i386: Also check R12-R15 registers when optimizing testq to testb
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
1 /* Alpha specific support for 64-bit ELF
2 Copyright (C) 1996-2019 Free Software Foundation, Inc.
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
26 #include "sysdep.h"
27 #include "bfd.h"
28 #include "libbfd.h"
29 #include "elf-bfd.h"
30 #include "ecoff-bfd.h"
31
32 #include "elf/alpha.h"
33
34 #define ALPHAECOFF
35
36 #define NO_COFF_RELOCS
37 #define NO_COFF_SYMBOLS
38 #define NO_COFF_LINENOS
39
40 /* Get the ECOFF swapping routines. Needed for the debug information. */
41 #include "coff/internal.h"
42 #include "coff/sym.h"
43 #include "coff/symconst.h"
44 #include "coff/ecoff.h"
45 #include "coff/alpha.h"
46 #include "aout/ar.h"
47 #include "libcoff.h"
48 #include "libecoff.h"
49 #define ECOFF_64
50 #include "ecoffswap.h"
51
52 \f
53 /* Instruction data for plt generation and relaxation. */
54
55 #define OP_LDA 0x08
56 #define OP_LDAH 0x09
57 #define OP_LDQ 0x29
58 #define OP_BR 0x30
59 #define OP_BSR 0x34
60
61 #define INSN_LDA (OP_LDA << 26)
62 #define INSN_LDAH (OP_LDAH << 26)
63 #define INSN_LDQ (OP_LDQ << 26)
64 #define INSN_BR (OP_BR << 26)
65
66 #define INSN_ADDQ 0x40000400
67 #define INSN_RDUNIQ 0x0000009e
68 #define INSN_SUBQ 0x40000520
69 #define INSN_S4SUBQ 0x40000560
70 #define INSN_UNOP 0x2ffe0000
71
72 #define INSN_JSR 0x68004000
73 #define INSN_JMP 0x68000000
74 #define INSN_JSR_MASK 0xfc00c000
75
76 #define INSN_A(I,A) (I | (A << 21))
77 #define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78 #define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79 #define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80 #define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82 /* PLT/GOT Stuff */
83
84 /* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86 #ifdef USE_SECUREPLT
87 bfd_boolean elf64_alpha_use_secureplt = TRUE;
88 #else
89 bfd_boolean elf64_alpha_use_secureplt = FALSE;
90 #endif
91
92 #define OLD_PLT_HEADER_SIZE 32
93 #define OLD_PLT_ENTRY_SIZE 12
94 #define NEW_PLT_HEADER_SIZE 36
95 #define NEW_PLT_ENTRY_SIZE 4
96
97 #define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99 #define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102 #define MAX_GOT_SIZE (64*1024)
103
104 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
105 \f
106
107 /* Used to implement multiple .got subsections. */
108 struct alpha_elf_got_entry
109 {
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138 };
139
140 struct alpha_elf_reloc_entry
141 {
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
147 /* What kind of relocation? */
148 unsigned int rtype;
149
150 /* Is this against read-only section? */
151 unsigned int reltext : 1;
152
153 /* How many did we find? */
154 unsigned long count;
155 };
156
157 struct alpha_elf_link_hash_entry
158 {
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
167 /* Contexts in which a literal was referenced. */
168 #define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169 #define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170 #define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171 #define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172 #define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173 #define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174 #define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175 #define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176 #define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
177
178 /* Used to implement multiple .got subsections. */
179 struct alpha_elf_got_entry *got_entries;
180
181 /* Used to count non-got, non-plt relocations for delayed sizing
182 of relocation sections. */
183 struct alpha_elf_reloc_entry *reloc_entries;
184 };
185
186 /* Alpha ELF linker hash table. */
187
188 struct alpha_elf_link_hash_table
189 {
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
199 };
200
201 /* Look up an entry in a Alpha ELF linker hash table. */
202
203 #define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208 /* Traverse a Alpha ELF linker hash table. */
209
210 #define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
214 (info)))
215
216 /* Get the Alpha ELF linker hash table from a link_info structure. */
217
218 #define alpha_elf_hash_table(p) \
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
221
222 /* Get the object's symbols as our own entry type. */
223
224 #define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
227 /* Should we do dynamic things to this symbol? This differs from the
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
231
232 static inline bfd_boolean
233 alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
235 {
236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
237 }
238
239 /* Create an entry in a Alpha ELF linker hash table. */
240
241 static struct bfd_hash_entry *
242 elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
245 {
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275 }
276
277 /* Create a Alpha ELF linker hash table. */
278
279 static struct bfd_link_hash_table *
280 elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
281 {
282 struct alpha_elf_link_hash_table *ret;
283 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
284
285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
293 {
294 free (ret);
295 return NULL;
296 }
297
298 return &ret->root.root;
299 }
300 \f
301 /* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304 struct alpha_elf_find_line
305 {
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308 };
309
310 /* We have some private fields hanging off of the elf_tdata structure. */
311
312 struct alpha_elf_obj_tdata
313 {
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
335
336 /* For every got, this is the sum of the number of words required
337 to hold all of the member object's local got. */
338 int local_got_size;
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
343 };
344
345 #define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
348 #define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
352
353 static bfd_boolean
354 elf64_alpha_mkobject (bfd *abfd)
355 {
356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
357 ALPHA_ELF_DATA);
358 }
359
360 static bfd_boolean
361 elf64_alpha_object_p (bfd *abfd)
362 {
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365 }
366 \f
367 /* A relocation function which doesn't do anything. */
368
369 static bfd_reloc_status_type
370 elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
372 void * data ATTRIBUTE_UNUSED, asection *sec,
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374 {
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378 }
379
380 /* A relocation function used for an unsupported reloc. */
381
382 static bfd_reloc_status_type
383 elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
385 void * data ATTRIBUTE_UNUSED, asection *sec,
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387 {
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391 }
392
393 /* Do the work of the GPDISP relocation. */
394
395 static bfd_reloc_status_type
396 elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398 {
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431 }
432
433 /* The special function for the GPDISP reloc. */
434
435 static bfd_reloc_status_type
436 elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440 {
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476 }
477
478 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480 #define MINUS_ONE (((bfd_vma)0) - 1)
481
482
483 #define SKIP_HOWTO(N) \
484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
485
486 static reloc_howto_type elf64_alpha_howto_table[] =
487 {
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
492 TRUE, /* pc_relative */
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
497 FALSE, /* partial_inplace */
498 0, /* src_mask */
499 0, /* dst_mask */
500 TRUE), /* pcrel_offset */
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
507 FALSE, /* pc_relative */
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
510 bfd_elf_generic_reloc, /* special_function */
511 "REFLONG", /* name */
512 FALSE, /* partial_inplace */
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
515 FALSE), /* pcrel_offset */
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
522 FALSE, /* pc_relative */
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
525 bfd_elf_generic_reloc, /* special_function */
526 "REFQUAD", /* name */
527 FALSE, /* partial_inplace */
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
530 FALSE), /* pcrel_offset */
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
539 FALSE, /* pc_relative */
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
542 bfd_elf_generic_reloc, /* special_function */
543 "GPREL32", /* name */
544 FALSE, /* partial_inplace */
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
547 FALSE), /* pcrel_offset */
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
552 1, /* size (0 = byte, 1 = short, 2 = long) */
553 16, /* bitsize */
554 FALSE, /* pc_relative */
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
557 bfd_elf_generic_reloc, /* special_function */
558 "ELF_LITERAL", /* name */
559 FALSE, /* partial_inplace */
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
562 FALSE), /* pcrel_offset */
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
573 1, /* size (0 = byte, 1 = short, 2 = long) */
574 32, /* bitsize */
575 FALSE, /* pc_relative */
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
580 FALSE, /* partial_inplace */
581 0, /* src_mask */
582 0, /* dst_mask */
583 FALSE), /* pcrel_offset */
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
605 FALSE, /* pc_relative */
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
610 FALSE, /* partial_inplace */
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
613 TRUE), /* pcrel_offset */
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
620 TRUE, /* pc_relative */
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
623 bfd_elf_generic_reloc, /* special_function */
624 "BRADDR", /* name */
625 FALSE, /* partial_inplace */
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
628 TRUE), /* pcrel_offset */
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
633 1, /* size (0 = byte, 1 = short, 2 = long) */
634 14, /* bitsize */
635 TRUE, /* pc_relative */
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
638 bfd_elf_generic_reloc, /* special_function */
639 "HINT", /* name */
640 FALSE, /* partial_inplace */
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
643 TRUE), /* pcrel_offset */
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
650 TRUE, /* pc_relative */
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
653 bfd_elf_generic_reloc, /* special_function */
654 "SREL16", /* name */
655 FALSE, /* partial_inplace */
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
658 TRUE), /* pcrel_offset */
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
665 TRUE, /* pc_relative */
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
668 bfd_elf_generic_reloc, /* special_function */
669 "SREL32", /* name */
670 FALSE, /* partial_inplace */
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
673 TRUE), /* pcrel_offset */
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
680 TRUE, /* pc_relative */
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
683 bfd_elf_generic_reloc, /* special_function */
684 "SREL64", /* name */
685 FALSE, /* partial_inplace */
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
688 TRUE), /* pcrel_offset */
689
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
700 1, /* size (0 = byte, 1 = short, 2 = long) */
701 16, /* bitsize */
702 FALSE, /* pc_relative */
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
705 bfd_elf_generic_reloc, /* special_function */
706 "GPRELHIGH", /* name */
707 FALSE, /* partial_inplace */
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
710 FALSE), /* pcrel_offset */
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
715 1, /* size (0 = byte, 1 = short, 2 = long) */
716 16, /* bitsize */
717 FALSE, /* pc_relative */
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
720 bfd_elf_generic_reloc, /* special_function */
721 "GPRELLOW", /* name */
722 FALSE, /* partial_inplace */
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
725 FALSE), /* pcrel_offset */
726
727 /* A 16-bit displacement from the GP to the target. */
728 HOWTO (R_ALPHA_GPREL16,
729 0, /* rightshift */
730 1, /* size (0 = byte, 1 = short, 2 = long) */
731 16, /* bitsize */
732 FALSE, /* pc_relative */
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
735 bfd_elf_generic_reloc, /* special_function */
736 "GPREL16", /* name */
737 FALSE, /* partial_inplace */
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
740 FALSE), /* pcrel_offset */
741
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
747
748 /* Misc ELF relocations. */
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
758 FALSE,
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
763 FALSE,
764 0,
765 0,
766 TRUE),
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
773 FALSE,
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
778 FALSE,
779 0,
780 0,
781 TRUE),
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
788 FALSE,
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
793 FALSE,
794 0,
795 0,
796 TRUE),
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
803 FALSE,
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
808 FALSE,
809 0,
810 0,
811 TRUE),
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
818 TRUE, /* pc_relative */
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
821 bfd_elf_generic_reloc, /* special_function */
822 "BRSGP", /* name */
823 FALSE, /* partial_inplace */
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
826 TRUE), /* pcrel_offset */
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
833 FALSE, /* pc_relative */
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
836 bfd_elf_generic_reloc, /* special_function */
837 "TLSGD", /* name */
838 FALSE, /* partial_inplace */
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
841 FALSE), /* pcrel_offset */
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
848 FALSE, /* pc_relative */
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
851 bfd_elf_generic_reloc, /* special_function */
852 "TLSLDM", /* name */
853 FALSE, /* partial_inplace */
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
856 FALSE), /* pcrel_offset */
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
863 FALSE, /* pc_relative */
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
866 bfd_elf_generic_reloc, /* special_function */
867 "DTPMOD64", /* name */
868 FALSE, /* partial_inplace */
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
871 FALSE), /* pcrel_offset */
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
879 FALSE, /* pc_relative */
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
882 bfd_elf_generic_reloc, /* special_function */
883 "GOTDTPREL", /* name */
884 FALSE, /* partial_inplace */
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
887 FALSE), /* pcrel_offset */
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
894 FALSE, /* pc_relative */
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
897 bfd_elf_generic_reloc, /* special_function */
898 "DTPREL64", /* name */
899 FALSE, /* partial_inplace */
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
902 FALSE), /* pcrel_offset */
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
909 FALSE, /* pc_relative */
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
912 bfd_elf_generic_reloc, /* special_function */
913 "DTPRELHI", /* name */
914 FALSE, /* partial_inplace */
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
917 FALSE), /* pcrel_offset */
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
924 FALSE, /* pc_relative */
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
927 bfd_elf_generic_reloc, /* special_function */
928 "DTPRELLO", /* name */
929 FALSE, /* partial_inplace */
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
932 FALSE), /* pcrel_offset */
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
939 FALSE, /* pc_relative */
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
942 bfd_elf_generic_reloc, /* special_function */
943 "DTPREL16", /* name */
944 FALSE, /* partial_inplace */
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
947 FALSE), /* pcrel_offset */
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
955 FALSE, /* pc_relative */
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
958 bfd_elf_generic_reloc, /* special_function */
959 "GOTTPREL", /* name */
960 FALSE, /* partial_inplace */
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
963 FALSE), /* pcrel_offset */
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
970 FALSE, /* pc_relative */
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
973 bfd_elf_generic_reloc, /* special_function */
974 "TPREL64", /* name */
975 FALSE, /* partial_inplace */
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
978 FALSE), /* pcrel_offset */
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
985 FALSE, /* pc_relative */
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
988 bfd_elf_generic_reloc, /* special_function */
989 "TPRELHI", /* name */
990 FALSE, /* partial_inplace */
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
993 FALSE), /* pcrel_offset */
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
1000 FALSE, /* pc_relative */
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
1003 bfd_elf_generic_reloc, /* special_function */
1004 "TPRELLO", /* name */
1005 FALSE, /* partial_inplace */
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
1008 FALSE), /* pcrel_offset */
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
1015 FALSE, /* pc_relative */
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
1018 bfd_elf_generic_reloc, /* special_function */
1019 "TPREL16", /* name */
1020 FALSE, /* partial_inplace */
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
1023 FALSE), /* pcrel_offset */
1024 };
1025
1026 /* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028 struct elf_reloc_map
1029 {
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032 };
1033
1034 static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035 {
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
1066 };
1067
1068 /* Given a BFD reloc type, return a HOWTO structure. */
1069
1070 static reloc_howto_type *
1071 elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
1073 {
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083 }
1084
1085 static reloc_howto_type *
1086 elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088 {
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100 }
1101
1102 /* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
1104 static bfd_boolean
1105 elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
1106 Elf_Internal_Rela *dst)
1107 {
1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
1112 /* xgettext:c-format */
1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1114 abfd, r_type);
1115 bfd_set_error (bfd_error_bad_value);
1116 return FALSE;
1117 }
1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1119 return TRUE;
1120 }
1121
1122 /* These two relocations create a two-word entry in the got. */
1123 #define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
1125
1126 /* This is PT_TLS segment p_vaddr. */
1127 #define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
1129
1130 /* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
1132 #define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
1136 \f
1137 /* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
1139 type.
