Fix compile time warnings from a GCC 4.0 compiler
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
77cfaee6 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005
7898deda 3 Free Software Foundation, Inc.
252b5132
RH
4 Contributed by Richard Henderson <rth@tamu.edu>.
5
571fe01f 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
571fe01f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
571fe01f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
571fe01f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132
RH
21
22/* We need a published ABI spec for this. Until one comes out, don't
23 assume this'll remain unchanged forever. */
24
25#include "bfd.h"
26#include "sysdep.h"
27#include "libbfd.h"
28#include "elf-bfd.h"
29
30#include "elf/alpha.h"
31
32#define ALPHAECOFF
33
34#define NO_COFF_RELOCS
35#define NO_COFF_SYMBOLS
36#define NO_COFF_LINENOS
37
fe8bc63d 38/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
39#include "coff/internal.h"
40#include "coff/sym.h"
41#include "coff/symconst.h"
42#include "coff/ecoff.h"
43#include "coff/alpha.h"
44#include "aout/ar.h"
45#include "libcoff.h"
46#include "libecoff.h"
47#define ECOFF_64
48#include "ecoffswap.h"
49
6ec7057a
RH
50\f
51/* Instruction data for plt generation and relaxation. */
52
53#define OP_LDA 0x08
54#define OP_LDAH 0x09
55#define OP_LDQ 0x29
56#define OP_BR 0x30
57#define OP_BSR 0x34
58
59#define INSN_LDA (OP_LDA << 26)
60#define INSN_LDAH (OP_LDAH << 26)
61#define INSN_LDQ (OP_LDQ << 26)
62#define INSN_BR (OP_BR << 26)
63
64#define INSN_ADDQ 0x40000400
65#define INSN_RDUNIQ 0x0000009e
66#define INSN_SUBQ 0x40000520
67#define INSN_S4SUBQ 0x40000560
68#define INSN_UNOP 0x2ffe0000
69
70#define INSN_JSR 0x68004000
71#define INSN_JMP 0x68000000
72#define INSN_JSR_MASK 0xfc00c000
73
74#define INSN_A(I,A) (I | (A << 21))
75#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
76#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
77#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
78#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
79
80/* PLT/GOT Stuff */
81
82/* Set by ld emulation. Putting this into the link_info or hash structure
83 is simply working too hard. */
84#ifdef USE_SECUREPLT
85bfd_boolean elf64_alpha_use_secureplt = TRUE;
86#else
87bfd_boolean elf64_alpha_use_secureplt = FALSE;
88#endif
89
90#define OLD_PLT_HEADER_SIZE 32
91#define OLD_PLT_ENTRY_SIZE 12
92#define NEW_PLT_HEADER_SIZE 36
93#define NEW_PLT_ENTRY_SIZE 4
94
95#define PLT_HEADER_SIZE \
96 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
97#define PLT_ENTRY_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
99
100#define MAX_GOT_SIZE (64*1024)
101
102#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132
RH
103\f
104struct alpha_elf_link_hash_entry
105{
106 struct elf_link_hash_entry root;
107
108 /* External symbol information. */
109 EXTR esym;
110
111 /* Cumulative flags for all the .got entries. */
112 int flags;
113
9e756d64 114 /* Contexts in which a literal was referenced. */
8288a39e
RH
115#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
116#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
117#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
118#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
119#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
120#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
121#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
122#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
123#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 124
252b5132
RH
125 /* Used to implement multiple .got subsections. */
126 struct alpha_elf_got_entry
127 {
128 struct alpha_elf_got_entry *next;
129
571fe01f 130 /* Which .got subsection? */
252b5132
RH
131 bfd *gotobj;
132
571fe01f 133 /* The addend in effect for this entry. */
dc810e39 134 bfd_vma addend;
252b5132 135
571fe01f 136 /* The .got offset for this entry. */
252b5132
RH
137 int got_offset;
138
6ec7057a
RH
139 /* The .plt offset for this entry. */
140 int plt_offset;
141
3765b1be
RH
142 /* How many references to this entry? */
143 int use_count;
252b5132 144
3765b1be
RH
145 /* The relocation type of this entry. */
146 unsigned char reloc_type;
252b5132 147
3765b1be
RH
148 /* How a LITERAL is used. */
149 unsigned char flags;
150
151 /* Have we initialized the dynamic relocation for this entry? */
152 unsigned char reloc_done;
153
154 /* Have we adjusted this entry for SEC_MERGE? */
155 unsigned char reloc_xlated;
252b5132
RH
156 } *got_entries;
157
571fe01f 158 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132
RH
159 of relocation sections. */
160 struct alpha_elf_reloc_entry
161 {
162 struct alpha_elf_reloc_entry *next;
163
571fe01f 164 /* Which .reloc section? */
252b5132
RH
165 asection *srel;
166
571fe01f 167 /* What kind of relocation? */
fcfbdf31
JJ
168 unsigned int rtype;
169
571fe01f 170 /* Is this against read-only section? */
fcfbdf31 171 unsigned int reltext : 1;
252b5132 172
571fe01f 173 /* How many did we find? */
252b5132
RH
174 unsigned long count;
175 } *reloc_entries;
176};
177
178/* Alpha ELF linker hash table. */
179
180struct alpha_elf_link_hash_table
181{
182 struct elf_link_hash_table root;
183
184 /* The head of a list of .got subsections linked through
185 alpha_elf_tdata(abfd)->got_link_next. */
186 bfd *got_list;
187};
188
189/* Look up an entry in a Alpha ELF linker hash table. */
190
191#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
192 ((struct alpha_elf_link_hash_entry *) \
193 elf_link_hash_lookup (&(table)->root, (string), (create), \
194 (copy), (follow)))
195
196/* Traverse a Alpha ELF linker hash table. */
197
198#define alpha_elf_link_hash_traverse(table, func, info) \
199 (elf_link_hash_traverse \
200 (&(table)->root, \
a7519a3c 201 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
252b5132
RH
202 (info)))
203
204/* Get the Alpha ELF linker hash table from a link_info structure. */
205
206#define alpha_elf_hash_table(p) \
207 ((struct alpha_elf_link_hash_table *) ((p)->hash))
208
209/* Get the object's symbols as our own entry type. */
210
211#define alpha_elf_sym_hashes(abfd) \
212 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
213
986a241f
RH
214/* Should we do dynamic things to this symbol? This differs from the
215 generic version in that we never need to consider function pointer
216 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
217 address is ever taken. */
252b5132 218
986a241f 219static inline bfd_boolean
a7519a3c
RH
220alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
221 struct bfd_link_info *info)
8fb35fed 222{
986a241f 223 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 224}
252b5132
RH
225
226/* Create an entry in a Alpha ELF linker hash table. */
227
228static struct bfd_hash_entry *
a7519a3c
RH
229elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
230 struct bfd_hash_table *table,
231 const char *string)
252b5132
RH
232{
233 struct alpha_elf_link_hash_entry *ret =
234 (struct alpha_elf_link_hash_entry *) entry;
235
236 /* Allocate the structure if it has not already been allocated by a
237 subclass. */
238 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
239 ret = ((struct alpha_elf_link_hash_entry *)
240 bfd_hash_allocate (table,
241 sizeof (struct alpha_elf_link_hash_entry)));
242 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
243 return (struct bfd_hash_entry *) ret;
244
245 /* Call the allocation method of the superclass. */
246 ret = ((struct alpha_elf_link_hash_entry *)
247 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
248 table, string));
249 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
250 {
251 /* Set local fields. */
252 memset (&ret->esym, 0, sizeof (EXTR));
253 /* We use -2 as a marker to indicate that the information has
254 not been set. -1 means there is no associated ifd. */
255 ret->esym.ifd = -2;
256 ret->flags = 0;
257 ret->got_entries = NULL;
258 ret->reloc_entries = NULL;
259 }
260
261 return (struct bfd_hash_entry *) ret;
262}
263
264/* Create a Alpha ELF linker hash table. */
265
266static struct bfd_link_hash_table *
a7519a3c 267elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
268{
269 struct alpha_elf_link_hash_table *ret;
dc810e39 270 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 271
e2d34d7d 272 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
273 if (ret == (struct alpha_elf_link_hash_table *) NULL)
274 return NULL;
275
276 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
277 elf64_alpha_link_hash_newfunc))
278 {
e2d34d7d 279 free (ret);
252b5132
RH
280 return NULL;
281 }
282
283 return &ret->root.root;
284}
285\f
286/* We have some private fields hanging off of the elf_tdata structure. */
287
288struct alpha_elf_obj_tdata
289{
290 struct elf_obj_tdata root;
291
292 /* For every input file, these are the got entries for that object's
293 local symbols. */
294 struct alpha_elf_got_entry ** local_got_entries;
295
296 /* For every input file, this is the object that owns the got that
297 this input file uses. */
298 bfd *gotobj;
299
300 /* For every got, this is a linked list through the objects using this got */
301 bfd *in_got_link_next;
302
303 /* For every got, this is a link to the next got subsegment. */
304 bfd *got_link_next;
305
306 /* For every got, this is the section. */
307 asection *got;
308
3765b1be
RH
309 /* For every got, this is it's total number of words. */
310 int total_got_size;
252b5132 311
3765b1be 312 /* For every got, this is the sum of the number of words required
252b5132 313 to hold all of the member object's local got. */
3765b1be 314 int local_got_size;
252b5132
RH
315};
316
317#define alpha_elf_tdata(abfd) \
318 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
319
b34976b6 320static bfd_boolean
a7519a3c 321elf64_alpha_mkobject (bfd *abfd)
252b5132 322{
dc810e39
AM
323 bfd_size_type amt = sizeof (struct alpha_elf_obj_tdata);
324 abfd->tdata.any = bfd_zalloc (abfd, amt);
252b5132 325 if (abfd->tdata.any == NULL)
b34976b6
AM
326 return FALSE;
327 return TRUE;
252b5132
RH
328}
329
b34976b6 330static bfd_boolean
a7519a3c 331elf64_alpha_object_p (bfd *abfd)
252b5132 332{
252b5132
RH
333 /* Set the right machine number for an Alpha ELF file. */
334 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
335}
336\f
a7519a3c
RH
337/* A relocation function which doesn't do anything. */
338
339static bfd_reloc_status_type
340elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
341 asymbol *sym ATTRIBUTE_UNUSED,
342 PTR data ATTRIBUTE_UNUSED, asection *sec,
343 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
344{
345 if (output_bfd)
346 reloc->address += sec->output_offset;
347 return bfd_reloc_ok;
348}
349
350/* A relocation function used for an unsupported reloc. */
351
352static bfd_reloc_status_type
353elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
354 asymbol *sym ATTRIBUTE_UNUSED,
355 PTR data ATTRIBUTE_UNUSED, asection *sec,
356 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
357{
358 if (output_bfd)
359 reloc->address += sec->output_offset;
360 return bfd_reloc_notsupported;
361}
362
363/* Do the work of the GPDISP relocation. */
364
365static bfd_reloc_status_type
366elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
367 bfd_byte *p_lda)
368{
369 bfd_reloc_status_type ret = bfd_reloc_ok;
370 bfd_vma addend;
371 unsigned long i_ldah, i_lda;
372
373 i_ldah = bfd_get_32 (abfd, p_ldah);
374 i_lda = bfd_get_32 (abfd, p_lda);
375
376 /* Complain if the instructions are not correct. */
377 if (((i_ldah >> 26) & 0x3f) != 0x09
378 || ((i_lda >> 26) & 0x3f) != 0x08)
379 ret = bfd_reloc_dangerous;
380
381 /* Extract the user-supplied offset, mirroring the sign extensions
382 that the instructions perform. */
383 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
384 addend = (addend ^ 0x80008000) - 0x80008000;
385
386 gpdisp += addend;
387
388 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
389 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
390 ret = bfd_reloc_overflow;
391
392 /* compensate for the sign extension again. */
393 i_ldah = ((i_ldah & 0xffff0000)
394 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
395 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
396
397 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
398 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
399
400 return ret;
401}
402
403/* The special function for the GPDISP reloc. */
404
405static bfd_reloc_status_type
406elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
407 asymbol *sym ATTRIBUTE_UNUSED, PTR data,
408 asection *input_section, bfd *output_bfd,
409 char **err_msg)
410{
411 bfd_reloc_status_type ret;
412 bfd_vma gp, relocation;
413 bfd_vma high_address;
414 bfd_byte *p_ldah, *p_lda;
415
416 /* Don't do anything if we're not doing a final link. */
417 if (output_bfd)
418 {
419 reloc_entry->address += input_section->output_offset;
420 return bfd_reloc_ok;
421 }
422
423 high_address = bfd_get_section_limit (abfd, input_section);
424 if (reloc_entry->address > high_address
425 || reloc_entry->address + reloc_entry->addend > high_address)
426 return bfd_reloc_outofrange;
427
428 /* The gp used in the portion of the output object to which this
429 input object belongs is cached on the input bfd. */
430 gp = _bfd_get_gp_value (abfd);
431
432 relocation = (input_section->output_section->vma
433 + input_section->output_offset
434 + reloc_entry->address);
435
436 p_ldah = (bfd_byte *) data + reloc_entry->address;
437 p_lda = p_ldah + reloc_entry->addend;
438
439 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
440
441 /* Complain if the instructions are not correct. */
442 if (ret == bfd_reloc_dangerous)
443 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
444
445 return ret;
446}
447
252b5132
RH
448/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
449 from smaller values. Start with zero, widen, *then* decrement. */
450#define MINUS_ONE (((bfd_vma)0) - 1)
451
dfe57ca0
RH
452#define SKIP_HOWTO(N) \
453 HOWTO(N, 0, 0, 0, 0, 0, 0, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
454
252b5132
RH
455static reloc_howto_type elf64_alpha_howto_table[] =
456{
457 HOWTO (R_ALPHA_NONE, /* type */
458 0, /* rightshift */
459 0, /* size (0 = byte, 1 = short, 2 = long) */
460 8, /* bitsize */
b34976b6 461 TRUE, /* pc_relative */
252b5132
RH
462 0, /* bitpos */
463 complain_overflow_dont, /* complain_on_overflow */
464 elf64_alpha_reloc_nil, /* special_function */
465 "NONE", /* name */
b34976b6 466 FALSE, /* partial_inplace */
252b5132
RH
467 0, /* src_mask */
468 0, /* dst_mask */
b34976b6 469 TRUE), /* pcrel_offset */
252b5132
RH
470
471 /* A 32 bit reference to a symbol. */
472 HOWTO (R_ALPHA_REFLONG, /* type */
473 0, /* rightshift */
474 2, /* size (0 = byte, 1 = short, 2 = long) */
475 32, /* bitsize */
b34976b6 476 FALSE, /* pc_relative */
252b5132
RH
477 0, /* bitpos */
478 complain_overflow_bitfield, /* complain_on_overflow */
479 0, /* special_function */
480 "REFLONG", /* name */
b34976b6 481 FALSE, /* partial_inplace */
252b5132
RH
482 0xffffffff, /* src_mask */
483 0xffffffff, /* dst_mask */
b34976b6 484 FALSE), /* pcrel_offset */
252b5132
RH
485
486 /* A 64 bit reference to a symbol. */
487 HOWTO (R_ALPHA_REFQUAD, /* type */
488 0, /* rightshift */
489 4, /* size (0 = byte, 1 = short, 2 = long) */
490 64, /* bitsize */
b34976b6 491 FALSE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_bitfield, /* complain_on_overflow */
494 0, /* special_function */
495 "REFQUAD", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 MINUS_ONE, /* src_mask */
498 MINUS_ONE, /* dst_mask */
b34976b6 499 FALSE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit GP relative offset. This is just like REFLONG except
502 that when the value is used the value of the gp register will be
503 added in. */
504 HOWTO (R_ALPHA_GPREL32, /* type */
505 0, /* rightshift */
506 2, /* size (0 = byte, 1 = short, 2 = long) */
507 32, /* bitsize */
b34976b6 508 FALSE, /* pc_relative */
252b5132
RH
509 0, /* bitpos */
510 complain_overflow_bitfield, /* complain_on_overflow */
511 0, /* special_function */
512 "GPREL32", /* name */
b34976b6 513 FALSE, /* partial_inplace */
252b5132
RH
514 0xffffffff, /* src_mask */
515 0xffffffff, /* dst_mask */
b34976b6 516 FALSE), /* pcrel_offset */
252b5132
RH
517
518 /* Used for an instruction that refers to memory off the GP register. */
519 HOWTO (R_ALPHA_LITERAL, /* type */
520 0, /* rightshift */
dfe57ca0 521 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 522 16, /* bitsize */
b34976b6 523 FALSE, /* pc_relative */
252b5132
RH
524 0, /* bitpos */
525 complain_overflow_signed, /* complain_on_overflow */
526 0, /* special_function */
527 "ELF_LITERAL", /* name */
b34976b6 528 FALSE, /* partial_inplace */
252b5132
RH
529 0xffff, /* src_mask */
530 0xffff, /* dst_mask */
b34976b6 531 FALSE), /* pcrel_offset */
252b5132
RH
532
533 /* This reloc only appears immediately following an ELF_LITERAL reloc.
534 It identifies a use of the literal. The symbol index is special:
535 1 means the literal address is in the base register of a memory
536 format instruction; 2 means the literal address is in the byte
537 offset register of a byte-manipulation instruction; 3 means the
538 literal address is in the target register of a jsr instruction.
539 This does not actually do any relocation. */
540 HOWTO (R_ALPHA_LITUSE, /* type */
541 0, /* rightshift */
dfe57ca0 542 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 543 32, /* bitsize */
b34976b6 544 FALSE, /* pc_relative */
252b5132
RH
545 0, /* bitpos */
546 complain_overflow_dont, /* complain_on_overflow */
547 elf64_alpha_reloc_nil, /* special_function */
548 "LITUSE", /* name */
b34976b6 549 FALSE, /* partial_inplace */
252b5132
RH
550 0, /* src_mask */
551 0, /* dst_mask */
b34976b6 552 FALSE), /* pcrel_offset */
252b5132
RH
553
554 /* Load the gp register. This is always used for a ldah instruction
555 which loads the upper 16 bits of the gp register. The symbol
556 index of the GPDISP instruction is an offset in bytes to the lda
557 instruction that loads the lower 16 bits. The value to use for
558 the relocation is the difference between the GP value and the
559 current location; the load will always be done against a register
560 holding the current address.
