1 /* Alpha specific support for 64-bit ELF 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 3 2006, 2007, 2008 Free Software Foundation, Inc. 4 Contributed by Richard Henderson <rth@tamu.edu>. 5 6 This file is part of BFD, the Binary File Descriptor library. 7 8 This program is free software; you can redistribute it and/or modify 9 it under the terms of the GNU General Public License as published by 10 the Free Software Foundation; either version 3 of the License, or 11 (at your option) any later version. 12 13 This program is distributed in the hope that it will be useful, 14 but WITHOUT ANY WARRANTY; without even the implied warranty of 15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 GNU General Public License for more details. 17 18 You should have received a copy of the GNU General Public License 19 along with this program; if not, write to the Free Software 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, 21 MA 02110-1301, USA. */ 22 23 24 /* We need a published ABI spec for this. Until one comes out, don't 25 assume this'll remain unchanged forever. */ 26 27 #include "sysdep.h" 28 #include "bfd.h" 29 #include "libbfd.h" 30 #include "elf-bfd.h" 31 32 #include "elf/alpha.h" 33 34 #define ALPHAECOFF 35 36 #define NO_COFF_RELOCS 37 #define NO_COFF_SYMBOLS 38 #define NO_COFF_LINENOS 39 40 /* Get the ECOFF swapping routines. Needed for the debug information. */ 41 #include "coff/internal.h" 42 #include "coff/sym.h" 43 #include "coff/symconst.h" 44 #include "coff/ecoff.h" 45 #include "coff/alpha.h" 46 #include "aout/ar.h" 47 #include "libcoff.h" 48 #include "libecoff.h" 49 #define ECOFF_64 50 #include "ecoffswap.h" 51 52 53 /* Instruction data for plt generation and relaxation. */ 54 55 #define OP_LDA 0x08 56 #define OP_LDAH 0x09 57 #define OP_LDQ 0x29 58 #define OP_BR 0x30 59 #define OP_BSR 0x34 60 61 #define INSN_LDA (OP_LDA << 26) 62 #define INSN_LDAH (OP_LDAH << 26) 63 #define INSN_LDQ (OP_LDQ << 26) 64 #define INSN_BR (OP_BR << 26) 65 66 #define INSN_ADDQ 0x40000400 67 #define INSN_RDUNIQ 0x0000009e 68 #define INSN_SUBQ 0x40000520 69 #define INSN_S4SUBQ 0x40000560 70 #define INSN_UNOP 0x2ffe0000 71 72 #define INSN_JSR 0x68004000 73 #define INSN_JMP 0x68000000 74 #define INSN_JSR_MASK 0xfc00c000 75 76 #define INSN_A(I,A) (I | (A << 21)) 77 #define INSN_AB(I,A,B) (I | (A << 21) | (B << 16)) 78 #define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C) 79 #define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff)) 80 #define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff)) 81 82 /* PLT/GOT Stuff */ 83 84 /* Set by ld emulation. Putting this into the link_info or hash structure 85 is simply working too hard. */ 86 #ifdef USE_SECUREPLT 87 bfd_boolean elf64_alpha_use_secureplt = TRUE; 88 #else 89 bfd_boolean elf64_alpha_use_secureplt = FALSE; 90 #endif 91 92 #define OLD_PLT_HEADER_SIZE 32 93 #define OLD_PLT_ENTRY_SIZE 12 94 #define NEW_PLT_HEADER_SIZE 36 95 #define NEW_PLT_ENTRY_SIZE 4 96 97 #define PLT_HEADER_SIZE \ 98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE) 99 #define PLT_ENTRY_SIZE \ 100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE) 101 102 /* ld --traditional-format uses this older format instead. */ 103 #define OLD_PLT_ENTRY_WORD1 0x279f0000 /* ldah $28, 0($31) */ 104 #define OLD_PLT_ENTRY_WORD2 0x239c0000 /* lda $28, 0($28) */ 105 #define OLD_PLT_ENTRY_WORD3 0xc3e00000 /* br $31, plt0 */ 106 107 #define MAX_GOT_SIZE (64*1024) 108 109 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so" 110 111 /* Handle an Alpha specific section when reading an object file. This 112 is called when elfcode.h finds a section with an unknown type. 113 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure 114 how to. */ 115 116 struct alpha_elf_link_hash_entry 117 { 118 struct elf_link_hash_entry root; 119 120 /* External symbol information. */ 121 EXTR esym; 122 123 /* Cumulative flags for all the .got entries. */ 124 int flags; 125 126 /* Contexts in which a literal was referenced. */ 127 #define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01 128 #define ALPHA_ELF_LINK_HASH_LU_MEM 0x02 129 #define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04 130 #define ALPHA_ELF_LINK_HASH_LU_JSR 0x08 131 #define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10 132 #define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20 133 #define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40 134 #define ALPHA_ELF_LINK_HASH_LU_PLT 0x38 135 #define ALPHA_ELF_LINK_HASH_TLS_IE 0x80 136 137 /* Used to implement multiple .got subsections. */ 138 struct alpha_elf_got_entry 139 { 140 struct alpha_elf_got_entry *next; 141 142 /* Which .got subsection? */ 143 bfd *gotobj; 144 145 /* The addend in effect for this entry. */ 146 bfd_vma addend; 147 148 /* The .got offset for this entry. */ 149 int got_offset; 150 151 /* The .plt offset for this entry. */ 152 int plt_offset; 153 154 /* How many references to this entry? */ 155 int use_count; 156 157 /* The relocation type of this entry. */ 158 unsigned char reloc_type; 159 160 /* How a LITERAL is used. */ 161 unsigned char flags; 162 163 /* Have we initialized the dynamic relocation for this entry? */ 164 unsigned char reloc_done; 165 166 /* Have we adjusted this entry for SEC_MERGE? */ 167 unsigned char reloc_xlated; 168 } *got_entries; 169 170 /* Used to count non-got, non-plt relocations for delayed sizing 171 of relocation sections. */ 172 struct alpha_elf_reloc_entry 173 { 174 struct alpha_elf_reloc_entry *next; 175 176 /* Which .reloc section? */ 177 asection *srel; 178 179 /* What kind of relocation? */ 180 unsigned int rtype; 181 182 /* Is this against read-only section? */ 183 unsigned int reltext : 1; 184 185 /* How many did we find? */ 186 unsigned long count; 187 } *reloc_entries; 188 }; 189 190 /* Alpha ELF linker hash table. */ 191 192 struct alpha_elf_link_hash_table 193 { 194 struct elf_link_hash_table root; 195 196 /* The head of a list of .got subsections linked through 197 alpha_elf_tdata(abfd)->got_link_next. */ 198 bfd *got_list; 199 200 /* The most recent relax pass that we've seen. The GOTs 201 should be regenerated if this doesn't match. */ 202 int relax_trip; 203 }; 204 205 /* Look up an entry in a Alpha ELF linker hash table. */ 206 207 #define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \ 208 ((struct alpha_elf_link_hash_entry *) \ 209 elf_link_hash_lookup (&(table)->root, (string), (create), \ 210 (copy), (follow))) 211 212 /* Traverse a Alpha ELF linker hash table. */ 213 214 #define alpha_elf_link_hash_traverse(table, func, info) \ 215 (elf_link_hash_traverse \ 216 (&(table)->root, \ 217 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \ 218 (info))) 219 220 /* Get the Alpha ELF linker hash table from a link_info structure. */ 221 222 #define alpha_elf_hash_table(p) \ 223 ((struct alpha_elf_link_hash_table *) ((p)->hash)) 224 225 /* Get the object's symbols as our own entry type. */ 226 227 #define alpha_elf_sym_hashes(abfd) \ 228 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd)) 229 230 /* Should we do dynamic things to this symbol? This differs from the 231 generic version in that we never need to consider function pointer 232 equality wrt PLT entries -- we don't create a PLT entry if a symbol's 233 address is ever taken. */ 234 235 static inline bfd_boolean 236 alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h, 237 struct bfd_link_info *info) 238 { 239 return _bfd_elf_dynamic_symbol_p (h, info, 0); 240 } 241 242 /* Create an entry in a Alpha ELF linker hash table. */ 243 244 static struct bfd_hash_entry * 245 elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry, 246 struct bfd_hash_table *table, 247 const char *string) 248 { 249 struct alpha_elf_link_hash_entry *ret = 250 (struct alpha_elf_link_hash_entry *) entry; 251 252 /* Allocate the structure if it has not already been allocated by a 253 subclass. */ 254 if (ret == (struct alpha_elf_link_hash_entry *) NULL) 255 ret = ((struct alpha_elf_link_hash_entry *) 256 bfd_hash_allocate (table, 257 sizeof (struct alpha_elf_link_hash_entry))); 258 if (ret == (struct alpha_elf_link_hash_entry *) NULL) 259 return (struct bfd_hash_entry *) ret; 260 261 /* Call the allocation method of the superclass. */ 262 ret = ((struct alpha_elf_link_hash_entry *) 263 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret, 264 table, string)); 265 if (ret != (struct alpha_elf_link_hash_entry *) NULL) 266 { 267 /* Set local fields. */ 268 memset (&ret->esym, 0, sizeof (EXTR)); 269 /* We use -2 as a marker to indicate that the information has 270 not been set. -1 means there is no associated ifd. */ 271 ret->esym.ifd = -2; 272 ret->flags = 0; 273 ret->got_entries = NULL; 274 ret->reloc_entries = NULL; 275 } 276 277 return (struct bfd_hash_entry *) ret; 278 } 279 280 /* Create a Alpha ELF linker hash table. */ 281 282 static struct bfd_link_hash_table * 283 elf64_alpha_bfd_link_hash_table_create (bfd *abfd) 284 { 285 struct alpha_elf_link_hash_table *ret; 286 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table); 287 288 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt); 289 if (ret == (struct alpha_elf_link_hash_table *) NULL) 290 return NULL; 291 292 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd, 293 elf64_alpha_link_hash_newfunc, 294 sizeof (struct alpha_elf_link_hash_entry))) 295 { 296 free (ret); 297 return NULL; 298 } 299 300 return &ret->root.root; 301 } 302 303 /* We have some private fields hanging off of the elf_tdata structure. */ 304 305 struct alpha_elf_obj_tdata 306 { 307 struct elf_obj_tdata root; 308 309 /* For every input file, these are the got entries for that object's 310 local symbols. */ 311 struct alpha_elf_got_entry ** local_got_entries; 312 313 /* For every input file, this is the object that owns the got that 314 this input file uses. */ 315 bfd *gotobj; 316 317 /* For every got, this is a linked list through the objects using this got */ 318 bfd *in_got_link_next; 319 320 /* For every got, this is a link to the next got subsegment. */ 321 bfd *got_link_next; 322 323 /* For every got, this is the section. */ 324 asection *got; 325 326 /* For every got, this is it's total number of words. */ 327 int total_got_size; 328 329 /* For every got, this is the sum of the number of words required 330 to hold all of the member object's local got. */ 331 int local_got_size; 332 }; 333 334 #define alpha_elf_tdata(abfd) \ 335 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any) 336 337 #define is_alpha_elf(bfd) \ 338 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \ 339 && elf_tdata (bfd) != NULL \ 340 && elf_object_id (bfd) == ALPHA_ELF_TDATA) 341 342 static bfd_boolean 343 elf64_alpha_mkobject (bfd *abfd) 344 { 345 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata), 346 ALPHA_ELF_TDATA); 347 } 348 349 static bfd_boolean 350 elf64_alpha_object_p (bfd *abfd) 351 { 352 /* Set the right machine number for an Alpha ELF file. */ 353 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0); 354 } 355 356 /* A relocation function which doesn't do anything. */ 357 358 static bfd_reloc_status_type 359 elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc, 360 asymbol *sym ATTRIBUTE_UNUSED, 361 PTR data ATTRIBUTE_UNUSED, asection *sec, 362 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED) 363 { 364 if (output_bfd) 365 reloc->address += sec->output_offset; 366 return bfd_reloc_ok; 367 } 368 369 /* A relocation function used for an unsupported reloc. */ 370 371 static bfd_reloc_status_type 372 elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc, 373 asymbol *sym ATTRIBUTE_UNUSED, 374 PTR data ATTRIBUTE_UNUSED, asection *sec, 375 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED) 376 { 377 if (output_bfd) 378 reloc->address += sec->output_offset; 379 return bfd_reloc_notsupported; 380 } 381 382 /* Do the work of the GPDISP relocation. */ 383 384 static bfd_reloc_status_type 385 elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah, 386 bfd_byte *p_lda) 387 { 388 bfd_reloc_status_type ret = bfd_reloc_ok; 389 bfd_vma addend; 390 unsigned long i_ldah, i_lda; 391 392 i_ldah = bfd_get_32 (abfd, p_ldah); 393 i_lda = bfd_get_32 (abfd, p_lda); 394 395 /* Complain if the instructions are not correct. */ 396 if (((i_ldah >> 26) & 0x3f) != 0x09 397 || ((i_lda >> 26) & 0x3f) != 0x08) 398 ret = bfd_reloc_dangerous; 399 400 /* Extract the user-supplied offset, mirroring the sign extensions 401 that the instructions perform. */ 402 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff); 403 addend = (addend ^ 0x80008000) - 0x80008000; 404 405 gpdisp += addend; 406 407 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000 408 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000) 409 ret = bfd_reloc_overflow; 410 411 /* compensate for the sign extension again. */ 412 i_ldah = ((i_ldah & 0xffff0000) 413 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff)); 414 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff); 415 416 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah); 417 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda); 418 419 return ret; 420 } 421 422 /* The special function for the GPDISP reloc. */ 423 424 static bfd_reloc_status_type 425 elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry, 426 asymbol *sym ATTRIBUTE_UNUSED, PTR data, 427 asection *input_section, bfd *output_bfd, 428 char **err_msg) 429 { 430 bfd_reloc_status_type ret; 431 bfd_vma gp, relocation; 432 bfd_vma high_address; 433 bfd_byte *p_ldah, *p_lda; 434 435 /* Don't do anything if we're not doing a final link. */ 436 if (output_bfd) 437 { 438 reloc_entry->address += input_section->output_offset; 439 return bfd_reloc_ok; 440 } 441 442 high_address = bfd_get_section_limit (abfd, input_section); 443 if (reloc_entry->address > high_address 444 || reloc_entry->address + reloc_entry->addend > high_address) 445 return bfd_reloc_outofrange; 446 447 /* The gp used in the portion of the output object to which this 448 input object belongs is cached on the input bfd. */ 449 gp = _bfd_get_gp_value (abfd); 450 451 relocation = (input_section->output_section->vma 452 + input_section->output_offset 453 + reloc_entry->address); 454 455 p_ldah = (bfd_byte *) data + reloc_entry->address; 456 p_lda = p_ldah + reloc_entry->addend; 457 458 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda); 459 460 /* Complain if the instructions are not correct. */ 461 if (ret == bfd_reloc_dangerous) 462 *err_msg = _("GPDISP relocation did not find ldah and lda instructions"); 463 464 return ret; 465 } 466 467 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value 468 from smaller values. Start with zero, widen, *then* decrement. */ 469 #define MINUS_ONE (((bfd_vma)0) - 1) 470 471 #define SKIP_HOWTO(N) \ 472 HOWTO(N, 0, 0, 0, 0, 0, 0, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0) 473 474 static reloc_howto_type elf64_alpha_howto_table[] = 475 { 476 HOWTO (R_ALPHA_NONE, /* type */ 477 0, /* rightshift */ 478 0, /* size (0 = byte, 1 = short, 2 = long) */ 479 8, /* bitsize */ 480 TRUE, /* pc_relative */ 481 0, /* bitpos */ 482 complain_overflow_dont, /* complain_on_overflow */ 483 elf64_alpha_reloc_nil, /* special_function */ 484 "NONE", /* name */ 485 FALSE, /* partial_inplace */ 486 0, /* src_mask */ 487 0, /* dst_mask */ 488 TRUE), /* pcrel_offset */ 489 490 /* A 32 bit reference to a symbol. */ 491 HOWTO (R_ALPHA_REFLONG, /* type */ 492 0, /* rightshift */ 493 2, /* size (0 = byte, 1 = short, 2 = long) */ 494 32, /* bitsize */ 495 FALSE, /* pc_relative */ 496 0, /* bitpos */ 497 complain_overflow_bitfield, /* complain_on_overflow */ 498 0, /* special_function */ 499 "REFLONG", /* name */ 500 FALSE, /* partial_inplace */ 501 0xffffffff, /* src_mask */ 502 0xffffffff, /* dst_mask */ 503 FALSE), /* pcrel_offset */ 504 505 /* A 64 bit reference to a symbol. */ 506 HOWTO (R_ALPHA_REFQUAD, /* type */ 507 0, /* rightshift */ 508 4, /* size (0 = byte, 1 = short, 2 = long) */ 509 64, /* bitsize */ 510 FALSE, /* pc_relative */ 511 0, /* bitpos */ 512 complain_overflow_bitfield, /* complain_on_overflow */ 513 0, /* special_function */ 514 "REFQUAD", /* name */ 515 FALSE, /* partial_inplace */ 516 MINUS_ONE, /* src_mask */ 517 MINUS_ONE, /* dst_mask */ 518 FALSE), /* pcrel_offset */ 519 520 /* A 32 bit GP relative offset. This is just like REFLONG except 521 that when the value is used the value of the gp register will be 522 added in. */ 523 HOWTO (R_ALPHA_GPREL32, /* type */ 524 0, /* rightshift */ 525 2, /* size (0 = byte, 1 = short, 2 = long) */ 526 32, /* bitsize */ 527 FALSE, /* pc_relative */ 528 0, /* bitpos */ 529 complain_overflow_bitfield, /* complain_on_overflow */ 530 0, /* special_function */ 531 "GPREL32", /* name */ 532 FALSE, /* partial_inplace */ 533 0xffffffff, /* src_mask */ 534 0xffffffff, /* dst_mask */ 535 FALSE), /* pcrel_offset */ 536 537 /* Used for an instruction that refers to memory off the GP register. */ 538 HOWTO (R_ALPHA_LITERAL, /* type */ 539 0, /* rightshift */ 540 1, /* size (0 = byte, 1 = short, 2 = long) */ 541 16, /* bitsize */ 542 FALSE, /* pc_relative */ 543 0, /* bitpos */ 544 complain_overflow_signed, /* complain_on_overflow */ 545 0, /* special_function */ 546 "ELF_LITERAL", /* name */ 547 FALSE, /* partial_inplace */ 548 0xffff, /* src_mask */ 549 0xffff, /* dst_mask */ 550 FALSE), /* pcrel_offset */ 551 552 /* This reloc only appears immediately following an ELF_LITERAL reloc. 553 It identifies a use of the literal. The symbol index is special: 554 1 means the literal address is in the base register of a memory 555 format instruction; 2 means the literal address is in the byte 556 offset register of a byte-manipulation instruction; 3 means the 557 literal address is in the target register of a jsr instruction. 558 This does not actually do any relocation. */ 559 HOWTO (R_ALPHA_LITUSE, /* type */ 560 0, /* rightshift */ 561 1, /* size (0 = byte, 1 = short, 2 = long) */ 562 32, /* bitsize */ 563 FALSE, /* pc_relative */ 564 0, /* bitpos */ 565 complain_overflow_dont, /* complain_on_overflow */ 566 elf64_alpha_reloc_nil, /* special_function */ 567 "LITUSE", /* name */ 568 FALSE, /* partial_inplace */ 569 0, /* src_mask */ 570 0, /* dst_mask */ 571 FALSE), /* pcrel_offset */ 572 573 /* Load the gp register. This is always used for a ldah instruction 574 which loads the upper 16 bits of the gp register. The symbol 575 index of the GPDISP instruction is an offset in bytes to the lda 576 instruction that loads the lower 16 bits. The value to use for 577 the relocation is the difference between the GP value and the 578 current location; the load will always be done against a register 579 holding the current address. 