1140 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1141 how to. */
1142
1143 static bfd_boolean
1144 elf64_alpha_section_from_shdr (bfd *abfd,
1145 Elf_Internal_Shdr *hdr,
1146 const char *name,
1147 int shindex)
1148 {
1149 asection *newsect;
1150
1151 /* There ought to be a place to keep ELF backend specific flags, but
1152 at the moment there isn't one. We just keep track of the
1153 sections by their name, instead. Fortunately, the ABI gives
1154 suggested names for all the MIPS specific sections, so we will
1155 probably get away with this. */
1156 switch (hdr->sh_type)
1157 {
1158 case SHT_ALPHA_DEBUG:
1159 if (strcmp (name, ".mdebug") != 0)
1160 return FALSE;
1161 break;
1162 default:
1163 return FALSE;
1164 }
1165
1166 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1167 return FALSE;
1168 newsect = hdr->bfd_section;
1169
1170 if (hdr->sh_type == SHT_ALPHA_DEBUG)
1171 {
1172 if (!bfd_set_section_flags (newsect,
1173 bfd_section_flags (newsect) | SEC_DEBUGGING))
1174 return FALSE;
1175 }
1176
1177 return TRUE;
1178 }
1179
1180 /* Convert Alpha specific section flags to bfd internal section flags. */
1181
1182 static bfd_boolean
1183 elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
1184 {
1185 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1186 *flags |= SEC_SMALL_DATA;
1187
1188 return TRUE;
1189 }
1190
1191 /* Set the correct type for an Alpha ELF section. We do this by the
1192 section name, which is a hack, but ought to work. */
1193
1194 static bfd_boolean
1195 elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1196 {
1197 register const char *name;
1198
1199 name = bfd_section_name (sec);
1200
1201 if (strcmp (name, ".mdebug") == 0)
1202 {
1203 hdr->sh_type = SHT_ALPHA_DEBUG;
1204 /* In a shared object on Irix 5.3, the .mdebug section has an
1205 entsize of 0. FIXME: Does this matter? */
1206 if ((abfd->flags & DYNAMIC) != 0 )
1207 hdr->sh_entsize = 0;
1208 else
1209 hdr->sh_entsize = 1;
1210 }
1211 else if ((sec->flags & SEC_SMALL_DATA)
1212 || strcmp (name, ".sdata") == 0
1213 || strcmp (name, ".sbss") == 0
1214 || strcmp (name, ".lit4") == 0
1215 || strcmp (name, ".lit8") == 0)
1216 hdr->sh_flags |= SHF_ALPHA_GPREL;
1217
1218 return TRUE;
1219 }
1220
1221 /* Hook called by the linker routine which adds symbols from an object
1222 file. We use it to put .comm items in .sbss, and not .bss. */
1223
1224 static bfd_boolean
1225 elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1226 Elf_Internal_Sym *sym,
1227 const char **namep ATTRIBUTE_UNUSED,
1228 flagword *flagsp ATTRIBUTE_UNUSED,
1229 asection **secp, bfd_vma *valp)
1230 {
1231 if (sym->st_shndx == SHN_COMMON
1232 && !bfd_link_relocatable (info)
1233 && sym->st_size <= elf_gp_size (abfd))
1234 {
1235 /* Common symbols less than or equal to -G nn bytes are
1236 automatically put into .sbss. */
1237
1238 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
1239
1240 if (scomm == NULL)
1241 {
1242 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1243 (SEC_ALLOC
1244 | SEC_IS_COMMON
1245 | SEC_LINKER_CREATED));
1246 if (scomm == NULL)
1247 return FALSE;
1248 }
1249
1250 *secp = scomm;
1251 *valp = sym->st_size;
1252 }
1253
1254 return TRUE;
1255 }
1256
1257 /* Create the .got section. */
1258
1259 static bfd_boolean
1260 elf64_alpha_create_got_section (bfd *abfd,
1261 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1262 {
1263 flagword flags;
1264 asection *s;
1265
1266 if (! is_alpha_elf (abfd))
1267 return FALSE;
1268
1269 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1270 | SEC_LINKER_CREATED);
1271 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
1272 if (s == NULL
1273 || !bfd_set_section_alignment (s, 3))
1274 return FALSE;
1275
1276 alpha_elf_tdata (abfd)->got = s;
1277
1278 /* Make sure the object's gotobj is set to itself so that we default
1279 to every object with its own .got. We'll merge .gots later once
1280 we've collected each object's info. */
1281 alpha_elf_tdata (abfd)->gotobj = abfd;
1282
1283 return TRUE;
1284 }
1285
1286 /* Create all the dynamic sections. */
1287
1288 static bfd_boolean
1289 elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1290 {
1291 asection *s;
1292 flagword flags;
1293 struct elf_link_hash_entry *h;
1294
1295 if (! is_alpha_elf (abfd))
1296 return FALSE;
1297
1298 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
1299
1300 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1301 | SEC_LINKER_CREATED
1302 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1303 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
1304 elf_hash_table (info)->splt = s;
1305 if (s == NULL || ! bfd_set_section_alignment (s, 4))
1306 return FALSE;
1307
1308 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1309 .plt section. */
1310 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1311 "_PROCEDURE_LINKAGE_TABLE_");
1312 elf_hash_table (info)->hplt = h;
1313 if (h == NULL)
1314 return FALSE;
1315
1316 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1317 | SEC_LINKER_CREATED | SEC_READONLY);
1318 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
1319 elf_hash_table (info)->srelplt = s;
1320 if (s == NULL || ! bfd_set_section_alignment (s, 3))
1321 return FALSE;
1322
1323 if (elf64_alpha_use_secureplt)
1324 {
1325 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1326 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
1327 elf_hash_table (info)->sgotplt = s;
1328 if (s == NULL || ! bfd_set_section_alignment (s, 3))
1329 return FALSE;
1330 }
1331
1332 /* We may or may not have created a .got section for this object, but
1333 we definitely havn't done the rest of the work. */
1334
1335 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1336 {
1337 if (!elf64_alpha_create_got_section (abfd, info))
1338 return FALSE;
1339 }
1340
1341 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1342 | SEC_LINKER_CREATED | SEC_READONLY);
1343 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
1344 elf_hash_table (info)->srelgot = s;
1345 if (s == NULL
1346 || !bfd_set_section_alignment (s, 3))
1347 return FALSE;
1348
1349 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1350 dynobj's .got section. We don't do this in the linker script
1351 because we don't want to define the symbol if we are not creating
1352 a global offset table. */
1353 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1354 "_GLOBAL_OFFSET_TABLE_");
1355 elf_hash_table (info)->hgot = h;
1356 if (h == NULL)
1357 return FALSE;
1358
1359 return TRUE;
1360 }
1361 \f
1362 /* Read ECOFF debugging information from a .mdebug section into a
1363 ecoff_debug_info structure. */
1364
1365 static bfd_boolean
1366 elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1367 struct ecoff_debug_info *debug)
1368 {
1369 HDRR *symhdr;
1370 const struct ecoff_debug_swap *swap;
1371 char *ext_hdr = NULL;
1372
1373 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1374 memset (debug, 0, sizeof (*debug));
1375
1376 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1377 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1378 goto error_return;
1379
1380 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1381 swap->external_hdr_size))
1382 goto error_return;
1383
1384 symhdr = &debug->symbolic_header;
1385 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
1386
1387 /* The symbolic header contains absolute file offsets and sizes to
1388 read. */
1389 #define READ(ptr, offset, count, size, type) \
1390 if (symhdr->count == 0) \
1391 debug->ptr = NULL; \
1392 else \
1393 { \
1394 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1395 debug->ptr = (type) bfd_malloc (amt); \
1396 if (debug->ptr == NULL) \
1397 goto error_return; \
1398 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1399 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1400 goto error_return; \
1401 }
1402
1403 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
1404 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1405 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1406 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1407 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
1408 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1409 union aux_ext *);
1410 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1411 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
1412 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1413 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1414 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
1415 #undef READ
1416
1417 debug->fdr = NULL;
1418
1419 return TRUE;
1420
1421 error_return:
1422 if (ext_hdr != NULL)
1423 free (ext_hdr);
1424 if (debug->line != NULL)
1425 free (debug->line);
1426 if (debug->external_dnr != NULL)
1427 free (debug->external_dnr);
1428 if (debug->external_pdr != NULL)
1429 free (debug->external_pdr);
1430 if (debug->external_sym != NULL)
1431 free (debug->external_sym);
1432 if (debug->external_opt != NULL)
1433 free (debug->external_opt);
1434 if (debug->external_aux != NULL)
1435 free (debug->external_aux);
1436 if (debug->ss != NULL)
1437 free (debug->ss);
1438 if (debug->ssext != NULL)
1439 free (debug->ssext);
1440 if (debug->external_fdr != NULL)
1441 free (debug->external_fdr);
1442 if (debug->external_rfd != NULL)
1443 free (debug->external_rfd);
1444 if (debug->external_ext != NULL)
1445 free (debug->external_ext);
1446 return FALSE;
1447 }
1448
1449 /* Alpha ELF local labels start with '$'. */
1450
1451 static bfd_boolean
1452 elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
1453 {
1454 return name[0] == '$';
1455 }
1456
1457 static bfd_boolean
1458 elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1459 asection *section, bfd_vma offset,
1460 const char **filename_ptr,
1461 const char **functionname_ptr,
1462 unsigned int *line_ptr,
1463 unsigned int *discriminator_ptr)
1464 {
1465 asection *msec;
1466
1467 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
1468 filename_ptr, functionname_ptr,
1469 line_ptr, discriminator_ptr,
1470 dwarf_debug_sections,
1471 &elf_tdata (abfd)->dwarf2_find_line_info)
1472 == 1)
1473 return TRUE;
1474
1475 msec = bfd_get_section_by_name (abfd, ".mdebug");
1476 if (msec != NULL)
1477 {
1478 flagword origflags;
1479 struct alpha_elf_find_line *fi;
1480 const struct ecoff_debug_swap * const swap =
1481 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1482
1483 /* If we are called during a link, alpha_elf_final_link may have
1484 cleared the SEC_HAS_CONTENTS field. We force it back on here
1485 if appropriate (which it normally will be). */
1486 origflags = msec->flags;
1487 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1488 msec->flags |= SEC_HAS_CONTENTS;
1489
1490 fi = alpha_elf_tdata (abfd)->find_line_info;
1491 if (fi == NULL)
1492 {
1493 bfd_size_type external_fdr_size;
1494 char *fraw_src;
1495 char *fraw_end;
1496 struct fdr *fdr_ptr;
1497 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
1498
1499 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
1500 if (fi == NULL)
1501 {
1502 msec->flags = origflags;
1503 return FALSE;
1504 }
1505
1506 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1507 {
1508 msec->flags = origflags;
1509 return FALSE;
1510 }
1511
1512 /* Swap in the FDR information. */
1513 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1514 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1515 if (fi->d.fdr == NULL)
1516 {
1517 msec->flags = origflags;
1518 return FALSE;
1519 }
1520 external_fdr_size = swap->external_fdr_size;
1521 fdr_ptr = fi->d.fdr;
1522 fraw_src = (char *) fi->d.external_fdr;
1523 fraw_end = (fraw_src
1524 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1525 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
1526 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
1527
1528 alpha_elf_tdata (abfd)->find_line_info = fi;
1529
1530 /* Note that we don't bother to ever free this information.
1531 find_nearest_line is either called all the time, as in
1532 objdump -l, so the information should be saved, or it is
1533 rarely called, as in ld error messages, so the memory
1534 wasted is unimportant. Still, it would probably be a
1535 good idea for free_cached_info to throw it away. */
1536 }
1537
1538 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1539 &fi->i, filename_ptr, functionname_ptr,
1540 line_ptr))
1541 {
1542 msec->flags = origflags;
1543 return TRUE;
1544 }
1545
1546 msec->flags = origflags;
1547 }
1548
1549 /* Fall back on the generic ELF find_nearest_line routine. */
1550
1551 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
1552 filename_ptr, functionname_ptr,
1553 line_ptr, discriminator_ptr);
1554 }
1555 \f
1556 /* Structure used to pass information to alpha_elf_output_extsym. */
1557
1558 struct extsym_info
1559 {
1560 bfd *abfd;
1561 struct bfd_link_info *info;
1562 struct ecoff_debug_info *debug;
1563 const struct ecoff_debug_swap *swap;
1564 bfd_boolean failed;
1565 };
1566
1567 static bfd_boolean
1568 elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
1569 {
1570 struct extsym_info *einfo = (struct extsym_info *) data;
1571 bfd_boolean strip;
1572 asection *sec, *output_section;
1573
1574 if (h->root.indx == -2)
1575 strip = FALSE;
1576 else if ((h->root.def_dynamic
1577 || h->root.ref_dynamic
1578 || h->root.root.type == bfd_link_hash_new)
1579 && !h->root.def_regular
1580 && !h->root.ref_regular)
1581 strip = TRUE;
1582 else if (einfo->info->strip == strip_all
1583 || (einfo->info->strip == strip_some
1584 && bfd_hash_lookup (einfo->info->keep_hash,
1585 h->root.root.root.string,
1586 FALSE, FALSE) == NULL))
1587 strip = TRUE;
1588 else
1589 strip = FALSE;
1590
1591 if (strip)
1592 return TRUE;
1593
1594 if (h->esym.ifd == -2)
1595 {
1596 h->esym.jmptbl = 0;
1597 h->esym.cobol_main = 0;
1598 h->esym.weakext = 0;
1599 h->esym.reserved = 0;
1600 h->esym.ifd = ifdNil;
1601 h->esym.asym.value = 0;
1602 h->esym.asym.st = stGlobal;
1603
1604 if (h->root.root.type != bfd_link_hash_defined
1605 && h->root.root.type != bfd_link_hash_defweak)
1606 h->esym.asym.sc = scAbs;
1607 else
1608 {
1609 const char *name;
1610
1611 sec = h->root.root.u.def.section;
1612 output_section = sec->output_section;
1613
1614 /* When making a shared library and symbol h is the one from
1615 the another shared library, OUTPUT_SECTION may be null. */
1616 if (output_section == NULL)
1617 h->esym.asym.sc = scUndefined;
1618 else
1619 {
1620 name = bfd_section_name (output_section);
1621
1622 if (strcmp (name, ".text") == 0)
1623 h->esym.asym.sc = scText;
1624 else if (strcmp (name, ".data") == 0)
1625 h->esym.asym.sc = scData;
1626 else if (strcmp (name, ".sdata") == 0)
1627 h->esym.asym.sc = scSData;
1628 else if (strcmp (name, ".rodata") == 0
1629 || strcmp (name, ".rdata") == 0)
1630 h->esym.asym.sc = scRData;
1631 else if (strcmp (name, ".bss") == 0)
1632 h->esym.asym.sc = scBss;
1633 else if (strcmp (name, ".sbss") == 0)
1634 h->esym.asym.sc = scSBss;
1635 else if (strcmp (name, ".init") == 0)
1636 h->esym.asym.sc = scInit;
1637 else if (strcmp (name, ".fini") == 0)
1638 h->esym.asym.sc = scFini;
1639 else
1640 h->esym.asym.sc = scAbs;
1641 }
1642 }
1643
1644 h->esym.asym.reserved = 0;
1645 h->esym.asym.index = indexNil;
1646 }
1647
1648 if (h->root.root.type == bfd_link_hash_common)
1649 h->esym.asym.value = h->root.root.u.c.size;
1650 else if (h->root.root.type == bfd_link_hash_defined
1651 || h->root.root.type == bfd_link_hash_defweak)
1652 {
1653 if (h->esym.asym.sc == scCommon)
1654 h->esym.asym.sc = scBss;
1655 else if (h->esym.asym.sc == scSCommon)
1656 h->esym.asym.sc = scSBss;
1657
1658 sec = h->root.root.u.def.section;
1659 output_section = sec->output_section;
1660 if (output_section != NULL)
1661 h->esym.asym.value = (h->root.root.u.def.value
1662 + sec->output_offset
1663 + output_section->vma);
1664 else
1665 h->esym.asym.value = 0;
1666 }
1667
1668 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1669 h->root.root.root.string,
1670 &h->esym))
1671 {
1672 einfo->failed = TRUE;
1673 return FALSE;
1674 }
1675
1676 return TRUE;
1677 }
1678 \f
1679 /* Search for and possibly create a got entry. */
1680
1681 static struct alpha_elf_got_entry *
1682 get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1683 unsigned long r_type, unsigned long r_symndx,
1684 bfd_vma r_addend)
1685 {
1686 struct alpha_elf_got_entry *gotent;
1687 struct alpha_elf_got_entry **slot;
1688
1689 if (h)
1690 slot = &h->got_entries;
1691 else
1692 {
1693 /* This is a local .got entry -- record for merge. */
1694
1695 struct alpha_elf_got_entry **local_got_entries;
1696
1697 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1698 if (!local_got_entries)
1699 {
1700 bfd_size_type size;
1701 Elf_Internal_Shdr *symtab_hdr;
1702
1703 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1704 size = symtab_hdr->sh_info;
1705 size *= sizeof (struct alpha_elf_got_entry *);
1706
1707 local_got_entries
1708 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1709 if (!local_got_entries)
1710 return NULL;
1711
1712 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1713 }
1714
1715 slot = &local_got_entries[r_symndx];
1716 }
1717
1718 for (gotent = *slot; gotent ; gotent = gotent->next)
1719 if (gotent->gotobj == abfd
1720 && gotent->reloc_type == r_type
1721 && gotent->addend == r_addend)
1722 break;
1723
1724 if (!gotent)
1725 {
1726 int entry_size;
1727 bfd_size_type amt;
1728
1729 amt = sizeof (struct alpha_elf_got_entry);
1730 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1731 if (!gotent)
1732 return NULL;
1733
1734 gotent->gotobj = abfd;
1735 gotent->addend = r_addend;
1736 gotent->got_offset = -1;
1737 gotent->plt_offset = -1;
1738 gotent->use_count = 1;
1739 gotent->reloc_type = r_type;
1740 gotent->reloc_done = 0;
1741 gotent->reloc_xlated = 0;
1742
1743 gotent->next = *slot;
1744 *slot = gotent;
1745
1746 entry_size = alpha_got_entry_size (r_type);
1747 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1748 if (!h)
1749 alpha_elf_tdata(abfd)->local_got_size += entry_size;
1750 }
1751 else
1752 gotent->use_count += 1;
1753
1754 return gotent;
1755 }
1756
1757 static bfd_boolean
1758 elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1759 {
1760 return ((ah->root.type == STT_FUNC
1761 || ah->root.root.type == bfd_link_hash_undefweak
1762 || ah->root.root.type == bfd_link_hash_undefined)
1763 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1764 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
1765 }
1766
1767 /* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1768 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1769 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1770 relocs to be sorted. */
1771
1772 static bfd_boolean
1773 elf64_alpha_sort_relocs_p (asection *sec)
1774 {
1775 return (sec->flags & SEC_CODE) == 0;
1776 }
1777
1778
1779 /* Handle dynamic relocations when doing an Alpha ELF link. */
1780
1781 static bfd_boolean
1782 elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1783 asection *sec, const Elf_Internal_Rela *relocs)
1784 {
1785 bfd *dynobj;
1786 asection *sreloc;
1787 Elf_Internal_Shdr *symtab_hdr;
1788 struct alpha_elf_link_hash_entry **sym_hashes;
1789 const Elf_Internal_Rela *rel, *relend;
1790 bfd_size_type amt;
1791
1792 if (bfd_link_relocatable (info))
1793 return TRUE;
1794
1795 /* Don't do anything special with non-loaded, non-alloced sections.
1796 In particular, any relocs in such sections should not affect GOT
1797 and PLT reference counting (ie. we don't allow them to create GOT
1798 or PLT entries), there's no possibility or desire to optimize TLS
1799 relocs, and there's not much point in propagating relocs to shared
1800 libs that the dynamic linker won't relocate. */
1801 if ((sec->flags & SEC_ALLOC) == 0)
1802 return TRUE;
1803
1804 BFD_ASSERT (is_alpha_elf (abfd));
1805
1806 dynobj = elf_hash_table (info)->dynobj;
1807 if (dynobj == NULL)
1808 elf_hash_table (info)->dynobj = dynobj = abfd;
1809
1810 sreloc = NULL;
1811 symtab_hdr = &elf_symtab_hdr (abfd);
1812 sym_hashes = alpha_elf_sym_hashes (abfd);
1813
1814 relend = relocs + sec->reloc_count;
1815 for (rel = relocs; rel < relend; ++rel)
1816 {
1817 enum {
1818 NEED_GOT = 1,
1819 NEED_GOT_ENTRY = 2,
1820 NEED_DYNREL = 4
1821 };
1822
1823 unsigned long r_symndx, r_type;
1824 struct alpha_elf_link_hash_entry *h;
1825 unsigned int gotent_flags;
1826 bfd_boolean maybe_dynamic;
1827 unsigned int need;
1828 bfd_vma addend;
1829
1830 r_symndx = ELF64_R_SYM (rel->r_info);
1831 if (r_symndx < symtab_hdr->sh_info)
1832 h = NULL;
1833 else
1834 {
1835 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1836
1837 while (h->root.root.type == bfd_link_hash_indirect
1838 || h->root.root.type == bfd_link_hash_warning)
1839 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
1840
1841 /* PR15323, ref flags aren't set for references in the same
1842 object. */
1843 h->root.ref_regular = 1;
1844 }
1845
1846 /* We can only get preliminary data on whether a symbol is
1847 locally or externally defined, as not all of the input files
1848 have yet been processed. Do something with what we know, as
1849 this may help reduce memory usage and processing time later. */
1850 maybe_dynamic = FALSE;
1851 if (h && ((bfd_link_pic (info)
1852 && (!info->symbolic
1853 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1854 || !h->root.def_regular
1855 || h->root.root.type == bfd_link_hash_defweak))
1856 maybe_dynamic = TRUE;
1857
1858 need = 0;
1859 gotent_flags = 0;
1860 r_type = ELF64_R_TYPE (rel->r_info);
1861 addend = rel->r_addend;
1862
1863 switch (r_type)
1864 {
1865 case R_ALPHA_LITERAL:
1866 need = NEED_GOT | NEED_GOT_ENTRY;
1867
1868 /* Remember how this literal is used from its LITUSEs.