561
562 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
563 any offset is present in the instructions, it is an offset from
564 the register to the ldah instruction. This lets us avoid any
565 stupid hackery like inventing a gp value to do partial relocation
566 against. Also unlike ECOFF, we do the whole relocation off of
567 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
568 space consuming bit, that, since all the information was present
569 in the GPDISP_HI16 reloc. */
570 HOWTO (R_ALPHA_GPDISP, /* type */
571 16, /* rightshift */
572 2, /* size (0 = byte, 1 = short, 2 = long) */
573 16, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_gpdisp, /* special_function */
578 "GPDISP", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0xffff, /* src_mask */
581 0xffff, /* dst_mask */
b34976b6 582 TRUE), /* pcrel_offset */
252b5132
RH
583
584 /* A 21 bit branch. */
585 HOWTO (R_ALPHA_BRADDR, /* type */
586 2, /* rightshift */
587 2, /* size (0 = byte, 1 = short, 2 = long) */
588 21, /* bitsize */
b34976b6 589 TRUE, /* pc_relative */
252b5132
RH
590 0, /* bitpos */
591 complain_overflow_signed, /* complain_on_overflow */
592 0, /* special_function */
593 "BRADDR", /* name */
b34976b6 594 FALSE, /* partial_inplace */
252b5132
RH
595 0x1fffff, /* src_mask */
596 0x1fffff, /* dst_mask */
b34976b6 597 TRUE), /* pcrel_offset */
252b5132
RH
598
599 /* A hint for a jump to a register. */
600 HOWTO (R_ALPHA_HINT, /* type */
601 2, /* rightshift */
dfe57ca0 602 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 603 14, /* bitsize */
b34976b6 604 TRUE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 0, /* special_function */
608 "HINT", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0x3fff, /* src_mask */
611 0x3fff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* 16 bit PC relative offset. */
615 HOWTO (R_ALPHA_SREL16, /* type */
616 0, /* rightshift */
617 1, /* size (0 = byte, 1 = short, 2 = long) */
618 16, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
622 0, /* special_function */
623 "SREL16", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0xffff, /* src_mask */
626 0xffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* 32 bit PC relative offset. */
630 HOWTO (R_ALPHA_SREL32, /* type */
631 0, /* rightshift */
632 2, /* size (0 = byte, 1 = short, 2 = long) */
633 32, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_signed, /* complain_on_overflow */
637 0, /* special_function */
638 "SREL32", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0xffffffff, /* src_mask */
641 0xffffffff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* A 64 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL64, /* type */
646 0, /* rightshift */
647 4, /* size (0 = byte, 1 = short, 2 = long) */
648 64, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
652 0, /* special_function */
653 "SREL64", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 MINUS_ONE, /* src_mask */
656 MINUS_ONE, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132 658
dfe57ca0
RH
659 /* Skip 12 - 16; deprecated ECOFF relocs. */
660 SKIP_HOWTO (12),
661 SKIP_HOWTO (13),
662 SKIP_HOWTO (14),
663 SKIP_HOWTO (15),
664 SKIP_HOWTO (16),
252b5132
RH
665
666 /* The high 16 bits of the displacement from GP to the target. */
667 HOWTO (R_ALPHA_GPRELHIGH,
668 0, /* rightshift */
dfe57ca0 669 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 670 16, /* bitsize */
b34976b6 671 FALSE, /* pc_relative */
252b5132
RH
672 0, /* bitpos */
673 complain_overflow_signed, /* complain_on_overflow */
dfe57ca0 674 0, /* special_function */
252b5132 675 "GPRELHIGH", /* name */
b34976b6 676 FALSE, /* partial_inplace */
252b5132
RH
677 0xffff, /* src_mask */
678 0xffff, /* dst_mask */
b34976b6 679 FALSE), /* pcrel_offset */
252b5132
RH
680
681 /* The low 16 bits of the displacement from GP to the target. */
682 HOWTO (R_ALPHA_GPRELLOW,
683 0, /* rightshift */
dfe57ca0 684 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 685 16, /* bitsize */
b34976b6 686 FALSE, /* pc_relative */
252b5132
RH
687 0, /* bitpos */
688 complain_overflow_dont, /* complain_on_overflow */
dfe57ca0 689 0, /* special_function */
252b5132 690 "GPRELLOW", /* name */
b34976b6 691 FALSE, /* partial_inplace */
252b5132
RH
692 0xffff, /* src_mask */
693 0xffff, /* dst_mask */
b34976b6 694 FALSE), /* pcrel_offset */
252b5132
RH
695
696 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 697 HOWTO (R_ALPHA_GPREL16,
252b5132 698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
704 0, /* special_function */
dfe57ca0 705 "GPREL16", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132 710
dfe57ca0
RH
711 /* Skip 20 - 23; deprecated ECOFF relocs. */
712 SKIP_HOWTO (20),
713 SKIP_HOWTO (21),
714 SKIP_HOWTO (22),
715 SKIP_HOWTO (23),
252b5132 716
fe8bc63d 717 /* Misc ELF relocations. */
252b5132
RH
718
719 /* A dynamic relocation to copy the target into our .dynbss section. */
720 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
721 is present because every other ELF has one, but should not be used
722 because .dynbss is an ugly thing. */
723 HOWTO (R_ALPHA_COPY,
724 0,
725 0,
726 0,
b34976b6 727 FALSE,
252b5132
RH
728 0,
729 complain_overflow_dont,
730 bfd_elf_generic_reloc,
731 "COPY",
b34976b6 732 FALSE,
252b5132
RH
733 0,
734 0,
b34976b6 735 TRUE),
252b5132
RH
736
737 /* A dynamic relocation for a .got entry. */
738 HOWTO (R_ALPHA_GLOB_DAT,
739 0,
740 0,
741 0,
b34976b6 742 FALSE,
252b5132
RH
743 0,
744 complain_overflow_dont,
745 bfd_elf_generic_reloc,
746 "GLOB_DAT",
b34976b6 747 FALSE,
252b5132
RH
748 0,
749 0,
b34976b6 750 TRUE),
252b5132
RH
751
752 /* A dynamic relocation for a .plt entry. */
753 HOWTO (R_ALPHA_JMP_SLOT,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "JMP_SLOT",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
768 HOWTO (R_ALPHA_RELATIVE,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "RELATIVE",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
7793f4d0
RH
781
782 /* A 21 bit branch that adjusts for gp loads. */
783 HOWTO (R_ALPHA_BRSGP, /* type */
784 2, /* rightshift */
785 2, /* size (0 = byte, 1 = short, 2 = long) */
786 21, /* bitsize */
b34976b6 787 TRUE, /* pc_relative */
7793f4d0
RH
788 0, /* bitpos */
789 complain_overflow_signed, /* complain_on_overflow */
790 0, /* special_function */
791 "BRSGP", /* name */
b34976b6 792 FALSE, /* partial_inplace */
7793f4d0
RH
793 0x1fffff, /* src_mask */
794 0x1fffff, /* dst_mask */
b34976b6 795 TRUE), /* pcrel_offset */
3765b1be
RH
796
797 /* Creates a tls_index for the symbol in the got. */
798 HOWTO (R_ALPHA_TLSGD, /* type */
799 0, /* rightshift */
800 1, /* size (0 = byte, 1 = short, 2 = long) */
801 16, /* bitsize */
b34976b6 802 FALSE, /* pc_relative */
3765b1be
RH
803 0, /* bitpos */
804 complain_overflow_signed, /* complain_on_overflow */
805 0, /* special_function */
806 "TLSGD", /* name */
b34976b6 807 FALSE, /* partial_inplace */
3765b1be
RH
808 0xffff, /* src_mask */
809 0xffff, /* dst_mask */
b34976b6 810 FALSE), /* pcrel_offset */
3765b1be
RH
811
812 /* Creates a tls_index for the (current) module in the got. */
813 HOWTO (R_ALPHA_TLSLDM, /* type */
814 0, /* rightshift */
815 1, /* size (0 = byte, 1 = short, 2 = long) */
816 16, /* bitsize */
b34976b6 817 FALSE, /* pc_relative */
3765b1be
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
820 0, /* special_function */
821 "TLSLDM", /* name */
b34976b6 822 FALSE, /* partial_inplace */
3765b1be
RH
823 0xffff, /* src_mask */
824 0xffff, /* dst_mask */
b34976b6 825 FALSE), /* pcrel_offset */
3765b1be
RH
826
827 /* A dynamic relocation for a DTP module entry. */
828 HOWTO (R_ALPHA_DTPMOD64, /* type */
829 0, /* rightshift */
830 4, /* size (0 = byte, 1 = short, 2 = long) */
831 64, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_bitfield, /* complain_on_overflow */
835 0, /* special_function */
836 "DTPMOD64", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 MINUS_ONE, /* src_mask */
839 MINUS_ONE, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a 64-bit offset in the got for the displacement
843 from DTP to the target. */
844 HOWTO (R_ALPHA_GOTDTPREL, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
851 0, /* special_function */
852 "GOTDTPREL", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a displacement from DTP to the target. */
859 HOWTO (R_ALPHA_DTPREL64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
866 0, /* special_function */
867 "DTPREL64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* The high 16 bits of the displacement from DTP to the target. */
874 HOWTO (R_ALPHA_DTPRELHI, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
881 0, /* special_function */
882 "DTPRELHI", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* The low 16 bits of the displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPRELLO, /* type */
890 0, /* rightshift */
891 1, /* size (0 = byte, 1 = short, 2 = long) */
892 16, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_dont, /* complain_on_overflow */
896 0, /* special_function */
897 "DTPRELLO", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 0xffff, /* src_mask */
900 0xffff, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* A 16-bit displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPREL16, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
911 0, /* special_function */
912 "DTPREL16", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* Creates a 64-bit offset in the got for the displacement
919 from TP to the target. */
920 HOWTO (R_ALPHA_GOTTPREL, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_signed, /* complain_on_overflow */
927 0, /* special_function */
928 "GOTTPREL", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A dynamic relocation for a displacement from TP to the target. */
935 HOWTO (R_ALPHA_TPREL64, /* type */
936 0, /* rightshift */
937 4, /* size (0 = byte, 1 = short, 2 = long) */
938 64, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_bitfield, /* complain_on_overflow */
942 0, /* special_function */
943 "TPREL64", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 MINUS_ONE, /* src_mask */
946 MINUS_ONE, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* The high 16 bits of the displacement from TP to the target. */
950 HOWTO (R_ALPHA_TPRELHI, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
957 0, /* special_function */
958 "TPRELHI", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* The low 16 bits of the displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPRELLO, /* type */
966 0, /* rightshift */
967 1, /* size (0 = byte, 1 = short, 2 = long) */
968 16, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_dont, /* complain_on_overflow */
972 0, /* special_function */
973 "TPRELLO", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 0xffff, /* src_mask */
976 0xffff, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* A 16-bit displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPREL16, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
987 0, /* special_function */
988 "TPREL16", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
252b5132
RH
993};
994
252b5132
RH
995/* A mapping from BFD reloc types to Alpha ELF reloc types. */
996
997struct elf_reloc_map
998{
999 bfd_reloc_code_real_type bfd_reloc_val;
1000 int elf_reloc_val;
1001};
1002
1003static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1004{
dfe57ca0
RH
1005 {BFD_RELOC_NONE, R_ALPHA_NONE},
1006 {BFD_RELOC_32, R_ALPHA_REFLONG},
1007 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1008 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1009 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1010 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1011 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1012 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1013 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1014 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1015 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1016 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1017 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1018 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1019 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1020 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1021 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1022 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1023 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1024 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1025 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1026 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1027 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1028 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1029 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1030 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1031 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1032 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1033 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1034 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1035};
1036
1037/* Given a BFD reloc type, return a HOWTO structure. */
1038
1039static reloc_howto_type *
a7519a3c
RH
1040elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1041 bfd_reloc_code_real_type code)
252b5132
RH
1042{
1043 const struct elf_reloc_map *i, *e;
1044 i = e = elf64_alpha_reloc_map;
1045 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1046 for (; i != e; ++i)
1047 {
1048 if (i->bfd_reloc_val == code)
1049 return &elf64_alpha_howto_table[i->elf_reloc_val];
1050 }
1051 return 0;
1052}
1053
1054/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1055
1056static void
a7519a3c
RH
1057elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1058 Elf_Internal_Rela *dst)
252b5132 1059{
a7519a3c 1060 unsigned r_type = ELF64_R_TYPE(dst->r_info);
252b5132
RH
1061 BFD_ASSERT (r_type < (unsigned int) R_ALPHA_max);
1062 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1063}
3765b1be
RH
1064
1065/* These two relocations create a two-word entry in the got. */
1066#define alpha_got_entry_size(r_type) \
1067 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1068
1069/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1070#define alpha_get_dtprel_base(info) \
1071 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1072
1073/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1074 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1075#define alpha_get_tprel_base(info) \
1076 (elf_hash_table (info)->tls_sec->vma \
1077 - align_power ((bfd_vma) 16, \
1078 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1079\f
a7519a3c
RH
1080/* Handle an Alpha specific section when reading an object file. This
1081 is called when bfd_section_from_shdr finds a section with an unknown
1082 type.
1083 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1084 how to. */
252b5132 1085
a7519a3c
RH
1086static bfd_boolean
1087elf64_alpha_section_from_shdr (bfd *abfd,
1088 Elf_Internal_Shdr *hdr,
1089 const char *name,
1090 int shindex)
252b5132 1091{
a7519a3c
RH
1092 asection *newsect;
1093
1094 /* There ought to be a place to keep ELF backend specific flags, but
1095 at the moment there isn't one. We just keep track of the
1096 sections by their name, instead. Fortunately, the ABI gives
1097 suggested names for all the MIPS specific sections, so we will
1098 probably get away with this. */
1099 switch (hdr->sh_type)
1100 {
1101 case SHT_ALPHA_DEBUG:
1102 if (strcmp (name, ".mdebug") != 0)
1103 return FALSE;
1104 break;
1105 default:
1106 return FALSE;
1107 }
252b5132 1108
a7519a3c
RH
1109 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1110 return FALSE;
1111 newsect = hdr->bfd_section;
252b5132 1112
a7519a3c 1113 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1114 {
a7519a3c
RH
1115 if (! bfd_set_section_flags (abfd, newsect,
1116 (bfd_get_section_flags (abfd, newsect)
1117 | SEC_DEBUGGING)))
1118 return FALSE;
252b5132 1119 }
a7519a3c
RH
1120
1121 return TRUE;
252b5132
RH
1122}
1123
a7519a3c
RH
1124/* Convert Alpha specific section flags to bfd internal section flags. */
1125
b34976b6 1126static bfd_boolean
a7519a3c 1127elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1128{
a7519a3c
RH
1129 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1130 *flags |= SEC_SMALL_DATA;
252b5132 1131
a7519a3c
RH
1132 return TRUE;
1133}
252b5132 1134
a7519a3c
RH
1135/* Set the correct type for an Alpha ELF section. We do this by the
1136 section name, which is a hack, but ought to work. */
9e756d64 1137
a7519a3c
RH
1138static bfd_boolean
1139elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1140{
1141 register const char *name;
1142
1143 name = bfd_get_section_name (abfd, sec);
1144
1145 if (strcmp (name, ".mdebug") == 0)
252b5132 1146 {
a7519a3c
RH
1147 hdr->sh_type = SHT_ALPHA_DEBUG;
1148 /* In a shared object on Irix 5.3, the .mdebug section has an
1149 entsize of 0. FIXME: Does this matter? */
1150 if ((abfd->flags & DYNAMIC) != 0 )
1151 hdr->sh_entsize = 0;
1152 else
1153 hdr->sh_entsize = 1;
252b5132 1154 }
a7519a3c
RH
1155 else if ((sec->flags & SEC_SMALL_DATA)
1156 || strcmp (name, ".sdata") == 0
1157 || strcmp (name, ".sbss") == 0
1158 || strcmp (name, ".lit4") == 0
1159 || strcmp (name, ".lit8") == 0)
1160 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1161
a7519a3c
RH
1162 return TRUE;
1163}
252b5132 1164
a7519a3c
RH
1165/* Hook called by the linker routine which adds symbols from an object
1166 file. We use it to put .comm items in .sbss, and not .bss. */
1167
1168static bfd_boolean
1169elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1170 Elf_Internal_Sym *sym,
1171 const char **namep ATTRIBUTE_UNUSED,
1172 flagword *flagsp ATTRIBUTE_UNUSED,
1173 asection **secp, bfd_vma *valp)
1174{
1175 if (sym->st_shndx == SHN_COMMON
1176 && !info->relocatable
1177 && sym->st_size <= elf_gp_size (abfd))
252b5132 1178 {
a7519a3c
RH
1179 /* Common symbols less than or equal to -G nn bytes are
1180 automatically put into .sbss. */
ffcb7aff 1181
a7519a3c 1182 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1183
a7519a3c 1184 if (scomm == NULL)
252b5132 1185 {
a7519a3c
RH
1186 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1187 (SEC_ALLOC
1188 | SEC_IS_COMMON
1189 | SEC_LINKER_CREATED));
1190 if (scomm == NULL)
1191 return FALSE;
1192 }
ffcb7aff 1193
a7519a3c
RH
1194 *secp = scomm;
1195 *valp = sym->st_size;
1196 }
ffcb7aff 1197
a7519a3c
RH
1198 return TRUE;
1199}
252b5132 1200
a7519a3c 1201/* Create the .got section. */
252b5132 1202
a7519a3c
RH
1203static bfd_boolean
1204elf64_alpha_create_got_section (bfd *abfd,
1205 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1206{
85d162e6 1207 flagword flags;
a7519a3c 1208 asection *s;
252b5132 1209
85d162e6
AM
1210 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1211 | SEC_LINKER_CREATED);
1212 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1213 if (s == NULL
1214 || !bfd_set_section_alignment (abfd, s, 3))
1215 return FALSE;
252b5132 1216
a7519a3c 1217 alpha_elf_tdata (abfd)->got = s;
252b5132 1218
85d162e6
AM
1219 /* Make sure the object's gotobj is set to itself so that we default
1220 to every object with its own .got. We'll merge .gots later once
1221 we've collected each object's info. */
1222 alpha_elf_tdata (abfd)->gotobj = abfd;
1223
a7519a3c
RH
1224 return TRUE;
1225}
252b5132 1226
a7519a3c 1227/* Create all the dynamic sections. */
252b5132 1228
a7519a3c
RH
1229static bfd_boolean
1230elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1231{
1232 asection *s;
85d162e6 1233 flagword flags;
a7519a3c
RH
1234 struct elf_link_hash_entry *h;
1235 struct bfd_link_hash_entry *bh;
252b5132 1236
a7519a3c 1237 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1238
85d162e6
AM
1239 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1240 | SEC_LINKER_CREATED
1241 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1242 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
6ec7057a 1243 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1244 return FALSE;
252b5132 1245
a7519a3c
RH
1246 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1247 .plt section. */
1248 bh = NULL;
1249 if (! (_bfd_generic_link_add_one_symbol
1250 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
1251 (bfd_vma) 0, (const char *) NULL, FALSE,
1252 get_elf_backend_data (abfd)->collect, &bh)))
1253 return FALSE;
1254 h = (struct elf_link_hash_entry *) bh;
1255 h->def_regular = 1;
1256 h->type = STT_OBJECT;
d6ad34f6 1257
6ec7057a 1258 if (info->shared && ! bfd_elf_link_record_dynamic_symbol (info, h))
a7519a3c 1259 return FALSE;
d6ad34f6 1260
85d162e6
AM
1261 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1262 | SEC_LINKER_CREATED | SEC_READONLY);
1263 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
6ec7057a 1264 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1265 return FALSE;
252b5132 1266
6ec7057a
RH
1267 if (elf64_alpha_use_secureplt)
1268 {
85d162e6
AM
1269 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1270 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
6ec7057a
RH
1271 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1272 return FALSE;
1273 }
1274
a7519a3c
RH
1275 /* We may or may not have created a .got section for this object, but
1276 we definitely havn't done the rest of the work. */
1cd6895c 1277
85d162e6
AM
1278 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1279 {
1280 if (!elf64_alpha_create_got_section (abfd, info))
1281 return FALSE;
1282 }
1cd6895c 1283
85d162e6
AM
1284 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1285 | SEC_LINKER_CREATED | SEC_READONLY);
1286 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
a7519a3c
RH
1287 if (s == NULL
1288 || !bfd_set_section_alignment (abfd, s, 3))
1289 return FALSE;
252b5132 1290
a7519a3c
RH
1291 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1292 dynobj's .got section. We don't do this in the linker script
1293 because we don't want to define the symbol if we are not creating
1294 a global offset table. */
1295 bh = NULL;
1296 if (!(_bfd_generic_link_add_one_symbol
1297 (info, abfd, "_GLOBAL_OFFSET_TABLE_", BSF_GLOBAL,
1298 alpha_elf_tdata(abfd)->got, (bfd_vma) 0, (const char *) NULL,
1299 FALSE, get_elf_backend_data (abfd)->collect, &bh)))
1300 return FALSE;
1301 h = (struct elf_link_hash_entry *) bh;
1302 h->def_regular = 1;
1303 h->type = STT_OBJECT;
252b5132 1304
a7519a3c
RH
1305 if (info->shared
1306 && ! bfd_elf_link_record_dynamic_symbol (info, h))
1307 return FALSE;
252b5132 1308
a7519a3c 1309 elf_hash_table (info)->hgot = h;
252b5132 1310
a7519a3c 1311 return TRUE;
252b5132 1312}
a7519a3c
RH
1313\f
1314/* Read ECOFF debugging information from a .mdebug section into a
1315 ecoff_debug_info structure. */
252b5132 1316
a7519a3c
RH
1317static bfd_boolean
1318elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1319 struct ecoff_debug_info *debug)
252b5132 1320{
a7519a3c
RH
1321 HDRR *symhdr;
1322 const struct ecoff_debug_swap *swap;
1323 char *ext_hdr = NULL;
252b5132 1324
a7519a3c
RH
1325 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1326 memset (debug, 0, sizeof (*debug));
252b5132 1327
a7519a3c
RH
1328 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1329 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1330 goto error_return;
252b5132 1331
a7519a3c
RH
1332 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1333 swap->external_hdr_size))
1334 goto error_return;
252b5132 1335
a7519a3c
RH
1336 symhdr = &debug->symbolic_header;
1337 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1338
a7519a3c
RH
1339 /* The symbolic header contains absolute file offsets and sizes to
1340 read. */
1341#define READ(ptr, offset, count, size, type) \
1342 if (symhdr->count == 0) \
1343 debug->ptr = NULL; \
1344 else \
1345 { \
1346 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1347 debug->ptr = (type) bfd_malloc (amt); \
1348 if (debug->ptr == NULL) \
1349 goto error_return; \
1350 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1351 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1352 goto error_return; \
1353 }
fe8bc63d 1354
a7519a3c
RH
1355 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
1356 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, PTR);
1357 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, PTR);
1358 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, PTR);
1359 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, PTR);
1360 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1361 union aux_ext *);
1362 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1363 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
1364 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, PTR);
1365 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, PTR);
1366 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, PTR);
1367#undef READ
252b5132 1368
a7519a3c 1369 debug->fdr = NULL;
252b5132 1370
a7519a3c 1371 return TRUE;
252b5132 1372
a7519a3c
RH
1373 error_return:
1374 if (ext_hdr != NULL)
1375 free (ext_hdr);
1376 if (debug->line != NULL)
1377 free (debug->line);
1378 if (debug->external_dnr != NULL)
1379 free (debug->external_dnr);
1380 if (debug->external_pdr != NULL)
1381 free (debug->external_pdr);
1382 if (debug->external_sym != NULL)
1383 free (debug->external_sym);
1384 if (debug->external_opt != NULL)
1385 free (debug->external_opt);
1386 if (debug->external_aux != NULL)
1387 free (debug->external_aux);
1388 if (debug->ss != NULL)
1389 free (debug->ss);
1390 if (debug->ssext != NULL)
1391 free (debug->ssext);
1392 if (debug->external_fdr != NULL)
1393 free (debug->external_fdr);
1394 if (debug->external_rfd != NULL)
1395 free (debug->external_rfd);
1396 if (debug->external_ext != NULL)
1397 free (debug->external_ext);
1398 return FALSE;
252b5132
RH
1399}
1400
a7519a3c
RH
1401/* Alpha ELF local labels start with '$'. */
1402
b34976b6 1403static bfd_boolean
a7519a3c 1404elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1405{
a7519a3c
RH
1406 return name[0] == '$';
1407}
9e756d64 1408
a7519a3c
RH
1409/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
1410 routine in order to handle the ECOFF debugging information. We
1411 still call this mips_elf_find_line because of the slot
1412 find_line_info in elf_obj_tdata is declared that way. */
d6ad34f6 1413
a7519a3c
RH
1414struct mips_elf_find_line
1415{
1416 struct ecoff_debug_info d;
1417 struct ecoff_find_line i;
1418};
d6ad34f6 1419
a7519a3c
RH
1420static bfd_boolean
1421elf64_alpha_find_nearest_line (bfd *abfd, asection *section, asymbol **symbols,
1422 bfd_vma offset, const char **filename_ptr,
1423 const char **functionname_ptr,
1424 unsigned int *line_ptr)
1425{
1426 asection *msec;
252b5132 1427
a7519a3c
RH
1428 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
1429 filename_ptr, functionname_ptr,
1430 line_ptr, 0,
1431 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1432 return TRUE;
9e756d64 1433
a7519a3c
RH
1434 msec = bfd_get_section_by_name (abfd, ".mdebug");
1435 if (msec != NULL)
1bbc9cec 1436 {
a7519a3c
RH
1437 flagword origflags;
1438 struct mips_elf_find_line *fi;
1439 const struct ecoff_debug_swap * const swap =
1440 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1441
a7519a3c
RH
1442 /* If we are called during a link, alpha_elf_final_link may have
1443 cleared the SEC_HAS_CONTENTS field. We force it back on here
1444 if appropriate (which it normally will be). */
1445 origflags = msec->flags;
1446 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1447 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1448
a7519a3c
RH
1449 fi = elf_tdata (abfd)->find_line_info;
1450 if (fi == NULL)
1451 {
1452 bfd_size_type external_fdr_size;
1453 char *fraw_src;
1454 char *fraw_end;
1455 struct fdr *fdr_ptr;
1456 bfd_size_type amt = sizeof (struct mips_elf_find_line);
9e756d64 1457
a7519a3c
RH
1458 fi = (struct mips_elf_find_line *) bfd_zalloc (abfd, amt);
1459 if (fi == NULL)
1460 {
1461 msec->flags = origflags;
1462 return FALSE;
1463 }
9e756d64 1464
a7519a3c
RH
1465 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1466 {
1467 msec->flags = origflags;
1468 return FALSE;
1469 }
9e756d64 1470
a7519a3c
RH
1471 /* Swap in the FDR information. */
1472 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1473 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1474 if (fi->d.fdr == NULL)
1475 {
1476 msec->flags = origflags;
1477 return FALSE;
1478 }
1479 external_fdr_size = swap->external_fdr_size;
1480 fdr_ptr = fi->d.fdr;
1481 fraw_src = (char *) fi->d.external_fdr;
1482 fraw_end = (fraw_src
1483 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1484 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
1485 (*swap->swap_fdr_in) (abfd, (PTR) fraw_src, fdr_ptr);
9e756d64 1486
a7519a3c 1487 elf_tdata (abfd)->find_line_info = fi;
9e756d64 1488
a7519a3c
RH
1489 /* Note that we don't bother to ever free this information.