580 581 NOTE: Unlike ECOFF, partial in-place relocation is not done. If 582 any offset is present in the instructions, it is an offset from 583 the register to the ldah instruction. This lets us avoid any 584 stupid hackery like inventing a gp value to do partial relocation 585 against. Also unlike ECOFF, we do the whole relocation off of 586 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd, 587 space consuming bit, that, since all the information was present 588 in the GPDISP_HI16 reloc. */ 589 HOWTO (R_ALPHA_GPDISP, /* type */ 590 16, /* rightshift */ 591 2, /* size (0 = byte, 1 = short, 2 = long) */ 592 16, /* bitsize */ 593 FALSE, /* pc_relative */ 594 0, /* bitpos */ 595 complain_overflow_dont, /* complain_on_overflow */ 596 elf64_alpha_reloc_gpdisp, /* special_function */ 597 "GPDISP", /* name */ 598 FALSE, /* partial_inplace */ 599 0xffff, /* src_mask */ 600 0xffff, /* dst_mask */ 601 TRUE), /* pcrel_offset */ 602 603 /* A 21 bit branch. */ 604 HOWTO (R_ALPHA_BRADDR, /* type */ 605 2, /* rightshift */ 606 2, /* size (0 = byte, 1 = short, 2 = long) */ 607 21, /* bitsize */ 608 TRUE, /* pc_relative */ 609 0, /* bitpos */ 610 complain_overflow_signed, /* complain_on_overflow */ 611 0, /* special_function */ 612 "BRADDR", /* name */ 613 FALSE, /* partial_inplace */ 614 0x1fffff, /* src_mask */ 615 0x1fffff, /* dst_mask */ 616 TRUE), /* pcrel_offset */ 617 618 /* A hint for a jump to a register. */ 619 HOWTO (R_ALPHA_HINT, /* type */ 620 2, /* rightshift */ 621 1, /* size (0 = byte, 1 = short, 2 = long) */ 622 14, /* bitsize */ 623 TRUE, /* pc_relative */ 624 0, /* bitpos */ 625 complain_overflow_dont, /* complain_on_overflow */ 626 0, /* special_function */ 627 "HINT", /* name */ 628 FALSE, /* partial_inplace */ 629 0x3fff, /* src_mask */ 630 0x3fff, /* dst_mask */ 631 TRUE), /* pcrel_offset */ 632 633 /* 16 bit PC relative offset. */ 634 HOWTO (R_ALPHA_SREL16, /* type */ 635 0, /* rightshift */ 636 1, /* size (0 = byte, 1 = short, 2 = long) */ 637 16, /* bitsize */ 638 TRUE, /* pc_relative */ 639 0, /* bitpos */ 640 complain_overflow_signed, /* complain_on_overflow */ 641 0, /* special_function */ 642 "SREL16", /* name */ 643 FALSE, /* partial_inplace */ 644 0xffff, /* src_mask */ 645 0xffff, /* dst_mask */ 646 TRUE), /* pcrel_offset */ 647 648 /* 32 bit PC relative offset. */ 649 HOWTO (R_ALPHA_SREL32, /* type */ 650 0, /* rightshift */ 651 2, /* size (0 = byte, 1 = short, 2 = long) */ 652 32, /* bitsize */ 653 TRUE, /* pc_relative */ 654 0, /* bitpos */ 655 complain_overflow_signed, /* complain_on_overflow */ 656 0, /* special_function */ 657 "SREL32", /* name */ 658 FALSE, /* partial_inplace */ 659 0xffffffff, /* src_mask */ 660 0xffffffff, /* dst_mask */ 661 TRUE), /* pcrel_offset */ 662 663 /* A 64 bit PC relative offset. */ 664 HOWTO (R_ALPHA_SREL64, /* type */ 665 0, /* rightshift */ 666 4, /* size (0 = byte, 1 = short, 2 = long) */ 667 64, /* bitsize */ 668 TRUE, /* pc_relative */ 669 0, /* bitpos */ 670 complain_overflow_signed, /* complain_on_overflow */ 671 0, /* special_function */ 672 "SREL64", /* name */ 673 FALSE, /* partial_inplace */ 674 MINUS_ONE, /* src_mask */ 675 MINUS_ONE, /* dst_mask */ 676 TRUE), /* pcrel_offset */ 677 678 /* Skip 12 - 16; deprecated ECOFF relocs. */ 679 SKIP_HOWTO (12), 680 SKIP_HOWTO (13), 681 SKIP_HOWTO (14), 682 SKIP_HOWTO (15), 683 SKIP_HOWTO (16), 684 685 /* The high 16 bits of the displacement from GP to the target. */ 686 HOWTO (R_ALPHA_GPRELHIGH, 687 0, /* rightshift */ 688 1, /* size (0 = byte, 1 = short, 2 = long) */ 689 16, /* bitsize */ 690 FALSE, /* pc_relative */ 691 0, /* bitpos */ 692 complain_overflow_signed, /* complain_on_overflow */ 693 0, /* special_function */ 694 "GPRELHIGH", /* name */ 695 FALSE, /* partial_inplace */ 696 0xffff, /* src_mask */ 697 0xffff, /* dst_mask */ 698 FALSE), /* pcrel_offset */ 699 700 /* The low 16 bits of the displacement from GP to the target. */ 701 HOWTO (R_ALPHA_GPRELLOW, 702 0, /* rightshift */ 703 1, /* size (0 = byte, 1 = short, 2 = long) */ 704 16, /* bitsize */ 705 FALSE, /* pc_relative */ 706 0, /* bitpos */ 707 complain_overflow_dont, /* complain_on_overflow */ 708 0, /* special_function */ 709 "GPRELLOW", /* name */ 710 FALSE, /* partial_inplace */ 711 0xffff, /* src_mask */ 712 0xffff, /* dst_mask */ 713 FALSE), /* pcrel_offset */ 714 715 /* A 16-bit displacement from the GP to the target. */ 716 HOWTO (R_ALPHA_GPREL16, 717 0, /* rightshift */ 718 1, /* size (0 = byte, 1 = short, 2 = long) */ 719 16, /* bitsize */ 720 FALSE, /* pc_relative */ 721 0, /* bitpos */ 722 complain_overflow_signed, /* complain_on_overflow */ 723 0, /* special_function */ 724 "GPREL16", /* name */ 725 FALSE, /* partial_inplace */ 726 0xffff, /* src_mask */ 727 0xffff, /* dst_mask */ 728 FALSE), /* pcrel_offset */ 729 730 /* Skip 20 - 23; deprecated ECOFF relocs. */ 731 SKIP_HOWTO (20), 732 SKIP_HOWTO (21), 733 SKIP_HOWTO (22), 734 SKIP_HOWTO (23), 735 736 /* Misc ELF relocations. */ 737 738 /* A dynamic relocation to copy the target into our .dynbss section. */ 739 /* Not generated, as all Alpha objects use PIC, so it is not needed. It 740 is present because every other ELF has one, but should not be used 741 because .dynbss is an ugly thing. */ 742 HOWTO (R_ALPHA_COPY, 743 0, 744 0, 745 0, 746 FALSE, 747 0, 748 complain_overflow_dont, 749 bfd_elf_generic_reloc, 750 "COPY", 751 FALSE, 752 0, 753 0, 754 TRUE), 755 756 /* A dynamic relocation for a .got entry. */ 757 HOWTO (R_ALPHA_GLOB_DAT, 758 0, 759 0, 760 0, 761 FALSE, 762 0, 763 complain_overflow_dont, 764 bfd_elf_generic_reloc, 765 "GLOB_DAT", 766 FALSE, 767 0, 768 0, 769 TRUE), 770 771 /* A dynamic relocation for a .plt entry. */ 772 HOWTO (R_ALPHA_JMP_SLOT, 773 0, 774 0, 775 0, 776 FALSE, 777 0, 778 complain_overflow_dont, 779 bfd_elf_generic_reloc, 780 "JMP_SLOT", 781 FALSE, 782 0, 783 0, 784 TRUE), 785 786 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */ 787 HOWTO (R_ALPHA_RELATIVE, 788 0, 789 0, 790 0, 791 FALSE, 792 0, 793 complain_overflow_dont, 794 bfd_elf_generic_reloc, 795 "RELATIVE", 796 FALSE, 797 0, 798 0, 799 TRUE), 800 801 /* A 21 bit branch that adjusts for gp loads. */ 802 HOWTO (R_ALPHA_BRSGP, /* type */ 803 2, /* rightshift */ 804 2, /* size (0 = byte, 1 = short, 2 = long) */ 805 21, /* bitsize */ 806 TRUE, /* pc_relative */ 807 0, /* bitpos */ 808 complain_overflow_signed, /* complain_on_overflow */ 809 0, /* special_function */ 810 "BRSGP", /* name */ 811 FALSE, /* partial_inplace */ 812 0x1fffff, /* src_mask */ 813 0x1fffff, /* dst_mask */ 814 TRUE), /* pcrel_offset */ 815 816 /* Creates a tls_index for the symbol in the got. */ 817 HOWTO (R_ALPHA_TLSGD, /* type */ 818 0, /* rightshift */ 819 1, /* size (0 = byte, 1 = short, 2 = long) */ 820 16, /* bitsize */ 821 FALSE, /* pc_relative */ 822 0, /* bitpos */ 823 complain_overflow_signed, /* complain_on_overflow */ 824 0, /* special_function */ 825 "TLSGD", /* name */ 826 FALSE, /* partial_inplace */ 827 0xffff, /* src_mask */ 828 0xffff, /* dst_mask */ 829 FALSE), /* pcrel_offset */ 830 831 /* Creates a tls_index for the (current) module in the got. */ 832 HOWTO (R_ALPHA_TLSLDM, /* type */ 833 0, /* rightshift */ 834 1, /* size (0 = byte, 1 = short, 2 = long) */ 835 16, /* bitsize */ 836 FALSE, /* pc_relative */ 837 0, /* bitpos */ 838 complain_overflow_signed, /* complain_on_overflow */ 839 0, /* special_function */ 840 "TLSLDM", /* name */ 841 FALSE, /* partial_inplace */ 842 0xffff, /* src_mask */ 843 0xffff, /* dst_mask */ 844 FALSE), /* pcrel_offset */ 845 846 /* A dynamic relocation for a DTP module entry. */ 847 HOWTO (R_ALPHA_DTPMOD64, /* type */ 848 0, /* rightshift */ 849 4, /* size (0 = byte, 1 = short, 2 = long) */ 850 64, /* bitsize */ 851 FALSE, /* pc_relative */ 852 0, /* bitpos */ 853 complain_overflow_bitfield, /* complain_on_overflow */ 854 0, /* special_function */ 855 "DTPMOD64", /* name */ 856 FALSE, /* partial_inplace */ 857 MINUS_ONE, /* src_mask */ 858 MINUS_ONE, /* dst_mask */ 859 FALSE), /* pcrel_offset */ 860 861 /* Creates a 64-bit offset in the got for the displacement 862 from DTP to the target. */ 863 HOWTO (R_ALPHA_GOTDTPREL, /* type */ 864 0, /* rightshift */ 865 1, /* size (0 = byte, 1 = short, 2 = long) */ 866 16, /* bitsize */ 867 FALSE, /* pc_relative */ 868 0, /* bitpos */ 869 complain_overflow_signed, /* complain_on_overflow */ 870 0, /* special_function */ 871 "GOTDTPREL", /* name */ 872 FALSE, /* partial_inplace */ 873 0xffff, /* src_mask */ 874 0xffff, /* dst_mask */ 875 FALSE), /* pcrel_offset */ 876 877 /* A dynamic relocation for a displacement from DTP to the target. */ 878 HOWTO (R_ALPHA_DTPREL64, /* type */ 879 0, /* rightshift */ 880 4, /* size (0 = byte, 1 = short, 2 = long) */ 881 64, /* bitsize */ 882 FALSE, /* pc_relative */ 883 0, /* bitpos */ 884 complain_overflow_bitfield, /* complain_on_overflow */ 885 0, /* special_function */ 886 "DTPREL64", /* name */ 887 FALSE, /* partial_inplace */ 888 MINUS_ONE, /* src_mask */ 889 MINUS_ONE, /* dst_mask */ 890 FALSE), /* pcrel_offset */ 891 892 /* The high 16 bits of the displacement from DTP to the target. */ 893 HOWTO (R_ALPHA_DTPRELHI, /* type */ 894 0, /* rightshift */ 895 1, /* size (0 = byte, 1 = short, 2 = long) */ 896 16, /* bitsize */ 897 FALSE, /* pc_relative */ 898 0, /* bitpos */ 899 complain_overflow_signed, /* complain_on_overflow */ 900 0, /* special_function */ 901 "DTPRELHI", /* name */ 902 FALSE, /* partial_inplace */ 903 0xffff, /* src_mask */ 904 0xffff, /* dst_mask */ 905 FALSE), /* pcrel_offset */ 906 907 /* The low 16 bits of the displacement from DTP to the target. */ 908 HOWTO (R_ALPHA_DTPRELLO, /* type */ 909 0, /* rightshift */ 910 1, /* size (0 = byte, 1 = short, 2 = long) */ 911 16, /* bitsize */ 912 FALSE, /* pc_relative */ 913 0, /* bitpos */ 914 complain_overflow_dont, /* complain_on_overflow */ 915 0, /* special_function */ 916 "DTPRELLO", /* name */ 917 FALSE, /* partial_inplace */ 918 0xffff, /* src_mask */ 919 0xffff, /* dst_mask */ 920 FALSE), /* pcrel_offset */ 921 922 /* A 16-bit displacement from DTP to the target. */ 923 HOWTO (R_ALPHA_DTPREL16, /* type */ 924 0, /* rightshift */ 925 1, /* size (0 = byte, 1 = short, 2 = long) */ 926 16, /* bitsize */ 927 FALSE, /* pc_relative */ 928 0, /* bitpos */ 929 complain_overflow_signed, /* complain_on_overflow */ 930 0, /* special_function */ 931 "DTPREL16", /* name */ 932 FALSE, /* partial_inplace */ 933 0xffff, /* src_mask */ 934 0xffff, /* dst_mask */ 935 FALSE), /* pcrel_offset */ 936 937 /* Creates a 64-bit offset in the got for the displacement 938 from TP to the target. */ 939 HOWTO (R_ALPHA_GOTTPREL, /* type */ 940 0, /* rightshift */ 941 1, /* size (0 = byte, 1 = short, 2 = long) */ 942 16, /* bitsize */ 943 FALSE, /* pc_relative */ 944 0, /* bitpos */ 945 complain_overflow_signed, /* complain_on_overflow */ 946 0, /* special_function */ 947 "GOTTPREL", /* name */ 948 FALSE, /* partial_inplace */ 949 0xffff, /* src_mask */ 950 0xffff, /* dst_mask */ 951 FALSE), /* pcrel_offset */ 952 953 /* A dynamic relocation for a displacement from TP to the target. */ 954 HOWTO (R_ALPHA_TPREL64, /* type */ 955 0, /* rightshift */ 956 4, /* size (0 = byte, 1 = short, 2 = long) */ 957 64, /* bitsize */ 958 FALSE, /* pc_relative */ 959 0, /* bitpos */ 960 complain_overflow_bitfield, /* complain_on_overflow */ 961 0, /* special_function */ 962 "TPREL64", /* name */ 963 FALSE, /* partial_inplace */ 964 MINUS_ONE, /* src_mask */ 965 MINUS_ONE, /* dst_mask */ 966 FALSE), /* pcrel_offset */ 967 968 /* The high 16 bits of the displacement from TP to the target. */ 969 HOWTO (R_ALPHA_TPRELHI, /* type */ 970 0, /* rightshift */ 971 1, /* size (0 = byte, 1 = short, 2 = long) */ 972 16, /* bitsize */ 973 FALSE, /* pc_relative */ 974 0, /* bitpos */ 975 complain_overflow_signed, /* complain_on_overflow */ 976 0, /* special_function */ 977 "TPRELHI", /* name */ 978 FALSE, /* partial_inplace */ 979 0xffff, /* src_mask */ 980 0xffff, /* dst_mask */ 981 FALSE), /* pcrel_offset */ 982 983 /* The low 16 bits of the displacement from TP to the target. */ 984 HOWTO (R_ALPHA_TPRELLO, /* type */ 985 0, /* rightshift */ 986 1, /* size (0 = byte, 1 = short, 2 = long) */ 987 16, /* bitsize */ 988 FALSE, /* pc_relative */ 989 0, /* bitpos */ 990 complain_overflow_dont, /* complain_on_overflow */ 991 0, /* special_function */ 992 "TPRELLO", /* name */ 993 FALSE, /* partial_inplace */ 994 0xffff, /* src_mask */ 995 0xffff, /* dst_mask */ 996 FALSE), /* pcrel_offset */ 997 998 /* A 16-bit displacement from TP to the target. */ 999 HOWTO (R_ALPHA_TPREL16, /* type */ 1000 0, /* rightshift */ 1001 1, /* size (0 = byte, 1 = short, 2 = long) */ 1002 16, /* bitsize */ 1003 FALSE, /* pc_relative */ 1004 0, /* bitpos */ 1005 complain_overflow_signed, /* complain_on_overflow */ 1006 0, /* special_function */ 1007 "TPREL16", /* name */ 1008 FALSE, /* partial_inplace */ 1009 0xffff, /* src_mask */ 1010 0xffff, /* dst_mask */ 1011 FALSE), /* pcrel_offset */ 1012 }; 1013 1014 /* A mapping from BFD reloc types to Alpha ELF reloc types. */ 1015 1016 struct elf_reloc_map 1017 { 1018 bfd_reloc_code_real_type bfd_reloc_val; 1019 int elf_reloc_val; 1020 }; 1021 1022 static const struct elf_reloc_map elf64_alpha_reloc_map[] = 1023 { 1024 {BFD_RELOC_NONE, R_ALPHA_NONE}, 1025 {BFD_RELOC_32, R_ALPHA_REFLONG}, 1026 {BFD_RELOC_64, R_ALPHA_REFQUAD}, 1027 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD}, 1028 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32}, 1029 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL}, 1030 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE}, 1031 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP}, 1032 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR}, 1033 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT}, 1034 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16}, 1035 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32}, 1036 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64}, 1037 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH}, 1038 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW}, 1039 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16}, 1040 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP}, 1041 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD}, 1042 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM}, 1043 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64}, 1044 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL}, 1045 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64}, 1046 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI}, 1047 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO}, 1048 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16}, 1049 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL}, 1050 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64}, 1051 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI}, 1052 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO}, 1053 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16}, 1054 }; 1055 1056 /* Given a BFD reloc type, return a HOWTO structure. */ 1057 1058 static reloc_howto_type * 1059 elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, 1060 bfd_reloc_code_real_type code) 1061 { 1062 const struct elf_reloc_map *i, *e; 1063 i = e = elf64_alpha_reloc_map; 1064 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map); 1065 for (; i != e; ++i) 1066 { 1067 if (i->bfd_reloc_val == code) 1068 return &elf64_alpha_howto_table[i->elf_reloc_val]; 1069 } 1070 return 0; 1071 } 1072 1073 static reloc_howto_type * 1074 elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, 1075 const char *r_name) 1076 { 1077 unsigned int i; 1078 1079 for (i = 0; 1080 i < (sizeof (elf64_alpha_howto_table) 1081 / sizeof (elf64_alpha_howto_table[0])); 1082 i++) 1083 if (elf64_alpha_howto_table[i].name != NULL 1084 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0) 1085 return &elf64_alpha_howto_table[i]; 1086 1087 return NULL; 1088 } 1089 1090 /* Given an Alpha ELF reloc type, fill in an arelent structure. */ 1091 1092 static void 1093 elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr, 1094 Elf_Internal_Rela *dst) 1095 { 1096 unsigned r_type = ELF64_R_TYPE(dst->r_info); 1097 BFD_ASSERT (r_type < (unsigned int) R_ALPHA_max); 1098 cache_ptr->howto = &elf64_alpha_howto_table[r_type]; 1099 } 1100 1101 /* These two relocations create a two-word entry in the got. */ 1102 #define alpha_got_entry_size(r_type) \ 1103 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8) 1104 1105 /* This is PT_TLS segment p_vaddr. */ 1106 #define alpha_get_dtprel_base(info) \ 1107 (elf_hash_table (info)->tls_sec->vma) 1108 1109 /* Main program TLS (whose template starts at PT_TLS p_vaddr) 1110 is assigned offset round(16, PT_TLS p_align). */ 1111 #define alpha_get_tprel_base(info) \ 1112 (elf_hash_table (info)->tls_sec->vma \ 1113 - align_power ((bfd_vma) 16, \ 1114 elf_hash_table (info)->tls_sec->alignment_power)) 1115 1116 /* Handle an Alpha specific section when reading an object file. This 1117 is called when bfd_section_from_shdr finds a section with an unknown 1118 type. 1119 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure 1120 how to. */ 1121 1122 static bfd_boolean 1123 elf64_alpha_section_from_shdr (bfd *abfd, 1124 Elf_Internal_Shdr *hdr, 1125 const char *name, 1126 int shindex) 1127 { 1128 asection *newsect; 1129 1130 /* There ought to be a place to keep ELF backend specific flags, but 1131 at the moment there isn't one. We just keep track of the 1132 sections by their name, instead. Fortunately, the ABI gives 1133 suggested names for all the MIPS specific sections, so we will 1134 probably get away with this. */ 1135 switch (hdr->sh_type) 1136 { 1137 case SHT_ALPHA_DEBUG: 1138 if (strcmp (name, ".mdebug") != 0) 1139 return FALSE; 1140 break; 1141 default: 1142 return FALSE; 1143 } 1144 1145 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex)) 1146 return FALSE; 1147 newsect = hdr->bfd_section; 1148 1149 if (hdr->sh_type == SHT_ALPHA_DEBUG) 1150 { 1151 if (! bfd_set_section_flags (abfd, newsect, 1152 (bfd_get_section_flags (abfd, newsect) 1153 | SEC_DEBUGGING))) 1154 return FALSE; 1155 } 1156 1157 return TRUE; 1158 } 1159 1160 /* Convert Alpha specific section flags to bfd internal section flags. */ 1161 1162 static bfd_boolean 1163 elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr) 1164 { 1165 if (hdr->sh_flags & SHF_ALPHA_GPREL) 1166 *flags |= SEC_SMALL_DATA; 1167 1168 return TRUE; 1169 } 1170 1171 /* Set the correct type for an Alpha ELF section. We do this by the 1172 section name, which is a hack, but ought to work. */ 1173 1174 static bfd_boolean 1175 elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec) 1176 { 1177 register const char *name; 1178 1179 name = bfd_get_section_name (abfd, sec); 1180 1181 if (strcmp (name, ".mdebug") == 0) 1182 { 1183 hdr->sh_type = SHT_ALPHA_DEBUG; 1184 /* In a shared object on Irix 5.3, the .mdebug section has an 1185 entsize of 0. FIXME: Does this matter? */ 1186 if ((abfd->flags & DYNAMIC) != 0 ) 1187 hdr->sh_entsize = 0; 1188 else 1189 hdr->sh_entsize = 1; 1190 } 1191 else if ((sec->flags & SEC_SMALL_DATA) 1192 || strcmp (name, ".sdata") == 0 1193 || strcmp (name, ".sbss") == 0 1194 || strcmp (name, ".lit4") == 0 1195 || strcmp (name, ".lit8") == 0) 1196 hdr->sh_flags |= SHF_ALPHA_GPREL; 1197 1198 return TRUE; 1199 } 1200 1201 /* Hook called by the linker routine which adds symbols from an object 1202 file. We use it to put .comm items in .sbss, and not .bss. */ 1203 1204 static bfd_boolean 1205 elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info, 1206 Elf_Internal_Sym *sym, 1207 const char **namep ATTRIBUTE_UNUSED, 1208 flagword *flagsp ATTRIBUTE_UNUSED, 1209 asection **secp, bfd_vma *valp) 1210 { 1211 if (sym->st_shndx == SHN_COMMON 1212 && !info->relocatable 1213 && sym->st_size <= elf_gp_size (abfd)) 1214 { 1215 /* Common symbols less than or equal to -G nn bytes are 1216 automatically put into .sbss. */ 1217 1218 asection *scomm = bfd_get_section_by_name (abfd, ".scommon"); 1219 1220 if (scomm == NULL) 1221 { 1222 scomm = bfd_make_section_with_flags (abfd, ".scommon", 1223 (SEC_ALLOC 1224 | SEC_IS_COMMON 1225 | SEC_LINKER_CREATED)); 1226 if (scomm == NULL) 1227 return FALSE; 1228 } 1229 1230 *secp = scomm; 1231 *valp = sym->st_size; 1232 } 1233 1234 return TRUE; 1235 } 1236 1237 /* Create the .got section. */ 1238 1239 static bfd_boolean 1240 elf64_alpha_create_got_section (bfd *abfd, 1241 struct bfd_link_info *info ATTRIBUTE_UNUSED) 1242 { 1243 flagword flags; 1244 asection *s; 1245 1246 if (! is_alpha_elf (abfd)) 1247 return FALSE; 1248 1249 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY 1250 | SEC_LINKER_CREATED); 1251 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags); 1252 if (s == NULL 1253 || !bfd_set_section_alignment (abfd, s, 3)) 1254 return FALSE; 1255 1256 alpha_elf_tdata (abfd)->got = s; 1257 1258 /* Make sure the object's gotobj is set to itself so that we default 1259 to every object with its own .got. We'll merge .gots later once 1260 we've collected each object's info. */ 1261 alpha_elf_tdata (abfd)->gotobj = abfd; 1262 1263 return TRUE; 1264 } 1265 1266 /* Create all the dynamic sections. */ 1267 1268 static bfd_boolean 1269 elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info) 1270 { 1271 asection *s; 1272 flagword flags; 1273 struct elf_link_hash_entry *h; 1274 1275 if (! is_alpha_elf (abfd)) 1276 return FALSE; 1277 1278 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */ 1279 1280 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY 1281 | SEC_LINKER_CREATED 1282 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0)); 1283 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags); 1284 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4)) 1285 return FALSE; 1286 1287 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the 1288 .plt section. */ 1289 h = _bfd_elf_define_linkage_sym (abfd, info, s, 1290 "_PROCEDURE_LINKAGE_TABLE_"); 1291 elf_hash_table (info)->hplt = h; 1292 if (h == NULL) 1293 return FALSE; 1294 1295 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY 1296 | SEC_LINKER_CREATED | SEC_READONLY); 1297 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags); 1298 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3)) 1299 return FALSE; 1300 1301 if (elf64_alpha_use_secureplt) 1302 { 1303 flags = SEC_ALLOC | SEC_LINKER_CREATED; 1304 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags); 1305 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3)) 1306 return FALSE; 1307 } 1308 1309 /* We may or may not have created a .got section for this object, but 1310 we definitely havn't done the rest of the work. */ 1311 1312 if (alpha_elf_tdata(abfd)->gotobj == NULL) 1313 { 1314 if (!elf64_alpha_create_got_section (abfd, info)) 1315 return FALSE; 1316 } 1317 1318 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY 1319 | SEC_LINKER_CREATED | SEC_READONLY); 1320 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags); 1321 if (s == NULL 1322 || !bfd_set_section_alignment (abfd, s, 3)) 1323 return FALSE; 1324 1325 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the 1326 dynobj's .got section. We don't do this in the linker script 1327 because we don't want to define the symbol if we are not creating 1328 a global offset table. */ 1329 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got, 1330 "_GLOBAL_OFFSET_TABLE_"); 1331 elf_hash_table (info)->hgot = h; 1332 if (h == NULL) 1333 return FALSE; 1334 1335 return TRUE; 1336 } 1337 1338 /* Read ECOFF debugging information from a .mdebug section into a 1339 ecoff_debug_info structure. */ 1340 1341 static bfd_boolean 1342 elf64_alpha_read_ecoff_info (bfd *abfd, asection *section, 1343 struct ecoff_debug_info *debug) 1344 { 1345 HDRR *symhdr; 1346 const struct ecoff_debug_swap *swap; 1347 char *ext_hdr = NULL; 1348 1349 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap; 1350 memset (debug, 0, sizeof (*debug)); 1351 1352 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size); 1353 if (ext_hdr == NULL && swap->external_hdr_size != 0) 1354 goto error_return; 1355 1356 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0, 1357 swap->external_hdr_size)) 1358 goto error_return; 1359 1360 symhdr = &debug->symbolic_header; 1361 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr); 1362 1363 /* The symbolic header contains absolute file offsets and sizes to 1364 read. */ 1365 #define READ(ptr, offset, count, size, type) \ 1366 if (symhdr->count == 0) \ 1367 debug->ptr = NULL; \ 1368 else \ 1369 { \ 1370 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \ 1371 debug->ptr = (type) bfd_malloc (amt); \ 1372 if (debug->ptr == NULL) \ 1373 goto error_return; \ 1374 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \ 1375 || bfd_bread (debug->ptr, amt, abfd) != amt) \ 1376 goto error_return; \ 1377 } 1378 1379 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *); 1380 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, PTR); 1381 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, PTR); 1382 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, PTR); 1383 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, PTR); 1384 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext), 1385 union aux_ext *); 1386 READ (ss, cbSsOffset, issMax, sizeof (char), char *); 1387 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *); 1388 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, PTR); 1389 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, PTR); 1390 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, PTR); 1391 #undef READ 1392 1393 debug->fdr = NULL; 1394 1395 return TRUE; 1396 1397 error_return: 1398 if (ext_hdr != NULL) 1399 free (ext_hdr); 1400 if (debug->line != NULL) 1401 free (debug->line); 1402 if (debug->external_dnr != NULL) 1403 free (debug->external_dnr); 1404 if (debug->external_pdr != NULL) 1405 free (debug->external_pdr); 1406 if (debug->external_sym != NULL) 1407 free (debug->external_sym); 1408 if (debug->external_opt != NULL) 1409 free (debug->external_opt); 1410 if (debug->external_aux != NULL) 1411 free (debug->external_aux); 1412 if (debug->ss != NULL) 1413 free (debug->ss); 1414 if (debug->ssext != NULL) 1415 free (debug->ssext); 1416 if (debug->external_fdr != NULL) 1417 free (debug->external_fdr); 1418 if (debug->external_rfd != NULL) 1419 free (debug->external_rfd); 1420 if (debug->external_ext != NULL) 1421 free (debug->external_ext); 1422 return FALSE; 1423 } 1424 1425 /* Alpha ELF local labels start with '$'. */ 1426 1427 static bfd_boolean 1428 elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name) 1429 { 1430 return name[0] == '$'; 1431 } 1432 1433 /* Alpha ELF follows MIPS ELF in using a special find_nearest_line 1434 routine in order to handle the ECOFF debugging information. We 1435 still call this mips_elf_find_line because of the slot 1436 find_line_info in elf_obj_tdata is declared that way. */ 1437 1438 struct mips_elf_find_line 1439 { 1440 struct ecoff_debug_info d; 1441 struct ecoff_find_line i; 1442 }; 1443 1444 static bfd_boolean 1445 elf64_alpha_find_nearest_line (bfd *abfd, asection *section, asymbol **symbols, 1446 bfd_vma offset, const char **filename_ptr, 1447 const char **functionname_ptr, 1448 unsigned int *line_ptr) 1449 { 1450 asection *msec; 1451 1452 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset, 1453 filename_ptr, functionname_ptr, 1454 line_ptr, 0, 1455 &elf_tdata (abfd)->dwarf2_find_line_info)) 1456 return TRUE; 1457 1458 msec = bfd_get_section_by_name (abfd, ".mdebug"); 1459 if (msec != NULL) 1460 { 1461 flagword origflags; 1462 struct mips_elf_find_line *fi; 1463 const struct ecoff_debug_swap * const swap = 1464 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap; 1465 1466 /* If we are called during a link, alpha_elf_final_link may have 1467 cleared the SEC_HAS_CONTENTS field. We force it back on here 1468 if appropriate (which it normally will be). */ 1469 origflags = msec->flags; 1470 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS) 1471 msec->flags |= SEC_HAS_CONTENTS; 1472 1473 fi = elf_tdata (abfd)->find_line_info; 1474 if (fi == NULL) 1475 { 1476 bfd_size_type external_fdr_size; 1477 char *fraw_src; 1478 char *fraw_end; 1479 struct fdr *fdr_ptr; 1480 bfd_size_type amt = sizeof (struct mips_elf_find_line); 1481 1482 fi = (struct mips_elf_find_line *) bfd_zalloc (abfd, amt); 1483 if (fi == NULL) 1484 { 1485 msec->flags = origflags; 1486 return FALSE; 1487 } 1488 1489 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d)) 1490 { 1491 msec->flags = origflags; 1492 return FALSE; 1493 } 1494 1495 /* Swap in the FDR information. */ 1496 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr); 1497 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt); 1498 if (fi->d.fdr == NULL) 1499 { 1500 msec->flags = origflags; 1501 return FALSE; 1502 } 1503 external_fdr_size = swap->external_fdr_size; 1504 fdr_ptr = fi->d.fdr; 1505 fraw_src = (char *) fi->d.external_fdr; 1506 fraw_end = (fraw_src 1507 + fi->d.symbolic_header.ifdMax * external_fdr_size); 1508 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++) 1509 (*swap->swap_fdr_in) (abfd, (PTR) fraw_src, fdr_ptr); 1510 1511 elf_tdata (abfd)->find_line_info = fi; 1512 1513 /* Note that we don't bother to ever free this information. 1514 find_nearest_line is either called all the time, as in 1515 objdump -l, so the information should be saved, or it is 1516 rarely called, as in ld error messages, so the memory 1517 wasted is unimportant. Still, it would probably be a 1518 good idea for free_cached_info to throw it away. */ 1519 } 1520 1521 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap, 1522 &fi->i, filename_ptr, functionname_ptr, 1523 line_ptr)) 1524 { 1525 msec->flags = origflags; 1526 return TRUE; 1527 } 1528 1529 msec->flags = origflags; 1530 } 1531 1532 /* Fall back on the generic ELF find_nearest_line routine. */ 1533 1534 return _bfd_elf_find_nearest_line (abfd, section, symbols, offset, 1535 filename_ptr, functionname_ptr, 1536 line_ptr); 1537 } 1538 1539 /* Structure used to pass information to alpha_elf_output_extsym. */ 1540 1541 struct extsym_info 1542 { 1543 bfd *abfd; 1544 struct bfd_link_info *info; 1545 struct ecoff_debug_info *debug; 1546 const struct ecoff_debug_swap *swap; 1547 bfd_boolean failed; 1548 }; 1549 1550 static bfd_boolean 1551 elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, PTR data) 1552 { 1553 struct extsym_info *einfo = (struct extsym_info *) data; 1554 bfd_boolean strip; 1555 asection *sec, *output_section; 1556 1557 if (h->root.root.type == bfd_link_hash_warning) 1558 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link; 1559 1560 if (h->root.indx == -2) 1561 strip = FALSE; 1562 else if ((h->root.def_dynamic 1563 || h->root.ref_dynamic 1564 || h->root.root.type == bfd_link_hash_new) 1565 && !h->root.def_regular 1566 && !h->root.ref_regular) 1567 strip = TRUE; 1568 else if (einfo->info->strip == strip_all 1569 || (einfo->info->strip == strip_some 1570 && bfd_hash_lookup (einfo->info->keep_hash, 1571 h->root.root.root.string, 1572 FALSE, FALSE) == NULL)) 1573 strip = TRUE; 1574 else 1575 strip = FALSE; 1576 1577 if (strip) 1578 return TRUE; 1579 1580 if (h->esym.ifd == -2) 1581 { 1582 h->esym.jmptbl = 0; 1583 h->esym.cobol_main = 0; 1584 h->esym.weakext = 0; 1585 h->esym.reserved = 0; 1586 h->esym.ifd = ifdNil; 1587 h->esym.asym.value = 0; 1588 h->esym.asym.st = stGlobal; 1589 1590 if (h->root.root.type != bfd_link_hash_defined 1591 && h->root.root.type != bfd_link_hash_defweak) 1592 h->esym.asym.sc = scAbs; 1593 else 1594 { 1595 const char *name; 1596 1597 sec = h->root.root.u.def.section; 1598 output_section = sec->output_section; 1599 1600 /* When making a shared library and symbol h is the one from 1601 the another shared library, OUTPUT_SECTION may be null. */ 1602 if (output_section == NULL) 1603 h->esym.asym.sc = scUndefined; 1604 else 1605 { 1606 name = bfd_section_name (output_section->owner, output_section); 1607 1608 if (strcmp (name, ".text") == 0) 1609 h->esym.asym.sc = scText; 1610 else if (strcmp (name, ".data") == 0) 1611 h->esym.asym.sc = scData; 1612 else if (strcmp (name, ".sdata") == 0) 1613 h->esym.asym.sc = scSData; 1614 else if (strcmp (name, ".rodata") == 0 1615 || strcmp (name, ".rdata") == 0) 1616 h->esym.asym.sc = scRData; 1617 else if (strcmp (name, ".bss") == 0) 1618 h->esym.asym.sc = scBss; 1619 else if (strcmp (name, ".sbss") == 0) 1620 h->esym.asym.sc = scSBss; 1621 else if (strcmp (name, ".init") == 0) 1622 h->esym.asym.sc = scInit; 1623 else if (strcmp (name, ".fini") == 0) 1624 h->esym.asym.sc = scFini; 1625 else 1626 h->esym.asym.sc = scAbs; 1627 } 1628 } 1629 1630 h->esym.asym.reserved = 0; 1631 h->esym.asym.index = indexNil; 1632 } 1633 1634 if (h->root.root.type == bfd_link_hash_common) 1635 h->esym.asym.value = h->root.root.u.c.size; 1636 else if (h->root.root.type == bfd_link_hash_defined 1637 || h->root.root.type == bfd_link_hash_defweak) 1638 { 1639 if (h->esym.asym.sc == scCommon) 1640 h->esym.asym.sc = scBss; 1641 else if (h->esym.asym.sc == scSCommon) 1642 h->esym.asym.sc = scSBss; 1643 1644 sec = h->root.root.u.def.section; 1645 output_section = sec->output_section; 1646 if (output_section != NULL) 1647 h->esym.asym.value = (h->root.root.u.def.value 1648 + sec->output_offset 1649 + output_section->vma); 1650 else 1651 h->esym.asym.value = 0; 1652 } 1653 1654 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap, 1655 h->root.root.root.string, 1656 &h->esym)) 1657 { 1658 einfo->failed = TRUE; 1659 return FALSE; 1660 } 1661 1662 return TRUE; 1663 } 1664 1665 /* Search for and possibly create a got entry. */ 1666 1667 static struct alpha_elf_got_entry * 1668 get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h, 1669 unsigned long r_type, unsigned long r_symndx, 1670 bfd_vma r_addend) 1671 { 1672 struct alpha_elf_got_entry *gotent; 1673 struct alpha_elf_got_entry **slot; 1674 1675 if (h) 1676 slot = &h->got_entries; 1677 else 1678 { 1679 /* This is a local .got entry -- record for merge. */ 1680 1681 struct alpha_elf_got_entry **local_got_entries; 1682 1683 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries; 1684 if (!local_got_entries) 1685 { 1686 bfd_size_type size; 1687 Elf_Internal_Shdr *symtab_hdr; 1688 1689 symtab_hdr = &elf_tdata(abfd)->symtab_hdr; 1690 size = symtab_hdr->sh_info; 1691 size *= sizeof (struct alpha_elf_got_entry *); 1692 1693 local_got_entries 1694 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size); 1695 if (!local_got_entries) 1696 return NULL; 1697 1698 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries; 1699 } 1700 1701 slot = &local_got_entries[r_symndx]; 1702 } 1703 1704 for (gotent = *slot; gotent ; gotent = gotent->next) 1705 if (gotent->gotobj == abfd 1706 && gotent->reloc_type == r_type 1707 && gotent->addend == r_addend) 1708 break; 1709 1710 if (!gotent) 1711 { 1712 int entry_size; 1713 bfd_size_type amt; 1714 1715 amt = sizeof (struct alpha_elf_got_entry); 1716 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt); 1717 if (!gotent) 1718 return NULL; 1719 1720 gotent->gotobj = abfd; 1721 gotent->addend = r_addend; 1722 gotent->got_offset = -1; 1723 gotent->plt_offset = -1; 1724 gotent->use_count = 1; 1725 gotent->reloc_type = r_type; 1726 gotent->reloc_done = 0; 1727 gotent->reloc_xlated = 0; 1728 1729 gotent->next = *slot; 1730 *slot = gotent; 1731 1732 entry_size = alpha_got_entry_size (r_type); 1733 alpha_elf_tdata (abfd)->total_got_size += entry_size; 1734 if (!h) 1735 alpha_elf_tdata(abfd)->local_got_size += entry_size; 1736 } 1737 else 1738 gotent->use_count += 1; 1739 1740 return gotent; 1741 } 1742 1743 static bfd_boolean 1744 elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah) 1745 { 1746 return ((ah->root.type == STT_FUNC 1747 || ah->root.root.type == bfd_link_hash_undefweak 1748 || ah->root.root.type == bfd_link_hash_undefined) 1749 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0 1750 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0); 1751 } 1752 1753 /* Handle dynamic relocations when doing an Alpha ELF link. */ 1754 1755 static bfd_boolean 1756 elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info, 1757 asection *sec, const Elf_Internal_Rela *relocs) 1758 { 1759 bfd *dynobj; 1760 asection *sreloc; 1761 const char *rel_sec_name; 1762 Elf_Internal_Shdr *symtab_hdr; 1763 struct alpha_elf_link_hash_entry **sym_hashes; 1764 const Elf_Internal_Rela *rel, *relend; 1765 bfd_size_type amt; 1766 1767 if (info->relocatable) 1768 return TRUE; 1769 1770 /* Don't do anything special with non-loaded, non-alloced sections. 1771 In particular, any relocs in such sections should not affect GOT 1772 and PLT reference counting (ie. we don't allow them to create GOT 1773 or PLT entries), there's no possibility or desire to optimize TLS 1774 relocs, and there's not much point in propagating relocs to shared 1775 libs that the dynamic linker won't relocate. */ 1776 if ((sec->flags & SEC_ALLOC) == 0) 1777 return TRUE; 1778 1779 BFD_ASSERT (is_alpha_elf (abfd)); 1780 1781 dynobj = elf_hash_table (info)->dynobj; 1782 if (dynobj == NULL) 1783 elf_hash_table (info)->dynobj = dynobj = abfd; 1784 1785 sreloc = NULL; 1786 rel_sec_name = NULL; 1787 symtab_hdr = &elf_symtab_hdr (abfd); 1788 sym_hashes = alpha_elf_sym_hashes (abfd); 1789 1790 relend = relocs + sec->reloc_count; 1791 for (rel = relocs; rel < relend; ++rel) 1792 { 1793 enum { 1794 NEED_GOT = 1, 1795 NEED_GOT_ENTRY = 2, 1796 NEED_DYNREL = 4 1797 }; 1798 1799 unsigned long r_symndx, r_type; 1800 struct alpha_elf_link_hash_entry *h; 1801 unsigned int gotent_flags; 1802 bfd_boolean maybe_dynamic; 1803 unsigned int need; 1804 bfd_vma addend; 1805 1806 r_symndx = ELF64_R_SYM (rel->r_info); 1807 if (r_symndx < symtab_hdr->sh_info) 1808 h = NULL; 1809 else 1810 { 1811 h = sym_hashes[r_symndx - symtab_hdr->sh_info]; 1812 1813 while (h->root.root.type == bfd_link_hash_indirect 1814 || h->root.root.type == bfd_link_hash_warning) 1815 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link; 1816 1817 h->root.ref_regular = 1; 1818 } 1819 1820 /* We can only get preliminary data on whether a symbol is 1821 locally or externally defined, as not all of the input files 1822 have yet been processed. Do something with what we know, as 1823 this may help reduce memory usage and processing time later. */ 1824 maybe_dynamic = FALSE; 1825 if (h && ((info->shared 1826 && (!info->symbolic 1827 || info->unresolved_syms_in_shared_libs == RM_IGNORE)) 1828 || !h->root.def_regular 1829 || h->root.root.type == bfd_link_hash_defweak)) 1830 maybe_dynamic = TRUE; 1831 1832 need = 0; 1833 gotent_flags = 0; 1834 r_type = ELF64_R_TYPE (rel->r_info); 1835 addend = rel->r_addend; 1836 1837 switch (r_type) 1838 { 1839 case R_ALPHA_LITERAL: 1840 need = NEED_GOT | NEED_GOT_ENTRY; 1841 1842 /* Remember how this literal is used from its LITUSEs. 1843 This will be important when it comes to decide if we can 1844 create a .plt entry for a function symbol. */ 1845 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE) 1846 if (rel->r_addend >= 1 && rel->r_addend <= 6) 1847 gotent_flags |= 1 << rel->r_addend; 1848 --rel; 1849 1850 /* No LITUSEs -- presumably the address is used somehow. */ 1851 if (gotent_flags == 0) 1852 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR; 1853 break; 1854 1855 case R_ALPHA_GPDISP: 1856 case R_ALPHA_GPREL16: 1857 case R_ALPHA_GPREL32: 1858 case R_ALPHA_GPRELHIGH: 1859 case R_ALPHA_GPRELLOW: 1860 case R_ALPHA_BRSGP: 1861 need = NEED_GOT; 1862 break; 1863 1864 case R_ALPHA_REFLONG: 1865 case R_ALPHA_REFQUAD: 1866 if (info->shared || maybe_dynamic) 1867 need = NEED_DYNREL; 1868 break; 1869 1870 case R_ALPHA_TLSLDM: 1871 /* The symbol for a TLSLDM reloc is ignored. Collapse the 1872 reloc to the 0 symbol so that they all match. */ 1873 r_symndx = 0; 1874 h = 0; 1875 maybe_dynamic = FALSE; 1876 /* FALLTHRU */ 1877 1878 case R_ALPHA_TLSGD: 1879 case R_ALPHA_GOTDTPREL: 1880 need = NEED_GOT | NEED_GOT_ENTRY; 1881 break; 1882 1883 case R_ALPHA_GOTTPREL: 1884 need = NEED_GOT | NEED_GOT_ENTRY; 1885 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE; 1886 if (info->shared) 1887 info->flags |= DF_STATIC_TLS; 1888 break; 1889 1890 case R_ALPHA_TPREL64: 1891 if (info->shared || maybe_dynamic) 1892 need = NEED_DYNREL; 1893 if (info->shared) 1894 info->flags |= DF_STATIC_TLS; 1895 break; 1896 } 1897 1898 if (need & NEED_GOT) 1899 { 1900 if (alpha_elf_tdata(abfd)->gotobj == NULL) 1901 { 1902 if (!elf64_alpha_create_got_section (abfd, info)) 1903 return FALSE; 1904 } 1905 } 1906 1907 if (need & NEED_GOT_ENTRY) 1908 { 1909 struct alpha_elf_got_entry *gotent; 1910 1911 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend); 1912 if (!gotent) 1913 return FALSE; 1914 1915 if (gotent_flags) 1916 { 1917 gotent->flags |= gotent_flags; 1918 if (h) 1919 { 1920 gotent_flags |= h->flags; 1921 h->flags = gotent_flags; 1922 1923 /* Make a guess as to whether a .plt entry is needed. */ 1924 /* ??? It appears that we won't make it into 1925 adjust_dynamic_symbol for symbols that remain 1926 totally undefined. Copying this check here means 1927 we can create a plt entry for them too. */ 1928 h->root.needs_plt 1929 = (maybe_dynamic && elf64_alpha_want_plt (h)); 1930 } 1931 } 1932 } 1933 1934 if (need & NEED_DYNREL) 1935 { 1936 if (rel_sec_name == NULL) 1937 { 1938 rel_sec_name = (bfd_elf_string_from_elf_section 1939 (abfd, elf_elfheader(abfd)->e_shstrndx, 1940 elf_section_data(sec)->rel_hdr.sh_name)); 1941 if (rel_sec_name == NULL) 1942 return FALSE; 1943 1944 BFD_ASSERT (CONST_STRNEQ (rel_sec_name, ".rela") 1945 && strcmp (bfd_get_section_name (abfd, sec), 1946 rel_sec_name+5) == 0); 1947 } 1948 1949 /* We need to create the section here now whether we eventually 1950 use it or not so that it gets mapped to an output section by 1951 the linker. If not used, we'll kill it in 1952 size_dynamic_sections. */ 1953 if (sreloc == NULL) 1954 { 1955 sreloc = bfd_get_section_by_name (dynobj, rel_sec_name); 1956 if (sreloc == NULL) 1957 { 1958 flagword flags; 1959 1960 flags = (SEC_HAS_CONTENTS | SEC_IN_MEMORY 1961 | SEC_LINKER_CREATED | SEC_READONLY); 1962 if (sec->flags & SEC_ALLOC) 1963 flags |= SEC_ALLOC | SEC_LOAD; 1964 sreloc = bfd_make_section_with_flags (dynobj, 1965 rel_sec_name, 1966 flags); 1967 if (sreloc == NULL 1968 || !bfd_set_section_alignment (dynobj, sreloc, 3)) 1969 return FALSE; 1970 } 1971 } 1972 1973 if (h) 1974 { 1975 /* Since we havn't seen all of the input symbols yet, we 1976 don't know whether we'll actually need a dynamic relocation 1977 entry for this reloc. So make a record of it. Once we 1978 find out if this thing needs dynamic relocation we'll 1979 expand the relocation sections by the appropriate amount. */ 1980 1981 struct alpha_elf_reloc_entry *rent; 1982 1983 for (rent = h->reloc_entries; rent; rent = rent->next) 1984 if (rent->rtype == r_type && rent->srel == sreloc) 1985 break; 1986 1987 if (!rent) 1988 { 1989 amt = sizeof (struct alpha_elf_reloc_entry); 1990 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt); 1991 if (!rent) 1992 return FALSE; 1993 1994 rent->srel = sreloc; 1995 rent->rtype = r_type; 1996 rent->count = 1; 1997 rent->reltext = (sec->flags & SEC_READONLY) != 0; 1998 1999 rent->next = h->reloc_entries; 2000 h->reloc_entries = rent; 2001 } 2002 else 2003 rent->count++; 2004 } 2005 else if (info->shared) 2006 { 2007 /* If this is a shared library, and the section is to be 2008 