1869 This will be important when it comes to decide if we can
1870 create a .plt entry for a function symbol. */
1871 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
1872 if (rel->r_addend >= 1 && rel->r_addend <= 6)
1873 gotent_flags |= 1 << rel->r_addend;
1874 --rel;
1875
1876 /* No LITUSEs -- presumably the address is used somehow. */
1877 if (gotent_flags == 0)
1878 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1879 break;
1880
1881 case R_ALPHA_GPDISP:
1882 case R_ALPHA_GPREL16:
1883 case R_ALPHA_GPREL32:
1884 case R_ALPHA_GPRELHIGH:
1885 case R_ALPHA_GPRELLOW:
1886 case R_ALPHA_BRSGP:
1887 need = NEED_GOT;
1888 break;
1889
1890 case R_ALPHA_REFLONG:
1891 case R_ALPHA_REFQUAD:
1892 if (bfd_link_pic (info) || maybe_dynamic)
1893 need = NEED_DYNREL;
1894 break;
1895
1896 case R_ALPHA_TLSLDM:
1897 /* The symbol for a TLSLDM reloc is ignored. Collapse the
1898 reloc to the STN_UNDEF (0) symbol so that they all match. */
1899 r_symndx = STN_UNDEF;
1900 h = 0;
1901 maybe_dynamic = FALSE;
1902 /* FALLTHRU */
1903
1904 case R_ALPHA_TLSGD:
1905 case R_ALPHA_GOTDTPREL:
1906 need = NEED_GOT | NEED_GOT_ENTRY;
1907 break;
1908
1909 case R_ALPHA_GOTTPREL:
1910 need = NEED_GOT | NEED_GOT_ENTRY;
1911 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1912 if (bfd_link_pic (info))
1913 info->flags |= DF_STATIC_TLS;
1914 break;
1915
1916 case R_ALPHA_TPREL64:
1917 if (bfd_link_dll (info))
1918 {
1919 info->flags |= DF_STATIC_TLS;
1920 need = NEED_DYNREL;
1921 }
1922 else if (maybe_dynamic)
1923 need = NEED_DYNREL;
1924 break;
1925 }
1926
1927 if (need & NEED_GOT)
1928 {
1929 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1930 {
1931 if (!elf64_alpha_create_got_section (abfd, info))
1932 return FALSE;
1933 }
1934 }
1935
1936 if (need & NEED_GOT_ENTRY)
1937 {
1938 struct alpha_elf_got_entry *gotent;
1939
1940 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1941 if (!gotent)
1942 return FALSE;
1943
1944 if (gotent_flags)
1945 {
1946 gotent->flags |= gotent_flags;
1947 if (h)
1948 {
1949 gotent_flags |= h->flags;
1950 h->flags = gotent_flags;
1951
1952 /* Make a guess as to whether a .plt entry is needed. */
1953 /* ??? It appears that we won't make it into
1954 adjust_dynamic_symbol for symbols that remain
1955 totally undefined. Copying this check here means
1956 we can create a plt entry for them too. */
1957 h->root.needs_plt
1958 = (maybe_dynamic && elf64_alpha_want_plt (h));
1959 }
1960 }
1961 }
1962
1963 if (need & NEED_DYNREL)
1964 {
1965 /* We need to create the section here now whether we eventually
1966 use it or not so that it gets mapped to an output section by
1967 the linker. If not used, we'll kill it in size_dynamic_sections. */
1968 if (sreloc == NULL)
1969 {
1970 sreloc = _bfd_elf_make_dynamic_reloc_section
1971 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1972
1973 if (sreloc == NULL)
1974 return FALSE;
1975 }
1976
1977 if (h)
1978 {
1979 /* Since we havn't seen all of the input symbols yet, we
1980 don't know whether we'll actually need a dynamic relocation
1981 entry for this reloc. So make a record of it. Once we
1982 find out if this thing needs dynamic relocation we'll
1983 expand the relocation sections by the appropriate amount. */
1984
1985 struct alpha_elf_reloc_entry *rent;
1986
1987 for (rent = h->reloc_entries; rent; rent = rent->next)
1988 if (rent->rtype == r_type && rent->srel == sreloc)
1989 break;
1990
1991 if (!rent)
1992 {
1993 amt = sizeof (struct alpha_elf_reloc_entry);
1994 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1995 if (!rent)
1996 return FALSE;
1997
1998 rent->srel = sreloc;
1999 rent->rtype = r_type;
2000 rent->count = 1;
2001 rent->reltext = (sec->flags & SEC_READONLY) != 0;
2002
2003 rent->next = h->reloc_entries;
2004 h->reloc_entries = rent;
2005 }
2006 else
2007 rent->count++;
2008 }
2009 else if (bfd_link_pic (info))
2010 {
2011 /* If this is a shared library, and the section is to be
2012 loaded into memory, we need a RELATIVE reloc. */
2013 sreloc->size += sizeof (Elf64_External_Rela);
2014 if (sec->flags & SEC_READONLY)
2015 info->flags |= DF_TEXTREL;
2016 }
2017 }
2018 }
2019
2020 return TRUE;
2021 }
2022
2023 /* Return the section that should be marked against GC for a given
2024 relocation. */
2025
2026 static asection *
2027 elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2028 Elf_Internal_Rela *rel,
2029 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2030 {
2031 /* These relocations don't really reference a symbol. Instead we store
2032 extra data in their addend slot. Ignore the symbol. */
2033 switch (ELF64_R_TYPE (rel->r_info))
2034 {
2035 case R_ALPHA_LITUSE:
2036 case R_ALPHA_GPDISP:
2037 case R_ALPHA_HINT:
2038 return NULL;
2039 }
2040
2041 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2042 }
2043
2044 /* Adjust a symbol defined by a dynamic object and referenced by a
2045 regular object. The current definition is in some section of the
2046 dynamic object, but we're not including those sections. We have to
2047 change the definition to something the rest of the link can
2048 understand. */
2049
2050 static bfd_boolean
2051 elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2052 struct elf_link_hash_entry *h)
2053 {
2054 bfd *dynobj;
2055 asection *s;
2056 struct alpha_elf_link_hash_entry *ah;
2057
2058 dynobj = elf_hash_table(info)->dynobj;
2059 ah = (struct alpha_elf_link_hash_entry *)h;
2060
2061 /* Now that we've seen all of the input symbols, finalize our decision
2062 about whether this symbol should get a .plt entry. Irritatingly, it
2063 is common for folk to leave undefined symbols in shared libraries,
2064 and they still expect lazy binding; accept undefined symbols in lieu
2065 of STT_FUNC. */
2066 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
2067 {
2068 h->needs_plt = TRUE;
2069
2070 s = elf_hash_table(info)->splt;
2071 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2072 return FALSE;
2073
2074 /* We need one plt entry per got subsection. Delay allocation of
2075 the actual plt entries until size_plt_section, called from
2076 size_dynamic_sections or during relaxation. */
2077
2078 return TRUE;
2079 }
2080 else
2081 h->needs_plt = FALSE;
2082
2083 /* If this is a weak symbol, and there is a real definition, the
2084 processor independent code will have arranged for us to see the
2085 real definition first, and we can just use the same value. */
2086 if (h->is_weakalias)
2087 {
2088 struct elf_link_hash_entry *def = weakdef (h);
2089 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2090 h->root.u.def.section = def->root.u.def.section;
2091 h->root.u.def.value = def->root.u.def.value;
2092 return TRUE;
2093 }
2094
2095 /* This is a reference to a symbol defined by a dynamic object which
2096 is not a function. The Alpha, since it uses .got entries for all
2097 symbols even in regular objects, does not need the hackery of a
2098 .dynbss section and COPY dynamic relocations. */
2099
2100 return TRUE;
2101 }
2102
2103 /* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2104
2105 static void
2106 elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2107 const Elf_Internal_Sym *isym,
2108 bfd_boolean definition,
2109 bfd_boolean dynamic)
2110 {
2111 if (!dynamic && definition)
2112 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2113 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2114 }
2115
2116 /* Symbol versioning can create new symbols, and make our old symbols
2117 indirect to the new ones. Consolidate the got and reloc information
2118 in these situations. */
2119
2120 static void
2121 elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2122 struct elf_link_hash_entry *dir,
2123 struct elf_link_hash_entry *ind)
2124 {
2125 struct alpha_elf_link_hash_entry *hi
2126 = (struct alpha_elf_link_hash_entry *) ind;
2127 struct alpha_elf_link_hash_entry *hs
2128 = (struct alpha_elf_link_hash_entry *) dir;
2129
2130 /* Do the merging in the superclass. */
2131 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
2132
2133 /* Merge the flags. Whee. */
2134 hs->flags |= hi->flags;
2135
2136 /* ??? It's unclear to me what's really supposed to happen when
2137 "merging" defweak and defined symbols, given that we don't
2138 actually throw away the defweak. This more-or-less copies
2139 the logic related to got and plt entries in the superclass. */
2140 if (ind->root.type != bfd_link_hash_indirect)
2141 return;
2142
2143 /* Merge the .got entries. Cannibalize the old symbol's list in
2144 doing so, since we don't need it anymore. */
2145
2146 if (hs->got_entries == NULL)
2147 hs->got_entries = hi->got_entries;
2148 else
2149 {
2150 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2151
2152 gsh = hs->got_entries;
2153 for (gi = hi->got_entries; gi ; gi = gin)
2154 {
2155 gin = gi->next;
2156 for (gs = gsh; gs ; gs = gs->next)
2157 if (gi->gotobj == gs->gotobj
2158 && gi->reloc_type == gs->reloc_type
2159 && gi->addend == gs->addend)
2160 {
2161 gs->use_count += gi->use_count;
2162 goto got_found;
2163 }
2164 gi->next = hs->got_entries;
2165 hs->got_entries = gi;
2166 got_found:;
2167 }
2168 }
2169 hi->got_entries = NULL;
2170
2171 /* And similar for the reloc entries. */
2172
2173 if (hs->reloc_entries == NULL)
2174 hs->reloc_entries = hi->reloc_entries;
2175 else
2176 {
2177 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2178
2179 rsh = hs->reloc_entries;
2180 for (ri = hi->reloc_entries; ri ; ri = rin)
2181 {
2182 rin = ri->next;
2183 for (rs = rsh; rs ; rs = rs->next)
2184 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2185 {
2186 rs->count += ri->count;
2187 goto found_reloc;
2188 }
2189 ri->next = hs->reloc_entries;
2190 hs->reloc_entries = ri;
2191 found_reloc:;
2192 }
2193 }
2194 hi->reloc_entries = NULL;
2195 }
2196
2197 /* Is it possible to merge two object file's .got tables? */
2198
2199 static bfd_boolean
2200 elf64_alpha_can_merge_gots (bfd *a, bfd *b)
2201 {
2202 int total = alpha_elf_tdata (a)->total_got_size;
2203 bfd *bsub;
2204
2205 /* Trivial quick fallout test. */
2206 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2207 return TRUE;
2208
2209 /* By their nature, local .got entries cannot be merged. */
2210 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
2211 return FALSE;
2212
2213 /* Failing the common trivial comparison, we must effectively
2214 perform the merge. Not actually performing the merge means that
2215 we don't have to store undo information in case we fail. */
2216 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2217 {
2218 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2219 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2220 int i, n;
2221
2222 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2223 for (i = 0; i < n; ++i)
2224 {
2225 struct alpha_elf_got_entry *ae, *be;
2226 struct alpha_elf_link_hash_entry *h;
2227
2228 h = hashes[i];
2229 while (h->root.root.type == bfd_link_hash_indirect
2230 || h->root.root.type == bfd_link_hash_warning)
2231 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2232
2233 for (be = h->got_entries; be ; be = be->next)
2234 {
2235 if (be->use_count == 0)
2236 continue;
2237 if (be->gotobj != b)
2238 continue;
2239
2240 for (ae = h->got_entries; ae ; ae = ae->next)
2241 if (ae->gotobj == a
2242 && ae->reloc_type == be->reloc_type
2243 && ae->addend == be->addend)
2244 goto global_found;
2245
2246 total += alpha_got_entry_size (be->reloc_type);
2247 if (total > MAX_GOT_SIZE)
2248 return FALSE;
2249 global_found:;
2250 }
2251 }
2252 }
2253
2254 return TRUE;
2255 }
2256
2257 /* Actually merge two .got tables. */
2258
2259 static void
2260 elf64_alpha_merge_gots (bfd *a, bfd *b)
2261 {
2262 int total = alpha_elf_tdata (a)->total_got_size;
2263 bfd *bsub;
2264
2265 /* Remember local expansion. */
2266 {
2267 int e = alpha_elf_tdata (b)->local_got_size;
2268 total += e;
2269 alpha_elf_tdata (a)->local_got_size += e;
2270 }
2271
2272 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2273 {
2274 struct alpha_elf_got_entry **local_got_entries;
2275 struct alpha_elf_link_hash_entry **hashes;
2276 Elf_Internal_Shdr *symtab_hdr;
2277 int i, n;
2278
2279 /* Let the local .got entries know they are part of a new subsegment. */
2280 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2281 if (local_got_entries)
2282 {
2283 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2284 for (i = 0; i < n; ++i)
2285 {
2286 struct alpha_elf_got_entry *ent;
2287 for (ent = local_got_entries[i]; ent; ent = ent->next)
2288 ent->gotobj = a;
2289 }
2290 }
2291
2292 /* Merge the global .got entries. */
2293 hashes = alpha_elf_sym_hashes (bsub);
2294 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2295
2296 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2297 for (i = 0; i < n; ++i)
2298 {
2299 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2300 struct alpha_elf_link_hash_entry *h;
2301
2302 h = hashes[i];
2303 while (h->root.root.type == bfd_link_hash_indirect
2304 || h->root.root.type == bfd_link_hash_warning)
2305 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2306
2307 pbe = start = &h->got_entries;
2308 while ((be = *pbe) != NULL)
2309 {
2310 if (be->use_count == 0)
2311 {
2312 *pbe = be->next;
2313 memset (be, 0xa5, sizeof (*be));
2314 goto kill;
2315 }
2316 if (be->gotobj != b)
2317 goto next;
2318
2319 for (ae = *start; ae ; ae = ae->next)
2320 if (ae->gotobj == a
2321 && ae->reloc_type == be->reloc_type
2322 && ae->addend == be->addend)
2323 {
2324 ae->flags |= be->flags;
2325 ae->use_count += be->use_count;
2326 *pbe = be->next;
2327 memset (be, 0xa5, sizeof (*be));
2328 goto kill;
2329 }
2330 be->gotobj = a;
2331 total += alpha_got_entry_size (be->reloc_type);
2332
2333 next:;
2334 pbe = &be->next;
2335 kill:;
2336 }
2337 }
2338
2339 alpha_elf_tdata (bsub)->gotobj = a;
2340 }
2341 alpha_elf_tdata (a)->total_got_size = total;
2342
2343 /* Merge the two in_got chains. */
2344 {
2345 bfd *next;
2346
2347 bsub = a;
2348 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2349 bsub = next;
2350
2351 alpha_elf_tdata (bsub)->in_got_link_next = b;
2352 }
2353 }
2354
2355 /* Calculate the offsets for the got entries. */
2356
2357 static bfd_boolean
2358 elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2359 void * arg ATTRIBUTE_UNUSED)
2360 {
2361 struct alpha_elf_got_entry *gotent;
2362
2363 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2364 if (gotent->use_count > 0)
2365 {
2366 struct alpha_elf_obj_tdata *td;
2367 bfd_size_type *plge;
2368
2369 td = alpha_elf_tdata (gotent->gotobj);
2370 plge = &td->got->size;
2371 gotent->got_offset = *plge;
2372 *plge += alpha_got_entry_size (gotent->reloc_type);
2373 }
2374
2375 return TRUE;
2376 }
2377
2378 static void
2379 elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2380 {
2381 bfd *i, *got_list;
2382 struct alpha_elf_link_hash_table * htab;
2383
2384 htab = alpha_elf_hash_table (info);
2385 if (htab == NULL)
2386 return;
2387 got_list = htab->got_list;
2388
2389 /* First, zero out the .got sizes, as we may be recalculating the
2390 .got after optimizing it. */
2391 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2392 alpha_elf_tdata(i)->got->size = 0;
2393
2394 /* Next, fill in the offsets for all the global entries. */
2395 alpha_elf_link_hash_traverse (htab,
2396 elf64_alpha_calc_got_offsets_for_symbol,
2397 NULL);
2398
2399 /* Finally, fill in the offsets for the local entries. */
2400 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2401 {
2402 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2403 bfd *j;
2404
2405 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2406 {
2407 struct alpha_elf_got_entry **local_got_entries, *gotent;
2408 int k, n;
2409
2410 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2411 if (!local_got_entries)
2412 continue;
2413
2414 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2415 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2416 if (gotent->use_count > 0)
2417 {
2418 gotent->got_offset = got_offset;
2419 got_offset += alpha_got_entry_size (gotent->reloc_type);
2420 }
2421 }
2422
2423 alpha_elf_tdata(i)->got->size = got_offset;
2424 }
2425 }
2426
2427 /* Constructs the gots. */
2428
2429 static bfd_boolean
2430 elf64_alpha_size_got_sections (struct bfd_link_info *info,
2431 bfd_boolean may_merge)
2432 {
2433 bfd *i, *got_list, *cur_got_obj = NULL;
2434 struct alpha_elf_link_hash_table * htab;
2435
2436 htab = alpha_elf_hash_table (info);
2437 if (htab == NULL)
2438 return FALSE;
2439 got_list = htab->got_list;
2440
2441 /* On the first time through, pretend we have an existing got list
2442 consisting of all of the input files. */
2443 if (got_list == NULL)
2444 {
2445 for (i = info->input_bfds; i ; i = i->link.next)
2446 {
2447 bfd *this_got;
2448
2449 if (! is_alpha_elf (i))
2450 continue;
2451
2452 this_got = alpha_elf_tdata (i)->gotobj;
2453 if (this_got == NULL)
2454 continue;
2455
2456 /* We are assuming no merging has yet occurred. */
2457 BFD_ASSERT (this_got == i);
2458
2459 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
2460 {
2461 /* Yikes! A single object file has too many entries. */
2462 _bfd_error_handler
2463 /* xgettext:c-format */
2464 (_("%pB: .got subsegment exceeds 64K (size %d)"),
2465 i, alpha_elf_tdata (this_got)->total_got_size);
2466 return FALSE;
2467 }
2468
2469 if (got_list == NULL)
2470 got_list = this_got;
2471 else
2472 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2473 cur_got_obj = this_got;
2474 }
2475
2476 /* Strange degenerate case of no got references. */
2477 if (got_list == NULL)
2478 return TRUE;
2479
2480 htab->got_list = got_list;
2481 }
2482
2483 cur_got_obj = got_list;
2484 if (cur_got_obj == NULL)
2485 return FALSE;
2486
2487 if (may_merge)
2488 {
2489 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2490 while (i != NULL)
2491 {
2492 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2493 {
2494 elf64_alpha_merge_gots (cur_got_obj, i);
2495
2496 alpha_elf_tdata(i)->got->size = 0;
2497 i = alpha_elf_tdata(i)->got_link_next;
2498 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2499 }
2500 else
2501 {
2502 cur_got_obj = i;
2503 i = alpha_elf_tdata(i)->got_link_next;
2504 }
2505 }
2506 }
2507
2508 /* Once the gots have been merged, fill in the got offsets for