1490 find_nearest_line is either called all the time, as in
1491 objdump -l, so the information should be saved, or it is
1492 rarely called, as in ld error messages, so the memory
1493 wasted is unimportant. Still, it would probably be a
1494 good idea for free_cached_info to throw it away. */
1495 }
9e756d64 1496
a7519a3c
RH
1497 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1498 &fi->i, filename_ptr, functionname_ptr,
1499 line_ptr))
1500 {
1501 msec->flags = origflags;
1502 return TRUE;
1503 }
9e756d64 1504
a7519a3c 1505 msec->flags = origflags;
9e756d64 1506 }
9e756d64 1507
a7519a3c 1508 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1509
a7519a3c
RH
1510 return _bfd_elf_find_nearest_line (abfd, section, symbols, offset,
1511 filename_ptr, functionname_ptr,
1512 line_ptr);
9e756d64 1513}
a7519a3c
RH
1514\f
1515/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1516
a7519a3c 1517struct extsym_info
9e756d64 1518{
a7519a3c
RH
1519 bfd *abfd;
1520 struct bfd_link_info *info;
1521 struct ecoff_debug_info *debug;
1522 const struct ecoff_debug_swap *swap;
1523 bfd_boolean failed;
1524};
9e756d64 1525
a7519a3c
RH
1526static bfd_boolean
1527elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, PTR data)
1528{
1529 struct extsym_info *einfo = (struct extsym_info *) data;
1530 bfd_boolean strip;
1531 asection *sec, *output_section;
9e756d64 1532
a7519a3c
RH
1533 if (h->root.root.type == bfd_link_hash_warning)
1534 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
9e756d64 1535
a7519a3c
RH
1536 if (h->root.indx == -2)
1537 strip = FALSE;
1538 else if ((h->root.def_dynamic
1539 || h->root.ref_dynamic
1540 || h->root.root.type == bfd_link_hash_new)
1541 && !h->root.def_regular
1542 && !h->root.ref_regular)
1543 strip = TRUE;
1544 else if (einfo->info->strip == strip_all
1545 || (einfo->info->strip == strip_some
1546 && bfd_hash_lookup (einfo->info->keep_hash,
1547 h->root.root.root.string,
1548 FALSE, FALSE) == NULL))
1549 strip = TRUE;
1550 else
1551 strip = FALSE;
9e756d64 1552
a7519a3c 1553 if (strip)
b34976b6 1554 return TRUE;
9e756d64 1555
a7519a3c 1556 if (h->esym.ifd == -2)
9e756d64 1557 {
a7519a3c
RH
1558 h->esym.jmptbl = 0;
1559 h->esym.cobol_main = 0;
1560 h->esym.weakext = 0;
1561 h->esym.reserved = 0;
1562 h->esym.ifd = ifdNil;
1563 h->esym.asym.value = 0;
1564 h->esym.asym.st = stGlobal;
9e756d64 1565
a7519a3c
RH
1566 if (h->root.root.type != bfd_link_hash_defined
1567 && h->root.root.type != bfd_link_hash_defweak)
1568 h->esym.asym.sc = scAbs;
1569 else
1570 {
1571 const char *name;
9e756d64 1572
a7519a3c
RH
1573 sec = h->root.root.u.def.section;
1574 output_section = sec->output_section;
9e756d64 1575
a7519a3c
RH
1576 /* When making a shared library and symbol h is the one from
1577 the another shared library, OUTPUT_SECTION may be null. */
1578 if (output_section == NULL)
1579 h->esym.asym.sc = scUndefined;
1580 else
1581 {
1582 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1583
a7519a3c
RH
1584 if (strcmp (name, ".text") == 0)
1585 h->esym.asym.sc = scText;
1586 else if (strcmp (name, ".data") == 0)
1587 h->esym.asym.sc = scData;
1588 else if (strcmp (name, ".sdata") == 0)
1589 h->esym.asym.sc = scSData;
1590 else if (strcmp (name, ".rodata") == 0
1591 || strcmp (name, ".rdata") == 0)
1592 h->esym.asym.sc = scRData;
1593 else if (strcmp (name, ".bss") == 0)
1594 h->esym.asym.sc = scBss;
1595 else if (strcmp (name, ".sbss") == 0)
1596 h->esym.asym.sc = scSBss;
1597 else if (strcmp (name, ".init") == 0)
1598 h->esym.asym.sc = scInit;
1599 else if (strcmp (name, ".fini") == 0)
1600 h->esym.asym.sc = scFini;
1601 else
1602 h->esym.asym.sc = scAbs;
1603 }
1604 }
9e756d64 1605
a7519a3c
RH
1606 h->esym.asym.reserved = 0;
1607 h->esym.asym.index = indexNil;
1608 }
9e756d64 1609
a7519a3c
RH
1610 if (h->root.root.type == bfd_link_hash_common)
1611 h->esym.asym.value = h->root.root.u.c.size;
1612 else if (h->root.root.type == bfd_link_hash_defined
1613 || h->root.root.type == bfd_link_hash_defweak)
1614 {
1615 if (h->esym.asym.sc == scCommon)
1616 h->esym.asym.sc = scBss;
1617 else if (h->esym.asym.sc == scSCommon)
1618 h->esym.asym.sc = scSBss;
9e756d64 1619
a7519a3c
RH
1620 sec = h->root.root.u.def.section;
1621 output_section = sec->output_section;
1622 if (output_section != NULL)
1623 h->esym.asym.value = (h->root.root.u.def.value
1624 + sec->output_offset
1625 + output_section->vma);
1626 else
1627 h->esym.asym.value = 0;
1628 }
9e756d64 1629
a7519a3c
RH
1630 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1631 h->root.root.root.string,
1632 &h->esym))
1633 {
1634 einfo->failed = TRUE;
1635 return FALSE;
9e756d64
RH
1636 }
1637
a7519a3c
RH
1638 return TRUE;
1639}
1640\f
1641/* Search for and possibly create a got entry. */
9e756d64 1642
a7519a3c
RH
1643static struct alpha_elf_got_entry *
1644get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1645 unsigned long r_type, unsigned long r_symndx,
1646 bfd_vma r_addend)
1647{
1648 struct alpha_elf_got_entry *gotent;
1649 struct alpha_elf_got_entry **slot;
9e756d64 1650
a7519a3c
RH
1651 if (h)
1652 slot = &h->got_entries;
1653 else
1654 {
1655 /* This is a local .got entry -- record for merge. */
9e756d64 1656
a7519a3c 1657 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1658
a7519a3c
RH
1659 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1660 if (!local_got_entries)
1661 {
1662 bfd_size_type size;
1663 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1664
a7519a3c
RH
1665 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1666 size = symtab_hdr->sh_info;
1667 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1668
a7519a3c
RH
1669 local_got_entries
1670 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1671 if (!local_got_entries)
1672 return NULL;
1673
1674 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1675 }
1676
1677 slot = &local_got_entries[r_symndx];
9e756d64
RH
1678 }
1679
a7519a3c
RH
1680 for (gotent = *slot; gotent ; gotent = gotent->next)
1681 if (gotent->gotobj == abfd
1682 && gotent->reloc_type == r_type
1683 && gotent->addend == r_addend)
1684 break;
1685
1686 if (!gotent)
9e756d64 1687 {
a7519a3c
RH
1688 int entry_size;
1689 bfd_size_type amt;
9e756d64 1690
a7519a3c
RH
1691 amt = sizeof (struct alpha_elf_got_entry);
1692 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1693 if (!gotent)
1694 return NULL;
9e756d64 1695
a7519a3c
RH
1696 gotent->gotobj = abfd;
1697 gotent->addend = r_addend;
1698 gotent->got_offset = -1;
6ec7057a 1699 gotent->plt_offset = -1;
a7519a3c
RH
1700 gotent->use_count = 1;
1701 gotent->reloc_type = r_type;
1702 gotent->reloc_done = 0;
1703 gotent->reloc_xlated = 0;
9e756d64 1704
a7519a3c
RH
1705 gotent->next = *slot;
1706 *slot = gotent;
9e756d64 1707
a7519a3c
RH
1708 entry_size = alpha_got_entry_size (r_type);
1709 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1710 if (!h)
1711 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1712 }
a7519a3c
RH
1713 else
1714 gotent->use_count += 1;
9e756d64 1715
a7519a3c 1716 return gotent;
9e756d64
RH
1717}
1718
6ec7057a
RH
1719static bfd_boolean
1720elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1721{
1722 return ((ah->root.type == STT_FUNC
1723 || ah->root.root.type == bfd_link_hash_undefweak
1724 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1725 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1726 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1727}
1728
a7519a3c
RH
1729/* Handle dynamic relocations when doing an Alpha ELF link. */
1730
b34976b6 1731static bfd_boolean
a7519a3c
RH
1732elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1733 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1734{
a7519a3c
RH
1735 bfd *dynobj;
1736 asection *sreloc;
1737 const char *rel_sec_name;
252b5132 1738 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1739 struct alpha_elf_link_hash_entry **sym_hashes;
1740 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1741 bfd_size_type amt;
252b5132 1742
a7519a3c
RH
1743 if (info->relocatable)
1744 return TRUE;
252b5132 1745
a7519a3c
RH
1746 /* Don't do anything special with non-loaded, non-alloced sections.
1747 In particular, any relocs in such sections should not affect GOT
1748 and PLT reference counting (ie. we don't allow them to create GOT
1749 or PLT entries), there's no possibility or desire to optimize TLS
1750 relocs, and there's not much point in propagating relocs to shared
1751 libs that the dynamic linker won't relocate. */
1752 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1753 return TRUE;
252b5132 1754
a7519a3c
RH
1755 dynobj = elf_hash_table(info)->dynobj;
1756 if (dynobj == NULL)
1757 elf_hash_table(info)->dynobj = dynobj = abfd;
252b5132 1758
a7519a3c
RH
1759 sreloc = NULL;
1760 rel_sec_name = NULL;
1761 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1762 sym_hashes = alpha_elf_sym_hashes(abfd);
a7519a3c
RH
1763
1764 relend = relocs + sec->reloc_count;
1765 for (rel = relocs; rel < relend; ++rel)
1766 {
1767 enum {
1768 NEED_GOT = 1,
1769 NEED_GOT_ENTRY = 2,
1770 NEED_DYNREL = 4
1771 };
1772
1773 unsigned long r_symndx, r_type;
1774 struct alpha_elf_link_hash_entry *h;
1775 unsigned int gotent_flags;
1776 bfd_boolean maybe_dynamic;
1777 unsigned int need;
1778 bfd_vma addend;
1779
1780 r_symndx = ELF64_R_SYM (rel->r_info);
1781 if (r_symndx < symtab_hdr->sh_info)
1782 h = NULL;
1783 else
1784 {
1785 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1786
a7519a3c
RH
1787 while (h->root.root.type == bfd_link_hash_indirect
1788 || h->root.root.type == bfd_link_hash_warning)
1789 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1790
a7519a3c
RH
1791 h->root.ref_regular = 1;
1792 }
252b5132 1793
a7519a3c
RH
1794 /* We can only get preliminary data on whether a symbol is
1795 locally or externally defined, as not all of the input files
1796 have yet been processed. Do something with what we know, as
1797 this may help reduce memory usage and processing time later. */
1798 maybe_dynamic = FALSE;
1799 if (h && ((info->shared
1800 && (!info->symbolic
1801 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1802 || !h->root.def_regular
1803 || h->root.root.type == bfd_link_hash_defweak))
1804 maybe_dynamic = TRUE;
252b5132 1805
a7519a3c
RH
1806 need = 0;
1807 gotent_flags = 0;
1808 r_type = ELF64_R_TYPE (rel->r_info);
1809 addend = rel->r_addend;
9e756d64 1810
9e756d64
RH
1811 switch (r_type)
1812 {
1813 case R_ALPHA_LITERAL:
a7519a3c
RH
1814 need = NEED_GOT | NEED_GOT_ENTRY;
1815
1816 /* Remember how this literal is used from its LITUSEs.
1817 This will be important when it comes to decide if we can
1818 create a .plt entry for a function symbol. */
1819 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1820 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1821 gotent_flags |= 1 << rel->r_addend;
1822 --rel;
1823
1824 /* No LITUSEs -- presumably the address is used somehow. */
1825 if (gotent_flags == 0)
1826 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1827 break;
1828
1829 case R_ALPHA_GPDISP:
1830 case R_ALPHA_GPREL16:
1831 case R_ALPHA_GPREL32:
9e756d64
RH
1832 case R_ALPHA_GPRELHIGH:
1833 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1834 case R_ALPHA_BRSGP:
1835 need = NEED_GOT;
1836 break;
1837
1838 case R_ALPHA_REFLONG:
1839 case R_ALPHA_REFQUAD:
1840 if (info->shared || maybe_dynamic)
1841 need = NEED_DYNREL;
cc03ec80
RH
1842 break;
1843
9e756d64 1844 case R_ALPHA_TLSLDM:
cc03ec80 1845 /* The symbol for a TLSLDM reloc is ignored. Collapse the
a7519a3c 1846 reloc to the 0 symbol so that they all match. */
cc03ec80 1847 r_symndx = 0;
a7519a3c
RH
1848 h = 0;
1849 maybe_dynamic = FALSE;
1850 /* FALLTHRU */
1851
1852 case R_ALPHA_TLSGD:
1853 case R_ALPHA_GOTDTPREL:
1854 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1855 break;
cc03ec80 1856
a7519a3c
RH
1857 case R_ALPHA_GOTTPREL:
1858 need = NEED_GOT | NEED_GOT_ENTRY;
1859 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1860 if (info->shared)
1861 info->flags |= DF_STATIC_TLS;
1862 break;
1863
1864 case R_ALPHA_TPREL64:
1865 if (info->shared || maybe_dynamic)
1866 need = NEED_DYNREL;
1867 if (info->shared)
1868 info->flags |= DF_STATIC_TLS;
1869 break;
252b5132
RH
1870 }
1871
a7519a3c 1872 if (need & NEED_GOT)
252b5132 1873 {
85d162e6 1874 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1875 {
a7519a3c
RH
1876 if (!elf64_alpha_create_got_section (abfd, info))
1877 return FALSE;
c328dc3f 1878 }
252b5132 1879 }
252b5132 1880
a7519a3c
RH
1881 if (need & NEED_GOT_ENTRY)
1882 {
1883 struct alpha_elf_got_entry *gotent;
252b5132 1884
a7519a3c
RH
1885 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1886 if (!gotent)
1887 return FALSE;
4a67a098 1888
a7519a3c 1889 if (gotent_flags)
cc03ec80 1890 {
a7519a3c
RH
1891 gotent->flags |= gotent_flags;
1892 if (h)
1893 {
1894 gotent_flags |= h->flags;
1895 h->flags = gotent_flags;
4a67a098 1896
a7519a3c 1897 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1898 /* ??? It appears that we won't make it into
1899 adjust_dynamic_symbol for symbols that remain
1900 totally undefined. Copying this check here means
1901 we can create a plt entry for them too. */
1902 h->root.needs_plt
1903 = (maybe_dynamic && elf64_alpha_want_plt (h));
1904 }
a7519a3c 1905 }
252b5132
RH
1906 }
1907
a7519a3c 1908 if (need & NEED_DYNREL)
9e756d64 1909 {
a7519a3c 1910 if (rel_sec_name == NULL)
9e756d64 1911 {
a7519a3c
RH
1912 rel_sec_name = (bfd_elf_string_from_elf_section
1913 (abfd, elf_elfheader(abfd)->e_shstrndx,
1914 elf_section_data(sec)->rel_hdr.sh_name));
1915 if (rel_sec_name == NULL)
1916 return FALSE;
1917
1918 BFD_ASSERT (strncmp (rel_sec_name, ".rela", 5) == 0
1919 && strcmp (bfd_get_section_name (abfd, sec),
1920 rel_sec_name+5) == 0);
9e756d64 1921 }
a7519a3c
RH
1922
1923 /* We need to create the section here now whether we eventually
1924 use it or not so that it gets mapped to an output section by
1925 the linker. If not used, we'll kill it in
1926 size_dynamic_sections. */
1927 if (sreloc == NULL)
9e756d64 1928 {
a7519a3c
RH
1929 sreloc = bfd_get_section_by_name (dynobj, rel_sec_name);
1930 if (sreloc == NULL)
1931 {
1932 flagword flags;
1933
1934 flags = (SEC_HAS_CONTENTS | SEC_IN_MEMORY
1935 | SEC_LINKER_CREATED | SEC_READONLY);
1936 if (sec->flags & SEC_ALLOC)
1937 flags |= SEC_ALLOC | SEC_LOAD;
1938 sreloc = bfd_make_section_with_flags (dynobj,
1939 rel_sec_name,
1940 flags);
1941 if (sreloc == NULL
1942 || !bfd_set_section_alignment (dynobj, sreloc, 3))
1943 return FALSE;
1944 }
9e756d64 1945 }
252b5132 1946
a7519a3c
RH
1947 if (h)
1948 {
1949 /* Since we havn't seen all of the input symbols yet, we
1950 don't know whether we'll actually need a dynamic relocation
1951 entry for this reloc. So make a record of it. Once we
1952 find out if this thing needs dynamic relocation we'll
1953 expand the relocation sections by the appropriate amount. */
9e756d64 1954
a7519a3c 1955 struct alpha_elf_reloc_entry *rent;
9e756d64 1956
a7519a3c
RH
1957 for (rent = h->reloc_entries; rent; rent = rent->next)
1958 if (rent->rtype == r_type && rent->srel == sreloc)
1959 break;
252b5132 1960
a7519a3c
RH
1961 if (!rent)
1962 {
1963 amt = sizeof (struct alpha_elf_reloc_entry);
1964 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1965 if (!rent)
1966 return FALSE;
252b5132 1967
a7519a3c
RH
1968 rent->srel = sreloc;
1969 rent->rtype = r_type;
1970 rent->count = 1;
1971 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 1972
a7519a3c
RH
1973 rent->next = h->reloc_entries;
1974 h->reloc_entries = rent;
1975 }
1976 else
1977 rent->count++;
1978 }
1979 else if (info->shared)
1980 {
1981 /* If this is a shared library, and the section is to be
1982 loaded into memory, we need a RELATIVE reloc. */
1983 sreloc->size += sizeof (Elf64_External_Rela);
1984 if (sec->flags & SEC_READONLY)
1985 info->flags |= DF_TEXTREL;
1986 }
252b5132
RH
1987 }
1988 }
1989
b34976b6 1990 return TRUE;
252b5132 1991}
252b5132 1992
a7519a3c
RH
1993/* Adjust a symbol defined by a dynamic object and referenced by a
1994 regular object. The current definition is in some section of the
1995 dynamic object, but we're not including those sections. We have to
1996 change the definition to something the rest of the link can
1997 understand. */
252b5132 1998
b34976b6 1999static bfd_boolean
a7519a3c
RH
2000elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2001 struct elf_link_hash_entry *h)
252b5132 2002{
a7519a3c
RH
2003 bfd *dynobj;
2004 asection *s;
2005 struct alpha_elf_link_hash_entry *ah;
252b5132 2006
a7519a3c
RH
2007 dynobj = elf_hash_table(info)->dynobj;
2008 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2009
a7519a3c 2010 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2011 about whether this symbol should get a .plt entry. Irritatingly, it
2012 is common for folk to leave undefined symbols in shared libraries,
2013 and they still expect lazy binding; accept undefined symbols in lieu
2014 of STT_FUNC. */
2015 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2016 {
6ec7057a 2017 h->needs_plt = TRUE;
252b5132 2018
a7519a3c
RH
2019 s = bfd_get_section_by_name(dynobj, ".plt");
2020 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2021 return FALSE;
204692d7 2022
6ec7057a
RH
2023 /* We need one plt entry per got subsection. Delay allocation of
2024 the actual plt entries until size_plt_section, called from
2025 size_dynamic_sections or during relaxation. */
252b5132 2026
a7519a3c
RH
2027 return TRUE;
2028 }
2029 else
6ec7057a 2030 h->needs_plt = FALSE;
252b5132 2031
a7519a3c
RH
2032 /* If this is a weak symbol, and there is a real definition, the
2033 processor independent code will have arranged for us to see the
2034 real definition first, and we can just use the same value. */
2035 if (h->u.weakdef != NULL)
252b5132 2036 {
a7519a3c
RH
2037 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2038 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2039 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2040 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2041 return TRUE;
252b5132 2042 }
a7519a3c
RH
2043
2044 /* This is a reference to a symbol defined by a dynamic object which
2045 is not a function. The Alpha, since it uses .got entries for all
2046 symbols even in regular objects, does not need the hackery of a
2047 .dynbss section and COPY dynamic relocations. */
252b5132 2048
b34976b6 2049 return TRUE;
252b5132
RH
2050}
2051
a7519a3c
RH
2052/* Symbol versioning can create new symbols, and make our old symbols
2053 indirect to the new ones. Consolidate the got and reloc information
2054 in these situations. */
252b5132 2055
b34976b6 2056static bfd_boolean
a7519a3c
RH
2057elf64_alpha_merge_ind_symbols (struct alpha_elf_link_hash_entry *hi,
2058 PTR dummy ATTRIBUTE_UNUSED)
252b5132 2059{
a7519a3c 2060 struct alpha_elf_link_hash_entry *hs;
252b5132 2061
a7519a3c
RH
2062 if (hi->root.root.type != bfd_link_hash_indirect)
2063 return TRUE;
2064 hs = hi;
2065 do {
2066 hs = (struct alpha_elf_link_hash_entry *)hs->root.root.u.i.link;
2067 } while (hs->root.root.type == bfd_link_hash_indirect);
252b5132 2068
a7519a3c
RH
2069 /* Merge the flags. Whee. */
2070
2071 hs->flags |= hi->flags;
2072
2073 /* Merge the .got entries. Cannibalize the old symbol's list in
2074 doing so, since we don't need it anymore. */
2075
2076 if (hs->got_entries == NULL)
2077 hs->got_entries = hi->got_entries;
2078 else
2079 {
2080 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2081
2082 gsh = hs->got_entries;
2083 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2084 {
a7519a3c
RH
2085 gin = gi->next;
2086 for (gs = gsh; gs ; gs = gs->next)
2087 if (gi->gotobj == gs->gotobj
2088 && gi->reloc_type == gs->reloc_type
2089 && gi->addend == gs->addend)
2090 {
2091 gi->use_count += gs->use_count;
2092 goto got_found;
2093 }
2094 gi->next = hs->got_entries;
2095 hs->got_entries = gi;
2096 got_found:;
252b5132 2097 }
a7519a3c
RH
2098 }
2099 hi->got_entries = NULL;
252b5132 2100
a7519a3c
RH
2101 /* And similar for the reloc entries. */
2102
2103 if (hs->reloc_entries == NULL)
2104 hs->reloc_entries = hi->reloc_entries;
2105 else
2106 {
2107 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2108
2109 rsh = hs->reloc_entries;
2110 for (ri = hi->reloc_entries; ri ; ri = rin)
2111 {
2112 rin = ri->next;
2113 for (rs = rsh; rs ; rs = rs->next)
2114 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2115 {
2116 rs->count += ri->count;
2117 goto found_reloc;
2118 }
2119 ri->next = hs->reloc_entries;
2120 hs->reloc_entries = ri;
2121 found_reloc:;
2122 }
252b5132 2123 }
a7519a3c 2124 hi->reloc_entries = NULL;
252b5132 2125
b34976b6 2126 return TRUE;
252b5132
RH
2127}
2128
a7519a3c 2129/* Is it possible to merge two object file's .got tables? */
252b5132 2130
b34976b6 2131static bfd_boolean
a7519a3c 2132elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2133{
a7519a3c
RH
2134 int total = alpha_elf_tdata (a)->total_got_size;
2135 bfd *bsub;
252b5132 2136
a7519a3c
RH
2137 /* Trivial quick fallout test. */
2138 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2139 return TRUE;
252b5132 2140
a7519a3c
RH
2141 /* By their nature, local .got entries cannot be merged. */
