* elf32-ppc.c (ppc_elf_adjust_dynamic_symbol): Ignore dynamic
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
77cfaee6 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005
7898deda 3 Free Software Foundation, Inc.
252b5132
RH
4 Contributed by Richard Henderson <rth@tamu.edu>.
5
571fe01f 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
571fe01f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
571fe01f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
571fe01f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132
RH
21
22/* We need a published ABI spec for this. Until one comes out, don't
23 assume this'll remain unchanged forever. */
24
25#include "bfd.h"
26#include "sysdep.h"
27#include "libbfd.h"
28#include "elf-bfd.h"
29
30#include "elf/alpha.h"
31
32#define ALPHAECOFF
33
34#define NO_COFF_RELOCS
35#define NO_COFF_SYMBOLS
36#define NO_COFF_LINENOS
37
fe8bc63d 38/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
39#include "coff/internal.h"
40#include "coff/sym.h"
41#include "coff/symconst.h"
42#include "coff/ecoff.h"
43#include "coff/alpha.h"
44#include "aout/ar.h"
45#include "libcoff.h"
46#include "libecoff.h"
47#define ECOFF_64
48#include "ecoffswap.h"
49
6ec7057a
RH
50\f
51/* Instruction data for plt generation and relaxation. */
52
53#define OP_LDA 0x08
54#define OP_LDAH 0x09
55#define OP_LDQ 0x29
56#define OP_BR 0x30
57#define OP_BSR 0x34
58
59#define INSN_LDA (OP_LDA << 26)
60#define INSN_LDAH (OP_LDAH << 26)
61#define INSN_LDQ (OP_LDQ << 26)
62#define INSN_BR (OP_BR << 26)
63
64#define INSN_ADDQ 0x40000400
65#define INSN_RDUNIQ 0x0000009e
66#define INSN_SUBQ 0x40000520
67#define INSN_S4SUBQ 0x40000560
68#define INSN_UNOP 0x2ffe0000
69
70#define INSN_JSR 0x68004000
71#define INSN_JMP 0x68000000
72#define INSN_JSR_MASK 0xfc00c000
73
74#define INSN_A(I,A) (I | (A << 21))
75#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
76#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
77#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
78#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
79
80/* PLT/GOT Stuff */
81
82/* Set by ld emulation. Putting this into the link_info or hash structure
83 is simply working too hard. */
84#ifdef USE_SECUREPLT
85bfd_boolean elf64_alpha_use_secureplt = TRUE;
86#else
87bfd_boolean elf64_alpha_use_secureplt = FALSE;
88#endif
89
90#define OLD_PLT_HEADER_SIZE 32
91#define OLD_PLT_ENTRY_SIZE 12
92#define NEW_PLT_HEADER_SIZE 36
93#define NEW_PLT_ENTRY_SIZE 4
94
95#define PLT_HEADER_SIZE \
96 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
97#define PLT_ENTRY_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
99
100#define MAX_GOT_SIZE (64*1024)
101
102#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132
RH
103\f
104struct alpha_elf_link_hash_entry
105{
106 struct elf_link_hash_entry root;
107
108 /* External symbol information. */
109 EXTR esym;
110
111 /* Cumulative flags for all the .got entries. */
112 int flags;
113
9e756d64 114 /* Contexts in which a literal was referenced. */
8288a39e
RH
115#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
116#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
117#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
118#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
119#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
120#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
121#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
122#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
123#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 124
252b5132
RH
125 /* Used to implement multiple .got subsections. */
126 struct alpha_elf_got_entry
127 {
128 struct alpha_elf_got_entry *next;
129
571fe01f 130 /* Which .got subsection? */
252b5132
RH
131 bfd *gotobj;
132
571fe01f 133 /* The addend in effect for this entry. */
dc810e39 134 bfd_vma addend;
252b5132 135
571fe01f 136 /* The .got offset for this entry. */
252b5132
RH
137 int got_offset;
138
6ec7057a
RH
139 /* The .plt offset for this entry. */
140 int plt_offset;
141
3765b1be
RH
142 /* How many references to this entry? */
143 int use_count;
252b5132 144
3765b1be
RH
145 /* The relocation type of this entry. */
146 unsigned char reloc_type;
252b5132 147
3765b1be
RH
148 /* How a LITERAL is used. */
149 unsigned char flags;
150
151 /* Have we initialized the dynamic relocation for this entry? */
152 unsigned char reloc_done;
153
154 /* Have we adjusted this entry for SEC_MERGE? */
155 unsigned char reloc_xlated;
252b5132
RH
156 } *got_entries;
157
571fe01f 158 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132
RH
159 of relocation sections. */
160 struct alpha_elf_reloc_entry
161 {
162 struct alpha_elf_reloc_entry *next;
163
571fe01f 164 /* Which .reloc section? */
252b5132
RH
165 asection *srel;
166
571fe01f 167 /* What kind of relocation? */
fcfbdf31
JJ
168 unsigned int rtype;
169
571fe01f 170 /* Is this against read-only section? */
fcfbdf31 171 unsigned int reltext : 1;
252b5132 172
571fe01f 173 /* How many did we find? */
252b5132
RH
174 unsigned long count;
175 } *reloc_entries;
176};
177
178/* Alpha ELF linker hash table. */
179
180struct alpha_elf_link_hash_table
181{
182 struct elf_link_hash_table root;
183
184 /* The head of a list of .got subsections linked through
185 alpha_elf_tdata(abfd)->got_link_next. */
186 bfd *got_list;
187};
188
189/* Look up an entry in a Alpha ELF linker hash table. */
190
191#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
192 ((struct alpha_elf_link_hash_entry *) \
193 elf_link_hash_lookup (&(table)->root, (string), (create), \
194 (copy), (follow)))
195
196/* Traverse a Alpha ELF linker hash table. */
197
198#define alpha_elf_link_hash_traverse(table, func, info) \
199 (elf_link_hash_traverse \
200 (&(table)->root, \
a7519a3c 201 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
252b5132
RH
202 (info)))
203
204/* Get the Alpha ELF linker hash table from a link_info structure. */
205
206#define alpha_elf_hash_table(p) \
207 ((struct alpha_elf_link_hash_table *) ((p)->hash))
208
209/* Get the object's symbols as our own entry type. */
210
211#define alpha_elf_sym_hashes(abfd) \
212 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
213
986a241f
RH
214/* Should we do dynamic things to this symbol? This differs from the
215 generic version in that we never need to consider function pointer
216 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
217 address is ever taken. */
252b5132 218
986a241f 219static inline bfd_boolean
a7519a3c
RH
220alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
221 struct bfd_link_info *info)
8fb35fed 222{
986a241f 223 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 224}
252b5132
RH
225
226/* Create an entry in a Alpha ELF linker hash table. */
227
228static struct bfd_hash_entry *
a7519a3c
RH
229elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
230 struct bfd_hash_table *table,
231 const char *string)
252b5132
RH
232{
233 struct alpha_elf_link_hash_entry *ret =
234 (struct alpha_elf_link_hash_entry *) entry;
235
236 /* Allocate the structure if it has not already been allocated by a
237 subclass. */
238 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
239 ret = ((struct alpha_elf_link_hash_entry *)
240 bfd_hash_allocate (table,
241 sizeof (struct alpha_elf_link_hash_entry)));
242 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
243 return (struct bfd_hash_entry *) ret;
244
245 /* Call the allocation method of the superclass. */
246 ret = ((struct alpha_elf_link_hash_entry *)
247 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
248 table, string));
249 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
250 {
251 /* Set local fields. */
252 memset (&ret->esym, 0, sizeof (EXTR));
253 /* We use -2 as a marker to indicate that the information has
254 not been set. -1 means there is no associated ifd. */
255 ret->esym.ifd = -2;
256 ret->flags = 0;
257 ret->got_entries = NULL;
258 ret->reloc_entries = NULL;
259 }
260
261 return (struct bfd_hash_entry *) ret;
262}
263
264/* Create a Alpha ELF linker hash table. */
265
266static struct bfd_link_hash_table *
a7519a3c 267elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
268{
269 struct alpha_elf_link_hash_table *ret;
dc810e39 270 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 271
e2d34d7d 272 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
273 if (ret == (struct alpha_elf_link_hash_table *) NULL)
274 return NULL;
275
276 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
277 elf64_alpha_link_hash_newfunc))
278 {
e2d34d7d 279 free (ret);
252b5132
RH
280 return NULL;
281 }
282
283 return &ret->root.root;
284}
285\f
286/* We have some private fields hanging off of the elf_tdata structure. */
287
288struct alpha_elf_obj_tdata
289{
290 struct elf_obj_tdata root;
291
292 /* For every input file, these are the got entries for that object's
293 local symbols. */
294 struct alpha_elf_got_entry ** local_got_entries;
295
296 /* For every input file, this is the object that owns the got that
297 this input file uses. */
298 bfd *gotobj;
299
300 /* For every got, this is a linked list through the objects using this got */