2509 everything therein. */
2510 elf64_alpha_calc_got_offsets (info);
2511
2512 return TRUE;
2513 }
2514
2515 static bfd_boolean
2516 elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2517 void * data)
2518 {
2519 asection *splt = (asection *) data;
2520 struct alpha_elf_got_entry *gotent;
2521 bfd_boolean saw_one = FALSE;
2522
2523 /* If we didn't need an entry before, we still don't. */
2524 if (!h->root.needs_plt)
2525 return TRUE;
2526
2527 /* For each LITERAL got entry still in use, allocate a plt entry. */
2528 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2529 if (gotent->reloc_type == R_ALPHA_LITERAL
2530 && gotent->use_count > 0)
2531 {
2532 if (splt->size == 0)
2533 splt->size = PLT_HEADER_SIZE;
2534 gotent->plt_offset = splt->size;
2535 splt->size += PLT_ENTRY_SIZE;
2536 saw_one = TRUE;
2537 }
2538
2539 /* If there weren't any, there's no longer a need for the PLT entry. */
2540 if (!saw_one)
2541 h->root.needs_plt = FALSE;
2542
2543 return TRUE;
2544 }
2545
2546 /* Called from relax_section to rebuild the PLT in light of potential changes
2547 in the function's status. */
2548
2549 static void
2550 elf64_alpha_size_plt_section (struct bfd_link_info *info)
2551 {
2552 asection *splt, *spltrel, *sgotplt;
2553 unsigned long entries;
2554 struct alpha_elf_link_hash_table * htab;
2555
2556 htab = alpha_elf_hash_table (info);
2557 if (htab == NULL)
2558 return;
2559
2560 splt = elf_hash_table(info)->splt;
2561 if (splt == NULL)
2562 return;
2563
2564 splt->size = 0;
2565
2566 alpha_elf_link_hash_traverse (htab,
2567 elf64_alpha_size_plt_section_1, splt);
2568
2569 /* Every plt entry requires a JMP_SLOT relocation. */
2570 spltrel = elf_hash_table(info)->srelplt;
2571 entries = 0;
2572 if (splt->size)
2573 {
2574 if (elf64_alpha_use_secureplt)
2575 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2576 else
2577 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2578 }
2579 spltrel->size = entries * sizeof (Elf64_External_Rela);
2580
2581 /* When using the secureplt, we need two words somewhere in the data
2582 segment for the dynamic linker to tell us where to go. This is the
2583 entire contents of the .got.plt section. */
2584 if (elf64_alpha_use_secureplt)
2585 {
2586 sgotplt = elf_hash_table(info)->sgotplt;
2587 sgotplt->size = entries ? 16 : 0;
2588 }
2589 }
2590
2591 static bfd_boolean
2592 elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2593 struct bfd_link_info *info)
2594 {
2595 bfd *i;
2596 struct alpha_elf_link_hash_table * htab;
2597
2598 if (bfd_link_relocatable (info))
2599 return TRUE;
2600
2601 htab = alpha_elf_hash_table (info);
2602 if (htab == NULL)
2603 return FALSE;
2604
2605 if (!elf64_alpha_size_got_sections (info, TRUE))
2606 return FALSE;
2607
2608 /* Allocate space for all of the .got subsections. */
2609 i = htab->got_list;
2610 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
2611 {
2612 asection *s = alpha_elf_tdata(i)->got;
2613 if (s->size > 0)
2614 {
2615 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2616 if (s->contents == NULL)
2617 return FALSE;
2618 }
2619 }
2620
2621 return TRUE;
2622 }
2623
2624 /* The number of dynamic relocations required by a static relocation. */
2625
2626 static int
2627 alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
2628 {
2629 switch (r_type)
2630 {
2631 /* May appear in GOT entries. */
2632 case R_ALPHA_TLSGD:
2633 return (dynamic ? 2 : shared ? 1 : 0);
2634 case R_ALPHA_TLSLDM:
2635 return shared;
2636 case R_ALPHA_LITERAL:
2637 return dynamic || shared;
2638 case R_ALPHA_GOTTPREL:
2639 return dynamic || (shared && !pie);
2640 case R_ALPHA_GOTDTPREL:
2641 return dynamic;
2642
2643 /* May appear in data sections. */
2644 case R_ALPHA_REFLONG:
2645 case R_ALPHA_REFQUAD:
2646 return dynamic || shared;
2647 case R_ALPHA_TPREL64:
2648 return dynamic || (shared && !pie);
2649
2650 /* Everything else is illegal. We'll issue an error during
2651 relocate_section. */
2652 default:
2653 return 0;
2654 }
2655 }
2656
2657 /* Work out the sizes of the dynamic relocation entries. */
2658
2659 static bfd_boolean
2660 elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2661 struct bfd_link_info *info)
2662 {
2663 bfd_boolean dynamic;
2664 struct alpha_elf_reloc_entry *relent;
2665 unsigned long entries;
2666
2667 /* If the symbol was defined as a common symbol in a regular object
2668 file, and there was no definition in any dynamic object, then the
2669 linker will have allocated space for the symbol in a common
2670 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2671 set. This is done for dynamic symbols in
2672 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2673 symbols, somehow. */
2674 if (!h->root.def_regular
2675 && h->root.ref_regular
2676 && !h->root.def_dynamic
2677 && (h->root.root.type == bfd_link_hash_defined
2678 || h->root.root.type == bfd_link_hash_defweak)
2679 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2680 h->root.def_regular = 1;
2681
2682 /* If the symbol is dynamic, we'll need all the relocations in their
2683 natural form. If this is a shared object, and it has been forced
2684 local, we'll need the same number of RELATIVE relocations. */
2685 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2686
2687 /* If the symbol is a hidden undefined weak, then we never have any
2688 relocations. Avoid the loop which may want to add RELATIVE relocs
2689 based on bfd_link_pic (info). */
2690 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2691 return TRUE;
2692
2693 for (relent = h->reloc_entries; relent; relent = relent->next)
2694 {
2695 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
2696 bfd_link_pic (info),
2697 bfd_link_pie (info));
2698 if (entries)
2699 {
2700 relent->srel->size +=
2701 entries * sizeof (Elf64_External_Rela) * relent->count;
2702 if (relent->reltext)
2703 info->flags |= DT_TEXTREL;
2704 }
2705 }
2706
2707 return TRUE;
2708 }
2709
2710 /* Subroutine of elf64_alpha_size_rela_got_section for doing the
2711 global symbols. */
2712
2713 static bfd_boolean
2714 elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2715 struct bfd_link_info *info)
2716 {
2717 bfd_boolean dynamic;
2718 struct alpha_elf_got_entry *gotent;
2719 unsigned long entries;
2720
2721 /* If we're using a plt for this symbol, then all of its relocations
2722 for its got entries go into .rela.plt. */
2723 if (h->root.needs_plt)
2724 return TRUE;
2725
2726 /* If the symbol is dynamic, we'll need all the relocations in their
2727 natural form. If this is a shared object, and it has been forced
2728 local, we'll need the same number of RELATIVE relocations. */
2729 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2730
2731 /* If the symbol is a hidden undefined weak, then we never have any
2732 relocations. Avoid the loop which may want to add RELATIVE relocs
2733 based on bfd_link_pic (info). */
2734 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2735 return TRUE;
2736
2737 entries = 0;
2738 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2739 if (gotent->use_count > 0)
2740 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
2741 bfd_link_pic (info),
2742 bfd_link_pie (info));
2743
2744 if (entries > 0)
2745 {
2746 asection *srel = elf_hash_table(info)->srelgot;
2747 BFD_ASSERT (srel != NULL);
2748 srel->size += sizeof (Elf64_External_Rela) * entries;
2749 }
2750
2751 return TRUE;
2752 }
2753
2754 /* Set the sizes of the dynamic relocation sections. */
2755
2756 static void
2757 elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
2758 {
2759 unsigned long entries;
2760 bfd *i;
2761 asection *srel;
2762 struct alpha_elf_link_hash_table * htab;
2763
2764 htab = alpha_elf_hash_table (info);
2765 if (htab == NULL)
2766 return;
2767
2768 /* Shared libraries often require RELATIVE relocs, and some relocs
2769 require attention for the main application as well. */
2770
2771 entries = 0;
2772 for (i = htab->got_list;
2773 i ; i = alpha_elf_tdata(i)->got_link_next)
2774 {
2775 bfd *j;
2776
2777 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2778 {
2779 struct alpha_elf_got_entry **local_got_entries, *gotent;
2780 int k, n;
2781
2782 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2783 if (!local_got_entries)
2784 continue;
2785
2786 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2787 for (gotent = local_got_entries[k];
2788 gotent ; gotent = gotent->next)
2789 if (gotent->use_count > 0)
2790 entries += (alpha_dynamic_entries_for_reloc
2791 (gotent->reloc_type, 0, bfd_link_pic (info),
2792 bfd_link_pie (info)));
2793 }
2794 }
2795
2796 srel = elf_hash_table(info)->srelgot;
2797 if (!srel)
2798 {
2799 BFD_ASSERT (entries == 0);
2800 return;
2801 }
2802 srel->size = sizeof (Elf64_External_Rela) * entries;
2803
2804 /* Now do the non-local symbols. */
2805 alpha_elf_link_hash_traverse (htab,
2806 elf64_alpha_size_rela_got_1, info);
2807 }
2808
2809 /* Set the sizes of the dynamic sections. */
2810
2811 static bfd_boolean
2812 elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2813 struct bfd_link_info *info)
2814 {
2815 bfd *dynobj;
2816 asection *s;
2817 bfd_boolean relplt, relocs;
2818 struct alpha_elf_link_hash_table * htab;
2819
2820 htab = alpha_elf_hash_table (info);
2821 if (htab == NULL)
2822 return FALSE;
2823
2824 dynobj = elf_hash_table(info)->dynobj;
2825 BFD_ASSERT(dynobj != NULL);
2826
2827 if (elf_hash_table (info)->dynamic_sections_created)
2828 {
2829 /* Set the contents of the .interp section to the interpreter. */
2830 if (bfd_link_executable (info) && !info->nointerp)
2831 {
2832 s = bfd_get_linker_section (dynobj, ".interp");
2833 BFD_ASSERT (s != NULL);
2834 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2835 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2836 }
2837
2838 /* Now that we've seen all of the input files, we can decide which
2839 symbols need dynamic relocation entries and which don't. We've
2840 collected information in check_relocs that we can now apply to
2841 size the dynamic relocation sections. */
2842 alpha_elf_link_hash_traverse (htab,
2843 elf64_alpha_calc_dynrel_sizes, info);
2844
2845 elf64_alpha_size_rela_got_section (info);
2846 elf64_alpha_size_plt_section (info);
2847 }
2848 /* else we're not dynamic and by definition we don't need such things. */
2849
2850 /* The check_relocs and adjust_dynamic_symbol entry points have
2851 determined the sizes of the various dynamic sections. Allocate
2852 memory for them. */
2853 relplt = FALSE;
2854 relocs = FALSE;
2855 for (s = dynobj->sections; s != NULL; s = s->next)
2856 {
2857 const char *name;
2858
2859 if (!(s->flags & SEC_LINKER_CREATED))
2860 continue;
2861
2862 /* It's OK to base decisions on the section name, because none
2863 of the dynobj section names depend upon the input files. */
2864 name = bfd_section_name (s);
2865
2866 if (CONST_STRNEQ (name, ".rela"))
2867 {
2868 if (s->size != 0)
2869 {
2870 if (strcmp (name, ".rela.plt") == 0)
2871 relplt = TRUE;
2872 else
2873 relocs = TRUE;
2874
2875 /* We use the reloc_count field as a counter if we need
2876 to copy relocs into the output file. */
2877 s->reloc_count = 0;
2878 }
2879 }
2880 else if (! CONST_STRNEQ (name, ".got")
2881 && strcmp (name, ".plt") != 0
2882 && strcmp (name, ".dynbss") != 0)
2883 {
2884 /* It's not one of our dynamic sections, so don't allocate space. */
2885 continue;
2886 }
2887
2888 if (s->size == 0)
2889 {
2890 /* If we don't need this section, strip it from the output file.
2891 This is to handle .rela.bss and .rela.plt. We must create it
2892 in create_dynamic_sections, because it must be created before
2893 the linker maps input sections to output sections. The
2894 linker does that before adjust_dynamic_symbol is called, and
2895 it is that function which decides whether anything needs to
2896 go into these sections. */
2897 if (!CONST_STRNEQ (name, ".got"))
2898 s->flags |= SEC_EXCLUDE;
2899 }
2900 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
2901 {
2902 /* Allocate memory for the section contents. */
2903 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2904 if (s->contents == NULL)
2905 return FALSE;
2906 }
2907 }
2908
2909 if (elf_hash_table (info)->dynamic_sections_created)
2910 {
2911 /* Add some entries to the .dynamic section. We fill in the
2912 values later, in elf64_alpha_finish_dynamic_sections, but we
2913 must add the entries now so that we get the correct size for
2914 the .dynamic section. The DT_DEBUG entry is filled in by the
2915 dynamic linker and used by the debugger. */
2916 #define add_dynamic_entry(TAG, VAL) \
2917 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2918
2919 if (bfd_link_executable (info))
2920 {
2921 if (!add_dynamic_entry (DT_DEBUG, 0))
2922 return FALSE;
2923 }
2924
2925 if (relplt)
2926 {
2927 if (!add_dynamic_entry (DT_PLTGOT, 0)
2928 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2929 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2930 || !add_dynamic_entry (DT_JMPREL, 0))
2931 return FALSE;
2932
2933 if (elf64_alpha_use_secureplt
2934 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2935 return FALSE;
2936 }
2937
2938 if (relocs)
2939 {
2940 if (!add_dynamic_entry (DT_RELA, 0)
2941 || !add_dynamic_entry (DT_RELASZ, 0)
2942 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2943 return FALSE;
2944
2945 if (info->flags & DF_TEXTREL)
2946 {
2947 if (!add_dynamic_entry (DT_TEXTREL, 0))
2948 return FALSE;
2949 }
2950 }
2951 }
2952 #undef add_dynamic_entry
2953
2954 return TRUE;
2955 }
2956 \f
2957 /* These functions do relaxation for Alpha ELF.
2958
2959 Currently I'm only handling what I can do with existing compiler
2960 and assembler support, which means no instructions are removed,
2961 though some may be nopped. At this time GCC does not emit enough
2962 information to do all of the relaxing that is possible. It will
2963 take some not small amount of work for that to happen.
2964
2965 There are a couple of interesting papers that I once read on this
2966 subject, that I cannot find references to at the moment, that
2967 related to Alpha in particular. They are by David Wall, then of
2968 DEC WRL. */
2969
2970 struct alpha_relax_info
2971 {
2972 bfd *abfd;
2973 asection *sec;
2974 bfd_byte *contents;
2975 Elf_Internal_Shdr *symtab_hdr;
2976 Elf_Internal_Rela *relocs, *relend;
2977 struct bfd_link_info *link_info;
2978 bfd_vma gp;
2979 bfd *gotobj;
2980 asection *tsec;
2981 struct alpha_elf_link_hash_entry *h;
2982 struct alpha_elf_got_entry **first_gotent;
2983 struct alpha_elf_got_entry *gotent;
2984 bfd_boolean changed_contents;
2985 bfd_boolean changed_relocs;
2986 unsigned char other;
2987 };
2988
2989 static Elf_Internal_Rela *
2990 elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2991 Elf_Internal_Rela *relend,
2992 bfd_vma offset, int type)
2993 {
2994 while (rel < relend)
2995 {
2996 if (rel->r_offset == offset
2997 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2998 return rel;
2999 ++rel;
3000 }
3001 return NULL;
3002 }
3003
3004 static bfd_boolean
3005 elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3006 Elf_Internal_Rela *irel, unsigned long r_type)
3007 {
3008 unsigned int insn;
3009 bfd_signed_vma disp;
3010
3011 /* Get the instruction. */
3012 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
3013
3014 if (insn >> 26 != OP_LDQ)
3015 {
3016 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
3017 _bfd_error_handler
3018 /* xgettext:c-format */
3019 (_("%pB: %pA+%#" PRIx64 ": warning: "
3020 "%s relocation against unexpected insn"),
3021 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
3022 return TRUE;
3023 }
3024
3025 /* Can't relax dynamic symbols. */
3026 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3027 return TRUE;
3028
3029 /* Can't use local-exec relocations in shared libraries. */
3030 if (r_type == R_ALPHA_GOTTPREL
3031 && bfd_link_dll (info->link_info))
3032 return TRUE;
3033
3034 if (r_type == R_ALPHA_LITERAL)
3035 {
3036 /* Look for nice constant addresses. This includes the not-uncommon
3037 special case of 0 for undefweak symbols. */
3038 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3039 || (!bfd_link_pic (info->link_info)
3040 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3041 {
3042 disp = 0;
3043 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3044 insn |= (symval & 0xffff);
3045 r_type = R_ALPHA_NONE;
3046 }
3047 else
3048 {
3049 /* We may only create GPREL relocs during the second pass. */
3050 if (info->link_info->relax_pass == 0)
3051 return TRUE;
3052
3053 disp = symval - info->gp;
3054 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3055 r_type = R_ALPHA_GPREL16;
3056 }
3057 }
3058 else
3059 {
3060 bfd_vma dtp_base, tp_base;
3061
3062 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3063 dtp_base = alpha_get_dtprel_base (info->link_info);
3064 tp_base = alpha_get_tprel_base (info->link_info);
3065 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
3066
3067 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3068
3069 switch (r_type)
3070 {
3071 case R_ALPHA_GOTDTPREL:
3072 r_type = R_ALPHA_DTPREL16;
3073 break;
3074 case R_ALPHA_GOTTPREL:
3075 r_type = R_ALPHA_TPREL16;
3076 break;
3077 default:
3078 BFD_ASSERT (0);
3079 return FALSE;
3080 }
3081 }
3082
3083 if (disp < -0x8000 || disp >= 0x8000)
3084 return TRUE;
3085
3086 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3087 info->changed_contents = TRUE;
3088
3089 /* Reduce the use count on this got entry by one, possibly
3090 eliminating it. */
3091 if (--info->gotent->use_count == 0)
3092 {
3093 int sz = alpha_got_entry_size (r_type);
3094 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3095 if (!info->h)
3096 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3097 }
3098
3099 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3100 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3101 info->changed_relocs = TRUE;
3102
3103 /* ??? Search forward through this basic block looking for insns
3104 that use the target register. Stop after an insn modifying the
3105 register is seen, or after a branch or call.
3106
3107 Any such memory load insn may be substituted by a load directly
3108 off the GP. This allows the memory load insn to be issued before
3109 the calculated GP register would otherwise be ready.
