */
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
539 FALSE, /* pc_relative */
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
542 bfd_elf_generic_reloc, /* special_function */
543 "GPREL32", /* name */
544 FALSE, /* partial_inplace */
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
547 FALSE), /* pcrel_offset */
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
552 1, /* size (0 = byte, 1 = short, 2 = long) */
553 16, /* bitsize */
554 FALSE, /* pc_relative */
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
557 bfd_elf_generic_reloc, /* special_function */
558 "ELF_LITERAL", /* name */
559 FALSE, /* partial_inplace */
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
562 FALSE), /* pcrel_offset */
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
573 1, /* size (0 = byte, 1 = short, 2 = long) */
574 32, /* bitsize */
575 FALSE, /* pc_relative */
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
580 FALSE, /* partial_inplace */
581 0, /* src_mask */
582 0, /* dst_mask */
583 FALSE), /* pcrel_offset */
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
605 FALSE, /* pc_relative */
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
610 FALSE, /* partial_inplace */
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
613 TRUE), /* pcrel_offset */
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
620 TRUE, /* pc_relative */
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
623 bfd_elf_generic_reloc, /* special_function */
624 "BRADDR", /* name */
625 FALSE, /* partial_inplace */
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
628 TRUE), /* pcrel_offset */
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
633 1, /* size (0 = byte, 1 = short, 2 = long) */
634 14, /* bitsize */
635 TRUE, /* pc_relative */
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
638 bfd_elf_generic_reloc, /* special_function */
639 "HINT", /* name */
640 FALSE, /* partial_inplace */
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
643 TRUE), /* pcrel_offset */
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
650 TRUE, /* pc_relative */
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
653 bfd_elf_generic_reloc, /* special_function */
654 "SREL16", /* name */
655 FALSE, /* partial_inplace */
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
658 TRUE), /* pcrel_offset */
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
665 TRUE, /* pc_relative */
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
668 bfd_elf_generic_reloc, /* special_function */
669 "SREL32", /* name */
670 FALSE, /* partial_inplace */
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
673 TRUE), /* pcrel_offset */
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
680 TRUE, /* pc_relative */
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
683 bfd_elf_generic_reloc, /* special_function */
684 "SREL64", /* name */
685 FALSE, /* partial_inplace */
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
688 TRUE), /* pcrel_offset */
689
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
700 1, /* size (0 = byte, 1 = short, 2 = long) */
701 16, /* bitsize */
702 FALSE, /* pc_relative */
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
705 bfd_elf_generic_reloc, /* special_function */
706 "GPRELHIGH", /* name */
707 FALSE, /* partial_inplace */
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
710 FALSE), /* pcrel_offset */
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
715 1, /* size (0 = byte, 1 = short, 2 = long) */
716 16, /* bitsize */
717 FALSE, /* pc_relative */
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
720 bfd_elf_generic_reloc, /* special_function */
721 "GPRELLOW", /* name */
722 FALSE, /* partial_inplace */
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
725 FALSE), /* pcrel_offset */
726
727 /* A 16-bit displacement from the GP to the target. */
728 HOWTO (R_ALPHA_GPREL16,
729 0, /* rightshift */
730 1, /* size (0 = byte, 1 = short, 2 = long) */
731 16, /* bitsize */
732 FALSE, /* pc_relative */
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
735 bfd_elf_generic_reloc, /* special_function */
736 "GPREL16", /* name */
737 FALSE, /* partial_inplace */
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
740 FALSE), /* pcrel_offset */
741
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
747
748 /* Misc ELF relocations. */
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
758 FALSE,
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
763 FALSE,
764 0,
765 0,
766 TRUE),
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
773 FALSE,
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
778 FALSE,
779 0,
780 0,
781 TRUE),
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
788 FALSE,
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
793 FALSE,
794 0,
795 0,
796 TRUE),
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
803 FALSE,
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
808 FALSE,
809 0,
810 0,
811 TRUE),
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
818 TRUE, /* pc_relative */
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
821 bfd_elf_generic_reloc, /* special_function */
822 "BRSGP", /* name */
823 FALSE, /* partial_inplace */
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
826 TRUE), /* pcrel_offset */
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
833 FALSE, /* pc_relative */
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
836 bfd_elf_generic_reloc, /* special_function */
837 "TLSGD", /* name */
838 FALSE, /* partial_inplace */
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
841 FALSE), /* pcrel_offset */
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
848 FALSE, /* pc_relative */
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
851 bfd_elf_generic_reloc, /* special_function */
852 "TLSLDM", /* name */
853 FALSE, /* partial_inplace */
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
856 FALSE), /* pcrel_offset */
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
863 FALSE, /* pc_relative */
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
866 bfd_elf_generic_reloc, /* special_function */
867 "DTPMOD64", /* name */
868 FALSE, /* partial_inplace */
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
871 FALSE), /* pcrel_offset */
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
879 FALSE, /* pc_relative */
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
882 bfd_elf_generic_reloc, /* special_function */
883 "GOTDTPREL", /* name */
884 FALSE, /* partial_inplace */
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
887 FALSE), /* pcrel_offset */
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
894 FALSE, /* pc_relative */
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
897 bfd_elf_generic_reloc, /* special_function */
898 "DTPREL64", /* name */
899 FALSE, /* partial_inplace */
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
902 FALSE), /* pcrel_offset */
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
909 FALSE, /* pc_relative */
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
912 bfd_elf_generic_reloc, /* special_function */
913 "DTPRELHI", /* name */
914 FALSE, /* partial_inplace */
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
917 FALSE), /* pcrel_offset */
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
924 FALSE, /* pc_relative */
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
927 bfd_elf_generic_reloc, /* special_function */
928 "DTPRELLO", /* name */
929 FALSE, /* partial_inplace */
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
932 FALSE), /* pcrel_offset */
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
939 FALSE, /* pc_relative */
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
942 bfd_elf_generic_reloc, /* special_function */
943 "DTPREL16", /* name */
944 FALSE, /* partial_inplace */
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
947 FALSE), /* pcrel_offset */
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
955 FALSE, /* pc_relative */
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
958 bfd_elf_generic_reloc, /* special_function */
959 "GOTTPREL", /* name */
960 FALSE, /* partial_inplace */
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
963 FALSE), /* pcrel_offset */
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
970 FALSE, /* pc_relative */
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
973 bfd_elf_generic_reloc, /* special_function */
974 "TPREL64", /* name */
975 FALSE, /* partial_inplace */
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
978 FALSE), /* pcrel_offset */
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
985 FALSE, /* pc_relative */
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
988 bfd_elf_generic_reloc, /* special_function */
989 "TPRELHI", /* name */
990 FALSE, /* partial_inplace */
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
993 FALSE), /* pcrel_offset */
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
1000 FALSE, /* pc_relative */
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
1003 bfd_elf_generic_reloc, /* special_function */
1004 "TPRELLO", /* name */
1005 FALSE, /* partial_inplace */
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
1008 FALSE), /* pcrel_offset */
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
1015 FALSE, /* pc_relative */
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
1018 bfd_elf_generic_reloc, /* special_function */
1019 "TPREL16", /* name */
1020 FALSE, /* partial_inplace */
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
1023 FALSE), /* pcrel_offset */
1024 };
1025
1026 /* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028 struct elf_reloc_map
1029 {
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032 };
1033
1034 static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035 {
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
1066 };
1067
1068 /* Given a BFD reloc type, return a HOWTO structure. */
1069
1070 static reloc_howto_type *
1071 elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
1073 {
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083 }
1084
1085 static reloc_howto_type *
1086 elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088 {
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100 }
1101
1102 /* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
1104 static bfd_boolean
1105 elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
1106 Elf_Internal_Rela *dst)
1107 {
1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
1112 /* xgettext:c-format */
1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1114 abfd, r_type);
1115 bfd_set_error (bfd_error_bad_value);
1116 return FALSE;
1117 }
1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1119 return TRUE;
1120 }
1121
1122 /* These two relocations create a two-word entry in the got. */
1123 #define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
1125
1126 /* This is PT_TLS segment p_vaddr. */
1127 #define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
1129
1130 /* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
1132 #define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
1136 \f
1137 /* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
1139 type. */
1140
1141 static bfd_boolean
1142 elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
1146 {
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
1163
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
1167
1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
1169 {
1170 if (!bfd_set_section_flags (newsect,
1171 bfd_section_flags (newsect) | SEC_DEBUGGING))
1172 return FALSE;
1173 }
1174
1175 return TRUE;
1176 }
1177
1178 /* Convert Alpha specific section flags to bfd internal section flags. */
1179
1180 static bfd_boolean
1181 elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
1182 {
1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1184 hdr->bfd_section->flags |= SEC_SMALL_DATA;
1185
1186 return TRUE;
1187 }
1188
1189 /* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
1191
1192 static bfd_boolean
1193 elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194 {
1195 register const char *name;
1196
1197 name = bfd_section_name (sec);
1198
1199 if (strcmp (name, ".mdebug") == 0)
1200 {
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
1203 entsize of 0. FIXME: Does this matter? */
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
1208 }
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
1215
1216 return TRUE;
1217 }
1218
1219 /* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222 static bfd_boolean
1223 elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228 {
1229 if (sym->st_shndx == SHN_COMMON
1230 && !bfd_link_relocatable (info)
1231 && sym->st_size <= elf_gp_size (abfd))
1232 {
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
1235
1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
1237
1238 if (scomm == NULL)
1239 {
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
1247
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
1251
1252 return TRUE;
1253 }
1254
1255 /* Create the .got section. */
1256
1257 static bfd_boolean
1258 elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260 {
1261 flagword flags;
1262 asection *s;
1263
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
1270 if (s == NULL
1271 || !bfd_set_section_alignment (s, 3))
1272 return FALSE;
1273
1274 alpha_elf_tdata (abfd)->got = s;
1275
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
1281 return TRUE;
1282 }
1283
1284 /* Create all the dynamic sections. */
1285
1286 static bfd_boolean
1287 elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288 {
1289 asection *s;
1290 flagword flags;
1291 struct elf_link_hash_entry *h;
1292
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
1297
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
1302 elf_hash_table (info)->splt = s;
1303 if (s == NULL || ! bfd_set_section_alignment (s, 4))
1304 return FALSE;
1305
1306 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1307 .plt section. */
1308 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1309 "_PROCEDURE_LINKAGE_TABLE_");
1310 elf_hash_table (info)->hplt = h;
1311 if (h == NULL)
1312 return FALSE;
1313
1314 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1315 | SEC_LINKER_CREATED | SEC_READONLY);
1316 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
1317 elf_hash_table (info)->srelplt = s;
1318 if (s == NULL || ! bfd_set_section_alignment (s, 3))
1319 return FALSE;
1320
1321 if (elf64_alpha_use_secureplt)
1322 {
1323 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1324 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
1325 elf_hash_table (info)->sgotplt = s;
1326 if (s == NULL || ! bfd_set_section_alignment (s, 3))
1327 return FALSE;
1328 }
1329
1330 /* We may or may not have created a .got section for this object, but
1331 we definitely havn't done the rest of the work. */
1332
1333 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1334 {
1335 if (!elf64_alpha_create_got_section (abfd, info))
1336 return FALSE;
1337 }
1338
1339 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1340 | SEC_LINKER_CREATED | SEC_READONLY);
1341 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
1342 elf_hash_table (info)->srelgot = s;
1343 if (s == NULL
1344 || !bfd_set_section_alignment (s, 3))
1345 return FALSE;
1346
1347 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1348 dynobj's .got section. We don't do this in the linker script
1349 because we don't want to define the symbol if we are not creating
1350 a global offset table. */
1351 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1352 "_GLOBAL_OFFSET_TABLE_");
1353 elf_hash_table (info)->hgot = h;
1354 if (h == NULL)
1355 return FALSE;
1356
1357 return TRUE;
1358 }
1359 \f
1360 /* Read ECOFF debugging information from a .mdebug section into a
1361 ecoff_debug_info structure. */
1362
1363 static bfd_boolean
1364 elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1365 struct ecoff_debug_info *debug)
1366 {
1367 HDRR *symhdr;
1368 const struct ecoff_debug_swap *swap;
1369 char *ext_hdr = NULL;
1370
1371 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1372 memset (debug, 0, sizeof (*debug));
1373
1374 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1375 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1376 goto error_return;
1377
1378 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1379 swap->external_hdr_size))
1380 goto error_return;
1381
1382 symhdr = &debug->symbolic_header;
1383 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
1384
1385 /* The symbolic header contains absolute file offsets and sizes to
1386 read. */
1387 #define READ(ptr, offset, count, size, type) \
1388 do \
1389 { \
1390 size_t amt; \
1391 debug->ptr = NULL; \
1392 if (symhdr->count == 0) \
1393 break; \
1394 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1395 { \
1396 bfd_set_error (bfd_error_file_too_big); \
1397 goto error_return; \
1398 } \
1399 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
1400 goto error_return; \
1401 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1402 if (debug->ptr == NULL) \
1403 goto error_return; \
1404 } while (0)
1405
1406 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
1407 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1408 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1409 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1410 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
1411 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1412 union aux_ext *);
1413 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1414 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
1415 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1416 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1417 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
1418 #undef READ
1419
1420 debug->fdr = NULL;
1421
1422 return TRUE;
1423
1424 error_return:
1425 free (ext_hdr);
1426 free (debug->line);
1427 free (debug->external_dnr);
1428 free (debug->external_pdr);
1429 free (debug->external_sym);
1430 free (debug->external_opt);
1431 free (debug->external_aux);
1432 free (debug->ss);
1433 free (debug->ssext);
1434 free (debug->external_fdr);
1435 free (debug->external_rfd);
1436 free (debug->external_ext);
1437 return FALSE;
1438 }
1439
1440 /* Alpha ELF local labels start with '$'. */
1441
1442 static bfd_boolean
1443 elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
1444 {
1445 return name[0] == '$';
1446 }
1447
1448 static bfd_boolean
1449 elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1450 asection *section, bfd_vma offset,
1451 const char **filename_ptr,
1452 const char **functionname_ptr,
1453 unsigned int *line_ptr,
1454 unsigned int *discriminator_ptr)
1455 {
1456 asection *msec;
1457
1458 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
1459 filename_ptr, functionname_ptr,
1460 line_ptr, discriminator_ptr,
1461 dwarf_debug_sections,
1462 &elf_tdata (abfd)->dwarf2_find_line_info)
1463 == 1)
1464 return TRUE;
1465
1466 msec = bfd_get_section_by_name (abfd, ".mdebug");
1467 if (msec != NULL)
1468 {
1469 flagword origflags;
1470 struct alpha_elf_find_line *fi;
1471 const struct ecoff_debug_swap * const swap =
1472 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1473
1474 /* If we are called during a link, alpha_elf_final_link may have
1475 cleared the SEC_HAS_CONTENTS field. We force it back on here
1476 if appropriate (which it normally will be). */
1477 origflags = msec->flags;
1478 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1479 msec->flags |= SEC_HAS_CONTENTS;
1480
1481 fi = alpha_elf_tdata (abfd)->find_line_info;
1482 if (fi == NULL)
1483 {
1484 bfd_size_type external_fdr_size;
1485 char *fraw_src;
1486 char *fraw_end;
1487 struct fdr *fdr_ptr;
1488 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
1489
1490 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
1491 if (fi == NULL)
1492 {
1493 msec->flags = origflags;
1494 return FALSE;
1495 }
1496
1497 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1498 {
1499 msec->flags = origflags;
1500 return FALSE;
1501 }
1502
1503 /* Swap in the FDR information. */
1504 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1505 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1506 if (fi->d.fdr == NULL)
1507 {
1508 msec->flags = origflags;
1509 return FALSE;
1510 }
1511 external_fdr_size = swap->external_fdr_size;
1512 fdr_ptr = fi->d.fdr;
1513 fraw_src = (char *) fi->d.external_fdr;
1514 fraw_end = (fraw_src
1515 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1516 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
1517 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
1518
1519 alpha_elf_tdata (abfd)->find_line_info = fi;
1520
1521 /* Note that we don't bother to ever free this information.