2142 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2143 return FALSE;
252b5132 2144
a7519a3c
RH
2145 /* Failing the common trivial comparison, we must effectively
2146 perform the merge. Not actually performing the merge means that
2147 we don't have to store undo information in case we fail. */
2148 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2149 {
2150 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2151 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2152 int i, n;
2153
2154 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2155 for (i = 0; i < n; ++i)
2156 {
2157 struct alpha_elf_got_entry *ae, *be;
2158 struct alpha_elf_link_hash_entry *h;
2159
2160 h = hashes[i];
2161 while (h->root.root.type == bfd_link_hash_indirect
2162 || h->root.root.type == bfd_link_hash_warning)
2163 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2164
2165 for (be = h->got_entries; be ; be = be->next)
2166 {
2167 if (be->use_count == 0)
2168 continue;
2169 if (be->gotobj != b)
2170 continue;
2171
2172 for (ae = h->got_entries; ae ; ae = ae->next)
2173 if (ae->gotobj == a
2174 && ae->reloc_type == be->reloc_type
2175 && ae->addend == be->addend)
2176 goto global_found;
2177
2178 total += alpha_got_entry_size (be->reloc_type);
2179 if (total > MAX_GOT_SIZE)
2180 return FALSE;
2181 global_found:;
2182 }
2183 }
2184 }
252b5132 2185
b34976b6 2186 return TRUE;
252b5132
RH
2187}
2188
a7519a3c 2189/* Actually merge two .got tables. */
252b5132 2190
a7519a3c
RH
2191static void
2192elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2193{
a7519a3c
RH
2194 int total = alpha_elf_tdata (a)->total_got_size;
2195 bfd *bsub;
252b5132 2196
a7519a3c
RH
2197 /* Remember local expansion. */
2198 {
2199 int e = alpha_elf_tdata (b)->local_got_size;
2200 total += e;
2201 alpha_elf_tdata (a)->local_got_size += e;
2202 }
252b5132 2203
a7519a3c
RH
2204 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2205 {
2206 struct alpha_elf_got_entry **local_got_entries;
2207 struct alpha_elf_link_hash_entry **hashes;
2208 Elf_Internal_Shdr *symtab_hdr;
2209 int i, n;
252b5132 2210
a7519a3c
RH
2211 /* Let the local .got entries know they are part of a new subsegment. */
2212 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2213 if (local_got_entries)
2214 {
2215 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2216 for (i = 0; i < n; ++i)
2217 {
2218 struct alpha_elf_got_entry *ent;
2219 for (ent = local_got_entries[i]; ent; ent = ent->next)
2220 ent->gotobj = a;
2221 }
2222 }
252b5132 2223
a7519a3c
RH
2224 /* Merge the global .got entries. */
2225 hashes = alpha_elf_sym_hashes (bsub);
2226 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2227
a7519a3c
RH
2228 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2229 for (i = 0; i < n; ++i)
2230 {
2231 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2232 struct alpha_elf_link_hash_entry *h;
252b5132 2233
a7519a3c
RH
2234 h = hashes[i];
2235 while (h->root.root.type == bfd_link_hash_indirect
2236 || h->root.root.type == bfd_link_hash_warning)
2237 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2238
a7519a3c
RH
2239 pbe = start = &h->got_entries;
2240 while ((be = *pbe) != NULL)
2241 {
2242 if (be->use_count == 0)
2243 {
2244 *pbe = be->next;
2245 memset (be, 0xa5, sizeof (*be));
2246 goto kill;
2247 }
2248 if (be->gotobj != b)
2249 goto next;
2250
2251 for (ae = *start; ae ; ae = ae->next)
2252 if (ae->gotobj == a
2253 && ae->reloc_type == be->reloc_type
2254 && ae->addend == be->addend)
2255 {
2256 ae->flags |= be->flags;
2257 ae->use_count += be->use_count;
2258 *pbe = be->next;
2259 memset (be, 0xa5, sizeof (*be));
2260 goto kill;
2261 }
2262 be->gotobj = a;
2263 total += alpha_got_entry_size (be->reloc_type);
252b5132 2264
a7519a3c
RH
2265 next:;
2266 pbe = &be->next;
2267 kill:;
2268 }
2269 }
252b5132 2270
a7519a3c
RH
2271 alpha_elf_tdata (bsub)->gotobj = a;
2272 }
2273 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2274
a7519a3c
RH
2275 /* Merge the two in_got chains. */
2276 {
2277 bfd *next;
252b5132 2278
a7519a3c
RH
2279 bsub = a;
2280 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2281 bsub = next;
252b5132 2282
a7519a3c
RH
2283 alpha_elf_tdata (bsub)->in_got_link_next = b;
2284 }
252b5132 2285}
a7519a3c
RH
2286
2287/* Calculate the offsets for the got entries. */
252b5132 2288
b34976b6 2289static bfd_boolean
a7519a3c
RH
2290elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2291 PTR arg ATTRIBUTE_UNUSED)
252b5132 2292{
a7519a3c 2293 struct alpha_elf_got_entry *gotent;
252b5132 2294
a7519a3c
RH
2295 if (h->root.root.type == bfd_link_hash_warning)
2296 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
252b5132 2297
a7519a3c
RH
2298 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2299 if (gotent->use_count > 0)
2300 {
2301 struct alpha_elf_obj_tdata *td;
2302 bfd_size_type *plge;
252b5132 2303
a7519a3c 2304 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2305 plge = &td->got->size;
2306 gotent->got_offset = *plge;
2307 *plge += alpha_got_entry_size (gotent->reloc_type);
2308 }
252b5132 2309
6ec7057a 2310 return TRUE;
a7519a3c 2311}
252b5132 2312
a7519a3c
RH
2313static void
2314elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2315{
2316 bfd *i, *got_list = alpha_elf_hash_table(info)->got_list;
252b5132 2317
a7519a3c
RH
2318 /* First, zero out the .got sizes, as we may be recalculating the
2319 .got after optimizing it. */
2320 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2321 alpha_elf_tdata(i)->got->size = 0;
252b5132 2322
a7519a3c
RH
2323 /* Next, fill in the offsets for all the global entries. */
2324 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2325 elf64_alpha_calc_got_offsets_for_symbol,
2326 NULL);
252b5132 2327
a7519a3c
RH
2328 /* Finally, fill in the offsets for the local entries. */
2329 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2330 {
2331 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2332 bfd *j;
252b5132 2333
a7519a3c
RH
2334 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2335 {
2336 struct alpha_elf_got_entry **local_got_entries, *gotent;
2337 int k, n;
252b5132 2338
a7519a3c
RH
2339 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2340 if (!local_got_entries)
2341 continue;
252b5132 2342
a7519a3c
RH
2343 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2344 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2345 if (gotent->use_count > 0)
2346 {
2347 gotent->got_offset = got_offset;
2348 got_offset += alpha_got_entry_size (gotent->reloc_type);
2349 }
2350 }
252b5132 2351
a7519a3c
RH
2352 alpha_elf_tdata(i)->got->size = got_offset;
2353 }
2354}
252b5132 2355
a7519a3c 2356/* Constructs the gots. */
252b5132 2357
b34976b6 2358static bfd_boolean
a7519a3c 2359elf64_alpha_size_got_sections (struct bfd_link_info *info)
252b5132 2360{
a7519a3c
RH
2361 bfd *i, *got_list, *cur_got_obj = NULL;
2362 int something_changed = 0;
252b5132 2363
a7519a3c 2364 got_list = alpha_elf_hash_table (info)->got_list;
95404643 2365
a7519a3c
RH
2366 /* On the first time through, pretend we have an existing got list
2367 consisting of all of the input files. */
2368 if (got_list == NULL)
252b5132 2369 {
a7519a3c 2370 for (i = info->input_bfds; i ; i = i->link_next)
252b5132 2371 {
a7519a3c
RH
2372 bfd *this_got = alpha_elf_tdata (i)->gotobj;
2373 if (this_got == NULL)
2374 continue;
252b5132 2375
a7519a3c
RH
2376 /* We are assuming no merging has yet occurred. */
2377 BFD_ASSERT (this_got == i);
252b5132 2378
a7519a3c 2379 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2380 {
a7519a3c
RH
2381 /* Yikes! A single object file has too many entries. */
2382 (*_bfd_error_handler)
2383 (_("%B: .got subsegment exceeds 64K (size %d)"),
2384 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2385 return FALSE;
252b5132 2386 }
252b5132 2387
a7519a3c
RH
2388 if (got_list == NULL)
2389 got_list = this_got;
2390 else
2391 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2392 cur_got_obj = this_got;
252b5132
RH
2393 }
2394
a7519a3c
RH
2395 /* Strange degenerate case of no got references. */
2396 if (got_list == NULL)
2397 return TRUE;
2398
2399 alpha_elf_hash_table (info)->got_list = got_list;
2400
2401 /* Force got offsets to be recalculated. */
2402 something_changed = 1;
2403 }
2404
2405 cur_got_obj = got_list;
2406 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2407 while (i != NULL)
2408 {
2409 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
252b5132 2410 {
a7519a3c 2411 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2412
a7519a3c
RH
2413 alpha_elf_tdata(i)->got->size = 0;
2414 i = alpha_elf_tdata(i)->got_link_next;
2415 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2416
2417 something_changed = 1;
2418 }
2419 else
2420 {
2421 cur_got_obj = i;
2422 i = alpha_elf_tdata(i)->got_link_next;
2423 }
252b5132
RH
2424 }
2425
a7519a3c
RH
2426 /* Once the gots have been merged, fill in the got offsets for
2427 everything therein. */
2428 if (1 || something_changed)
2429 elf64_alpha_calc_got_offsets (info);
252b5132 2430
a7519a3c 2431 return TRUE;
252b5132 2432}
252b5132 2433
b34976b6 2434static bfd_boolean
a7519a3c 2435elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h, PTR data)
252b5132 2436{
a7519a3c
RH
2437 asection *splt = (asection *) data;
2438 struct alpha_elf_got_entry *gotent;
6ec7057a 2439 bfd_boolean saw_one = FALSE;
252b5132 2440
a7519a3c
RH
2441 /* If we didn't need an entry before, we still don't. */
2442 if (!h->root.needs_plt)
2443 return TRUE;
e92d460e 2444
6ec7057a 2445 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2446 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2447 if (gotent->reloc_type == R_ALPHA_LITERAL
2448 && gotent->use_count > 0)
6ec7057a
RH
2449 {
2450 if (splt->size == 0)
2451 splt->size = PLT_HEADER_SIZE;
2452 gotent->plt_offset = splt->size;
2453 splt->size += PLT_ENTRY_SIZE;
2454 saw_one = TRUE;
2455 }
a7519a3c 2456
6ec7057a
RH
2457 /* If there weren't any, there's no longer a need for the PLT entry. */
2458 if (!saw_one)
2459 h->root.needs_plt = FALSE;
a7519a3c
RH
2460
2461 return TRUE;
2462}
2463
2464/* Called from relax_section to rebuild the PLT in light of
2465 potential changes in the function's status. */
2466
2467static bfd_boolean
2468elf64_alpha_size_plt_section (struct bfd_link_info *info)
2469{
6ec7057a 2470 asection *splt, *spltrel, *sgotplt;
a7519a3c
RH
2471 unsigned long entries;
2472 bfd *dynobj;
2473
2474 dynobj = elf_hash_table(info)->dynobj;
6ec7057a 2475 splt = bfd_get_section_by_name (dynobj, ".plt");
a7519a3c 2476 if (splt == NULL)
b34976b6 2477 return TRUE;
252b5132 2478
a7519a3c 2479 splt->size = 0;
252b5132 2480
a7519a3c
RH
2481 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2482 elf64_alpha_size_plt_section_1, splt);
e92d460e 2483
a7519a3c
RH
2484 /* Every plt entry requires a JMP_SLOT relocation. */
2485 spltrel = bfd_get_section_by_name (dynobj, ".rela.plt");
2486 if (splt->size)
6ec7057a
RH
2487 {
2488 if (elf64_alpha_use_secureplt)
2489 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2490 else
2491 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2492 }
a7519a3c
RH
2493 else
2494 entries = 0;
2495 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2496
6ec7057a
RH
2497 /* When using the secureplt, we need two words somewhere in the data
2498 segment for the dynamic linker to tell us where to go. This is the
2499 entire contents of the .got.plt section. */
2500 if (elf64_alpha_use_secureplt)
2501 {
2502 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
2503 sgotplt->size = entries ? 16 : 0;
2504 }
2505
a7519a3c
RH
2506 return TRUE;
2507}
e92d460e 2508
a7519a3c
RH
2509static bfd_boolean
2510elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2511 struct bfd_link_info *info)
2512{
2513 bfd *i;
252b5132 2514
a7519a3c
RH
2515 if (info->relocatable)
2516 return TRUE;
252b5132 2517
a7519a3c
RH
2518 /* First, take care of the indirect symbols created by versioning. */
2519 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2520 elf64_alpha_merge_ind_symbols,
2521 NULL);
252b5132 2522
a7519a3c
RH
2523 if (!elf64_alpha_size_got_sections (info))
2524 return FALSE;
252b5132 2525
a7519a3c
RH
2526 /* Allocate space for all of the .got subsections. */
2527 i = alpha_elf_hash_table (info)->got_list;
2528 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2529 {
a7519a3c
RH
2530 asection *s = alpha_elf_tdata(i)->got;
2531 if (s->size > 0)
2532 {
2533 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2534 if (s->contents == NULL)
2535 return FALSE;
2536 }
252b5132
RH
2537 }
2538
b34976b6 2539 return TRUE;
252b5132 2540}
3765b1be 2541
a7519a3c 2542/* The number of dynamic relocations required by a static relocation. */
3765b1be 2543
a7519a3c
RH
2544static int
2545alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared)
2546{
2547 switch (r_type)
3765b1be 2548 {
a7519a3c
RH
2549 /* May appear in GOT entries. */
2550 case R_ALPHA_TLSGD:
2551 return (dynamic ? 2 : shared ? 1 : 0);
2552 case R_ALPHA_TLSLDM:
2553 return shared;
2554 case R_ALPHA_LITERAL:
2555 case R_ALPHA_GOTTPREL:
2556 return dynamic || shared;
2557 case R_ALPHA_GOTDTPREL:
2558 return dynamic;
3765b1be 2559
a7519a3c
RH
2560 /* May appear in data sections. */
2561 case R_ALPHA_REFLONG:
2562 case R_ALPHA_REFQUAD:
2563 case R_ALPHA_TPREL64:
2564 return dynamic || shared;
3765b1be 2565
a7519a3c
RH
2566 /* Everything else is illegal. We'll issue an error during
2567 relocate_section. */
2568 default:
2569 return 0;
2570 }
2571}
3765b1be 2572
a7519a3c 2573/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2574
a7519a3c
RH
2575static bfd_boolean
2576elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2577 struct bfd_link_info *info)
2578{
2579 bfd_boolean dynamic;
2580 struct alpha_elf_reloc_entry *relent;
2581 unsigned long entries;
3765b1be 2582
a7519a3c
RH
2583 if (h->root.root.type == bfd_link_hash_warning)
2584 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
3765b1be 2585
a7519a3c
RH
2586 /* If the symbol was defined as a common symbol in a regular object
2587 file, and there was no definition in any dynamic object, then the
2588 linker will have allocated space for the symbol in a common
2589 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2590 set. This is done for dynamic symbols in
2591 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2592 symbols, somehow. */
2593 if (!h->root.def_regular
2594 && h->root.ref_regular
2595 && !h->root.def_dynamic
2596 && (h->root.root.type == bfd_link_hash_defined
2597 || h->root.root.type == bfd_link_hash_defweak)
2598 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2599 h->root.def_regular = 1;
3765b1be 2600
a7519a3c
RH
2601 /* If the symbol is dynamic, we'll need all the relocations in their
2602 natural form. If this is a shared object, and it has been forced
2603 local, we'll need the same number of RELATIVE relocations. */
2604 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2605
a7519a3c
RH
2606 /* If the symbol is a hidden undefined weak, then we never have any
2607 relocations. Avoid the loop which may want to add RELATIVE relocs
2608 based on info->shared. */
2609 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2610 return TRUE;
2611
2612 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2613 {
a7519a3c
RH
2614 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
2615 info->shared);
2616 if (entries)
2617 {
2618 relent->srel->size +=
2619 entries * sizeof (Elf64_External_Rela) * relent->count;
2620 if (relent->reltext)
2621 info->flags |= DT_TEXTREL;
2622 }
2623 }
3765b1be 2624
a7519a3c
RH
2625 return TRUE;
2626}
3765b1be 2627
a7519a3c
RH
2628/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2629 global symbols. */
3765b1be 2630
a7519a3c
RH
2631static bfd_boolean
2632elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2633 struct bfd_link_info *info)
2634{
2635 bfd_boolean dynamic;
2636 struct alpha_elf_got_entry *gotent;
2637 unsigned long entries;
3765b1be 2638
a7519a3c
RH
2639 if (h->root.root.type == bfd_link_hash_warning)
2640 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
2641
6ec7057a
RH
2642 /* If we're using a plt for this symbol, then all of its relocations
2643 for its got entries go into .rela.plt. */
2644 if (h->root.needs_plt)
2645 return TRUE;
2646
a7519a3c
RH
2647 /* If the symbol is dynamic, we'll need all the relocations in their
2648 natural form. If this is a shared object, and it has been forced
2649 local, we'll need the same number of RELATIVE relocations. */
2650 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2651
2652 /* If the symbol is a hidden undefined weak, then we never have any
2653 relocations. Avoid the loop which may want to add RELATIVE relocs
2654 based on info->shared. */
2655 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2656 return TRUE;
2657
2658 entries = 0;
2659 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2660 if (gotent->use_count > 0)
2661 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type,
2662 dynamic, info->shared);
2663
a7519a3c
RH
2664 if (entries > 0)
2665 {
2666 bfd *dynobj = elf_hash_table(info)->dynobj;
2667 asection *srel = bfd_get_section_by_name (dynobj, ".rela.got");
2668 BFD_ASSERT (srel != NULL);
2669 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2670 }
3765b1be 2671
a7519a3c 2672 return TRUE;
3765b1be
RH
2673}
2674
a7519a3c 2675/* Set the sizes of the dynamic relocation sections. */
252b5132 2676
b34976b6 2677static bfd_boolean
a7519a3c 2678elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2679{
a7519a3c
RH
2680 unsigned long entries;
2681 bfd *i, *dynobj;
2682 asection *srel;
252b5132 2683
a7519a3c
RH
2684 /* Shared libraries often require RELATIVE relocs, and some relocs
2685 require attention for the main application as well. */
252b5132 2686
a7519a3c
RH
2687 entries = 0;
2688 for (i = alpha_elf_hash_table(info)->got_list;
2689 i ; i = alpha_elf_tdata(i)->got_link_next)
2690 {
2691 bfd *j;
3241278a 2692
a7519a3c
RH
2693 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2694 {
2695 struct alpha_elf_got_entry **local_got_entries, *gotent;
2696 int k, n;
252b5132 2697
a7519a3c
RH
2698 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2699 if (!local_got_entries)
2700 continue;
252b5132 2701
a7519a3c
RH
2702 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2703 for (gotent = local_got_entries[k];
2704 gotent ; gotent = gotent->next)
2705 if (gotent->use_count > 0)
2706 entries += (alpha_dynamic_entries_for_reloc
2707 (gotent->reloc_type, 0, info->shared));
2708 }
2709 }
3765b1be 2710
a7519a3c
RH
2711 dynobj = elf_hash_table(info)->dynobj;
2712 srel = bfd_get_section_by_name (dynobj, ".rela.got");
2713 if (!srel)
2714 {
2715 BFD_ASSERT (entries == 0);
2716 return TRUE;
2717 }
2718 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2719
a7519a3c
RH
2720 /* Now do the non-local symbols. */
2721 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2722 elf64_alpha_size_rela_got_1, info);
252b5132 2723
a7519a3c
RH
2724 return TRUE;
2725}
252b5132 2726
a7519a3c 2727/* Set the sizes of the dynamic sections. */
3765b1be 2728
a7519a3c
RH
2729static bfd_boolean
2730elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2731 struct bfd_link_info *info)
2732{
2733 bfd *dynobj;
2734 asection *s;
2735 bfd_boolean relplt;
3765b1be 2736
a7519a3c
RH
2737 dynobj = elf_hash_table(info)->dynobj;
2738 BFD_ASSERT(dynobj != NULL);
252b5132 2739
a7519a3c
RH
2740 if (elf_hash_table (info)->dynamic_sections_created)
2741 {
2742 /* Set the contents of the .interp section to the interpreter. */
2743 if (info->executable)
252b5132 2744 {
a7519a3c
RH
2745 s = bfd_get_section_by_name (dynobj, ".interp");
2746 BFD_ASSERT (s != NULL);
2747 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2748 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2749 }
3765b1be 2750
a7519a3c
RH
2751 /* Now that we've seen all of the input files, we can decide which
2752 symbols need dynamic relocation entries and which don't. We've
2753 collected information in check_relocs that we can now apply to
2754 size the dynamic relocation sections. */
2755 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2756 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2757
a7519a3c 2758 elf64_alpha_size_rela_got_section (info);
6ec7057a 2759 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2760 }
2761 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2762
a7519a3c
RH
2763 /* The check_relocs and adjust_dynamic_symbol entry points have
2764 determined the sizes of the various dynamic sections. Allocate
2765 memory for them. */
2766 relplt = FALSE;
2767 for (s = dynobj->sections; s != NULL; s = s->next)
2768 {
2769 const char *name;
2770 bfd_boolean strip;
3765b1be 2771
a7519a3c
RH
2772 if (!(s->flags & SEC_LINKER_CREATED))
2773 continue;
cc03ec80 2774
a7519a3c
RH
2775 /* It's OK to base decisions on the section name, because none
2776 of the dynobj section names depend upon the input files. */
2777 name = bfd_get_section_name (dynobj, s);
3765b1be 2778
a7519a3c
RH
2779 /* If we don't need this section, strip it from the output file.