3110
3111 Any such jsr insn can be replaced by a bsr if it is in range.
3112
3113 This would mean that we'd have to _add_ relocations, the pain of
3114 which gives one pause. */
3115
3116 return TRUE;
3117 }
3118
3119 static bfd_vma
3120 elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
3121 {
3122 /* If the function has the same gp, and we can identify that the
3123 function does not use its function pointer, we can eliminate the
3124 address load. */
3125
3126 /* If the symbol is marked NOPV, we are being told the function never
3127 needs its procedure value. */
3128 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3129 return symval;
3130
3131 /* If the symbol is marked STD_GP, we are being told the function does
3132 a normal ldgp in the first two words. */
3133 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3134 ;
3135
3136 /* Otherwise, we may be able to identify a GP load in the first two
3137 words, which we can then skip. */
3138 else
3139 {
3140 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3141 bfd_vma ofs;
3142
3143 /* Load the relocations from the section that the target symbol is in. */
3144 if (info->sec == info->tsec)
3145 {
3146 tsec_relocs = info->relocs;
3147 tsec_relend = info->relend;
3148 tsec_free = NULL;
3149 }
3150 else
3151 {
3152 tsec_relocs = (_bfd_elf_link_read_relocs
3153 (info->abfd, info->tsec, NULL,
3154 (Elf_Internal_Rela *) NULL,
3155 info->link_info->keep_memory));
3156 if (tsec_relocs == NULL)
3157 return 0;
3158 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3159 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3160 ? NULL
3161 : tsec_relocs);
3162 }
3163
3164 /* Recover the symbol's offset within the section. */
3165 ofs = (symval - info->tsec->output_section->vma
3166 - info->tsec->output_offset);
3167
3168 /* Look for a GPDISP reloc. */
3169 gpdisp = (elf64_alpha_find_reloc_at_ofs
3170 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
3171
3172 if (!gpdisp || gpdisp->r_addend != 4)
3173 {
3174 if (tsec_free)
3175 free (tsec_free);
3176 return 0;
3177 }
3178 if (tsec_free)
3179 free (tsec_free);
3180 }
3181
3182 /* We've now determined that we can skip an initial gp load. Verify
3183 that the call and the target use the same gp. */
3184 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
3185 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3186 return 0;
3187
3188 return symval + 8;
3189 }
3190
3191 static bfd_boolean
3192 elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3193 bfd_vma symval, Elf_Internal_Rela *irel)
3194 {
3195 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3196 int flags;
3197 bfd_signed_vma disp;
3198 bfd_boolean fits16;
3199 bfd_boolean fits32;
3200 bfd_boolean lit_reused = FALSE;
3201 bfd_boolean all_optimized = TRUE;
3202 bfd_boolean changed_contents;
3203 bfd_boolean changed_relocs;
3204 bfd_byte *contents = info->contents;
3205 bfd *abfd = info->abfd;
3206 bfd_vma sec_output_vma;
3207 unsigned int lit_insn;
3208 int relax_pass;
3209
3210 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
3211 if (lit_insn >> 26 != OP_LDQ)
3212 {
3213 _bfd_error_handler
3214 /* xgettext:c-format */
3215 (_("%pB: %pA+%#" PRIx64 ": warning: "
3216 "%s relocation against unexpected insn"),
3217 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
3218 return TRUE;
3219 }
3220
3221 /* Can't relax dynamic symbols. */
3222 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3223 return TRUE;
3224
3225 changed_contents = info->changed_contents;
3226 changed_relocs = info->changed_relocs;
3227 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3228 relax_pass = info->link_info->relax_pass;
3229
3230 /* Summarize how this particular LITERAL is used. */
3231 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
3232 {
3233 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
3234 break;
3235 if (erel->r_addend <= 6)
3236 flags |= 1 << erel->r_addend;
3237 }
3238
3239 /* A little preparation for the loop... */
3240 disp = symval - info->gp;
3241
3242 for (urel = irel+1; urel < erel; ++urel)
3243 {
3244 bfd_vma urel_r_offset = urel->r_offset;
3245 unsigned int insn;
3246 int insn_disp;
3247 bfd_signed_vma xdisp;
3248 Elf_Internal_Rela nrel;
3249
3250 insn = bfd_get_32 (abfd, contents + urel_r_offset);
3251
3252 switch (urel->r_addend)
3253 {
3254 case LITUSE_ALPHA_ADDR:
3255 default:
3256 /* This type is really just a placeholder to note that all
3257 uses cannot be optimized, but to still allow some. */
3258 all_optimized = FALSE;
3259 break;
3260
3261 case LITUSE_ALPHA_BASE:
3262 /* We may only create GPREL relocs during the second pass. */
3263 if (relax_pass == 0)
3264 {
3265 all_optimized = FALSE;
3266 break;
3267 }
3268
3269 /* We can always optimize 16-bit displacements. */
3270
3271 /* Extract the displacement from the instruction, sign-extending
3272 it if necessary, then test whether it is within 16 or 32 bits
3273 displacement from GP. */
3274 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3275
3276 xdisp = disp + insn_disp;
3277 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3278 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3279 && xdisp < 0x7fff8000);
3280
3281 if (fits16)
3282 {
3283 /* Take the op code and dest from this insn, take the base
3284 register from the literal insn. Leave the offset alone. */
3285 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
3286 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3287 changed_contents = TRUE;
3288
3289 nrel = *urel;
3290 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3291 R_ALPHA_GPREL16);
3292 nrel.r_addend = irel->r_addend;
3293
3294 /* As we adjust, move the reloc to the end so that we don't
3295 break the LITERAL+LITUSE chain. */
3296 if (urel < --erel)
3297 *urel-- = *erel;
3298 *erel = nrel;
3299 changed_relocs = TRUE;
3300 }
3301
3302 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3303 else if (fits32 && !(flags & ~6))
3304 {
3305 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
3306
3307 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3308 R_ALPHA_GPRELHIGH);
3309 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
3310 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
3311 lit_reused = TRUE;
3312 changed_contents = TRUE;
3313
3314 /* Since all relocs must be optimized, don't bother swapping
3315 this relocation to the end. */
3316 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3317 R_ALPHA_GPRELLOW);
3318 urel->r_addend = irel->r_addend;
3319 changed_relocs = TRUE;
3320 }
3321 else
3322 all_optimized = FALSE;
3323 break;
3324
3325 case LITUSE_ALPHA_BYTOFF:
3326 /* We can always optimize byte instructions. */
3327
3328 /* FIXME: sanity check the insn for byte op. Check that the
3329 literal dest reg is indeed Rb in the byte insn. */
3330
3331 insn &= ~ (unsigned) 0x001ff000;
3332 insn |= ((symval & 7) << 13) | 0x1000;
3333 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3334 changed_contents = TRUE;
3335
3336 nrel = *urel;
3337 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3338 nrel.r_addend = 0;
3339
3340 /* As we adjust, move the reloc to the end so that we don't
3341 break the LITERAL+LITUSE chain. */
3342 if (urel < --erel)
3343 *urel-- = *erel;
3344 *erel = nrel;
3345 changed_relocs = TRUE;
3346 break;
3347
3348 case LITUSE_ALPHA_JSR:
3349 case LITUSE_ALPHA_TLSGD:
3350 case LITUSE_ALPHA_TLSLDM:
3351 case LITUSE_ALPHA_JSRDIRECT:
3352 {
3353 bfd_vma optdest, org;
3354 bfd_signed_vma odisp;
3355
3356 /* For undefined weak symbols, we're mostly interested in getting
3357 rid of the got entry whenever possible, so optimize this to a
3358 use of the zero register. */
3359 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3360 {
3361 insn |= 31 << 16;
3362 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3363
3364 changed_contents = TRUE;
3365 break;
3366 }
3367
3368 /* If not zero, place to jump without needing pv. */
3369 optdest = elf64_alpha_relax_opt_call (info, symval);
3370 org = sec_output_vma + urel_r_offset + 4;
3371 odisp = (optdest ? optdest : symval) - org;
3372
3373 if (odisp >= -0x400000 && odisp < 0x400000)
3374 {
3375 Elf_Internal_Rela *xrel;
3376
3377 /* Preserve branch prediction call stack when possible. */
3378 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3379 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3380 else
3381 insn = (OP_BR << 26) | (insn & 0x03e00000);
3382 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3383 changed_contents = TRUE;
3384
3385 nrel = *urel;
3386 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3387 R_ALPHA_BRADDR);
3388 nrel.r_addend = irel->r_addend;
3389
3390 if (optdest)
3391 nrel.r_addend += optdest - symval;
3392 else
3393 all_optimized = FALSE;
3394
3395 /* Kill any HINT reloc that might exist for this insn. */
3396 xrel = (elf64_alpha_find_reloc_at_ofs
3397 (info->relocs, info->relend, urel_r_offset,
3398 R_ALPHA_HINT));
3399 if (xrel)
3400 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3401
3402 /* As we adjust, move the reloc to the end so that we don't
3403 break the LITERAL+LITUSE chain. */
3404 if (urel < --erel)
3405 *urel-- = *erel;
3406 *erel = nrel;
3407
3408 info->changed_relocs = TRUE;
3409 }
3410 else
3411 all_optimized = FALSE;
3412
3413 /* Even if the target is not in range for a direct branch,
3414 if we share a GP, we can eliminate the gp reload. */
3415 if (optdest)
3416 {
3417 Elf_Internal_Rela *gpdisp
3418 = (elf64_alpha_find_reloc_at_ofs
3419 (info->relocs, irelend, urel_r_offset + 4,
3420 R_ALPHA_GPDISP));
3421 if (gpdisp)
3422 {
3423 bfd_byte *p_ldah = contents + gpdisp->r_offset;
3424 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
3425 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3426 unsigned int lda = bfd_get_32 (abfd, p_lda);
3427
3428 /* Verify that the instruction is "ldah $29,0($26)".
3429 Consider a function that ends in a noreturn call,
3430 and that the next function begins with an ldgp,
3431 and that by accident there is no padding between.
3432 In that case the insn would use $27 as the base. */
3433 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3434 {
3435 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3436 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
3437
3438 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3439 changed_contents = TRUE;
3440 changed_relocs = TRUE;
3441 }
3442 }
3443 }
3444 }
3445 break;
3446 }
3447 }
3448
3449 /* If we reused the literal instruction, we must have optimized all. */
3450 BFD_ASSERT(!lit_reused || all_optimized);
3451
3452 /* If all cases were optimized, we can reduce the use count on this
3453 got entry by one, possibly eliminating it. */
3454 if (all_optimized)
3455 {
3456 if (--info->gotent->use_count == 0)
3457 {
3458 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3459 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3460 if (!info->h)
3461 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3462 }
3463
3464 /* If the literal instruction is no longer needed (it may have been
3465 reused. We can eliminate it. */
3466 /* ??? For now, I don't want to deal with compacting the section,
3467 so just nop it out. */
3468 if (!lit_reused)
3469 {
3470 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3471 changed_relocs = TRUE;
3472
3473 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3474 changed_contents = TRUE;
3475 }
3476 }
3477
3478 info->changed_contents = changed_contents;
3479 info->changed_relocs = changed_relocs;
3480
3481 if (all_optimized || relax_pass == 0)
3482 return TRUE;
3483 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
3484 }
3485
3486 static bfd_boolean
3487 elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3488 Elf_Internal_Rela *irel, bfd_boolean is_gd)
3489 {
3490 bfd_byte *pos[5];
3491 unsigned int insn, tlsgd_reg;
3492 Elf_Internal_Rela *gpdisp, *hint;
3493 bfd_boolean dynamic, use_gottprel;
3494 unsigned long new_symndx;
3495
3496 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
3497
3498 /* If a TLS symbol is accessed using IE at least once, there is no point
3499 to use dynamic model for it. */
3500 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3501 ;
3502
3503 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3504 then we might as well relax to IE. */
3505 else if (bfd_link_pic (info->link_info) && !dynamic
3506 && (info->link_info->flags & DF_STATIC_TLS))
3507 ;
3508
3509 /* Otherwise we must be building an executable to do anything. */
3510 else if (bfd_link_pic (info->link_info))
3511 return TRUE;
3512
3513 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3514 the matching LITUSE_TLS relocations. */
3515 if (irel + 2 >= info->relend)
3516 return TRUE;
3517 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3518 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3519 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3520 return TRUE;
3521
3522 /* There must be a GPDISP relocation positioned immediately after the
3523 LITUSE relocation. */
3524 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3525 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3526 if (!gpdisp)
3527 return TRUE;
3528
3529 pos[0] = info->contents + irel[0].r_offset;
3530 pos[1] = info->contents + irel[1].r_offset;
3531 pos[2] = info->contents + irel[2].r_offset;
3532 pos[3] = info->contents + gpdisp->r_offset;
3533 pos[4] = pos[3] + gpdisp->r_addend;
3534
3535 /* Beware of the compiler hoisting part of the sequence out a loop
3536 and adjusting the destination register for the TLSGD insn. If this
3537 happens, there will be a move into $16 before the JSR insn, so only
3538 transformations of the first insn pair should use this register. */
3539 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3540 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3541
3542 /* Generally, the positions are not allowed to be out of order, lest the
3543 modified insn sequence have different register lifetimes. We can make
3544 an exception when pos 1 is adjacent to pos 0. */
3545 if (pos[1] + 4 == pos[0])
3546 {
3547 bfd_byte *tmp = pos[0];
3548 pos[0] = pos[1];
3549 pos[1] = tmp;
3550 }
3551 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3552 return TRUE;
3553
3554 /* Reduce the use count on the LITERAL relocation. Do this before we
3555 smash the symndx when we adjust the relocations below. */
3556 {
3557 struct alpha_elf_got_entry *lit_gotent;
3558 struct alpha_elf_link_hash_entry *lit_h;
3559 unsigned long indx;
3560
3561 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3562 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3563 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
3564
3565 while (lit_h->root.root.type == bfd_link_hash_indirect
3566 || lit_h->root.root.type == bfd_link_hash_warning)
3567 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
3568
3569 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3570 lit_gotent = lit_gotent->next)
3571 if (lit_gotent->gotobj == info->gotobj
3572 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3573 && lit_gotent->addend == irel[1].r_addend)
3574 break;
3575 BFD_ASSERT (lit_gotent);
3576
3577 if (--lit_gotent->use_count == 0)
3578 {
3579 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3580 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3581 }
3582 }
3583
3584 /* Change
3585
3586 lda $16,x($gp) !tlsgd!1
3587 ldq $27,__tls_get_addr($gp) !literal!1
3588 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3589 ldah $29,0($26) !gpdisp!2
3590 lda $29,0($29) !gpdisp!2
3591 to
3592 ldq $16,x($gp) !gottprel
3593 unop
3594 call_pal rduniq
3595 addq $16,$0,$0
3596 unop
3597 or the first pair to
3598 lda $16,x($gp) !tprel
3599 unop
3600 or
3601 ldah $16,x($gp) !tprelhi
3602 lda $16,x($16) !tprello
3603
3604 as appropriate. */
3605
3606 use_gottprel = FALSE;
3607 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
3608
3609 /* Some compilers warn about a Boolean-looking expression being
3610 used in a switch. The explicit cast silences them. */
3611 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
3612 {
3613 case 1:
3614 {
3615 bfd_vma tp_base;
3616 bfd_signed_vma disp;
3617
3618 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3619 tp_base = alpha_get_tprel_base (info->link_info);
3620 disp = symval - tp_base;
3621
3622 if (disp >= -0x8000 && disp < 0x8000)
3623 {
3624 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
3625 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3626 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3627
3628 irel[0].r_offset = pos[0] - info->contents;
3629 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3630 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3631 break;
3632 }
3633 else if (disp >= -(bfd_signed_vma) 0x80000000
3634 && disp < (bfd_signed_vma) 0x7fff8000
3635 && pos[0] + 4 == pos[1])
3636 {
3637 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
3638 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3639 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
3640 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3641
3642 irel[0].r_offset = pos[0] - info->contents;
3643 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3644 irel[1].r_offset = pos[1] - info->contents;
3645 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3646 break;
3647 }
3648 }
3649 /* FALLTHRU */
3650
3651 default:
3652 use_gottprel = TRUE;
3653
3654 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
3655 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3656 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3657
3658 irel[0].r_offset = pos[0] - info->contents;
3659 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3660 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3661 break;
3662 }
3663
3664 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
3665
3666 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3667 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3668
3669 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
3670
3671 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3672 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3673
3674 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3675 irel[2].r_offset, R_ALPHA_HINT);
3676 if (hint)
3677 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3678
3679 info->changed_contents = TRUE;
3680 info->changed_relocs = TRUE;
3681
3682 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3683 if (--info->gotent->use_count == 0)
3684 {
3685 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3686 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3687 if (!info->h)
3688 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3689 }
3690
3691 /* If we've switched to a GOTTPREL relocation, increment the reference
3692 count on that got entry. */
3693 if (use_gottprel)
3694 {
3695 struct alpha_elf_got_entry *tprel_gotent;
3696
3697 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3698 tprel_gotent = tprel_gotent->next)
3699 if (tprel_gotent->gotobj == info->gotobj
3700 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3701 && tprel_gotent->addend == irel->r_addend)
3702 break;
3703 if (tprel_gotent)
3704 tprel_gotent->use_count++;
3705 else
3706 {
3707 if (info->gotent->use_count == 0)
3708 tprel_gotent = info->gotent;
3709 else
3710 {
3711 tprel_gotent = (struct alpha_elf_got_entry *)