1522 find_nearest_line is either called all the time, as in
1523 objdump -l, so the information should be saved, or it is
1524 rarely called, as in ld error messages, so the memory
1525 wasted is unimportant. Still, it would probably be a
1526 good idea for free_cached_info to throw it away. */
1527 }
1528
1529 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1530 &fi->i, filename_ptr, functionname_ptr,
1531 line_ptr))
1532 {
1533 msec->flags = origflags;
1534 return TRUE;
1535 }
1536
1537 msec->flags = origflags;
1538 }
1539
1540 /* Fall back on the generic ELF find_nearest_line routine. */
1541
1542 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
1543 filename_ptr, functionname_ptr,
1544 line_ptr, discriminator_ptr);
1545 }
1546 \f
1547 /* Structure used to pass information to alpha_elf_output_extsym. */
1548
1549 struct extsym_info
1550 {
1551 bfd *abfd;
1552 struct bfd_link_info *info;
1553 struct ecoff_debug_info *debug;
1554 const struct ecoff_debug_swap *swap;
1555 bfd_boolean failed;
1556 };
1557
1558 static bfd_boolean
1559 elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
1560 {
1561 struct extsym_info *einfo = (struct extsym_info *) data;
1562 bfd_boolean strip;
1563 asection *sec, *output_section;
1564
1565 if (h->root.indx == -2)
1566 strip = FALSE;
1567 else if ((h->root.def_dynamic
1568 || h->root.ref_dynamic
1569 || h->root.root.type == bfd_link_hash_new)
1570 && !h->root.def_regular
1571 && !h->root.ref_regular)
1572 strip = TRUE;
1573 else if (einfo->info->strip == strip_all
1574 || (einfo->info->strip == strip_some
1575 && bfd_hash_lookup (einfo->info->keep_hash,
1576 h->root.root.root.string,
1577 FALSE, FALSE) == NULL))
1578 strip = TRUE;
1579 else
1580 strip = FALSE;
1581
1582 if (strip)
1583 return TRUE;
1584
1585 if (h->esym.ifd == -2)
1586 {
1587 h->esym.jmptbl = 0;
1588 h->esym.cobol_main = 0;
1589 h->esym.weakext = 0;
1590 h->esym.reserved = 0;
1591 h->esym.ifd = ifdNil;
1592 h->esym.asym.value = 0;
1593 h->esym.asym.st = stGlobal;
1594
1595 if (h->root.root.type != bfd_link_hash_defined
1596 && h->root.root.type != bfd_link_hash_defweak)
1597 h->esym.asym.sc = scAbs;
1598 else
1599 {
1600 const char *name;
1601
1602 sec = h->root.root.u.def.section;
1603 output_section = sec->output_section;
1604
1605 /* When making a shared library and symbol h is the one from
1606 the another shared library, OUTPUT_SECTION may be null. */
1607 if (output_section == NULL)
1608 h->esym.asym.sc = scUndefined;
1609 else
1610 {
1611 name = bfd_section_name (output_section);
1612
1613 if (strcmp (name, ".text") == 0)
1614 h->esym.asym.sc = scText;
1615 else if (strcmp (name, ".data") == 0)
1616 h->esym.asym.sc = scData;
1617 else if (strcmp (name, ".sdata") == 0)
1618 h->esym.asym.sc = scSData;
1619 else if (strcmp (name, ".rodata") == 0
1620 || strcmp (name, ".rdata") == 0)
1621 h->esym.asym.sc = scRData;
1622 else if (strcmp (name, ".bss") == 0)
1623 h->esym.asym.sc = scBss;
1624 else if (strcmp (name, ".sbss") == 0)
1625 h->esym.asym.sc = scSBss;
1626 else if (strcmp (name, ".init") == 0)
1627 h->esym.asym.sc = scInit;
1628 else if (strcmp (name, ".fini") == 0)
1629 h->esym.asym.sc = scFini;
1630 else
1631 h->esym.asym.sc = scAbs;
1632 }
1633 }
1634
1635 h->esym.asym.reserved = 0;
1636 h->esym.asym.index = indexNil;
1637 }
1638
1639 if (h->root.root.type == bfd_link_hash_common)
1640 h->esym.asym.value = h->root.root.u.c.size;
1641 else if (h->root.root.type == bfd_link_hash_defined
1642 || h->root.root.type == bfd_link_hash_defweak)
1643 {
1644 if (h->esym.asym.sc == scCommon)
1645 h->esym.asym.sc = scBss;
1646 else if (h->esym.asym.sc == scSCommon)
1647 h->esym.asym.sc = scSBss;
1648
1649 sec = h->root.root.u.def.section;
1650 output_section = sec->output_section;
1651 if (output_section != NULL)
1652 h->esym.asym.value = (h->root.root.u.def.value
1653 + sec->output_offset
1654 + output_section->vma);
1655 else
1656 h->esym.asym.value = 0;
1657 }
1658
1659 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1660 h->root.root.root.string,
1661 &h->esym))
1662 {
1663 einfo->failed = TRUE;
1664 return FALSE;
1665 }
1666
1667 return TRUE;
1668 }
1669 \f
1670 /* Search for and possibly create a got entry. */
1671
1672 static struct alpha_elf_got_entry *
1673 get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1674 unsigned long r_type, unsigned long r_symndx,
1675 bfd_vma r_addend)
1676 {
1677 struct alpha_elf_got_entry *gotent;
1678 struct alpha_elf_got_entry **slot;
1679
1680 if (h)
1681 slot = &h->got_entries;
1682 else
1683 {
1684 /* This is a local .got entry -- record for merge. */
1685
1686 struct alpha_elf_got_entry **local_got_entries;
1687
1688 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1689 if (!local_got_entries)
1690 {
1691 bfd_size_type size;
1692 Elf_Internal_Shdr *symtab_hdr;
1693
1694 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1695 size = symtab_hdr->sh_info;
1696 size *= sizeof (struct alpha_elf_got_entry *);
1697
1698 local_got_entries
1699 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1700 if (!local_got_entries)
1701 return NULL;
1702
1703 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1704 }
1705
1706 slot = &local_got_entries[r_symndx];
1707 }
1708
1709 for (gotent = *slot; gotent ; gotent = gotent->next)
1710 if (gotent->gotobj == abfd
1711 && gotent->reloc_type == r_type
1712 && gotent->addend == r_addend)
1713 break;
1714
1715 if (!gotent)
1716 {
1717 int entry_size;
1718 size_t amt;
1719
1720 amt = sizeof (struct alpha_elf_got_entry);
1721 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1722 if (!gotent)
1723 return NULL;
1724
1725 gotent->gotobj = abfd;
1726 gotent->addend = r_addend;
1727 gotent->got_offset = -1;
1728 gotent->plt_offset = -1;
1729 gotent->use_count = 1;
1730 gotent->reloc_type = r_type;
1731 gotent->reloc_done = 0;
1732 gotent->reloc_xlated = 0;
1733
1734 gotent->next = *slot;
1735 *slot = gotent;
1736
1737 entry_size = alpha_got_entry_size (r_type);
1738 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1739 if (!h)
1740 alpha_elf_tdata(abfd)->local_got_size += entry_size;
1741 }
1742 else
1743 gotent->use_count += 1;
1744
1745 return gotent;
1746 }
1747
1748 static bfd_boolean
1749 elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1750 {
1751 return ((ah->root.type == STT_FUNC
1752 || ah->root.root.type == bfd_link_hash_undefweak
1753 || ah->root.root.type == bfd_link_hash_undefined)
1754 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1755 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
1756 }
1757
1758 /* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1759 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1760 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1761 relocs to be sorted. */
1762
1763 static bfd_boolean
1764 elf64_alpha_sort_relocs_p (asection *sec)
1765 {
1766 return (sec->flags & SEC_CODE) == 0;
1767 }
1768
1769
1770 /* Handle dynamic relocations when doing an Alpha ELF link. */
1771
1772 static bfd_boolean
1773 elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1774 asection *sec, const Elf_Internal_Rela *relocs)
1775 {
1776 bfd *dynobj;
1777 asection *sreloc;
1778 Elf_Internal_Shdr *symtab_hdr;
1779 struct alpha_elf_link_hash_entry **sym_hashes;
1780 const Elf_Internal_Rela *rel, *relend;
1781
1782 if (bfd_link_relocatable (info))
1783 return TRUE;
1784
1785 /* Don't do anything special with non-loaded, non-alloced sections.
1786 In particular, any relocs in such sections should not affect GOT
1787 and PLT reference counting (ie. we don't allow them to create GOT
1788 or PLT entries), there's no possibility or desire to optimize TLS
1789 relocs, and there's not much point in propagating relocs to shared
1790 libs that the dynamic linker won't relocate. */
1791 if ((sec->flags & SEC_ALLOC) == 0)
1792 return TRUE;
1793
1794 BFD_ASSERT (is_alpha_elf (abfd));
1795
1796 dynobj = elf_hash_table (info)->dynobj;
1797 if (dynobj == NULL)
1798 elf_hash_table (info)->dynobj = dynobj = abfd;
1799
1800 sreloc = NULL;
1801 symtab_hdr = &elf_symtab_hdr (abfd);
1802 sym_hashes = alpha_elf_sym_hashes (abfd);
1803
1804 relend = relocs + sec->reloc_count;
1805 for (rel = relocs; rel < relend; ++rel)
1806 {
1807 enum {
1808 NEED_GOT = 1,
1809 NEED_GOT_ENTRY = 2,
1810 NEED_DYNREL = 4
1811 };
1812
1813 unsigned long r_symndx, r_type;
1814 struct alpha_elf_link_hash_entry *h;
1815 unsigned int gotent_flags;
1816 bfd_boolean maybe_dynamic;
1817 unsigned int need;
1818 bfd_vma addend;
1819
1820 r_symndx = ELF64_R_SYM (rel->r_info);
1821 if (r_symndx < symtab_hdr->sh_info)
1822 h = NULL;
1823 else
1824 {
1825 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1826
1827 while (h->root.root.type == bfd_link_hash_indirect
1828 || h->root.root.type == bfd_link_hash_warning)
1829 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
1830
1831 /* PR15323, ref flags aren't set for references in the same
1832 object. */
1833 h->root.ref_regular = 1;
1834 }
1835
1836 /* We can only get preliminary data on whether a symbol is
1837 locally or externally defined, as not all of the input files
1838 have yet been processed. Do something with what we know, as
1839 this may help reduce memory usage and processing time later. */
1840 maybe_dynamic = FALSE;
1841 if (h && ((bfd_link_pic (info)
1842 && (!info->symbolic
1843 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1844 || !h->root.def_regular
1845 || h->root.root.type == bfd_link_hash_defweak))
1846 maybe_dynamic = TRUE;
1847
1848 need = 0;
1849 gotent_flags = 0;
1850 r_type = ELF64_R_TYPE (rel->r_info);
1851 addend = rel->r_addend;
1852
1853 switch (r_type)
1854 {
1855 case R_ALPHA_LITERAL:
1856 need = NEED_GOT | NEED_GOT_ENTRY;
1857
1858 /* Remember how this literal is used from its LITUSEs.
1859 This will be important when it comes to decide if we can
1860 create a .plt entry for a function symbol. */
1861 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
1862 if (rel->r_addend >= 1 && rel->r_addend <= 6)
1863 gotent_flags |= 1 << rel->r_addend;
1864 --rel;
1865
1866 /* No LITUSEs -- presumably the address is used somehow. */
1867 if (gotent_flags == 0)
1868 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1869 break;
1870
1871 case R_ALPHA_GPDISP:
1872 case R_ALPHA_GPREL16:
1873 case R_ALPHA_GPREL32:
1874 case R_ALPHA_GPRELHIGH:
1875 case R_ALPHA_GPRELLOW:
1876 case R_ALPHA_BRSGP:
1877 need = NEED_GOT;
1878 break;
1879
1880 case R_ALPHA_REFLONG:
1881 case R_ALPHA_REFQUAD:
1882 if (bfd_link_pic (info) || maybe_dynamic)
1883 need = NEED_DYNREL;
1884 break;
1885
1886 case R_ALPHA_TLSLDM:
1887 /* The symbol for a TLSLDM reloc is ignored. Collapse the
1888 reloc to the STN_UNDEF (0) symbol so that they all match. */
1889 r_symndx = STN_UNDEF;
1890 h = 0;
1891 maybe_dynamic = FALSE;
1892 /* FALLTHRU */
1893
1894 case R_ALPHA_TLSGD:
1895 case R_ALPHA_GOTDTPREL:
1896 need = NEED_GOT | NEED_GOT_ENTRY;
1897 break;
1898
1899 case R_ALPHA_GOTTPREL:
1900 need = NEED_GOT | NEED_GOT_ENTRY;
1901 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1902 if (bfd_link_pic (info))
1903 info->flags |= DF_STATIC_TLS;
1904 break;
1905
1906 case R_ALPHA_TPREL64:
1907 if (bfd_link_dll (info))
1908 {
1909 info->flags |= DF_STATIC_TLS;
1910 need = NEED_DYNREL;
1911 }
1912 else if (maybe_dynamic)
1913 need = NEED_DYNREL;
1914 break;
1915 }
1916
1917 if (need & NEED_GOT)
1918 {
1919 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1920 {
1921 if (!elf64_alpha_create_got_section (abfd, info))
1922 return FALSE;
1923 }
1924 }
1925
1926 if (need & NEED_GOT_ENTRY)
1927 {
1928 struct alpha_elf_got_entry *gotent;
1929
1930 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1931 if (!gotent)
1932 return FALSE;
1933
1934 if (gotent_flags)
1935 {
1936 gotent->flags |= gotent_flags;
1937 if (h)
1938 {
1939 gotent_flags |= h->flags;
1940 h->flags = gotent_flags;
1941
1942 /* Make a guess as to whether a .plt entry is needed. */
1943 /* ??? It appears that we won't make it into
1944 adjust_dynamic_symbol for symbols that remain
1945 totally undefined. Copying this check here means
1946 we can create a plt entry for them too. */
1947 h->root.needs_plt
1948 = (maybe_dynamic && elf64_alpha_want_plt (h));
1949 }
1950 }
1951 }
1952
1953 if (need & NEED_DYNREL)
1954 {
1955 /* We need to create the section here now whether we eventually
1956 use it or not so that it gets mapped to an output section by
1957 the linker. If not used, we'll kill it in size_dynamic_sections. */
1958 if (sreloc == NULL)
1959 {
1960 sreloc = _bfd_elf_make_dynamic_reloc_section
1961 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1962
1963 if (sreloc == NULL)
1964 return FALSE;
1965 }
1966
1967 if (h)
1968 {
1969 /* Since we havn't seen all of the input symbols yet, we
1970 don't know whether we'll actually need a dynamic relocation
1971 entry for this reloc. So make a record of it. Once we
1972 find out if this thing needs dynamic relocation we'll
1973 expand the relocation sections by the appropriate amount. */
1974
1975 struct alpha_elf_reloc_entry *rent;
1976
1977 for (rent = h->reloc_entries; rent; rent = rent->next)
1978 if (rent->rtype == r_type && rent->srel == sreloc)
1979 break;
1980
1981 if (!rent)
1982 {
1983 size_t amt = sizeof (struct alpha_elf_reloc_entry);
1984 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1985 if (!rent)
1986 return FALSE;
1987
1988 rent->srel = sreloc;
1989 rent->sec = sec;
1990 rent->rtype = r_type;
1991 rent->count = 1;
1992
1993 rent->next = h->reloc_entries;
1994 h->reloc_entries = rent;
1995 }
1996 else
1997 rent->count++;
1998 }
1999 else if (bfd_link_pic (info))
2000 {
2001 /* If this is a shared library, and the section is to be
2002 loaded into memory, we need a RELATIVE reloc. */
2003 sreloc->size += sizeof (Elf64_External_Rela);
2004 if (sec->flags & SEC_READONLY)
2005 {
2006 info->flags |= DF_TEXTREL;
2007 info->callbacks->minfo
2008 (_("%pB: dynamic relocation against `%pT' in "
2009 "read-only section `%pA'\n"),
2010 sec->owner, h->root.root.root.string, sec);
2011 }
2012 }
2013 }
2014 }
2015
2016 return TRUE;
2017 }
2018
2019 /* Return the section that should be marked against GC for a given
2020 relocation. */
2021
2022 static asection *
2023 elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2024 Elf_Internal_Rela *rel,
2025 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2026 {
2027 /* These relocations don't really reference a symbol. Instead we store
2028 extra data in their addend slot. Ignore the symbol. */
2029 switch (ELF64_R_TYPE (rel->r_info))
2030 {
2031 case R_ALPHA_LITUSE:
2032 case R_ALPHA_GPDISP:
2033 case R_ALPHA_HINT:
2034 return NULL;
2035 }
2036
2037 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2038 }
2039
2040 /* Adjust a symbol defined by a dynamic object and referenced by a
2041 regular object. The current definition is in some section of the
2042 dynamic object, but we're not including those sections. We have to
2043 change the definition to something the rest of the link can
2044 understand. */
2045
2046 static bfd_boolean
2047 elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2048 struct elf_link_hash_entry *h)
2049 {
2050 bfd *dynobj;
2051 asection *s;
2052 struct alpha_elf_link_hash_entry *ah;
2053
2054 dynobj = elf_hash_table(info)->dynobj;
2055 ah = (struct alpha_elf_link_hash_entry *)h;
2056
2057 /* Now that we've seen all of the input symbols, finalize our decision
2058 about whether this symbol should get a .plt entry. Irritatingly, it
2059 is common for folk to leave undefined symbols in shared libraries,
2060 and they still expect lazy binding; accept undefined symbols in lieu
2061 of STT_FUNC. */
2062 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
2063 {
2064 h->needs_plt = TRUE;
2065
2066 s = elf_hash_table(info)->splt;
2067 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2068 return FALSE;
2069
2070 /* We need one plt entry per got subsection. Delay allocation of
2071 the actual plt entries until size_plt_section, called from
2072 size_dynamic_sections or during relaxation. */
2073
2074 return TRUE;
2075 }
2076 else
2077 h->needs_plt = FALSE;
2078
2079 /* If this is a weak symbol, and there is a real definition, the
2080 processor independent code will have arranged for us to see the
2081 real definition first, and we can just use the same value. */
2082 if (h->is_weakalias)
2083 {
2084 struct elf_link_hash_entry *def = weakdef (h);
2085 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2086 h->root.u.def.section = def->root.u.def.section;
2087 h->root.u.def.value = def->root.u.def.value;
2088 return TRUE;
2089 }
2090
2091 /* This is a reference to a symbol defined by a dynamic object which
2092 is not a function. The Alpha, since it uses .got entries for all
2093 symbols even in regular objects, does not need the hackery of a
2094 .dynbss section and COPY dynamic relocations. */
2095
2096 return TRUE;
2097 }
2098
2099 /* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2100
2101 static void
2102 elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2103 const Elf_Internal_Sym *isym,
2104 bfd_boolean definition,
2105 bfd_boolean dynamic)
2106 {
2107 if (!dynamic && definition)
2108 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2109 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2110 }
2111
2112 /* Symbol versioning can create new symbols, and make our old symbols
2113 indirect to the new ones. Consolidate the got and reloc information
2114 in these situations. */
2115
2116 static void
2117 elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2118 struct elf_link_hash_entry *dir,
2119 struct elf_link_hash_entry *ind)
2120 {
2121 struct alpha_elf_link_hash_entry *hi
2122 = (struct alpha_elf_link_hash_entry *) ind;
2123 struct alpha_elf_link_hash_entry *hs
2124 = (struct alpha_elf_link_hash_entry *) dir;
2125
2126 /* Do the merging in the superclass. */
2127 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
2128
2129 /* Merge the flags. Whee. */
2130 hs->flags |= hi->flags;
2131
2132 /* ??? It's unclear to me what's really supposed to happen when
2133 "merging" defweak and defined symbols, given that we don't
2134 actually throw away the defweak. This more-or-less copies
2135 the logic related to got and plt entries in the superclass. */
2136 if (ind->root.type != bfd_link_hash_indirect)
2137 return;
2138
2139 /* Merge the .got entries. Cannibalize the old symbol's list in
2140 doing so, since we don't need it anymore. */
2141
2142 if (hs->got_entries == NULL)
2143 hs->got_entries = hi->got_entries;
2144 else
2145 {
2146 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2147
2148 gsh = hs->got_entries;
2149 for (gi = hi->got_entries; gi ; gi = gin)
2150 {
2151 gin = gi->next;
2152 for (gs = gsh; gs ; gs = gs->next)
2153 if (gi->gotobj == gs->gotobj
2154 && gi->reloc_type == gs->reloc_type
2155 && gi->addend == gs->addend)
2156 {
2157 gs->use_count += gi->use_count;
2158 goto got_found;
2159 }
2160 gi->next = hs->got_entries;
2161 hs->got_entries = gi;
2162 got_found:;
2163 }
2164 }
2165 hi->got_entries = NULL;
2166
2167 /* And similar for the reloc entries. */
2168
2169 if (hs->reloc_entries == NULL)
2170 hs->reloc_entries = hi->reloc_entries;
2171 else
2172 {
2173 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2174
2175 rsh = hs->reloc_entries;
2176 for (ri = hi->reloc_entries; ri ; ri = rin)
2177 {
2178 rin = ri->next;
2179 for (rs = rsh; rs ; rs = rs->next)
2180 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2181 {
2182 rs->count += ri->count;
2183 goto found_reloc;
2184 }
2185 ri->next = hs->reloc_entries;
2186 hs->reloc_entries = ri;
2187 found_reloc:;
2188 }
2189 }
2190 hi->reloc_entries = NULL;
2191 }
2192
2193 /* Is it possible to merge two object file's .got tables? */
2194
2195 static bfd_boolean
2196 elf64_alpha_can_merge_gots (bfd *a, bfd *b)
2197 {
2198 int total = alpha_elf_tdata (a)->total_got_size;
2199 bfd *bsub;
2200