loaded into memory, we need a RELATIVE reloc. */ 2009 sreloc->size += sizeof (Elf64_External_Rela); 2010 if (sec->flags & SEC_READONLY) 2011 info->flags |= DF_TEXTREL; 2012 } 2013 } 2014 } 2015 2016 return TRUE; 2017 } 2018 2019 /* Adjust a symbol defined by a dynamic object and referenced by a 2020 regular object. The current definition is in some section of the 2021 dynamic object, but we're not including those sections. We have to 2022 change the definition to something the rest of the link can 2023 understand. */ 2024 2025 static bfd_boolean 2026 elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info, 2027 struct elf_link_hash_entry *h) 2028 { 2029 bfd *dynobj; 2030 asection *s; 2031 struct alpha_elf_link_hash_entry *ah; 2032 2033 dynobj = elf_hash_table(info)->dynobj; 2034 ah = (struct alpha_elf_link_hash_entry *)h; 2035 2036 /* Now that we've seen all of the input symbols, finalize our decision 2037 about whether this symbol should get a .plt entry. Irritatingly, it 2038 is common for folk to leave undefined symbols in shared libraries, 2039 and they still expect lazy binding; accept undefined symbols in lieu 2040 of STT_FUNC. */ 2041 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah)) 2042 { 2043 h->needs_plt = TRUE; 2044 2045 s = bfd_get_section_by_name(dynobj, ".plt"); 2046 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info)) 2047 return FALSE; 2048 2049 /* We need one plt entry per got subsection. Delay allocation of 2050 the actual plt entries until size_plt_section, called from 2051 size_dynamic_sections or during relaxation. */ 2052 2053 return TRUE; 2054 } 2055 else 2056 h->needs_plt = FALSE; 2057 2058 /* If this is a weak symbol, and there is a real definition, the 2059 processor independent code will have arranged for us to see the 2060 real definition first, and we can just use the same value. */ 2061 if (h->u.weakdef != NULL) 2062 { 2063 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined 2064 || h->u.weakdef->root.type == bfd_link_hash_defweak); 2065 h->root.u.def.section = h->u.weakdef->root.u.def.section; 2066 h->root.u.def.value = h->u.weakdef->root.u.def.value; 2067 return TRUE; 2068 } 2069 2070 /* This is a reference to a symbol defined by a dynamic object which 2071 is not a function. The Alpha, since it uses .got entries for all 2072 symbols even in regular objects, does not need the hackery of a 2073 .dynbss section and COPY dynamic relocations. */ 2074 2075 return TRUE; 2076 } 2077 2078 /* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */ 2079 2080 static void 2081 elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h, 2082 const Elf_Internal_Sym *isym, 2083 bfd_boolean definition, 2084 bfd_boolean dynamic) 2085 { 2086 if (!dynamic && definition) 2087 h->other = ((h->other & ELF_ST_VISIBILITY (-1)) 2088 | (isym->st_other & ~ELF_ST_VISIBILITY (-1))); 2089 } 2090 2091 /* Symbol versioning can create new symbols, and make our old symbols 2092 indirect to the new ones. Consolidate the got and reloc information 2093 in these situations. */ 2094 2095 static bfd_boolean 2096 elf64_alpha_merge_ind_symbols (struct alpha_elf_link_hash_entry *hi, 2097 PTR dummy ATTRIBUTE_UNUSED) 2098 { 2099 struct alpha_elf_link_hash_entry *hs; 2100 2101 if (hi->root.root.type != bfd_link_hash_indirect) 2102 return TRUE; 2103 hs = hi; 2104 do { 2105 hs = (struct alpha_elf_link_hash_entry *)hs->root.root.u.i.link; 2106 } while (hs->root.root.type == bfd_link_hash_indirect); 2107 2108 /* Merge the flags. Whee. */ 2109 2110 hs->flags |= hi->flags; 2111 2112 /* Merge the .got entries. Cannibalize the old symbol's list in 2113 doing so, since we don't need it anymore. */ 2114 2115 if (hs->got_entries == NULL) 2116 hs->got_entries = hi->got_entries; 2117 else 2118 { 2119 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh; 2120 2121 gsh = hs->got_entries; 2122 for (gi = hi->got_entries; gi ; gi = gin) 2123 { 2124 gin = gi->next; 2125 for (gs = gsh; gs ; gs = gs->next) 2126 if (gi->gotobj == gs->gotobj 2127 && gi->reloc_type == gs->reloc_type 2128 && gi->addend == gs->addend) 2129 { 2130 gi->use_count += gs->use_count; 2131 goto got_found; 2132 } 2133 gi->next = hs->got_entries; 2134 hs->got_entries = gi; 2135 got_found:; 2136 } 2137 } 2138 hi->got_entries = NULL; 2139 2140 /* And similar for the reloc entries. */ 2141 2142 if (hs->reloc_entries == NULL) 2143 hs->reloc_entries = hi->reloc_entries; 2144 else 2145 { 2146 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh; 2147 2148 rsh = hs->reloc_entries; 2149 for (ri = hi->reloc_entries; ri ; ri = rin) 2150 { 2151 rin = ri->next; 2152 for (rs = rsh; rs ; rs = rs->next) 2153 if (ri->rtype == rs->rtype && ri->srel == rs->srel) 2154 { 2155 rs->count += ri->count; 2156 goto found_reloc; 2157 } 2158 ri->next = hs->reloc_entries; 2159 hs->reloc_entries = ri; 2160 found_reloc:; 2161 } 2162 } 2163 hi->reloc_entries = NULL; 2164 2165 return TRUE; 2166 } 2167 2168 /* Is it possible to merge two object file's .got tables? */ 2169 2170 static bfd_boolean 2171 elf64_alpha_can_merge_gots (bfd *a, bfd *b) 2172 { 2173 int total = alpha_elf_tdata (a)->total_got_size; 2174 bfd *bsub; 2175 2176 /* Trivial quick fallout test. */ 2177 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE) 2178 return TRUE; 2179 2180 /* By their nature, local .got entries cannot be merged. */ 2181 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE) 2182 return FALSE; 2183 2184 /* Failing the common trivial comparison, we must effectively 2185 perform the merge. Not actually performing the merge means that 2186 we don't have to store undo information in case we fail. */ 2187 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next) 2188 { 2189 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub); 2190 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr; 2191 int i, n; 2192 2193 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info; 2194 for (i = 0; i < n; ++i) 2195 { 2196 struct alpha_elf_got_entry *ae, *be; 2197 struct alpha_elf_link_hash_entry *h; 2198 2199 h = hashes[i]; 2200 while (h->root.root.type == bfd_link_hash_indirect 2201 || h->root.root.type == bfd_link_hash_warning) 2202 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link; 2203 2204 for (be = h->got_entries; be ; be = be->next) 2205 { 2206 if (be->use_count == 0) 2207 continue; 2208 if (be->gotobj != b) 2209 continue; 2210 2211 for (ae = h->got_entries; ae ; ae = ae->next) 2212 if (ae->gotobj == a 2213 && ae->reloc_type == be->reloc_type 2214 && ae->addend == be->addend) 2215 goto global_found; 2216 2217 total += alpha_got_entry_size (be->reloc_type); 2218 if (total > MAX_GOT_SIZE) 2219 return FALSE; 2220 global_found:; 2221 } 2222 } 2223 } 2224 2225 return TRUE; 2226 } 2227 2228 /* Actually merge two .got tables. */ 2229 2230 static void 2231 elf64_alpha_merge_gots (bfd *a, bfd *b) 2232 { 2233 int total = alpha_elf_tdata (a)->total_got_size; 2234 bfd *bsub; 2235 2236 /* Remember local expansion. */ 2237 { 2238 int e = alpha_elf_tdata (b)->local_got_size; 2239 total += e; 2240 alpha_elf_tdata (a)->local_got_size += e; 2241 } 2242 2243 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next) 2244 { 2245 struct alpha_elf_got_entry **local_got_entries; 2246 struct alpha_elf_link_hash_entry **hashes; 2247 Elf_Internal_Shdr *symtab_hdr; 2248 int i, n; 2249 2250 /* Let the local .got entries know they are part of a new subsegment. */ 2251 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries; 2252 if (local_got_entries) 2253 { 2254 n = elf_tdata (bsub)->symtab_hdr.sh_info; 2255 for (i = 0; i < n; ++i) 2256 { 2257 struct alpha_elf_got_entry *ent; 2258 for (ent = local_got_entries[i]; ent; ent = ent->next) 2259 ent->gotobj = a; 2260 } 2261 } 2262 2263 /* Merge the global .got entries. */ 2264 hashes = alpha_elf_sym_hashes (bsub); 2265 symtab_hdr = &elf_tdata (bsub)->symtab_hdr; 2266 2267 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info; 2268 for (i = 0; i < n; ++i) 2269 { 2270 struct alpha_elf_got_entry *ae, *be, **pbe, **start; 2271 struct alpha_elf_link_hash_entry *h; 2272 2273 h = hashes[i]; 2274 while (h->root.root.type == bfd_link_hash_indirect 2275 || h->root.root.type == bfd_link_hash_warning) 2276 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link; 2277 2278 pbe = start = &h->got_entries; 2279 while ((be = *pbe) != NULL) 2280 { 2281 if (be->use_count == 0) 2282 { 2283 *pbe = be->next; 2284 memset (be, 0xa5, sizeof (*be)); 2285 goto kill; 2286 } 2287 if (be->gotobj != b) 2288 goto next; 2289 2290 for (ae = *start; ae ; ae = ae->next) 2291 if (ae->gotobj == a 2292 && ae->reloc_type == be->reloc_type 2293 && ae->addend == be->addend) 2294 { 2295 ae->flags |= be->flags; 2296 ae->use_count += be->use_count; 2297 *pbe = be->next; 2298 memset (be, 0xa5, sizeof (*be)); 2299 goto kill; 2300 } 2301 be->gotobj = a; 2302 total += alpha_got_entry_size (be->reloc_type); 2303 2304 next:; 2305 pbe = &be->next; 2306 kill:; 2307 } 2308 } 2309 2310 alpha_elf_tdata (bsub)->gotobj = a; 2311 } 2312 alpha_elf_tdata (a)->total_got_size = total; 2313 2314 /* Merge the two in_got chains. */ 2315 { 2316 bfd *next; 2317 2318 bsub = a; 2319 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL) 2320 bsub = next; 2321 2322 alpha_elf_tdata (bsub)->in_got_link_next = b; 2323 } 2324 } 2325 2326 /* Calculate the offsets for the got entries. */ 2327 2328 static bfd_boolean 2329 elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h, 2330 PTR arg ATTRIBUTE_UNUSED) 2331 { 2332 struct alpha_elf_got_entry *gotent; 2333 2334 if (h->root.root.type == bfd_link_hash_warning) 2335 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link; 2336 2337 for (gotent = h->got_entries; gotent; gotent = gotent->next) 2338 if (gotent->use_count > 0) 2339 { 2340 struct alpha_elf_obj_tdata *td; 2341 bfd_size_type *plge; 2342 2343 td = alpha_elf_tdata (gotent->gotobj); 2344 plge = &td->got->size; 2345 gotent->got_offset = *plge; 2346 *plge += alpha_got_entry_size (gotent->reloc_type); 2347 } 2348 2349 return TRUE; 2350 } 2351 2352 static void 2353 elf64_alpha_calc_got_offsets (struct bfd_link_info *info) 2354 { 2355 bfd *i, *got_list = alpha_elf_hash_table(info)->got_list; 2356 2357 /* First, zero out the .got sizes, as we may be recalculating the 2358 .got after optimizing it. */ 2359 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next) 2360 alpha_elf_tdata(i)->got->size = 0; 2361 2362 /* Next, fill in the offsets for all the global entries. */ 2363 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info), 2364 elf64_alpha_calc_got_offsets_for_symbol, 2365 NULL); 2366 2367 /* Finally, fill in the offsets for the local entries. */ 2368 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next) 2369 { 2370 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size; 2371 bfd *j; 2372 2373 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next) 2374 { 2375 struct alpha_elf_got_entry **local_got_entries, *gotent; 2376 int k, n; 2377 2378 local_got_entries = alpha_elf_tdata(j)->local_got_entries; 2379 if (!local_got_entries) 2380 continue; 2381 2382 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k) 2383 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next) 2384 if (gotent->use_count > 0) 2385 { 2386 gotent->got_offset = got_offset; 2387 got_offset += alpha_got_entry_size (gotent->reloc_type); 2388 } 2389 } 2390 2391 alpha_elf_tdata(i)->got->size = got_offset; 2392 } 2393 } 2394 2395 /* Constructs the gots. */ 2396 2397 static bfd_boolean 2398 elf64_alpha_size_got_sections (struct bfd_link_info *info) 2399 { 2400 bfd *i, *got_list, *cur_got_obj = NULL; 2401 2402 got_list = alpha_elf_hash_table (info)->got_list; 2403 2404 /* On the first time through, pretend we have an existing got list 2405 consisting of all of the input files. */ 2406 if (got_list == NULL) 2407 { 2408 for (i = info->input_bfds; i ; i = i->link_next) 2409 { 2410 bfd *this_got; 2411 2412 if (! is_alpha_elf (i)) 2413 continue; 2414 2415 this_got = alpha_elf_tdata (i)->gotobj; 2416 if (this_got == NULL) 2417 continue; 2418 2419 /* We are assuming no merging has yet occurred. */ 2420 BFD_ASSERT (this_got == i); 2421 2422 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE) 2423 { 2424 /* Yikes! A single object file has too many entries. */ 2425 (*_bfd_error_handler) 2426 (_("%B: .got subsegment exceeds 64K (size %d)"), 2427 i, alpha_elf_tdata (this_got)->total_got_size); 2428 return FALSE; 2429 } 2430 2431 if (got_list == NULL) 2432 got_list = this_got; 2433 else 2434 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got; 2435 cur_got_obj = this_got; 2436 } 2437 2438 /* Strange degenerate case of no got references. */ 2439 if (got_list == NULL) 2440 return TRUE; 2441 2442 alpha_elf_hash_table (info)->got_list = got_list; 2443 } 2444 2445 cur_got_obj = got_list; 2446 if (cur_got_obj == NULL) 2447 return FALSE; 2448 2449 i = alpha_elf_tdata(cur_got_obj)->got_link_next; 2450 while (i != NULL) 2451 { 2452 if (elf64_alpha_can_merge_gots (cur_got_obj, i)) 2453 { 2454 elf64_alpha_merge_gots (cur_got_obj, i); 2455 2456 alpha_elf_tdata(i)->got->size = 0; 2457 i = alpha_elf_tdata(i)->got_link_next; 2458 alpha_elf_tdata(cur_got_obj)->got_link_next = i; 2459 } 2460 else 2461 { 2462 cur_got_obj = i; 2463 i = alpha_elf_tdata(i)->got_link_next; 2464 } 2465 } 2466 2467 /* Once the gots have been merged, fill in the got offsets for 2468 everything therein. */ 2469 elf64_alpha_calc_got_offsets (info); 2470 2471 return TRUE; 2472 } 2473 2474 static bfd_boolean 2475 elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h, PTR data) 2476 { 2477 asection *splt = (asection *) data; 2478 struct alpha_elf_got_entry *gotent; 2479 bfd_boolean saw_one = FALSE; 2480 2481 /* If we didn't need an entry before, we still don't. */ 2482 if (!h->root.needs_plt) 2483 return TRUE; 2484 2485 /* For each LITERAL got entry still in use, allocate a plt entry. */ 2486 for (gotent = h->got_entries; gotent ; gotent = gotent->next) 2487 if (gotent->reloc_type == R_ALPHA_LITERAL 2488 && gotent->use_count > 0) 2489 { 2490 if (splt->size == 0) 2491 splt->size = PLT_HEADER_SIZE; 2492 gotent->plt_offset = splt->size; 2493 splt->size += PLT_ENTRY_SIZE; 2494 saw_one = TRUE; 2495 } 2496 2497 /* If there weren't any, there's no longer a need for the PLT entry. */ 2498 if (!saw_one) 2499 h->root.needs_plt = FALSE; 2500 2501 return TRUE; 2502 } 2503 2504 /* Called from relax_section to rebuild the PLT in light of potential changes 2505 in the function's status. */ 2506 2507 static void 2508 elf64_alpha_size_plt_section (struct bfd_link_info *info) 2509 { 2510 asection *splt, *spltrel, *sgotplt; 2511 unsigned long entries; 2512 bfd *dynobj; 2513 2514 dynobj = elf_hash_table(info)->dynobj; 2515 splt = bfd_get_section_by_name (dynobj, ".plt"); 2516 if (splt == NULL) 2517 return; 2518 2519 splt->size = 0; 2520 2521 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info), 2522 elf64_alpha_size_plt_section_1, splt); 2523 2524 /* Every plt entry requires a JMP_SLOT relocation. */ 2525 spltrel = bfd_get_section_by_name (dynobj, ".rela.plt"); 2526 entries = 0; 2527 if (splt->size) 2528 { 2529 if (elf64_alpha_use_secureplt) 2530 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE; 2531 else 2532 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE; 2533 } 2534 spltrel->size = entries * sizeof (Elf64_External_Rela); 2535 2536 /* When using the secureplt, we need two words somewhere in the data 2537 segment for the dynamic linker to tell us where to go. This is the 2538 entire contents of the .got.plt section. */ 2539 if (elf64_alpha_use_secureplt) 2540 { 2541 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt"); 2542 sgotplt->size = entries ? 16 : 0; 2543 } 2544 } 2545 2546 static bfd_boolean 2547 elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED, 2548 struct bfd_link_info *info) 2549 { 2550 bfd *i; 2551 2552 if (info->relocatable) 2553 return TRUE; 2554 2555 /* First, take care of the indirect symbols created by versioning. */ 2556 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info), 2557 elf64_alpha_merge_ind_symbols, 2558 NULL); 2559 2560 if (!elf64_alpha_size_got_sections (info)) 2561 return FALSE; 2562 2563 /* Allocate space for all of the .got subsections. */ 2564 i = alpha_elf_hash_table (info)->got_list; 2565 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next) 2566 { 2567 asection *s = alpha_elf_tdata(i)->got; 2568 if (s->size > 0) 2569 { 2570 s->contents = (bfd_byte *) bfd_zalloc (i, s->size); 2571 if (s->contents == NULL) 2572 return FALSE; 2573 } 2574 } 2575 2576 return TRUE; 2577 } 2578 2579 /* The number of dynamic relocations required by a static relocation. */ 2580 2581 static int 2582 alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared) 2583 { 2584 switch (r_type) 2585 { 2586 /* May appear in GOT entries. */ 2587 case R_ALPHA_TLSGD: 2588 return (dynamic ? 2 : shared ? 1 : 0); 2589 case R_ALPHA_TLSLDM: 2590 return shared; 2591 case R_ALPHA_LITERAL: 2592 case R_ALPHA_GOTTPREL: 2593 return dynamic || shared; 2594 case R_ALPHA_GOTDTPREL: 2595 return dynamic; 2596 2597 /* May appear in data sections. */ 2598 case R_ALPHA_REFLONG: 2599 case R_ALPHA_REFQUAD: 2600 case R_ALPHA_TPREL64: 2601 return dynamic || shared; 2602 2603 /* Everything else is illegal. We'll issue an error during 2604 relocate_section. */ 2605 default: 2606 return 0; 2607 } 2608 } 2609 2610 /* Work out the sizes of the dynamic relocation entries. */ 2611 2612 static bfd_boolean 2613 elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h, 2614 struct bfd_link_info *info) 2615 { 2616 bfd_boolean dynamic; 2617 struct alpha_elf_reloc_entry *relent; 2618 unsigned long entries; 2619 2620 if (h->root.root.type == bfd_link_hash_warning) 2621 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link; 2622 2623 /* If the symbol was defined as a common symbol in a regular object 2624 file, and there was no definition in any dynamic object, then the 2625 linker will have allocated space for the symbol in a common 2626 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been 2627 set. This is done for dynamic symbols in 2628 elf_adjust_dynamic_symbol but this is not done for non-dynamic 2629 symbols, somehow. */ 2630 if (!h->root.def_regular 2631 && h->root.ref_regular 2632 && !h->root.def_dynamic 2633 && (h->root.root.type == bfd_link_hash_defined 2634 || h->root.root.type == bfd_link_hash_defweak) 2635 && !