3712 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3713 if (!tprel_gotent)
3714 return FALSE;
3715
3716 tprel_gotent->next = *info->first_gotent;
3717 *info->first_gotent = tprel_gotent;
3718
3719 tprel_gotent->gotobj = info->gotobj;
3720 tprel_gotent->addend = irel->r_addend;
3721 tprel_gotent->got_offset = -1;
3722 tprel_gotent->reloc_done = 0;
3723 tprel_gotent->reloc_xlated = 0;
3724 }
3725
3726 tprel_gotent->use_count = 1;
3727 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3728 }
3729 }
3730
3731 return TRUE;
3732 }
3733
3734 static bfd_boolean
3735 elf64_alpha_relax_section (bfd *abfd, asection *sec,
3736 struct bfd_link_info *link_info, bfd_boolean *again)
3737 {
3738 Elf_Internal_Shdr *symtab_hdr;
3739 Elf_Internal_Rela *internal_relocs;
3740 Elf_Internal_Rela *irel, *irelend;
3741 Elf_Internal_Sym *isymbuf = NULL;
3742 struct alpha_elf_got_entry **local_got_entries;
3743 struct alpha_relax_info info;
3744 struct alpha_elf_link_hash_table * htab;
3745 int relax_pass;
3746
3747 htab = alpha_elf_hash_table (link_info);
3748 if (htab == NULL)
3749 return FALSE;
3750
3751 /* There's nothing to change, yet. */
3752 *again = FALSE;
3753
3754 if (bfd_link_relocatable (link_info)
3755 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3756 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3757 || sec->reloc_count == 0)
3758 return TRUE;
3759
3760 BFD_ASSERT (is_alpha_elf (abfd));
3761 relax_pass = link_info->relax_pass;
3762
3763 /* Make sure our GOT and PLT tables are up-to-date. */
3764 if (htab->relax_trip != link_info->relax_trip)
3765 {
3766 htab->relax_trip = link_info->relax_trip;
3767
3768 /* This should never fail after the initial round, since the only error
3769 is GOT overflow, and relaxation only shrinks the table. However, we
3770 may only merge got sections during the first pass. If we merge
3771 sections after we've created GPREL relocs, the GP for the merged
3772 section backs up which may put the relocs out of range. */
3773 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
3774 abort ();
3775 if (elf_hash_table (link_info)->dynamic_sections_created)
3776 {
3777 elf64_alpha_size_plt_section (link_info);
3778 elf64_alpha_size_rela_got_section (link_info);
3779 }
3780 }
3781
3782 symtab_hdr = &elf_symtab_hdr (abfd);
3783 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
3784
3785 /* Load the relocations for this section. */
3786 internal_relocs = (_bfd_elf_link_read_relocs
3787 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
3788 link_info->keep_memory));
3789 if (internal_relocs == NULL)
3790 return FALSE;
3791
3792 memset(&info, 0, sizeof (info));
3793 info.abfd = abfd;
3794 info.sec = sec;
3795 info.link_info = link_info;
3796 info.symtab_hdr = symtab_hdr;
3797 info.relocs = internal_relocs;
3798 info.relend = irelend = internal_relocs + sec->reloc_count;
3799
3800 /* Find the GP for this object. Do not store the result back via
3801 _bfd_set_gp_value, since this could change again before final. */
3802 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3803 if (info.gotobj)
3804 {
3805 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3806 info.gp = (sgot->output_section->vma
3807 + sgot->output_offset
3808 + 0x8000);
3809 }
3810
3811 /* Get the section contents. */
3812 if (elf_section_data (sec)->this_hdr.contents != NULL)
3813 info.contents = elf_section_data (sec)->this_hdr.contents;
3814 else
3815 {
3816 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3817 goto error_return;
3818 }
3819
3820 for (irel = internal_relocs; irel < irelend; irel++)
3821 {
3822 bfd_vma symval;
3823 struct alpha_elf_got_entry *gotent;
3824 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3825 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3826
3827 /* Early exit for unhandled or unrelaxable relocations. */
3828 if (r_type != R_ALPHA_LITERAL)
3829 {
3830 /* We complete everything except LITERAL in the first pass. */
3831 if (relax_pass != 0)
3832 continue;
3833 if (r_type == R_ALPHA_TLSLDM)
3834 {
3835 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3836 reloc to the STN_UNDEF (0) symbol so that they all match. */
3837 r_symndx = STN_UNDEF;
3838 }
3839 else if (r_type != R_ALPHA_GOTDTPREL
3840 && r_type != R_ALPHA_GOTTPREL
3841 && r_type != R_ALPHA_TLSGD)
3842 continue;
3843 }
3844
3845 /* Get the value of the symbol referred to by the reloc. */
3846 if (r_symndx < symtab_hdr->sh_info)
3847 {
3848 /* A local symbol. */
3849 Elf_Internal_Sym *isym;
3850
3851 /* Read this BFD's local symbols. */
3852 if (isymbuf == NULL)
3853 {
3854 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3855 if (isymbuf == NULL)
3856 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3857 symtab_hdr->sh_info, 0,
3858 NULL, NULL, NULL);
3859 if (isymbuf == NULL)
3860 goto error_return;
3861 }
3862
3863 isym = isymbuf + r_symndx;
3864
3865 /* Given the symbol for a TLSLDM reloc is ignored, this also
3866 means forcing the symbol value to the tp base. */
3867 if (r_type == R_ALPHA_TLSLDM)
3868 {
3869 info.tsec = bfd_abs_section_ptr;
3870 symval = alpha_get_tprel_base (info.link_info);
3871 }
3872 else
3873 {
3874 symval = isym->st_value;
3875 if (isym->st_shndx == SHN_UNDEF)
3876 continue;
3877 else if (isym->st_shndx == SHN_ABS)
3878 info.tsec = bfd_abs_section_ptr;
3879 else if (isym->st_shndx == SHN_COMMON)
3880 info.tsec = bfd_com_section_ptr;
3881 else
3882 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3883 }
3884
3885 info.h = NULL;
3886 info.other = isym->st_other;
3887 if (local_got_entries)
3888 info.first_gotent = &local_got_entries[r_symndx];
3889 else
3890 {
3891 info.first_gotent = &info.gotent;
3892 info.gotent = NULL;
3893 }
3894 }
3895 else
3896 {
3897 unsigned long indx;
3898 struct alpha_elf_link_hash_entry *h;
3899
3900 indx = r_symndx - symtab_hdr->sh_info;
3901 h = alpha_elf_sym_hashes (abfd)[indx];
3902 BFD_ASSERT (h != NULL);
3903
3904 while (h->root.root.type == bfd_link_hash_indirect
3905 || h->root.root.type == bfd_link_hash_warning)
3906 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
3907
3908 /* If the symbol is undefined, we can't do anything with it. */
3909 if (h->root.root.type == bfd_link_hash_undefined)
3910 continue;
3911
3912 /* If the symbol isn't defined in the current module,
3913 again we can't do anything. */
3914 if (h->root.root.type == bfd_link_hash_undefweak)
3915 {
3916 info.tsec = bfd_abs_section_ptr;
3917 symval = 0;
3918 }
3919 else if (!h->root.def_regular)
3920 {
3921 /* Except for TLSGD relocs, which can sometimes be
3922 relaxed to GOTTPREL relocs. */
3923 if (r_type != R_ALPHA_TLSGD)
3924 continue;
3925 info.tsec = bfd_abs_section_ptr;
3926 symval = 0;
3927 }
3928 else
3929 {
3930 info.tsec = h->root.root.u.def.section;
3931 symval = h->root.root.u.def.value;
3932 }
3933
3934 info.h = h;
3935 info.other = h->root.other;
3936 info.first_gotent = &h->got_entries;
3937 }
3938
3939 /* Search for the got entry to be used by this relocation. */
3940 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3941 if (gotent->gotobj == info.gotobj
3942 && gotent->reloc_type == r_type
3943 && gotent->addend == irel->r_addend)
3944 break;
3945 info.gotent = gotent;
3946
3947 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3948 symval += irel->r_addend;
3949
3950 switch (r_type)
3951 {
3952 case R_ALPHA_LITERAL:
3953 BFD_ASSERT(info.gotent != NULL);
3954
3955 /* If there exist LITUSE relocations immediately following, this
3956 opens up all sorts of interesting optimizations, because we
3957 now know every location that this address load is used. */
3958 if (irel+1 < irelend
3959 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
3960 {
3961 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3962 goto error_return;
3963 }
3964 else
3965 {
3966 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3967 goto error_return;
3968 }
3969 break;
3970
3971 case R_ALPHA_GOTDTPREL:
3972 case R_ALPHA_GOTTPREL:
3973 BFD_ASSERT(info.gotent != NULL);
3974 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3975 goto error_return;
3976 break;
3977
3978 case R_ALPHA_TLSGD:
3979 case R_ALPHA_TLSLDM:
3980 BFD_ASSERT(info.gotent != NULL);
3981 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3982 r_type == R_ALPHA_TLSGD))
3983 goto error_return;
3984 break;
3985 }
3986 }
3987
3988 if (isymbuf != NULL
3989 && symtab_hdr->contents != (unsigned char *) isymbuf)
3990 {
3991 if (!link_info->keep_memory)
3992 free (isymbuf);
3993 else
3994 {
3995 /* Cache the symbols for elf_link_input_bfd. */
3996 symtab_hdr->contents = (unsigned char *) isymbuf;
3997 }
3998 }
3999
4000 if (info.contents != NULL
4001 && elf_section_data (sec)->this_hdr.contents != info.contents)
4002 {
4003 if (!info.changed_contents && !link_info->keep_memory)
4004 free (info.contents);
4005 else
4006 {
4007 /* Cache the section contents for elf_link_input_bfd. */
4008 elf_section_data (sec)->this_hdr.contents = info.contents;
4009 }
4010 }
4011
4012 if (elf_section_data (sec)->relocs != internal_relocs)
4013 {
4014 if (!info.changed_relocs)
4015 free (internal_relocs);
4016 else
4017 elf_section_data (sec)->relocs = internal_relocs;
4018 }
4019
4020 *again = info.changed_contents || info.changed_relocs;
4021
4022 return TRUE;
4023
4024 error_return:
4025 if (isymbuf != NULL
4026 && symtab_hdr->contents != (unsigned char *) isymbuf)
4027 free (isymbuf);
4028 if (info.contents != NULL
4029 && elf_section_data (sec)->this_hdr.contents != info.contents)
4030 free (info.contents);
4031 if (internal_relocs != NULL
4032 && elf_section_data (sec)->relocs != internal_relocs)
4033 free (internal_relocs);
4034 return FALSE;
4035 }
4036 \f
4037 /* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4038 into the next available slot in SREL. */
4039
4040 static void
4041 elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4042 asection *sec, asection *srel, bfd_vma offset,
4043 long dynindx, long rtype, bfd_vma addend)
4044 {
4045 Elf_Internal_Rela outrel;
4046 bfd_byte *loc;
4047
4048 BFD_ASSERT (srel != NULL);
4049
4050 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4051 outrel.r_addend = addend;
4052
4053 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4054 if ((offset | 1) != (bfd_vma) -1)
4055 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4056 else
4057 memset (&outrel, 0, sizeof (outrel));
4058
4059 loc = srel->contents;
4060 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4061 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
4062 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
4063 }
4064
4065 /* Relocate an Alpha ELF section for a relocatable link.
4066
4067 We don't have to change anything unless the reloc is against a section
4068 symbol, in which case we have to adjust according to where the section
4069 symbol winds up in the output section. */
4070
4071 static bfd_boolean
4072 elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4073 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4074 bfd *input_bfd, asection *input_section,
4075 bfd_byte *contents ATTRIBUTE_UNUSED,
4076 Elf_Internal_Rela *relocs,
4077 Elf_Internal_Sym *local_syms,
4078 asection **local_sections)
4079 {
4080 unsigned long symtab_hdr_sh_info;
4081 Elf_Internal_Rela *rel;
4082 Elf_Internal_Rela *relend;
4083 struct elf_link_hash_entry **sym_hashes;
4084 bfd_boolean ret_val = TRUE;
4085
4086 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
4087 sym_hashes = elf_sym_hashes (input_bfd);
4088
4089 relend = relocs + input_section->reloc_count;
4090 for (rel = relocs; rel < relend; rel++)
4091 {
4092 unsigned long r_symndx;
4093 Elf_Internal_Sym *sym;
4094 asection *sec;
4095 unsigned long r_type;
4096
4097 r_type = ELF64_R_TYPE (rel->r_info);
4098 if (r_type >= R_ALPHA_max)
4099 {
4100 _bfd_error_handler
4101 /* xgettext:c-format */
4102 (_("%pB: unsupported relocation type %#x"),
4103 input_bfd, (int) r_type);
4104 bfd_set_error (bfd_error_bad_value);
4105 ret_val = FALSE;
4106 continue;
4107 }
4108
4109 /* The symbol associated with GPDISP and LITUSE is
4110 immaterial. Only the addend is significant. */
4111 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4112 continue;
4113
4114 r_symndx = ELF64_R_SYM (rel->r_info);
4115 if (r_symndx < symtab_hdr_sh_info)
4116 {
4117 sym = local_syms + r_symndx;
4118 sec = local_sections[r_symndx];
4119 }
4120 else
4121 {
4122 struct elf_link_hash_entry *h;
4123
4124 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4125
4126 while (h->root.type == bfd_link_hash_indirect
4127 || h->root.type == bfd_link_hash_warning)
4128 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4129
4130 if (h->root.type != bfd_link_hash_defined
4131 && h->root.type != bfd_link_hash_defweak)
4132 continue;
4133
4134 sym = NULL;
4135 sec = h->root.u.def.section;
4136 }
4137
4138 if (sec != NULL && discarded_section (sec))
4139 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4140 rel, 1, relend,
4141 elf64_alpha_howto_table + r_type, 0,
4142 contents);
4143
4144 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4145 rel->r_addend += sec->output_offset;
4146 }
4147
4148 return ret_val;
4149 }
4150
4151 /* Relocate an Alpha ELF section. */
4152
4153 static bfd_boolean
4154 elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4155 bfd *input_bfd, asection *input_section,
4156 bfd_byte *contents, Elf_Internal_Rela *relocs,
4157 Elf_Internal_Sym *local_syms,
4158 asection **local_sections)
4159 {
4160 Elf_Internal_Shdr *symtab_hdr;
4161 Elf_Internal_Rela *rel;
4162 Elf_Internal_Rela *relend;
4163 asection *sgot, *srel, *srelgot;
4164 bfd *dynobj, *gotobj;
4165 bfd_vma gp, tp_base, dtp_base;
4166 struct alpha_elf_got_entry **local_got_entries;
4167 bfd_boolean ret_val;
4168
4169 BFD_ASSERT (is_alpha_elf (input_bfd));
4170
4171 /* Handle relocatable links with a smaller loop. */
4172 if (bfd_link_relocatable (info))
4173 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4174 input_section, contents, relocs,
4175 local_syms, local_sections);
4176
4177 /* This is a final link. */
4178
4179 ret_val = TRUE;
4180
4181 symtab_hdr = &elf_symtab_hdr (input_bfd);
4182
4183 dynobj = elf_hash_table (info)->dynobj;
4184 srelgot = elf_hash_table (info)->srelgot;
4185
4186 if (input_section->flags & SEC_ALLOC)
4187 {
4188 const char *section_name;
4189 section_name = (bfd_elf_string_from_elf_section
4190 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
4191 _bfd_elf_single_rel_hdr (input_section)->sh_name));
4192 BFD_ASSERT(section_name != NULL);
4193 srel = bfd_get_linker_section (dynobj, section_name);
4194 }
4195 else
4196 srel = NULL;
4197
4198 /* Find the gp value for this input bfd. */
4199 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4200 if (gotobj)
4201 {
4202 sgot = alpha_elf_tdata (gotobj)->got;
4203 gp = _bfd_get_gp_value (gotobj);
4204 if (gp == 0)
4205 {
4206 gp = (sgot->output_section->vma
4207 + sgot->output_offset
4208 + 0x8000);
4209 _bfd_set_gp_value (gotobj, gp);
4210 }
4211 }
4212 else
4213 {
4214 sgot = NULL;
4215 gp = 0;
4216 }
4217
4218 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4219
4220 if (elf_hash_table (info)->tls_sec != NULL)
4221 {
4222 dtp_base = alpha_get_dtprel_base (info);
4223 tp_base = alpha_get_tprel_base (info);
4224 }
4225 else
4226 dtp_base = tp_base = 0;
4227
4228 relend = relocs + input_section->reloc_count;
4229 for (rel = relocs; rel < relend; rel++)
4230 {
4231 struct alpha_elf_link_hash_entry *h = NULL;
4232 struct alpha_elf_got_entry *gotent;
4233 bfd_reloc_status_type r;
4234 reloc_howto_type *howto;
4235 unsigned long r_symndx;
4236 Elf_Internal_Sym *sym = NULL;
4237 asection *sec = NULL;
4238 bfd_vma value;
4239 bfd_vma addend;
4240 bfd_boolean dynamic_symbol_p;
4241 bfd_boolean unresolved_reloc = FALSE;
4242 bfd_boolean undef_weak_ref = FALSE;
4243 unsigned long r_type;
4244
4245 r_type = ELF64_R_TYPE(rel->r_info);
4246 if (r_type >= R_ALPHA_max)
4247 {
4248 _bfd_error_handler
4249 /* xgettext:c-format */
4250 (_("%pB: unsupported relocation type %#x"),
4251 input_bfd, (int) r_type);
4252 bfd_set_error (bfd_error_bad_value);
4253 ret_val = FALSE;
4254 continue;
4255 }
4256
4257 howto = elf64_alpha_howto_table + r_type;
4258 r_symndx = ELF64_R_SYM(rel->r_info);
4259
4260 /* The symbol for a TLSLDM reloc is ignored. Collapse the
4261 reloc to the STN_UNDEF (0) symbol so that they all match. */
4262 if (r_type == R_ALPHA_TLSLDM)
4263 r_symndx = STN_UNDEF;
4264
4265 if (r_symndx < symtab_hdr->sh_info)
4266 {
4267 asection *msec;
4268 sym = local_syms + r_symndx;
4269 sec = local_sections[r_symndx];
4270 msec = sec;
4271 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
4272
4273 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
4274 this is hackery from relax_section. Force the value to
4275 be the tls module base. */
4276 if (r_symndx == STN_UNDEF
4277 && (r_type == R_ALPHA_TLSLDM
4278 || r_type == R_ALPHA_GOTTPREL
4279 || r_type == R_ALPHA_TPREL64
4280 || r_type == R_ALPHA_TPRELHI
4281 || r_type == R_ALPHA_TPRELLO
4282 || r_type == R_ALPHA_TPREL16))
4283 value = dtp_base;
4284
4285 if (local_got_entries)
4286 gotent = local_got_entries[r_symndx];
4287 else
4288 gotent = NULL;
4289
4290 /* Need to adjust local GOT entries' addends for SEC_MERGE
4291 unless it has been done already. */
4292 if ((sec->flags & SEC_MERGE)
4293 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
4294 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
4295 && gotent
4296 && !gotent->reloc_xlated)
4297 {
4298 struct alpha_elf_got_entry *ent;
4299
4300 for (ent = gotent; ent; ent = ent->next)
4301 {
4302 ent->reloc_xlated = 1;
4303 if (ent->use_count == 0)
4304 continue;
4305 msec = sec;
4306 ent->addend =
4307 _bfd_merged_section_offset (output_bfd, &msec,
4308 elf_section_data (sec)->
4309 sec_info,
4310 sym->st_value + ent->addend);
4311 ent->addend -= sym->st_value;
4312 ent->addend += msec->output_section->vma
4313 + msec->output_offset
4314 - sec->output_section->vma
4315 - sec->output_offset;
4316 }
4317 }
4318
4319 dynamic_symbol_p = FALSE;
4320 }
4321 else
4322 {
4323 bfd_boolean warned, ignored;
4324 struct elf_link_hash_entry *hh;
4325 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4326
4327 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4328 r_symndx, symtab_hdr, sym_hashes,
4329 hh, sec, value,
4330 unresolved_reloc, warned, ignored);
4331
4332 if (warned)
4333 continue;
4334
4335 if (value == 0
4336 && ! unresolved_reloc
4337 && hh->root.type == bfd_link_hash_undefweak)
4338 undef_weak_ref = TRUE;
4339
4340 h = (struct alpha_elf_link_hash_entry *) hh;
4341 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4342 gotent = h->got_entries;
4343 }
4344
4345 if (sec != NULL && discarded_section (sec))
4346 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4347 rel, 1, relend, howto, 0, contents);
4348
4349 addend = rel->r_addend;
4350 value += addend;
4351
4352 /* Search for the proper got entry. */
4353 for (; gotent ; gotent = gotent->next)
4354 if (gotent->gotobj == gotobj
4355 && gotent->reloc_type == r_type
4356 && gotent->addend == addend)
4357 break;
4358
4359 switch (r_type)
4360 {
4361 case R_ALPHA_GPDISP:
4362 {
4363 bfd_byte *p_ldah, *p_lda;
4364
4365 BFD_ASSERT(gp != 0);
4366
4367 value = (input_section->output_section->vma
4368 + input_section->output_offset
4369 + rel->r_offset);
4370
4371 p_ldah = contents + rel->r_offset;
4372 p_lda = p_ldah + rel->r_addend;
4373