301 bfd *in_got_link_next;
302
303 /* For every got, this is a link to the next got subsegment. */
304 bfd *got_link_next;
305
306 /* For every got, this is the section. */
307 asection *got;
308
3765b1be
RH
309 /* For every got, this is it's total number of words. */
310 int total_got_size;
252b5132 311
3765b1be 312 /* For every got, this is the sum of the number of words required
252b5132 313 to hold all of the member object's local got. */
3765b1be 314 int local_got_size;
252b5132
RH
315};
316
317#define alpha_elf_tdata(abfd) \
318 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
319
b34976b6 320static bfd_boolean
a7519a3c 321elf64_alpha_mkobject (bfd *abfd)
252b5132 322{
dc810e39
AM
323 bfd_size_type amt = sizeof (struct alpha_elf_obj_tdata);
324 abfd->tdata.any = bfd_zalloc (abfd, amt);
252b5132 325 if (abfd->tdata.any == NULL)
b34976b6
AM
326 return FALSE;
327 return TRUE;
252b5132
RH
328}
329
b34976b6 330static bfd_boolean
a7519a3c 331elf64_alpha_object_p (bfd *abfd)
252b5132 332{
252b5132
RH
333 /* Set the right machine number for an Alpha ELF file. */
334 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
335}
336\f
a7519a3c
RH
337/* A relocation function which doesn't do anything. */
338
339static bfd_reloc_status_type
340elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
341 asymbol *sym ATTRIBUTE_UNUSED,
342 PTR data ATTRIBUTE_UNUSED, asection *sec,
343 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
344{
345 if (output_bfd)
346 reloc->address += sec->output_offset;
347 return bfd_reloc_ok;
348}
349
350/* A relocation function used for an unsupported reloc. */
351
352static bfd_reloc_status_type
353elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
354 asymbol *sym ATTRIBUTE_UNUSED,
355 PTR data ATTRIBUTE_UNUSED, asection *sec,
356 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
357{
358 if (output_bfd)
359 reloc->address += sec->output_offset;
360 return bfd_reloc_notsupported;
361}
362
363/* Do the work of the GPDISP relocation. */
364
365static bfd_reloc_status_type
366elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
367 bfd_byte *p_lda)
368{
369 bfd_reloc_status_type ret = bfd_reloc_ok;
370 bfd_vma addend;
371 unsigned long i_ldah, i_lda;
372
373 i_ldah = bfd_get_32 (abfd, p_ldah);
374 i_lda = bfd_get_32 (abfd, p_lda);
375
376 /* Complain if the instructions are not correct. */
377 if (((i_ldah >> 26) & 0x3f) != 0x09
378 || ((i_lda >> 26) & 0x3f) != 0x08)
379 ret = bfd_reloc_dangerous;
380
381 /* Extract the user-supplied offset, mirroring the sign extensions
382 that the instructions perform. */
383 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
384 addend = (addend ^ 0x80008000) - 0x80008000;
385
386 gpdisp += addend;
387
388 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
389 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
390 ret = bfd_reloc_overflow;
391
392 /* compensate for the sign extension again. */
393 i_ldah = ((i_ldah & 0xffff0000)
394 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
395 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
396
397 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
398 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
399
400 return ret;
401}
402
403/* The special function for the GPDISP reloc. */
404
405static bfd_reloc_status_type
406elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
407 asymbol *sym ATTRIBUTE_UNUSED, PTR data,
408 asection *input_section, bfd *output_bfd,
409 char **err_msg)
410{
411 bfd_reloc_status_type ret;
412 bfd_vma gp, relocation;
413 bfd_vma high_address;
414 bfd_byte *p_ldah, *p_lda;
415
416 /* Don't do anything if we're not doing a final link. */
417 if (output_bfd)
418 {
419 reloc_entry->address += input_section->output_offset;
420 return bfd_reloc_ok;
421 }
422
423 high_address = bfd_get_section_limit (abfd, input_section);
424 if (reloc_entry->address > high_address
425 || reloc_entry->address + reloc_entry->addend > high_address)
426 return bfd_reloc_outofrange;
427
428 /* The gp used in the portion of the output object to which this
429 input object belongs is cached on the input bfd. */
430 gp = _bfd_get_gp_value (abfd);
431
432 relocation = (input_section->output_section->vma
433 + input_section->output_offset
434 + reloc_entry->address);
435
436 p_ldah = (bfd_byte *) data + reloc_entry->address;
437 p_lda = p_ldah + reloc_entry->addend;
438
439 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
440
441 /* Complain if the instructions are not correct. */
442 if (ret == bfd_reloc_dangerous)
443 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
444
445 return ret;
446}
447
252b5132
RH
448/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
449 from smaller values. Start with zero, widen, *then* decrement. */
450#define MINUS_ONE (((bfd_vma)0) - 1)
451
dfe57ca0
RH
452#define SKIP_HOWTO(N) \
453 HOWTO(N, 0, 0, 0, 0, 0, 0, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
454
252b5132
RH
455static reloc_howto_type elf64_alpha_howto_table[] =
456{
457 HOWTO (R_ALPHA_NONE, /* type */
458 0, /* rightshift */
459 0, /* size (0 = byte, 1 = short, 2 = long) */
460 8, /* bitsize */
b34976b6 461 TRUE, /* pc_relative */
252b5132
RH
462 0, /* bitpos */
463 complain_overflow_dont, /* complain_on_overflow */
464 elf64_alpha_reloc_nil, /* special_function */
465 "NONE", /* name */
b34976b6 466 FALSE, /* partial_inplace */
252b5132
RH
467 0, /* src_mask */
468 0, /* dst_mask */
b34976b6 469 TRUE), /* pcrel_offset */
252b5132
RH
470
471 /* A 32 bit reference to a symbol. */
472 HOWTO (R_ALPHA_REFLONG, /* type */
473 0, /* rightshift */
474 2, /* size (0 = byte, 1 = short, 2 = long) */
475 32, /* bitsize */
b34976b6 476 FALSE, /* pc_relative */
252b5132
RH
477 0, /* bitpos */
478 complain_overflow_bitfield, /* complain_on_overflow */
479 0, /* special_function */
480 "REFLONG", /* name */
b34976b6 481 FALSE, /* partial_inplace */
252b5132
RH
482 0xffffffff, /* src_mask */
483 0xffffffff, /* dst_mask */
b34976b6 484 FALSE), /* pcrel_offset */
252b5132
RH
485
486 /* A 64 bit reference to a symbol. */
487 HOWTO (R_ALPHA_REFQUAD, /* type */
488 0, /* rightshift */
489 4, /* size (0 = byte, 1 = short, 2 = long) */
490 64, /* bitsize */
b34976b6 491 FALSE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_bitfield, /* complain_on_overflow */
494 0, /* special_function */
495 "REFQUAD", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 MINUS_ONE, /* src_mask */
498 MINUS_ONE, /* dst_mask */
b34976b6 499 FALSE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit GP relative offset. This is just like REFLONG except
502 that when the value is used the value of the gp register will be
503 added in. */
504 HOWTO (R_ALPHA_GPREL32, /* type */
505 0, /* rightshift */
506 2, /* size (0 = byte, 1 = short, 2 = long) */
507 32, /* bitsize */
b34976b6 508 FALSE, /* pc_relative */
252b5132
RH
509 0, /* bitpos */
510 complain_overflow_bitfield, /* complain_on_overflow */
511 0, /* special_function */
512 "GPREL32", /* name */
b34976b6 513 FALSE, /* partial_inplace */
252b5132
RH
514 0xffffffff, /* src_mask */
515 0xffffffff, /* dst_mask */
b34976b6 516 FALSE), /* pcrel_offset */
252b5132
RH
517
518 /* Used for an instruction that refers to memory off the GP register. */
519 HOWTO (R_ALPHA_LITERAL, /* type */
520 0, /* rightshift */
dfe57ca0 521 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 522 16, /* bitsize */
b34976b6 523 FALSE, /* pc_relative */
252b5132
RH
524 0, /* bitpos */
525 complain_overflow_signed, /* complain_on_overflow */
526 0, /* special_function */
527 "ELF_LITERAL", /* name */
b34976b6 528 FALSE, /* partial_inplace */
252b5132
RH
529 0xffff, /* src_mask */
530 0xffff, /* dst_mask */
b34976b6 531 FALSE), /* pcrel_offset */
252b5132
RH
532
533 /* This reloc only appears immediately following an ELF_LITERAL reloc.
534 It identifies a use of the literal. The symbol index is special:
535 1 means the literal address is in the base register of a memory
536 format instruction; 2 means the literal address is in the byte
537 offset register of a byte-manipulation instruction; 3 means the
538 literal address is in the target register of a jsr instruction.
539 This does not actually do any relocation. */
540 HOWTO (R_ALPHA_LITUSE, /* type */
541 0, /* rightshift */
dfe57ca0 542 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 543 32, /* bitsize */
b34976b6 544 FALSE, /* pc_relative */
252b5132
RH
545 0, /* bitpos */
546 complain_overflow_dont, /* complain_on_overflow */
547 elf64_alpha_reloc_nil, /* special_function */
548 "LITUSE", /* name */
b34976b6 549 FALSE, /* partial_inplace */
252b5132
RH
550 0, /* src_mask */
551 0, /* dst_mask */
b34976b6 552 FALSE), /* pcrel_offset */
252b5132
RH
553
554 /* Load the gp register. This is always used for a ldah instruction
555 which loads the upper 16 bits of the gp register. The symbol
556 index of the GPDISP instruction is an offset in bytes to the lda
557 instruction that loads the lower 16 bits. The value to use for
558 the relocation is the difference between the GP value and the
559 current location; the load will always be done against a register
560 holding the current address.