2201 /* Trivial quick fallout test. */
2202 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2203 return TRUE;
2204
2205 /* By their nature, local .got entries cannot be merged. */
2206 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
2207 return FALSE;
2208
2209 /* Failing the common trivial comparison, we must effectively
2210 perform the merge. Not actually performing the merge means that
2211 we don't have to store undo information in case we fail. */
2212 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2213 {
2214 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2215 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2216 int i, n;
2217
2218 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2219 for (i = 0; i < n; ++i)
2220 {
2221 struct alpha_elf_got_entry *ae, *be;
2222 struct alpha_elf_link_hash_entry *h;
2223
2224 h = hashes[i];
2225 while (h->root.root.type == bfd_link_hash_indirect
2226 || h->root.root.type == bfd_link_hash_warning)
2227 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2228
2229 for (be = h->got_entries; be ; be = be->next)
2230 {
2231 if (be->use_count == 0)
2232 continue;
2233 if (be->gotobj != b)
2234 continue;
2235
2236 for (ae = h->got_entries; ae ; ae = ae->next)
2237 if (ae->gotobj == a
2238 && ae->reloc_type == be->reloc_type
2239 && ae->addend == be->addend)
2240 goto global_found;
2241
2242 total += alpha_got_entry_size (be->reloc_type);
2243 if (total > MAX_GOT_SIZE)
2244 return FALSE;
2245 global_found:;
2246 }
2247 }
2248 }
2249
2250 return TRUE;
2251 }
2252
2253 /* Actually merge two .got tables. */
2254
2255 static void
2256 elf64_alpha_merge_gots (bfd *a, bfd *b)
2257 {
2258 int total = alpha_elf_tdata (a)->total_got_size;
2259 bfd *bsub;
2260
2261 /* Remember local expansion. */
2262 {
2263 int e = alpha_elf_tdata (b)->local_got_size;
2264 total += e;
2265 alpha_elf_tdata (a)->local_got_size += e;
2266 }
2267
2268 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2269 {
2270 struct alpha_elf_got_entry **local_got_entries;
2271 struct alpha_elf_link_hash_entry **hashes;
2272 Elf_Internal_Shdr *symtab_hdr;
2273 int i, n;
2274
2275 /* Let the local .got entries know they are part of a new subsegment. */
2276 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2277 if (local_got_entries)
2278 {
2279 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2280 for (i = 0; i < n; ++i)
2281 {
2282 struct alpha_elf_got_entry *ent;
2283 for (ent = local_got_entries[i]; ent; ent = ent->next)
2284 ent->gotobj = a;
2285 }
2286 }
2287
2288 /* Merge the global .got entries. */
2289 hashes = alpha_elf_sym_hashes (bsub);
2290 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2291
2292 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2293 for (i = 0; i < n; ++i)
2294 {
2295 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2296 struct alpha_elf_link_hash_entry *h;
2297
2298 h = hashes[i];
2299 while (h->root.root.type == bfd_link_hash_indirect
2300 || h->root.root.type == bfd_link_hash_warning)
2301 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2302
2303 pbe = start = &h->got_entries;
2304 while ((be = *pbe) != NULL)
2305 {
2306 if (be->use_count == 0)
2307 {
2308 *pbe = be->next;
2309 memset (be, 0xa5, sizeof (*be));
2310 goto kill;
2311 }
2312 if (be->gotobj != b)
2313 goto next;
2314
2315 for (ae = *start; ae ; ae = ae->next)
2316 if (ae->gotobj == a
2317 && ae->reloc_type == be->reloc_type
2318 && ae->addend == be->addend)
2319 {
2320 ae->flags |= be->flags;
2321 ae->use_count += be->use_count;
2322 *pbe = be->next;
2323 memset (be, 0xa5, sizeof (*be));
2324 goto kill;
2325 }
2326 be->gotobj = a;
2327 total += alpha_got_entry_size (be->reloc_type);
2328
2329 next:;
2330 pbe = &be->next;
2331 kill:;
2332 }
2333 }
2334
2335 alpha_elf_tdata (bsub)->gotobj = a;
2336 }
2337 alpha_elf_tdata (a)->total_got_size = total;
2338
2339 /* Merge the two in_got chains. */
2340 {
2341 bfd *next;
2342
2343 bsub = a;
2344 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2345 bsub = next;
2346
2347 alpha_elf_tdata (bsub)->in_got_link_next = b;
2348 }
2349 }
2350
2351 /* Calculate the offsets for the got entries. */
2352
2353 static bfd_boolean
2354 elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2355 void * arg ATTRIBUTE_UNUSED)
2356 {
2357 struct alpha_elf_got_entry *gotent;
2358
2359 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2360 if (gotent->use_count > 0)
2361 {
2362 struct alpha_elf_obj_tdata *td;
2363 bfd_size_type *plge;
2364
2365 td = alpha_elf_tdata (gotent->gotobj);
2366 plge = &td->got->size;
2367 gotent->got_offset = *plge;
2368 *plge += alpha_got_entry_size (gotent->reloc_type);
2369 }
2370
2371 return TRUE;
2372 }
2373
2374 static void
2375 elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2376 {
2377 bfd *i, *got_list;
2378 struct alpha_elf_link_hash_table * htab;
2379
2380 htab = alpha_elf_hash_table (info);
2381 if (htab == NULL)
2382 return;
2383 got_list = htab->got_list;
2384
2385 /* First, zero out the .got sizes, as we may be recalculating the
2386 .got after optimizing it. */
2387 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2388 alpha_elf_tdata(i)->got->size = 0;
2389
2390 /* Next, fill in the offsets for all the global entries. */
2391 alpha_elf_link_hash_traverse (htab,
2392 elf64_alpha_calc_got_offsets_for_symbol,
2393 NULL);
2394
2395 /* Finally, fill in the offsets for the local entries. */
2396 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2397 {
2398 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2399 bfd *j;
2400
2401 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2402 {
2403 struct alpha_elf_got_entry **local_got_entries, *gotent;
2404 int k, n;
2405
2406 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2407 if (!local_got_entries)
2408 continue;
2409
2410 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2411 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2412 if (gotent->use_count > 0)
2413 {
2414 gotent->got_offset = got_offset;
2415 got_offset += alpha_got_entry_size (gotent->reloc_type);
2416 }
2417 }
2418
2419 alpha_elf_tdata(i)->got->size = got_offset;
2420 }
2421 }
2422
2423 /* Constructs the gots. */
2424
2425 static bfd_boolean
2426 elf64_alpha_size_got_sections (struct bfd_link_info *info,
2427 bfd_boolean may_merge)
2428 {
2429 bfd *i, *got_list, *cur_got_obj = NULL;
2430 struct alpha_elf_link_hash_table * htab;
2431
2432 htab = alpha_elf_hash_table (info);
2433 if (htab == NULL)
2434 return FALSE;
2435 got_list = htab->got_list;
2436
2437 /* On the first time through, pretend we have an existing got list
2438 consisting of all of the input files. */
2439 if (got_list == NULL)
2440 {
2441 for (i = info->input_bfds; i ; i = i->link.next)
2442 {
2443 bfd *this_got;
2444
2445 if (! is_alpha_elf (i))
2446 continue;
2447
2448 this_got = alpha_elf_tdata (i)->gotobj;
2449 if (this_got == NULL)
2450 continue;
2451
2452 /* We are assuming no merging has yet occurred. */
2453 BFD_ASSERT (this_got == i);
2454
2455 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
2456 {
2457 /* Yikes! A single object file has too many entries. */
2458 _bfd_error_handler
2459 /* xgettext:c-format */
2460 (_("%pB: .got subsegment exceeds 64K (size %d)"),
2461 i, alpha_elf_tdata (this_got)->total_got_size);
2462 return FALSE;
2463 }
2464
2465 if (got_list == NULL)
2466 got_list = this_got;
2467 else
2468 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2469 cur_got_obj = this_got;
2470 }
2471
2472 /* Strange degenerate case of no got references. */
2473 if (got_list == NULL)
2474 return TRUE;
2475
2476 htab->got_list = got_list;
2477 }
2478
2479 cur_got_obj = got_list;
2480 if (cur_got_obj == NULL)
2481 return FALSE;
2482
2483 if (may_merge)
2484 {
2485 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2486 while (i != NULL)
2487 {
2488 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2489 {
2490 elf64_alpha_merge_gots (cur_got_obj, i);
2491
2492 alpha_elf_tdata(i)->got->size = 0;
2493 i = alpha_elf_tdata(i)->got_link_next;
2494 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2495 }
2496 else
2497 {
2498 cur_got_obj = i;
2499 i = alpha_elf_tdata(i)->got_link_next;
2500 }
2501 }
2502 }
2503
2504 /* Once the gots have been merged, fill in the got offsets for
2505 everything therein. */
2506 elf64_alpha_calc_got_offsets (info);
2507
2508 return TRUE;
2509 }
2510
2511 static bfd_boolean
2512 elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2513 void * data)
2514 {
2515 asection *splt = (asection *) data;
2516 struct alpha_elf_got_entry *gotent;
2517 bfd_boolean saw_one = FALSE;
2518
2519 /* If we didn't need an entry before, we still don't. */
2520 if (!h->root.needs_plt)
2521 return TRUE;
2522
2523 /* For each LITERAL got entry still in use, allocate a plt entry. */
2524 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2525 if (gotent->reloc_type == R_ALPHA_LITERAL
2526 && gotent->use_count > 0)
2527 {
2528 if (splt->size == 0)
2529 splt->size = PLT_HEADER_SIZE;
2530 gotent->plt_offset = splt->size;
2531 splt->size += PLT_ENTRY_SIZE;
2532 saw_one = TRUE;
2533 }
2534
2535 /* If there weren't any, there's no longer a need for the PLT entry. */
2536 if (!saw_one)
2537 h->root.needs_plt = FALSE;
2538
2539 return TRUE;
2540 }
2541
2542 /* Called from relax_section to rebuild the PLT in light of potential changes
2543 in the function's status. */
2544
2545 static void
2546 elf64_alpha_size_plt_section (struct bfd_link_info *info)
2547 {
2548 asection *splt, *spltrel, *sgotplt;
2549 unsigned long entries;
2550 struct alpha_elf_link_hash_table * htab;
2551
2552 htab = alpha_elf_hash_table (info);
2553 if (htab == NULL)
2554 return;
2555
2556 splt = elf_hash_table(info)->splt;
2557 if (splt == NULL)
2558 return;
2559
2560 splt->size = 0;
2561
2562 alpha_elf_link_hash_traverse (htab,
2563 elf64_alpha_size_plt_section_1, splt);
2564
2565 /* Every plt entry requires a JMP_SLOT relocation. */
2566 spltrel = elf_hash_table(info)->srelplt;
2567 entries = 0;
2568 if (splt->size)
2569 {
2570 if (elf64_alpha_use_secureplt)
2571 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2572 else
2573 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2574 }
2575 spltrel->size = entries * sizeof (Elf64_External_Rela);
2576
2577 /* When using the secureplt, we need two words somewhere in the data
2578 segment for the dynamic linker to tell us where to go. This is the
2579 entire contents of the .got.plt section. */
2580 if (elf64_alpha_use_secureplt)
2581 {
2582 sgotplt = elf_hash_table(info)->sgotplt;
2583 sgotplt->size = entries ? 16 : 0;
2584 }
2585 }
2586
2587 static bfd_boolean
2588 elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2589 struct bfd_link_info *info)
2590 {
2591 bfd *i;
2592 struct alpha_elf_link_hash_table * htab;
2593
2594 if (bfd_link_relocatable (info))
2595 return TRUE;
2596
2597 htab = alpha_elf_hash_table (info);
2598 if (htab == NULL)
2599 return FALSE;
2600
2601 if (!elf64_alpha_size_got_sections (info, TRUE))
2602 return FALSE;
2603
2604 /* Allocate space for all of the .got subsections. */
2605 i = htab->got_list;
2606 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
2607 {
2608 asection *s = alpha_elf_tdata(i)->got;
2609 if (s->size > 0)
2610 {
2611 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2612 if (s->contents == NULL)
2613 return FALSE;
2614 }
2615 }
2616
2617 return TRUE;
2618 }
2619
2620 /* The number of dynamic relocations required by a static relocation. */
2621
2622 static int
2623 alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
2624 {
2625 switch (r_type)
2626 {
2627 /* May appear in GOT entries. */
2628 case R_ALPHA_TLSGD:
2629 return (dynamic ? 2 : shared ? 1 : 0);
2630 case R_ALPHA_TLSLDM:
2631 return shared;
2632 case R_ALPHA_LITERAL:
2633 return dynamic || shared;
2634 case R_ALPHA_GOTTPREL:
2635 return dynamic || (shared && !pie);
2636 case R_ALPHA_GOTDTPREL:
2637 return dynamic;
2638
2639 /* May appear in data sections. */
2640 case R_ALPHA_REFLONG:
2641 case R_ALPHA_REFQUAD:
2642 return dynamic || shared;
2643 case R_ALPHA_TPREL64:
2644 return dynamic || (shared && !pie);
2645
2646 /* Everything else is illegal. We'll issue an error during
2647 relocate_section. */
2648 default:
2649 return 0;
2650 }
2651 }
2652
2653 /* Work out the sizes of the dynamic relocation entries. */
2654
2655 static bfd_boolean
2656 elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2657 struct bfd_link_info *info)
2658 {
2659 bfd_boolean dynamic;
2660 struct alpha_elf_reloc_entry *relent;
2661 unsigned long entries;
2662
2663 /* If the symbol was defined as a common symbol in a regular object
2664 file, and there was no definition in any dynamic object, then the
2665 linker will have allocated space for the symbol in a common
2666 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2667 set. This is done for dynamic symbols in
2668 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2669 symbols, somehow. */
2670 if (!h->root.def_regular
2671 && h->root.ref_regular
2672 && !h->root.def_dynamic
2673 && (h->root.root.type == bfd_link_hash_defined
2674 || h->root.root.type == bfd_link_hash_defweak)
2675 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2676 h->root.def_regular = 1;
2677
2678 /* If the symbol is dynamic, we'll need all the relocations in their
2679 natural form. If this is a shared object, and it has been forced
2680 local, we'll need the same number of RELATIVE relocations. */
2681 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2682
2683 /* If the symbol is a hidden undefined weak, then we never have any
2684 relocations. Avoid the loop which may want to add RELATIVE relocs
2685 based on bfd_link_pic (info). */
2686 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2687 return TRUE;
2688
2689 for (relent = h->reloc_entries; relent; relent = relent->next)
2690 {
2691 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
2692 bfd_link_pic (info),
2693 bfd_link_pie (info));
2694 if (entries)
2695 {
2696 asection *sec = relent->sec;
2697 relent->srel->size +=
2698 entries * sizeof (Elf64_External_Rela) * relent->count;
2699 if ((sec->flags & SEC_READONLY) != 0)
2700 {
2701 info->flags |= DT_TEXTREL;
2702 info->callbacks->minfo
2703 (_("%pB: dynamic relocation against `%pT' in "
2704 "read-only section `%pA'\n"),
2705 sec->owner, h->root.root.root.string, sec);
2706 }
2707 }
2708 }
2709
2710 return TRUE;
2711 }
2712
2713 /* Subroutine of elf64_alpha_size_rela_got_section for doing the
2714 global symbols. */
2715
2716 static bfd_boolean
2717 elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2718 struct bfd_link_info *info)
2719 {
2720 bfd_boolean dynamic;
2721 struct alpha_elf_got_entry *gotent;
2722 unsigned long entries;
2723
2724 /* If we're using a plt for this symbol, then all of its relocations
2725 for its got entries go into .rela.plt. */
2726 if (h->root.needs_plt)
2727 return TRUE;
2728
2729 /* If the symbol is dynamic, we'll need all the relocations in their
2730 natural form. If this is a shared object, and it has been forced
2731 local, we'll need the same number of RELATIVE relocations. */
2732 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2733
2734 /* If the symbol is a hidden undefined weak, then we never have any
2735 relocations. Avoid the loop which may want to add RELATIVE relocs
2736 based on bfd_link_pic (info). */
2737 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2738 return TRUE;
2739
2740 entries = 0;
2741 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2742 if (gotent->use_count > 0)
2743 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
2744 bfd_link_pic (info),
2745 bfd_link_pie (info));
2746
2747 if (entries > 0)
2748 {
2749 asection *srel = elf_hash_table(info)->srelgot;
2750 BFD_ASSERT (srel != NULL);
2751 srel->size += sizeof (Elf64_External_Rela) * entries;
2752 }
2753
2754 return TRUE;
2755 }
2756
2757 /* Set the sizes of the dynamic relocation sections. */
2758
2759 static void
2760 elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
2761 {
2762 unsigned long entries;
2763 bfd *i;
2764 asection *srel;
2765 struct alpha_elf_link_hash_table * htab;
2766
2767 htab = alpha_elf_hash_table (info);
2768 if (htab == NULL)
2769 return;
2770
2771 /* Shared libraries often require RELATIVE relocs, and some relocs
2772 require attention for the main application as well. */
2773
2774 entries = 0;
2775 for (i = htab->got_list;
2776 i ; i = alpha_elf_tdata(i)->got_link_next)
2777 {
2778 bfd *j;
2779
2780 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2781 {
2782 struct alpha_elf_got_entry **local_got_entries, *gotent;
2783 int k, n;
2784
2785 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2786 if (!local_got_entries)
2787 continue;
2788
2789 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2790 for (gotent = local_got_entries[k];
2791 gotent ; gotent = gotent->next)
2792 if (gotent->use_count > 0)
2793 entries += (alpha_dynamic_entries_for_reloc
2794 (gotent->reloc_type, 0, bfd_link_pic (info),
2795 bfd_link_pie (info)));
2796 }
2797 }
2798
2799 srel = elf_hash_table(info)->srelgot;
2800 if (!srel)
2801 {
2802 BFD_ASSERT (entries == 0);
2803 return;
2804 }
2805 srel->size = sizeof (Elf64_External_Rela) * entries;
2806
2807 /* Now do the non-local symbols. */
2808 alpha_elf_link_hash_traverse (htab,
2809 elf64_alpha_size_rela_got_1, info);
2810 }
2811
2812 /* Set the sizes of the dynamic sections. */
2813
2814 static bfd_boolean
2815 elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2816 struct bfd_link_info *info)
2817 {
2818 bfd *dynobj;
2819 asection *s;
2820 bfd_boolean relplt, relocs;
2821 struct alpha_elf_link_hash_table * htab;
2822
2823 htab = alpha_elf_hash_table (info);
2824 if (htab == NULL)
2825 return FALSE;
2826
2827 dynobj = elf_hash_table(info)->dynobj;
2828 BFD_ASSERT(dynobj != NULL);
2829
2830 if (elf_hash_table (info)->dynamic_sections_created)
2831 {
2832 /* Set the contents of the .interp section to the interpreter. */
2833 if (bfd_link_executable (info) && !info->nointerp)
2834 {
2835 s = bfd_get_linker_section (dynobj, ".interp");
2836 BFD_ASSERT (s != NULL);
2837 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2838 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2839 }
2840
2841 /* Now that we've seen all of the input files, we can decide which
2842 symbols need dynamic relocation entries and which don't. We've
2843 collected information in check_relocs that we can now apply to
2844 size the dynamic relocation sections. */
2845 alpha_elf_link_hash_traverse (htab,
2846 elf64_alpha_calc_dynrel_sizes, info);
2847
2848 elf64_alpha_size_rela_got_section (info);
2849 elf64_alpha_size_plt_section (info);
2850 }
2851 /* else we're not dynamic and by definition we don't need such things. */
2852
2853 /* The check_relocs and adjust_dynamic_symbol entry points have
2854 determined the sizes of the various dynamic sections. Allocate
2855 memory for them. */
2856 relplt = FALSE;
2857 relocs = FALSE;
2858 for (s = dynobj->sections; s != NULL; s = s->next)
2859 {
2860 const char *name;
2861
2862 if (!(s->flags & SEC_LINKER_CREATED))
2863 continue;
2864
2865 /* It's OK to base decisions on the section name, because none
2866 of the dynobj section names depend upon the input files. */
2867 name = bfd_section_name (s);
2868
2869 if (CONST_STRNEQ (name, ".rela"))
2870 {
2871 if (s->size != 0)
2872 {
2873 if (strcmp (name, ".rela.plt") == 0)
2874 relplt = TRUE;
2875 else
2876 relocs = TRUE;
2877
2878 /* We use the reloc_count field as a counter if we need
2879 to copy relocs into the output file. */
2880 s->reloc_count = 0;
2881 }
2882 }
2883 else if (! CONST_STRNEQ (name, ".got")
2884 && strcmp (name, ".plt") != 0
2885 && strcmp (name, ".dynbss") != 0)
2886 {
2887 /* It's not one of our dynamic sections, so don't allocate space. */
2888 continue;
2889 }
2890
2891 if (s->size == 0)
2892 {
2893 /* If we don't need this section, strip it from the output file.