2780 This is to handle .rela.bss and .rela.plt. We must create it
2781 in create_dynamic_sections, because it must be created before
2782 the linker maps input sections to output sections. The
2783 linker does that before adjust_dynamic_symbol is called, and
2784 it is that function which decides whether anything needs to
2785 go into these sections. */
3765b1be 2786
a7519a3c 2787 strip = FALSE;
3765b1be 2788
a7519a3c 2789 if (strncmp (name, ".rela", 5) == 0)
3765b1be 2790 {
a7519a3c 2791 strip = (s->size == 0);
252b5132 2792
a7519a3c
RH
2793 if (!strip)
2794 {
2795 if (strcmp(name, ".rela.plt") == 0)
2796 relplt = TRUE;
252b5132 2797
a7519a3c
RH
2798 /* We use the reloc_count field as a counter if we need
2799 to copy relocs into the output file. */
2800 s->reloc_count = 0;
252b5132 2801 }
3765b1be 2802 }
a7519a3c 2803 else if (strcmp (name, ".plt") != 0)
3765b1be 2804 {
a7519a3c
RH
2805 /* It's not one of our dynamic sections, so don't allocate space. */
2806 continue;
2807 }
252b5132 2808
a7519a3c
RH
2809 if (strip)
2810 s->flags |= SEC_EXCLUDE;
2811 else
2812 {
2813 /* Allocate memory for the section contents. */
2814 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2815 if (s->contents == NULL && s->size != 0)
b34976b6 2816 return FALSE;
a7519a3c
RH
2817 }
2818 }
3765b1be 2819
a7519a3c
RH
2820 if (elf_hash_table (info)->dynamic_sections_created)
2821 {
2822 /* Add some entries to the .dynamic section. We fill in the
2823 values later, in elf64_alpha_finish_dynamic_sections, but we
2824 must add the entries now so that we get the correct size for
2825 the .dynamic section. The DT_DEBUG entry is filled in by the
2826 dynamic linker and used by the debugger. */
2827#define add_dynamic_entry(TAG, VAL) \
2828 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2829
a7519a3c
RH
2830 if (info->executable)
2831 {
2832 if (!add_dynamic_entry (DT_DEBUG, 0))
2833 return FALSE;
3765b1be
RH
2834 }
2835
a7519a3c 2836 if (relplt)
3765b1be 2837 {
a7519a3c
RH
2838 if (!add_dynamic_entry (DT_PLTGOT, 0)
2839 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2840 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2841 || !add_dynamic_entry (DT_JMPREL, 0))
2842 return FALSE;
6ec7057a
RH
2843
2844 if (elf64_alpha_use_secureplt
2845 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2846 return FALSE;
a7519a3c 2847 }
252b5132 2848
a7519a3c
RH
2849 if (!add_dynamic_entry (DT_RELA, 0)
2850 || !add_dynamic_entry (DT_RELASZ, 0)
2851 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2852 return FALSE;
2853
2854 if (info->flags & DF_TEXTREL)
2855 {
2856 if (!add_dynamic_entry (DT_TEXTREL, 0))
2857 return FALSE;
252b5132
RH
2858 }
2859 }
a7519a3c 2860#undef add_dynamic_entry
252b5132 2861
b34976b6 2862 return TRUE;
252b5132 2863}
a7519a3c
RH
2864\f
2865/* These functions do relaxation for Alpha ELF.
252b5132 2866
a7519a3c
RH
2867 Currently I'm only handling what I can do with existing compiler
2868 and assembler support, which means no instructions are removed,
2869 though some may be nopped. At this time GCC does not emit enough
2870 information to do all of the relaxing that is possible. It will
2871 take some not small amount of work for that to happen.
252b5132 2872
a7519a3c
RH
2873 There are a couple of interesting papers that I once read on this
2874 subject, that I cannot find references to at the moment, that
2875 related to Alpha in particular. They are by David Wall, then of
2876 DEC WRL. */
252b5132 2877
a7519a3c
RH
2878struct alpha_relax_info
2879{
2880 bfd *abfd;
2881 asection *sec;
2882 bfd_byte *contents;
2883 Elf_Internal_Shdr *symtab_hdr;
2884 Elf_Internal_Rela *relocs, *relend;
2885 struct bfd_link_info *link_info;
2886 bfd_vma gp;
2887 bfd *gotobj;
2888 asection *tsec;
2889 struct alpha_elf_link_hash_entry *h;
2890 struct alpha_elf_got_entry **first_gotent;
2891 struct alpha_elf_got_entry *gotent;
2892 bfd_boolean changed_contents;
2893 bfd_boolean changed_relocs;
2894 unsigned char other;
2895};
252b5132 2896
a7519a3c
RH
2897static Elf_Internal_Rela *
2898elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2899 Elf_Internal_Rela *relend,
2900 bfd_vma offset, int type)
2901{
2902 while (rel < relend)
252b5132 2903 {
a7519a3c
RH
2904 if (rel->r_offset == offset
2905 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2906 return rel;
2907 ++rel;
2908 }
2909 return NULL;
2910}
252b5132 2911
a7519a3c
RH
2912static bfd_boolean
2913elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
2914 Elf_Internal_Rela *irel, unsigned long r_type)
2915{
2916 unsigned int insn;
2917 bfd_signed_vma disp;
252b5132 2918
a7519a3c
RH
2919 /* Get the instruction. */
2920 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 2921
a7519a3c
RH
2922 if (insn >> 26 != OP_LDQ)
2923 {
2924 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
2925 ((*_bfd_error_handler)
2926 ("%B: %A+0x%lx: warning: %s relocation against unexpected insn",
2927 info->abfd, info->sec,
2928 (unsigned long) irel->r_offset, howto->name));
2929 return TRUE;
2930 }
252b5132 2931
a7519a3c
RH
2932 /* Can't relax dynamic symbols. */
2933 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
2934 return TRUE;
252b5132 2935
a7519a3c
RH
2936 /* Can't use local-exec relocations in shared libraries. */
2937 if (r_type == R_ALPHA_GOTTPREL && info->link_info->shared)
2938 return TRUE;
252b5132 2939
a7519a3c
RH
2940 if (r_type == R_ALPHA_LITERAL)
2941 {
2942 /* Look for nice constant addresses. This includes the not-uncommon
2943 special case of 0 for undefweak symbols. */
2944 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
2945 || (!info->link_info->shared
2946 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
2947 {
2948 disp = 0;
2949 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
2950 insn |= (symval & 0xffff);
2951 r_type = R_ALPHA_NONE;
2952 }
2953 else
2954 {
2955 disp = symval - info->gp;
2956 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
2957 r_type = R_ALPHA_GPREL16;
2958 }
252b5132
RH
2959 }
2960 else
252b5132 2961 {
a7519a3c 2962 bfd_vma dtp_base, tp_base;
252b5132 2963
a7519a3c
RH
2964 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
2965 dtp_base = alpha_get_dtprel_base (info->link_info);
2966 tp_base = alpha_get_tprel_base (info->link_info);
2967 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 2968
a7519a3c 2969 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 2970
a7519a3c
RH
2971 switch (r_type)
2972 {
2973 case R_ALPHA_GOTDTPREL:
2974 r_type = R_ALPHA_DTPREL16;
2975 break;
2976 case R_ALPHA_GOTTPREL:
2977 r_type = R_ALPHA_TPREL16;
2978 break;
2979 default:
2980 BFD_ASSERT (0);
2981 return FALSE;
2982 }
2983 }
252b5132 2984
a7519a3c 2985 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 2986 return TRUE;
252b5132 2987
a7519a3c
RH
2988 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
2989 info->changed_contents = TRUE;
252b5132 2990
a7519a3c
RH
2991 /* Reduce the use count on this got entry by one, possibly
2992 eliminating it. */
2993 if (--info->gotent->use_count == 0)
252b5132 2994 {
a7519a3c
RH
2995 int sz = alpha_got_entry_size (r_type);
2996 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
2997 if (!info->h)
2998 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 2999 }
252b5132 3000
a7519a3c
RH
3001 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3002 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3003 info->changed_relocs = TRUE;
3004
3005 /* ??? Search forward through this basic block looking for insns
3006 that use the target register. Stop after an insn modifying the
3007 register is seen, or after a branch or call.
252b5132 3008
a7519a3c
RH
3009 Any such memory load insn may be substituted by a load directly
3010 off the GP. This allows the memory load insn to be issued before
3011 the calculated GP register would otherwise be ready.
252b5132 3012
a7519a3c
RH
3013 Any such jsr insn can be replaced by a bsr if it is in range.
3014
3015 This would mean that we'd have to _add_ relocations, the pain of
3016 which gives one pause. */
252b5132 3017
b34976b6 3018 return TRUE;
252b5132
RH
3019}
3020
a7519a3c
RH
3021static bfd_vma
3022elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3023{
a7519a3c
RH
3024 /* If the function has the same gp, and we can identify that the
3025 function does not use its function pointer, we can eliminate the
3026 address load. */
252b5132 3027
a7519a3c
RH
3028 /* If the symbol is marked NOPV, we are being told the function never
3029 needs its procedure value. */
3030 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3031 return symval;
252b5132 3032
a7519a3c
RH
3033 /* If the symbol is marked STD_GP, we are being told the function does
3034 a normal ldgp in the first two words. */
3035 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3036 ;
252b5132 3037
a7519a3c
RH
3038 /* Otherwise, we may be able to identify a GP load in the first two
3039 words, which we can then skip. */
3040 else
252b5132 3041 {
a7519a3c
RH
3042 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3043 bfd_vma ofs;
252b5132 3044
a7519a3c
RH
3045 /* Load the relocations from the section that the target symbol is in. */
3046 if (info->sec == info->tsec)
252b5132 3047 {
a7519a3c
RH
3048 tsec_relocs = info->relocs;
3049 tsec_relend = info->relend;
3050 tsec_free = NULL;
3051 }
3052 else
3053 {
3054 tsec_relocs = (_bfd_elf_link_read_relocs
3055 (info->abfd, info->tsec, (PTR) NULL,
3056 (Elf_Internal_Rela *) NULL,
3057 info->link_info->keep_memory));
3058 if (tsec_relocs == NULL)
3059 return 0;
3060 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3061 tsec_free = (info->link_info->keep_memory ? NULL : tsec_relocs);
3062 }
252b5132 3063
a7519a3c
RH
3064 /* Recover the symbol's offset within the section. */
3065 ofs = (symval - info->tsec->output_section->vma
3066 - info->tsec->output_offset);
252b5132 3067
a7519a3c
RH
3068 /* Look for a GPDISP reloc. */
3069 gpdisp = (elf64_alpha_find_reloc_at_ofs
3070 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3071
a7519a3c
RH
3072 if (!gpdisp || gpdisp->r_addend != 4)
3073 {
3074 if (tsec_free)
3075 free (tsec_free);
3076 return 0;
252b5132 3077 }
a7519a3c
RH
3078 if (tsec_free)
3079 free (tsec_free);
252b5132
RH
3080 }
3081
a7519a3c
RH
3082 /* We've now determined that we can skip an initial gp load. Verify
3083 that the call and the target use the same gp. */
3084 if (info->link_info->hash->creator != info->tsec->owner->xvec
3085 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3086 return 0;
252b5132 3087
a7519a3c
RH
3088 return symval + 8;
3089}
252b5132 3090
a7519a3c
RH
3091static bfd_boolean
3092elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3093 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3094{
a7519a3c
RH
3095 Elf_Internal_Rela *urel, *irelend = info->relend;
3096 int flags, count, i;
3097 bfd_signed_vma disp;
3098 bfd_boolean fits16;
3099 bfd_boolean fits32;
3100 bfd_boolean lit_reused = FALSE;
3101 bfd_boolean all_optimized = TRUE;
3102 unsigned int lit_insn;
252b5132 3103
a7519a3c
RH
3104 lit_insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
3105 if (lit_insn >> 26 != OP_LDQ)
3106 {
3107 ((*_bfd_error_handler)
3108 ("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn",
3109 info->abfd, info->sec,
3110 (unsigned long) irel->r_offset));
3111 return TRUE;
3112 }
252b5132 3113
a7519a3c
RH
3114 /* Can't relax dynamic symbols. */
3115 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3116 return TRUE;
3117
3118 /* Summarize how this particular LITERAL is used. */
3119 for (urel = irel+1, flags = count = 0; urel < irelend; ++urel, ++count)
252b5132 3120 {
a7519a3c
RH
3121 if (ELF64_R_TYPE (urel->r_info) != R_ALPHA_LITUSE)
3122 break;
8288a39e 3123 if (urel->r_addend <= 6)
a7519a3c
RH
3124 flags |= 1 << urel->r_addend;
3125 }
252b5132 3126
a7519a3c
RH
3127 /* A little preparation for the loop... */
3128 disp = symval - info->gp;
252b5132 3129
a7519a3c
RH
3130 for (urel = irel+1, i = 0; i < count; ++i, ++urel)
3131 {
3132 unsigned int insn;
3133 int insn_disp;
3134 bfd_signed_vma xdisp;
252b5132 3135
a7519a3c 3136 insn = bfd_get_32 (info->abfd, info->contents + urel->r_offset);
252b5132 3137
a7519a3c
RH
3138 switch (urel->r_addend)
3139 {
3140 case LITUSE_ALPHA_ADDR:
3141 default:
3142 /* This type is really just a placeholder to note that all
3143 uses cannot be optimized, but to still allow some. */
3144 all_optimized = FALSE;
3145 break;
252b5132 3146
a7519a3c
RH
3147 case LITUSE_ALPHA_BASE:
3148 /* We can always optimize 16-bit displacements. */
252b5132 3149
a7519a3c
RH
3150 /* Extract the displacement from the instruction, sign-extending
3151 it if necessary, then test whether it is within 16 or 32 bits
3152 displacement from GP. */
3153 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3154
3155 xdisp = disp + insn_disp;
3156 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3157 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3158 && xdisp < 0x7fff8000);
3159
3160 if (fits16)
3161 {
3162 /* Take the op code and dest from this insn, take the base
3163 register from the literal insn. Leave the offset alone. */
3164 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
3165 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3166 R_ALPHA_GPREL16);
3167 urel->r_addend = irel->r_addend;
3168 info->changed_relocs = TRUE;
252b5132 3169
a7519a3c
RH
3170 bfd_put_32 (info->abfd, (bfd_vma) insn,
3171 info->contents + urel->r_offset);
3172 info->changed_contents = TRUE;
252b5132 3173 }
252b5132 3174
a7519a3c
RH
3175 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3176 else if (fits32 && !(flags & ~6))
3177 {
3178 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3179
a7519a3c
RH
3180 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3181 R_ALPHA_GPRELHIGH);
3182 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
3183 bfd_put_32 (info->abfd, (bfd_vma) lit_insn,
3184 info->contents + irel->r_offset);
3185 lit_reused = TRUE;
3186 info->changed_contents = TRUE;
252b5132 3187
a7519a3c
RH
3188 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3189 R_ALPHA_GPRELLOW);
3190 urel->r_addend = irel->r_addend;
3191 info->changed_relocs = TRUE;
3192 }
3193 else
3194 all_optimized = FALSE;
3195 break;
252b5132 3196
a7519a3c
RH
3197 case LITUSE_ALPHA_BYTOFF:
3198 /* We can always optimize byte instructions. */
252b5132 3199
a7519a3c
RH
3200 /* FIXME: sanity check the insn for byte op. Check that the
3201 literal dest reg is indeed Rb in the byte insn. */
252b5132 3202
a7519a3c
RH
3203 insn &= ~ (unsigned) 0x001ff000;
3204 insn |= ((symval & 7) << 13) | 0x1000;
252b5132 3205
a7519a3c
RH
3206 urel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3207 urel->r_addend = 0;
3208 info->changed_relocs = TRUE;
e92d460e 3209
a7519a3c
RH
3210 bfd_put_32 (info->abfd, (bfd_vma) insn,
3211 info->contents + urel->r_offset);
3212 info->changed_contents = TRUE;
3213 break;
252b5132 3214
a7519a3c
RH
3215 case LITUSE_ALPHA_JSR:
3216 case LITUSE_ALPHA_TLSGD:
3217 case LITUSE_ALPHA_TLSLDM:
8288a39e 3218 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3219 {
a7519a3c
RH
3220 bfd_vma optdest, org;
3221 bfd_signed_vma odisp;
252b5132 3222
a7519a3c
RH
3223 /* For undefined weak symbols, we're mostly interested in getting
3224 rid of the got entry whenever possible, so optimize this to a
3225 use of the zero register. */
3226 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3227 {
3228 insn |= 31 << 16;
3229 bfd_put_32 (info->abfd, (bfd_vma) insn,
3230 info->contents + urel->r_offset);
252b5132 3231
a7519a3c
RH
3232 info->changed_contents = TRUE;
3233 break;
3234 }
252b5132 3235
a7519a3c
RH
3236 /* If not zero, place to jump without needing pv. */
3237 optdest = elf64_alpha_relax_opt_call (info, symval);
3238 org = (info->sec->output_section->vma
3239 + info->sec->output_offset
3240 + urel->r_offset + 4);
3241 odisp = (optdest ? optdest : symval) - org;
252b5132 3242
a7519a3c
RH
3243 if (odisp >= -0x400000 && odisp < 0x400000)
3244 {
3245 Elf_Internal_Rela *xrel;
252b5132 3246
a7519a3c
RH
3247 /* Preserve branch prediction call stack when possible. */
3248 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3249 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3250 else
3251 insn = (OP_BR << 26) | (insn & 0x03e00000);
252b5132 3252
a7519a3c
RH
3253 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3254 R_ALPHA_BRADDR);
3255 urel->r_addend = irel->r_addend;
252b5132 3256
a7519a3c
RH
3257 if (optdest)
3258 urel->r_addend += optdest - symval;
3259 else
3260 all_optimized = FALSE;
252b5132 3261
a7519a3c
RH
3262 bfd_put_32 (info->abfd, (bfd_vma) insn,
3263 info->contents + urel->r_offset);
252b5132 3264
a7519a3c
RH
3265 /* Kill any HINT reloc that might exist for this insn. */
3266 xrel = (elf64_alpha_find_reloc_at_ofs
3267 (info->relocs, info->relend, urel->r_offset,
3268 R_ALPHA_HINT));
3269 if (xrel)
3270 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3271
a7519a3c
RH
3272 info->changed_contents = TRUE;
3273 info->changed_relocs = TRUE;
3274 }
3275 else
3276 all_optimized = FALSE;
252b5132 3277
a7519a3c
RH
3278 /* Even if the target is not in range for a direct branch,
3279 if we share a GP, we can eliminate the gp reload. */
3280 if (optdest)
3281 {
3282 Elf_Internal_Rela *gpdisp
3283 = (elf64_alpha_find_reloc_at_ofs
3284 (info->relocs, irelend, urel->r_offset + 4,
3285 R_ALPHA_GPDISP));
3286 if (gpdisp)
3287 {
3288 bfd_byte *p_ldah = info->contents + gpdisp->r_offset;
3289 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
3290 unsigned int ldah = bfd_get_32 (info->abfd, p_ldah);
3291 unsigned int lda = bfd_get_32 (info->abfd, p_lda);
252b5132 3292
a7519a3c
RH
3293 /* Verify that the instruction is "ldah $29,0($26)".
3294 Consider a function that ends in a noreturn call,
3295 and that the next function begins with an ldgp,
3296 and that by accident there is no padding between.