561
562 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
563 any offset is present in the instructions, it is an offset from
564 the register to the ldah instruction. This lets us avoid any
565 stupid hackery like inventing a gp value to do partial relocation
566 against. Also unlike ECOFF, we do the whole relocation off of
567 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
568 space consuming bit, that, since all the information was present
569 in the GPDISP_HI16 reloc. */
570 HOWTO (R_ALPHA_GPDISP, /* type */
571 16, /* rightshift */
572 2, /* size (0 = byte, 1 = short, 2 = long) */
573 16, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_gpdisp, /* special_function */
578 "GPDISP", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0xffff, /* src_mask */
581 0xffff, /* dst_mask */
b34976b6 582 TRUE), /* pcrel_offset */
252b5132
RH
583
584 /* A 21 bit branch. */
585 HOWTO (R_ALPHA_BRADDR, /* type */
586 2, /* rightshift */
587 2, /* size (0 = byte, 1 = short, 2 = long) */
588 21, /* bitsize */
b34976b6 589 TRUE, /* pc_relative */
252b5132
RH
590 0, /* bitpos */
591 complain_overflow_signed, /* complain_on_overflow */
592 0, /* special_function */
593 "BRADDR", /* name */
b34976b6 594 FALSE, /* partial_inplace */
252b5132
RH
595 0x1fffff, /* src_mask */
596 0x1fffff, /* dst_mask */
b34976b6 597 TRUE), /* pcrel_offset */
252b5132
RH
598
599 /* A hint for a jump to a register. */
600 HOWTO (R_ALPHA_HINT, /* type */
601 2, /* rightshift */
dfe57ca0 602 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 603 14, /* bitsize */
b34976b6 604 TRUE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 0, /* special_function */
608 "HINT", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0x3fff, /* src_mask */
611 0x3fff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* 16 bit PC relative offset. */
615 HOWTO (R_ALPHA_SREL16, /* type */
616 0, /* rightshift */
617 1, /* size (0 = byte, 1 = short, 2 = long) */
618 16, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
622 0, /* special_function */
623 "SREL16", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0xffff, /* src_mask */
626 0xffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* 32 bit PC relative offset. */
630 HOWTO (R_ALPHA_SREL32, /* type */
631 0, /* rightshift */
632 2, /* size (0 = byte, 1 = short, 2 = long) */
633 32, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_signed, /* complain_on_overflow */
637 0, /* special_function */
638 "SREL32", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0xffffffff, /* src_mask */
641 0xffffffff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* A 64 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL64, /* type */
646 0, /* rightshift */
647 4, /* size (0 = byte, 1 = short, 2 = long) */
648 64, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
652 0, /* special_function */
653 "SREL64", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 MINUS_ONE, /* src_mask */
656 MINUS_ONE, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132 658
dfe57ca0
RH
659 /* Skip 12 - 16; deprecated ECOFF relocs. */
660 SKIP_HOWTO (12),
661 SKIP_HOWTO (13),
662 SKIP_HOWTO (14),
663 SKIP_HOWTO (15),
664 SKIP_HOWTO (16),
252b5132
RH
665
666 /* The high 16 bits of the displacement from GP to the target. */
667 HOWTO (R_ALPHA_GPRELHIGH,
668 0, /* rightshift */
dfe57ca0 669 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 670 16, /* bitsize */
b34976b6 671 FALSE, /* pc_relative */
252b5132
RH
672 0, /* bitpos */
673 complain_overflow_signed, /* complain_on_overflow */
dfe57ca0 674 0, /* special_function */
252b5132 675 "GPRELHIGH", /* name */
b34976b6 676 FALSE, /* partial_inplace */
252b5132
RH
677 0xffff, /* src_mask */
678 0xffff, /* dst_mask */
b34976b6 679 FALSE), /* pcrel_offset */
252b5132
RH
680
681 /* The low 16 bits of the displacement from GP to the target. */
682 HOWTO (R_ALPHA_GPRELLOW,
683 0, /* rightshift */
dfe57ca0 684 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 685 16, /* bitsize */
b34976b6 686 FALSE, /* pc_relative */
252b5132
RH
687 0, /* bitpos */
688 complain_overflow_dont, /* complain_on_overflow */
dfe57ca0 689 0, /* special_function */
252b5132 690 "GPRELLOW", /* name */
b34976b6 691 FALSE, /* partial_inplace */
252b5132
RH
692 0xffff, /* src_mask */
693 0xffff, /* dst_mask */
b34976b6 694 FALSE), /* pcrel_offset */
252b5132
RH
695
696 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 697 HOWTO (R_ALPHA_GPREL16,
252b5132 698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
704 0, /* special_function */
dfe57ca0 705 "GPREL16", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132 710
dfe57ca0
RH
711 /* Skip 20 - 23; deprecated ECOFF relocs. */
712 SKIP_HOWTO (20),
713 SKIP_HOWTO (21),
714 SKIP_HOWTO (22),
715 SKIP_HOWTO (23),
252b5132 716
fe8bc63d 717 /* Misc ELF relocations. */
252b5132
RH
718
719 /* A dynamic relocation to copy the target into our .dynbss section. */
720 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
721 is present because every other ELF has one, but should not be used
722 because .dynbss is an ugly thing. */
723 HOWTO (R_ALPHA_COPY,
724 0,
725 0,
726 0,
b34976b6 727 FALSE,
252b5132
RH
728 0,
729 complain_overflow_dont,
730 bfd_elf_generic_reloc,
731 "COPY",
b34976b6 732 FALSE,
252b5132
RH
733 0,
734 0,
b34976b6 735 TRUE),
252b5132
RH
736
737 /* A dynamic relocation for a .got entry. */
738 HOWTO (R_ALPHA_GLOB_DAT,
739 0,
740 0,
741 0,
b34976b6 742 FALSE,
252b5132
RH
743 0,
744 complain_overflow_dont,
745 bfd_elf_generic_reloc,
746 "GLOB_DAT",
b34976b6 747 FALSE,
252b5132
RH
748 0,
749 0,
b34976b6 750 TRUE),
252b5132
RH
751
752 /* A dynamic relocation for a .plt entry. */
753 HOWTO (R_ALPHA_JMP_SLOT,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "JMP_SLOT",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
768 HOWTO (R_ALPHA_RELATIVE,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "RELATIVE",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
7793f4d0
RH
781
782 /* A 21 bit branch that adjusts for gp loads. */
783 HOWTO (R_ALPHA_BRSGP, /* type */
784 2, /* rightshift */
785 2, /* size (0 = byte, 1 = short, 2 = long) */
786 21, /* bitsize */
b34976b6 787 TRUE, /* pc_relative */
7793f4d0
RH
788 0, /* bitpos */
789 complain_overflow_signed, /* complain_on_overflow */
790 0, /* special_function */
791 "BRSGP", /* name */
b34976b6 792 FALSE, /* partial_inplace */
7793f4d0
RH
793 0x1fffff, /* src_mask */
794 0x1fffff, /* dst_mask */
b34976b6 795 TRUE), /* pcrel_offset */
3765b1be
RH
796
797 /* Creates a tls_index for the symbol in the got. */
798 HOWTO (R_ALPHA_TLSGD, /* type */
799 0, /* rightshift */
800 1, /* size (0 = byte, 1 = short, 2 = long) */
801 16, /* bitsize */
b34976b6 802 FALSE, /* pc_relative */
3765b1be
RH
803 0, /* bitpos */
804 complain_overflow_signed, /* complain_on_overflow */
805 0, /* special_function */
806 "TLSGD", /* name */
b34976b6 807 FALSE, /* partial_inplace */
3765b1be
RH
808 0xffff, /* src_mask */
809 0xffff, /* dst_mask */
b34976b6 810 FALSE), /* pcrel_offset */
3765b1be
RH
811
812 /* Creates a tls_index for the (current) module in the got. */
813 HOWTO (R_ALPHA_TLSLDM, /* type */
814 0, /* rightshift */
815 1, /* size (0 = byte, 1 = short, 2 = long) */
816 16, /* bitsize */
b34976b6 817 FALSE, /* pc_relative */
3765b1be
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
820 0, /* special_function */
821 "TLSLDM", /* name */
b34976b6 822 FALSE, /* partial_inplace */
3765b1be
RH
823 0xffff, /* src_mask */
824 0xffff, /* dst_mask */
b34976b6 825 FALSE), /* pcrel_offset */
3765b1be
RH
826
827 /* A dynamic relocation for a DTP module entry. */
828 HOWTO (R_ALPHA_DTPMOD64, /* type */
829 0, /* rightshift */
830 4, /* size (0 = byte, 1 = short, 2 = long) */
831 64, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_bitfield, /* complain_on_overflow */
835 0, /* special_function */
836 "DTPMOD64", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 MINUS_ONE, /* src_mask */
839 MINUS_ONE, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a 64-bit offset in the got for the displacement
843 from DTP to the target. */
844 HOWTO (R_ALPHA_GOTDTPREL, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
851 0, /* special_function */
852 "GOTDTPREL", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a displacement from DTP to the target. */
859 HOWTO (R_ALPHA_DTPREL64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
866 0, /* special_function */
867 "DTPREL64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* The high 16 bits of the displacement from DTP to the target. */
874 HOWTO (R_ALPHA_DTPRELHI, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
881 0, /* special_function */
882 "DTPRELHI", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* The low 16 bits of the displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPRELLO, /* type */
890 0, /* rightshift */
891 1, /* size (0 = byte, 1 = short, 2 = long) */
892 16, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_dont, /* complain_on_overflow */
896 0, /* special_function */
897 "DTPRELLO", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 0xffff, /* src_mask */
900 0xffff, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* A 16-bit displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPREL16, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
911 0, /* special_function */
912 "DTPREL16", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* Creates a 64-bit offset in the got for the displacement
919 from TP to the target. */
920 HOWTO (R_ALPHA_GOTTPREL, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_signed, /* complain_on_overflow */
927 0, /* special_function */
928 "GOTTPREL", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A dynamic relocation for a displacement from TP to the target. */
935 HOWTO (R_ALPHA_TPREL64, /* type */
936 0, /* rightshift */
937 4, /* size (0 = byte, 1 = short, 2 = long) */
938 64, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_bitfield, /* complain_on_overflow */
942 0, /* special_function */
943 "TPREL64", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 MINUS_ONE, /* src_mask */
946 MINUS_ONE, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* The high 16 bits of the displacement from TP to the target. */
950 HOWTO (R_ALPHA_TPRELHI, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
957 0, /* special_function */
958 "TPRELHI", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* The low 16 bits of the displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPRELLO, /* type */
966 0, /* rightshift */
967 1, /* size (0 = byte, 1 = short, 2 = long) */
968 16, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_dont, /* complain_on_overflow */
972 0, /* special_function */
973 "TPRELLO", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 0xffff, /* src_mask */
976 0xffff, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* A 16-bit displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPREL16, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
987 0, /* special_function */
988 "TPREL16", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
252b5132
RH
993};
994
252b5132
RH
995/* A mapping from BFD reloc types to Alpha ELF reloc types. */
996
997struct elf_reloc_map
998{
999 bfd_reloc_code_real_type bfd_reloc_val;
1000 int elf_reloc_val;
1001};
1002
1003static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1004{
dfe57ca0
RH
1005 {BFD_RELOC_NONE, R_ALPHA_NONE},
1006 {BFD_RELOC_32, R_ALPHA_REFLONG},
1007 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1008 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1009 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1010 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1011 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1012 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1013 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1014 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1015 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1016 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1017 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1018 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1019 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1020 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1021 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1022 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1023 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1024 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1025 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1026 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1027 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1028 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1029 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1030 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1031 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1032 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1033 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1034 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1035};
1036
1037/* Given a BFD reloc type, return a HOWTO structure. */
1038
1039static reloc_howto_type *
a7519a3c
RH
1040elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1041 bfd_reloc_code_real_type code)
252b5132
RH
1042{
1043 const struct elf_reloc_map *i, *e;
1044 i = e = elf64_alpha_reloc_map;
1045 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1046 for (; i != e; ++i)
1047 {
1048 if (i->bfd_reloc_val == code)
1049 return &elf64_alpha_howto_table[i->elf_reloc_val];
1050 }
1051 return 0;
1052}
1053
1054/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1055
1056static void
a7519a3c
RH
1057elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1058 Elf_Internal_Rela *dst)
252b5132 1059{
a7519a3c 1060 unsigned r_type = ELF64_R_TYPE(dst->r_info);
252b5132
RH
1061 BFD_ASSERT (r_type < (unsigned int) R_ALPHA_max);
1062 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1063}
3765b1be
RH
1064
1065/* These two relocations create a two-word entry in the got. */
1066#define alpha_got_entry_size(r_type) \
1067 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1068
1069/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1070#define alpha_get_dtprel_base(info) \
1071 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1072
1073/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1074 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1075#define alpha_get_tprel_base(info) \
1076 (elf_hash_table (info)->tls_sec->vma \
1077 - align_power ((bfd_vma) 16, \
1078 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1079\f
a7519a3c
RH
1080/* Handle an Alpha specific section when reading an object file. This
1081 is called when bfd_section_from_shdr finds a section with an unknown
1082 type.