4374 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
4375 p_ldah, p_lda);
4376 }
4377 break;
4378
4379 case R_ALPHA_LITERAL:
4380 BFD_ASSERT(sgot != NULL);
4381 BFD_ASSERT(gp != 0);
4382 BFD_ASSERT(gotent != NULL);
4383 BFD_ASSERT(gotent->use_count >= 1);
4384
4385 if (!gotent->reloc_done)
4386 {
4387 gotent->reloc_done = 1;
4388
4389 bfd_put_64 (output_bfd, value,
4390 sgot->contents + gotent->got_offset);
4391
4392 /* If the symbol has been forced local, output a
4393 RELATIVE reloc, otherwise it will be handled in
4394 finish_dynamic_symbol. */
4395 if (bfd_link_pic (info)
4396 && !dynamic_symbol_p
4397 && !undef_weak_ref)
4398 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4399 gotent->got_offset, 0,
4400 R_ALPHA_RELATIVE, value);
4401 }
4402
4403 value = (sgot->output_section->vma
4404 + sgot->output_offset
4405 + gotent->got_offset);
4406 value -= gp;
4407 goto default_reloc;
4408
4409 case R_ALPHA_GPREL32:
4410 case R_ALPHA_GPREL16:
4411 case R_ALPHA_GPRELLOW:
4412 if (dynamic_symbol_p)
4413 {
4414 _bfd_error_handler
4415 /* xgettext:c-format */
4416 (_("%pB: gp-relative relocation against dynamic symbol %s"),
4417 input_bfd, h->root.root.root.string);
4418 ret_val = FALSE;
4419 }
4420 BFD_ASSERT(gp != 0);
4421 value -= gp;
4422 goto default_reloc;
4423
4424 case R_ALPHA_GPRELHIGH:
4425 if (dynamic_symbol_p)
4426 {
4427 _bfd_error_handler
4428 /* xgettext:c-format */
4429 (_("%pB: gp-relative relocation against dynamic symbol %s"),
4430 input_bfd, h->root.root.root.string);
4431 ret_val = FALSE;
4432 }
4433 BFD_ASSERT(gp != 0);
4434 value -= gp;
4435 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4436 goto default_reloc;
4437
4438 case R_ALPHA_HINT:
4439 /* A call to a dynamic symbol is definitely out of range of
4440 the 16-bit displacement. Don't bother writing anything. */
4441 if (dynamic_symbol_p)
4442 {
4443 r = bfd_reloc_ok;
4444 break;
4445 }
4446 /* The regular PC-relative stuff measures from the start of
4447 the instruction rather than the end. */
4448 value -= 4;
4449 goto default_reloc;
4450
4451 case R_ALPHA_BRADDR:
4452 if (dynamic_symbol_p)
4453 {
4454 _bfd_error_handler
4455 /* xgettext:c-format */
4456 (_("%pB: pc-relative relocation against dynamic symbol %s"),
4457 input_bfd, h->root.root.root.string);
4458 ret_val = FALSE;
4459 }
4460 /* The regular PC-relative stuff measures from the start of
4461 the instruction rather than the end. */
4462 value -= 4;
4463 goto default_reloc;
4464
4465 case R_ALPHA_BRSGP:
4466 {
4467 int other;
4468 const char *name;
4469
4470 /* The regular PC-relative stuff measures from the start of
4471 the instruction rather than the end. */
4472 value -= 4;
4473
4474 /* The source and destination gp must be the same. Note that
4475 the source will always have an assigned gp, since we forced
4476 one in check_relocs, but that the destination may not, as
4477 it might not have had any relocations at all. Also take
4478 care not to crash if H is an undefined symbol. */
4479 if (h != NULL && sec != NULL
4480 && alpha_elf_tdata (sec->owner)->gotobj
4481 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4482 {
4483 _bfd_error_handler
4484 /* xgettext:c-format */
4485 (_("%pB: change in gp: BRSGP %s"),
4486 input_bfd, h->root.root.root.string);
4487 ret_val = FALSE;
4488 }
4489
4490 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4491 if (h != NULL)
4492 other = h->root.other;
4493 else
4494 other = sym->st_other;
4495 switch (other & STO_ALPHA_STD_GPLOAD)
4496 {
4497 case STO_ALPHA_NOPV:
4498 break;
4499 case STO_ALPHA_STD_GPLOAD:
4500 value += 8;
4501 break;
4502 default:
4503 if (h != NULL)
4504 name = h->root.root.root.string;
4505 else
4506 {
4507 name = (bfd_elf_string_from_elf_section
4508 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4509 if (name == NULL)
4510 name = _("<unknown>");
4511 else if (name[0] == 0)
4512 name = bfd_section_name (sec);
4513 }
4514 _bfd_error_handler
4515 /* xgettext:c-format */
4516 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
4517 input_bfd, name);
4518 ret_val = FALSE;
4519 break;
4520 }
4521
4522 goto default_reloc;
4523 }
4524
4525 case R_ALPHA_REFLONG:
4526 case R_ALPHA_REFQUAD:
4527 case R_ALPHA_DTPREL64:
4528 case R_ALPHA_TPREL64:
4529 {
4530 long dynindx, dyntype = r_type;
4531 bfd_vma dynaddend;
4532
4533 /* Careful here to remember RELATIVE relocations for global
4534 variables for symbolic shared objects. */
4535
4536 if (dynamic_symbol_p)
4537 {
4538 BFD_ASSERT(h->root.dynindx != -1);
4539 dynindx = h->root.dynindx;
4540 dynaddend = addend;
4541 addend = 0, value = 0;
4542 }
4543 else if (r_type == R_ALPHA_DTPREL64)
4544 {
4545 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4546 value -= dtp_base;
4547 goto default_reloc;
4548 }
4549 else if (r_type == R_ALPHA_TPREL64)
4550 {
4551 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4552 if (!bfd_link_dll (info))
4553 {
4554 value -= tp_base;
4555 goto default_reloc;
4556 }
4557 dynindx = 0;
4558 dynaddend = value - dtp_base;
4559 }
4560 else if (bfd_link_pic (info)
4561 && r_symndx != STN_UNDEF
4562 && (input_section->flags & SEC_ALLOC)
4563 && !undef_weak_ref
4564 && !(unresolved_reloc
4565 && (_bfd_elf_section_offset (output_bfd, info,
4566 input_section,
4567 rel->r_offset)
4568 == (bfd_vma) -1)))
4569 {
4570 if (r_type == R_ALPHA_REFLONG)
4571 {
4572 _bfd_error_handler
4573 /* xgettext:c-format */
4574 (_("%pB: unhandled dynamic relocation against %s"),
4575 input_bfd,
4576 h->root.root.root.string);
4577 ret_val = FALSE;
4578 }
4579 dynindx = 0;
4580 dyntype = R_ALPHA_RELATIVE;
4581 dynaddend = value;
4582 }
4583 else
4584 goto default_reloc;
4585
4586 if (input_section->flags & SEC_ALLOC)
4587 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4588 srel, rel->r_offset, dynindx,
4589 dyntype, dynaddend);
4590 }
4591 goto default_reloc;
4592
4593 case R_ALPHA_SREL16:
4594 case R_ALPHA_SREL32:
4595 case R_ALPHA_SREL64:
4596 if (dynamic_symbol_p)
4597 {
4598 _bfd_error_handler
4599 /* xgettext:c-format */
4600 (_("%pB: pc-relative relocation against dynamic symbol %s"),
4601 input_bfd, h->root.root.root.string);
4602 ret_val = FALSE;
4603 }
4604 else if (bfd_link_pic (info)
4605 && undef_weak_ref)
4606 {
4607 _bfd_error_handler
4608 /* xgettext:c-format */
4609 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
4610 input_bfd, h->root.root.root.string);
4611 ret_val = FALSE;
4612 }
4613
4614
4615 /* ??? .eh_frame references to discarded sections will be smashed
4616 to relocations against SHN_UNDEF. The .eh_frame format allows
4617 NULL to be encoded as 0 in any format, so this works here. */
4618 if (r_symndx == STN_UNDEF
4619 || (unresolved_reloc
4620 && _bfd_elf_section_offset (output_bfd, info,
4621 input_section,
4622 rel->r_offset) == (bfd_vma) -1))
4623 howto = (elf64_alpha_howto_table
4624 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4625 goto default_reloc;
4626
4627 case R_ALPHA_TLSLDM:
4628 /* Ignore the symbol for the relocation. The result is always
4629 the current module. */
4630 dynamic_symbol_p = 0;
4631 /* FALLTHRU */
4632
4633 case R_ALPHA_TLSGD:
4634 if (!gotent->reloc_done)
4635 {
4636 gotent->reloc_done = 1;
4637
4638 /* Note that the module index for the main program is 1. */
4639 bfd_put_64 (output_bfd,
4640 !bfd_link_pic (info) && !dynamic_symbol_p,
4641 sgot->contents + gotent->got_offset);
4642
4643 /* If the symbol has been forced local, output a
4644 DTPMOD64 reloc, otherwise it will be handled in
4645 finish_dynamic_symbol. */
4646 if (bfd_link_pic (info) && !dynamic_symbol_p)
4647 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4648 gotent->got_offset, 0,
4649 R_ALPHA_DTPMOD64, 0);
4650
4651 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4652 value = 0;
4653 else
4654 {
4655 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4656 value -= dtp_base;
4657 }
4658 bfd_put_64 (output_bfd, value,
4659 sgot->contents + gotent->got_offset + 8);
4660 }
4661
4662 value = (sgot->output_section->vma
4663 + sgot->output_offset
4664 + gotent->got_offset);
4665 value -= gp;
4666 goto default_reloc;
4667
4668 case R_ALPHA_DTPRELHI:
4669 case R_ALPHA_DTPRELLO:
4670 case R_ALPHA_DTPREL16:
4671 if (dynamic_symbol_p)
4672 {
4673 _bfd_error_handler
4674 /* xgettext:c-format */
4675 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
4676 input_bfd, h->root.root.root.string);
4677 ret_val = FALSE;
4678 }
4679 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4680 value -= dtp_base;
4681 if (r_type == R_ALPHA_DTPRELHI)
4682 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4683 goto default_reloc;
4684
4685 case R_ALPHA_TPRELHI:
4686 case R_ALPHA_TPRELLO:
4687 case R_ALPHA_TPREL16:
4688 if (bfd_link_dll (info))
4689 {
4690 _bfd_error_handler
4691 /* xgettext:c-format */
4692 (_("%pB: TLS local exec code cannot be linked into shared objects"),
4693 input_bfd);
4694 ret_val = FALSE;
4695 }
4696 else if (dynamic_symbol_p)
4697 {
4698 _bfd_error_handler
4699 /* xgettext:c-format */
4700 (_("%pB: tp-relative relocation against dynamic symbol %s"),
4701 input_bfd, h->root.root.root.string);
4702 ret_val = FALSE;
4703 }
4704 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4705 value -= tp_base;
4706 if (r_type == R_ALPHA_TPRELHI)
4707 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
4708 goto default_reloc;
4709
4710 case R_ALPHA_GOTDTPREL:
4711 case R_ALPHA_GOTTPREL:
4712 BFD_ASSERT(sgot != NULL);
4713 BFD_ASSERT(gp != 0);
4714 BFD_ASSERT(gotent != NULL);
4715 BFD_ASSERT(gotent->use_count >= 1);
4716
4717 if (!gotent->reloc_done)
4718 {
4719 gotent->reloc_done = 1;
4720
4721 if (dynamic_symbol_p)
4722 value = 0;
4723 else
4724 {
4725 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
4726 if (r_type == R_ALPHA_GOTDTPREL)
4727 value -= dtp_base;
4728 else if (bfd_link_executable (info))
4729 value -= tp_base;
4730 else
4731 {
4732 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4733 gotent->got_offset, 0,
4734 R_ALPHA_TPREL64,
4735 value - dtp_base);
4736 value = 0;
4737 }
4738 }
4739 bfd_put_64 (output_bfd, value,
4740 sgot->contents + gotent->got_offset);
4741 }
4742
4743 value = (sgot->output_section->vma
4744 + sgot->output_offset
4745 + gotent->got_offset);
4746 value -= gp;
4747 goto default_reloc;
4748
4749 default:
4750 default_reloc:
4751 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4752 contents, rel->r_offset, value, 0);
4753 break;
4754 }
4755
4756 switch (r)
4757 {
4758 case bfd_reloc_ok:
4759 break;
4760
4761 case bfd_reloc_overflow:
4762 {
4763 const char *name;
4764
4765 /* Don't warn if the overflow is due to pc relative reloc
4766 against discarded section. Section optimization code should
4767 handle it. */
4768
4769 if (r_symndx < symtab_hdr->sh_info
4770 && sec != NULL && howto->pc_relative
4771 && discarded_section (sec))
4772 break;
4773
4774 if (h != NULL)
4775 name = NULL;
4776 else
4777 {
4778 name = (bfd_elf_string_from_elf_section
4779 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4780 if (name == NULL)
4781 return FALSE;
4782 if (*name == '\0')
4783 name = bfd_section_name (sec);
4784 }
4785 (*info->callbacks->reloc_overflow)
4786 (info, (h ? &h->root.root : NULL), name, howto->name,
4787 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4788 }
4789 break;
4790
4791 default:
4792 case bfd_reloc_outofrange:
4793 abort ();
4794 }
4795 }
4796
4797 return ret_val;
4798 }
4799
4800 /* Finish up dynamic symbol handling. We set the contents of various
4801 dynamic sections here. */
4802
4803 static bfd_boolean
4804 elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4805 struct elf_link_hash_entry *h,
4806 Elf_Internal_Sym *sym)
4807 {
4808 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
4809
4810 if (h->needs_plt)
4811 {
4812 /* Fill in the .plt entry for this symbol. */
4813 asection *splt, *sgot, *srel;
4814 Elf_Internal_Rela outrel;
4815 bfd_byte *loc;
4816 bfd_vma got_addr, plt_addr;
4817 bfd_vma plt_index;
4818 struct alpha_elf_got_entry *gotent;
4819
4820 BFD_ASSERT (h->dynindx != -1);
4821
4822 splt = elf_hash_table (info)->splt;
4823 BFD_ASSERT (splt != NULL);
4824 srel = elf_hash_table (info)->srelplt;
4825 BFD_ASSERT (srel != NULL);
4826
4827 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4828 if (gotent->reloc_type == R_ALPHA_LITERAL
4829 && gotent->use_count > 0)
4830 {
4831 unsigned int insn;
4832 int disp;
4833
4834 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4835 BFD_ASSERT (sgot != NULL);
4836
4837 BFD_ASSERT (gotent->got_offset != -1);
4838 BFD_ASSERT (gotent->plt_offset != -1);
4839
4840 got_addr = (sgot->output_section->vma
4841 + sgot->output_offset
4842 + gotent->got_offset);
4843 plt_addr = (splt->output_section->vma
4844 + splt->output_offset
4845 + gotent->plt_offset);
4846
4847 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
4848
4849 /* Fill in the entry in the procedure linkage table. */
4850 if (elf64_alpha_use_secureplt)
4851 {
4852 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4853 insn = INSN_AD (INSN_BR, 31, disp);
4854 bfd_put_32 (output_bfd, insn,
4855 splt->contents + gotent->plt_offset);
4856
4857 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4858 / NEW_PLT_ENTRY_SIZE);
4859 }
4860 else
4861 {
4862 disp = -(gotent->plt_offset + 4);
4863 insn = INSN_AD (INSN_BR, 28, disp);
4864 bfd_put_32 (output_bfd, insn,
4865 splt->contents + gotent->plt_offset);
4866 bfd_put_32 (output_bfd, INSN_UNOP,
4867 splt->contents + gotent->plt_offset + 4);
4868 bfd_put_32 (output_bfd, INSN_UNOP,
4869 splt->contents + gotent->plt_offset + 8);
4870
4871 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4872 / OLD_PLT_ENTRY_SIZE);
4873 }
4874
4875 /* Fill in the entry in the .rela.plt section. */
4876 outrel.r_offset = got_addr;
4877 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4878 outrel.r_addend = 0;
4879
4880 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4881 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
4882
4883 /* Fill in the entry in the .got. */
4884 bfd_put_64 (output_bfd, plt_addr,
4885 sgot->contents + gotent->got_offset);
4886 }
4887 }
4888 else if (alpha_elf_dynamic_symbol_p (h, info))
4889 {
4890 /* Fill in the dynamic relocations for this symbol's .got entries. */
4891 asection *srel;
4892 struct alpha_elf_got_entry *gotent;
4893
4894 srel = elf_hash_table (info)->srelgot;
4895 BFD_ASSERT (srel != NULL);
4896
4897 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4898 gotent != NULL;
4899 gotent = gotent->next)
4900 {
4901 asection *sgot;
4902 long r_type;
4903
4904 if (gotent->use_count == 0)
4905 continue;
4906
4907 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4908
4909 r_type = gotent->reloc_type;
4910 switch (r_type)
4911 {
4912 case R_ALPHA_LITERAL:
4913 r_type = R_ALPHA_GLOB_DAT;
4914 break;
4915 case R_ALPHA_TLSGD:
4916 r_type = R_ALPHA_DTPMOD64;
4917 break;
4918 case R_ALPHA_GOTDTPREL:
4919 r_type = R_ALPHA_DTPREL64;
4920 break;
4921 case R_ALPHA_GOTTPREL:
4922 r_type = R_ALPHA_TPREL64;
4923 break;
4924 case R_ALPHA_TLSLDM:
4925 default:
4926 abort ();
4927 }
4928
4929 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4930 gotent->got_offset, h->dynindx,
4931 r_type, gotent->addend);
4932
4933 if (gotent->reloc_type == R_ALPHA_TLSGD)
4934 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4935 gotent->got_offset + 8, h->dynindx,
4936 R_ALPHA_DTPREL64, gotent->addend);
4937 }
4938 }
4939
4940 /* Mark some specially defined symbols as absolute. */
4941 if (h == elf_hash_table (info)->hdynamic
4942 || h == elf_hash_table (info)->hgot
4943 || h == elf_hash_table (info)->hplt)
4944 sym->st_shndx = SHN_ABS;
4945
4946 return TRUE;
4947 }
4948
4949 /* Finish up the dynamic sections. */
4950
4951 static bfd_boolean
4952 elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4953 struct bfd_link_info *info)
4954 {
4955 bfd *dynobj;
4956 asection *sdyn;
4957
4958 dynobj = elf_hash_table (info)->dynobj;
4959 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
4960
4961 if (elf_hash_table (info)->dynamic_sections_created)
4962 {
4963 asection *splt, *sgotplt, *srelaplt;
4964 Elf64_External_Dyn *dyncon, *dynconend;
4965 bfd_vma plt_vma, gotplt_vma;
4966
4967 splt = elf_hash_table (info)->splt;
4968 srelaplt = elf_hash_table (info)->srelplt;
4969 BFD_ASSERT (splt != NULL && sdyn != NULL);
4970
4971 plt_vma = splt->output_section->vma + splt->output_offset;
4972
4973 gotplt_vma = 0;
4974 if (elf64_alpha_use_secureplt)
4975 {
4976 sgotplt = elf_hash_table (info)->sgotplt;
4977 BFD_ASSERT (sgotplt != NULL);
4978 if (sgotplt->size > 0)
4979 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4980 }
4981
4982 dyncon = (Elf64_External_Dyn *) sdyn->contents;
4983 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
4984 for (; dyncon < dynconend; dyncon++)
4985 {
4986 Elf_Internal_Dyn dyn;
4987
4988 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4989
4990 switch (dyn.d_tag)
4991 {
4992 case DT_PLTGOT:
4993 dyn.d_un.d_ptr
4994 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4995 break;
4996 case DT_PLTRELSZ:
4997 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4998 break;
4999 case DT_JMPREL:
5000 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
5001 + srelaplt->output_offset) : 0;
5002 break;
5003 }
5004
5005 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5006 }
5007
5008 /* Initialize the plt header. */
5009 if (splt->size > 0)
5010 {
5011 unsigned int insn;
5012 int ofs;
5013
5014 if (elf64_alpha_use_secureplt)
5015 {
5016 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5017
5018 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5019 bfd_put_32 (output_bfd, insn, splt->contents);
5020
5021 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5022 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5023
5024 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5025 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5026
5027 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5028 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5029
5030 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5031 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5032
5033 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5034 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5035
5036 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5037 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5038
5039 insn = INSN_AB (INSN_JMP, 31, 27);
5040 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5041
5042 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5043 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5044 }
5045 else
5046 {
5047 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5048 bfd_put_32 (output_bfd, insn, splt->contents);
5049
5050 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5051 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5052
5053 insn = INSN_UNOP;
5054 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5055
5056 insn = INSN_AB (INSN_JMP, 27, 27);
5057 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5058
5059 /* The next two words will be filled in by ld.so. */
5060 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5061 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5062 }
5063
5064 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
5065 }
5066 }
5067
5068 return TRUE;
5069 }
5070
5071 /* We need to use a special link routine to handle the .mdebug section.