3297 In that case the insn would use $27 as the base. */
3298 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3299 {
3300 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_ldah);
3301 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3302
a7519a3c
RH
3303 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3304 info->changed_contents = TRUE;
3305 info->changed_relocs = TRUE;
3306 }
3307 }
3308 }
3309 }
3310 break;
252b5132 3311 }
252b5132
RH
3312 }
3313
a7519a3c
RH
3314 /* If all cases were optimized, we can reduce the use count on this
3315 got entry by one, possibly eliminating it. */
3316 if (all_optimized)
252b5132 3317 {
a7519a3c 3318 if (--info->gotent->use_count == 0)
252b5132 3319 {
a7519a3c
RH
3320 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3321 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3322 if (!info->h)
3323 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3324 }
a7519a3c
RH
3325
3326 /* If the literal instruction is no longer needed (it may have been
3327 reused. We can eliminate it. */
3328 /* ??? For now, I don't want to deal with compacting the section,
3329 so just nop it out. */
3330 if (!lit_reused)
252b5132 3331 {
a7519a3c
RH
3332 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3333 info->changed_relocs = TRUE;
252b5132 3334
a7519a3c
RH
3335 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP,
3336 info->contents + irel->r_offset);
3337 info->changed_contents = TRUE;
3338 }
252b5132 3339
a7519a3c
RH
3340 return TRUE;
3341 }
3342 else
3343 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3344}
3345
b34976b6 3346static bfd_boolean
a7519a3c
RH
3347elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3348 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3349{
a7519a3c
RH
3350 bfd_byte *pos[5];
3351 unsigned int insn;
3352 Elf_Internal_Rela *gpdisp, *hint;
3353 bfd_boolean dynamic, use_gottprel, pos1_unusable;
3354 unsigned long new_symndx;
f44f99a5 3355
a7519a3c 3356 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3357
a7519a3c
RH
3358 /* If a TLS symbol is accessed using IE at least once, there is no point
3359 to use dynamic model for it. */
3360 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3361 ;
f44f99a5 3362
a7519a3c
RH
3363 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3364 then we might as well relax to IE. */
3365 else if (info->link_info->shared && !dynamic
3366 && (info->link_info->flags & DF_STATIC_TLS))
3367 ;
f44f99a5 3368
a7519a3c
RH
3369 /* Otherwise we must be building an executable to do anything. */
3370 else if (info->link_info->shared)
3371 return TRUE;
f44f99a5 3372
a7519a3c
RH
3373 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3374 the matching LITUSE_TLS relocations. */
3375 if (irel + 2 >= info->relend)
3376 return TRUE;
3377 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3378 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3379 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3380 return TRUE;
f44f99a5 3381
a7519a3c
RH
3382 /* There must be a GPDISP relocation positioned immediately after the
3383 LITUSE relocation. */
3384 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3385 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3386 if (!gpdisp)
b34976b6 3387 return TRUE;
f44f99a5 3388
a7519a3c
RH
3389 pos[0] = info->contents + irel[0].r_offset;
3390 pos[1] = info->contents + irel[1].r_offset;
3391 pos[2] = info->contents + irel[2].r_offset;
3392 pos[3] = info->contents + gpdisp->r_offset;
3393 pos[4] = pos[3] + gpdisp->r_addend;
3394 pos1_unusable = FALSE;
f44f99a5 3395
a7519a3c
RH
3396 /* Generally, the positions are not allowed to be out of order, lest the
3397 modified insn sequence have different register lifetimes. We can make
3398 an exception when pos 1 is adjacent to pos 0. */
3399 if (pos[1] + 4 == pos[0])
f44f99a5 3400 {
a7519a3c
RH
3401 bfd_byte *tmp = pos[0];
3402 pos[0] = pos[1];
3403 pos[1] = tmp;
f44f99a5 3404 }
a7519a3c
RH
3405 else if (pos[1] < pos[0])
3406 pos1_unusable = TRUE;
3407 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3408 return TRUE;
cc03ec80 3409
a7519a3c
RH
3410 /* Reduce the use count on the LITERAL relocation. Do this before we
3411 smash the symndx when we adjust the relocations below. */
3412 {
3413 struct alpha_elf_got_entry *lit_gotent;
3414 struct alpha_elf_link_hash_entry *lit_h;
3415 unsigned long indx;
f44f99a5 3416
a7519a3c
RH
3417 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3418 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3419 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3420
a7519a3c
RH
3421 while (lit_h->root.root.type == bfd_link_hash_indirect
3422 || lit_h->root.root.type == bfd_link_hash_warning)
3423 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3424
a7519a3c
RH
3425 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3426 lit_gotent = lit_gotent->next)
3427 if (lit_gotent->gotobj == info->gotobj
3428 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3429 && lit_gotent->addend == irel[1].r_addend)
3430 break;
3431 BFD_ASSERT (lit_gotent);
252b5132 3432
a7519a3c
RH
3433 if (--lit_gotent->use_count == 0)
3434 {
3435 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3436 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3437 }
3438 }
252b5132 3439
a7519a3c 3440 /* Change
252b5132 3441
a7519a3c
RH
3442 lda $16,x($gp) !tlsgd!1
3443 ldq $27,__tls_get_addr($gp) !literal!1
3444 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3445 ldah $29,0($26) !gpdisp!2
3446 lda $29,0($29) !gpdisp!2
3447 to
3448 ldq $16,x($gp) !gottprel
3449 unop
3450 call_pal rduniq
3451 addq $16,$0,$0
3452 unop
3453 or the first pair to
3454 lda $16,x($gp) !tprel
3455 unop
3456 or
3457 ldah $16,x($gp) !tprelhi
3458 lda $16,x($16) !tprello
3459
3460 as appropriate. */
3461
3462 use_gottprel = FALSE;
3463 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : 0;
3464 switch (!dynamic && !info->link_info->shared)
252b5132 3465 {
a7519a3c
RH
3466 case 1:
3467 {
3468 bfd_vma tp_base;
3469 bfd_signed_vma disp;
252b5132 3470
a7519a3c
RH
3471 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3472 tp_base = alpha_get_tprel_base (info->link_info);
3473 disp = symval - tp_base;
252b5132 3474
a7519a3c
RH
3475 if (disp >= -0x8000 && disp < 0x8000)
3476 {
3477 insn = (OP_LDA << 26) | (16 << 21) | (31 << 16);
3478 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3479 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3480
a7519a3c
RH
3481 irel[0].r_offset = pos[0] - info->contents;
3482 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3483 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3484 break;
3485 }
3486 else if (disp >= -(bfd_signed_vma) 0x80000000
3487 && disp < (bfd_signed_vma) 0x7fff8000
3488 && !pos1_unusable)
3489 {
3490 insn = (OP_LDAH << 26) | (16 << 21) | (31 << 16);
3491 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3492 insn = (OP_LDA << 26) | (16 << 21) | (16 << 16);
3493 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3494
a7519a3c
RH
3495 irel[0].r_offset = pos[0] - info->contents;
3496 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3497 irel[1].r_offset = pos[1] - info->contents;
3498 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3499 break;
3500 }
3501 }
3502 /* FALLTHRU */
3765b1be 3503
3765b1be 3504 default:
a7519a3c
RH
3505 use_gottprel = TRUE;
3506
3507 insn = (OP_LDQ << 26) | (16 << 21) | (29 << 16);
3508 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3509 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3510
3511 irel[0].r_offset = pos[0] - info->contents;
3512 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3513 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3514 break;
3765b1be 3515 }
3765b1be 3516
a7519a3c 3517 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3518
a7519a3c
RH
3519 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3520 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3521
a7519a3c 3522 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3523
a7519a3c
RH
3524 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3525 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3526
a7519a3c
RH
3527 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3528 irel[2].r_offset, R_ALPHA_HINT);
3529 if (hint)
3530 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3531
a7519a3c
RH
3532 info->changed_contents = TRUE;
3533 info->changed_relocs = TRUE;
d6ad34f6 3534
a7519a3c
RH
3535 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3536 if (--info->gotent->use_count == 0)
3765b1be 3537 {
a7519a3c
RH
3538 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3539 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3540 if (!info->h)
3541 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3542 }
252b5132 3543
a7519a3c
RH
3544 /* If we've switched to a GOTTPREL relocation, increment the reference
3545 count on that got entry. */
3546 if (use_gottprel)
f44f99a5 3547 {
a7519a3c 3548 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3549
a7519a3c
RH
3550 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3551 tprel_gotent = tprel_gotent->next)
3552 if (tprel_gotent->gotobj == info->gotobj
3553 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3554 && tprel_gotent->addend == irel->r_addend)
3555 break;
3556 if (tprel_gotent)
3557 tprel_gotent->use_count++;
3558 else
f44f99a5 3559 {
a7519a3c
RH
3560 if (info->gotent->use_count == 0)
3561 tprel_gotent = info->gotent;
3562 else
3563 {
3564 tprel_gotent = (struct alpha_elf_got_entry *)
3565 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3566 if (!tprel_gotent)
3567 return FALSE;
f44f99a5 3568
a7519a3c
RH
3569 tprel_gotent->next = *info->first_gotent;
3570 *info->first_gotent = tprel_gotent;
f44f99a5 3571
a7519a3c
RH
3572 tprel_gotent->gotobj = info->gotobj;
3573 tprel_gotent->addend = irel->r_addend;
3574 tprel_gotent->got_offset = -1;
3575 tprel_gotent->reloc_done = 0;
3576 tprel_gotent->reloc_xlated = 0;
3577 }
f44f99a5 3578
a7519a3c
RH
3579 tprel_gotent->use_count = 1;
3580 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3581 }
f44f99a5 3582 }
f44f99a5 3583
b34976b6 3584 return TRUE;
f44f99a5
RH
3585}
3586
b34976b6 3587static bfd_boolean
a7519a3c
RH
3588elf64_alpha_relax_section (bfd *abfd, asection *sec,
3589 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3590{
a7519a3c
RH
3591 Elf_Internal_Shdr *symtab_hdr;
3592 Elf_Internal_Rela *internal_relocs;
3593 Elf_Internal_Rela *irel, *irelend;
3594 Elf_Internal_Sym *isymbuf = NULL;
3595 struct alpha_elf_got_entry **local_got_entries;
3596 struct alpha_relax_info info;
f44f99a5 3597
a7519a3c
RH
3598 /* We are not currently changing any sizes, so only one pass. */
3599 *again = FALSE;
f44f99a5 3600
a7519a3c
RH
3601 if (link_info->relocatable
3602 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3603 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3604 || sec->reloc_count == 0)
d6ad34f6
RH
3605 return TRUE;
3606
a7519a3c
RH
3607 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3608 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3609
a7519a3c
RH
3610 /* Load the relocations for this section. */
3611 internal_relocs = (_bfd_elf_link_read_relocs
3612 (abfd, sec, (PTR) NULL, (Elf_Internal_Rela *) NULL,
3613 link_info->keep_memory));
3614 if (internal_relocs == NULL)
3615 return FALSE;
252b5132 3616
a7519a3c
RH
3617 memset(&info, 0, sizeof (info));
3618 info.abfd = abfd;
3619 info.sec = sec;
3620 info.link_info = link_info;
3621 info.symtab_hdr = symtab_hdr;
3622 info.relocs = internal_relocs;
3623 info.relend = irelend = internal_relocs + sec->reloc_count;
3624
3625 /* Find the GP for this object. Do not store the result back via
3626 _bfd_set_gp_value, since this could change again before final. */
3627 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3628 if (info.gotobj)
3765b1be 3629 {
a7519a3c
RH
3630 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3631 info.gp = (sgot->output_section->vma
3632 + sgot->output_offset
3633 + 0x8000);
252b5132
RH
3634 }
3635
a7519a3c
RH
3636 /* Get the section contents. */
3637 if (elf_section_data (sec)->this_hdr.contents != NULL)
3638 info.contents = elf_section_data (sec)->this_hdr.contents;
3639 else
3640 {
3641 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3642 goto error_return;
3643 }
252b5132 3644
a7519a3c
RH
3645 for (irel = internal_relocs; irel < irelend; irel++)
3646 {
3647 bfd_vma symval;
3648 struct alpha_elf_got_entry *gotent;
3649 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3650 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3651
3652 /* Early exit for unhandled or unrelaxable relocations. */
3653 switch (r_type)
3654 {
3655 case R_ALPHA_LITERAL:
3656 case R_ALPHA_GPRELHIGH:
3657 case R_ALPHA_GPRELLOW:
3658 case R_ALPHA_GOTDTPREL:
3659 case R_ALPHA_GOTTPREL:
3660 case R_ALPHA_TLSGD:
3661 break;
3662
3663 case R_ALPHA_TLSLDM:
3664 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3665 reloc to the 0 symbol so that they all match. */
3666 r_symndx = 0;
3667 break;
3668
3669 default:
3670 continue;
3671 }
3672
3673 /* Get the value of the symbol referred to by the reloc. */
3674 if (r_symndx < symtab_hdr->sh_info)
3675 {
3676 /* A local symbol. */
3677 Elf_Internal_Sym *isym;
3678
3679 /* Read this BFD's local symbols. */
3680 if (isymbuf == NULL)
3681 {
3682 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3683 if (isymbuf == NULL)
3684 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3685 symtab_hdr->sh_info, 0,
3686 NULL, NULL, NULL);
3687 if (isymbuf == NULL)
3688 goto error_return;
3689 }
252b5132 3690
a7519a3c 3691 isym = isymbuf + r_symndx;
252b5132 3692
a7519a3c
RH
3693 /* Given the symbol for a TLSLDM reloc is ignored, this also
3694 means forcing the symbol value to the tp base. */
3695 if (r_type == R_ALPHA_TLSLDM)
3696 {
3697 info.tsec = bfd_abs_section_ptr;
3698 symval = alpha_get_tprel_base (info.link_info);
3699 }
3700 else
3701 {
3702 symval = isym->st_value;
3703 if (isym->st_shndx == SHN_UNDEF)
3704 continue;
3705 else if (isym->st_shndx == SHN_ABS)
3706 info.tsec = bfd_abs_section_ptr;
3707 else if (isym->st_shndx == SHN_COMMON)
3708 info.tsec = bfd_com_section_ptr;
3709 else
3710 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3711 }
252b5132 3712
a7519a3c
RH
3713 info.h = NULL;
3714 info.other = isym->st_other;
3715 if (local_got_entries)
3716 info.first_gotent = &local_got_entries[r_symndx];
3717 else
3718 {
3719 info.first_gotent = &info.gotent;
3720 info.gotent = NULL;
3721 }
252b5132 3722 }
a7519a3c
RH
3723 else
3724 {
3725 unsigned long indx;
3726 struct alpha_elf_link_hash_entry *h;
252b5132 3727
a7519a3c
RH
3728 indx = r_symndx - symtab_hdr->sh_info;
3729 h = alpha_elf_sym_hashes (abfd)[indx];
3730 BFD_ASSERT (h != NULL);
252b5132 3731
a7519a3c
RH
3732 while (h->root.root.type == bfd_link_hash_indirect
3733 || h->root.root.type == bfd_link_hash_warning)
3734 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3735
a7519a3c
RH
3736 /* If the symbol is undefined, we can't do anything with it. */
3737 if (h->root.root.type == bfd_link_hash_undefined)
3738 continue;
252b5132 3739
a7519a3c
RH
3740 /* If the symbol isn't defined in the current module,
3741 again we can't do anything. */
3742 if (h->root.root.type == bfd_link_hash_undefweak)
3743 {
3744 info.tsec = bfd_abs_section_ptr;
3745 symval = 0;
3746 }
3747 else if (!h->root.def_regular)
3748 {
3749 /* Except for TLSGD relocs, which can sometimes be
3750 relaxed to GOTTPREL relocs. */
3751 if (r_type != R_ALPHA_TLSGD)
3752 continue;
3753 info.tsec = bfd_abs_section_ptr;
3754 symval = 0;
3755 }
3756 else
3757 {
3758 info.tsec = h->root.root.u.def.section;
3759 symval = h->root.root.u.def.value;
3760 }
252b5132 3761
a7519a3c
RH
3762 info.h = h;
3763 info.other = h->root.other;
3764 info.first_gotent = &h->got_entries;
3765 }
252b5132 3766
a7519a3c
RH
3767 /* Search for the got entry to be used by this relocation. */
3768 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3769 if (gotent->gotobj == info.gotobj
3770 && gotent->reloc_type == r_type
3771 && gotent->addend == irel->r_addend)
3772 break;
3773 info.gotent = gotent;
252b5132 3774
a7519a3c
RH
3775 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3776 symval += irel->r_addend;
252b5132 3777
a7519a3c 3778 switch (r_type)
252b5132 3779 {
a7519a3c
RH
3780 case R_ALPHA_LITERAL:
3781 BFD_ASSERT(info.gotent != NULL);
252b5132 3782
a7519a3c
RH
3783 /* If there exist LITUSE relocations immediately following, this
3784 opens up all sorts of interesting optimizations, because we
3785 now know every location that this address load is used. */
3786 if (irel+1 < irelend
3787 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3788 {
a7519a3c
RH
3789 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3790 goto error_return;
252b5132 3791 }
a7519a3c
RH
3792 else
3793 {
3794 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3795 goto error_return;
3796 }
3797 break;
252b5132 3798
a7519a3c
RH
3799 case R_ALPHA_GOTDTPREL:
3800 case R_ALPHA_GOTTPREL:
3801 BFD_ASSERT(info.gotent != NULL);
3802 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3803 goto error_return;
3804 break;
3805
3806 case R_ALPHA_TLSGD:
3807 case R_ALPHA_TLSLDM:
3808 BFD_ASSERT(info.gotent != NULL);
3809 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3810 r_type == R_ALPHA_TLSGD))
3811 goto error_return;
3812 break;
252b5132
RH
3813 }
3814 }
3815
a7519a3c
RH
3816 if (!elf64_alpha_size_plt_section (link_info))
3817 return FALSE;
3818 if (!elf64_alpha_size_got_sections (link_info))
3819 return FALSE;
3820 if (!elf64_alpha_size_rela_got_section (link_info))
3821 return FALSE;
dc810e39 3822
a7519a3c
RH
3823 if (isymbuf != NULL
3824 && symtab_hdr->contents != (unsigned char *) isymbuf)
3825 {
3826 if (!link_info->keep_memory)
3827 free (isymbuf);
3828 else
252b5132 3829 {
a7519a3c
RH
3830 /* Cache the symbols for elf_link_input_bfd. */
3831 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3832 }
a7519a3c 3833 }
252b5132 3834
a7519a3c
RH
3835 if (info.contents != NULL
3836 && elf_section_data (sec)->this_hdr.contents != info.contents)
3837 {
3838 if (!info.changed_contents && !link_info->keep_memory)
3839 free (info.contents);
3840 else
252b5132 3841 {
a7519a3c
RH
3842 /* Cache the section contents for elf_link_input_bfd. */
3843 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 3844 }
a7519a3c 3845 }
252b5132 3846
a7519a3c
RH
3847 if (elf_section_data (sec)->relocs != internal_relocs)
3848 {
3849 if (!info.changed_relocs)
3850 free (internal_relocs);
3851 else
3852 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3853 }
a7519a3c
RH
3854
3855 *again = info.changed_contents || info.changed_relocs;
252b5132 3856
b34976b6 3857 return TRUE;
252b5132 3858
a7519a3c
RH
3859 error_return:
3860 if (isymbuf != NULL
3861 && symtab_hdr->contents != (unsigned char *) isymbuf)
3862 free (isymbuf);
3863 if (info.contents != NULL
3864 && elf_section_data (sec)->this_hdr.contents != info.contents)
3865 free (info.contents);
3866 if (internal_relocs != NULL
3867 && elf_section_data (sec)->relocs != internal_relocs)
3868 free (internal_relocs);
3869 return FALSE;
3870}
3871\f
1bbc9cec
RH
3872/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
3873 into the next available slot in SREL. */
3874
3875static void
a7519a3c
RH
3876elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
3877 asection *sec, asection *srel, bfd_vma offset,
3878 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
3879{
3880 Elf_Internal_Rela outrel;
3881 bfd_byte *loc;
3882
3883 BFD_ASSERT (srel != NULL);
3884
3885 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
3886 outrel.r_addend = addend;
3887
3888 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
3889 if ((offset | 1) != (bfd_vma) -1)
3890 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
3891 else
3892 memset (&outrel, 0, sizeof (outrel));
3893
3894 loc = srel->contents;
3895 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
3896 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 3897 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
3898}
3899
4a67a098
RH
3900/* Relocate an Alpha ELF section for a relocatable link.
3901
3902 We don't have to change anything unless the reloc is against a section
3903 symbol, in which case we have to adjust according to where the section
3904 symbol winds up in the output section. */
3905
b34976b6 3906static bfd_boolean
a7519a3c
RH
3907elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
3908 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3909 bfd *input_bfd, asection *input_section,
3910 bfd_byte *contents ATTRIBUTE_UNUSED,
3911 Elf_Internal_Rela *relocs,
3912 Elf_Internal_Sym *local_syms,
3913 asection **local_sections)
4a67a098
RH
3914{
3915 unsigned long symtab_hdr_sh_info;
3916 Elf_Internal_Rela *rel;
3917 Elf_Internal_Rela *relend;
b34976b6 3918 bfd_boolean ret_val = TRUE;
4a67a098
RH
3919
3920 symtab_hdr_sh_info = elf_tdata (input_bfd)->symtab_hdr.sh_info;
3921
3922 relend = relocs + input_section->reloc_count;
3923 for (rel = relocs; rel < relend; rel++)
3924 {
3925 unsigned long r_symndx;
3926 Elf_Internal_Sym *sym;
3927 asection *sec;
3928 unsigned long r_type;
3929
3930 r_type = ELF64_R_TYPE(rel->r_info);
3931 if (r_type >= R_ALPHA_max)
3932 {
3933 (*_bfd_error_handler)
d003868e
AM
3934 (_("%B: unknown relocation type %d"),
3935 input_bfd, (int) r_type);
4a67a098 3936 bfd_set_error (bfd_error_bad_value);
b34976b6 3937 ret_val = FALSE;
4a67a098
RH
3938 continue;
3939 }
3940
3941 r_symndx = ELF64_R_SYM(rel->r_info);
3942
3943 /* The symbol associated with GPDISP and LITUSE is
3944 immaterial. Only the addend is significant. */
3945 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
3946 continue;
3947
3948 if (r_symndx < symtab_hdr_sh_info)
3949 {
3950 sym = local_syms + r_symndx;
3951 if (ELF_ST_TYPE(sym->st_info) == STT_SECTION)
3952 {
3953 sec = local_sections[r_symndx];
3954 rel->r_addend += sec->output_offset + sym->st_value;
3955 }
3956 }
3957 }
3958
3959 return ret_val;
3960}
3961
252b5132
RH
3962/* Relocate an Alpha ELF section. */
3963
b34976b6 3964static bfd_boolean
a7519a3c
RH
3965elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
3966 bfd *input_bfd, asection *input_section,
3967 bfd_byte *contents, Elf_Internal_Rela *relocs,
3968 Elf_Internal_Sym *local_syms,
3969 asection **local_sections)
252b5132 3970{
4a67a098 3971 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
3972 Elf_Internal_Rela *rel;
3973 Elf_Internal_Rela *relend;
4a67a098
RH
3974 asection *sgot, *srel, *srelgot;
3975 bfd *dynobj, *gotobj;
3976 bfd_vma gp, tp_base, dtp_base;
3977 struct alpha_elf_got_entry **local_got_entries;
b34976b6 3978 bfd_boolean ret_val;
252b5132 3979
4a67a098 3980 /* Handle relocatable links with a smaller loop. */
1049f94e 3981 if (info->relocatable)
4a67a098
RH
3982 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
3983 input_section, contents, relocs,
3984 local_syms, local_sections);
3985
3986 /* This is a final link. */
3987
b34976b6 3988 ret_val = TRUE;
252b5132 3989
4a67a098 3990 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3765b1be 3991
4a67a098
RH
3992 dynobj = elf_hash_table (info)->dynobj;
3993 if (dynobj)
3994 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3995 else
3996 srelgot = NULL;
3997
3241278a
RH
3998 if (input_section->flags & SEC_ALLOC)
3999 {
4000 const char *section_name;
4001 section_name = (bfd_elf_string_from_elf_section
4002 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
4003 elf_section_data(input_section)->rel_hdr.sh_name));
4004 BFD_ASSERT(section_name != NULL);
4005 srel = bfd_get_section_by_name (dynobj, section_name);
4006 }
4007 else
4008 srel = NULL;
3765b1be 4009
4a67a098
RH
4010 /* Find the gp value for this input bfd. */
4011 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4012 if (gotobj)
4013 {
4014 sgot = alpha_elf_tdata (gotobj)->got;
4015 gp = _bfd_get_gp_value (gotobj);
4016 if (gp == 0)
252b5132 4017 {
4a67a098
RH
4018 gp = (sgot->output_section->vma
4019 + sgot->output_offset
4020 + 0x8000);
4021 _bfd_set_gp_value (gotobj, gp);
4022 }
4023 }
4024 else
4025 {
4026 sgot = NULL;
4027 gp = 0;
4028 }
3765b1be 4029
4a67a098
RH
4030 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4031
e1918d23 4032 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4033 {
e1918d23
AM
4034 dtp_base = alpha_get_dtprel_base (info);
4035 tp_base = alpha_get_tprel_base (info);
252b5132 4036 }
4a67a098
RH
4037 else
4038 dtp_base = tp_base = 0;
252b5132 4039
252b5132 4040 relend = relocs + input_section->reloc_count;
4a67a098 4041 for (rel = relocs; rel < relend; rel++)
252b5132 4042 {
4a67a098 4043 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4044 struct alpha_elf_got_entry *gotent;
4045 bfd_reloc_status_type r;
252b5132
RH
4046 reloc_howto_type *howto;
4047 unsigned long r_symndx;
4a67a098
RH
4048 Elf_Internal_Sym *sym = NULL;
4049 asection *sec = NULL;
3765b1be 4050 bfd_vma value;
dc810e39 4051 bfd_vma addend;
b34976b6
AM
4052 bfd_boolean dynamic_symbol_p;
4053 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4054 unsigned long r_type;
252b5132
RH
4055
4056 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4057 if (r_type >= R_ALPHA_max)
252b5132 4058 {
3765b1be 4059 (*_bfd_error_handler)
d003868e
AM
4060 (_("%B: unknown relocation type %d"),
4061 input_bfd, (int) r_type);
252b5132 4062 bfd_set_error (bfd_error_bad_value);
b34976b6 4063 ret_val = FALSE;