(h->root.root.u.def.section->owner->flags & DYNAMIC)) 2636 h->root.def_regular = 1; 2637 2638 /* If the symbol is dynamic, we'll need all the relocations in their 2639 natural form. If this is a shared object, and it has been forced 2640 local, we'll need the same number of RELATIVE relocations. */ 2641 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info); 2642 2643 /* If the symbol is a hidden undefined weak, then we never have any 2644 relocations. Avoid the loop which may want to add RELATIVE relocs 2645 based on info->shared. */ 2646 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic) 2647 return TRUE; 2648 2649 for (relent = h->reloc_entries; relent; relent = relent->next) 2650 { 2651 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic, 2652 info->shared); 2653 if (entries) 2654 { 2655 relent->srel->size += 2656 entries * sizeof (Elf64_External_Rela) * relent->count; 2657 if (relent->reltext) 2658 info->flags |= DT_TEXTREL; 2659 } 2660 } 2661 2662 return TRUE; 2663 } 2664 2665 /* Subroutine of elf64_alpha_size_rela_got_section for doing the 2666 global symbols. */ 2667 2668 static bfd_boolean 2669 elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h, 2670 struct bfd_link_info *info) 2671 { 2672 bfd_boolean dynamic; 2673 struct alpha_elf_got_entry *gotent; 2674 unsigned long entries; 2675 2676 if (h->root.root.type == bfd_link_hash_warning) 2677 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link; 2678 2679 /* If we're using a plt for this symbol, then all of its relocations 2680 for its got entries go into .rela.plt. */ 2681 if (h->root.needs_plt) 2682 return TRUE; 2683 2684 /* If the symbol is dynamic, we'll need all the relocations in their 2685 natural form. If this is a shared object, and it has been forced 2686 local, we'll need the same number of RELATIVE relocations. */ 2687 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info); 2688 2689 /* If the symbol is a hidden undefined weak, then we never have any 2690 relocations. Avoid the loop which may want to add RELATIVE relocs 2691 based on info->shared. */ 2692 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic) 2693 return TRUE; 2694 2695 entries = 0; 2696 for (gotent = h->got_entries; gotent ; gotent = gotent->next) 2697 if (gotent->use_count > 0) 2698 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, 2699 dynamic, info->shared); 2700 2701 if (entries > 0) 2702 { 2703 bfd *dynobj = elf_hash_table(info)->dynobj; 2704 asection *srel = bfd_get_section_by_name (dynobj, ".rela.got"); 2705 BFD_ASSERT (srel != NULL); 2706 srel->size += sizeof (Elf64_External_Rela) * entries; 2707 } 2708 2709 return TRUE; 2710 } 2711 2712 /* Set the sizes of the dynamic relocation sections. */ 2713 2714 static void 2715 elf64_alpha_size_rela_got_section (struct bfd_link_info *info) 2716 { 2717 unsigned long entries; 2718 bfd *i, *dynobj; 2719 asection *srel; 2720 2721 /* Shared libraries often require RELATIVE relocs, and some relocs 2722 require attention for the main application as well. */ 2723 2724 entries = 0; 2725 for (i = alpha_elf_hash_table(info)->got_list; 2726 i ; i = alpha_elf_tdata(i)->got_link_next) 2727 { 2728 bfd *j; 2729 2730 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next) 2731 { 2732 struct alpha_elf_got_entry **local_got_entries, *gotent; 2733 int k, n; 2734 2735 local_got_entries = alpha_elf_tdata(j)->local_got_entries; 2736 if (!local_got_entries) 2737 continue; 2738 2739 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k) 2740 for (gotent = local_got_entries[k]; 2741 gotent ; gotent = gotent->next) 2742 if (gotent->use_count > 0) 2743 entries += (alpha_dynamic_entries_for_reloc 2744 (gotent->reloc_type, 0, info->shared)); 2745 } 2746 } 2747 2748 dynobj = elf_hash_table(info)->dynobj; 2749 srel = bfd_get_section_by_name (dynobj, ".rela.got"); 2750 if (!srel) 2751 { 2752 BFD_ASSERT (entries == 0); 2753 return; 2754 } 2755 srel->size = sizeof (Elf64_External_Rela) * entries; 2756 2757 /* Now do the non-local symbols. */ 2758 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info), 2759 elf64_alpha_size_rela_got_1, info); 2760 } 2761 2762 /* Set the sizes of the dynamic sections. */ 2763 2764 static bfd_boolean 2765 elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED, 2766 struct bfd_link_info *info) 2767 { 2768 bfd *dynobj; 2769 asection *s; 2770 bfd_boolean relplt; 2771 2772 dynobj = elf_hash_table(info)->dynobj; 2773 BFD_ASSERT(dynobj != NULL); 2774 2775 if (elf_hash_table (info)->dynamic_sections_created) 2776 { 2777 /* Set the contents of the .interp section to the interpreter. */ 2778 if (info->executable) 2779 { 2780 s = bfd_get_section_by_name (dynobj, ".interp"); 2781 BFD_ASSERT (s != NULL); 2782 s->size = sizeof ELF_DYNAMIC_INTERPRETER; 2783 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER; 2784 } 2785 2786 /* Now that we've seen all of the input files, we can decide which 2787 symbols need dynamic relocation entries and which don't. We've 2788 collected information in check_relocs that we can now apply to 2789 size the dynamic relocation sections. */ 2790 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info), 2791 elf64_alpha_calc_dynrel_sizes, info); 2792 2793 elf64_alpha_size_rela_got_section (info); 2794 elf64_alpha_size_plt_section (info); 2795 } 2796 /* else we're not dynamic and by definition we don't need such things. */ 2797 2798 /* The check_relocs and adjust_dynamic_symbol entry points have 2799 determined the sizes of the various dynamic sections. Allocate 2800 memory for them. */ 2801 relplt = FALSE; 2802 for (s = dynobj->sections; s != NULL; s = s->next) 2803 { 2804 const char *name; 2805 2806 if (!(s->flags & SEC_LINKER_CREATED)) 2807 continue; 2808 2809 /* It's OK to base decisions on the section name, because none 2810 of the dynobj section names depend upon the input files. */ 2811 name = bfd_get_section_name (dynobj, s); 2812 2813 if (CONST_STRNEQ (name, ".rela")) 2814 { 2815 if (s->size != 0) 2816 { 2817 if (strcmp (name, ".rela.plt") == 0) 2818 relplt = TRUE; 2819 2820 /* We use the reloc_count field as a counter if we need 2821 to copy relocs into the output file. */ 2822 s->reloc_count = 0; 2823 } 2824 } 2825 else if (! CONST_STRNEQ (name, ".got") 2826 && strcmp (name, ".plt") != 0 2827 && strcmp (name, ".dynbss") != 0) 2828 { 2829 /* It's not one of our dynamic sections, so don't allocate space. */ 2830 continue; 2831 } 2832 2833 if (s->size == 0) 2834 { 2835 /* If we don't need this section, strip it from the output file. 2836 This is to handle .rela.bss and .rela.plt. We must create it 2837 in create_dynamic_sections, because it must be created before 2838 the linker maps input sections to output sections. The 2839 linker does that before adjust_dynamic_symbol is called, and 2840 it is that function which decides whether anything needs to 2841 go into these sections. */ 2842 s->flags |= SEC_EXCLUDE; 2843 } 2844 else if ((s->flags & SEC_HAS_CONTENTS) != 0) 2845 { 2846 /* Allocate memory for the section contents. */ 2847 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size); 2848 if (s->contents == NULL) 2849 return FALSE; 2850 } 2851 } 2852 2853 if (elf_hash_table (info)->dynamic_sections_created) 2854 { 2855 /* Add some entries to the .dynamic section. We fill in the 2856 values later, in elf64_alpha_finish_dynamic_sections, but we 2857 must add the entries now so that we get the correct size for 2858 the .dynamic section. The DT_DEBUG entry is filled in by the 2859 dynamic linker and used by the debugger. */ 2860 #define add_dynamic_entry(TAG, VAL) \ 2861 _bfd_elf_add_dynamic_entry (info, TAG, VAL) 2862 2863 if (info->executable) 2864 { 2865 if (!add_dynamic_entry (DT_DEBUG, 0)) 2866 return FALSE; 2867 } 2868 2869 if (relplt) 2870 { 2871 if (!add_dynamic_entry (DT_PLTGOT, 0) 2872 || !add_dynamic_entry (DT_PLTRELSZ, 0) 2873 || !add_dynamic_entry (DT_PLTREL, DT_RELA) 2874 || !add_dynamic_entry (DT_JMPREL, 0)) 2875 return FALSE; 2876 2877 if (elf64_alpha_use_secureplt 2878 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1)) 2879 return FALSE; 2880 } 2881 2882 if (!add_dynamic_entry (DT_RELA, 0) 2883 || !add_dynamic_entry (DT_RELASZ, 0) 2884 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela))) 2885 return FALSE; 2886 2887 if (info->flags & DF_TEXTREL) 2888 { 2889 if (!add_dynamic_entry (DT_TEXTREL, 0)) 2890 return FALSE; 2891 } 2892 } 2893 #undef add_dynamic_entry 2894 2895 return TRUE; 2896 } 2897 2898 /* These functions do relaxation for Alpha ELF. 2899 2900 Currently I'm only handling what I can do with existing compiler 2901 and assembler support, which means no instructions are removed, 2902 though some may be nopped. At this time GCC does not emit enough 2903 information to do all of the relaxing that is possible. It will 2904 take some not small amount of work for that to happen. 2905 2906 There are a couple of interesting papers that I once read on this 2907 subject, that I cannot find references to at the moment, that 2908 related to Alpha in particular. They are by David Wall, then of 2909 DEC WRL. */ 2910 2911 struct alpha_relax_info 2912 { 2913 bfd *abfd; 2914 asection *sec; 2915 bfd_byte *contents; 2916 Elf_Internal_Shdr *symtab_hdr; 2917 Elf_Internal_Rela *relocs, *relend; 2918 struct bfd_link_info *link_info; 2919 bfd_vma gp; 2920 bfd *gotobj; 2921 asection *tsec; 2922 struct alpha_elf_link_hash_entry *h; 2923 struct alpha_elf_got_entry **first_gotent; 2924 struct alpha_elf_got_entry *gotent; 2925 bfd_boolean changed_contents; 2926 bfd_boolean changed_relocs; 2927 unsigned char other; 2928 }; 2929 2930 static Elf_Internal_Rela * 2931 elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel, 2932 Elf_Internal_Rela *relend, 2933 bfd_vma offset, int type) 2934 { 2935 while (rel < relend) 2936 { 2937 if (rel->r_offset == offset 2938 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type) 2939 return rel; 2940 ++rel; 2941 } 2942 return NULL; 2943 } 2944 2945 static bfd_boolean 2946 elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval, 2947 Elf_Internal_Rela *irel, unsigned long r_type) 2948 { 2949 unsigned int insn; 2950 bfd_signed_vma disp; 2951 2952 /* Get the instruction. */ 2953 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset); 2954 2955 if (insn >> 26 != OP_LDQ) 2956 { 2957 reloc_howto_type *howto = elf64_alpha_howto_table + r_type; 2958 ((*_bfd_error_handler) 2959 ("%B: %A+0x%lx: warning: %s relocation against unexpected insn", 2960 info->abfd, info->sec, 2961 (unsigned long) irel->r_offset, howto->name)); 2962 return TRUE; 2963 } 2964 2965 /* Can't relax dynamic symbols. */ 2966 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info)) 2967 return TRUE; 2968 2969 /* Can't use local-exec relocations in shared libraries. */ 2970 if (r_type == R_ALPHA_GOTTPREL && info->link_info->shared) 2971 return TRUE; 2972 2973 if (r_type == R_ALPHA_LITERAL) 2974 { 2975 /* Look for nice constant addresses. This includes the not-uncommon 2976 special case of 0 for undefweak symbols. */ 2977 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak) 2978 || (!info->link_info->shared 2979 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000))) 2980 { 2981 disp = 0; 2982 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16); 2983 insn |= (symval & 0xffff); 2984 r_type = R_ALPHA_NONE; 2985 } 2986 else 2987 { 2988 disp = symval - info->gp; 2989 insn = (OP_LDA << 26) | (insn & 0x03ff0000); 2990 r_type = R_ALPHA_GPREL16; 2991 } 2992 } 2993 else 2994 { 2995 bfd_vma dtp_base, tp_base; 2996 2997 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL); 2998 dtp_base = alpha_get_dtprel_base (info->link_info); 2999 tp_base = alpha_get_tprel_base (info->link_info); 3000 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base); 3001 3002 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16); 3003 3004 switch (r_type) 3005 { 3006 case R_ALPHA_GOTDTPREL: 3007 r_type = R_ALPHA_DTPREL16; 3008 break; 3009 case R_ALPHA_GOTTPREL: 3010 r_type = R_ALPHA_TPREL16; 3011 break; 3012 default: 3013 BFD_ASSERT (0); 3014 return FALSE; 3015 } 3016 } 3017 3018 if (disp < -0x8000 || disp >= 0x8000) 3019 return TRUE; 3020 3021 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset); 3022 info->changed_contents = TRUE; 3023 3024 /* Reduce the use count on this got entry by one, possibly 3025 eliminating it. */ 3026 if (--info->gotent->use_count == 0) 3027 { 3028 int sz = alpha_got_entry_size (r_type); 3029 alpha_elf_tdata (info->gotobj)->total_got_size -= sz; 3030 if (!info->h) 3031 alpha_elf_tdata (info->gotobj)->local_got_size -= sz; 3032 } 3033 3034 /* Smash the existing GOT relocation for its 16-bit immediate pair. */ 3035 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type); 3036 info->changed_relocs = TRUE; 3037 3038 /* ??? Search forward through this basic block looking for insns 3039 that use the target register. Stop after an insn modifying the 3040 register is seen, or after a branch or call. 3041 3042 Any such memory load insn may be substituted by a load directly 3043 off the GP. This allows the memory load insn to be issued before 3044 the calculated GP register would otherwise be ready. 3045 3046 Any such jsr insn can be replaced by a bsr if it is in range. 3047 3048 This would mean that we'd have to _add_ relocations, the pain of 3049 which gives one pause. */ 3050 3051 return TRUE; 3052 } 3053 3054 static bfd_vma 3055 elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval) 3056 { 3057 /* If the function has the same gp, and we can identify that the 3058 function does not use its function pointer, we can eliminate the 3059 address load. */ 3060 3061 /* If the symbol is marked NOPV, we are being told the function never 3062 needs its procedure value. */ 3063 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV) 3064 return symval; 3065 3066 /* If the symbol is marked STD_GP, we are being told the function does 3067 a normal ldgp in the first two words. */ 3068 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD) 3069 ; 3070 3071 /* Otherwise, we may be able to identify a GP load in the first two 3072 words, which we can then skip. */ 3073 else 3074 { 3075 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp; 3076 bfd_vma ofs; 3077 3078 /* Load the relocations from the section that the target symbol is in. */ 3079 if (info->sec == info->tsec) 3080 { 3081 tsec_relocs = info->relocs; 3082 tsec_relend = info->relend; 3083 tsec_free = NULL; 3084 } 3085 else 3086 { 3087 tsec_relocs = (_bfd_elf_link_read_relocs 3088 (info->abfd, info->tsec, (PTR) NULL, 3089 (Elf_Internal_Rela *) NULL, 3090 info->link_info->keep_memory)); 3091 if (tsec_relocs == NULL) 3092 return 0; 3093 tsec_relend = tsec_relocs + info->tsec->reloc_count; 3094 tsec_free = (info->link_info->keep_memory ? NULL : tsec_relocs); 3095 } 3096 3097 /* Recover the symbol's offset within the section. */ 3098 ofs = (symval - info->tsec->output_section->vma 3099 - info->tsec->output_offset); 3100 3101 /* Look for a GPDISP reloc. */ 3102 gpdisp = (elf64_alpha_find_reloc_at_ofs 3103 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP)); 3104 3105 if (!gpdisp || gpdisp->r_addend != 4) 3106 { 3107 if (tsec_free) 3108 free (tsec_free); 3109 return 0; 3110 } 3111 if (tsec_free) 3112 free (tsec_free); 3113 } 3114 3115 /* We've now determined that we can skip an initial gp load. Verify 3116 that the call and the target use the same gp. */ 3117 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec 3118 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj) 3119 return 0; 3120 3121 return symval + 8; 3122 } 3123 3124 static bfd_boolean 3125 elf64_alpha_relax_with_lituse (struct alpha_relax_info *info, 3126 bfd_vma symval, Elf_Internal_Rela *irel) 3127 { 3128 Elf_Internal_Rela *urel, *irelend = info->relend; 3129 int flags, count, i; 3130 bfd_signed_vma disp; 3131 bfd_boolean fits16; 3132 bfd_boolean fits32; 3133 bfd_boolean lit_reused = FALSE; 3134 bfd_boolean all_optimized = TRUE; 3135 unsigned int lit_insn; 3136 3137 lit_insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset); 3138 if (lit_insn >> 26 != OP_LDQ) 3139 { 3140 ((*_bfd_error_handler) 3141 ("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn", 3142 info->abfd, info->sec, 3143 (unsigned long) irel->r_offset)); 3144 return TRUE; 3145 } 3146 3147 /* Can't relax dynamic symbols. */ 3148 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info)) 3149 return TRUE; 3150 3151 /* Summarize how this particular LITERAL is used. */ 3152 for (urel = irel+1, flags = count = 0; urel < irelend; ++urel, ++count) 3153 { 3154 if (ELF64_R_TYPE (urel->r_info) != R_ALPHA_LITUSE) 3155 break; 3156 if (urel->r_addend <= 6) 3157 flags |= 1 << urel->r_addend; 3158 } 3159 3160 /* A little preparation for the loop... */ 3161 disp = symval - info->gp; 3162 3163 for (urel = irel+1, i = 0; i < count; ++i, ++urel) 3164 { 3165 unsigned int insn; 3166 int insn_disp; 3167 bfd_signed_vma xdisp; 3168 3169 insn = bfd_get_32 (info->abfd, info->contents + urel->r_offset); 3170 3171 switch (urel->r_addend) 3172 { 3173 case LITUSE_ALPHA_ADDR: 3174 default: 3175 /* This type is really just a placeholder to note that all 3176 uses cannot be optimized, but to still allow some. */ 3177 all_optimized = FALSE; 3178 break; 3179 3180 case LITUSE_ALPHA_BASE: 3181 /* We can always optimize 16-bit displacements. */ 3182 3183 /* Extract the displacement from the instruction, sign-extending 3184 it if necessary, then test whether it is within 16 or 32 bits 3185 displacement from GP. */ 3186 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000; 3187 3188 xdisp = disp + insn_disp; 3189 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000); 3190 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000 3191 && xdisp < 0x7fff8000); 3192 3193 if (fits16) 3194 { 3195 /* Take the op code and dest from this insn, take the base 3196 register from the literal insn. Leave the offset alone. */ 3197 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000); 3198 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), 3199 R_ALPHA_GPREL16); 3200 urel->r_addend = irel->r_addend; 3201 info->changed_relocs = TRUE; 3202 3203 bfd_put_32 (info->abfd, (bfd_vma) insn, 3204 info->contents + urel->r_offset); 3205 info->changed_contents = TRUE; 3206 } 3207 3208 /* If all mem+byte, we can optimize 32-bit mem displacements. */ 3209 else if (fits32 && !(flags & ~6)) 3210 { 3211 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */ 3212 3213 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), 3214 R_ALPHA_GPRELHIGH); 3215 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000); 3216 bfd_put_32 (info->abfd, (bfd_vma) lit_insn, 3217 info->contents + irel->r_offset); 3218 lit_reused = TRUE; 3219 info->changed_contents = TRUE; 3220 3221 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), 3222 R_ALPHA_GPRELLOW); 3223 urel->r_addend = irel->r_addend; 3224 info->changed_relocs = TRUE; 3225 } 3226 else 3227 all_optimized = FALSE; 3228 break; 3229 3230 case LITUSE_ALPHA_BYTOFF: 3231 /* We can always optimize byte instructions. */ 3232 3233 /* FIXME: sanity check the insn for byte op. Check that the 3234 literal dest reg is indeed Rb in the byte insn. */ 3235 3236 insn &= ~ (unsigned) 0x001ff000; 3237 insn |= ((symval & 7) << 13) | 0x1000; 3238 3239 urel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3240 urel->r_addend = 0; 3241 info->changed_relocs = TRUE; 3242 3243 bfd_put_32 (info->abfd, (bfd_vma) insn, 3244 info->contents + urel->r_offset); 3245 info->changed_contents = TRUE; 3246 break; 3247 3248 case LITUSE_ALPHA_JSR: 3249 case LITUSE_ALPHA_TLSGD: 3250 case LITUSE_ALPHA_TLSLDM: 3251 case LITUSE_ALPHA_JSRDIRECT: 3252 { 3253 bfd_vma optdest, org; 3254 bfd_signed_vma odisp; 3255 3256 /* For undefined weak symbols, we're mostly interested in getting 3257 rid of the got entry whenever possible, so optimize this to a 3258 use of the zero register. */ 3259 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak) 3260 { 3261 insn |= 31 << 16; 3262 bfd_put_32 (info->abfd, (bfd_vma) insn, 3263 info->contents + urel->r_offset); 3264 3265 info->changed_contents = TRUE; 3266 break; 3267 } 3268 3269 /* If not zero, place to jump without needing pv. */ 3270 optdest = elf64_alpha_relax_opt_call (info, symval); 3271 org = (info->sec->output_section->vma 3272 + info->sec->output_offset 3273 + urel->r_offset + 4); 3274 odisp = (optdest ? optdest : symval) - org; 3275 3276 if (odisp >= -0x400000 && odisp < 0x400000) 3277 { 3278 Elf_Internal_Rela *xrel; 3279 3280 /* Preserve branch prediction call stack when possible. */ 3281 if ((insn & INSN_JSR_MASK) == INSN_JSR) 3282 insn = (OP_BSR << 26) | (insn & 0x03e00000); 3283 else 3284 insn = (OP_BR << 26) | (insn & 0x03e00000); 3285 3286 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), 3287 R_ALPHA_BRADDR); 3288 urel->r_addend = irel->r_addend; 3289 3290 if (optdest) 3291 urel->r_addend += optdest - symval; 3292 else 3293 all_optimized = FALSE; 3294 3295 bfd_put_32 (info->abfd, (bfd_vma) insn, 3296 info->contents + urel->r_offset); 3297 3298 /* Kill any HINT reloc that might exist for this insn. */ 3299 xrel = (elf64_alpha_find_reloc_at_ofs 3300 (info->relocs, info->relend, urel->r_offset, 3301 R_ALPHA_HINT)); 3302 if (xrel) 3303 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3304 3305 info->changed_contents = TRUE; 3306 info->changed_relocs = TRUE; 3307 } 3308 else 3309 all_optimized = FALSE; 3310 3311 /* Even if the target is not in range for a direct branch, 3312 if we share a GP, we can eliminate the gp reload. */ 3313 if (optdest) 3314 { 3315 Elf_Internal_Rela *gpdisp 3316 = (elf64_alpha_find_reloc_at_ofs 3317 (info->relocs, irelend, urel->r_offset + 4, 3318 R_ALPHA_GPDISP)); 3319 if (gpdisp) 3320 { 3321 bfd_byte *p_ldah = info->contents + gpdisp->r_offset; 3322 bfd_byte *p_lda = p_ldah + gpdisp->r_addend; 3323 unsigned int ldah = bfd_get_32 (info->abfd, p_ldah); 3324 unsigned int lda = bfd_get_32 (info->abfd, p_lda); 3325 3326 /* Verify that the instruction is "ldah $29,0($26)". 3327 Consider a function that ends in a noreturn call, 3328 and that the next function begins with an ldgp, 3329 and that by accident there is no padding between. 