2894 This is to handle .rela.bss and .rela.plt. We must create it
2895 in create_dynamic_sections, because it must be created before
2896 the linker maps input sections to output sections. The
2897 linker does that before adjust_dynamic_symbol is called, and
2898 it is that function which decides whether anything needs to
2899 go into these sections. */
2900 if (!CONST_STRNEQ (name, ".got"))
2901 s->flags |= SEC_EXCLUDE;
2902 }
2903 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
2904 {
2905 /* Allocate memory for the section contents. */
2906 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2907 if (s->contents == NULL)
2908 return FALSE;
2909 }
2910 }
2911
2912 if (elf_hash_table (info)->dynamic_sections_created)
2913 {
2914 /* Add some entries to the .dynamic section. We fill in the
2915 values later, in elf64_alpha_finish_dynamic_sections, but we
2916 must add the entries now so that we get the correct size for
2917 the .dynamic section. The DT_DEBUG entry is filled in by the
2918 dynamic linker and used by the debugger. */
2919 #define add_dynamic_entry(TAG, VAL) \
2920 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2921
2922 if (bfd_link_executable (info))
2923 {
2924 if (!add_dynamic_entry (DT_DEBUG, 0))
2925 return FALSE;
2926 }
2927
2928 if (relplt)
2929 {
2930 if (!add_dynamic_entry (DT_PLTGOT, 0)
2931 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2932 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2933 || !add_dynamic_entry (DT_JMPREL, 0))
2934 return FALSE;
2935
2936 if (elf64_alpha_use_secureplt
2937 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2938 return FALSE;
2939 }
2940
2941 if (relocs)
2942 {
2943 if (!add_dynamic_entry (DT_RELA, 0)
2944 || !add_dynamic_entry (DT_RELASZ, 0)
2945 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2946 return FALSE;
2947
2948 if (info->flags & DF_TEXTREL)
2949 {
2950 if (!add_dynamic_entry (DT_TEXTREL, 0))
2951 return FALSE;
2952 }
2953 }
2954 }
2955 #undef add_dynamic_entry
2956
2957 return TRUE;
2958 }
2959 \f
2960 /* These functions do relaxation for Alpha ELF.
2961
2962 Currently I'm only handling what I can do with existing compiler
2963 and assembler support, which means no instructions are removed,
2964 though some may be nopped. At this time GCC does not emit enough
2965 information to do all of the relaxing that is possible. It will
2966 take some not small amount of work for that to happen.
2967
2968 There are a couple of interesting papers that I once read on this
2969 subject, that I cannot find references to at the moment, that
2970 related to Alpha in particular. They are by David Wall, then of
2971 DEC WRL. */
2972
2973 struct alpha_relax_info
2974 {
2975 bfd *abfd;
2976 asection *sec;
2977 bfd_byte *contents;
2978 Elf_Internal_Shdr *symtab_hdr;
2979 Elf_Internal_Rela *relocs, *relend;
2980 struct bfd_link_info *link_info;
2981 bfd_vma gp;
2982 bfd *gotobj;
2983 asection *tsec;
2984 struct alpha_elf_link_hash_entry *h;
2985 struct alpha_elf_got_entry **first_gotent;
2986 struct alpha_elf_got_entry *gotent;
2987 bfd_boolean changed_contents;
2988 bfd_boolean changed_relocs;
2989 unsigned char other;
2990 };
2991
2992 static Elf_Internal_Rela *
2993 elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2994 Elf_Internal_Rela *relend,
2995 bfd_vma offset, int type)
2996 {
2997 while (rel < relend)
2998 {
2999 if (rel->r_offset == offset
3000 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3001 return rel;
3002 ++rel;
3003 }
3004 return NULL;
3005 }
3006
3007 static bfd_boolean
3008 elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3009 Elf_Internal_Rela *irel, unsigned long r_type)
3010 {
3011 unsigned int insn;
3012 bfd_signed_vma disp;
3013
3014 /* Get the instruction. */
3015 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
3016
3017 if (insn >> 26 != OP_LDQ)
3018 {
3019 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
3020 _bfd_error_handler
3021 /* xgettext:c-format */
3022 (_("%pB: %pA+%#" PRIx64 ": warning: "
3023 "%s relocation against unexpected insn"),
3024 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
3025 return TRUE;
3026 }
3027
3028 /* Can't relax dynamic symbols. */
3029 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3030 return TRUE;
3031
3032 /* Can't use local-exec relocations in shared libraries. */
3033 if (r_type == R_ALPHA_GOTTPREL
3034 && bfd_link_dll (info->link_info))
3035 return TRUE;
3036
3037 if (r_type == R_ALPHA_LITERAL)
3038 {
3039 /* Look for nice constant addresses. This includes the not-uncommon
3040 special case of 0 for undefweak symbols. */
3041 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3042 || (!bfd_link_pic (info->link_info)
3043 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3044 {
3045 disp = 0;
3046 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3047 insn |= (symval & 0xffff);
3048 r_type = R_ALPHA_NONE;
3049 }
3050 else
3051 {
3052 /* We may only create GPREL relocs during the second pass. */
3053 if (info->link_info->relax_pass == 0)
3054 return TRUE;
3055
3056 disp = symval - info->gp;
3057 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3058 r_type = R_ALPHA_GPREL16;
3059 }
3060 }
3061 else
3062 {
3063 bfd_vma dtp_base, tp_base;
3064
3065 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3066 dtp_base = alpha_get_dtprel_base (info->link_info);
3067 tp_base = alpha_get_tprel_base (info->link_info);
3068 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
3069
3070 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3071
3072 switch (r_type)
3073 {
3074 case R_ALPHA_GOTDTPREL:
3075 r_type = R_ALPHA_DTPREL16;
3076 break;
3077 case R_ALPHA_GOTTPREL:
3078 r_type = R_ALPHA_TPREL16;
3079 break;
3080 default:
3081 BFD_ASSERT (0);
3082 return FALSE;
3083 }
3084 }
3085
3086 if (disp < -0x8000 || disp >= 0x8000)
3087 return TRUE;
3088
3089 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3090 info->changed_contents = TRUE;
3091
3092 /* Reduce the use count on this got entry by one, possibly
3093 eliminating it. */
3094 if (--info->gotent->use_count == 0)
3095 {
3096 int sz = alpha_got_entry_size (r_type);
3097 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3098 if (!info->h)
3099 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3100 }
3101
3102 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3103 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3104 info->changed_relocs = TRUE;
3105
3106 /* ??? Search forward through this basic block looking for insns
3107 that use the target register. Stop after an insn modifying the
3108 register is seen, or after a branch or call.
3109
3110 Any such memory load insn may be substituted by a load directly
3111 off the GP. This allows the memory load insn to be issued before
3112 the calculated GP register would otherwise be ready.
3113
3114 Any such jsr insn can be replaced by a bsr if it is in range.
3115
3116 This would mean that we'd have to _add_ relocations, the pain of
3117 which gives one pause. */
3118
3119 return TRUE;
3120 }
3121
3122 static bfd_vma
3123 elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
3124 {
3125 /* If the function has the same gp, and we can identify that the
3126 function does not use its function pointer, we can eliminate the
3127 address load. */
3128
3129 /* If the symbol is marked NOPV, we are being told the function never
3130 needs its procedure value. */
3131 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3132 return symval;
3133
3134 /* If the symbol is marked STD_GP, we are being told the function does
3135 a normal ldgp in the first two words. */
3136 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3137 ;
3138
3139 /* Otherwise, we may be able to identify a GP load in the first two
3140 words, which we can then skip. */
3141 else
3142 {
3143 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3144 bfd_vma ofs;
3145
3146 /* Load the relocations from the section that the target symbol is in. */
3147 if (info->sec == info->tsec)
3148 {
3149 tsec_relocs = info->relocs;
3150 tsec_relend = info->relend;
3151 tsec_free = NULL;
3152 }
3153 else
3154 {
3155 tsec_relocs = (_bfd_elf_link_read_relocs
3156 (info->abfd, info->tsec, NULL,
3157 (Elf_Internal_Rela *) NULL,
3158 info->link_info->keep_memory));
3159 if (tsec_relocs == NULL)
3160 return 0;
3161 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3162 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3163 ? NULL
3164 : tsec_relocs);
3165 }
3166
3167 /* Recover the symbol's offset within the section. */
3168 ofs = (symval - info->tsec->output_section->vma
3169 - info->tsec->output_offset);
3170
3171 /* Look for a GPDISP reloc. */
3172 gpdisp = (elf64_alpha_find_reloc_at_ofs
3173 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
3174
3175 if (!gpdisp || gpdisp->r_addend != 4)
3176 {
3177 free (tsec_free);
3178 return 0;
3179 }
3180 free (tsec_free);
3181 }
3182
3183 /* We've now determined that we can skip an initial gp load. Verify
3184 that the call and the target use the same gp. */
3185 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
3186 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3187 return 0;
3188
3189 return symval + 8;
3190 }
3191
3192 static bfd_boolean
3193 elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3194 bfd_vma symval, Elf_Internal_Rela *irel)
3195 {
3196 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3197 int flags;
3198 bfd_signed_vma disp;
3199 bfd_boolean fits16;
3200 bfd_boolean fits32;
3201 bfd_boolean lit_reused = FALSE;
3202 bfd_boolean all_optimized = TRUE;
3203 bfd_boolean changed_contents;
3204 bfd_boolean changed_relocs;
3205 bfd_byte *contents = info->contents;
3206 bfd *abfd = info->abfd;
3207 bfd_vma sec_output_vma;
3208 unsigned int lit_insn;
3209 int relax_pass;
3210
3211 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
3212 if (lit_insn >> 26 != OP_LDQ)
3213 {
3214 _bfd_error_handler
3215 /* xgettext:c-format */
3216 (_("%pB: %pA+%#" PRIx64 ": warning: "
3217 "%s relocation against unexpected insn"),
3218 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
3219 return TRUE;
3220 }
3221
3222 /* Can't relax dynamic symbols. */
3223 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3224 return TRUE;
3225
3226 changed_contents = info->changed_contents;
3227 changed_relocs = info->changed_relocs;
3228 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3229 relax_pass = info->link_info->relax_pass;
3230
3231 /* Summarize how this particular LITERAL is used. */
3232 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
3233 {
3234 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
3235 break;
3236 if (erel->r_addend <= 6)
3237 flags |= 1 << erel->r_addend;
3238 }
3239
3240 /* A little preparation for the loop... */
3241 disp = symval - info->gp;
3242
3243 for (urel = irel+1; urel < erel; ++urel)
3244 {
3245 bfd_vma urel_r_offset = urel->r_offset;
3246 unsigned int insn;
3247 int insn_disp;
3248 bfd_signed_vma xdisp;
3249 Elf_Internal_Rela nrel;
3250
3251 insn = bfd_get_32 (abfd, contents + urel_r_offset);
3252
3253 switch (urel->r_addend)
3254 {
3255 case LITUSE_ALPHA_ADDR:
3256 default:
3257 /* This type is really just a placeholder to note that all
3258 uses cannot be optimized, but to still allow some. */
3259 all_optimized = FALSE;
3260 break;
3261
3262 case LITUSE_ALPHA_BASE:
3263 /* We may only create GPREL relocs during the second pass. */
3264 if (relax_pass == 0)
3265 {
3266 all_optimized = FALSE;
3267 break;
3268 }
3269
3270 /* We can always optimize 16-bit displacements. */
3271
3272 /* Extract the displacement from the instruction, sign-extending
3273 it if necessary, then test whether it is within 16 or 32 bits
3274 displacement from GP. */
3275 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3276
3277 xdisp = disp + insn_disp;
3278 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3279 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3280 && xdisp < 0x7fff8000);
3281
3282 if (fits16)
3283 {
3284 /* Take the op code and dest from this insn, take the base
3285 register from the literal insn. Leave the offset alone. */
3286 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
3287 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3288 changed_contents = TRUE;
3289
3290 nrel = *urel;
3291 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3292 R_ALPHA_GPREL16);
3293 nrel.r_addend = irel->r_addend;
3294
3295 /* As we adjust, move the reloc to the end so that we don't
3296 break the LITERAL+LITUSE chain. */
3297 if (urel < --erel)
3298 *urel-- = *erel;
3299 *erel = nrel;
3300 changed_relocs = TRUE;
3301 }
3302
3303 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3304 else if (fits32 && !(flags & ~6))
3305 {
3306 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
3307
3308 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3309 R_ALPHA_GPRELHIGH);
3310 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
3311 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
3312 lit_reused = TRUE;
3313 changed_contents = TRUE;
3314
3315 /* Since all relocs must be optimized, don't bother swapping
3316 this relocation to the end. */
3317 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3318 R_ALPHA_GPRELLOW);
3319 urel->r_addend = irel->r_addend;
3320 changed_relocs = TRUE;
3321 }
3322 else
3323 all_optimized = FALSE;
3324 break;
3325
3326 case LITUSE_ALPHA_BYTOFF:
3327 /* We can always optimize byte instructions. */
3328
3329 /* FIXME: sanity check the insn for byte op. Check that the
3330 literal dest reg is indeed Rb in the byte insn. */
3331
3332 insn &= ~ (unsigned) 0x001ff000;
3333 insn |= ((symval & 7) << 13) | 0x1000;
3334 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3335 changed_contents = TRUE;
3336
3337 nrel = *urel;
3338 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3339 nrel.r_addend = 0;
3340
3341 /* As we adjust, move the reloc to the end so that we don't
3342 break the LITERAL+LITUSE chain. */
3343 if (urel < --erel)
3344 *urel-- = *erel;
3345 *erel = nrel;
3346 changed_relocs = TRUE;
3347 break;
3348
3349 case LITUSE_ALPHA_JSR:
3350 case LITUSE_ALPHA_TLSGD:
3351 case LITUSE_ALPHA_TLSLDM:
3352 case LITUSE_ALPHA_JSRDIRECT:
3353 {
3354 bfd_vma optdest, org;
3355 bfd_signed_vma odisp;
3356
3357 /* For undefined weak symbols, we're mostly interested in getting
3358 rid of the got entry whenever possible, so optimize this to a
3359 use of the zero register. */
3360 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3361 {
3362 insn |= 31 << 16;
3363 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3364
3365 changed_contents = TRUE;
3366 break;
3367 }
3368
3369 /* If not zero, place to jump without needing pv. */
3370 optdest = elf64_alpha_relax_opt_call (info, symval);
3371 org = sec_output_vma + urel_r_offset + 4;
3372 odisp = (optdest ? optdest : symval) - org;
3373
3374 if (odisp >= -0x400000 && odisp < 0x400000)
3375 {
3376 Elf_Internal_Rela *xrel;
3377
3378 /* Preserve branch prediction call stack when possible. */
3379 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3380 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3381 else
3382 insn = (OP_BR << 26) | (insn & 0x03e00000);
3383 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3384 changed_contents = TRUE;
3385
3386 nrel = *urel;
3387 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3388 R_ALPHA_BRADDR);
3389 nrel.r_addend = irel->r_addend;
3390
3391 if (optdest)
3392 nrel.r_addend += optdest - symval;
3393 else
3394 all_optimized = FALSE;
3395
3396 /* Kill any HINT reloc that might exist for this insn. */
3397 xrel = (elf64_alpha_find_reloc_at_ofs
3398 (info->relocs, info->relend, urel_r_offset,
3399 R_ALPHA_HINT));
3400 if (xrel)
3401 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3402
3403 /* As we adjust, move the reloc to the end so that we don't
3404 break the LITERAL+LITUSE chain. */
3405 if (urel < --erel)
3406 *urel-- = *erel;
3407 *erel = nrel;
3408
3409 info->changed_relocs = TRUE;
3410 }
3411 else
3412 all_optimized = FALSE;
3413
3414 /* Even if the target is not in range for a direct branch,
3415 if we share a GP, we can eliminate the gp reload. */
3416 if (optdest)
3417 {
3418 Elf_Internal_Rela *gpdisp
3419 = (elf64_alpha_find_reloc_at_ofs
3420 (info->relocs, irelend, urel_r_offset + 4,
3421 R_ALPHA_GPDISP));
3422 if (gpdisp)
3423 {
3424 bfd_byte *p_ldah = contents + gpdisp->r_offset;
3425 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
3426 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3427 unsigned int lda = bfd_get_32 (abfd, p_lda);
3428
3429 /* Verify that the instruction is "ldah $29,0($26)".