3765b1be 4064 continue;
252b5132 4065 }
252b5132 4066
3765b1be 4067 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4068 r_symndx = ELF64_R_SYM(rel->r_info);
4069
cc03ec80
RH
4070 /* The symbol for a TLSLDM reloc is ignored. Collapse the
4071 reloc to the 0 symbol so that they all match. */
4072 if (r_type == R_ALPHA_TLSLDM)
4073 r_symndx = 0;
4074
252b5132
RH
4075 if (r_symndx < symtab_hdr->sh_info)
4076 {
8517fae7 4077 asection *msec;
252b5132
RH
4078 sym = local_syms + r_symndx;
4079 sec = local_sections[r_symndx];
8517fae7
AM
4080 msec = sec;
4081 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4082
cc03ec80
RH
4083 /* If this is a tp-relative relocation against sym 0,
4084 this is hackery from relax_section. Force the value to
f915360b 4085 be the tls module base. */
cc03ec80
RH
4086 if (r_symndx == 0
4087 && (r_type == R_ALPHA_TLSLDM
4088 || r_type == R_ALPHA_GOTTPREL
4089 || r_type == R_ALPHA_TPREL64
4090 || r_type == R_ALPHA_TPRELHI
4091 || r_type == R_ALPHA_TPRELLO
4092 || r_type == R_ALPHA_TPREL16))
f915360b 4093 value = dtp_base;
cc03ec80 4094
4a67a098
RH
4095 if (local_got_entries)
4096 gotent = local_got_entries[r_symndx];
4097 else
4098 gotent = NULL;
3765b1be
RH
4099
4100 /* Need to adjust local GOT entries' addends for SEC_MERGE
4101 unless it has been done already. */
4102 if ((sec->flags & SEC_MERGE)
048d873d 4103 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 4104 && sec->sec_info_type == ELF_INFO_TYPE_MERGE
048d873d
RH
4105 && gotent
4106 && !gotent->reloc_xlated)
3765b1be
RH
4107 {
4108 struct alpha_elf_got_entry *ent;
3765b1be
RH
4109
4110 for (ent = gotent; ent; ent = ent->next)
4111 {
4112 ent->reloc_xlated = 1;
4113 if (ent->use_count == 0)
4114 continue;
4115 msec = sec;
4116 ent->addend =
4117 _bfd_merged_section_offset (output_bfd, &msec,
4118 elf_section_data (sec)->
4119 sec_info,
753731ee 4120 sym->st_value + ent->addend);
3765b1be
RH
4121 ent->addend -= sym->st_value;
4122 ent->addend += msec->output_section->vma
4123 + msec->output_offset
4124 - sec->output_section->vma
4125 - sec->output_offset;
4126 }
4127 }
4128
b34976b6 4129 dynamic_symbol_p = FALSE;
252b5132
RH
4130 }
4131 else
4132 {
560e09e9
NC
4133 bfd_boolean warned;
4134 bfd_boolean unresolved_reloc;
4135 struct elf_link_hash_entry *hh;
b2a8e766
AM
4136 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4137
4138 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4139 r_symndx, symtab_hdr, sym_hashes,
4140 hh, sec, value,
4141 unresolved_reloc, warned);
560e09e9
NC
4142
4143 if (warned)
4144 continue;
252b5132 4145
560e09e9
NC
4146 if (value == 0
4147 && ! unresolved_reloc
4148 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4149 undef_weak_ref = TRUE;
3765b1be 4150
560e09e9 4151 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4152 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4153 gotent = h->got_entries;
252b5132 4154 }
3765b1be 4155
252b5132 4156 addend = rel->r_addend;
3765b1be
RH
4157 value += addend;
4158
4159 /* Search for the proper got entry. */
4160 for (; gotent ; gotent = gotent->next)
4161 if (gotent->gotobj == gotobj
4162 && gotent->reloc_type == r_type
4163 && gotent->addend == addend)
4164 break;
252b5132
RH
4165
4166 switch (r_type)
4167 {
4168 case R_ALPHA_GPDISP:
4169 {
4170 bfd_byte *p_ldah, *p_lda;
4171
4172 BFD_ASSERT(gp != 0);
4173
3765b1be
RH
4174 value = (input_section->output_section->vma
4175 + input_section->output_offset
4176 + rel->r_offset);
252b5132 4177
3765b1be 4178 p_ldah = contents + rel->r_offset;
252b5132
RH
4179 p_lda = p_ldah + rel->r_addend;
4180
3765b1be 4181 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4182 p_ldah, p_lda);
4183 }
4184 break;
4185
252b5132 4186 case R_ALPHA_LITERAL:
3765b1be
RH
4187 BFD_ASSERT(sgot != NULL);
4188 BFD_ASSERT(gp != 0);
4189 BFD_ASSERT(gotent != NULL);
4190 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4191
3765b1be
RH
4192 if (!gotent->reloc_done)
4193 {
4194 gotent->reloc_done = 1;
252b5132 4195
3765b1be
RH
4196 bfd_put_64 (output_bfd, value,
4197 sgot->contents + gotent->got_offset);
252b5132 4198
3765b1be
RH
4199 /* If the symbol has been forced local, output a
4200 RELATIVE reloc, otherwise it will be handled in
4201 finish_dynamic_symbol. */
d6ad34f6 4202 if (info->shared && !dynamic_symbol_p && !undef_weak_ref)
1bbc9cec
RH
4203 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4204 gotent->got_offset, 0,
4205 R_ALPHA_RELATIVE, value);
3765b1be 4206 }
252b5132 4207
3765b1be
RH
4208 value = (sgot->output_section->vma
4209 + sgot->output_offset
4210 + gotent->got_offset);
4211 value -= gp;
252b5132
RH
4212 goto default_reloc;
4213
4214 case R_ALPHA_GPREL32:
ec1659c8
RH
4215 /* If the target section was a removed linkonce section,
4216 r_symndx will be zero. In this case, assume that the
4217 switch will not be used, so don't fill it in. If we
4218 do nothing here, we'll get relocation truncated messages,
4219 due to the placement of the application above 4GB. */
4220 if (r_symndx == 0)
4221 {
4222 r = bfd_reloc_ok;
4223 break;
4224 }
4225 /* FALLTHRU */
4226
4227 case R_ALPHA_GPREL16:
252b5132 4228 case R_ALPHA_GPRELLOW:
3765b1be 4229 if (dynamic_symbol_p)
f16fbd61
RH
4230 {
4231 (*_bfd_error_handler)
d003868e
AM
4232 (_("%B: gp-relative relocation against dynamic symbol %s"),
4233 input_bfd, h->root.root.root.string);
b34976b6 4234 ret_val = FALSE;
f16fbd61 4235 }
252b5132 4236 BFD_ASSERT(gp != 0);
3765b1be 4237 value -= gp;
252b5132
RH
4238 goto default_reloc;
4239
4240 case R_ALPHA_GPRELHIGH:
3765b1be 4241 if (dynamic_symbol_p)
f16fbd61
RH
4242 {
4243 (*_bfd_error_handler)
d003868e
AM
4244 (_("%B: gp-relative relocation against dynamic symbol %s"),
4245 input_bfd, h->root.root.root.string);
b34976b6 4246 ret_val = FALSE;
f16fbd61 4247 }
252b5132 4248 BFD_ASSERT(gp != 0);
3765b1be
RH
4249 value -= gp;
4250 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4251 goto default_reloc;
4252
252b5132 4253 case R_ALPHA_HINT:
f94952df
RH
4254 /* A call to a dynamic symbol is definitely out of range of
4255 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4256 if (dynamic_symbol_p)
f94952df
RH
4257 {
4258 r = bfd_reloc_ok;
4259 break;
4260 }
3765b1be
RH
4261 /* The regular PC-relative stuff measures from the start of
4262 the instruction rather than the end. */
4263 value -= 4;
4264 goto default_reloc;
f94952df
RH
4265
4266 case R_ALPHA_BRADDR:
3765b1be
RH
4267 if (dynamic_symbol_p)
4268 {
4269 (*_bfd_error_handler)
d003868e
AM
4270 (_("%B: pc-relative relocation against dynamic symbol %s"),
4271 input_bfd, h->root.root.root.string);
b34976b6 4272 ret_val = FALSE;
3765b1be 4273 }
252b5132
RH
4274 /* The regular PC-relative stuff measures from the start of
4275 the instruction rather than the end. */
3765b1be 4276 value -= 4;
252b5132
RH
4277 goto default_reloc;
4278
7793f4d0
RH
4279 case R_ALPHA_BRSGP:
4280 {
4281 int other;
4282 const char *name;
4283
4284 /* The regular PC-relative stuff measures from the start of
4285 the instruction rather than the end. */
3765b1be 4286 value -= 4;
7793f4d0 4287
ccf00ab6
RH
4288 /* The source and destination gp must be the same. Note that
4289 the source will always have an assigned gp, since we forced
4290 one in check_relocs, but that the destination may not, as
cedb70c5 4291 it might not have had any relocations at all. Also take
ccf00ab6
RH
4292 care not to crash if H is an undefined symbol. */
4293 if (h != NULL && sec != NULL
4294 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4295 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4296 {
7793f4d0 4297 (*_bfd_error_handler)
d003868e
AM
4298 (_("%B: change in gp: BRSGP %s"),
4299 input_bfd, h->root.root.root.string);
b34976b6 4300 ret_val = FALSE;
7793f4d0
RH
4301 }
4302
4303 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4304 if (h != NULL)
4305 other = h->root.other;
4306 else
4307 other = sym->st_other;
4308 switch (other & STO_ALPHA_STD_GPLOAD)
4309 {
4310 case STO_ALPHA_NOPV:
4311 break;
4312 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4313 value += 8;
7793f4d0
RH
4314 break;
4315 default:
4316 if (h != NULL)
4317 name = h->root.root.root.string;
4318 else
4319 {
4320 name = (bfd_elf_string_from_elf_section
4321 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4322 if (name == NULL)
4323 name = _("<unknown>");
4324 else if (name[0] == 0)
4325 name = bfd_section_name (input_bfd, sec);
4326 }
4327 (*_bfd_error_handler)
d003868e
AM
4328 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4329 input_bfd, name);
b34976b6 4330 ret_val = FALSE;
7793f4d0
RH
4331 break;
4332 }
4333
4334 goto default_reloc;
4335 }
4336
252b5132
RH
4337 case R_ALPHA_REFLONG:
4338 case R_ALPHA_REFQUAD:
3765b1be
RH
4339 case R_ALPHA_DTPREL64:
4340 case R_ALPHA_TPREL64:
252b5132 4341 {
1bbc9cec
RH
4342 long dynindx, dyntype = r_type;
4343 bfd_vma dynaddend;
252b5132
RH
4344
4345 /* Careful here to remember RELATIVE relocations for global
4346 variables for symbolic shared objects. */
4347
3765b1be 4348 if (dynamic_symbol_p)
252b5132
RH
4349 {
4350 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4351 dynindx = h->root.dynindx;
4352 dynaddend = addend;
3765b1be
RH
4353 addend = 0, value = 0;
4354 }
4355 else if (r_type == R_ALPHA_DTPREL64)
4356 {
e1918d23 4357 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4358 value -= dtp_base;
4359 goto default_reloc;
4360 }
4361 else if (r_type == R_ALPHA_TPREL64)
4362 {
e1918d23 4363 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4364 if (!info->shared)
4365 {
4366 value -= tp_base;
4367 goto default_reloc;
4368 }
4369 dynindx = 0;
4370 dynaddend = value - dtp_base;
252b5132 4371 }
ec338859
AM
4372 else if (info->shared
4373 && r_symndx != 0
d6ad34f6
RH
4374 && (input_section->flags & SEC_ALLOC)
4375 && !undef_weak_ref)
252b5132 4376 {
3765b1be
RH
4377 if (r_type == R_ALPHA_REFLONG)
4378 {
4379 (*_bfd_error_handler)
d003868e
AM
4380 (_("%B: unhandled dynamic relocation against %s"),
4381 input_bfd,
3765b1be 4382 h->root.root.root.string);
b34976b6 4383 ret_val = FALSE;
3765b1be 4384 }
1bbc9cec
RH
4385 dynindx = 0;
4386 dyntype = R_ALPHA_RELATIVE;
4387 dynaddend = value;
252b5132
RH
4388 }
4389 else
4390 goto default_reloc;
4391
3241278a
RH
4392 if (input_section->flags & SEC_ALLOC)
4393 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4394 srel, rel->r_offset, dynindx,
4395 dyntype, dynaddend);
252b5132
RH
4396 }
4397 goto default_reloc;
4398
3765b1be 4399 case R_ALPHA_SREL16:
84de6048
RH
4400 case R_ALPHA_SREL32:
4401 case R_ALPHA_SREL64:
3765b1be
RH
4402 if (dynamic_symbol_p)
4403 {
4404 (*_bfd_error_handler)
d003868e
AM
4405 (_("%B: pc-relative relocation against dynamic symbol %s"),
4406 input_bfd, h->root.root.root.string);
b34976b6 4407 ret_val = FALSE;
3765b1be 4408 }
d6ad34f6
RH
4409 else if ((info->shared || info->pie) && undef_weak_ref)
4410 {
4411 (*_bfd_error_handler)
4412 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4413 input_bfd, h->root.root.root.string);
4414 ret_val = FALSE;
4415 }
4416
3765b1be 4417
84de6048
RH
4418 /* ??? .eh_frame references to discarded sections will be smashed
4419 to relocations against SHN_UNDEF. The .eh_frame format allows
4420 NULL to be encoded as 0 in any format, so this works here. */
4421 if (r_symndx == 0)
4422 howto = (elf64_alpha_howto_table
4423 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4424 goto default_reloc;
4425
3765b1be
RH
4426 case R_ALPHA_TLSLDM:
4427 /* Ignore the symbol for the relocation. The result is always
4428 the current module. */
4429 dynamic_symbol_p = 0;
4430 /* FALLTHRU */
4431
4432 case R_ALPHA_TLSGD:
4433 if (!gotent->reloc_done)
4434 {
4435 gotent->reloc_done = 1;
4436
4437 /* Note that the module index for the main program is 1. */
4438 bfd_put_64 (output_bfd, !info->shared && !dynamic_symbol_p,
4439 sgot->contents + gotent->got_offset);
4440
4441 /* If the symbol has been forced local, output a
4442 DTPMOD64 reloc, otherwise it will be handled in
4443 finish_dynamic_symbol. */
4444 if (info->shared && !dynamic_symbol_p)
1bbc9cec
RH
4445 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4446 gotent->got_offset, 0,
4447 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4448
4449 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4450 value = 0;
4451 else
4452 {
e1918d23 4453 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4454 value -= dtp_base;
4455 }
4456 bfd_put_64 (output_bfd, value,
4457 sgot->contents + gotent->got_offset + 8);
4458 }
4459
4460 value = (sgot->output_section->vma
4461 + sgot->output_offset
4462 + gotent->got_offset);
4463 value -= gp;
4464 goto default_reloc;
4465
4466 case R_ALPHA_DTPRELHI:
4467 case R_ALPHA_DTPRELLO:
4468 case R_ALPHA_DTPREL16:
4469 if (dynamic_symbol_p)
4470 {
4471 (*_bfd_error_handler)
d003868e
AM
4472 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4473 input_bfd, h->root.root.root.string);
b34976b6 4474 ret_val = FALSE;
3765b1be 4475 }
e1918d23 4476 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4477 value -= dtp_base;
9e756d64
RH
4478 if (r_type == R_ALPHA_DTPRELHI)
4479 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4480 goto default_reloc;
4481
4482 case R_ALPHA_TPRELHI:
4483 case R_ALPHA_TPRELLO:
4484 case R_ALPHA_TPREL16:
9e756d64
RH
4485 if (info->shared)
4486 {
4487 (*_bfd_error_handler)
d003868e
AM
4488 (_("%B: TLS local exec code cannot be linked into shared objects"),
4489 input_bfd);
b34976b6 4490 ret_val = FALSE;
9e756d64
RH
4491 }
4492 else if (dynamic_symbol_p)
3765b1be
RH
4493 {
4494 (*_bfd_error_handler)
d003868e
AM
4495 (_("%B: tp-relative relocation against dynamic symbol %s"),
4496 input_bfd, h->root.root.root.string);
b34976b6 4497 ret_val = FALSE;
3765b1be 4498 }
e1918d23 4499 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4500 value -= tp_base;
9e756d64
RH
4501 if (r_type == R_ALPHA_TPRELHI)
4502 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4503 goto default_reloc;
4504
4505 case R_ALPHA_GOTDTPREL:
4506 case R_ALPHA_GOTTPREL:
4507 BFD_ASSERT(sgot != NULL);
4508 BFD_ASSERT(gp != 0);
4509 BFD_ASSERT(gotent != NULL);
4510 BFD_ASSERT(gotent->use_count >= 1);
4511
4512 if (!gotent->reloc_done)
4513 {
4514 gotent->reloc_done = 1;
4515
4516 if (dynamic_symbol_p)
4517 value = 0;
4518 else
4519 {
e1918d23 4520 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4521 if (r_type == R_ALPHA_GOTDTPREL)
4522 value -= dtp_base;
4523 else if (!info->shared)
4524 value -= tp_base;
4525 else
4526 {
4527 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4528 gotent->got_offset, 0,
4529 R_ALPHA_TPREL64,
4530 value - dtp_base);
4531 value = 0;
4532 }
3765b1be
RH
4533 }
4534 bfd_put_64 (output_bfd, value,
4535 sgot->contents + gotent->got_offset);
4536 }
4537
4538 value = (sgot->output_section->vma
4539 + sgot->output_offset
4540 + gotent->got_offset);
4541 value -= gp;
4542 goto default_reloc;
4543
252b5132
RH
4544 default:
4545 default_reloc:
4546 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4547 contents, rel->r_offset, value, 0);
252b5132
RH
4548 break;
4549 }
4550
4551 switch (r)
4552 {
4553 case bfd_reloc_ok:
4554 break;
4555
4556 case bfd_reloc_overflow:
4557 {
4558 const char *name;
4559
ed4de5e2
JJ
4560 /* Don't warn if the overflow is due to pc relative reloc
4561 against discarded section. Section optimization code should
4562 handle it. */
4563
4564 if (r_symndx < symtab_hdr->sh_info
4565 && sec != NULL && howto->pc_relative
4566 && elf_discarded_section (sec))
4567 break;
4568
252b5132 4569 if (h != NULL)
dfeffb9f 4570 name = NULL;
252b5132
RH
4571 else
4572 {
4573 name = (bfd_elf_string_from_elf_section
4574 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4575 if (name == NULL)
b34976b6 4576 return FALSE;
252b5132
RH
4577 if (*name == '\0')
4578 name = bfd_section_name (input_bfd, sec);
4579 }
4580 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
4581 (info, (h ? &h->root.root : NULL), name, howto->name,
4582 (bfd_vma) 0, input_bfd, input_section,
4583 rel->r_offset)))
b34976b6 4584 ret_val = FALSE;
252b5132
RH
4585 }
4586 break;
4587
4588 default:
4589 case bfd_reloc_outofrange:
4590 abort ();
4591 }
4592 }
4593
f16fbd61 4594 return ret_val;
252b5132
RH
4595}
4596
4597/* Finish up dynamic symbol handling. We set the contents of various
4598 dynamic sections here. */
4599
b34976b6 4600static bfd_boolean
a7519a3c
RH
4601elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4602 struct elf_link_hash_entry *h,
4603 Elf_Internal_Sym *sym)
252b5132 4604{
6ec7057a 4605 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132
RH
4606 bfd *dynobj = elf_hash_table(info)->dynobj;
4607
6ec7057a 4608 if (h->needs_plt)
252b5132
RH
4609 {
4610 /* Fill in the .plt entry for this symbol. */
4611 asection *splt, *sgot, *srel;
4612 Elf_Internal_Rela outrel;
947216bf 4613 bfd_byte *loc;
252b5132
RH
4614 bfd_vma got_addr, plt_addr;
4615 bfd_vma plt_index;
4616 struct alpha_elf_got_entry *gotent;
4617
4618 BFD_ASSERT (h->dynindx != -1);
4619
252b5132
RH
4620 splt = bfd_get_section_by_name (dynobj, ".plt");
4621 BFD_ASSERT (splt != NULL);
4622 srel = bfd_get_section_by_name (dynobj, ".rela.plt");
4623 BFD_ASSERT (srel != NULL);
252b5132 4624
6ec7057a
RH
4625 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4626 if (gotent->reloc_type == R_ALPHA_LITERAL
4627 && gotent->use_count > 0)
4628 {
4629 unsigned int insn;
4630 int disp;
252b5132 4631
6ec7057a
RH
4632 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4633 BFD_ASSERT (sgot != NULL);
252b5132 4634
6ec7057a
RH
4635 BFD_ASSERT (gotent->got_offset != -1);
4636 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4637
6ec7057a
RH
4638 got_addr = (sgot->output_section->vma
4639 + sgot->output_offset
4640 + gotent->got_offset);
4641 plt_addr = (splt->output_section->vma
4642 + splt->output_offset
4643 + gotent->plt_offset);
252b5132 4644
6ec7057a 4645 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4646
6ec7057a
RH
4647 /* Fill in the entry in the procedure linkage table. */
4648 if (elf64_alpha_use_secureplt)
4649 {
4650 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4651 insn = INSN_AD (INSN_BR, 31, disp);
4652 bfd_put_32 (output_bfd, insn,
4653 splt->contents + gotent->plt_offset);
252b5132 4654
6ec7057a
RH
4655 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4656 / NEW_PLT_ENTRY_SIZE);
4657 }
4658 else
4659 {
4660 disp = -(gotent->plt_offset + 4);
4661 insn = INSN_AD (INSN_BR, 28, disp);
4662 bfd_put_32 (output_bfd, insn,
4663 splt->contents + gotent->plt_offset);
4664 bfd_put_32 (output_bfd, INSN_UNOP,
4665 splt->contents + gotent->plt_offset + 4);
4666 bfd_put_32 (output_bfd, INSN_UNOP,
4667 splt->contents + gotent->plt_offset + 8);
4668
4669 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4670 / OLD_PLT_ENTRY_SIZE);
4671 }
252b5132 4672
6ec7057a
RH
4673 /* Fill in the entry in the .rela.plt section. */
4674 outrel.r_offset = got_addr;
4675 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4676 outrel.r_addend = 0;
252b5132 4677
6ec7057a
RH
4678 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4679 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4680
6ec7057a
RH
4681 /* Fill in the entry in the .got. */
4682 bfd_put_64 (output_bfd, plt_addr,
4683 sgot->contents + gotent->got_offset);
4684 }
252b5132
RH
4685 }
4686 else if (alpha_elf_dynamic_symbol_p (h, info))
4687 {
4688 /* Fill in the dynamic relocations for this symbol's .got entries. */
4689 asection *srel;
252b5132
RH
4690 struct alpha_elf_got_entry *gotent;
4691
4692 srel = bfd_get_section_by_name (dynobj, ".rela.got");
4693 BFD_ASSERT (srel != NULL);
4694
252b5132
RH
4695 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4696 gotent != NULL;
4697 gotent = gotent->next)
4698 {
f44f99a5 4699 asection *sgot;
1bbc9cec 4700 long r_type;
3765b1be 4701
f44f99a5
RH
4702 if (gotent->use_count == 0)
4703 continue;
4704
4705 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4706
4707 r_type = gotent->reloc_type;
4708 switch (r_type)
4709 {
4710 case R_ALPHA_LITERAL:
4711 r_type = R_ALPHA_GLOB_DAT;
4712 break;
4713 case R_ALPHA_TLSGD:
4714 r_type = R_ALPHA_DTPMOD64;
4715 break;
4716 case R_ALPHA_GOTDTPREL:
4717 r_type = R_ALPHA_DTPREL64;
4718 break;
4719 case R_ALPHA_GOTTPREL:
4720 r_type = R_ALPHA_TPREL64;
4721 break;
4722 case R_ALPHA_TLSLDM:
4723 default:
4724 abort ();
4725 }
4726
1bbc9cec
RH
4727 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4728 gotent->got_offset, h->dynindx,
4729 r_type, gotent->addend);
3765b1be
RH
4730
4731 if (gotent->reloc_type == R_ALPHA_TLSGD)
1bbc9cec
RH
4732 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4733 gotent->got_offset + 8, h->dynindx,
4734 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4735 }
4736 }
4737
4738 /* Mark some specially defined symbols as absolute. */
4739 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
4740 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0
4741 || strcmp (h->root.root.string, "_PROCEDURE_LINKAGE_TABLE_") == 0)
4742 sym->st_shndx = SHN_ABS;
4743
b34976b6 4744 return TRUE;
252b5132
RH
4745}
4746
4747/* Finish up the dynamic sections. */
4748
b34976b6 4749static bfd_boolean
a7519a3c
RH
4750elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4751 struct bfd_link_info *info)
252b5132
RH
4752{
4753 bfd *dynobj;
4754 asection *sdyn;
4755
4756 dynobj = elf_hash_table (info)->dynobj;
4757 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4758
4759 if (elf_hash_table (info)->dynamic_sections_created)
4760 {
6ec7057a 4761 asection *splt, *sgotplt, *srelaplt;
252b5132 4762 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4763 bfd_vma plt_vma, gotplt_vma;
252b5132
RH
4764
4765 splt = bfd_get_section_by_name (dynobj, ".plt");
6ec7057a 4766 srelaplt = bfd_get_section_by_name (output_bfd, ".rela.plt");
252b5132
RH
4767 BFD_ASSERT (splt != NULL && sdyn != NULL);
4768
6ec7057a
RH
4769 plt_vma = splt->output_section->vma + splt->output_offset;
4770
4771 gotplt_vma = 0;
4772 if (elf64_alpha_use_secureplt)
4773 {
4774 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
4775 BFD_ASSERT (sgotplt != NULL);
4776 if (sgotplt->size > 0)
4777 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4778 }
4779
252b5132 4780 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4781 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4782 for (; dyncon < dynconend; dyncon++)
4783 {
4784 Elf_Internal_Dyn dyn;
252b5132
RH
4785
4786 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4787
4788 switch (dyn.d_tag)
4789 {
4790 case DT_PLTGOT:
6ec7057a
RH
4791 dyn.d_un.d_ptr
4792 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4793 break;
252b5132 4794 case DT_PLTRELSZ:
6ec7057a
RH
4795 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4796 break;
252b5132 4797 case DT_JMPREL:
6ec7057a
RH
4798 dyn.d_un.d_ptr = srelaplt ? srelaplt->vma : 0;
4799 break;
252b5132
RH
4800
4801 case DT_RELASZ:
4802 /* My interpretation of the TIS v1.1 ELF document indicates
4803 that RELASZ should not include JMPREL. This is not what
4804 the rest of the BFD does. It is, however, what the
4805 glibc ld.so wants. Do this fixup here until we found
4806 out who is right. */
6ec7057a
RH
4807 if (srelaplt)
4808 dyn.d_un.d_val -= srelaplt->size;
252b5132
RH
4809 break;
4810 }
4811
4812 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4813 }
4814
6ec7057a 4815 /* Initialize the plt header. */
eea6121a 4816 if (splt->size > 0)
252b5132 4817 {
6ec7057a
RH
4818 unsigned int insn;
4819 int ofs;
4820
4821 if (elf64_alpha_use_secureplt)
4822 {
4823 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
4824
4825 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
4826 bfd_put_32 (output_bfd, insn, splt->contents);
4827
4828 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
4829 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4830
4831 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
4832 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4833
4834 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
4835 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4836
4837 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
4838 bfd_put_32 (output_bfd, insn, splt->contents + 16);
4839
4840 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
4841 bfd_put_32 (output_bfd, insn, splt->contents + 20);
4842
4843 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
4844 bfd_put_32 (output_bfd, insn, splt->contents + 24);
4845
4846 insn = INSN_AB (INSN_JMP, 31, 27);
4847 bfd_put_32 (output_bfd, insn, splt->contents + 28);
4848
4849 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
4850 bfd_put_32 (output_bfd, insn, splt->contents + 32);
4851 }
4852 else
4853 {
4854 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
4855 bfd_put_32 (output_bfd, insn, splt->contents);
4856
4857 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
4858 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4859
4860 insn = INSN_UNOP;
4861 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4862
4863 insn = INSN_AB (INSN_JMP, 27, 27);
4864 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4865
4866 /* The next two words will be filled in by ld.so. */
4867 bfd_put_64 (output_bfd, 0, splt->contents + 16);
4868 bfd_put_64 (output_bfd, 0, splt->contents + 24);
4869 }
252b5132 4870
eecdbe52 4871 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
4872 }
4873 }
4874
b34976b6 4875 return TRUE;
252b5132
RH
4876}
4877
96e2734b
RH
4878/* We need to use a special link routine to handle the .mdebug section.
