diff options
author | Jiong Wang <jiong.wang@arm.com> | 2017-06-07 12:05:39 +0100 |
---|---|---|
committer | Jiong Wang <jiong.wang@arm.com> | 2017-06-08 09:43:39 +0100 |
commit | bc327528fd2ccdc6c29ab6ae608085dddbad5cc8 (patch) | |
tree | 638acdde987efeeca8a92b0861f0767fc0ee69d1 /bfd | |
parent | 81b6fe3bf9f3be2b6b81d05d08ac58d2a6dcb760 (diff) | |
download | gdb-bc327528fd2ccdc6c29ab6ae608085dddbad5cc8.zip gdb-bc327528fd2ccdc6c29ab6ae608085dddbad5cc8.tar.gz gdb-bc327528fd2ccdc6c29ab6ae608085dddbad5cc8.tar.bz2 |
[AArch64] Allow COPY relocation elimination
As discussed at the PR, this patch tries to avoid COPY relocation generation
and propagate the original relocation into runtime if it was relocating on
writable section. The ELIMINATE_COPY_RELOCS has been set to true and it's
underlying infrastructure has been improved so that the COPY reloc elimination
at least working on absoluate relocations (ABS64) after this patch.
bfd/
PR ld/21532
* elfnn-aarch64.c (ELIMINATE_COPY_RELOCS): Set to 1.
(elfNN_aarch64_final_link_relocate): Also propagate relocations to
runtime for copy relocation elimination cases.
(alias_readonly_dynrelocs): New function.
(elfNN_aarch64_adjust_dynamic_symbol): Keep the dynamic relocs instead
of generating copy relocation if it is not against read-only sections.
(elfNN_aarch64_check_relocs): Likewise.
ld/
* testsuite/ld-aarch64/copy-reloc-eliminate.d: New test.
* testsuite/ld-aarch64/copy-reloc-exe-eliminate.s: New test source file.
* testsuite/ld-aarch64/aarch64-elf.exp: Run new testcase.
Diffstat (limited to 'bfd')
-rw-r--r-- | bfd/ChangeLog | 11 | ||||
-rw-r--r-- | bfd/elfnn-aarch64.c | 70 |
2 files changed, 73 insertions, 8 deletions
diff --git a/bfd/ChangeLog b/bfd/ChangeLog index b828633..a14ff72 100644 --- a/bfd/ChangeLog +++ b/bfd/ChangeLog @@ -1,3 +1,14 @@ +2017-06-08 Jiong Wang <jiong.wang@arm.com> + + PR ld/21532 + * elfnn-aarch64.c (ELIMINATE_COPY_RELOCS): Set to 1. + (elfNN_aarch64_final_link_relocate): Also propagate relocations to + runtime for copy relocation elimination cases. + (alias_readonly_dynrelocs): New function. + (elfNN_aarch64_adjust_dynamic_symbol): Keep the dynamic relocs instead + of generating copy relocation if it is not against read-only sections. + (elfNN_aarch64_check_relocs): Likewise. + 2017-06-06 Jose E. Marchesi <jose.marchesi@oracle.com> * elf.c (setup_group): Make sure BFD sections are created for all diff --git a/bfd/elfnn-aarch64.c b/bfd/elfnn-aarch64.c index 1edf2a0..542c98a 100644 --- a/bfd/elfnn-aarch64.c +++ b/bfd/elfnn-aarch64.c @@ -249,7 +249,7 @@ || (R_TYPE) == BFD_RELOC_AARCH64_TLSDESC_OFF_G0_NC \ || (R_TYPE) == BFD_RELOC_AARCH64_TLSDESC_OFF_G1) -#define ELIMINATE_COPY_RELOCS 0 +#define ELIMINATE_COPY_RELOCS 1 /* Return size of a relocation entry. HTAB is the bfd's elf_aarch64_link_hash_entry. */ @@ -5169,12 +5169,25 @@ elfNN_aarch64_final_link_relocate (reloc_howto_type *howto, /* When generating a shared object or relocatable executable, these relocations are copied into the output file to be resolved at run time. */ - if ((bfd_link_pic (info) - || globals->root.is_relocatable_executable) - && (input_section->flags & SEC_ALLOC) - && (h == NULL - || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT - || h->root.type != bfd_link_hash_undefweak)) + if (((bfd_link_pic (info) + || globals->root.is_relocatable_executable) + && (input_section->flags & SEC_ALLOC) + && (h == NULL + || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT + || h->root.type != bfd_link_hash_undefweak)) + /* Or we are creating an executable, we may need to keep relocations + for symbols satisfied by a dynamic library if we manage to avoid + copy relocs for the symbol. */ + || (ELIMINATE_COPY_RELOCS + && !bfd_link_pic (info) + && h != NULL + && (input_section->flags & SEC_ALLOC) + && h->dynindx != -1 + && !h->non_got_ref + && ((h->def_dynamic + && !h->def_regular) + || h->root.type == bfd_link_hash_undefweak + || h->root.type == bfd_link_hash_undefined))) { Elf_Internal_Rela outrel; bfd_byte *loc; @@ -6869,6 +6882,25 @@ elfNN_aarch64_gc_sweep_hook (bfd *abfd, return TRUE; } +/* Return true if we have dynamic relocs against EH or any of its weak + aliases, that apply to read-only sections. */ + +static bfd_boolean +alias_readonly_dynrelocs (struct elf_aarch64_link_hash_entry *eh) +{ + struct elf_dyn_relocs *p; + asection *s; + + for (p = eh->dyn_relocs; p != NULL; p = p->next) + { + s = p->sec->output_section; + if (s != NULL && (s->flags & SEC_READONLY) != 0) + return TRUE; + } + + return FALSE; +} + /* Adjust a symbol defined by a dynamic object and referenced by a regular object. The current definition is in some section of the dynamic object, but we're not including those sections. We have to @@ -6942,6 +6974,19 @@ elfNN_aarch64_adjust_dynamic_symbol (struct bfd_link_info *info, return TRUE; } + if (ELIMINATE_COPY_RELOCS) + { + struct elf_aarch64_link_hash_entry *eh; + /* If we didn't find any dynamic relocs in read-only sections, then + we'll be keeping the dynamic relocs and avoiding the copy reloc. */ + eh = (struct elf_aarch64_link_hash_entry *) h; + if (eh->dyn_relocs && !alias_readonly_dynrelocs (eh)) + { + h->non_got_ref = 0; + return TRUE; + } + } + /* We must allocate the symbol in our .dynbss section, which will become part of the .bss section of the executable. There will be an entry for this symbol in the .dynsym section. The dynamic @@ -7214,7 +7259,16 @@ elfNN_aarch64_check_relocs (bfd *abfd, struct bfd_link_info *info, /* No need to do anything if we're not creating a shared object. */ - if (! bfd_link_pic (info)) + if (!(bfd_link_pic (info) + /* If on the other hand, we are creating an executable, we + may need to keep relocations for symbols satisfied by a + dynamic library if we manage to avoid copy relocs for the + symbol. */ + || (ELIMINATE_COPY_RELOCS + && !bfd_link_pic (info) + && h != NULL + && (h->root.type == bfd_link_hash_defweak + || !h->def_regular)))) break; { |