1083 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1084 how to. */
252b5132 1085
a7519a3c
RH
1086static bfd_boolean
1087elf64_alpha_section_from_shdr (bfd *abfd,
1088 Elf_Internal_Shdr *hdr,
1089 const char *name,
1090 int shindex)
252b5132 1091{
a7519a3c
RH
1092 asection *newsect;
1093
1094 /* There ought to be a place to keep ELF backend specific flags, but
1095 at the moment there isn't one. We just keep track of the
1096 sections by their name, instead. Fortunately, the ABI gives
1097 suggested names for all the MIPS specific sections, so we will
1098 probably get away with this. */
1099 switch (hdr->sh_type)
1100 {
1101 case SHT_ALPHA_DEBUG:
1102 if (strcmp (name, ".mdebug") != 0)
1103 return FALSE;
1104 break;
1105 default:
1106 return FALSE;
1107 }
252b5132 1108
a7519a3c
RH
1109 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1110 return FALSE;
1111 newsect = hdr->bfd_section;
252b5132 1112
a7519a3c 1113 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1114 {
a7519a3c
RH
1115 if (! bfd_set_section_flags (abfd, newsect,
1116 (bfd_get_section_flags (abfd, newsect)
1117 | SEC_DEBUGGING)))
1118 return FALSE;
252b5132 1119 }
a7519a3c
RH
1120
1121 return TRUE;
252b5132
RH
1122}
1123
a7519a3c
RH
1124/* Convert Alpha specific section flags to bfd internal section flags. */
1125
b34976b6 1126static bfd_boolean
a7519a3c 1127elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1128{
a7519a3c
RH
1129 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1130 *flags |= SEC_SMALL_DATA;
252b5132 1131
a7519a3c
RH
1132 return TRUE;
1133}
252b5132 1134
a7519a3c
RH
1135/* Set the correct type for an Alpha ELF section. We do this by the
1136 section name, which is a hack, but ought to work. */
9e756d64 1137
a7519a3c
RH
1138static bfd_boolean
1139elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1140{
1141 register const char *name;
1142
1143 name = bfd_get_section_name (abfd, sec);
1144
1145 if (strcmp (name, ".mdebug") == 0)
252b5132 1146 {
a7519a3c
RH
1147 hdr->sh_type = SHT_ALPHA_DEBUG;
1148 /* In a shared object on Irix 5.3, the .mdebug section has an
1149 entsize of 0. FIXME: Does this matter? */
1150 if ((abfd->flags & DYNAMIC) != 0 )
1151 hdr->sh_entsize = 0;
1152 else
1153 hdr->sh_entsize = 1;
252b5132 1154 }
a7519a3c
RH
1155 else if ((sec->flags & SEC_SMALL_DATA)
1156 || strcmp (name, ".sdata") == 0
1157 || strcmp (name, ".sbss") == 0
1158 || strcmp (name, ".lit4") == 0
1159 || strcmp (name, ".lit8") == 0)
1160 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1161
a7519a3c
RH
1162 return TRUE;
1163}
252b5132 1164
a7519a3c
RH
1165/* Hook called by the linker routine which adds symbols from an object
1166 file. We use it to put .comm items in .sbss, and not .bss. */
1167
1168static bfd_boolean
1169elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1170 Elf_Internal_Sym *sym,
1171 const char **namep ATTRIBUTE_UNUSED,
1172 flagword *flagsp ATTRIBUTE_UNUSED,
1173 asection **secp, bfd_vma *valp)
1174{
1175 if (sym->st_shndx == SHN_COMMON
1176 && !info->relocatable
1177 && sym->st_size <= elf_gp_size (abfd))
252b5132 1178 {
a7519a3c
RH
1179 /* Common symbols less than or equal to -G nn bytes are
1180 automatically put into .sbss. */
ffcb7aff 1181
a7519a3c 1182 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1183
a7519a3c 1184 if (scomm == NULL)
252b5132 1185 {
a7519a3c
RH
1186 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1187 (SEC_ALLOC
1188 | SEC_IS_COMMON
1189 | SEC_LINKER_CREATED));
1190 if (scomm == NULL)
1191 return FALSE;
1192 }
ffcb7aff 1193
a7519a3c
RH
1194 *secp = scomm;
1195 *valp = sym->st_size;
1196 }
ffcb7aff 1197
a7519a3c
RH
1198 return TRUE;
1199}
252b5132 1200
a7519a3c 1201/* Create the .got section. */
252b5132 1202
a7519a3c
RH
1203static bfd_boolean
1204elf64_alpha_create_got_section (bfd *abfd,
1205 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1206{
1207 asection *s;
252b5132 1208
a7519a3c
RH
1209 if ((s = bfd_get_section_by_name (abfd, ".got")))
1210 {
1211 /* Check for a non-linker created .got? */
1212 if (alpha_elf_tdata (abfd)->got == NULL)
1213 alpha_elf_tdata (abfd)->got = s;
1214 return TRUE;
1215 }
252b5132 1216
a7519a3c
RH
1217 s = bfd_make_section_with_flags (abfd, ".got", (SEC_ALLOC | SEC_LOAD
1218 | SEC_HAS_CONTENTS
1219 | SEC_IN_MEMORY
1220 | SEC_LINKER_CREATED));
1221 if (s == NULL
1222 || !bfd_set_section_alignment (abfd, s, 3))
1223 return FALSE;
252b5132 1224
a7519a3c 1225 alpha_elf_tdata (abfd)->got = s;
252b5132 1226
a7519a3c
RH
1227 return TRUE;
1228}
252b5132 1229
a7519a3c 1230/* Create all the dynamic sections. */
252b5132 1231
a7519a3c
RH
1232static bfd_boolean
1233elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1234{
1235 asection *s;
1236 struct elf_link_hash_entry *h;
1237 struct bfd_link_hash_entry *bh;
252b5132 1238
a7519a3c 1239 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1240
a7519a3c 1241 s = bfd_make_section_with_flags (abfd, ".plt",
6ec7057a 1242 (SEC_ALLOC | SEC_LOAD | SEC_CODE
a7519a3c
RH
1243 | SEC_HAS_CONTENTS
1244 | SEC_IN_MEMORY
1245 | SEC_LINKER_CREATED
6ec7057a
RH
1246 | (elf64_alpha_use_secureplt
1247 ? SEC_READONLY : 0)));
1248 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1249 return FALSE;
252b5132 1250
a7519a3c
RH
1251 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1252 .plt section. */
1253 bh = NULL;
1254 if (! (_bfd_generic_link_add_one_symbol
1255 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
1256 (bfd_vma) 0, (const char *) NULL, FALSE,
1257 get_elf_backend_data (abfd)->collect, &bh)))
1258 return FALSE;
1259 h = (struct elf_link_hash_entry *) bh;
1260 h->def_regular = 1;
1261 h->type = STT_OBJECT;
d6ad34f6 1262
6ec7057a 1263 if (info->shared && ! bfd_elf_link_record_dynamic_symbol (info, h))
a7519a3c 1264 return FALSE;
d6ad34f6 1265
a7519a3c
RH
1266 s = bfd_make_section_with_flags (abfd, ".rela.plt",
1267 (SEC_ALLOC | SEC_LOAD
1268 | SEC_HAS_CONTENTS
1269 | SEC_IN_MEMORY
1270 | SEC_LINKER_CREATED
1271 | SEC_READONLY));
6ec7057a 1272 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1273 return FALSE;
252b5132 1274
6ec7057a
RH
1275 if (elf64_alpha_use_secureplt)
1276 {
1277 s = bfd_make_section_with_flags (abfd, ".got.plt",
1278 SEC_ALLOC | SEC_LINKER_CREATED);
1279 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1280 return FALSE;
1281 }
1282
a7519a3c
RH
1283 /* We may or may not have created a .got section for this object, but
1284 we definitely havn't done the rest of the work. */
1cd6895c 1285
a7519a3c
RH
1286 if (!elf64_alpha_create_got_section (abfd, info))
1287 return FALSE;
1cd6895c 1288
a7519a3c
RH
1289 s = bfd_make_section_with_flags (abfd, ".rela.got",
1290 (SEC_ALLOC | SEC_LOAD
1291 | SEC_HAS_CONTENTS
1292 | SEC_IN_MEMORY
1293 | SEC_LINKER_CREATED
1294 | SEC_READONLY));
1295 if (s == NULL
1296 || !bfd_set_section_alignment (abfd, s, 3))
1297 return FALSE;
252b5132 1298
a7519a3c
RH
1299 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1300 dynobj's .got section. We don't do this in the linker script
1301 because we don't want to define the symbol if we are not creating
1302 a global offset table. */
1303 bh = NULL;
1304 if (!(_bfd_generic_link_add_one_symbol
1305 (info, abfd, "_GLOBAL_OFFSET_TABLE_", BSF_GLOBAL,
1306 alpha_elf_tdata(abfd)->got, (bfd_vma) 0, (const char *) NULL,
1307 FALSE, get_elf_backend_data (abfd)->collect, &bh)))
1308 return FALSE;
1309 h = (struct elf_link_hash_entry *) bh;
1310 h->def_regular = 1;
1311 h->type = STT_OBJECT;
252b5132 1312
a7519a3c
RH
1313 if (info->shared
1314 && ! bfd_elf_link_record_dynamic_symbol (info, h))
1315 return FALSE;
252b5132 1316
a7519a3c 1317 elf_hash_table (info)->hgot = h;
252b5132 1318
a7519a3c 1319 return TRUE;
252b5132 1320}
a7519a3c
RH
1321\f
1322/* Read ECOFF debugging information from a .mdebug section into a
1323 ecoff_debug_info structure. */
252b5132 1324
a7519a3c
RH
1325static bfd_boolean
1326elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1327 struct ecoff_debug_info *debug)
252b5132 1328{
a7519a3c
RH
1329 HDRR *symhdr;
1330 const struct ecoff_debug_swap *swap;
1331 char *ext_hdr = NULL;
252b5132 1332
a7519a3c
RH
1333 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1334 memset (debug, 0, sizeof (*debug));
252b5132 1335
a7519a3c
RH
1336 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1337 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1338 goto error_return;
252b5132 1339
a7519a3c
RH
1340 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1341 swap->external_hdr_size))
1342 goto error_return;
252b5132 1343
a7519a3c
RH
1344 symhdr = &debug->symbolic_header;
1345 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1346
a7519a3c
RH
1347 /* The symbolic header contains absolute file offsets and sizes to
1348 read. */
1349#define READ(ptr, offset, count, size, type) \
1350 if (symhdr->count == 0) \
1351 debug->ptr = NULL; \
1352 else \
1353 { \
1354 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1355 debug->ptr = (type) bfd_malloc (amt); \
1356 if (debug->ptr == NULL) \
1357 goto error_return; \
1358 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1359 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1360 goto error_return; \
1361 }
fe8bc63d 1362
a7519a3c
RH
1363 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
1364 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, PTR);
1365 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, PTR);
1366 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, PTR);
1367 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, PTR);
1368 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1369 union aux_ext *);
1370 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1371 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
1372 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, PTR);
1373 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, PTR);
1374 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, PTR);
1375#undef READ
252b5132 1376
a7519a3c 1377 debug->fdr = NULL;
252b5132 1378
a7519a3c 1379 return TRUE;
252b5132 1380
a7519a3c
RH
1381 error_return:
1382 if (ext_hdr != NULL)
1383 free (ext_hdr);
1384 if (debug->line != NULL)
1385 free (debug->line);
1386 if (debug->external_dnr != NULL)
1387 free (debug->external_dnr);
1388 if (debug->external_pdr != NULL)
1389 free (debug->external_pdr);
1390 if (debug->external_sym != NULL)
1391 free (debug->external_sym);
1392 if (debug->external_opt != NULL)
1393 free (debug->external_opt);
1394 if (debug->external_aux != NULL)
1395 free (debug->external_aux);
1396 if (debug->ss != NULL)
1397 free (debug->ss);
1398 if (debug->ssext != NULL)
1399 free (debug->ssext);
1400 if (debug->external_fdr != NULL)
1401 free (debug->external_fdr);
1402 if (debug->external_rfd != NULL)
1403 free (debug->external_rfd);
1404 if (debug->external_ext != NULL)
1405 free (debug->external_ext);
1406 return FALSE;
252b5132
RH
1407}
1408
a7519a3c
RH
1409/* Alpha ELF local labels start with '$'. */
1410
b34976b6 1411static bfd_boolean
a7519a3c 1412elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1413{
a7519a3c