3330 In that case the insn would use $27 as the base. */ 3331 if (ldah == 0x27ba0000 && lda == 0x23bd0000) 3332 { 3333 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_ldah); 3334 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_lda); 3335 3336 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3337 info->changed_contents = TRUE; 3338 info->changed_relocs = TRUE; 3339 } 3340 } 3341 } 3342 } 3343 break; 3344 } 3345 } 3346 3347 /* If all cases were optimized, we can reduce the use count on this 3348 got entry by one, possibly eliminating it. */ 3349 if (all_optimized) 3350 { 3351 if (--info->gotent->use_count == 0) 3352 { 3353 int sz = alpha_got_entry_size (R_ALPHA_LITERAL); 3354 alpha_elf_tdata (info->gotobj)->total_got_size -= sz; 3355 if (!info->h) 3356 alpha_elf_tdata (info->gotobj)->local_got_size -= sz; 3357 } 3358 3359 /* If the literal instruction is no longer needed (it may have been 3360 reused. We can eliminate it. */ 3361 /* ??? For now, I don't want to deal with compacting the section, 3362 so just nop it out. */ 3363 if (!lit_reused) 3364 { 3365 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3366 info->changed_relocs = TRUE; 3367 3368 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, 3369 info->contents + irel->r_offset); 3370 info->changed_contents = TRUE; 3371 } 3372 3373 return TRUE; 3374 } 3375 else 3376 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL); 3377 } 3378 3379 static bfd_boolean 3380 elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval, 3381 Elf_Internal_Rela *irel, bfd_boolean is_gd) 3382 { 3383 bfd_byte *pos[5]; 3384 unsigned int insn; 3385 Elf_Internal_Rela *gpdisp, *hint; 3386 bfd_boolean dynamic, use_gottprel, pos1_unusable; 3387 unsigned long new_symndx; 3388 3389 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info); 3390 3391 /* If a TLS symbol is accessed using IE at least once, there is no point 3392 to use dynamic model for it. */ 3393 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE)) 3394 ; 3395 3396 /* If the symbol is local, and we've already committed to DF_STATIC_TLS, 3397 then we might as well relax to IE. */ 3398 else if (info->link_info->shared && !dynamic 3399 && (info->link_info->flags & DF_STATIC_TLS)) 3400 ; 3401 3402 /* Otherwise we must be building an executable to do anything. */ 3403 else if (info->link_info->shared) 3404 return TRUE; 3405 3406 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and 3407 the matching LITUSE_TLS relocations. */ 3408 if (irel + 2 >= info->relend) 3409 return TRUE; 3410 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL 3411 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE 3412 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM)) 3413 return TRUE; 3414 3415 /* There must be a GPDISP relocation positioned immediately after the 3416 LITUSE relocation. */ 3417 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend, 3418 irel[2].r_offset + 4, R_ALPHA_GPDISP); 3419 if (!gpdisp) 3420 return TRUE; 3421 3422 pos[0] = info->contents + irel[0].r_offset; 3423 pos[1] = info->contents + irel[1].r_offset; 3424 pos[2] = info->contents + irel[2].r_offset; 3425 pos[3] = info->contents + gpdisp->r_offset; 3426 pos[4] = pos[3] + gpdisp->r_addend; 3427 pos1_unusable = FALSE; 3428 3429 /* Generally, the positions are not allowed to be out of order, lest the 3430 modified insn sequence have different register lifetimes. We can make 3431 an exception when pos 1 is adjacent to pos 0. */ 3432 if (pos[1] + 4 == pos[0]) 3433 { 3434 bfd_byte *tmp = pos[0]; 3435 pos[0] = pos[1]; 3436 pos[1] = tmp; 3437 } 3438 else if (pos[1] < pos[0]) 3439 pos1_unusable = TRUE; 3440 if (pos[1] >= pos[2] || pos[2] >= pos[3]) 3441 return TRUE; 3442 3443 /* Reduce the use count on the LITERAL relocation. Do this before we 3444 smash the symndx when we adjust the relocations below. */ 3445 { 3446 struct alpha_elf_got_entry *lit_gotent; 3447 struct alpha_elf_link_hash_entry *lit_h; 3448 unsigned long indx; 3449 3450 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info); 3451 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info; 3452 lit_h = alpha_elf_sym_hashes (info->abfd)[indx]; 3453 3454 while (lit_h->root.root.type == bfd_link_hash_indirect 3455 || lit_h->root.root.type == bfd_link_hash_warning) 3456 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link; 3457 3458 for (lit_gotent = lit_h->got_entries; lit_gotent ; 3459 lit_gotent = lit_gotent->next) 3460 if (lit_gotent->gotobj == info->gotobj 3461 && lit_gotent->reloc_type == R_ALPHA_LITERAL 3462 && lit_gotent->addend == irel[1].r_addend) 3463 break; 3464 BFD_ASSERT (lit_gotent); 3465 3466 if (--lit_gotent->use_count == 0) 3467 { 3468 int sz = alpha_got_entry_size (R_ALPHA_LITERAL); 3469 alpha_elf_tdata (info->gotobj)->total_got_size -= sz; 3470 } 3471 } 3472 3473 /* Change 3474 3475 lda $16,x($gp) !tlsgd!1 3476 ldq $27,__tls_get_addr($gp) !literal!1 3477 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1 3478 ldah $29,0($26) !gpdisp!2 3479 lda $29,0($29) !gpdisp!2 3480 to 3481 ldq $16,x($gp) !gottprel 3482 unop 3483 call_pal rduniq 3484 addq $16,$0,$0 3485 unop 3486 or the first pair to 3487 lda $16,x($gp) !tprel 3488 unop 3489 or 3490 ldah $16,x($gp) !tprelhi 3491 lda $16,x($16) !tprello 3492 3493 as appropriate. */ 3494 3495 use_gottprel = FALSE; 3496 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : 0; 3497 switch (!dynamic && !info->link_info->shared) 3498 { 3499 case 1: 3500 { 3501 bfd_vma tp_base; 3502 bfd_signed_vma disp; 3503 3504 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL); 3505 tp_base = alpha_get_tprel_base (info->link_info); 3506 disp = symval - tp_base; 3507 3508 if (disp >= -0x8000 && disp < 0x8000) 3509 { 3510 insn = (OP_LDA << 26) | (16 << 21) | (31 << 16); 3511 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]); 3512 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]); 3513 3514 irel[0].r_offset = pos[0] - info->contents; 3515 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16); 3516 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3517 break; 3518 } 3519 else if (disp >= -(bfd_signed_vma) 0x80000000 3520 && disp < (bfd_signed_vma) 0x7fff8000 3521 && !pos1_unusable) 3522 { 3523 insn = (OP_LDAH << 26) | (16 << 21) | (31 << 16); 3524 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]); 3525 insn = (OP_LDA << 26) | (16 << 21) | (16 << 16); 3526 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]); 3527 3528 irel[0].r_offset = pos[0] - info->contents; 3529 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI); 3530 irel[1].r_offset = pos[1] - info->contents; 3531 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO); 3532 break; 3533 } 3534 } 3535 /* FALLTHRU */ 3536 3537 default: 3538 use_gottprel = TRUE; 3539 3540 insn = (OP_LDQ << 26) | (16 << 21) | (29 << 16); 3541 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]); 3542 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]); 3543 3544 irel[0].r_offset = pos[0] - info->contents; 3545 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL); 3546 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3547 break; 3548 } 3549 3550 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]); 3551 3552 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0); 3553 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]); 3554 3555 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]); 3556 3557 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3558 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3559 3560 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend, 3561 irel[2].r_offset, R_ALPHA_HINT); 3562 if (hint) 3563 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE); 3564 3565 info->changed_contents = TRUE; 3566 info->changed_relocs = TRUE; 3567 3568 /* Reduce the use count on the TLSGD/TLSLDM relocation. */ 3569 if (--info->gotent->use_count == 0) 3570 { 3571 int sz = alpha_got_entry_size (info->gotent->reloc_type); 3572 alpha_elf_tdata (info->gotobj)->total_got_size -= sz; 3573 if (!info->h) 3574 alpha_elf_tdata (info->gotobj)->local_got_size -= sz; 3575 } 3576 3577 /* If we've switched to a GOTTPREL relocation, increment the reference 3578 count on that got entry. */ 3579 if (use_gottprel) 3580 { 3581 struct alpha_elf_got_entry *tprel_gotent; 3582 3583 for (tprel_gotent = *info->first_gotent; tprel_gotent ; 3584 tprel_gotent = tprel_gotent->next) 3585 if (tprel_gotent->gotobj == info->gotobj 3586 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL 3587 && tprel_gotent->addend == irel->r_addend) 3588 break; 3589 if (tprel_gotent) 3590 tprel_gotent->use_count++; 3591 else 3592 { 3593 if (info->gotent->use_count == 0) 3594 tprel_gotent = info->gotent; 3595 else 3596 { 3597 tprel_gotent = (struct alpha_elf_got_entry *) 3598 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry)); 3599 if (!tprel_gotent) 3600 return FALSE; 3601 3602 tprel_gotent->next = *info->first_gotent; 3603 *info->first_gotent = tprel_gotent; 3604 3605 tprel_gotent->gotobj = info->gotobj; 3606 tprel_gotent->addend = irel->r_addend; 3607 tprel_gotent->got_offset = -1; 3608 tprel_gotent->reloc_done = 0; 3609 tprel_gotent->reloc_xlated = 0; 3610 } 3611 3612 tprel_gotent->use_count = 1; 3613 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL; 3614 } 3615 } 3616 3617 return TRUE; 3618 } 3619 3620 static bfd_boolean 3621 elf64_alpha_relax_section (bfd *abfd, asection *sec, 3622 struct bfd_link_info *link_info, bfd_boolean *again) 3623 { 3624 Elf_Internal_Shdr *symtab_hdr; 3625 Elf_Internal_Rela *internal_relocs; 3626 Elf_Internal_Rela *irel, *irelend; 3627 Elf_Internal_Sym *isymbuf = NULL; 3628 struct alpha_elf_got_entry **local_got_entries; 3629 struct alpha_relax_info info; 3630 3631 /* There's nothing to change, yet. */ 3632 *again = FALSE; 3633 3634 if (link_info->relocatable 3635 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC)) 3636 != (SEC_CODE | SEC_RELOC | SEC_ALLOC)) 3637 || sec->reloc_count == 0) 3638 return TRUE; 3639 3640 BFD_ASSERT (is_alpha_elf (abfd)); 3641 3642 /* Make sure our GOT and PLT tables are up-to-date. */ 3643 if (alpha_elf_hash_table(link_info)->relax_trip != link_info->relax_trip) 3644 { 3645 alpha_elf_hash_table(link_info)->relax_trip = link_info->relax_trip; 3646 3647 /* This should never fail after the initial round, since the only 3648 error is GOT overflow, and relaxation only shrinks the table. */ 3649 if (!elf64_alpha_size_got_sections (link_info)) 3650 abort (); 3651 if (elf_hash_table (link_info)->dynamic_sections_created) 3652 { 3653 elf64_alpha_size_plt_section (link_info); 3654 elf64_alpha_size_rela_got_section (link_info); 3655 } 3656 } 3657 3658 symtab_hdr = &elf_symtab_hdr (abfd); 3659 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries; 3660 3661 /* Load the relocations for this section. */ 3662 internal_relocs = (_bfd_elf_link_read_relocs 3663 (abfd, sec, (PTR) NULL, (Elf_Internal_Rela *) NULL, 3664 link_info->keep_memory)); 3665 if (internal_relocs == NULL) 3666 return FALSE; 3667 3668 memset(&info, 0, sizeof (info)); 3669 info.abfd = abfd; 3670 info.sec = sec; 3671 info.link_info = link_info; 3672 info.symtab_hdr = symtab_hdr; 3673 info.relocs = internal_relocs; 3674 info.relend = irelend = internal_relocs + sec->reloc_count; 3675 3676 /* Find the GP for this object. Do not store the result back via 3677 _bfd_set_gp_value, since this could change again before final. */ 3678 info.gotobj = alpha_elf_tdata (abfd)->gotobj; 3679 if (info.gotobj) 3680 { 3681 asection *sgot = alpha_elf_tdata (info.gotobj)->got; 3682 info.gp = (sgot->output_section->vma 3683 + sgot->output_offset 3684 + 0x8000); 3685 } 3686 3687 /* Get the section contents. */ 3688 if (elf_section_data (sec)->this_hdr.contents != NULL) 3689 info.contents = elf_section_data (sec)->this_hdr.contents; 3690 else 3691 { 3692 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents)) 3693 goto error_return; 3694 } 3695 3696 for (irel = internal_relocs; irel < irelend; irel++) 3697 { 3698 bfd_vma symval; 3699 struct alpha_elf_got_entry *gotent; 3700 unsigned long r_type = ELF64_R_TYPE (irel->r_info); 3701 unsigned long r_symndx = ELF64_R_SYM (irel->r_info); 3702 3703 /* Early exit for unhandled or unrelaxable relocations. */ 3704 switch (r_type) 3705 { 3706 case R_ALPHA_LITERAL: 3707 case R_ALPHA_GPRELHIGH: 3708 case R_ALPHA_GPRELLOW: 3709 case R_ALPHA_GOTDTPREL: 3710 case R_ALPHA_GOTTPREL: 3711 case R_ALPHA_TLSGD: 3712 break; 3713 3714 case R_ALPHA_TLSLDM: 3715 /* The symbol for a TLSLDM reloc is ignored. Collapse the 3716 reloc to the 0 symbol so that they all match. */ 3717 r_symndx = 0; 3718 break; 3719 3720 default: 3721 continue; 3722 } 3723 3724 /* Get the value of the symbol referred to by the reloc. */ 3725 if (r_symndx < symtab_hdr->sh_info) 3726 { 3727 /* A local symbol. */ 3728 Elf_Internal_Sym *isym; 3729 3730 /* Read this BFD's local symbols. */ 3731 if (isymbuf == NULL) 3732 { 3733 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents; 3734 if (isymbuf == NULL) 3735 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr, 3736 symtab_hdr->sh_info, 0, 3737 NULL, NULL, NULL); 3738 if (isymbuf == NULL) 3739 goto error_return; 3740 } 3741 3742 isym = isymbuf + r_symndx; 3743 3744 /* Given the symbol for a TLSLDM reloc is ignored, this also 3745 means forcing the symbol value to the tp base. */ 3746 if (r_type == R_ALPHA_TLSLDM) 3747 { 3748 info.tsec = bfd_abs_section_ptr; 3749 symval = alpha_get_tprel_base (info.link_info); 3750 } 3751 else 3752 { 3753 symval = isym->st_value; 3754 if (isym->st_shndx == SHN_UNDEF) 3755 continue; 3756 else if (isym->st_shndx == SHN_ABS) 3757 info.tsec = bfd_abs_section_ptr; 3758 else if (isym->st_shndx == SHN_COMMON) 3759 info.tsec = bfd_com_section_ptr; 3760 else 3761 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx); 3762 } 3763 3764 info.h = NULL; 3765 info.other = isym->st_other; 3766 if (local_got_entries) 3767 info.first_gotent = &local_got_entries[r_symndx]; 3768 else 3769 { 3770 info.first_gotent = &info.gotent; 3771 info.gotent = NULL; 3772 } 3773 } 3774 else 3775 { 3776 unsigned long indx; 3777 struct alpha_elf_link_hash_entry *h; 3778 3779 indx = r_symndx - symtab_hdr->sh_info; 3780 h = alpha_elf_sym_hashes (abfd)[indx]; 3781 BFD_ASSERT (h != NULL); 3782 3783 while (h->root.root.type == bfd_link_hash_indirect 3784 || h->root.root.type == bfd_link_hash_warning) 3785 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link; 3786 3787 /* If the symbol is undefined, we can't do anything with it. */ 3788 if (h->root.root.type == bfd_link_hash_undefined) 3789 continue; 3790 3791 /* If the symbol isn't defined in the current module, 3792 again we can't do anything. */ 3793 if (h->root.root.type == bfd_link_hash_undefweak) 3794 { 3795 info.tsec = bfd_abs_section_ptr; 3796 symval = 0; 3797 } 3798 else if (!h->root.def_regular) 3799 { 3800 /* Except for TLSGD relocs, which can sometimes be 3801 relaxed to GOTTPREL relocs. */ 3802 if (r_type != R_ALPHA_TLSGD) 3803 continue; 3804 info.tsec = bfd_abs_section_ptr; 3805 symval = 0; 3806 } 3807 else 3808 { 3809 info.tsec = h->root.root.u.def.section; 3810 symval = h->root.root.u.def.value; 3811 } 3812 3813 info.h = h; 3814 info.other = h->root.other; 3815 info.first_gotent = &h->got_entries; 3816 } 3817 3818 /* Search for the got entry to be used by this relocation. */ 3819 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next) 3820 if (gotent->gotobj == info.gotobj 3821 && gotent->reloc_type == r_type 3822 && gotent->addend == irel->r_addend) 3823 break; 3824 info.gotent = gotent; 3825 3826 symval += info.tsec->output_section->vma + info.tsec->output_offset; 3827 symval += irel->r_addend; 3828 3829 switch (r_type) 3830 { 3831 case R_ALPHA_LITERAL: 3832 BFD_ASSERT(info.gotent != NULL); 3833 3834 /* If there exist LITUSE relocations immediately following, this 3835 opens up all sorts of interesting optimizations, because we 3836 now know every location that this address load is used. */ 3837 if (irel+1 < irelend 3838 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE) 3839 { 3840 if (!elf64_alpha_relax_with_lituse (&info, symval, irel)) 3841 goto error_return; 3842 } 3843 else 3844 { 3845 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type)) 3846 goto error_return; 3847 } 3848 break; 3849 3850 case R_ALPHA_GOTDTPREL: 3851 case R_ALPHA_GOTTPREL: 3852 BFD_ASSERT(info.gotent != NULL); 3853 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type)) 3854 goto error_return; 3855 break; 3856 3857 case R_ALPHA_TLSGD: 3858 case R_ALPHA_TLSLDM: 3859 BFD_ASSERT(info.gotent != NULL); 3860 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel, 3861 r_type == R_ALPHA_TLSGD)) 3862 goto error_return; 3863 break; 3864 } 3865 } 3866 3867 if (isymbuf != NULL 3868 && symtab_hdr->contents != (unsigned char *) isymbuf) 3869 { 3870 if (!link_info->keep_memory) 3871 free (isymbuf); 3872 else 3873 { 3874 /* Cache the symbols for elf_link_input_bfd. */ 3875 symtab_hdr->contents = (unsigned char *) isymbuf; 3876 } 3877 } 3878 3879 if (info.contents != NULL 3880 && elf_section_data (sec)->this_hdr.contents != info.contents) 3881 { 3882 if (!info.changed_contents && !link_info->keep_memory) 3883 free (info.contents); 3884 else 3885 { 3886 /* Cache the section contents for elf_link_input_bfd. */ 3887 elf_section_data (sec)->this_hdr.contents = info.contents; 3888 } 3889 } 3890 3891 if (elf_section_data (sec)->relocs != internal_relocs) 3892 { 3893 if (!info.changed_relocs) 3894 free (internal_relocs); 3895 else 3896 elf_section_data (sec)->relocs = internal_relocs; 3897 } 3898 3899 *again = info.changed_contents || info.changed_relocs; 3900 3901 return TRUE; 3902 3903 error_return: 3904 if (isymbuf != NULL 3905 && symtab_hdr->contents != (unsigned char *) isymbuf) 3906 free (isymbuf); 3907 if (info.contents != NULL 3908 && elf_section_data (sec)->this_hdr.contents != info.contents) 3909 free (info.contents); 3910 if (internal_relocs != NULL 3911 && elf_section_data (sec)->relocs != internal_relocs) 3912 free (internal_relocs); 3913 return FALSE; 3914 } 3915 3916 /* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET) 3917 into the next available slot in SREL. */ 3918 3919 static void 3920 elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info, 3921 asection *sec, asection *srel, bfd_vma offset, 3922 long dynindx, long rtype, bfd_vma addend) 3923 { 3924 Elf_Internal_Rela outrel; 3925 bfd_byte *loc; 3926 3927 BFD_ASSERT (srel != NULL); 3928 3929 outrel.r_info = ELF64_R_INFO (dynindx, rtype); 3930 outrel.r_addend = addend; 3931 3932 offset = _bfd_elf_section_offset (abfd, info, sec, offset); 3933 if ((offset | 1) != (bfd_vma) -1) 3934 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset; 3935 else 3936 memset (&outrel, 0, sizeof (outrel)); 3937 3938 loc = srel->contents; 3939 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela); 3940 bfd_elf64_swap_reloca_out (abfd, &outrel, loc); 3941 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size); 3942 } 3943 3944 /* Relocate an Alpha ELF section for a relocatable link. 3945 3946 We don't have to change anything unless the reloc is against a section 3947 symbol, in which case we have to adjust according to where the section 3948 symbol winds up in the output section. */ 3949 3950 static bfd_boolean 3951 elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED, 3952 struct bfd_link_info *info ATTRIBUTE_UNUSED, 3953 bfd *input_bfd, asection *input_section, 3954 bfd_byte *contents ATTRIBUTE_UNUSED, 3955 Elf_Internal_Rela *relocs, 3956 Elf_Internal_Sym *local_syms, 3957 asection **local_sections) 3958 { 3959 unsigned long symtab_hdr_sh_info; 3960 Elf_Internal_Rela *rel; 3961 Elf_Internal_Rela *relend; 3962 struct elf_link_hash_entry **sym_hashes; 3963 bfd_boolean ret_val = TRUE; 3964 3965 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info; 3966 sym_hashes = elf_sym_hashes (input_bfd); 3967 3968 relend = relocs + input_section->reloc_count; 3969 for (rel = relocs; rel < relend; rel++) 3970 { 3971 unsigned long r_symndx; 3972 Elf_Internal_Sym *sym; 3973 asection *sec; 3974 unsigned long r_type; 3975 3976 r_type = ELF64_R_TYPE (rel->r_info); 3977 if (r_type >= R_ALPHA_max) 3978 { 3979 (*_bfd_error_handler) 3980 (_("%B: unknown relocation type %d"), 3981 input_bfd, (int) r_type); 3982 bfd_set_error (bfd_error_bad_value); 3983 ret_val = FALSE; 3984 continue; 3985 } 3986 3987 /* The symbol associated with GPDISP and LITUSE is 3988 immaterial. Only the addend is significant. */ 3989 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE) 3990 continue; 3991 3992 r_symndx = ELF64_R_SYM (rel->r_info); 3993 if (r_symndx < symtab_hdr_sh_info) 3994 { 3995 sym = local_syms + r_symndx; 3996 sec = local_sections[r_symndx]; 3997 } 3998 else 3999 { 4000 struct elf_link_hash_entry *h; 4001 4002 h = sym_hashes[r_symndx - symtab_hdr_sh_info]; 4003 4004 while (h->root.type == bfd_link_hash_indirect 4005 || h->root.type == bfd_link_hash_warning) 4006 h = (struct elf_link_hash_entry *) h->root.u.i.link; 4007 4008 if (h->root.type != bfd_link_hash_defined 4009 && h->root.type != bfd_link_hash_defweak) 4010 continue; 4011 4012 sym = NULL; 4013 sec = h->root.u.def.section; 4014 } 4015 4016 if (sec != NULL && elf_discarded_section (sec)) 4017 { 4018 /* For relocs against symbols from removed linkonce sections, 4019 or sections discarded by a linker script, we just want the 4020 section contents zeroed. */ 4021 _bfd_clear_contents (elf64_alpha_howto_table + r_type, 4022 input_bfd, contents + rel->r_offset); 4023 rel->r_info = 0; 4024 rel->r_addend = 0; 4025 continue; 4026 } 4027 4028 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION) 4029 rel->r_addend += sec->output_offset; 4030 } 4031 4032 return