5072 We need to merge all instances of these sections together, not write
5073 them all out sequentially. */
5074
5075 static bfd_boolean
5076 elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
5077 {
5078 asection *o;
5079 struct bfd_link_order *p;
5080 asection *mdebug_sec;
5081 struct ecoff_debug_info debug;
5082 const struct ecoff_debug_swap *swap
5083 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5084 HDRR *symhdr = &debug.symbolic_header;
5085 void * mdebug_handle = NULL;
5086 struct alpha_elf_link_hash_table * htab;
5087
5088 htab = alpha_elf_hash_table (info);
5089 if (htab == NULL)
5090 return FALSE;
5091
5092 /* Go through the sections and collect the mdebug information. */
5093 mdebug_sec = NULL;
5094 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5095 {
5096 if (strcmp (o->name, ".mdebug") == 0)
5097 {
5098 struct extsym_info einfo;
5099
5100 /* We have found the .mdebug section in the output file.
5101 Look through all the link_orders comprising it and merge
5102 the information together. */
5103 symhdr->magic = swap->sym_magic;
5104 /* FIXME: What should the version stamp be? */
5105 symhdr->vstamp = 0;
5106 symhdr->ilineMax = 0;
5107 symhdr->cbLine = 0;
5108 symhdr->idnMax = 0;
5109 symhdr->ipdMax = 0;
5110 symhdr->isymMax = 0;
5111 symhdr->ioptMax = 0;
5112 symhdr->iauxMax = 0;
5113 symhdr->issMax = 0;
5114 symhdr->issExtMax = 0;
5115 symhdr->ifdMax = 0;
5116 symhdr->crfd = 0;
5117 symhdr->iextMax = 0;
5118
5119 /* We accumulate the debugging information itself in the
5120 debug_info structure. */
5121 debug.line = NULL;
5122 debug.external_dnr = NULL;
5123 debug.external_pdr = NULL;
5124 debug.external_sym = NULL;
5125 debug.external_opt = NULL;
5126 debug.external_aux = NULL;
5127 debug.ss = NULL;
5128 debug.ssext = debug.ssext_end = NULL;
5129 debug.external_fdr = NULL;
5130 debug.external_rfd = NULL;
5131 debug.external_ext = debug.external_ext_end = NULL;
5132
5133 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
5134 if (mdebug_handle == NULL)
5135 return FALSE;
5136
5137 if (1)
5138 {
5139 asection *s;
5140 EXTR esym;
5141 bfd_vma last = 0;
5142 unsigned int i;
5143 static const char * const name[] =
5144 {
5145 ".text", ".init", ".fini", ".data",
5146 ".rodata", ".sdata", ".sbss", ".bss"
5147 };
5148 static const int sc[] = { scText, scInit, scFini, scData,
5149 scRData, scSData, scSBss, scBss };
5150
5151 esym.jmptbl = 0;
5152 esym.cobol_main = 0;
5153 esym.weakext = 0;
5154 esym.reserved = 0;
5155 esym.ifd = ifdNil;
5156 esym.asym.iss = issNil;
5157 esym.asym.st = stLocal;
5158 esym.asym.reserved = 0;
5159 esym.asym.index = indexNil;
5160 for (i = 0; i < 8; i++)
5161 {
5162 esym.asym.sc = sc[i];
5163 s = bfd_get_section_by_name (abfd, name[i]);
5164 if (s != NULL)
5165 {
5166 esym.asym.value = s->vma;
5167 last = s->vma + s->size;
5168 }
5169 else
5170 esym.asym.value = last;
5171
5172 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5173 name[i], &esym))
5174 return FALSE;
5175 }
5176 }
5177
5178 for (p = o->map_head.link_order;
5179 p != (struct bfd_link_order *) NULL;
5180 p = p->next)
5181 {
5182 asection *input_section;
5183 bfd *input_bfd;
5184 const struct ecoff_debug_swap *input_swap;
5185 struct ecoff_debug_info input_debug;
5186 char *eraw_src;
5187 char *eraw_end;
5188
5189 if (p->type != bfd_indirect_link_order)
5190 {
5191 if (p->type == bfd_data_link_order)
5192 continue;
5193 abort ();
5194 }
5195
5196 input_section = p->u.indirect.section;
5197 input_bfd = input_section->owner;
5198
5199 if (! is_alpha_elf (input_bfd))
5200 /* I don't know what a non ALPHA ELF bfd would be
5201 doing with a .mdebug section, but I don't really
5202 want to deal with it. */
5203 continue;
5204
5205 input_swap = (get_elf_backend_data (input_bfd)
5206 ->elf_backend_ecoff_debug_swap);
5207
5208 BFD_ASSERT (p->size == input_section->size);
5209
5210 /* The ECOFF linking code expects that we have already
5211 read in the debugging information and set up an
5212 ecoff_debug_info structure, so we do that now. */
5213 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5214 &input_debug))
5215 return FALSE;
5216
5217 if (! (bfd_ecoff_debug_accumulate
5218 (mdebug_handle, abfd, &debug, swap, input_bfd,
5219 &input_debug, input_swap, info)))
5220 return FALSE;
5221
5222 /* Loop through the external symbols. For each one with
5223 interesting information, try to find the symbol in
5224 the linker global hash table and save the information
5225 for the output external symbols. */
5226 eraw_src = (char *) input_debug.external_ext;
5227 eraw_end = (eraw_src
5228 + (input_debug.symbolic_header.iextMax
5229 * input_swap->external_ext_size));
5230 for (;
5231 eraw_src < eraw_end;
5232 eraw_src += input_swap->external_ext_size)
5233 {
5234 EXTR ext;
5235 const char *name;
5236 struct alpha_elf_link_hash_entry *h;
5237
5238 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
5239 if (ext.asym.sc == scNil
5240 || ext.asym.sc == scUndefined
5241 || ext.asym.sc == scSUndefined)
5242 continue;
5243
5244 name = input_debug.ssext + ext.asym.iss;
5245 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
5246 if (h == NULL || h->esym.ifd != -2)
5247 continue;
5248
5249 if (ext.ifd != -1)
5250 {
5251 BFD_ASSERT (ext.ifd
5252 < input_debug.symbolic_header.ifdMax);
5253 ext.ifd = input_debug.ifdmap[ext.ifd];
5254 }
5255
5256 h->esym = ext;
5257 }
5258
5259 /* Free up the information we just read. */
5260 free (input_debug.line);
5261 free (input_debug.external_dnr);
5262 free (input_debug.external_pdr);
5263 free (input_debug.external_sym);
5264 free (input_debug.external_opt);
5265 free (input_debug.external_aux);
5266 free (input_debug.ss);
5267 free (input_debug.ssext);
5268 free (input_debug.external_fdr);
5269 free (input_debug.external_rfd);
5270 free (input_debug.external_ext);
5271
5272 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5273 elf_link_input_bfd ignores this section. */
5274 input_section->flags &=~ SEC_HAS_CONTENTS;
5275 }
5276
5277 /* Build the external symbol information. */
5278 einfo.abfd = abfd;
5279 einfo.info = info;
5280 einfo.debug = &debug;
5281 einfo.swap = swap;
5282 einfo.failed = FALSE;
5283 elf_link_hash_traverse (elf_hash_table (info),
5284 elf64_alpha_output_extsym,
5285 &einfo);
5286 if (einfo.failed)
5287 return FALSE;
5288
5289 /* Set the size of the .mdebug section. */
5290 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
5291
5292 /* Skip this section later on (I don't think this currently
5293 matters, but someday it might). */
5294 o->map_head.link_order = (struct bfd_link_order *) NULL;
5295
5296 mdebug_sec = o;
5297 }
5298 }
5299
5300 /* Invoke the regular ELF backend linker to do all the work. */
5301 if (! bfd_elf_final_link (abfd, info))
5302 return FALSE;
5303
5304 /* Now write out the computed sections. */
5305
5306 /* The .got subsections... */
5307 {
5308 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
5309 for (i = htab->got_list;
5310 i != NULL;
5311 i = alpha_elf_tdata(i)->got_link_next)
5312 {
5313 asection *sgot;
5314
5315 /* elf_bfd_final_link already did everything in dynobj. */
5316 if (i == dynobj)
5317 continue;
5318
5319 sgot = alpha_elf_tdata(i)->got;
5320 if (! bfd_set_section_contents (abfd, sgot->output_section,
5321 sgot->contents,
5322 (file_ptr) sgot->output_offset,
5323 sgot->size))
5324 return FALSE;
5325 }
5326 }
5327
5328 if (mdebug_sec != (asection *) NULL)
5329 {
5330 BFD_ASSERT (abfd->output_has_begun);
5331 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5332 swap, info,
5333 mdebug_sec->filepos))
5334 return FALSE;
5335
5336 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5337 }
5338
5339 return TRUE;
5340 }
5341
5342 static enum elf_reloc_type_class
5343 elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5344 const asection *rel_sec ATTRIBUTE_UNUSED,
5345 const Elf_Internal_Rela *rela)
5346 {
5347 switch ((int) ELF64_R_TYPE (rela->r_info))
5348 {
5349 case R_ALPHA_RELATIVE:
5350 return reloc_class_relative;
5351 case R_ALPHA_JMP_SLOT:
5352 return reloc_class_plt;
5353 case R_ALPHA_COPY:
5354 return reloc_class_copy;
5355 default:
5356 return reloc_class_normal;
5357 }
5358 }
5359 \f
5360 static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
5361 {
5362 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5363 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5364 { NULL, 0, 0, 0, 0 }
5365 };
5366
5367 /* ECOFF swapping routines. These are used when dealing with the
5368 .mdebug section, which is in the ECOFF debugging format. Copied
5369 from elf32-mips.c. */
5370 static const struct ecoff_debug_swap
5371 elf64_alpha_ecoff_debug_swap =
5372 {
5373 /* Symbol table magic number. */
5374 magicSym2,
5375 /* Alignment of debugging information. E.g., 4. */
5376 8,
5377 /* Sizes of external symbolic information. */
5378 sizeof (struct hdr_ext),
5379 sizeof (struct dnr_ext),
5380 sizeof (struct pdr_ext),
5381 sizeof (struct sym_ext),
5382 sizeof (struct opt_ext),
5383 sizeof (struct fdr_ext),
5384 sizeof (struct rfd_ext),
5385 sizeof (struct ext_ext),
5386 /* Functions to swap in external symbolic data. */
5387 ecoff_swap_hdr_in,
5388 ecoff_swap_dnr_in,
5389 ecoff_swap_pdr_in,
5390 ecoff_swap_sym_in,
5391 ecoff_swap_opt_in,
5392 ecoff_swap_fdr_in,
5393 ecoff_swap_rfd_in,
5394 ecoff_swap_ext_in,
5395 _bfd_ecoff_swap_tir_in,
5396 _bfd_ecoff_swap_rndx_in,
5397 /* Functions to swap out external symbolic data. */
5398 ecoff_swap_hdr_out,
5399 ecoff_swap_dnr_out,
5400 ecoff_swap_pdr_out,
5401 ecoff_swap_sym_out,
5402 ecoff_swap_opt_out,
5403 ecoff_swap_fdr_out,
5404 ecoff_swap_rfd_out,
5405 ecoff_swap_ext_out,
5406 _bfd_ecoff_swap_tir_out,
5407 _bfd_ecoff_swap_rndx_out,
5408 /* Function to read in symbolic data. */
5409 elf64_alpha_read_ecoff_info
5410 };
5411 \f
5412 /* Use a non-standard hash bucket size of 8. */
5413
5414 static const struct elf_size_info alpha_elf_size_info =
5415 {
5416 sizeof (Elf64_External_Ehdr),
5417 sizeof (Elf64_External_Phdr),
5418 sizeof (Elf64_External_Shdr),
5419 sizeof (Elf64_External_Rel),
5420 sizeof (Elf64_External_Rela),
5421 sizeof (Elf64_External_Sym),
5422 sizeof (Elf64_External_Dyn),
5423 sizeof (Elf_External_Note),
5424 8,
5425 1,
5426 64, 3,
5427 ELFCLASS64, EV_CURRENT,
5428 bfd_elf64_write_out_phdrs,
5429 bfd_elf64_write_shdrs_and_ehdr,
5430 bfd_elf64_checksum_contents,
5431 bfd_elf64_write_relocs,
5432 bfd_elf64_swap_symbol_in,
5433 bfd_elf64_swap_symbol_out,
5434 bfd_elf64_slurp_reloc_table,
5435 bfd_elf64_slurp_symbol_table,
5436 bfd_elf64_swap_dyn_in,
5437 bfd_elf64_swap_dyn_out,
5438 bfd_elf64_swap_reloc_in,
5439 bfd_elf64_swap_reloc_out,
5440 bfd_elf64_swap_reloca_in,
5441 bfd_elf64_swap_reloca_out
5442 };
5443
5444 #define TARGET_LITTLE_SYM alpha_elf64_vec
5445 #define TARGET_LITTLE_NAME "elf64-alpha"
5446 #define ELF_ARCH bfd_arch_alpha
5447 #define ELF_TARGET_ID ALPHA_ELF_DATA
5448 #define ELF_MACHINE_CODE EM_ALPHA
5449 #define ELF_MAXPAGESIZE 0x10000
5450 #define ELF_COMMONPAGESIZE 0x2000
5451
5452 #define bfd_elf64_bfd_link_hash_table_create \
5453 elf64_alpha_bfd_link_hash_table_create
5454
5455 #define bfd_elf64_bfd_reloc_type_lookup \
5456 elf64_alpha_bfd_reloc_type_lookup
5457 #define bfd_elf64_bfd_reloc_name_lookup \
5458 elf64_alpha_bfd_reloc_name_lookup
5459 #define elf_info_to_howto \
5460 elf64_alpha_info_to_howto
5461
5462 #define bfd_elf64_mkobject \
5463 elf64_alpha_mkobject
5464 #define elf_backend_object_p \
5465 elf64_alpha_object_p
5466
5467 #define elf_backend_section_from_shdr \
5468 elf64_alpha_section_from_shdr
5469 #define elf_backend_section_flags \
5470 elf64_alpha_section_flags
5471 #define elf_backend_fake_sections \
5472 elf64_alpha_fake_sections
5473
5474 #define bfd_elf64_bfd_is_local_label_name \
5475 elf64_alpha_is_local_label_name
5476 #define bfd_elf64_find_nearest_line \
5477 elf64_alpha_find_nearest_line
5478 #define bfd_elf64_bfd_relax_section \
5479 elf64_alpha_relax_section
5480
5481 #define elf_backend_add_symbol_hook \
5482 elf64_alpha_add_symbol_hook
5483 #define elf_backend_relocs_compatible \
5484 _bfd_elf_relocs_compatible
5485 #define elf_backend_sort_relocs_p \
5486 elf64_alpha_sort_relocs_p
5487 #define elf_backend_check_relocs \
5488 elf64_alpha_check_relocs
5489 #define elf_backend_create_dynamic_sections \
5490 elf64_alpha_create_dynamic_sections
5491 #define elf_backend_adjust_dynamic_symbol \
5492 elf64_alpha_adjust_dynamic_symbol
5493 #define elf_backend_merge_symbol_attribute \
5494 elf64_alpha_merge_symbol_attribute
5495 #define elf_backend_copy_indirect_symbol \
5496 elf64_alpha_copy_indirect_symbol
5497 #define elf_backend_always_size_sections \
5498 elf64_alpha_always_size_sections
5499 #define elf_backend_size_dynamic_sections \
5500 elf64_alpha_size_dynamic_sections
5501 #define elf_backend_omit_section_dynsym \
5502 _bfd_elf_omit_section_dynsym_all
5503 #define elf_backend_relocate_section \
5504 elf64_alpha_relocate_section
5505 #define elf_backend_finish_dynamic_symbol \
5506 elf64_alpha_finish_dynamic_symbol
5507 #define elf_backend_finish_dynamic_sections \
5508 elf64_alpha_finish_dynamic_sections
5509 #define bfd_elf64_bfd_final_link \
5510 elf64_alpha_final_link
5511 #define elf_backend_reloc_type_class \
5512 elf64_alpha_reloc_type_class
5513
5514 #define elf_backend_can_gc_sections 1
5515 #define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5516
5517 #define elf_backend_ecoff_debug_swap \
5518 &elf64_alpha_ecoff_debug_swap
5519
5520 #define elf_backend_size_info \
5521 alpha_elf_size_info
5522
5523 #define elf_backend_special_sections \
5524 elf64_alpha_special_sections
5525
5526 /* A few constants that determine how the .plt section is set up. */
5527 #define elf_backend_want_got_plt 0
5528 #define elf_backend_plt_readonly 0
5529 #define elf_backend_want_plt_sym 1
5530 #define elf_backend_got_header_size 0
5531 #define elf_backend_dtrel_excludes_plt 1
5532
5533 #include "elf64-target.h"
5534 \f
5535 /* FreeBSD support. */
5536
5537 #undef TARGET_LITTLE_SYM
5538 #define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
5539 #undef TARGET_LITTLE_NAME
5540 #define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
5541 #undef ELF_OSABI
5542 #define ELF_OSABI ELFOSABI_FREEBSD
5543
5544 /* The kernel recognizes executables as valid only if they carry a
5545 "FreeBSD" label in the ELF header. So we put this label on all
5546 executables and (for simplicity) also all other object files. */
5547
5548 static bfd_boolean
5549 elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
5550 {
5551 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5552
5553 if (!_bfd_elf_init_file_header (abfd, info))
5554 return FALSE;
5555
5556 i_ehdrp = elf_elfheader (abfd);
5557
5558 /* Put an ABI label supported by FreeBSD >= 4.1. */
5559 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
5560 #ifdef OLD_FREEBSD_ABI_LABEL
5561 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5562 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5563 #endif
5564 return TRUE;
5565 }
5566
5567 #undef elf_backend_init_file_header
5568 #define elf_backend_init_file_header \
5569 elf64_alpha_fbsd_init_file_header
5570
5571 #undef elf64_bed
5572 #define elf64_bed elf64_alpha_fbsd_bed
5573
5574 #include "elf64-target.h"
This page took 0.142554 seconds and 4 git commands to generate.