RH
1414 return name[0] == '$';
1415}
9e756d64 1416
a7519a3c
RH
1417/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
1418 routine in order to handle the ECOFF debugging information. We
1419 still call this mips_elf_find_line because of the slot
1420 find_line_info in elf_obj_tdata is declared that way. */
d6ad34f6 1421
a7519a3c
RH
1422struct mips_elf_find_line
1423{
1424 struct ecoff_debug_info d;
1425 struct ecoff_find_line i;
1426};
d6ad34f6 1427
a7519a3c
RH
1428static bfd_boolean
1429elf64_alpha_find_nearest_line (bfd *abfd, asection *section, asymbol **symbols,
1430 bfd_vma offset, const char **filename_ptr,
1431 const char **functionname_ptr,
1432 unsigned int *line_ptr)
1433{
1434 asection *msec;
252b5132 1435
a7519a3c
RH
1436 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
1437 filename_ptr, functionname_ptr,
1438 line_ptr, 0,
1439 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1440 return TRUE;
9e756d64 1441
a7519a3c
RH
1442 msec = bfd_get_section_by_name (abfd, ".mdebug");
1443 if (msec != NULL)
1bbc9cec 1444 {
a7519a3c
RH
1445 flagword origflags;
1446 struct mips_elf_find_line *fi;
1447 const struct ecoff_debug_swap * const swap =
1448 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1449
a7519a3c
RH
1450 /* If we are called during a link, alpha_elf_final_link may have
1451 cleared the SEC_HAS_CONTENTS field. We force it back on here
1452 if appropriate (which it normally will be). */
1453 origflags = msec->flags;
1454 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1455 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1456
a7519a3c
RH
1457 fi = elf_tdata (abfd)->find_line_info;
1458 if (fi == NULL)
1459 {
1460 bfd_size_type external_fdr_size;
1461 char *fraw_src;
1462 char *fraw_end;
1463 struct fdr *fdr_ptr;
1464 bfd_size_type amt = sizeof (struct mips_elf_find_line);
9e756d64 1465
a7519a3c
RH
1466 fi = (struct mips_elf_find_line *) bfd_zalloc (abfd, amt);
1467 if (fi == NULL)
1468 {
1469 msec->flags = origflags;
1470 return FALSE;
1471 }
9e756d64 1472
a7519a3c
RH
1473 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1474 {
1475 msec->flags = origflags;
1476 return FALSE;
1477 }
9e756d64 1478
a7519a3c
RH
1479 /* Swap in the FDR information. */
1480 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1481 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1482 if (fi->d.fdr == NULL)
1483 {
1484 msec->flags = origflags;
1485 return FALSE;
1486 }
1487 external_fdr_size = swap->external_fdr_size;
1488 fdr_ptr = fi->d.fdr;
1489 fraw_src = (char *) fi->d.external_fdr;
1490 fraw_end = (fraw_src
1491 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1492 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
1493 (*swap->swap_fdr_in) (abfd, (PTR) fraw_src, fdr_ptr);
9e756d64 1494
a7519a3c 1495 elf_tdata (abfd)->find_line_info = fi;
9e756d64 1496
a7519a3c
RH
1497 /* Note that we don't bother to ever free this information.
1498 find_nearest_line is either called all the time, as in
1499 objdump -l, so the information should be saved, or it is
1500 rarely called, as in ld error messages, so the memory
1501 wasted is unimportant. Still, it would probably be a
1502 good idea for free_cached_info to throw it away. */
1503 }
9e756d64 1504
a7519a3c
RH
1505 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1506 &fi->i, filename_ptr, functionname_ptr,
1507 line_ptr))
1508 {
1509 msec->flags = origflags;
1510 return TRUE;
1511 }
9e756d64 1512
a7519a3c 1513 msec->flags = origflags;
9e756d64 1514 }
9e756d64 1515
a7519a3c 1516 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1517
a7519a3c
RH
1518 return _bfd_elf_find_nearest_line (abfd, section, symbols, offset,
1519 filename_ptr, functionname_ptr,
1520 line_ptr);
9e756d64 1521}
a7519a3c
RH
1522\f
1523/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1524
a7519a3c 1525struct extsym_info
9e756d64 1526{
a7519a3c
RH
1527 bfd *abfd;
1528 struct bfd_link_info *info;
1529 struct ecoff_debug_info *debug;
1530 const struct ecoff_debug_swap *swap;
1531 bfd_boolean failed;
1532};
9e756d64 1533
a7519a3c
RH
1534static bfd_boolean
1535elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, PTR data)
1536{
1537 struct extsym_info *einfo = (struct extsym_info *) data;
1538 bfd_boolean strip;
1539 asection *sec, *output_section;
9e756d64 1540
a7519a3c
RH
1541 if (h->root.root.type == bfd_link_hash_warning)
1542 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
9e756d64 1543
a7519a3c
RH
1544 if (h->root.indx == -2)
1545 strip = FALSE;
1546 else if ((h->root.def_dynamic
1547 || h->root.ref_dynamic
1548 || h->root.root.type == bfd_link_hash_new)
1549 && !h->root.def_regular
1550 && !h->root.ref_regular)
1551 strip = TRUE;
1552 else if (einfo->info->strip == strip_all
1553 || (einfo->info->strip == strip_some
1554 && bfd_hash_lookup (einfo->info->keep_hash,
1555 h->root.root.root.string,
1556 FALSE, FALSE) == NULL))
1557 strip = TRUE;
1558 else
1559 strip = FALSE;
9e756d64 1560
a7519a3c 1561 if (strip)
b34976b6 1562 return TRUE;
9e756d64 1563
a7519a3c 1564 if (h->esym.ifd == -2)
9e756d64 1565 {
a7519a3c
RH
1566 h->esym.jmptbl = 0;
1567 h->esym.cobol_main = 0;
1568 h->esym.weakext = 0;
1569 h->esym.reserved = 0;
1570 h->esym.ifd = ifdNil;
1571 h->esym.asym.value = 0;
1572 h->esym.asym.st = stGlobal;
9e756d64 1573
a7519a3c
RH
1574 if (h->root.root.type != bfd_link_hash_defined
1575 && h->root.root.type != bfd_link_hash_defweak)
1576 h->esym.asym.sc = scAbs;
1577 else
1578 {
1579 const char *name;
9e756d64 1580
a7519a3c
RH
1581 sec = h->root.root.u.def.section;
1582 output_section = sec->output_section;
9e756d64 1583
a7519a3c
RH
1584 /* When making a shared library and symbol h is the one from
1585 the another shared library, OUTPUT_SECTION may be null. */
1586 if (output_section == NULL)
1587 h->esym.asym.sc = scUndefined;
1588 else
1589 {
1590 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1591
a7519a3c
RH
1592 if (strcmp (name, ".text") == 0)
1593 h->esym.asym.sc = scText;
1594 else if (strcmp (name, ".data") == 0)
1595 h->esym.asym.sc = scData;
1596 else if (strcmp (name, ".sdata") == 0)
1597 h->esym.asym.sc = scSData;
1598 else if (strcmp (name, ".rodata") == 0
1599 || strcmp (name, ".rdata") == 0)
1600 h->esym.asym.sc = scRData;
1601 else if (strcmp (name, ".bss") == 0)
1602 h->esym.asym.sc = scBss;
1603 else if (strcmp (name, ".sbss") == 0)
1604 h->esym.asym.sc = scSBss;
1605 else if (strcmp (name, ".init") == 0)
1606 h->esym.asym.sc = scInit;
1607 else if (strcmp (name, ".fini") == 0)
1608 h->esym.asym.sc = scFini;
1609 else
1610 h->esym.asym.sc = scAbs;
1611 }
1612 }
9e756d64 1613
a7519a3c
RH
1614 h->esym.asym.reserved = 0;
1615 h->esym.asym.index = indexNil;
1616 }
9e756d64 1617
a7519a3c
RH
1618 if (h->root.root.type == bfd_link_hash_common)
1619 h->esym.asym.value = h->root.root.u.c.size;
1620 else if (h->root.root.type == bfd_link_hash_defined
1621 || h->root.root.type == bfd_link_hash_defweak)
1622 {
1623 if (h->esym.asym.sc == scCommon)
1624 h->esym.asym.sc = scBss;
1625 else if (h->esym.asym.sc == scSCommon)
1626 h->esym.asym.sc = scSBss;
9e756d64 1627
a7519a3c
RH
1628 sec = h->root.root.u.def.section;
1629 output_section = sec->output_section;
1630 if (output_section != NULL)
1631 h->esym.asym.value = (h->root.root.u.def.value
1632 + sec->output_offset
1633 + output_section->vma);
1634 else
1635 h->esym.asym.value = 0;
1636 }
9e756d64 1637
a7519a3c
RH
1638 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1639 h->root.root.root.string,
1640 &h->esym))
1641 {
1642 einfo->failed = TRUE;
1643 return FALSE;
9e756d64
RH
1644 }
1645
a7519a3c
RH
1646 return TRUE;
1647}
1648\f
1649/* Search for and possibly create a got entry. */
9e756d64 1650
a7519a3c
RH
1651static struct alpha_elf_got_entry *
1652get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1653 unsigned long r_type, unsigned long r_symndx,
1654 bfd_vma r_addend)
1655{
1656 struct alpha_elf_got_entry *gotent;
1657 struct alpha_elf_got_entry **slot;
9e756d64 1658
a7519a3c
RH
1659 if (h)
1660 slot = &h->got_entries;
1661 else
1662 {
1663 /* This is a local .got entry -- record for merge. */
9e756d64 1664
a7519a3c 1665 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1666
a7519a3c
RH
1667 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1668 if (!local_got_entries)
1669 {
1670 bfd_size_type size;
1671 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1672
a7519a3c
RH
1673 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1674 size = symtab_hdr->sh_info;
1675 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1676
a7519a3c
RH
1677 local_got_entries
1678 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1679 if (!local_got_entries)
1680 return NULL;
1681
1682 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1683 }
1684
1685 slot = &local_got_entries[r_symndx];
9e756d64
RH
1686 }
1687
a7519a3c
RH
1688 for (gotent = *slot; gotent ; gotent = gotent->next)
1689 if (gotent->gotobj == abfd
1690 && gotent->reloc_type == r_type
1691 && gotent->addend == r_addend)
1692 break;
1693
1694 if (!gotent)
9e756d64 1695 {
a7519a3c
RH
1696 int entry_size;
1697 bfd_size_type amt;
9e756d64 1698
a7519a3c
RH
1699 amt = sizeof (struct alpha_elf_got_entry);
1700 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1701 if (!gotent)
1702 return NULL;
9e756d64 1703
a7519a3c
RH
1704 gotent->gotobj = abfd;
1705 gotent->addend = r_addend;
1706 gotent->got_offset = -1;
6ec7057a 1707 gotent->plt_offset = -1;
a7519a3c
RH
1708 gotent->use_count = 1;
1709 gotent->reloc_type = r_type;
1710 gotent->reloc_done = 0;
1711 gotent->reloc_xlated = 0;
9e756d64 1712
a7519a3c
RH
1713 gotent->next = *slot;
1714 *slot = gotent;
9e756d64 1715
a7519a3c
RH
1716 entry_size = alpha_got_entry_size (r_type);
1717 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1718 if (!h)
1719 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1720 }
a7519a3c
RH
1721 else
1722 gotent->use_count += 1;
9e756d64 1723
a7519a3c 1724 return gotent;
9e756d64
RH
1725}
1726
6ec7057a
RH
1727static bfd_boolean
1728elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1729{
1730 return ((ah->root.type == STT_FUNC
1731 || ah->root.root.type == bfd_link_hash_undefweak
1732 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1733 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1734 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1735}
1736
a7519a3c
RH
1737/* Handle dynamic relocations when doing an Alpha ELF link. */
1738
b34976b6 1739static bfd_boolean
a7519a3c
RH
1740elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1741 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1742{
a7519a3c
RH
1743 bfd *dynobj;
1744 asection *sreloc;
1745 const char *rel_sec_name;
252b5132 1746 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1747 struct alpha_elf_link_hash_entry **sym_hashes;
1748 const Elf_Internal_Rela *rel, *relend;
1749 bfd_boolean got_created;
1750 bfd_size_type amt;
252b5132 1751
a7519a3c
RH
1752 if (info->relocatable)
1753 return TRUE;
252b5132 1754
a7519a3c
RH
1755 /* Don't do anything special with non-loaded, non-alloced sections.