ret_val; 4033 } 4034 4035 /* Relocate an Alpha ELF section. */ 4036 4037 static bfd_boolean 4038 elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info, 4039 bfd *input_bfd, asection *input_section, 4040 bfd_byte *contents, Elf_Internal_Rela *relocs, 4041 Elf_Internal_Sym *local_syms, 4042 asection **local_sections) 4043 { 4044 Elf_Internal_Shdr *symtab_hdr; 4045 Elf_Internal_Rela *rel; 4046 Elf_Internal_Rela *relend; 4047 asection *sgot, *srel, *srelgot; 4048 bfd *dynobj, *gotobj; 4049 bfd_vma gp, tp_base, dtp_base; 4050 struct alpha_elf_got_entry **local_got_entries; 4051 bfd_boolean ret_val; 4052 4053 BFD_ASSERT (is_alpha_elf (input_bfd)); 4054 4055 /* Handle relocatable links with a smaller loop. */ 4056 if (info->relocatable) 4057 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd, 4058 input_section, contents, relocs, 4059 local_syms, local_sections); 4060 4061 /* This is a final link. */ 4062 4063 ret_val = TRUE; 4064 4065 symtab_hdr = &elf_symtab_hdr (input_bfd); 4066 4067 dynobj = elf_hash_table (info)->dynobj; 4068 if (dynobj) 4069 srelgot = bfd_get_section_by_name (dynobj, ".rela.got"); 4070 else 4071 srelgot = NULL; 4072 4073 if (input_section->flags & SEC_ALLOC) 4074 { 4075 const char *section_name; 4076 section_name = (bfd_elf_string_from_elf_section 4077 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx, 4078 elf_section_data(input_section)->rel_hdr.sh_name)); 4079 BFD_ASSERT(section_name != NULL); 4080 srel = bfd_get_section_by_name (dynobj, section_name); 4081 } 4082 else 4083 srel = NULL; 4084 4085 /* Find the gp value for this input bfd. */ 4086 gotobj = alpha_elf_tdata (input_bfd)->gotobj; 4087 if (gotobj) 4088 { 4089 sgot = alpha_elf_tdata (gotobj)->got; 4090 gp = _bfd_get_gp_value (gotobj); 4091 if (gp == 0) 4092 { 4093 gp = (sgot->output_section->vma 4094 + sgot->output_offset 4095 + 0x8000); 4096 _bfd_set_gp_value (gotobj, gp); 4097 } 4098 } 4099 else 4100 { 4101 sgot = NULL; 4102 gp = 0; 4103 } 4104 4105 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries; 4106 4107 if (elf_hash_table (info)->tls_sec != NULL) 4108 { 4109 dtp_base = alpha_get_dtprel_base (info); 4110 tp_base = alpha_get_tprel_base (info); 4111 } 4112 else 4113 dtp_base = tp_base = 0; 4114 4115 relend = relocs + input_section->reloc_count; 4116 for (rel = relocs; rel < relend; rel++) 4117 { 4118 struct alpha_elf_link_hash_entry *h = NULL; 4119 struct alpha_elf_got_entry *gotent; 4120 bfd_reloc_status_type r; 4121 reloc_howto_type *howto; 4122 unsigned long r_symndx; 4123 Elf_Internal_Sym *sym = NULL; 4124 asection *sec = NULL; 4125 bfd_vma value; 4126 bfd_vma addend; 4127 bfd_boolean dynamic_symbol_p; 4128 bfd_boolean undef_weak_ref = FALSE; 4129 unsigned long r_type; 4130 4131 r_type = ELF64_R_TYPE(rel->r_info); 4132 if (r_type >= R_ALPHA_max) 4133 { 4134 (*_bfd_error_handler) 4135 (_("%B: unknown relocation type %d"), 4136 input_bfd, (int) r_type); 4137 bfd_set_error (bfd_error_bad_value); 4138 ret_val = FALSE; 4139 continue; 4140 } 4141 4142 howto = elf64_alpha_howto_table + r_type; 4143 r_symndx = ELF64_R_SYM(rel->r_info); 4144 4145 /* The symbol for a TLSLDM reloc is ignored. Collapse the 4146 reloc to the 0 symbol so that they all match. */ 4147 if (r_type == R_ALPHA_TLSLDM) 4148 r_symndx = 0; 4149 4150 if (r_symndx < symtab_hdr->sh_info) 4151 { 4152 asection *msec; 4153 sym = local_syms + r_symndx; 4154 sec = local_sections[r_symndx]; 4155 msec = sec; 4156 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel); 4157 4158 /* If this is a tp-relative relocation against sym 0, 4159 this is hackery from relax_section. Force the value to 4160 be the tls module base. */ 4161 if (r_symndx == 0 4162 && (r_type == R_ALPHA_TLSLDM 4163 || r_type == R_ALPHA_GOTTPREL 4164 || r_type == R_ALPHA_TPREL64 4165 || r_type == R_ALPHA_TPRELHI 4166 || r_type == R_ALPHA_TPRELLO 4167 || r_type == R_ALPHA_TPREL16)) 4168 value = dtp_base; 4169 4170 if (local_got_entries) 4171 gotent = local_got_entries[r_symndx]; 4172 else 4173 gotent = NULL; 4174 4175 /* Need to adjust local GOT entries' addends for SEC_MERGE 4176 unless it has been done already. */ 4177 if ((sec->flags & SEC_MERGE) 4178 && ELF_ST_TYPE (sym->st_info) == STT_SECTION 4179 && sec->sec_info_type == ELF_INFO_TYPE_MERGE 4180 && gotent 4181 && !gotent->reloc_xlated) 4182 { 4183 struct alpha_elf_got_entry *ent; 4184 4185 for (ent = gotent; ent; ent = ent->next) 4186 { 4187 ent->reloc_xlated = 1; 4188 if (ent->use_count == 0) 4189 continue; 4190 msec = sec; 4191 ent->addend = 4192 _bfd_merged_section_offset (output_bfd, &msec, 4193 elf_section_data (sec)-> 4194 sec_info, 4195 sym->st_value + ent->addend); 4196 ent->addend -= sym->st_value; 4197 ent->addend += msec->output_section->vma 4198 + msec->output_offset 4199 - sec->output_section->vma 4200 - sec->output_offset; 4201 } 4202 } 4203 4204 dynamic_symbol_p = FALSE; 4205 } 4206 else 4207 { 4208 bfd_boolean warned; 4209 bfd_boolean unresolved_reloc; 4210 struct elf_link_hash_entry *hh; 4211 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd); 4212 4213 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel, 4214 r_symndx, symtab_hdr, sym_hashes, 4215 hh, sec, value, 4216 unresolved_reloc, warned); 4217 4218 if (warned) 4219 continue; 4220 4221 if (value == 0 4222 && ! unresolved_reloc 4223 && hh->root.type == bfd_link_hash_undefweak) 4224 undef_weak_ref = TRUE; 4225 4226 h = (struct alpha_elf_link_hash_entry *) hh; 4227 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info); 4228 gotent = h->got_entries; 4229 } 4230 4231 if (sec != NULL && elf_discarded_section (sec)) 4232 { 4233 /* For relocs against symbols from removed linkonce sections, 4234 or sections discarded by a linker script, we just want the 4235 section contents zeroed. Avoid any special processing. */ 4236 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset); 4237 rel->r_info = 0; 4238 rel->r_addend = 0; 4239 continue; 4240 } 4241 4242 addend = rel->r_addend; 4243 value += addend; 4244 4245 /* Search for the proper got entry. */ 4246 for (; gotent ; gotent = gotent->next) 4247 if (gotent->gotobj == gotobj 4248 && gotent->reloc_type == r_type 4249 && gotent->addend == addend) 4250 break; 4251 4252 switch (r_type) 4253 { 4254 case R_ALPHA_GPDISP: 4255 { 4256 bfd_byte *p_ldah, *p_lda; 4257 4258 BFD_ASSERT(gp != 0); 4259 4260 value = (input_section->output_section->vma 4261 + input_section->output_offset 4262 + rel->r_offset); 4263 4264 p_ldah = contents + rel->r_offset; 4265 p_lda = p_ldah + rel->r_addend; 4266 4267 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value, 4268 p_ldah, p_lda); 4269 } 4270 break; 4271 4272 case R_ALPHA_LITERAL: 4273 BFD_ASSERT(sgot != NULL); 4274 BFD_ASSERT(gp != 0); 4275 BFD_ASSERT(gotent != NULL); 4276 BFD_ASSERT(gotent->use_count >= 1); 4277 4278 if (!gotent->reloc_done) 4279 { 4280 gotent->reloc_done = 1; 4281 4282 bfd_put_64 (output_bfd, value, 4283 sgot->contents + gotent->got_offset); 4284 4285 /* If the symbol has been forced local, output a 4286 RELATIVE reloc, otherwise it will be handled in 4287 finish_dynamic_symbol. */ 4288 if (info->shared && !dynamic_symbol_p && !undef_weak_ref) 4289 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot, 4290 gotent->got_offset, 0, 4291 R_ALPHA_RELATIVE, value); 4292 } 4293 4294 value = (sgot->output_section->vma 4295 + sgot->output_offset 4296 + gotent->got_offset); 4297 value -= gp; 4298 goto default_reloc; 4299 4300 case R_ALPHA_GPREL32: 4301 case R_ALPHA_GPREL16: 4302 case R_ALPHA_GPRELLOW: 4303 if (dynamic_symbol_p) 4304 { 4305 (*_bfd_error_handler) 4306 (_("%B: gp-relative relocation against dynamic symbol %s"), 4307 input_bfd, h->root.root.root.string); 4308 ret_val = FALSE; 4309 } 4310 BFD_ASSERT(gp != 0); 4311 value -= gp; 4312 goto default_reloc; 4313 4314 case R_ALPHA_GPRELHIGH: 4315 if (dynamic_symbol_p) 4316 { 4317 (*_bfd_error_handler) 4318 (_("%B: gp-relative relocation against dynamic symbol %s"), 4319 input_bfd, h->root.root.root.string); 4320 ret_val = FALSE; 4321 } 4322 BFD_ASSERT(gp != 0); 4323 value -= gp; 4324 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1); 4325 goto default_reloc; 4326 4327 case R_ALPHA_HINT: 4328 /* A call to a dynamic symbol is definitely out of range of 4329 the 16-bit displacement. Don't bother writing anything. */ 4330 if (dynamic_symbol_p) 4331 { 4332 r = bfd_reloc_ok; 4333 break; 4334 } 4335 /* The regular PC-relative stuff measures from the start of 4336 the instruction rather than the end. */ 4337 value -= 4; 4338 goto default_reloc; 4339 4340 case R_ALPHA_BRADDR: 4341 if (dynamic_symbol_p) 4342 { 4343 (*_bfd_error_handler) 4344 (_("%B: pc-relative relocation against dynamic symbol %s"), 4345 input_bfd, h->root.root.root.string); 4346 ret_val = FALSE; 4347 } 4348 /* The regular PC-relative stuff measures from the start of 4349 the instruction rather than the end. */ 4350 value -= 4; 4351 goto default_reloc; 4352 4353 case R_ALPHA_BRSGP: 4354 { 4355 int other; 4356 const char *name; 4357 4358 /* The regular PC-relative stuff measures from the start of 4359 the instruction rather than the end. */ 4360 value -= 4; 4361 4362 /* The source and destination gp must be the same. Note that 4363 the source will always have an assigned gp, since we forced 4364 one in check_relocs, but that the destination may not, as 4365 it might not have had any relocations at all. Also take 4366 care not to crash if H is an undefined symbol. */ 4367 if (h != NULL && sec != NULL 4368 && alpha_elf_tdata (sec->owner)->gotobj 4369 && gotobj != alpha_elf_tdata (sec->owner)->gotobj) 4370 { 4371 (*_bfd_error_handler) 4372 (_("%B: change in gp: BRSGP %s"), 4373 input_bfd, h->root.root.root.string); 4374 ret_val = FALSE; 4375 } 4376 4377 /* The symbol should be marked either NOPV or STD_GPLOAD. */ 4378 if (h != NULL) 4379 other = h->root.other; 4380 else 4381 other = sym->st_other; 4382 switch (other & STO_ALPHA_STD_GPLOAD) 4383 { 4384 case STO_ALPHA_NOPV: 4385 break; 4386 case STO_ALPHA_STD_GPLOAD: 4387 value += 8; 4388 break; 4389 default: 4390 if (h != NULL) 4391 name = h->root.root.root.string; 4392 else 4393 { 4394 name = (bfd_elf_string_from_elf_section 4395 (input_bfd, symtab_hdr->sh_link, sym->st_name)); 4396 if (name == NULL) 4397 name = _("<unknown>"); 4398 else if (name[0] == 0) 4399 name = bfd_section_name (input_bfd, sec); 4400 } 4401 (*_bfd_error_handler) 4402 (_("%B: !samegp reloc against symbol without .prologue: %s"), 4403 input_bfd, name); 4404 ret_val = FALSE; 4405 break; 4406 } 4407 4408 goto default_reloc; 4409 } 4410 4411 case R_ALPHA_REFLONG: 4412 case R_ALPHA_REFQUAD: 4413 case R_ALPHA_DTPREL64: 4414 case R_ALPHA_TPREL64: 4415 { 4416 long dynindx, dyntype = r_type; 4417 bfd_vma dynaddend; 4418 4419 /* Careful here to remember RELATIVE relocations for global 4420 variables for symbolic shared objects. */ 4421 4422 if (dynamic_symbol_p) 4423 { 4424 BFD_ASSERT(h->root.dynindx != -1); 4425 dynindx = h->root.dynindx; 4426 dynaddend = addend; 4427 addend = 0, value = 0; 4428 } 4429 else if (r_type == R_ALPHA_DTPREL64) 4430 { 4431 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL); 4432 value -= dtp_base; 4433 goto default_reloc; 4434 } 4435 else if (r_type == R_ALPHA_TPREL64) 4436 { 4437 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL); 4438 if (!info->shared) 4439 { 4440 value -= tp_base; 4441 goto default_reloc; 4442 } 4443 dynindx = 0; 4444 dynaddend = value - dtp_base; 4445 } 4446 else if (info->shared 4447 && r_symndx != 0 4448 && (input_section->flags & SEC_ALLOC) 4449 && !undef_weak_ref) 4450 { 4451 if (r_type == R_ALPHA_REFLONG) 4452 { 4453 (*_bfd_error_handler) 4454 (_("%B: unhandled dynamic relocation against %s"), 4455 input_bfd, 4456 h->root.root.root.string); 4457 ret_val = FALSE; 4458 } 4459 dynindx = 0; 4460 dyntype = R_ALPHA_RELATIVE; 4461 dynaddend = value; 4462 } 4463 else 4464 goto default_reloc; 4465 4466 if (input_section->flags & SEC_ALLOC) 4467 elf64_alpha_emit_dynrel (output_bfd, info, input_section, 4468 srel, rel->r_offset, dynindx, 4469 dyntype, dynaddend); 4470 } 4471 goto default_reloc; 4472 4473 case R_ALPHA_SREL16: 4474 case R_ALPHA_SREL32: 4475 case R_ALPHA_SREL64: 4476 if (dynamic_symbol_p) 4477 { 4478 (*_bfd_error_handler) 4479 (_("%B: pc-relative relocation against dynamic symbol %s"), 4480 input_bfd, h->root.root.root.string); 4481 ret_val = FALSE; 4482 } 4483 else if ((info->shared || info->pie) && undef_weak_ref) 4484 { 4485 (*_bfd_error_handler) 4486 (_("%B: pc-relative relocation against undefined weak symbol %s"), 4487 input_bfd, h->root.root.root.string); 4488 ret_val = FALSE; 4489 } 4490 4491 4492 /* ??? .eh_frame references to discarded sections will be smashed 4493 to relocations against SHN_UNDEF. The .eh_frame format allows 4494 NULL to be encoded as 0 in any format, so this works here. */ 4495 if (r_symndx == 0) 4496 howto = (elf64_alpha_howto_table 4497 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG)); 4498 goto default_reloc; 4499 4500 case R_ALPHA_TLSLDM: 4501 /* Ignore the symbol for the relocation. The result is always 4502 the current module. */ 4503 dynamic_symbol_p = 0; 4504 /* FALLTHRU */ 4505 4506 case R_ALPHA_TLSGD: 4507 if (!gotent->reloc_done) 4508 { 4509 gotent->reloc_done = 1; 4510 4511 /* Note that the module index for the main program is 1. */ 4512 bfd_put_64 (output_bfd, !info->shared && !dynamic_symbol_p, 4513 sgot->contents + gotent->got_offset); 4514 4515 /* If the symbol has been forced local, output a 4516 DTPMOD64 reloc, otherwise it will be handled in 4517 finish_dynamic_symbol. */ 4518 if (info->shared && !dynamic_symbol_p) 4519 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot, 4520 gotent->got_offset, 0, 4521 R_ALPHA_DTPMOD64, 0); 4522 4523 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM) 4524 value = 0; 4525 else 4526 { 4527 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL); 4528 value -= dtp_base; 4529 } 4530 bfd_put_64 (output_bfd, value, 4531 sgot->contents + gotent->got_offset + 8); 4532 } 4533 4534 value = (sgot->output_section->vma 4535 + sgot->output_offset 4536 + gotent->got_offset); 4537 value -= gp; 4538 goto default_reloc; 4539 4540 case R_ALPHA_DTPRELHI: 4541 case R_ALPHA_DTPRELLO: 4542 case R_ALPHA_DTPREL16: 4543 if (dynamic_symbol_p) 4544 { 4545 (*_bfd_error_handler) 4546 (_("%B: dtp-relative relocation against dynamic symbol %s"), 4547 input_bfd, h->root.root.root.string); 4548 ret_val = FALSE; 4549 } 4550 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL); 4551 value -= dtp_base; 4552 if (r_type == R_ALPHA_DTPRELHI) 4553 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1); 4554 goto default_reloc; 4555 4556 case R_ALPHA_TPRELHI: 4557 case R_ALPHA_TPRELLO: 4558 case R_ALPHA_TPREL16: 4559 if (info->shared) 4560 { 4561 (*_bfd_error_handler) 4562 (_("%B: TLS local exec code cannot be linked into shared objects"), 4563 input_bfd); 4564 ret_val = FALSE; 4565 } 4566 else if (dynamic_symbol_p) 4567 { 4568 (*_bfd_error_handler) 4569 (_("%B: tp-relative relocation against dynamic symbol %s"), 4570 input_bfd, h->root.root.root.string); 4571 ret_val = FALSE; 4572 } 4573 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL); 4574 value -= tp_base; 4575 if (r_type == R_ALPHA_TPRELHI) 4576 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1); 4577 goto default_reloc; 4578 4579 case R_ALPHA_GOTDTPREL: 4580 case R_ALPHA_GOTTPREL: 4581 BFD_ASSERT(sgot != NULL); 4582 BFD_ASSERT(gp != 0); 4583 BFD_ASSERT(gotent != NULL); 4584 BFD_ASSERT(gotent->use_count >= 1); 4585 4586 if (!gotent->reloc_done) 4587 { 4588 gotent->reloc_done = 1; 4589 4590 if (dynamic_symbol_p) 4591 value = 0; 4592 else 4593 { 4594 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL); 4595 if (r_type == R_ALPHA_GOTDTPREL) 4596 value -= dtp_base; 4597 else if (!info->shared) 4598 value -= tp_base; 4599 else 4600 { 4601 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot, 4602 gotent->got_offset, 0, 4603 R_ALPHA_TPREL64, 4604 value - dtp_base); 4605 value = 0; 4606 } 4607 } 4608 bfd_put_64 (output_bfd, value, 4609 sgot->contents + gotent->got_offset); 4610 } 4611 4612 value = (sgot->output_section->vma 4613 + sgot->output_offset 4614 + gotent->got_offset); 4615 value -= gp; 4616 goto default_reloc; 4617 4618 default: 4619 default_reloc: 4620 r = _bfd_final_link_relocate (howto, input_bfd, input_section, 4621 contents, rel->r_offset, value, 0); 4622 break; 4623 } 4624 4625 switch (r) 4626 { 4627 case bfd_reloc_ok: 4628 break; 4629 4630 case bfd_reloc_overflow: 4631 { 4632 const char *name; 4633 4634 /* Don't warn if the overflow is due to pc relative reloc 4635 against discarded section. Section optimization code should 4636 handle it. */ 4637 4638 if (r_symndx < symtab_hdr->sh_info 4639 && sec != NULL && howto->pc_relative 4640 && elf_discarded_section (sec)) 4641 break; 4642 4643 if (h != NULL) 4644 name = NULL; 4645 else 4646 { 4647 name = (bfd_elf_string_from_elf_section 4648 (input_bfd, symtab_hdr->sh_link, sym->st_name)); 4649 if (name == NULL) 4650 return FALSE; 4651 if (*name == '\0') 4652 name = bfd_section_name (input_bfd, sec); 4653 } 4654 if (! ((*info->callbacks->reloc_overflow) 4655 (info, (h ? &h->root.root : NULL), name, howto->name, 4656 (bfd_vma) 0, input_bfd, input_section, 4657 rel->r_offset))) 4658 ret_val = FALSE; 4659 } 4660 break; 4661 4662 default: 4663 case bfd_reloc_outofrange: 4664 abort (); 4665 } 4666 } 4667 4668 return ret_val; 4669 } 4670 4671 /* Finish up dynamic symbol handling. We set the contents of various 4672 dynamic sections here. */ 4673 4674 static bfd_boolean 4675 elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info, 4676 struct elf_link_hash_entry *h, 4677 Elf_Internal_Sym *sym) 4678 { 4679 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h; 4680 bfd *dynobj = elf_hash_table(info)->dynobj; 4681 4682 if (h->needs_plt) 4683 { 4684 /* Fill in the .plt entry for this symbol. */ 4685 asection *splt, *sgot, *srel; 4686 Elf_Internal_Rela outrel; 4687 bfd_byte *loc; 4688 bfd_vma got_addr, plt_addr; 4689 bfd_vma plt_index; 4690 struct alpha_elf_got_entry *gotent; 4691 4692 BFD_ASSERT (h->dynindx != -1); 4693 4694 splt = bfd_get_section_by_name (dynobj, ".plt"); 4695 BFD_ASSERT (splt != NULL); 4696 srel = bfd_get_section_by_name (dynobj, ".rela.plt"); 4697 BFD_ASSERT (srel != NULL); 4698 4699 for (gotent = ah->got_entries; gotent ; gotent = gotent->next) 4700 if (gotent->reloc_type == R_ALPHA_LITERAL 4701 && gotent->use_count > 0) 4702 { 4703 unsigned int insn; 4704 int disp; 4705 4706 sgot = alpha_elf_tdata (gotent->gotobj)->got; 4707 BFD_ASSERT (sgot != NULL); 4708 4709 BFD_ASSERT (gotent->got_offset != -1); 4710 BFD_ASSERT (gotent->plt_offset != -1); 4711 4712 got_addr = (sgot->output_section->vma 4713 + sgot->output_offset 4714 + gotent->got_offset); 4715 plt_addr = (splt->output_section->vma 4716 + splt->output_offset 4717 + gotent->plt_offset); 4718 4719 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE; 4720 4721 /* Fill in the entry in the procedure linkage table. */ 4722 if (elf64_alpha_use_secureplt) 4723 { 4724 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4); 4725 insn = INSN_AD (INSN_BR, 31, disp); 4726 bfd_put_32 (output_bfd, insn, 4727 splt->contents + gotent->plt_offset); 4728 4729 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE) 4730 / NEW_PLT_ENTRY_SIZE); 4731 } 4732 else if ((output_bfd->flags & BFD_TRADITIONAL_FORMAT) != 0) 4733 { 4734 long hi, lo; 4735 4736 /* decompose the reloc offset for the plt for ldah+lda */ 4737 hi = plt_index * sizeof(Elf64_External_Rela); 4738 lo = ((hi & 0xffff) ^ 0x8000) - 0x8000; 4739 hi = (hi - lo) >> 16; 4740 4741 insn = INSN_ABO (INSN_LDAH, 28, 31, hi); 4742 bfd_put_32 (output_bfd, insn, 4743 splt->contents + gotent->plt_offset); 4744 4745 insn = INSN_ABO (INSN_LDA, 28, 28, lo); 4746 bfd_put_32 (output_bfd, insn, 4747 splt->contents + gotent->plt_offset + 4); 4748 4749 disp = -(gotent->plt_offset + 12); 4750 insn = INSN_AD (INSN_BR, 31, disp); 4751 4752 bfd_put_32 (output_bfd, insn, 4753 splt->contents + gotent->plt_offset + 8); 4754 4755 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE) 4756 / OLD_PLT_ENTRY_SIZE); 4757 } 4758 else 4759 { 4760 disp = -(gotent->plt_offset + 4); 4761 insn = INSN_AD (INSN_BR, 28, disp); 4762 bfd_put_32 (output_bfd, insn, 4763 splt->contents + gotent->plt_offset); 4764 bfd_put_32 (output_bfd, INSN_UNOP, 4765 splt->contents + gotent->plt_offset + 4); 4766 bfd_put_32 (output_bfd, INSN_UNOP, 4767 splt->contents + gotent->plt_offset + 8); 4768 4769 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE) 4770 / OLD_PLT_ENTRY_SIZE); 4771 } 4772 4773 /* Fill in the entry in the .rela.plt section. */ 4774 outrel.r_offset = got_addr; 4775 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT); 4776 outrel.r_addend = 0; 