3430 Consider a function that ends in a noreturn call,
3431 and that the next function begins with an ldgp,
3432 and that by accident there is no padding between.
3433 In that case the insn would use $27 as the base. */
3434 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3435 {
3436 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3437 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
3438
3439 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3440 changed_contents = TRUE;
3441 changed_relocs = TRUE;
3442 }
3443 }
3444 }
3445 }
3446 break;
3447 }
3448 }
3449
3450 /* If we reused the literal instruction, we must have optimized all. */
3451 BFD_ASSERT(!lit_reused || all_optimized);
3452
3453 /* If all cases were optimized, we can reduce the use count on this
3454 got entry by one, possibly eliminating it. */
3455 if (all_optimized)
3456 {
3457 if (--info->gotent->use_count == 0)
3458 {
3459 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3460 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3461 if (!info->h)
3462 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3463 }
3464
3465 /* If the literal instruction is no longer needed (it may have been
3466 reused. We can eliminate it. */
3467 /* ??? For now, I don't want to deal with compacting the section,
3468 so just nop it out. */
3469 if (!lit_reused)
3470 {
3471 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3472 changed_relocs = TRUE;
3473
3474 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3475 changed_contents = TRUE;
3476 }
3477 }
3478
3479 info->changed_contents = changed_contents;
3480 info->changed_relocs = changed_relocs;
3481
3482 if (all_optimized || relax_pass == 0)
3483 return TRUE;
3484 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
3485 }
3486
3487 static bfd_boolean
3488 elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3489 Elf_Internal_Rela *irel, bfd_boolean is_gd)
3490 {
3491 bfd_byte *pos[5];
3492 unsigned int insn, tlsgd_reg;
3493 Elf_Internal_Rela *gpdisp, *hint;
3494 bfd_boolean dynamic, use_gottprel;
3495 unsigned long new_symndx;
3496
3497 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
3498
3499 /* If a TLS symbol is accessed using IE at least once, there is no point
3500 to use dynamic model for it. */
3501 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3502 ;
3503
3504 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3505 then we might as well relax to IE. */
3506 else if (bfd_link_pic (info->link_info) && !dynamic
3507 && (info->link_info->flags & DF_STATIC_TLS))
3508 ;
3509
3510 /* Otherwise we must be building an executable to do anything. */
3511 else if (bfd_link_pic (info->link_info))
3512 return TRUE;
3513
3514 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3515 the matching LITUSE_TLS relocations. */
3516 if (irel + 2 >= info->relend)
3517 return TRUE;
3518 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3519 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3520 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3521 return TRUE;
3522
3523 /* There must be a GPDISP relocation positioned immediately after the
3524 LITUSE relocation. */
3525 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3526 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3527 if (!gpdisp)
3528 return TRUE;
3529
3530 pos[0] = info->contents + irel[0].r_offset;
3531 pos[1] = info->contents + irel[1].r_offset;
3532 pos[2] = info->contents + irel[2].r_offset;
3533 pos[3] = info->contents + gpdisp->r_offset;
3534 pos[4] = pos[3] + gpdisp->r_addend;
3535
3536 /* Beware of the compiler hoisting part of the sequence out a loop
3537 and adjusting the destination register for the TLSGD insn. If this
3538 happens, there will be a move into $16 before the JSR insn, so only
3539 transformations of the first insn pair should use this register. */
3540 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3541 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3542
3543 /* Generally, the positions are not allowed to be out of order, lest the
3544 modified insn sequence have different register lifetimes. We can make
3545 an exception when pos 1 is adjacent to pos 0. */
3546 if (pos[1] + 4 == pos[0])
3547 {
3548 bfd_byte *tmp = pos[0];
3549 pos[0] = pos[1];
3550 pos[1] = tmp;
3551 }
3552 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3553 return TRUE;
3554
3555 /* Reduce the use count on the LITERAL relocation. Do this before we
3556 smash the symndx when we adjust the relocations below. */
3557 {
3558 struct alpha_elf_got_entry *lit_gotent;
3559 struct alpha_elf_link_hash_entry *lit_h;
3560 unsigned long indx;
3561
3562 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3563 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3564 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
3565
3566 while (lit_h->root.root.type == bfd_link_hash_indirect
3567 || lit_h->root.root.type == bfd_link_hash_warning)
3568 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
3569
3570 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3571 lit_gotent = lit_gotent->next)
3572 if (lit_gotent->gotobj == info->gotobj
3573 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3574 && lit_gotent->addend == irel[1].r_addend)
3575 break;
3576 BFD_ASSERT (lit_gotent);
3577
3578 if (--lit_gotent->use_count == 0)
3579 {
3580 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3581 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3582 }
3583 }
3584
3585 /* Change
3586
3587 lda $16,x($gp) !tlsgd!1
3588 ldq $27,__tls_get_addr($gp) !literal!1
3589 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3590 ldah $29,0($26) !gpdisp!2
3591 lda $29,0($29) !gpdisp!2
3592 to
3593 ldq $16,x($gp) !gottprel
3594 unop
3595 call_pal rduniq
3596 addq $16,$0,$0
3597 unop
3598 or the first pair to
3599 lda $16,x($gp) !tprel
3600 unop
3601 or
3602 ldah $16,x($gp) !tprelhi
3603 lda $16,x($16) !tprello
3604
3605 as appropriate. */
3606
3607 use_gottprel = FALSE;
3608 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
3609
3610 /* Some compilers warn about a Boolean-looking expression being
3611 used in a switch. The explicit cast silences them. */
3612 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
3613 {
3614 case 1:
3615 {
3616 bfd_vma tp_base;
3617 bfd_signed_vma disp;
3618
3619 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3620 tp_base = alpha_get_tprel_base (info->link_info);
3621 disp = symval - tp_base;
3622
3623 if (disp >= -0x8000 && disp < 0x8000)
3624 {
3625 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
3626 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3627 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3628
3629 irel[0].r_offset = pos[0] - info->contents;
3630 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3631 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3632 break;
3633 }
3634 else if (disp >= -(bfd_signed_vma) 0x80000000
3635 && disp < (bfd_signed_vma) 0x7fff8000
3636 && pos[0] + 4 == pos[1])
3637 {
3638 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
3639 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3640 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
3641 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3642
3643 irel[0].r_offset = pos[0] - info->contents;
3644 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3645 irel[1].r_offset = pos[1] - info->contents;
3646 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3647 break;
3648 }
3649 }
3650 /* FALLTHRU */
3651
3652 default:
3653 use_gottprel = TRUE;
3654
3655 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
3656 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3657 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3658
3659 irel[0].r_offset = pos[0] - info->contents;
3660 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3661 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3662 break;
3663 }
3664
3665 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
3666
3667 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3668 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3669
3670 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
3671
3672 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3673 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3674
3675 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3676 irel[2].r_offset, R_ALPHA_HINT);
3677 if (hint)
3678 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3679
3680 info->changed_contents = TRUE;
3681 info->changed_relocs = TRUE;
3682
3683 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3684 if (--info->gotent->use_count == 0)
3685 {
3686 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3687 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3688 if (!info->h)
3689 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3690 }
3691
3692 /* If we've switched to a GOTTPREL relocation, increment the reference
3693 count on that got entry. */
3694 if (use_gottprel)
3695 {
3696 struct alpha_elf_got_entry *tprel_gotent;
3697
3698 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3699 tprel_gotent = tprel_gotent->next)
3700 if (tprel_gotent->gotobj == info->gotobj
3701 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3702 && tprel_gotent->addend == irel->r_addend)
3703 break;
3704 if (tprel_gotent)
3705 tprel_gotent->use_count++;
3706 else
3707 {
3708 if (info->gotent->use_count == 0)
3709 tprel_gotent = info->gotent;
3710 else
3711 {
3712 tprel_gotent = (struct alpha_elf_got_entry *)
3713 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3714 if (!tprel_gotent)
3715 return FALSE;
3716
3717 tprel_gotent->next = *info->first_gotent;
3718 *info->first_gotent = tprel_gotent;
3719
3720 tprel_gotent->gotobj = info->gotobj;
3721 tprel_gotent->addend = irel->r_addend;
3722 tprel_gotent->got_offset = -1;
3723 tprel_gotent->reloc_done = 0;
3724 tprel_gotent->reloc_xlated = 0;
3725 }
3726
3727 tprel_gotent->use_count = 1;
3728 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3729 }
3730 }
3731
3732 return TRUE;
3733 }
3734
3735 static bfd_boolean
3736 elf64_alpha_relax_section (bfd *abfd, asection *sec,
3737 struct bfd_link_info *link_info, bfd_boolean *again)
3738 {
3739 Elf_Internal_Shdr *symtab_hdr;
3740 Elf_Internal_Rela *internal_relocs;
3741 Elf_Internal_Rela *irel, *irelend;
3742 Elf_Internal_Sym *isymbuf = NULL;
3743 struct alpha_elf_got_entry **local_got_entries;
3744 struct alpha_relax_info info;
3745 struct alpha_elf_link_hash_table * htab;
3746 int relax_pass;
3747
3748 htab = alpha_elf_hash_table (link_info);
3749 if (htab == NULL)
3750 return FALSE;
3751
3752 /* There's nothing to change, yet. */
3753 *again = FALSE;
3754
3755 if (bfd_link_relocatable (link_info)
3756 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3757 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3758 || sec->reloc_count == 0)
3759 return TRUE;
3760
3761 BFD_ASSERT (is_alpha_elf (abfd));
3762 relax_pass = link_info->relax_pass;
3763
3764 /* Make sure our GOT and PLT tables are up-to-date. */
3765 if (htab->relax_trip != link_info->relax_trip)
3766 {
3767 htab->relax_trip = link_info->relax_trip;
3768
3769 /* This should never fail after the initial round, since the only error
3770 is GOT overflow, and relaxation only shrinks the table. However, we
3771 may only merge got sections during the first pass. If we merge
3772 sections after we've created GPREL relocs, the GP for the merged
3773 section backs up which may put the relocs out of range. */
3774 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
3775 abort ();
3776 if (elf_hash_table (link_info)->dynamic_sections_created)
3777 {
3778 elf64_alpha_size_plt_section (link_info);
3779 elf64_alpha_size_rela_got_section (link_info);
3780 }
3781 }
3782
3783 symtab_hdr = &elf_symtab_hdr (abfd);
3784 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
3785
3786 /* Load the relocations for this section. */
3787 internal_relocs = (_bfd_elf_link_read_relocs
3788 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
3789 link_info->keep_memory));
3790 if (internal_relocs == NULL)
3791 return FALSE;
3792
3793 memset(&info, 0, sizeof (info));
3794 info.abfd = abfd;
3795 info.sec = sec;
3796 info.link_info = link_info;
3797 info.symtab_hdr = symtab_hdr;
3798 info.relocs = internal_relocs;
3799 info.relend = irelend = internal_relocs + sec->reloc_count;
3800
3801 /* Find the GP for this object. Do not store the result back via
3802 _bfd_set_gp_value, since this could change again before final. */
3803 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3804 if (info.gotobj)
3805 {
3806 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3807 info.gp = (sgot->output_section->vma
3808 + sgot->output_offset
3809 + 0x8000);
3810 }
3811
3812 /* Get the section contents. */
3813 if (elf_section_data (sec)->this_hdr.contents != NULL)
3814 info.contents = elf_section_data (sec)->this_hdr.contents;
3815 else
3816 {
3817 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3818 goto error_return;
3819 }
3820
3821 for (irel = internal_relocs; irel < irelend; irel++)
3822 {
3823 bfd_vma symval;
3824 struct alpha_elf_got_entry *gotent;
3825 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3826 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3827
3828 /* Early exit for unhandled or unrelaxable relocations. */
3829 if (r_type != R_ALPHA_LITERAL)
3830 {
3831 /* We complete everything except LITERAL in the first pass. */
3832 if (relax_pass != 0)
3833 continue;
3834 if (r_type == R_ALPHA_TLSLDM)
3835 {
3836 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3837 reloc to the STN_UNDEF (0) symbol so that they all match. */
3838 r_symndx = STN_UNDEF;
3839 }
3840 else if (r_type != R_ALPHA_GOTDTPREL
3841 && r_type != R_ALPHA_GOTTPREL
3842 && r_type != R_ALPHA_TLSGD)
3843 continue;
3844 }
3845
3846 /* Get the value of the symbol referred to by the reloc. */
3847 if (r_symndx < symtab_hdr->sh_info)
3848 {
3849 /* A local symbol. */
3850 Elf_Internal_Sym *isym;
3851
3852 /* Read this BFD's local symbols. */
3853 if (isymbuf == NULL)
3854 {
3855 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3856 if (isymbuf == NULL)
3857 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3858 symtab_hdr->sh_info, 0,
3859 NULL, NULL, NULL);
3860 if (isymbuf == NULL)
3861 goto error_return;
3862 }
3863
3864 isym = isymbuf + r_symndx;
3865
3866 /* Given the symbol for a TLSLDM reloc is ignored, this also
3867 means forcing the symbol value to the tp base. */
3868 if (r_type == R_ALPHA_TLSLDM)
3869 {
3870 info.tsec = bfd_abs_section_ptr;
3871 symval = alpha_get_tprel_base (info.link_info);
3872 }
3873 else
3874 {
3875 symval = isym->st_value;
3876 if (isym->st_shndx == SHN_UNDEF)
3877 continue;
3878 else if (isym->st_shndx == SHN_ABS)
3879 info.tsec = bfd_abs_section_ptr;
3880 else if (isym->st_shndx == SHN_COMMON)
3881 info.tsec = bfd_com_section_ptr;
3882 else
3883 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3884 }
3885
3886 info.h = NULL;
3887 info.other = isym->st_other;
3888 if (local_got_entries)
3889 info.first_gotent = &local_got_entries[r_symndx];
3890 else
3891 {
3892 info.first_gotent = &info.gotent;
3893 info.gotent = NULL;
3894 }
3895 }
3896 else
3897 {
3898 unsigned long indx;
3899 struct alpha_elf_link_hash_entry *h;
3900
3901 indx = r_symndx - symtab_hdr->sh_info;
3902 h = alpha_elf_sym_hashes (abfd)[indx];
3903 BFD_ASSERT (h != NULL);
3904
3905 while (h->root.root.type == bfd_link_hash_indirect
3906 || h->root.root.type == bfd_link_hash_warning)
3907 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
3908
3909 /* If the symbol is undefined, we can't do anything with it. */
3910 if (h->root.root.type == bfd_link_hash_undefined)
3911 continue;
3912
3913 /* If the symbol isn't defined in the current module,
3914 again we can't do anything. */
3915 if (h->root.root.type == bfd_link_hash_undefweak)
3916 {
3917 info.tsec = bfd_abs_section_ptr;
3918 symval = 0;
3919 }
3920 else if (!h->root.def_regular)
3921 {
3922 /* Except for TLSGD relocs, which can sometimes be
3923 relaxed to GOTTPREL relocs. */
3924 if (r_type != R_ALPHA_TLSGD)
3925 continue;
3926 info.tsec = bfd_abs_section_ptr;
3927 symval = 0;
3928 }
3929 else
3930 {
3931 info.tsec = h->root.root.u.def.section;
3932 symval = h->root.root.u.def.value;
3933 }
3934
3935 info.h = h;
3936 info.other = h->root.other;
3937 info.first_gotent = &h->got_entries;
3938 }
3939
3940 /* Search for the got entry to be used by this relocation. */
3941 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3942 if (gotent->gotobj == info.gotobj
3943 && gotent->reloc_type == r_type
3944 && gotent->addend == irel->r_addend)
3945 break;
3946 info.gotent = gotent;
3947
3948 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3949 symval += irel->r_addend;
3950
3951 switch (r_type)
3952 {
3953 case R_ALPHA_LITERAL:
3954 BFD_ASSERT(info.gotent != NULL);
3955
3956 /* If there exist LITUSE relocations immediately following, this
3957 opens up all sorts of interesting optimizations, because we
3958 now know every location that this address load is used. */
3959 if (irel+1 < irelend
3960 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
3961 {
3962 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3963 goto error_return;
3964 }
3965 else
3966 {
3967 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3968 goto error_return;
3969 }
3970 break;
3971
3972 case R_ALPHA_GOTDTPREL:
3973 case R_ALPHA_GOTTPREL:
3974 BFD_ASSERT(info.gotent != NULL);
3975 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3976 goto error_return;
3977 break;
3978
3979 case R_ALPHA_TLSGD:
3980 case R_ALPHA_TLSLDM:
3981 BFD_ASSERT(info.gotent != NULL);
3982 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3983 r_type == R_ALPHA_TLSGD))
3984 goto error_return;
3985 break;
3986 }
3987 }
3988
3989 if (isymbuf != NULL
3990 && symtab_hdr->contents != (unsigned char *) isymbuf)
3991 {
3992 if (!link_info->keep_memory)
3993 free (isymbuf);
3994 else
3995 {
3996 /* Cache the symbols for elf_link_input_bfd. */
3997 symtab_hdr->contents = (unsigned char *) isymbuf;
3998 }
3999 }
4000
4001 if (info.contents != NULL
4002 && elf_section_data (sec)->this_hdr.contents != info.contents)
4003 {
4004 if (!info.changed_contents && !link_info->keep_memory)
4005 free (info.contents);
4006 else
4007 {
4008 /* Cache the section contents for elf_link_input_bfd. */
4009 elf_section_data (sec)->this_hdr.contents = info.contents;
4010 }
4011 }
4012
4013 if (elf_section_data (sec)->relocs != internal_relocs)
4014 {
4015 if (!info.changed_relocs)
4016 free (internal_relocs);
4017 else
4018 elf_section_data (sec)->relocs = internal_relocs;
4019 }
4020
4021 *again = info.changed_contents || info.changed_relocs;
4022
4023 return TRUE;
4024
4025 error_return:
4026 if (symtab_hdr->contents != (unsigned char *) isymbuf)
4027 free (isymbuf);
4028 if (elf_section_data (sec)->this_hdr.contents != info.contents)
4029 free (info.contents);
4030 if (elf_section_data (sec)->relocs != internal_relocs)
4031 free (internal_relocs);
4032 return FALSE;
4033 }
4034 \f
4035 /* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4036 into the next available slot in SREL. */
4037
4038 static void
4039 elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4040 asection *sec, asection *srel, bfd_vma offset,
4041 long dynindx, long rtype, bfd_vma addend)
4042 {
4043 Elf_Internal_Rela outrel;
4044 bfd_byte *loc;
4045
4046 BFD_ASSERT (srel != NULL);
4047
4048 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4049 outrel.r_addend = addend;
4050
4051 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4052 if ((offset | 1) != (bfd_vma) -1)
4053 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4054 else
4055 memset (&outrel, 0, sizeof (outrel));
4056
4057 loc = srel->contents;
4058 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4059 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
4060 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
4061 }
4062
4063 /* Relocate an Alpha ELF section for a relocatable link.