4879 We need to merge all instances of these sections together, not write
4880 them all out sequentially. */
252b5132 4881
b34976b6 4882static bfd_boolean
a7519a3c 4883elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
4884{
4885 asection *o;
4886 struct bfd_link_order *p;
96e2734b 4887 asection *mdebug_sec;
252b5132
RH
4888 struct ecoff_debug_info debug;
4889 const struct ecoff_debug_swap *swap
4890 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
4891 HDRR *symhdr = &debug.symbolic_header;
4892 PTR mdebug_handle = NULL;
4893
96e2734b 4894 /* Go through the sections and collect the mdebug information. */
252b5132 4895 mdebug_sec = NULL;
252b5132
RH
4896 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4897 {
252b5132
RH
4898 if (strcmp (o->name, ".mdebug") == 0)
4899 {
4900 struct extsym_info einfo;
4901
4902 /* We have found the .mdebug section in the output file.
4903 Look through all the link_orders comprising it and merge
4904 the information together. */
4905 symhdr->magic = swap->sym_magic;
4906 /* FIXME: What should the version stamp be? */
4907 symhdr->vstamp = 0;
4908 symhdr->ilineMax = 0;
4909 symhdr->cbLine = 0;
4910 symhdr->idnMax = 0;
4911 symhdr->ipdMax = 0;
4912 symhdr->isymMax = 0;
4913 symhdr->ioptMax = 0;
4914 symhdr->iauxMax = 0;
4915 symhdr->issMax = 0;
4916 symhdr->issExtMax = 0;
4917 symhdr->ifdMax = 0;
4918 symhdr->crfd = 0;
4919 symhdr->iextMax = 0;
4920
4921 /* We accumulate the debugging information itself in the
4922 debug_info structure. */
4923 debug.line = NULL;
4924 debug.external_dnr = NULL;
4925 debug.external_pdr = NULL;
4926 debug.external_sym = NULL;
4927 debug.external_opt = NULL;
4928 debug.external_aux = NULL;
4929 debug.ss = NULL;
4930 debug.ssext = debug.ssext_end = NULL;
4931 debug.external_fdr = NULL;
4932 debug.external_rfd = NULL;
4933 debug.external_ext = debug.external_ext_end = NULL;
4934
4935 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
4936 if (mdebug_handle == (PTR) NULL)
b34976b6 4937 return FALSE;
252b5132
RH
4938
4939 if (1)
4940 {
4941 asection *s;
4942 EXTR esym;
52b9d213 4943 bfd_vma last = 0;
252b5132
RH
4944 unsigned int i;
4945 static const char * const name[] =
4946 {
4947 ".text", ".init", ".fini", ".data",
4948 ".rodata", ".sdata", ".sbss", ".bss"
4949 };
4950 static const int sc[] = { scText, scInit, scFini, scData,
4951 scRData, scSData, scSBss, scBss };
4952
4953 esym.jmptbl = 0;
4954 esym.cobol_main = 0;
4955 esym.weakext = 0;
4956 esym.reserved = 0;
4957 esym.ifd = ifdNil;
4958 esym.asym.iss = issNil;
4959 esym.asym.st = stLocal;
4960 esym.asym.reserved = 0;
4961 esym.asym.index = indexNil;
4962 for (i = 0; i < 8; i++)
4963 {
4964 esym.asym.sc = sc[i];
4965 s = bfd_get_section_by_name (abfd, name[i]);
4966 if (s != NULL)
4967 {
4968 esym.asym.value = s->vma;
eea6121a 4969 last = s->vma + s->size;
252b5132
RH
4970 }
4971 else
4972 esym.asym.value = last;
4973
4974 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
4975 name[i], &esym))
b34976b6 4976 return FALSE;
252b5132
RH
4977 }
4978 }
4979
8423293d 4980 for (p = o->map_head.link_order;
252b5132
RH
4981 p != (struct bfd_link_order *) NULL;
4982 p = p->next)
4983 {
4984 asection *input_section;
4985 bfd *input_bfd;
4986 const struct ecoff_debug_swap *input_swap;
4987 struct ecoff_debug_info input_debug;
4988 char *eraw_src;
4989 char *eraw_end;
4990
4991 if (p->type != bfd_indirect_link_order)
4992 {
fd96f80f 4993 if (p->type == bfd_data_link_order)
252b5132
RH
4994 continue;
4995 abort ();
4996 }
4997
4998 input_section = p->u.indirect.section;
4999 input_bfd = input_section->owner;
5000
5001 if (bfd_get_flavour (input_bfd) != bfd_target_elf_flavour
5002 || (get_elf_backend_data (input_bfd)
5003 ->elf_backend_ecoff_debug_swap) == NULL)
5004 {
5005 /* I don't know what a non ALPHA ELF bfd would be
5006 doing with a .mdebug section, but I don't really
5007 want to deal with it. */
5008 continue;
5009 }
5010
5011 input_swap = (get_elf_backend_data (input_bfd)
5012 ->elf_backend_ecoff_debug_swap);
5013
eea6121a 5014 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5015
5016 /* The ECOFF linking code expects that we have already
5017 read in the debugging information and set up an
5018 ecoff_debug_info structure, so we do that now. */
5019 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5020 &input_debug))
b34976b6 5021 return FALSE;
252b5132
RH
5022
5023 if (! (bfd_ecoff_debug_accumulate
5024 (mdebug_handle, abfd, &debug, swap, input_bfd,
5025 &input_debug, input_swap, info)))
b34976b6 5026 return FALSE;
252b5132
RH
5027
5028 /* Loop through the external symbols. For each one with
5029 interesting information, try to find the symbol in
5030 the linker global hash table and save the information
5031 for the output external symbols. */
5032 eraw_src = input_debug.external_ext;
5033 eraw_end = (eraw_src
5034 + (input_debug.symbolic_header.iextMax
5035 * input_swap->external_ext_size));
5036 for (;
5037 eraw_src < eraw_end;
5038 eraw_src += input_swap->external_ext_size)
5039 {
5040 EXTR ext;
5041 const char *name;
5042 struct alpha_elf_link_hash_entry *h;
5043
5044 (*input_swap->swap_ext_in) (input_bfd, (PTR) eraw_src, &ext);
5045 if (ext.asym.sc == scNil
5046 || ext.asym.sc == scUndefined
5047 || ext.asym.sc == scSUndefined)
5048 continue;
5049
5050 name = input_debug.ssext + ext.asym.iss;
5051 h = alpha_elf_link_hash_lookup (alpha_elf_hash_table (info),
b34976b6 5052 name, FALSE, FALSE, TRUE);
252b5132
RH
5053 if (h == NULL || h->esym.ifd != -2)
5054 continue;
5055
5056 if (ext.ifd != -1)
5057 {
5058 BFD_ASSERT (ext.ifd
5059 < input_debug.symbolic_header.ifdMax);
5060 ext.ifd = input_debug.ifdmap[ext.ifd];
5061 }
5062
5063 h->esym = ext;
5064 }
5065
5066 /* Free up the information we just read. */
5067 free (input_debug.line);
5068 free (input_debug.external_dnr);
5069 free (input_debug.external_pdr);
5070 free (input_debug.external_sym);
5071 free (input_debug.external_opt);
5072 free (input_debug.external_aux);
5073 free (input_debug.ss);
5074 free (input_debug.ssext);
5075 free (input_debug.external_fdr);
5076 free (input_debug.external_rfd);
5077 free (input_debug.external_ext);
5078
5079 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5080 elf_link_input_bfd ignores this section. */
5081 input_section->flags &=~ SEC_HAS_CONTENTS;
5082 }
5083
252b5132
RH
5084 /* Build the external symbol information. */
5085 einfo.abfd = abfd;
5086 einfo.info = info;
5087 einfo.debug = &debug;
5088 einfo.swap = swap;
b34976b6 5089 einfo.failed = FALSE;
252b5132
RH
5090 elf_link_hash_traverse (elf_hash_table (info),
5091 elf64_alpha_output_extsym,
5092 (PTR) &einfo);
5093 if (einfo.failed)
b34976b6 5094 return FALSE;
252b5132
RH
5095
5096 /* Set the size of the .mdebug section. */
eea6121a 5097 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5098
5099 /* Skip this section later on (I don't think this currently
5100 matters, but someday it might). */
8423293d 5101 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5102
5103 mdebug_sec = o;
5104 }
252b5132
RH
5105 }
5106
5107 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5108 if (! bfd_elf_final_link (abfd, info))
b34976b6 5109 return FALSE;
252b5132
RH
5110
5111 /* Now write out the computed sections. */
5112
5113 /* The .got subsections... */
5114 {
5115 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
5116 for (i = alpha_elf_hash_table(info)->got_list;
5117 i != NULL;
5118 i = alpha_elf_tdata(i)->got_link_next)
5119 {
5120 asection *sgot;
5121
5122 /* elf_bfd_final_link already did everything in dynobj. */
5123 if (i == dynobj)
5124 continue;
5125
5126 sgot = alpha_elf_tdata(i)->got;
5127 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5128 sgot->contents,
5129 (file_ptr) sgot->output_offset,
eea6121a 5130 sgot->size))
b34976b6 5131 return FALSE;
252b5132
RH
5132 }
5133 }
5134
252b5132
RH
5135 if (mdebug_sec != (asection *) NULL)
5136 {
5137 BFD_ASSERT (abfd->output_has_begun);
5138 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5139 swap, info,
5140 mdebug_sec->filepos))
b34976b6 5141 return FALSE;
252b5132
RH
5142
5143 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5144 }
5145
b34976b6 5146 return TRUE;
252b5132 5147}
fcfbdf31
JJ
5148
5149static enum elf_reloc_type_class
a7519a3c 5150elf64_alpha_reloc_type_class (const Elf_Internal_Rela *rela)
fcfbdf31 5151{
f51e552e 5152 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5153 {
5154 case R_ALPHA_RELATIVE:
5155 return reloc_class_relative;
5156 case R_ALPHA_JMP_SLOT:
5157 return reloc_class_plt;
5158 case R_ALPHA_COPY:
5159 return reloc_class_copy;
5160 default:
5161 return reloc_class_normal;
5162 }
5163}
252b5132 5164\f
b35d266b 5165static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5166{
7dcb9820 5167 { ".sbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
551b43fd 5168 { ".sdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
7dcb9820 5169 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5170};
5171
551b43fd
AM
5172static const struct bfd_elf_special_section *
5173elf64_alpha_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 5174{
b35d266b 5175 const struct bfd_elf_special_section *ssect;
551b43fd
AM
5176
5177 /* See if this is one of the special sections. */
5178 if (sec->name == NULL)
5179 return NULL;
5180
5181 ssect = _bfd_elf_get_special_section (sec->name,
5182 elf64_alpha_special_sections,
5183 sec->use_rela_p);
5184 if (ssect != NULL)
5185 return ssect;
5186
5187 return _bfd_elf_get_sec_type_attr (abfd, sec);
5188}
7f4d3958 5189
252b5132
RH
5190/* ECOFF swapping routines. These are used when dealing with the
5191 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5192 from elf32-mips.c. */
252b5132
RH
5193static const struct ecoff_debug_swap
5194elf64_alpha_ecoff_debug_swap =
5195{
5196 /* Symbol table magic number. */
5197 magicSym2,
5198 /* Alignment of debugging information. E.g., 4. */
5199 8,
5200 /* Sizes of external symbolic information. */
5201 sizeof (struct hdr_ext),
5202 sizeof (struct dnr_ext),
5203 sizeof (struct pdr_ext),
5204 sizeof (struct sym_ext),
5205 sizeof (struct opt_ext),
5206 sizeof (struct fdr_ext),
5207 sizeof (struct rfd_ext),
5208 sizeof (struct ext_ext),
5209 /* Functions to swap in external symbolic data. */
5210 ecoff_swap_hdr_in,
5211 ecoff_swap_dnr_in,
5212 ecoff_swap_pdr_in,
5213 ecoff_swap_sym_in,
5214 ecoff_swap_opt_in,
5215 ecoff_swap_fdr_in,
5216 ecoff_swap_rfd_in,
5217 ecoff_swap_ext_in,
5218 _bfd_ecoff_swap_tir_in,
5219 _bfd_ecoff_swap_rndx_in,
5220 /* Functions to swap out external symbolic data. */
5221 ecoff_swap_hdr_out,
5222 ecoff_swap_dnr_out,
5223 ecoff_swap_pdr_out,
5224 ecoff_swap_sym_out,
5225 ecoff_swap_opt_out,
5226 ecoff_swap_fdr_out,
5227 ecoff_swap_rfd_out,
5228 ecoff_swap_ext_out,
5229 _bfd_ecoff_swap_tir_out,
5230 _bfd_ecoff_swap_rndx_out,
5231 /* Function to read in symbolic data. */
5232 elf64_alpha_read_ecoff_info
5233};
5234\f
70bcb145
JW
5235/* Use a non-standard hash bucket size of 8. */
5236
562ace6b 5237static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5238{
5239 sizeof (Elf64_External_Ehdr),
5240 sizeof (Elf64_External_Phdr),
5241 sizeof (Elf64_External_Shdr),
5242 sizeof (Elf64_External_Rel),
5243 sizeof (Elf64_External_Rela),
5244 sizeof (Elf64_External_Sym),
5245 sizeof (Elf64_External_Dyn),
5246 sizeof (Elf_External_Note),
5247 8,
5248 1,
45d6a902 5249 64, 3,
70bcb145
JW
5250 ELFCLASS64, EV_CURRENT,
5251 bfd_elf64_write_out_phdrs,
5252 bfd_elf64_write_shdrs_and_ehdr,
5253 bfd_elf64_write_relocs,
73ff0d56 5254 bfd_elf64_swap_symbol_in,
70bcb145
JW
5255 bfd_elf64_swap_symbol_out,
5256 bfd_elf64_slurp_reloc_table,
5257 bfd_elf64_slurp_symbol_table,
5258 bfd_elf64_swap_dyn_in,
5259 bfd_elf64_swap_dyn_out,
947216bf
AM
5260 bfd_elf64_swap_reloc_in,
5261 bfd_elf64_swap_reloc_out,
5262 bfd_elf64_swap_reloca_in,
5263 bfd_elf64_swap_reloca_out
70bcb145
JW
5264};
5265
252b5132
RH
5266#define TARGET_LITTLE_SYM bfd_elf64_alpha_vec
5267#define TARGET_LITTLE_NAME "elf64-alpha"
5268#define ELF_ARCH bfd_arch_alpha
56fc028e
AJ
5269#define ELF_MACHINE_CODE EM_ALPHA
5270#define ELF_MAXPAGESIZE 0x10000
252b5132
RH
5271
5272#define bfd_elf64_bfd_link_hash_table_create \
5273 elf64_alpha_bfd_link_hash_table_create
5274
5275#define bfd_elf64_bfd_reloc_type_lookup \
5276 elf64_alpha_bfd_reloc_type_lookup
5277#define elf_info_to_howto \
5278 elf64_alpha_info_to_howto
5279
5280#define bfd_elf64_mkobject \
5281 elf64_alpha_mkobject
5282#define elf_backend_object_p \
5283 elf64_alpha_object_p
5284
5285#define elf_backend_section_from_shdr \
5286 elf64_alpha_section_from_shdr
204692d7
RH
5287#define elf_backend_section_flags \
5288 elf64_alpha_section_flags
252b5132
RH
5289#define elf_backend_fake_sections \
5290 elf64_alpha_fake_sections
5291
5292#define bfd_elf64_bfd_is_local_label_name \
5293 elf64_alpha_is_local_label_name
5294#define bfd_elf64_find_nearest_line \
5295 elf64_alpha_find_nearest_line
5296#define bfd_elf64_bfd_relax_section \
5297 elf64_alpha_relax_section
5298
5299#define elf_backend_add_symbol_hook \
5300 elf64_alpha_add_symbol_hook
5301#define elf_backend_check_relocs \
5302 elf64_alpha_check_relocs
5303#define elf_backend_create_dynamic_sections \
5304 elf64_alpha_create_dynamic_sections
5305#define elf_backend_adjust_dynamic_symbol \
5306 elf64_alpha_adjust_dynamic_symbol
5307#define elf_backend_always_size_sections \
5308 elf64_alpha_always_size_sections
5309#define elf_backend_size_dynamic_sections \
5310 elf64_alpha_size_dynamic_sections
5311#define elf_backend_relocate_section \
5312 elf64_alpha_relocate_section
5313#define elf_backend_finish_dynamic_symbol \
5314 elf64_alpha_finish_dynamic_symbol
5315#define elf_backend_finish_dynamic_sections \
5316 elf64_alpha_finish_dynamic_sections
5317#define bfd_elf64_bfd_final_link \
5318 elf64_alpha_final_link
fcfbdf31
JJ
5319#define elf_backend_reloc_type_class \
5320 elf64_alpha_reloc_type_class
252b5132
RH
5321
5322#define elf_backend_ecoff_debug_swap \
5323 &elf64_alpha_ecoff_debug_swap
5324
70bcb145
JW
5325#define elf_backend_size_info \
5326 alpha_elf_size_info
5327
551b43fd
AM
5328#define elf_backend_get_sec_type_attr \
5329 elf64_alpha_get_sec_type_attr
2f89ff8d 5330
38b1a46c 5331/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5332#define elf_backend_want_got_plt 0
5333#define elf_backend_plt_readonly 0
5334#define elf_backend_want_plt_sym 1
5335#define elf_backend_got_header_size 0
252b5132
RH
5336
5337#include "elf64-target.h"
2238051f
RH
5338\f
5339/* FreeBSD support. */
5340
5341#undef TARGET_LITTLE_SYM
5342#define TARGET_LITTLE_SYM bfd_elf64_alpha_freebsd_vec
5343#undef TARGET_LITTLE_NAME
5344#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
5345
5346/* The kernel recognizes executables as valid only if they carry a
5347 "FreeBSD" label in the ELF header. So we put this label on all
5348 executables and (for simplicity) also all other object files. */
5349
2238051f 5350static void
a7519a3c
RH
5351elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5352 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5353{
5354 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5355
5356 i_ehdrp = elf_elfheader (abfd);
5357
5358 /* Put an ABI label supported by FreeBSD >= 4.1. */
5359 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_FREEBSD;
5360#ifdef OLD_FREEBSD_ABI_LABEL
5361 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5362 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5363#endif
5364}
5365
5366#undef elf_backend_post_process_headers
5367#define elf_backend_post_process_headers \
5368 elf64_alpha_fbsd_post_process_headers
5369
571fe01f 5370#undef elf64_bed
2238051f
RH
5371#define elf64_bed elf64_alpha_fbsd_bed
5372
5373#include "elf64-target.h"
This page took 0.655298 seconds and 4 git commands to generate.