4777 4778 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela); 4779 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc); 4780 4781 /* Fill in the entry in the .got. */ 4782 bfd_put_64 (output_bfd, plt_addr, 4783 sgot->contents + gotent->got_offset); 4784 } 4785 } 4786 else if (alpha_elf_dynamic_symbol_p (h, info)) 4787 { 4788 /* Fill in the dynamic relocations for this symbol's .got entries. */ 4789 asection *srel; 4790 struct alpha_elf_got_entry *gotent; 4791 4792 srel = bfd_get_section_by_name (dynobj, ".rela.got"); 4793 BFD_ASSERT (srel != NULL); 4794 4795 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries; 4796 gotent != NULL; 4797 gotent = gotent->next) 4798 { 4799 asection *sgot; 4800 long r_type; 4801 4802 if (gotent->use_count == 0) 4803 continue; 4804 4805 sgot = alpha_elf_tdata (gotent->gotobj)->got; 4806 4807 r_type = gotent->reloc_type; 4808 switch (r_type) 4809 { 4810 case R_ALPHA_LITERAL: 4811 r_type = R_ALPHA_GLOB_DAT; 4812 break; 4813 case R_ALPHA_TLSGD: 4814 r_type = R_ALPHA_DTPMOD64; 4815 break; 4816 case R_ALPHA_GOTDTPREL: 4817 r_type = R_ALPHA_DTPREL64; 4818 break; 4819 case R_ALPHA_GOTTPREL: 4820 r_type = R_ALPHA_TPREL64; 4821 break; 4822 case R_ALPHA_TLSLDM: 4823 default: 4824 abort (); 4825 } 4826 4827 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel, 4828 gotent->got_offset, h->dynindx, 4829 r_type, gotent->addend); 4830 4831 if (gotent->reloc_type == R_ALPHA_TLSGD) 4832 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel, 4833 gotent->got_offset + 8, h->dynindx, 4834 R_ALPHA_DTPREL64, gotent->addend); 4835 } 4836 } 4837 4838 /* Mark some specially defined symbols as absolute. */ 4839 if (strcmp (h->root.root.string, "_DYNAMIC") == 0 4840 || h == elf_hash_table (info)->hgot 4841 || h == elf_hash_table (info)->hplt) 4842 sym->st_shndx = SHN_ABS; 4843 4844 return TRUE; 4845 } 4846 4847 /* Finish up the dynamic sections. */ 4848 4849 static bfd_boolean 4850 elf64_alpha_finish_dynamic_sections (bfd *output_bfd, 4851 struct bfd_link_info *info) 4852 { 4853 bfd *dynobj; 4854 asection *sdyn; 4855 4856 dynobj = elf_hash_table (info)->dynobj; 4857 sdyn = bfd_get_section_by_name (dynobj, ".dynamic"); 4858 4859 if (elf_hash_table (info)->dynamic_sections_created) 4860 { 4861 asection *splt, *sgotplt, *srelaplt; 4862 Elf64_External_Dyn *dyncon, *dynconend; 4863 bfd_vma plt_vma, gotplt_vma; 4864 4865 splt = bfd_get_section_by_name (dynobj, ".plt"); 4866 srelaplt = bfd_get_section_by_name (output_bfd, ".rela.plt"); 4867 BFD_ASSERT (splt != NULL && sdyn != NULL); 4868 4869 plt_vma = splt->output_section->vma + splt->output_offset; 4870 4871 gotplt_vma = 0; 4872 if (elf64_alpha_use_secureplt) 4873 { 4874 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt"); 4875 BFD_ASSERT (sgotplt != NULL); 4876 if (sgotplt->size > 0) 4877 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset; 4878 } 4879 4880 dyncon = (Elf64_External_Dyn *) sdyn->contents; 4881 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size); 4882 for (; dyncon < dynconend; dyncon++) 4883 { 4884 Elf_Internal_Dyn dyn; 4885 4886 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn); 4887 4888 switch (dyn.d_tag) 4889 { 4890 case DT_PLTGOT: 4891 dyn.d_un.d_ptr 4892 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma; 4893 break; 4894 case DT_PLTRELSZ: 4895 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0; 4896 break; 4897 case DT_JMPREL: 4898 dyn.d_un.d_ptr = srelaplt ? srelaplt->vma : 0; 4899 break; 4900 4901 case DT_RELASZ: 4902 /* My interpretation of the TIS v1.1 ELF document indicates 4903 that RELASZ should not include JMPREL. This is not what 4904 the rest of the BFD does. It is, however, what the 4905 glibc ld.so wants. Do this fixup here until we found 4906 out who is right. */ 4907 if (srelaplt) 4908 dyn.d_un.d_val -= srelaplt->size; 4909 break; 4910 } 4911 4912 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon); 4913 } 4914 4915 /* Initialize the plt header. */ 4916 if (splt->size > 0) 4917 { 4918 unsigned int insn; 4919 int ofs; 4920 4921 if (elf64_alpha_use_secureplt) 4922 { 4923 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE); 4924 4925 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25); 4926 bfd_put_32 (output_bfd, insn, splt->contents); 4927 4928 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16); 4929 bfd_put_32 (output_bfd, insn, splt->contents + 4); 4930 4931 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25); 4932 bfd_put_32 (output_bfd, insn, splt->contents + 8); 4933 4934 insn = INSN_ABO (INSN_LDA, 28, 28, ofs); 4935 bfd_put_32 (output_bfd, insn, splt->contents + 12); 4936 4937 insn = INSN_ABO (INSN_LDQ, 27, 28, 0); 4938 bfd_put_32 (output_bfd, insn, splt->contents + 16); 4939 4940 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25); 4941 bfd_put_32 (output_bfd, insn, splt->contents + 20); 4942 4943 insn = INSN_ABO (INSN_LDQ, 28, 28, 8); 4944 bfd_put_32 (output_bfd, insn, splt->contents + 24); 4945 4946 insn = INSN_AB (INSN_JMP, 31, 27); 4947 bfd_put_32 (output_bfd, insn, splt->contents + 28); 4948 4949 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE); 4950 bfd_put_32 (output_bfd, insn, splt->contents + 32); 4951 } 4952 else 4953 { 4954 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */ 4955 bfd_put_32 (output_bfd, insn, splt->contents); 4956 4957 insn = INSN_ABO (INSN_LDQ, 27, 27, 12); 4958 bfd_put_32 (output_bfd, insn, splt->contents + 4); 4959 4960 insn = INSN_UNOP; 4961 bfd_put_32 (output_bfd, insn, splt->contents + 8); 4962 4963 insn = INSN_AB (INSN_JMP, 27, 27); 4964 bfd_put_32 (output_bfd, insn, splt->contents + 12); 4965 4966 /* The next two words will be filled in by ld.so. */ 4967 bfd_put_64 (output_bfd, 0, splt->contents + 16); 4968 bfd_put_64 (output_bfd, 0, splt->contents + 24); 4969 } 4970 4971 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0; 4972 } 4973 } 4974 4975 return TRUE; 4976 } 4977 4978 /* We need to use a special link routine to handle the .mdebug section. 4979 We need to merge all instances of these sections together, not write 4980 them all out sequentially. */ 4981 4982 static bfd_boolean 4983 elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info) 4984 { 4985 asection *o; 4986 struct bfd_link_order *p; 4987 asection *mdebug_sec; 4988 struct ecoff_debug_info debug; 4989 const struct ecoff_debug_swap *swap 4990 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap; 4991 HDRR *symhdr = &debug.symbolic_header; 4992 PTR mdebug_handle = NULL; 4993 4994 /* Go through the sections and collect the mdebug information. */ 4995 mdebug_sec = NULL; 4996 for (o = abfd->sections; o != (asection *) NULL; o = o->next) 4997 { 4998 if (strcmp (o->name, ".mdebug") == 0) 4999 { 5000 struct extsym_info einfo; 5001 5002 /* We have found the .mdebug section in the output file. 5003 Look through all the link_orders comprising it and merge 5004 the information together. */ 5005 symhdr->magic = swap->sym_magic; 5006 /* FIXME: What should the version stamp be? */ 5007 symhdr->vstamp = 0; 5008 symhdr->ilineMax = 0; 5009 symhdr->cbLine = 0; 5010 symhdr->idnMax = 0; 5011 symhdr->ipdMax = 0; 5012 symhdr->isymMax = 0; 5013 symhdr->ioptMax = 0; 5014 symhdr->iauxMax = 0; 5015 symhdr->issMax = 0; 5016 symhdr->issExtMax = 0; 5017 symhdr->ifdMax = 0; 5018 symhdr->crfd = 0; 5019 symhdr->iextMax = 0; 5020 5021 /* We accumulate the debugging information itself in the 5022 debug_info structure. */ 5023 debug.line = NULL; 5024 debug.external_dnr = NULL; 5025 debug.external_pdr = NULL; 5026 debug.external_sym = NULL; 5027 debug.external_opt = NULL; 5028 debug.external_aux = NULL; 5029 debug.ss = NULL; 5030 debug.ssext = debug.ssext_end = NULL; 5031 debug.external_fdr = NULL; 5032 debug.external_rfd = NULL; 5033 debug.external_ext = debug.external_ext_end = NULL; 5034 5035 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info); 5036 if (mdebug_handle == (PTR) NULL) 5037 return FALSE; 5038 5039 if (1) 5040 { 5041 asection *s; 5042 EXTR esym; 5043 bfd_vma last = 0; 5044 unsigned int i; 5045 static const char * const name[] = 5046 { 5047 ".text", ".init", ".fini", ".data", 5048 ".rodata", ".sdata", ".sbss", ".bss" 5049 }; 5050 static const int sc[] = { scText, scInit, scFini, scData, 5051 scRData, scSData, scSBss, scBss }; 5052 5053 esym.jmptbl = 0; 5054 esym.cobol_main = 0; 5055 esym.weakext = 0; 5056 esym.reserved = 0; 5057 esym.ifd = ifdNil; 5058 esym.asym.iss = issNil; 5059 esym.asym.st = stLocal; 5060 esym.asym.reserved = 0; 5061 esym.asym.index = indexNil; 5062 for (i = 0; i < 8; i++) 5063 { 5064 esym.asym.sc = sc[i]; 5065 s = bfd_get_section_by_name (abfd, name[i]); 5066 if (s != NULL) 5067 { 5068 esym.asym.value = s->vma; 5069 last = s->vma + s->size; 5070 } 5071 else 5072 esym.asym.value = last; 5073 5074 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap, 5075 name[i], &esym)) 5076 return FALSE; 5077 } 5078 } 5079 5080 for (p = o->map_head.link_order; 5081 p != (struct bfd_link_order *) NULL; 5082 p = p->next) 5083 { 5084 asection *input_section; 5085 bfd *input_bfd; 5086 const struct ecoff_debug_swap *input_swap; 5087 struct ecoff_debug_info input_debug; 5088 char *eraw_src; 5089 char *eraw_end; 5090 5091 if (p->type != bfd_indirect_link_order) 5092 { 5093 if (p->type == bfd_data_link_order) 5094 continue; 5095 abort (); 5096 } 5097 5098 input_section = p->u.indirect.section; 5099 input_bfd = input_section->owner; 5100 5101 if (! is_alpha_elf (input_bfd)) 5102 /* I don't know what a non ALPHA ELF bfd would be 5103 doing with a .mdebug section, but I don't really 5104 want to deal with it. */ 5105 continue; 5106 5107 input_swap = (get_elf_backend_data (input_bfd) 5108 ->elf_backend_ecoff_debug_swap); 5109 5110 BFD_ASSERT (p->size == input_section->size); 5111 5112 /* The ECOFF linking code expects that we have already 5113 read in the debugging information and set up an 5114 ecoff_debug_info structure, so we do that now. */ 5115 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section, 5116 &input_debug)) 5117 return FALSE; 5118 5119 if (! (bfd_ecoff_debug_accumulate 5120 (mdebug_handle, abfd, &debug, swap, input_bfd, 5121 &input_debug, input_swap, info))) 5122 return FALSE; 5123 5124 /* Loop through the external symbols. For each one with 5125 interesting information, try to find the symbol in 5126 the linker global hash table and save the information 5127 for the output external symbols. */ 5128 eraw_src = input_debug.external_ext; 5129 eraw_end = (eraw_src 5130 + (input_debug.symbolic_header.iextMax 5131 * input_swap->external_ext_size)); 5132 for (; 5133 eraw_src < eraw_end; 5134 eraw_src += input_swap->external_ext_size) 5135 { 5136 EXTR ext; 5137 const char *name; 5138 struct alpha_elf_link_hash_entry *h; 5139 5140 (*input_swap->swap_ext_in) (input_bfd, (PTR) eraw_src, &ext); 5141 if (ext.asym.sc == scNil 5142 || ext.asym.sc == scUndefined 5143 || ext.asym.sc == scSUndefined) 5144 continue; 5145 5146 name = input_debug.ssext + ext.asym.iss; 5147 h = alpha_elf_link_hash_lookup (alpha_elf_hash_table (info), 5148 name, FALSE, FALSE, TRUE); 5149 if (h == NULL || h->esym.ifd != -2) 5150 continue; 5151 5152 if (ext.ifd != -1) 5153 { 5154 BFD_ASSERT (ext.ifd 5155 < input_debug.symbolic_header.ifdMax); 5156 ext.ifd = input_debug.ifdmap[ext.ifd]; 5157 } 5158 5159 h->esym = ext; 5160 } 5161 5162 /* Free up the information we just read. */ 5163 free (input_debug.line); 5164 free (input_debug.external_dnr); 5165 free (input_debug.external_pdr); 5166 free (input_debug.external_sym); 5167 free (input_debug.external_opt); 5168 free (input_debug.external_aux); 5169 free (input_debug.ss); 5170 free (input_debug.ssext); 5171 free (input_debug.external_fdr); 5172 free (input_debug.external_rfd); 5173 free (input_debug.external_ext); 5174 5175 /* Hack: reset the SEC_HAS_CONTENTS flag so that 5176 elf_link_input_bfd ignores this section. */ 5177 input_section->flags &=~ SEC_HAS_CONTENTS; 5178 } 5179 5180 /* Build the external symbol information. */ 5181 einfo.abfd = abfd; 5182 einfo.info = info; 5183 einfo.debug = &debug; 5184 einfo.swap = swap; 5185 einfo.failed = FALSE; 5186 elf_link_hash_traverse (elf_hash_table (info), 5187 elf64_alpha_output_extsym, 5188 (PTR) &einfo); 5189 if (einfo.failed) 5190 return FALSE; 5191 5192 /* Set the size of the .mdebug section. */ 5193 o->size = bfd_ecoff_debug_size (abfd, &debug, swap); 5194 5195 /* Skip this section later on (I don't think this currently 5196 matters, but someday it might). */ 5197 o->map_head.link_order = (struct bfd_link_order *) NULL; 5198 5199 mdebug_sec = o; 5200 } 5201 } 5202 5203 /* Invoke the regular ELF backend linker to do all the work. */ 5204 if (! bfd_elf_final_link (abfd, info)) 5205 return FALSE; 5206 5207 /* Now write out the computed sections. */ 5208 5209 /* The .got subsections... */ 5210 { 5211 bfd *i, *dynobj = elf_hash_table(info)->dynobj; 5212 for (i = alpha_elf_hash_table(info)->got_list; 5213 i != NULL; 5214 i = alpha_elf_tdata(i)->got_link_next) 5215 { 5216 asection *sgot; 5217 5218 /* elf_bfd_final_link already did everything in dynobj. */ 5219 if (i == dynobj) 5220 continue; 5221 5222 sgot = alpha_elf_tdata(i)->got; 5223 if (! bfd_set_section_contents (abfd, sgot->output_section, 5224 sgot->contents, 5225 (file_ptr) sgot->output_offset, 5226 sgot->size)) 5227 return FALSE; 5228 } 5229 } 5230 5231 if (mdebug_sec != (asection *) NULL) 5232 { 5233 BFD_ASSERT (abfd->output_has_begun); 5234 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug, 5235 swap, info, 5236 mdebug_sec->filepos)) 5237 return FALSE; 5238 5239 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info); 5240 } 5241 5242 return TRUE; 5243 } 5244 5245 static enum elf_reloc_type_class 5246 elf64_alpha_reloc_type_class (const Elf_Internal_Rela *rela) 5247 { 5248 switch ((int) ELF64_R_TYPE (rela->r_info)) 5249 { 5250 case R_ALPHA_RELATIVE: 5251 return reloc_class_relative; 5252 case R_ALPHA_JMP_SLOT: 5253 return reloc_class_plt; 5254 case R_ALPHA_COPY: 5255 return reloc_class_copy; 5256 default: 5257 return reloc_class_normal; 5258 } 5259 } 5260 5261 static const struct bfd_elf_special_section elf64_alpha_special_sections[] = 5262 { 5263 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL }, 5264 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL }, 5265 { NULL, 0, 0, 0, 0 } 5266 }; 5267 5268 /* ECOFF swapping routines. These are used when dealing with the 5269 .mdebug section, which is in the ECOFF debugging format. Copied 5270 from elf32-mips.c. */ 5271 static const struct ecoff_debug_swap 5272 elf64_alpha_ecoff_debug_swap = 5273 { 5274 /* Symbol table magic number. */ 5275 magicSym2, 5276 /* Alignment of debugging information. E.g., 4. */ 5277 8, 5278 /* Sizes of external symbolic information. */ 5279 sizeof (struct hdr_ext), 5280 sizeof (struct dnr_ext), 5281 sizeof (struct pdr_ext), 5282 sizeof (struct sym_ext), 5283 sizeof (struct opt_ext), 5284 sizeof (struct fdr_ext), 5285 sizeof (struct rfd_ext), 5286 sizeof (struct ext_ext), 5287 /* Functions to swap in external symbolic data. */ 5288 ecoff_swap_hdr_in, 5289 ecoff_swap_dnr_in, 5290 ecoff_swap_pdr_in, 5291 ecoff_swap_sym_in, 5292 ecoff_swap_opt_in, 5293 ecoff_swap_fdr_in, 5294 ecoff_swap_rfd_in, 5295 ecoff_swap_ext_in, 5296 _bfd_ecoff_swap_tir_in, 5297 _bfd_ecoff_swap_rndx_in, 5298 /* Functions to swap out external symbolic data. */ 5299 ecoff_swap_hdr_out, 5300 ecoff_swap_dnr_out, 5301 ecoff_swap_pdr_out, 5302 ecoff_swap_sym_out, 5303 ecoff_swap_opt_out, 5304 ecoff_swap_fdr_out, 5305 ecoff_swap_rfd_out, 5306 ecoff_swap_ext_out, 5307 _bfd_ecoff_swap_tir_out, 5308 _bfd_ecoff_swap_rndx_out, 5309 /* Function to read in symbolic data. */ 5310 elf64_alpha_read_ecoff_info 5311 }; 5312 5313 /* Use a non-standard hash bucket size of 8. */ 5314 5315 static const struct elf_size_info alpha_elf_size_info = 5316 { 5317 sizeof (Elf64_External_Ehdr), 5318 sizeof (Elf64_External_Phdr), 5319 sizeof (Elf64_External_Shdr), 5320 sizeof (Elf64_External_Rel), 5321 sizeof (Elf64_External_Rela), 5322 sizeof (Elf64_External_Sym), 5323 sizeof (Elf64_External_Dyn), 5324 sizeof (Elf_External_Note), 5325 8, 5326 1, 5327 64, 3, 5328 ELFCLASS64, EV_CURRENT, 5329 bfd_elf64_write_out_phdrs, 5330 bfd_elf64_write_shdrs_and_ehdr, 5331 bfd_elf64_checksum_contents, 5332 bfd_elf64_write_relocs, 5333 bfd_elf64_swap_symbol_in, 5334 bfd_elf64_swap_symbol_out, 5335 bfd_elf64_slurp_reloc_table, 5336 bfd_elf64_slurp_symbol_table, 5337 bfd_elf64_swap_dyn_in, 5338 bfd_elf64_swap_dyn_out, 5339 bfd_elf64_swap_reloc_in, 5340 bfd_elf64_swap_reloc_out, 5341 bfd_elf64_swap_reloca_in, 5342 bfd_elf64_swap_reloca_out 5343 }; 5344 5345 #define TARGET_LITTLE_SYM bfd_elf64_alpha_vec 5346 #define TARGET_LITTLE_NAME "elf64-alpha" 5347 #define ELF_ARCH bfd_arch_alpha 5348 #define ELF_MACHINE_CODE EM_ALPHA 5349 #define ELF_MAXPAGESIZE 0x10000 5350 #define ELF_COMMONPAGESIZE 0x2000 5351 5352 #define bfd_elf64_bfd_link_hash_table_create \ 5353 elf64_alpha_bfd_link_hash_table_create 5354 5355 #define bfd_elf64_bfd_reloc_type_lookup \ 5356 elf64_alpha_bfd_reloc_type_lookup 5357 #define bfd_elf64_bfd_reloc_name_lookup \ 5358 elf64_alpha_bfd_reloc_name_lookup 5359 #define elf_info_to_howto \ 5360 elf64_alpha_info_to_howto 5361 5362 #define bfd_elf64_mkobject \ 5363 elf64_alpha_mkobject 5364 #define elf_backend_object_p \ 5365 elf64_alpha_object_p 5366 5367 #define elf_backend_section_from_shdr \ 5368 elf64_alpha_section_from_shdr 5369 #define elf_backend_section_flags \ 5370 elf64_alpha_section_flags 5371 #define elf_backend_fake_sections \ 5372 elf64_alpha_fake_sections 5373 5374 #define bfd_elf64_bfd_is_local_label_name \ 5375 elf64_alpha_is_local_label_name 5376 #define bfd_elf64_find_nearest_line \ 5377 elf64_alpha_find_nearest_line 5378 #define bfd_elf64_bfd_relax_section \ 5379 elf64_alpha_relax_section 5380 5381 #define elf_backend_add_symbol_hook \ 5382 elf64_alpha_add_symbol_hook 5383 #define elf_backend_relocs_compatible \ 5384 _bfd_elf_relocs_compatible 5385 #define elf_backend_check_relocs \ 5386 elf64_alpha_check_relocs 5387 #define elf_backend_create_dynamic_sections \ 5388 elf64_alpha_create_dynamic_sections 5389 #define elf_backend_adjust_dynamic_symbol \ 5390 elf64_alpha_adjust_dynamic_symbol 5391 #define elf_backend_merge_symbol_attribute \ 5392 elf64_alpha_merge_symbol_attribute 5393 #define elf_backend_always_size_sections \ 5394 elf64_alpha_always_size_sections 5395 #define elf_backend_size_dynamic_sections \ 5396 elf64_alpha_size_dynamic_sections 5397 #define elf_backend_omit_section_dynsym \ 5398 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true) 5399 #define elf_backend_relocate_section \ 5400 elf64_alpha_relocate_section 5401 #define elf_backend_finish_dynamic_symbol \ 5402 elf64_alpha_finish_dynamic_symbol 5403 #define elf_backend_finish_dynamic_sections \ 5404 elf64_alpha_finish_dynamic_sections 5405 #define bfd_elf64_bfd_final_link \ 5406 elf64_alpha_final_link 5407 #define elf_backend_reloc_type_class \ 5408 elf64_alpha_reloc_type_class 5409 5410 #define elf_backend_ecoff_debug_swap \ 5411 &elf64_alpha_ecoff_debug_swap 5412 5413 #define elf_backend_size_info \ 5414 alpha_elf_size_info 5415 5416 #define elf_backend_special_sections \ 5417 elf64_alpha_special_sections 5418 5419 /* A few constants that determine how the .plt section is set up. */ 5420 #define elf_backend_want_got_plt 0 5421 #define elf_backend_plt_readonly 0 5422 #define elf_backend_want_plt_sym 1 5423 #define elf_backend_got_header_size 0 5424 5425 #include "elf64-target.h" 5426 5427 /* FreeBSD support. */ 5428 5429 #undef TARGET_LITTLE_SYM 5430 #define TARGET_LITTLE_SYM bfd_elf64_alpha_freebsd_vec 5431 #undef TARGET_LITTLE_NAME 5432 #define TARGET_LITTLE_NAME "elf64-alpha-freebsd" 5433 #undef ELF_OSABI 5434 #define ELF_OSABI ELFOSABI_FREEBSD 5435 5436 /* The kernel recognizes executables as valid only if they carry a 5437 "FreeBSD" label in the ELF header. So we put this label on all 5438 executables and (for simplicity) also all other object files. */ 5439 5440 static void 5441 elf64_alpha_fbsd_post_process_headers (bfd * abfd, 5442 struct bfd_link_info * link_info ATTRIBUTE_UNUSED) 5443 { 5444 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */ 5445 5446 i_ehdrp = elf_elfheader (abfd); 5447 5448 /* Put an ABI label supported by FreeBSD >= 4.1. */ 5449 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi; 5450 #ifdef OLD_FREEBSD_ABI_LABEL 5451 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */ 5452 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8); 5453 #endif 5454 } 5455 5456 #undef elf_backend_post_process_headers 5457 #define elf_backend_post_process_headers \ 5458 elf64_alpha_fbsd_post_process_headers 5459 5460 #undef elf64_bed 5461 #define elf64_bed elf64_alpha_fbsd_bed 5462 5463 #include "elf64-target.h" 5464