4064
4065 We don't have to change anything unless the reloc is against a section
4066 symbol, in which case we have to adjust according to where the section
4067 symbol winds up in the output section. */
4068
4069 static bfd_boolean
4070 elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4071 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4072 bfd *input_bfd, asection *input_section,
4073 bfd_byte *contents ATTRIBUTE_UNUSED,
4074 Elf_Internal_Rela *relocs,
4075 Elf_Internal_Sym *local_syms,
4076 asection **local_sections)
4077 {
4078 unsigned long symtab_hdr_sh_info;
4079 Elf_Internal_Rela *rel;
4080 Elf_Internal_Rela *relend;
4081 struct elf_link_hash_entry **sym_hashes;
4082 bfd_boolean ret_val = TRUE;
4083
4084 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
4085 sym_hashes = elf_sym_hashes (input_bfd);
4086
4087 relend = relocs + input_section->reloc_count;
4088 for (rel = relocs; rel < relend; rel++)
4089 {
4090 unsigned long r_symndx;
4091 Elf_Internal_Sym *sym;
4092 asection *sec;
4093 unsigned long r_type;
4094
4095 r_type = ELF64_R_TYPE (rel->r_info);
4096 if (r_type >= R_ALPHA_max)
4097 {
4098 _bfd_error_handler
4099 /* xgettext:c-format */
4100 (_("%pB: unsupported relocation type %#x"),
4101 input_bfd, (int) r_type);
4102 bfd_set_error (bfd_error_bad_value);
4103 ret_val = FALSE;
4104 continue;
4105 }
4106
4107 /* The symbol associated with GPDISP and LITUSE is
4108 immaterial. Only the addend is significant. */
4109 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4110 continue;
4111
4112 r_symndx = ELF64_R_SYM (rel->r_info);
4113 if (r_symndx < symtab_hdr_sh_info)
4114 {
4115 sym = local_syms + r_symndx;
4116 sec = local_sections[r_symndx];
4117 }
4118 else
4119 {
4120 struct elf_link_hash_entry *h;
4121
4122 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4123
4124 while (h->root.type == bfd_link_hash_indirect
4125 || h->root.type == bfd_link_hash_warning)
4126 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4127
4128 if (h->root.type != bfd_link_hash_defined
4129 && h->root.type != bfd_link_hash_defweak)
4130 continue;
4131
4132 sym = NULL;
4133 sec = h->root.u.def.section;
4134 }
4135
4136 if (sec != NULL && discarded_section (sec))
4137 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4138 rel, 1, relend,
4139 elf64_alpha_howto_table + r_type, 0,
4140 contents);
4141
4142 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4143 rel->r_addend += sec->output_offset;
4144 }
4145
4146 return ret_val;
4147 }
4148
4149 /* Relocate an Alpha ELF section. */
4150
4151 static bfd_boolean
4152 elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4153 bfd *input_bfd, asection *input_section,
4154 bfd_byte *contents, Elf_Internal_Rela *relocs,
4155 Elf_Internal_Sym *local_syms,
4156 asection **local_sections)
4157 {
4158 Elf_Internal_Shdr *symtab_hdr;
4159 Elf_Internal_Rela *rel;
4160 Elf_Internal_Rela *relend;
4161 asection *sgot, *srel, *srelgot;
4162 bfd *dynobj, *gotobj;
4163 bfd_vma gp, tp_base, dtp_base;
4164 struct alpha_elf_got_entry **local_got_entries;
4165 bfd_boolean ret_val;
4166
4167 BFD_ASSERT (is_alpha_elf (input_bfd));
4168
4169 /* Handle relocatable links with a smaller loop. */
4170 if (bfd_link_relocatable (info))
4171 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4172 input_section, contents, relocs,
4173 local_syms, local_sections);
4174
4175 /* This is a final link. */
4176
4177 ret_val = TRUE;
4178
4179 symtab_hdr = &elf_symtab_hdr (input_bfd);
4180
4181 dynobj = elf_hash_table (info)->dynobj;
4182 srelgot = elf_hash_table (info)->srelgot;
4183
4184 if (input_section->flags & SEC_ALLOC)
4185 {
4186 const char *section_name;
4187 section_name = (bfd_elf_string_from_elf_section
4188 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
4189 _bfd_elf_single_rel_hdr (input_section)->sh_name));
4190 BFD_ASSERT(section_name != NULL);
4191 srel = bfd_get_linker_section (dynobj, section_name);
4192 }
4193 else
4194 srel = NULL;
4195
4196 /* Find the gp value for this input bfd. */
4197 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4198 if (gotobj)
4199 {
4200 sgot = alpha_elf_tdata (gotobj)->got;
4201 gp = _bfd_get_gp_value (gotobj);
4202 if (gp == 0)
4203 {
4204 gp = (sgot->output_section->vma
4205 + sgot->output_offset
4206 + 0x8000);
4207 _bfd_set_gp_value (gotobj, gp);
4208 }
4209 }
4210 else
4211 {
4212 sgot = NULL;
4213 gp = 0;
4214 }
4215
4216 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4217
4218 if (elf_hash_table (info)->tls_sec != NULL)
4219 {
4220 dtp_base = alpha_get_dtprel_base (info);
4221 tp_base = alpha_get_tprel_base (info);
4222 }
4223 else
4224 dtp_base = tp_base = 0;
4225
4226 relend = relocs + input_section->reloc_count;
4227 for (rel = relocs; rel < relend; rel++)
4228 {
4229 struct alpha_elf_link_hash_entry *h = NULL;
4230 struct alpha_elf_got_entry *gotent;
4231 bfd_reloc_status_type r;
4232 reloc_howto_type *howto;
4233 unsigned long r_symndx;
4234 Elf_Internal_Sym *sym = NULL;
4235 asection *sec = NULL;
4236 bfd_vma value;
4237 bfd_vma addend;
4238 bfd_boolean dynamic_symbol_p;
4239 bfd_boolean unresolved_reloc = FALSE;
4240 bfd_boolean undef_weak_ref = FALSE;
4241 unsigned long r_type;
4242
4243 r_type = ELF64_R_TYPE(rel->r_info);
4244 if (r_type >= R_ALPHA_max)
4245 {
4246 _bfd_error_handler
4247 /* xgettext:c-format */
4248 (_("%pB: unsupported relocation type %#x"),
4249 input_bfd, (int) r_type);
4250 bfd_set_error (bfd_error_bad_value);
4251 ret_val = FALSE;
4252 continue;
4253 }
4254
4255 howto = elf64_alpha_howto_table + r_type;
4256 r_symndx = ELF64_R_SYM(rel->r_info);
4257
4258 /* The symbol for a TLSLDM reloc is ignored. Collapse the
4259 reloc to the STN_UNDEF (0) symbol so that they all match. */
4260 if (r_type == R_ALPHA_TLSLDM)
4261 r_symndx = STN_UNDEF;
4262
4263 if (r_symndx < symtab_hdr->sh_info)
4264 {
4265 asection *msec;
4266 sym = local_syms + r_symndx;
4267 sec = local_sections[r_symndx];
4268 msec = sec;
4269 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
4270
4271 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
4272 this is hackery from relax_section. Force the value to
4273 be the tls module base. */
4274 if (r_symndx == STN_UNDEF
4275 && (r_type == R_ALPHA_TLSLDM
4276 || r_type == R_ALPHA_GOTTPREL
4277 || r_type == R_ALPHA_TPREL64
4278 || r_type == R_ALPHA_TPRELHI
4279 || r_type == R_ALPHA_TPRELLO
4280 || r_type == R_ALPHA_TPREL16))
4281 value = dtp_base;
4282
4283 if (local_got_entries)
4284 gotent = local_got_entries[r_symndx];
4285 else
4286 gotent = NULL;
4287
4288 /* Need to adjust local GOT entries' addends for SEC_MERGE
4289 unless it has been done already. */
4290 if ((sec->flags & SEC_MERGE)
4291 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
4292 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
4293 && gotent
4294 && !gotent->reloc_xlated)
4295 {
4296 struct alpha_elf_got_entry *ent;
4297
4298 for (ent = gotent; ent; ent = ent->next)
4299 {
4300 ent->reloc_xlated = 1;
4301 if (ent->use_count == 0)
4302 continue;
4303 msec = sec;
4304 ent->addend =
4305 _bfd_merged_section_offset (output_bfd, &msec,
4306 elf_section_data (sec)->
4307 sec_info,
4308 sym->st_value + ent->addend);
4309 ent->addend -= sym->st_value;
4310 ent->addend += msec->output_section->vma
4311 + msec->output_offset
4312 - sec->output_section->vma
4313 - sec->output_offset;
4314 }
4315 }
4316
4317 dynamic_symbol_p = FALSE;
4318 }
4319 else
4320 {
4321 bfd_boolean warned, ignored;
4322 struct elf_link_hash_entry *hh;
4323 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4324
4325 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4326 r_symndx, symtab_hdr, sym_hashes,
4327 hh, sec, value,
4328 unresolved_reloc, warned, ignored);
4329
4330 if (warned)
4331 continue;
4332
4333 if (value == 0
4334 && ! unresolved_reloc
4335 && hh->root.type == bfd_link_hash_undefweak)
4336 undef_weak_ref = TRUE;
4337
4338 h = (struct alpha_elf_link_hash_entry *) hh;
4339 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4340 gotent = h->got_entries;
4341 }
4342
4343 if (sec != NULL && discarded_section (sec))
4344 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4345 rel, 1, relend, howto, 0, contents);
4346
4347 addend = rel->r_addend;
4348 value += addend;
4349
4350 /* Search for the proper got entry. */
4351 for (; gotent ; gotent = gotent->next)
4352 if (gotent->gotobj == gotobj
4353 && gotent->reloc_type == r_type
4354 && gotent->addend == addend)
4355 break;
4356
4357 switch (r_type)
4358 {
4359 case R_ALPHA_GPDISP:
4360 {
4361 bfd_byte *p_ldah, *p_lda;
4362
4363 BFD_ASSERT(gp != 0);
4364
4365 value = (input_section->output_section->vma
4366 + input_section->output_offset
4367 + rel->r_offset);
4368
4369 p_ldah = contents + rel->r_offset;
4370 p_lda = p_ldah + rel->r_addend;
4371
4372 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
4373 p_ldah, p_lda);
4374 }
4375 break;
4376
4377 case R_ALPHA_LITERAL:
4378 BFD_ASSERT(sgot != NULL);
4379 BFD_ASSERT(gp != 0);
4380 BFD_ASSERT(gotent != NULL);
4381 BFD_ASSERT(gotent->use_count >= 1);
4382
4383 if (!gotent->reloc_done)
4384 {
4385 gotent->reloc_done = 1;
4386
4387 bfd_put_64 (output_bfd, value,
4388 sgot->contents + gotent->got_offset);
4389
4390 /* If the symbol has been forced local, output a
4391 RELATIVE reloc, otherwise it will be handled in
4392 finish_dynamic_symbol. */
4393 if (bfd_link_pic (info)
4394 && !dynamic_symbol_p
4395 && !undef_weak_ref)
4396 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4397 gotent->got_offset, 0,
4398 R_ALPHA_RELATIVE, value);
4399 }
4400
4401 value = (sgot->output_section->vma
4402 + sgot->output_offset
4403 + gotent->got_offset);
4404 value -= gp;
4405 goto default_reloc;
4406
4407 case R_ALPHA_GPREL32:
4408 case R_ALPHA_GPREL16:
4409 case R_ALPHA_GPRELLOW:
4410 if (dynamic_symbol_p)
4411 {
4412 _bfd_error_handler
4413 /* xgettext:c-format */
4414 (_("%pB: gp-relative relocation against dynamic symbol %s"),
4415 input_bfd, h->root.root.root.string);
4416 ret_val = FALSE;
4417 }
4418 BFD_ASSERT(gp != 0);
4419 value -= gp;
4420 goto default_reloc;
4421
4422 case R_ALPHA_GPRELHIGH:
4423 if (dynamic_symbol_p)
4424 {
4425 _bfd_error_handler
4426 /* xgettext:c-format */
4427 (_("%pB: gp-relative relocation against dynamic symbol %s"),
4428 input_bfd, h->root.root.root.string);
4429 ret_val = FALSE;
4430 }
4431 BFD_ASSERT(gp != 0);
4432 value -= gp;
4433 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4434 goto default_reloc;
4435
4436 case R_ALPHA_HINT:
4437 /* A call to a dynamic symbol is definitely out of range of
4438 the 16-bit displacement. Don't bother writing anything. */
4439 if (dynamic_symbol_p)
4440 {
4441 r = bfd_reloc_ok;
4442 break;
4443 }
4444 /* The regular PC-relative stuff measures from the start of
4445 the instruction rather than the end. */
4446 value -= 4;
4447 goto default_reloc;
4448
4449 case R_ALPHA_BRADDR:
4450 if (dynamic_symbol_p)
4451 {
4452 _bfd_error_handler
4453 /* xgettext:c-format */
4454 (_("%pB: pc-relative relocation against dynamic symbol %s"),
4455 input_bfd, h->root.root.root.string);
4456 ret_val = FALSE;
4457 }
4458 /* The regular PC-relative stuff measures from the start of
4459 the instruction rather than the end. */
4460 value -= 4;
4461 goto default_reloc;
4462
4463 case R_ALPHA_BRSGP:
4464 {
4465 int other;
4466 const char *name;
4467
4468 /* The regular PC-relative stuff measures from the start of
4469 the instruction rather than the end. */
4470 value -= 4;
4471
4472 /* The source and destination gp must be the same. Note that
4473 the source will always have an assigned gp, since we forced
4474 one in check_relocs, but that the destination may not, as
4475 it might not have had any relocations at all. Also take
4476 care not to crash if H is an undefined symbol. */
4477 if (h != NULL && sec != NULL
4478 && alpha_elf_tdata (sec->owner)->gotobj
4479 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4480 {
4481 _bfd_error_handler
4482 /* xgettext:c-format */
4483 (_("%pB: change in gp: BRSGP %s"),
4484 input_bfd, h->root.root.root.string);
4485 ret_val = FALSE;
4486 }
4487
4488 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4489 if (h != NULL)
4490 other = h->root.other;
4491 else
4492 other = sym->st_other;
4493 switch (other & STO_ALPHA_STD_GPLOAD)
4494 {
4495 case STO_ALPHA_NOPV:
4496 break;
4497 case STO_ALPHA_STD_GPLOAD:
4498 value += 8;
4499 break;
4500 default:
4501 if (h != NULL)
4502 name = h->root.root.root.string;
4503 else
4504 {
4505 name = (bfd_elf_string_from_elf_section
4506 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4507 if (name == NULL)
4508 name = _("<unknown>");
4509 else if (name[0] == 0)
4510 name = bfd_section_name (sec);
4511 }
4512 _bfd_error_handler
4513 /* xgettext:c-format */
4514 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
4515 input_bfd, name);
4516 ret_val = FALSE;
4517 break;
4518 }
4519
4520 goto default_reloc;
4521 }
4522
4523 case R_ALPHA_REFLONG:
4524 case R_ALPHA_REFQUAD:
4525 case R_ALPHA_DTPREL64:
4526 case R_ALPHA_TPREL64:
4527 {
4528 long dynindx, dyntype = r_type;
4529 bfd_vma dynaddend;
4530
4531 /* Careful here to remember RELATIVE relocations for global
4532 variables for symbolic shared objects. */
4533
4534 if (dynamic_symbol_p)
4535 {
4536 BFD_ASSERT(h->root.dynindx != -1);
4537 dynindx = h->root.dynindx;
4538 dynaddend = addend;
4539 addend = 0, value = 0;
4540 }
4541 else if (r_type == R_ALPHA_DTPREL64)
4542 {
4543 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4544 value -= dtp_base;
4545 goto default_reloc;
4546 }
4547 else if (r_type == R_ALPHA_TPREL64)
4548 {
4549 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4550 if (!bfd_link_dll (info))
4551 {
4552 value -= tp_base;
4553 goto default_reloc;
4554 }
4555 dynindx = 0;
4556 dynaddend = value - dtp_base;
4557 }
4558 else if (bfd_link_pic (info)
4559 && r_symndx != STN_UNDEF
4560 && (input_section->flags & SEC_ALLOC)
4561 && !undef_weak_ref
4562 && !(unresolved_reloc
4563 && (_bfd_elf_section_offset (output_bfd, info,
4564 input_section,
4565 rel->r_offset)
4566 == (bfd_vma) -1)))
4567 {