1756 In particular, any relocs in such sections should not affect GOT
1757 and PLT reference counting (ie. we don't allow them to create GOT
1758 or PLT entries), there's no possibility or desire to optimize TLS
1759 relocs, and there's not much point in propagating relocs to shared
1760 libs that the dynamic linker won't relocate. */
1761 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1762 return TRUE;
252b5132 1763
a7519a3c
RH
1764 dynobj = elf_hash_table(info)->dynobj;
1765 if (dynobj == NULL)
1766 elf_hash_table(info)->dynobj = dynobj = abfd;
252b5132 1767
a7519a3c
RH
1768 sreloc = NULL;
1769 rel_sec_name = NULL;
1770 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1771 sym_hashes = alpha_elf_sym_hashes(abfd);
1772 got_created = FALSE;
1773
1774 relend = relocs + sec->reloc_count;
1775 for (rel = relocs; rel < relend; ++rel)
1776 {
1777 enum {
1778 NEED_GOT = 1,
1779 NEED_GOT_ENTRY = 2,
1780 NEED_DYNREL = 4
1781 };
1782
1783 unsigned long r_symndx, r_type;
1784 struct alpha_elf_link_hash_entry *h;
1785 unsigned int gotent_flags;
1786 bfd_boolean maybe_dynamic;
1787 unsigned int need;
1788 bfd_vma addend;
1789
1790 r_symndx = ELF64_R_SYM (rel->r_info);
1791 if (r_symndx < symtab_hdr->sh_info)
1792 h = NULL;
1793 else
1794 {
1795 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1796
a7519a3c
RH
1797 while (h->root.root.type == bfd_link_hash_indirect
1798 || h->root.root.type == bfd_link_hash_warning)
1799 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1800
a7519a3c
RH
1801 h->root.ref_regular = 1;
1802 }
252b5132 1803
a7519a3c
RH
1804 /* We can only get preliminary data on whether a symbol is
1805 locally or externally defined, as not all of the input files
1806 have yet been processed. Do something with what we know, as
1807 this may help reduce memory usage and processing time later. */
1808 maybe_dynamic = FALSE;
1809 if (h && ((info->shared
1810 && (!info->symbolic
1811 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1812 || !h->root.def_regular
1813 || h->root.root.type == bfd_link_hash_defweak))
1814 maybe_dynamic = TRUE;
252b5132 1815
a7519a3c
RH
1816 need = 0;
1817 gotent_flags = 0;
1818 r_type = ELF64_R_TYPE (rel->r_info);
1819 addend = rel->r_addend;
9e756d64 1820
9e756d64
RH
1821 switch (r_type)
1822 {
1823 case R_ALPHA_LITERAL:
a7519a3c
RH
1824 need = NEED_GOT | NEED_GOT_ENTRY;
1825
1826 /* Remember how this literal is used from its LITUSEs.
1827 This will be important when it comes to decide if we can
1828 create a .plt entry for a function symbol. */
1829 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1830 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1831 gotent_flags |= 1 << rel->r_addend;
1832 --rel;
1833
1834 /* No LITUSEs -- presumably the address is used somehow. */
1835 if (gotent_flags == 0)
1836 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1837 break;
1838
1839 case R_ALPHA_GPDISP:
1840 case R_ALPHA_GPREL16:
1841 case R_ALPHA_GPREL32:
9e756d64
RH
1842 case R_ALPHA_GPRELHIGH:
1843 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1844 case R_ALPHA_BRSGP:
1845 need = NEED_GOT;
1846 break;
1847
1848 case R_ALPHA_REFLONG:
1849 case R_ALPHA_REFQUAD:
1850 if (info->shared || maybe_dynamic)
1851 need = NEED_DYNREL;
cc03ec80
RH
1852 break;
1853
9e756d64 1854 case R_ALPHA_TLSLDM:
cc03ec80 1855 /* The symbol for a TLSLDM reloc is ignored. Collapse the
a7519a3c 1856 reloc to the 0 symbol so that they all match. */
cc03ec80 1857 r_symndx = 0;
a7519a3c
RH
1858 h = 0;
1859 maybe_dynamic = FALSE;
1860 /* FALLTHRU */
1861
1862 case R_ALPHA_TLSGD:
1863 case R_ALPHA_GOTDTPREL:
1864 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1865 break;
cc03ec80 1866
a7519a3c
RH
1867 case R_ALPHA_GOTTPREL:
1868 need = NEED_GOT | NEED_GOT_ENTRY;
1869 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1870 if (info->shared)
1871 info->flags |= DF_STATIC_TLS;
1872 break;
1873
1874 case R_ALPHA_TPREL64:
1875 if (info->shared || maybe_dynamic)
1876 need = NEED_DYNREL;
1877 if (info->shared)
1878 info->flags |= DF_STATIC_TLS;
1879 break;
252b5132
RH
1880 }
1881
a7519a3c 1882 if (need & NEED_GOT)
252b5132 1883 {
a7519a3c 1884 if (!got_created)
6cdc0ccc 1885 {
a7519a3c
RH
1886 if (!elf64_alpha_create_got_section (abfd, info))
1887 return FALSE;
cc03ec80 1888
a7519a3c
RH
1889 /* Make sure the object's gotobj is set to itself so
1890 that we default to every object with its own .got.