4568 if (r_type == R_ALPHA_REFLONG)
4569 {
4570 _bfd_error_handler
4571 /* xgettext:c-format */
4572 (_("%pB: unhandled dynamic relocation against %s"),
4573 input_bfd,
4574 h->root.root.root.string);
4575 ret_val = FALSE;
4576 }
4577 dynindx = 0;
4578 dyntype = R_ALPHA_RELATIVE;
4579 dynaddend = value;
4580 }
4581 else
4582 goto default_reloc;
4583
4584 if (input_section->flags & SEC_ALLOC)
4585 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4586 srel, rel->r_offset, dynindx,
4587 dyntype, dynaddend);
4588 }
4589 goto default_reloc;
4590
4591 case R_ALPHA_SREL16:
4592 case R_ALPHA_SREL32:
4593 case R_ALPHA_SREL64:
4594 if (dynamic_symbol_p)
4595 {
4596 _bfd_error_handler
4597 /* xgettext:c-format */
4598 (_("%pB: pc-relative relocation against dynamic symbol %s"),
4599 input_bfd, h->root.root.root.string);
4600 ret_val = FALSE;
4601 }
4602 else if (bfd_link_pic (info)
4603 && undef_weak_ref)
4604 {
4605 _bfd_error_handler
4606 /* xgettext:c-format */
4607 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
4608 input_bfd, h->root.root.root.string);
4609 ret_val = FALSE;
4610 }
4611
4612
4613 /* ??? .eh_frame references to discarded sections will be smashed
4614 to relocations against SHN_UNDEF. The .eh_frame format allows
4615 NULL to be encoded as 0 in any format, so this works here. */
4616 if (r_symndx == STN_UNDEF
4617 || (unresolved_reloc
4618 && _bfd_elf_section_offset (output_bfd, info,
4619 input_section,
4620 rel->r_offset) == (bfd_vma) -1))
4621 howto = (elf64_alpha_howto_table
4622 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4623 goto default_reloc;
4624
4625 case R_ALPHA_TLSLDM:
4626 /* Ignore the symbol for the relocation. The result is always
4627 the current module. */
4628 dynamic_symbol_p = 0;
4629 /* FALLTHRU */
4630
4631 case R_ALPHA_TLSGD:
4632 if (!gotent->reloc_done)
4633 {
4634 gotent->reloc_done = 1;
4635
4636 /* Note that the module index for the main program is 1. */
4637 bfd_put_64 (output_bfd,
4638 !bfd_link_pic (info) && !dynamic_symbol_p,
4639 sgot->contents + gotent->got_offset);
4640
4641 /* If the symbol has been forced local, output a
4642 DTPMOD64 reloc, otherwise it will be handled in
4643 finish_dynamic_symbol. */
4644 if (bfd_link_pic (info) && !dynamic_symbol_p)
4645 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4646 gotent->got_offset, 0,
4647 R_ALPHA_DTPMOD64, 0);
4648
4649 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4650 value = 0;
4651 else
4652 {
4653 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4654 value -= dtp_base;
4655 }
4656 bfd_put_64 (output_bfd, value,
4657 sgot->contents + gotent->got_offset + 8);
4658 }
4659
4660 value = (sgot->output_section->vma
4661 + sgot->output_offset
4662 + gotent->got_offset);
4663 value -= gp;
4664 goto default_reloc;
4665
4666 case R_ALPHA_DTPRELHI:
4667 case R_ALPHA_DTPRELLO:
4668 case R_ALPHA_DTPREL16:
4669 if (dynamic_symbol_p)
4670 {
4671 _bfd_error_handler
4672 /* xgettext:c-format */
4673 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
4674 input_bfd, h->root.root.root.string);
4675 ret_val = FALSE;
4676 }
4677 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4678 value -= dtp_base;
4679 if (r_type == R_ALPHA_DTPRELHI)
4680 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4681 goto default_reloc;
4682
4683 case R_ALPHA_TPRELHI:
4684 case R_ALPHA_TPRELLO:
4685 case R_ALPHA_TPREL16:
4686 if (bfd_link_dll (info))
4687 {
4688 _bfd_error_handler
4689 /* xgettext:c-format */
4690 (_("%pB: TLS local exec code cannot be linked into shared objects"),
4691 input_bfd);
4692 ret_val = FALSE;
4693 }
4694 else if (dynamic_symbol_p)
4695 {
4696 _bfd_error_handler
4697 /* xgettext:c-format */
4698 (_("%pB: tp-relative relocation against dynamic symbol %s"),
4699 input_bfd, h->root.root.root.string);
4700 ret_val = FALSE;
4701 }
4702 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4703 value -= tp_base;
4704 if (r_type == R_ALPHA_TPRELHI)
4705 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4706 goto default_reloc;
4707
4708 case R_ALPHA_GOTDTPREL:
4709 case R_ALPHA_GOTTPREL:
4710 BFD_ASSERT(sgot != NULL);
4711 BFD_ASSERT(gp != 0);
4712 BFD_ASSERT(gotent != NULL);
4713 BFD_ASSERT(gotent->use_count >= 1);
4714
4715 if (!gotent->reloc_done)
4716 {
4717 gotent->reloc_done = 1;
4718
4719 if (dynamic_symbol_p)
4720 value = 0;
4721 else
4722 {
4723 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4724 if (r_type == R_ALPHA_GOTDTPREL)
4725 value -= dtp_base;
4726 else if (bfd_link_executable (info))
4727 value -= tp_base;
4728 else
4729 {
4730 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4731 gotent->got_offset, 0,
4732 R_ALPHA_TPREL64,
4733 value - dtp_base);
4734 value = 0;
4735 }
4736 }
4737 bfd_put_64 (output_bfd, value,
4738 sgot->contents + gotent->got_offset);
4739 }
4740
4741 value = (sgot->output_section->vma
4742 + sgot->output_offset
4743 + gotent->got_offset);
4744 value -= gp;
4745 goto default_reloc;
4746
4747 default:
4748 default_reloc:
4749 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4750 contents, rel->r_offset, value, 0);
4751 break;
4752 }
4753
4754 switch (r)
4755 {
4756 case bfd_reloc_ok:
4757 break;
4758
4759 case bfd_reloc_overflow:
4760 {
4761 const char *name;
4762
4763 /* Don't warn if the overflow is due to pc relative reloc
4764 against discarded section. Section optimization code should
4765 handle it. */
4766
4767 if (r_symndx < symtab_hdr->sh_info
4768 && sec != NULL && howto->pc_relative
4769 && discarded_section (sec))
4770 break;
4771
4772 if (h != NULL)
4773 name = NULL;
4774 else
4775 {
4776 name = (bfd_elf_string_from_elf_section
4777 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4778 if (name == NULL)
4779 return FALSE;
4780 if (*name == '\0')
4781 name = bfd_section_name (sec);
4782 }
4783 (*info->callbacks->reloc_overflow)
4784 (info, (h ? &h->root.root : NULL), name, howto->name,
4785 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4786 }
4787 break;
4788
4789 default:
4790 case bfd_reloc_outofrange:
4791 abort ();
4792 }
4793 }
4794
4795 return ret_val;
4796 }
4797
4798 /* Finish up dynamic symbol handling. We set the contents of various
4799 dynamic sections here. */
4800
4801 static bfd_boolean
4802 elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4803 struct elf_link_hash_entry *h,
4804 Elf_Internal_Sym *sym)
4805 {
4806 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
4807
4808 if (h->needs_plt)
4809 {
4810 /* Fill in the .plt entry for this symbol. */
4811 asection *splt, *sgot, *srel;
4812 Elf_Internal_Rela outrel;
4813 bfd_byte *loc;
4814 bfd_vma got_addr, plt_addr;
4815 bfd_vma plt_index;
4816 struct alpha_elf_got_entry *gotent;
4817
4818 BFD_ASSERT (h->dynindx != -1);
4819
4820 splt = elf_hash_table (info)->splt;
4821 BFD_ASSERT (splt != NULL);
4822 srel = elf_hash_table (info)->srelplt;
4823 BFD_ASSERT (srel != NULL);
4824
4825 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4826 if (gotent->reloc_type == R_ALPHA_LITERAL
4827 && gotent->use_count > 0)
4828 {
4829 unsigned int insn;
4830 int disp;
4831
4832 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4833 BFD_ASSERT (sgot != NULL);
4834
4835 BFD_ASSERT (gotent->got_offset != -1);
4836 BFD_ASSERT (gotent->plt_offset != -1);
4837
4838 got_addr = (sgot->output_section->vma
4839 + sgot->output_offset
4840 + gotent->got_offset);
4841 plt_addr = (splt->output_section->vma
4842 + splt->output_offset
4843 + gotent->plt_offset);
4844
4845 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
4846
4847 /* Fill in the entry in the procedure linkage table. */
4848 if (elf64_alpha_use_secureplt)
4849 {
4850 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4851 insn = INSN_AD (INSN_BR, 31, disp);
4852 bfd_put_32 (output_bfd, insn,
4853 splt->contents + gotent->plt_offset);
4854
4855 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4856 / NEW_PLT_ENTRY_SIZE);
4857 }
4858 else
4859 {
4860 disp = -(gotent->plt_offset + 4);
4861 insn = INSN_AD (INSN_BR, 28, disp);
4862 bfd_put_32 (output_bfd, insn,
4863 splt->contents + gotent->plt_offset);
4864 bfd_put_32 (output_bfd, INSN_UNOP,
4865 splt->contents + gotent->plt_offset + 4);
4866 bfd_put_32 (output_bfd, INSN_UNOP,
4867 splt->contents + gotent->plt_offset + 8);
4868
4869 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4870 / OLD_PLT_ENTRY_SIZE);
4871 }
4872
4873 /* Fill in the entry in the .rela.plt section. */
4874 outrel.r_offset = got_addr;
4875 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4876 outrel.r_addend = 0;
4877
4878 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4879 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
4880
4881 /* Fill in the entry in the .got. */
4882 bfd_put_64 (output_bfd, plt_addr,
4883 sgot->contents + gotent->got_offset);
4884 }
4885 }
4886 else if (alpha_elf_dynamic_symbol_p (h, info))
4887 {
4888 /* Fill in the dynamic relocations for this symbol's .got entries. */
4889 asection *srel;
4890 struct alpha_elf_got_entry *gotent;
4891
4892 srel = elf_hash_table (info)->srelgot;
4893 BFD_ASSERT (srel != NULL);
4894
4895 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4896 gotent != NULL;
4897 gotent = gotent->next)
4898 {
4899 asection *sgot;
4900 long r_type;
4901
4902 if (gotent->use_count == 0)
4903 continue;
4904
4905 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4906
4907 r_type = gotent->reloc_type;
4908 switch (r_type)
4909 {
4910 case R_ALPHA_LITERAL:
4911 r_type = R_ALPHA_GLOB_DAT;
4912 break;
4913 case R_ALPHA_TLSGD:
4914 r_type = R_ALPHA_DTPMOD64;
4915 break;
4916 case R_ALPHA_GOTDTPREL:
4917 r_type = R_ALPHA_DTPREL64;
4918 break;
4919 case R_ALPHA_GOTTPREL:
4920 r_type = R_ALPHA_TPREL64;
4921 break;
4922 case R_ALPHA_TLSLDM:
4923 default:
4924 abort ();
4925 }
4926
4927 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4928 gotent->got_offset, h->dynindx,
4929 r_type, gotent->addend);
4930
4931 if (gotent->reloc_type == R_ALPHA_TLSGD)
4932 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4933 gotent->got_offset + 8, h->dynindx,
4934 R_ALPHA_DTPREL64, gotent->addend);
4935 }
4936 }
4937
4938 /* Mark some specially defined symbols as absolute. */
4939 if (h == elf_hash_table (info)->hdynamic
4940 || h == elf_hash_table (info)->hgot
4941 || h == elf_hash_table (info)->hplt)
4942 sym->st_shndx = SHN_ABS;
4943
4944 return TRUE;
4945 }
4946
4947 /* Finish up the dynamic sections. */
4948
4949 static bfd_boolean
4950 elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4951 struct bfd_link_info *info)
4952 {
4953 bfd *dynobj;
4954 asection *sdyn;
4955
4956 dynobj = elf_hash_table (info)->dynobj;
4957 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
4958
4959 if (elf_hash_table (info)->dynamic_sections_created)
4960 {
4961 asection *splt, *sgotplt, *srelaplt;
4962 Elf64_External_Dyn *dyncon, *dynconend;
4963 bfd_vma plt_vma, gotplt_vma;
4964
4965 splt = elf_hash_table (info)->splt;
4966 srelaplt = elf_hash_table (info)->srelplt;
4967 BFD_ASSERT (splt != NULL && sdyn != NULL);
4968
4969 plt_vma = splt->output_section->vma + splt->output_offset;
4970
4971 gotplt_vma = 0;
4972 if (elf64_alpha_use_secureplt)
4973 {
4974 sgotplt = elf_hash_table (info)->sgotplt;
4975 BFD_ASSERT (sgotplt != NULL);
4976 if (sgotplt->size > 0)
4977 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4978 }
4979
4980 dyncon = (Elf64_External_Dyn *) sdyn->contents;
4981 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
4982 for (; dyncon < dynconend; dyncon++)
4983 {
4984 Elf_Internal_Dyn dyn;
4985
4986 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4987
4988 switch (dyn.d_tag)
4989 {
4990 case DT_PLTGOT:
4991 dyn.d_un.d_ptr
4992 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4993 break;
4994 case DT_PLTRELSZ:
4995 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4996 break;
4997 case DT_JMPREL:
4998 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4999 + srelaplt->output_offset) : 0;
5000 break;
5001 }
5002
5003 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5004 }
5005
5006 /* Initialize the plt header. */
5007 if (splt->size > 0)
5008 {
5009 unsigned int insn;
5010 int ofs;
5011
5012 if (elf64_alpha_use_secureplt)
5013 {
5014 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5015
5016 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5017 bfd_put_32 (output_bfd, insn, splt->contents);
5018
5019 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5020 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5021
5022 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5023 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5024
5025 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5026 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5027
5028 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5029 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5030
5031 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5032 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5033
5034 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5035 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5036
5037 insn = INSN_AB (INSN_JMP, 31, 27);
5038 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5039
5040 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5041 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5042 }
5043 else
5044 {
5045 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5046 bfd_put_32 (output_bfd, insn, splt->contents);
5047
5048 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5049 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5050
5051 insn = INSN_UNOP;
5052 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5053
5054 insn = INSN_AB (INSN_JMP, 27, 27);
5055 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5056
5057 /* The next two words will be filled in by ld.so. */
5058 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5059 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5060 }
5061
5062 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
5063 }
5064 }
5065
5066 return TRUE;
5067 }
5068
5069 /* We need to use a special link routine to handle the .mdebug section.