1891 We'll merge .gots later once we've collected each
1892 object's info. */
1893 alpha_elf_tdata(abfd)->gotobj = abfd;
252b5132 1894
a7519a3c 1895 got_created = 1;
c328dc3f 1896 }
252b5132 1897 }
252b5132 1898
a7519a3c
RH
1899 if (need & NEED_GOT_ENTRY)
1900 {
1901 struct alpha_elf_got_entry *gotent;
252b5132 1902
a7519a3c
RH
1903 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1904 if (!gotent)
1905 return FALSE;
4a67a098 1906
a7519a3c 1907 if (gotent_flags)
cc03ec80 1908 {
a7519a3c
RH
1909 gotent->flags |= gotent_flags;
1910 if (h)
1911 {
1912 gotent_flags |= h->flags;
1913 h->flags = gotent_flags;
4a67a098 1914
a7519a3c 1915 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1916 /* ??? It appears that we won't make it into
1917 adjust_dynamic_symbol for symbols that remain
1918 totally undefined. Copying this check here means
1919 we can create a plt entry for them too. */
1920 h->root.needs_plt
1921 = (maybe_dynamic && elf64_alpha_want_plt (h));
1922 }
a7519a3c 1923 }
252b5132
RH
1924 }
1925
a7519a3c 1926 if (need & NEED_DYNREL)
9e756d64 1927 {
a7519a3c 1928 if (rel_sec_name == NULL)
9e756d64 1929 {
a7519a3c
RH
1930 rel_sec_name = (bfd_elf_string_from_elf_section
1931 (abfd, elf_elfheader(abfd)->e_shstrndx,
1932 elf_section_data(sec)->rel_hdr.sh_name));
1933 if (rel_sec_name == NULL)
1934 return FALSE;
1935
1936 BFD_ASSERT (strncmp (rel_sec_name, ".rela", 5) == 0
1937 && strcmp (bfd_get_section_name (abfd, sec),
1938 rel_sec_name+5) == 0);
9e756d64 1939 }
a7519a3c
RH
1940
1941 /* We need to create the section here now whether we eventually
1942 use it or not so that it gets mapped to an output section by
1943 the linker. If not used, we'll kill it in
1944 size_dynamic_sections. */
1945 if (sreloc == NULL)
9e756d64 1946 {
a7519a3c
RH
1947 sreloc = bfd_get_section_by_name (dynobj, rel_sec_name);
1948 if (sreloc == NULL)
1949 {
1950 flagword flags;
1951
1952 flags = (SEC_HAS_CONTENTS | SEC_IN_MEMORY
1953 | SEC_LINKER_CREATED | SEC_READONLY);
1954 if (sec->flags & SEC_ALLOC)
1955 flags |= SEC_ALLOC | SEC_LOAD;
1956 sreloc = bfd_make_section_with_flags (dynobj,
1957 rel_sec_name,
1958 flags);
1959 if (sreloc == NULL
1960 || !bfd_set_section_alignment (dynobj, sreloc, 3))
1961 return FALSE;
1962 }
9e756d64 1963 }
252b5132 1964
a7519a3c
RH
1965 if (h)
1966 {
1967 /* Since we havn't seen all of the input symbols yet, we
1968 don't know whether we'll actually need a dynamic relocation
1969 entry for this reloc. So make a record of it. Once we
1970 find out if this thing needs dynamic relocation we'll
1971 expand the relocation sections by the appropriate amount. */
9e756d64 1972
a7519a3c 1973 struct alpha_elf_reloc_entry *rent;
9e756d64 1974
a7519a3c
RH
1975 for (rent = h->reloc_entries; rent; rent = rent->next)
1976 if (rent->rtype == r_type && rent->srel == sreloc)
1977 break;
252b5132 1978
a7519a3c
RH
1979 if (!rent)
1980 {
1981 amt = sizeof (struct alpha_elf_reloc_entry);
1982 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1983 if (!rent)
1984 return FALSE;
252b5132 1985
a7519a3c
RH
1986 rent->srel = sreloc;
1987 rent->rtype = r_type;
1988 rent->count = 1;
1989 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 1990
a7519a3c
RH
1991 rent->next = h->reloc_entries;
1992 h->reloc_entries = rent;
1993 }
1994 else
1995 rent->count++;
1996 }
1997 else if (info->shared)
1998 {
1999 /* If this is a shared library, and the section is to be
2000 loaded into memory, we need a RELATIVE reloc. */
2001 sreloc->size += sizeof (Elf64_External_Rela);
2002 if (sec->flags & SEC_READONLY)
2003 info->flags |= DF_TEXTREL;
2004 }
252b5132
RH
2005 }
2006 }
2007
b34976b6 2008 return TRUE;
252b5132 2009}
252b5132 2010
a7519a3c
RH
2011/* Adjust a symbol defined by a dynamic object and referenced by a
2012 regular object. The current definition is in some section of the
2013 dynamic object, but we're not including those sections. We have to
2014 change the definition to something the rest of the link can
2015 understand. */
252b5132 2016
b34976b6 2017static bfd_boolean
a7519a3c
RH
2018elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2019 struct elf_link_hash_entry *h)
252b5132 2020{
a7519a3c
RH
2021 bfd *dynobj;
2022 asection *s;
2023 struct alpha_elf_link_hash_entry *ah;
252b5132 2024
a7519a3c
RH
2025 dynobj = elf_hash_table(info)->dynobj;
2026 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2027
a7519a3c 2028 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2029 about whether this symbol should get a .plt entry. Irritatingly, it
2030 is common for folk to leave undefined symbols in shared libraries,
2031 and they still expect lazy binding; accept undefined symbols in lieu
2032 of STT_FUNC. */
2033 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2034 {
6ec7057a 2035 h->needs_plt = TRUE;
252b5132 2036
a7519a3c
RH
2037 s = bfd_get_section_by_name(dynobj, ".plt");
2038 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2039 return FALSE;
204692d7 2040
6ec7057a
RH
2041 /* We need one plt entry per got subsection. Delay allocation of
2042 the actual plt entries until size_plt_section, called from
2043 size_dynamic_sections or during relaxation. */
252b5132 2044
a7519a3c
RH
2045 return TRUE;
2046 }
2047 else
6ec7057a 2048 h->needs_plt = FALSE;
252b5132 2049
a7519a3c
RH
2050 /* If this is a weak symbol, and there is a real definition, the
2051 processor independent code will have arranged for us to see the
2052 real definition first, and we can just use the same value. */
2053 if (h->u.weakdef != NULL)
252b5132 2054 {
a7519a3c
RH
2055 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2056 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2057 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2058 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2059 return TRUE;
252b5132 2060 }
a7519a3c
RH
2061
2062 /* This is a reference to a symbol defined by a dynamic object which
2063 is not a function. The Alpha, since it uses .got entries for all
2064 symbols even in regular objects, does not need the hackery of a
2065 .dynbss section and COPY dynamic relocations. */
252b5132 2066
b34976b6 2067 return TRUE;
252b5132
RH
2068}
2069
a7519a3c
RH
2070/* Symbol versioning can create new symbols, and make our old symbols
2071 indirect to the new ones. Consolidate the got and reloc information
2072 in these situations. */
252b5132 2073
b34976b6 2074static bfd_boolean
a7519a3c
RH
2075elf64_alpha_merge_ind_symbols (struct alpha_elf_link_hash_entry *hi,
2076 PTR dummy ATTRIBUTE_UNUSED)
252b5132 2077{
a7519a3c 2078 struct alpha_elf_link_hash_entry *hs;
252b5132 2079
a7519a3c
RH
2080 if (hi->root.root.type != bfd_link_hash_indirect)
2081 return TRUE;
2082 hs = hi;
2083 do {
2084 hs = (struct alpha_elf_link_hash_entry *)hs->root.root.u.i.link;
2085 } while (hs->root.root.type == bfd_link_hash_indirect);
252b5132 2086
a7519a3c
RH
2087 /* Merge the flags. Whee. */
2088
2089 hs->flags |= hi->flags;
2090
2091 /* Merge the .got entries. Cannibalize the old symbol's list in
2092 doing so, since we don't need it anymore. */
2093
2094 if (hs->got_entries == NULL)
2095 hs->got_entries = hi->got_entries;
2096 else
2097 {
2098 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2099
2100 gsh = hs->got_entries;
2101 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2102 {
a7519a3c
RH
2103 gin = gi->next;
2104 for (gs = gsh; gs ; gs = gs->next)
2105 if (gi->gotobj == gs->gotobj
2106 && gi->reloc_type == gs->reloc_type
2107 && gi->addend == gs->addend)
2108 {
2109 gi->use_count += gs->use_count;
2110 goto got_found;
2111 }
2112 gi->next = hs->got_entries;
2113 hs->got_entries = gi;
2114 got_found:;
252b5132 2115 }
a7519a3c
RH
2116 }
2117 hi->got_entries = NULL;
252b5132 2118
a7519a3c
RH
2119 /* And similar for the reloc entries. */
2120
2121 if (hs->reloc_entries == NULL)
2122 hs->reloc_entries = hi->reloc_entries;
2123 else
2124 {
2125 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2126
2127 rsh = hs->reloc_entries;
2128 for (ri = hi->reloc_entries; ri ; ri = rin)
2129 {
2130 rin = ri->next;
2131 for (rs = rsh; rs ; rs = rs->next)
2132 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2133 {
2134 rs->count += ri->count;
2135 goto found_reloc;
2136 }
2137 ri->next = hs->reloc_entries;
2138 hs->reloc_entries = ri;
2139 found_reloc:;
2140 }
252b5132 2141 }
a7519a3c 2142 hi->reloc_entries = NULL;
252b5132 2143
b34976b6 2144 return TRUE;
252b5132
RH
2145}
2146
a7519a3c 2147/* Is it possible to merge two object file's .got tables? */
252b5132 2148
b34976b6 2149static bfd_boolean
a7519a3c 2150elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2151{
a7519a3c
RH
2152 int total = alpha_elf_tdata (a)->total_got_size;
2153 bfd *bsub;
252b5132 2154
a7519a3c
RH
2155 /* Trivial quick fallout test. */
2156 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2157 return TRUE;
252b5132 2158
a7519a3c
RH
2159 /* By their nature, local .got entries cannot be merged. */
2160 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2161 return FALSE;
252b5132 2162
a7519a3c
RH
2163 /* Failing the common trivial comparison, we must effectively
2164 perform the merge. Not actually performing the merge means that
2165 we don't have to store undo information in case we fail. */
2166 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2167 {
2168 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2169 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2170 int i, n;
2171
2172 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2173 for (i = 0; i < n; ++i)
2174 {
2175 struct alpha_elf_got_entry *ae, *be;
2176 struct alpha_elf_link_hash_entry *h;
2177
2178 h = hashes[i];
2179 while (h->root.root.type == bfd_link_hash_indirect
2180 || h->root.root.type == bfd_link_hash_warning)
2181 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2182
2183 for (be = h->got_entries; be ; be = be->next)
2184 {
2185 if (be->use_count == 0)
2186 continue;
2187 if (be->gotobj != b)
2188 continue;
2189
2190 for (ae = h->got_entries; ae ; ae = ae->next)
2191 if (ae->gotobj == a
2192 && ae->reloc_type == be->reloc_type
2193 && ae->addend == be->addend)
2194 goto global_found;
2195
2196 total += alpha_got_entry_size (be->reloc_type);
2197 if (total > MAX_GOT_SIZE)
2198 return FALSE;
2199 global_found:;
2200 }
2201 }
2202 }
252b5132 2203
b34976b6 2204 return TRUE;
252b5132
RH
2205}
2206
a7519a3c 2207/* Actually merge two .got tables. */
252b5132 2208
a7519a3c
RH
2209static void
2210elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2211{
a7519a3c
RH
2212 int total = alpha_elf_tdata (a)->total_got_size;
2213 bfd *bsub;
252b5132 2214
a7519a3c
RH
2215 /* Remember local expansion. */
2216 {
2217 int e = alpha_elf_tdata (b)->local_got_size;
2218 total += e;
2219 alpha_elf_tdata (a)->local_got_size += e;
2220 }
252b5132 2221
a7519a3c
RH
2222 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2223 {
2224 struct alpha_elf_got_entry **local_got_entries;
2225 struct alpha_elf_link_hash_entry **hashes;
2226 Elf_Internal_Shdr *symtab_hdr;
2227 int i, n;
252b5132 2228
a7519a3c
RH
2229 /* Let the local .got entries know they are part of a new subsegment. */