5070 We need to merge all instances of these sections together, not write
5071 them all out sequentially. */
5072
5073 static bfd_boolean
5074 elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
5075 {
5076 asection *o;
5077 struct bfd_link_order *p;
5078 asection *mdebug_sec;
5079 struct ecoff_debug_info debug;
5080 const struct ecoff_debug_swap *swap
5081 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5082 HDRR *symhdr = &debug.symbolic_header;
5083 void * mdebug_handle = NULL;
5084 struct alpha_elf_link_hash_table * htab;
5085
5086 htab = alpha_elf_hash_table (info);
5087 if (htab == NULL)
5088 return FALSE;
5089
5090 /* Go through the sections and collect the mdebug information. */
5091 mdebug_sec = NULL;
5092 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5093 {
5094 if (strcmp (o->name, ".mdebug") == 0)
5095 {
5096 struct extsym_info einfo;
5097
5098 /* We have found the .mdebug section in the output file.
5099 Look through all the link_orders comprising it and merge
5100 the information together. */
5101 symhdr->magic = swap->sym_magic;
5102 /* FIXME: What should the version stamp be? */
5103 symhdr->vstamp = 0;
5104 symhdr->ilineMax = 0;
5105 symhdr->cbLine = 0;
5106 symhdr->idnMax = 0;
5107 symhdr->ipdMax = 0;
5108 symhdr->isymMax = 0;
5109 symhdr->ioptMax = 0;
5110 symhdr->iauxMax = 0;
5111 symhdr->issMax = 0;
5112 symhdr->issExtMax = 0;
5113 symhdr->ifdMax = 0;
5114 symhdr->crfd = 0;
5115 symhdr->iextMax = 0;
5116
5117 /* We accumulate the debugging information itself in the
5118 debug_info structure. */
5119 debug.line = NULL;
5120 debug.external_dnr = NULL;
5121 debug.external_pdr = NULL;
5122 debug.external_sym = NULL;
5123 debug.external_opt = NULL;
5124 debug.external_aux = NULL;
5125 debug.ss = NULL;
5126 debug.ssext = debug.ssext_end = NULL;
5127 debug.external_fdr = NULL;
5128 debug.external_rfd = NULL;
5129 debug.external_ext = debug.external_ext_end = NULL;
5130
5131 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
5132 if (mdebug_handle == NULL)
5133 return FALSE;
5134
5135 if (1)
5136 {
5137 asection *s;
5138 EXTR esym;
5139 bfd_vma last = 0;
5140 unsigned int i;
5141 static const char * const name[] =
5142 {
5143 ".text", ".init", ".fini", ".data",
5144 ".rodata", ".sdata", ".sbss", ".bss"
5145 };
5146 static const int sc[] = { scText, scInit, scFini, scData,
5147 scRData, scSData, scSBss, scBss };
5148
5149 esym.jmptbl = 0;
5150 esym.cobol_main = 0;
5151 esym.weakext = 0;
5152 esym.reserved = 0;
5153 esym.ifd = ifdNil;
5154 esym.asym.iss = issNil;
5155 esym.asym.st = stLocal;
5156 esym.asym.reserved = 0;
5157 esym.asym.index = indexNil;
5158 for (i = 0; i < 8; i++)
5159 {
5160 esym.asym.sc = sc[i];
5161 s = bfd_get_section_by_name (abfd, name[i]);
5162 if (s != NULL)
5163 {
5164 esym.asym.value = s->vma;
5165 last = s->vma + s->size;
5166 }
5167 else
5168 esym.asym.value = last;
5169
5170 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5171 name[i], &esym))
5172 return FALSE;
5173 }
5174 }
5175
5176 for (p = o->map_head.link_order;
5177 p != (struct bfd_link_order *) NULL;
5178 p = p->next)
5179 {
5180 asection *input_section;
5181 bfd *input_bfd;
5182 const struct ecoff_debug_swap *input_swap;
5183 struct ecoff_debug_info input_debug;
5184 char *eraw_src;
5185 char *eraw_end;
5186
5187 if (p->type != bfd_indirect_link_order)
5188 {
5189 if (p->type == bfd_data_link_order)
5190 continue;
5191 abort ();
5192 }
5193
5194 input_section = p->u.indirect.section;
5195 input_bfd = input_section->owner;
5196
5197 if (! is_alpha_elf (input_bfd))
5198 /* I don't know what a non ALPHA ELF bfd would be
5199 doing with a .mdebug section, but I don't really
5200 want to deal with it. */
5201 continue;
5202
5203 input_swap = (get_elf_backend_data (input_bfd)
5204 ->elf_backend_ecoff_debug_swap);
5205
5206 BFD_ASSERT (p->size == input_section->size);
5207
5208 /* The ECOFF linking code expects that we have already
5209 read in the debugging information and set up an
5210 ecoff_debug_info structure, so we do that now. */
5211 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5212 &input_debug))
5213 return FALSE;
5214
5215 if (! (bfd_ecoff_debug_accumulate
5216 (mdebug_handle, abfd, &debug, swap, input_bfd,
5217 &input_debug, input_swap, info)))
5218 return FALSE;
5219
5220 /* Loop through the external symbols. For each one with
5221 interesting information, try to find the symbol in
5222 the linker global hash table and save the information
5223 for the output external symbols. */
5224 eraw_src = (char *) input_debug.external_ext;
5225 eraw_end = (eraw_src
5226 + (input_debug.symbolic_header.iextMax
5227 * input_swap->external_ext_size));
5228 for (;
5229 eraw_src < eraw_end;
5230 eraw_src += input_swap->external_ext_size)
5231 {
5232 EXTR ext;
5233 const char *name;
5234 struct alpha_elf_link_hash_entry *h;
5235
5236 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
5237 if (ext.asym.sc == scNil
5238 || ext.asym.sc == scUndefined
5239 || ext.asym.sc == scSUndefined)
5240 continue;
5241
5242 name = input_debug.ssext + ext.asym.iss;
5243 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
5244 if (h == NULL || h->esym.ifd != -2)
5245 continue;
5246
5247 if (ext.ifd != -1)
5248 {
5249 BFD_ASSERT (ext.ifd
5250 < input_debug.symbolic_header.ifdMax);
5251 ext.ifd = input_debug.ifdmap[ext.ifd];
5252 }
5253
5254 h->esym = ext;
5255 }
5256
5257 /* Free up the information we just read. */
5258 free (input_debug.line);
5259 free (input_debug.external_dnr);
5260 free (input_debug.external_pdr);
5261 free (input_debug.external_sym);
5262 free (input_debug.external_opt);
5263 free (input_debug.external_aux);
5264 free (input_debug.ss);
5265 free (input_debug.ssext);
5266 free (input_debug.external_fdr);
5267 free (input_debug.external_rfd);
5268 free (input_debug.external_ext);
5269
5270 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5271 elf_link_input_bfd ignores this section. */
5272 input_section->flags &=~ SEC_HAS_CONTENTS;
5273 }
5274
5275 /* Build the external symbol information. */
5276 einfo.abfd = abfd;
5277 einfo.info = info;
5278 einfo.debug = &debug;
5279 einfo.swap = swap;
5280 einfo.failed = FALSE;
5281 elf_link_hash_traverse (elf_hash_table (info),
5282 elf64_alpha_output_extsym,
5283 &einfo);
5284 if (einfo.failed)
5285 return FALSE;
5286
5287 /* Set the size of the .mdebug section. */
5288 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
5289
5290 /* Skip this section later on (I don't think this currently
5291 matters, but someday it might). */
5292 o->map_head.link_order = (struct bfd_link_order *) NULL;
5293
5294 mdebug_sec = o;
5295 }
5296 }
5297
5298 /* Invoke the regular ELF backend linker to do all the work. */
5299 if (! bfd_elf_final_link (abfd, info))
5300 return FALSE;
5301
5302 /* Now write out the computed sections. */
5303
5304 /* The .got subsections... */
5305 {
5306 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
5307 for (i = htab->got_list;
5308 i != NULL;
5309 i = alpha_elf_tdata(i)->got_link_next)
5310 {
5311 asection *sgot;
5312
5313 /* elf_bfd_final_link already did everything in dynobj. */
5314 if (i == dynobj)
5315 continue;
5316
5317 sgot = alpha_elf_tdata(i)->got;
5318 if (! bfd_set_section_contents (abfd, sgot->output_section,
5319 sgot->contents,
5320 (file_ptr) sgot->output_offset,
5321 sgot->size))
5322 return FALSE;
5323 }
5324 }
5325
5326 if (mdebug_sec != (asection *) NULL)
5327 {
5328 BFD_ASSERT (abfd->output_has_begun);
5329 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5330 swap, info,
5331 mdebug_sec->filepos))
5332 return FALSE;
5333
5334 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5335 }
5336
5337 return TRUE;
5338 }
5339
5340 static enum elf_reloc_type_class
5341 elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5342 const asection *rel_sec ATTRIBUTE_UNUSED,
5343 const Elf_Internal_Rela *rela)
5344 {
5345 switch ((int) ELF64_R_TYPE (rela->r_info))
5346 {
5347 case R_ALPHA_RELATIVE:
5348 return reloc_class_relative;
5349 case R_ALPHA_JMP_SLOT:
5350 return reloc_class_plt;
5351 case R_ALPHA_COPY:
5352 return reloc_class_copy;
5353 default:
5354 return reloc_class_normal;
5355 }
5356 }
5357 \f
5358 static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
5359 {
5360 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5361 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5362 { NULL, 0, 0, 0, 0 }
5363 };
5364
5365 /* ECOFF swapping routines. These are used when dealing with the
5366 .mdebug section, which is in the ECOFF debugging format. Copied
5367 from elf32-mips.c. */
5368 static const struct ecoff_debug_swap
5369 elf64_alpha_ecoff_debug_swap =
5370 {
5371 /* Symbol table magic number. */
5372 magicSym2,
5373 /* Alignment of debugging information. E.g., 4. */
5374 8,
5375 /* Sizes of external symbolic information. */
5376 sizeof (struct hdr_ext),
5377 sizeof (struct dnr_ext),
5378 sizeof (struct pdr_ext),
5379 sizeof (struct sym_ext),
5380 sizeof (struct opt_ext),
5381 sizeof (struct fdr_ext),
5382 sizeof (struct rfd_ext),
5383 sizeof (struct ext_ext),
5384 /* Functions to swap in external symbolic data. */
5385 ecoff_swap_hdr_in,
5386 ecoff_swap_dnr_in,
5387 ecoff_swap_pdr_in,
5388 ecoff_swap_sym_in,
5389 ecoff_swap_opt_in,
5390 ecoff_swap_fdr_in,
5391 ecoff_swap_rfd_in,
5392 ecoff_swap_ext_in,
5393 _bfd_ecoff_swap_tir_in,
5394 _bfd_ecoff_swap_rndx_in,
5395 /* Functions to swap out external symbolic data. */
5396 ecoff_swap_hdr_out,
5397 ecoff_swap_dnr_out,
5398 ecoff_swap_pdr_out,
5399 ecoff_swap_sym_out,
5400 ecoff_swap_opt_out,
5401 ecoff_swap_fdr_out,
5402 ecoff_swap_rfd_out,
5403 ecoff_swap_ext_out,
5404 _bfd_ecoff_swap_tir_out,
5405 _bfd_ecoff_swap_rndx_out,
5406 /* Function to read in symbolic data. */
5407 elf64_alpha_read_ecoff_info
5408 };
5409 \f
5410 /* Use a non-standard hash bucket size of 8. */
5411
5412 static const struct elf_size_info alpha_elf_size_info =
5413 {
5414 sizeof (Elf64_External_Ehdr),
5415 sizeof (Elf64_External_Phdr),
5416 sizeof (Elf64_External_Shdr),
5417 sizeof (Elf64_External_Rel),
5418 sizeof (Elf64_External_Rela),
5419 sizeof (Elf64_External_Sym),
5420 sizeof (Elf64_External_Dyn),
5421 sizeof (Elf_External_Note),
5422 8,
5423 1,
5424 64, 3,
5425 ELFCLASS64, EV_CURRENT,
5426 bfd_elf64_write_out_phdrs,
5427 bfd_elf64_write_shdrs_and_ehdr,
5428 bfd_elf64_checksum_contents,
5429 bfd_elf64_write_relocs,
5430 bfd_elf64_swap_symbol_in,
5431 bfd_elf64_swap_symbol_out,
5432 bfd_elf64_slurp_reloc_table,
5433 bfd_elf64_slurp_symbol_table,
5434 bfd_elf64_swap_dyn_in,
5435 bfd_elf64_swap_dyn_out,
5436 bfd_elf64_swap_reloc_in,
5437 bfd_elf64_swap_reloc_out,
5438 bfd_elf64_swap_reloca_in,
5439 bfd_elf64_swap_reloca_out
5440 };
5441
5442 #define TARGET_LITTLE_SYM alpha_elf64_vec
5443 #define TARGET_LITTLE_NAME "elf64-alpha"
5444 #define ELF_ARCH bfd_arch_alpha
5445 #define ELF_TARGET_ID ALPHA_ELF_DATA
5446 #define ELF_MACHINE_CODE EM_ALPHA
5447 #define ELF_MAXPAGESIZE 0x10000
5448 #define ELF_COMMONPAGESIZE 0x2000
5449
5450 #define bfd_elf64_bfd_link_hash_table_create \
5451 elf64_alpha_bfd_link_hash_table_create
5452
5453 #define bfd_elf64_bfd_reloc_type_lookup \
5454 elf64_alpha_bfd_reloc_type_lookup
5455 #define bfd_elf64_bfd_reloc_name_lookup \
5456 elf64_alpha_bfd_reloc_name_lookup
5457 #define elf_info_to_howto \
5458 elf64_alpha_info_to_howto
5459
5460 #define bfd_elf64_mkobject \
5461 elf64_alpha_mkobject
5462 #define elf_backend_object_p \
5463 elf64_alpha_object_p
5464
5465 #define elf_backend_section_from_shdr \
5466 elf64_alpha_section_from_shdr
5467 #define elf_backend_section_flags \
5468 elf64_alpha_section_flags
5469 #define elf_backend_fake_sections \
5470 elf64_alpha_fake_sections
5471
5472 #define bfd_elf64_bfd_is_local_label_name \
5473 elf64_alpha_is_local_label_name
5474 #define bfd_elf64_find_nearest_line \
5475 elf64_alpha_find_nearest_line
5476 #define bfd_elf64_bfd_relax_section \
5477 elf64_alpha_relax_section
5478
5479 #define elf_backend_add_symbol_hook \
5480 elf64_alpha_add_symbol_hook
5481 #define elf_backend_relocs_compatible \
5482 _bfd_elf_relocs_compatible
5483 #define elf_backend_sort_relocs_p \
5484 elf64_alpha_sort_relocs_p
5485 #define elf_backend_check_relocs \
5486 elf64_alpha_check_relocs
5487 #define elf_backend_create_dynamic_sections \
5488 elf64_alpha_create_dynamic_sections
5489 #define elf_backend_adjust_dynamic_symbol \
5490 elf64_alpha_adjust_dynamic_symbol
5491 #define elf_backend_merge_symbol_attribute \
5492 elf64_alpha_merge_symbol_attribute
5493 #define elf_backend_copy_indirect_symbol \
5494 elf64_alpha_copy_indirect_symbol
5495 #define elf_backend_always_size_sections \
5496 elf64_alpha_always_size_sections
5497 #define elf_backend_size_dynamic_sections \
5498 elf64_alpha_size_dynamic_sections
5499 #define elf_backend_omit_section_dynsym \
5500 _bfd_elf_omit_section_dynsym_all
5501 #define elf_backend_relocate_section \
5502 elf64_alpha_relocate_section
5503 #define elf_backend_finish_dynamic_symbol \
5504 elf64_alpha_finish_dynamic_symbol
5505 #define elf_backend_finish_dynamic_sections \
5506 elf64_alpha_finish_dynamic_sections
5507 #define bfd_elf64_bfd_final_link \
5508 elf64_alpha_final_link
5509 #define elf_backend_reloc_type_class \
5510 elf64_alpha_reloc_type_class
5511
5512 #define elf_backend_can_gc_sections 1
5513 #define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5514
5515 #define elf_backend_ecoff_debug_swap \
5516 &elf64_alpha_ecoff_debug_swap
5517
5518 #define elf_backend_size_info \
5519 alpha_elf_size_info
5520
5521 #define elf_backend_special_sections \
5522 elf64_alpha_special_sections
5523
5524 #define elf_backend_strip_zero_sized_dynamic_sections \
5525 _bfd_elf_strip_zero_sized_dynamic_sections
5526
5527 /* A few constants that determine how the .plt section is set up. */
5528 #define elf_backend_want_got_plt 0
5529 #define elf_backend_plt_readonly 0
5530 #define elf_backend_want_plt_sym 1
5531 #define elf_backend_got_header_size 0
5532 #define elf_backend_dtrel_excludes_plt 1
5533
5534 #include "elf64-target.h"
5535 \f
5536 /* FreeBSD support. */
5537
5538 #undef TARGET_LITTLE_SYM
5539 #define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
5540 #undef TARGET_LITTLE_NAME
5541 #define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
5542 #undef ELF_OSABI
5543 #define ELF_OSABI ELFOSABI_FREEBSD
5544
5545 /* The kernel recognizes executables as valid only if they carry a
5546 "FreeBSD" label in the ELF header. So we put this label on all
5547 executables and (for simplicity) also all other object files. */
5548
5549 static bfd_boolean
5550 elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
5551 {
5552 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5553
5554 if (!_bfd_elf_init_file_header (abfd, info))
5555 return FALSE;
5556
5557 i_ehdrp = elf_elfheader (abfd);
5558
5559 /* Put an ABI label supported by FreeBSD >= 4.1. */
5560 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
5561 #ifdef OLD_FREEBSD_ABI_LABEL
5562 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5563 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5564 #endif
5565 return TRUE;
5566 }
5567
5568 #undef elf_backend_init_file_header
5569 #define elf_backend_init_file_header \
5570 elf64_alpha_fbsd_init_file_header
5571
5572 #undef elf64_bed
5573 #define elf64_bed elf64_alpha_fbsd_bed
5574
5575 #include "elf64-target.h"
This page took 0.147672 seconds and 4 git commands to generate.