2230 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2231 if (local_got_entries)
2232 {
2233 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2234 for (i = 0; i < n; ++i)
2235 {
2236 struct alpha_elf_got_entry *ent;
2237 for (ent = local_got_entries[i]; ent; ent = ent->next)
2238 ent->gotobj = a;
2239 }
2240 }
252b5132 2241
a7519a3c
RH
2242 /* Merge the global .got entries. */
2243 hashes = alpha_elf_sym_hashes (bsub);
2244 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2245
a7519a3c
RH
2246 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2247 for (i = 0; i < n; ++i)
2248 {
2249 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2250 struct alpha_elf_link_hash_entry *h;
252b5132 2251
a7519a3c
RH
2252 h = hashes[i];
2253 while (h->root.root.type == bfd_link_hash_indirect
2254 || h->root.root.type == bfd_link_hash_warning)
2255 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2256
a7519a3c
RH
2257 pbe = start = &h->got_entries;
2258 while ((be = *pbe) != NULL)
2259 {
2260 if (be->use_count == 0)
2261 {
2262 *pbe = be->next;
2263 memset (be, 0xa5, sizeof (*be));
2264 goto kill;
2265 }
2266 if (be->gotobj != b)
2267 goto next;
2268
2269 for (ae = *start; ae ; ae = ae->next)
2270 if (ae->gotobj == a
2271 && ae->reloc_type == be->reloc_type
2272 && ae->addend == be->addend)
2273 {
2274 ae->flags |= be->flags;
2275 ae->use_count += be->use_count;
2276 *pbe = be->next;
2277 memset (be, 0xa5, sizeof (*be));
2278 goto kill;
2279 }
2280 be->gotobj = a;
2281 total += alpha_got_entry_size (be->reloc_type);
252b5132 2282
a7519a3c
RH
2283 next:;
2284 pbe = &be->next;
2285 kill:;
2286 }
2287 }
252b5132 2288
a7519a3c
RH
2289 alpha_elf_tdata (bsub)->gotobj = a;
2290 }
2291 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2292
a7519a3c
RH
2293 /* Merge the two in_got chains. */
2294 {
2295 bfd *next;
252b5132 2296
a7519a3c
RH
2297 bsub = a;
2298 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2299 bsub = next;
252b5132 2300
a7519a3c
RH
2301 alpha_elf_tdata (bsub)->in_got_link_next = b;
2302 }
252b5132 2303}
a7519a3c
RH
2304
2305/* Calculate the offsets for the got entries. */
252b5132 2306
b34976b6 2307static bfd_boolean
a7519a3c
RH
2308elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2309 PTR arg ATTRIBUTE_UNUSED)
252b5132 2310{
a7519a3c 2311 struct alpha_elf_got_entry *gotent;
252b5132 2312
a7519a3c
RH
2313 if (h->root.root.type == bfd_link_hash_warning)
2314 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
252b5132 2315
a7519a3c
RH
2316 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2317 if (gotent->use_count > 0)
2318 {
2319 struct alpha_elf_obj_tdata *td;
2320 bfd_size_type *plge;
252b5132 2321
a7519a3c 2322 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2323 plge = &td->got->size;
2324 gotent->got_offset = *plge;
2325 *plge += alpha_got_entry_size (gotent->reloc_type);
2326 }
252b5132 2327
6ec7057a 2328 return TRUE;
a7519a3c 2329}
252b5132 2330
a7519a3c
RH
2331static void
2332elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2333{
2334 bfd *i, *got_list = alpha_elf_hash_table(info)->got_list;
252b5132 2335
a7519a3c
RH
2336 /* First, zero out the .got sizes, as we may be recalculating the
2337 .got after optimizing it. */
2338 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2339 alpha_elf_tdata(i)->got->size = 0;
252b5132 2340
a7519a3c
RH
2341 /* Next, fill in the offsets for all the global entries. */
2342 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2343 elf64_alpha_calc_got_offsets_for_symbol,
2344 NULL);
252b5132 2345
a7519a3c
RH
2346 /* Finally, fill in the offsets for the local entries. */
2347 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2348 {
2349 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2350 bfd *j;
252b5132 2351
a7519a3c
RH
2352 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2353 {
2354 struct alpha_elf_got_entry **local_got_entries, *gotent;
2355 int k, n;
252b5132 2356
a7519a3c
RH
2357 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2358 if (!local_got_entries)
2359 continue;
252b5132 2360
a7519a3c
RH
2361 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2362 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2363 if (gotent->use_count > 0)
2364 {
2365 gotent->got_offset = got_offset;
2366 got_offset += alpha_got_entry_size (gotent->reloc_type);
2367 }
2368 }
252b5132 2369
a7519a3c
RH
2370 alpha_elf_tdata(i)->got->size = got_offset;
2371 }
2372}
252b5132 2373
a7519a3c 2374/* Constructs the gots. */
252b5132 2375
b34976b6 2376static bfd_boolean
a7519a3c 2377elf64_alpha_size_got_sections (struct bfd_link_info *info)
252b5132 2378{
a7519a3c
RH
2379 bfd *i, *got_list, *cur_got_obj = NULL;
2380 int something_changed = 0;
252b5132 2381
a7519a3c 2382 got_list = alpha_elf_hash_table (info)->got_list;
95404643 2383
a7519a3c
RH
2384 /* On the first time through, pretend we have an existing got list
2385 consisting of all of the input files. */
2386 if (got_list == NULL)
252b5132 2387 {
a7519a3c 2388 for (i = info->input_bfds; i ; i = i->link_next)
252b5132 2389 {
a7519a3c
RH
2390 bfd *this_got = alpha_elf_tdata (i)->gotobj;
2391 if (this_got == NULL)
2392 continue;
252b5132 2393
a7519a3c
RH
2394 /* We are assuming no merging has yet occurred. */
2395 BFD_ASSERT (this_got == i);
252b5132 2396
a7519a3c 2397 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2398 {
a7519a3c
RH
2399 /* Yikes! A single object file has too many entries. */
2400 (*_bfd_error_handler)
2401 (_("%B: .got subsegment exceeds 64K (size %d)"),
2402 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2403 return FALSE;
252b5132 2404 }
252b5132 2405
a7519a3c
RH
2406 if (got_list == NULL)
2407 got_list = this_got;
2408 else
2409 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2410 cur_got_obj = this_got;
252b5132
RH
2411 }
2412
a7519a3c
RH
2413 /* Strange degenerate case of no got references. */
2414 if (got_list == NULL)
2415 return TRUE;
2416
2417 alpha_elf_hash_table (info)->got_list = got_list;
2418
2419 /* Force got offsets to be recalculated. */
2420 something_changed = 1;
2421 }
2422
2423 cur_got_obj = got_list;
2424 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2425 while (i != NULL)
2426 {
2427 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
252b5132 2428 {
a7519a3c 2429 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2430
a7519a3c
RH
2431 alpha_elf_tdata(i)->got->size = 0;
2432 i = alpha_elf_tdata(i)->got_link_next;
2433 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2434
2435 something_changed = 1;
2436 }
2437 else
2438 {
2439 cur_got_obj = i;
2440 i = alpha_elf_tdata(i)->got_link_next;
2441 }
252b5132
RH
2442 }
2443
a7519a3c
RH
2444 /* Once the gots have been merged, fill in the got offsets for
2445 everything therein. */
2446 if (1 || something_changed)
2447 elf64_alpha_calc_got_offsets (info);
252b5132 2448
a7519a3c 2449 return TRUE;
252b5132 2450}
252b5132 2451
b34976b6 2452static bfd_boolean
a7519a3c 2453elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h, PTR data)
252b5132 2454{
a7519a3c
RH
2455 asection *splt = (asection *) data;
2456 struct alpha_elf_got_entry *gotent;
6ec7057a 2457 bfd_boolean saw_one = FALSE;
252b5132 2458
a7519a3c
RH
2459 /* If we didn't need an entry before, we still don't. */
2460 if (!h->root.needs_plt)
2461 return TRUE;
e92d460e 2462
6ec7057a 2463 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2464 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2465 if (gotent->reloc_type == R_ALPHA_LITERAL
2466 && gotent->use_count > 0)
6ec7057a
RH
2467 {
2468 if (splt->size == 0)
2469 splt->size = PLT_HEADER_SIZE;
2470 gotent->plt_offset = splt->size;
2471 splt->size += PLT_ENTRY_SIZE;
2472 saw_one = TRUE;
2473 }
a7519a3c 2474
6ec7057a
RH
2475 /* If there weren't any, there's no longer a need for the PLT entry. */
2476 if (!saw_one)
2477 h->root.needs_plt = FALSE;
a7519a3c
RH
2478
2479 return TRUE;
2480}
2481
2482/* Called from relax_section to rebuild the PLT in light of
2483 potential changes in the function's status. */
2484
2485static bfd_boolean
2486elf64_alpha_size_plt_section (struct bfd_link_info *info)
2487{
6ec7057a 2488 asection *splt, *spltrel, *sgotplt;
a7519a3c
RH
2489 unsigned long entries;
2490 bfd *dynobj;
2491
2492 dynobj = elf_hash_table(info)->dynobj;
6ec7057a 2493 splt = bfd_get_section_by_name (dynobj, ".plt");
a7519a3c 2494 if (splt == NULL)
b34976b6 2495 return TRUE;
252b5132 2496
a7519a3c 2497 splt->size = 0;
252b5132 2498
a7519a3c
RH
2499 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2500 elf64_alpha_size_plt_section_1, splt);
e92d460e 2501
a7519a3c
RH
2502 /* Every plt entry requires a JMP_SLOT relocation. */
2503 spltrel = bfd_get_section_by_name (dynobj, ".rela.plt");
2504 if (splt->size)
6ec7057a
RH
2505 {
2506 if (elf64_alpha_use_secureplt)
2507 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2508 else
2509 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2510 }
a7519a3c
RH
2511 else
2512 entries = 0;
2513 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2514
6ec7057a
RH
2515 /* When using the secureplt, we need two words somewhere in the data
2516 segment for the dynamic linker to tell us where to go. This is the
2517 entire contents of the .got.plt section. */
2518 if (elf64_alpha_use_secureplt)
2519 {
2520 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
2521 sgotplt->size = entries ? 16 : 0;
2522 }
2523
a7519a3c
RH
2524 return TRUE;
2525}
e92d460e 2526
a7519a3c
RH
2527static bfd_boolean
2528elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2529 struct bfd_link_info *info)
2530{
2531 bfd *i;
252b5132 2532
a7519a3c
RH
2533 if (info->relocatable)
2534 return TRUE;
252b5132 2535
a7519a3c
RH
2536 /* First, take care of the indirect symbols created by versioning. */
2537 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2538 elf64_alpha_merge_ind_symbols,
2539 NULL);
252b5132 2540
a7519a3c
RH
2541 if (!elf64_alpha_size_got_sections (info))
2542 return FALSE;
252b5132 2543
a7519a3c
RH
2544 /* Allocate space for all of the .got subsections. */
2545 i = alpha_elf_hash_table (info)->got_list;
2546 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2547 {
a7519a3c
RH
2548 asection *s = alpha_elf_tdata(i)->got;
2549 if (s->size > 0)
2550 {
2551 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2552 if (s->contents == NULL)
2553 return FALSE;
2554 }
252b5132
RH
2555 }
2556
b34976b6 2557 return TRUE;
252b5132 2558}
3765b1be 2559
a7519a3c 2560/* The number of dynamic relocations required by a static relocation. */
3765b1be 2561
a7519a3c
RH
2562static int
2563alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared)
2564{
2565 switch (r_type)
3765b1be 2566 {
a7519a3c
RH
2567 /* May appear in GOT entries. */
2568 case R_ALPHA_TLSGD:
2569 return (dynamic ? 2 : shared ? 1 : 0);
2570 case R_ALPHA_TLSLDM:
2571 return shared;
2572 case R_ALPHA_LITERAL:
2573 case R_ALPHA_GOTTPREL:
2574 return dynamic || shared;
2575 case R_ALPHA_GOTDTPREL:
2576 return dynamic;
3765b1be 2577
a7519a3c
RH
2578 /* May appear in data sections. */
2579 case R_ALPHA_REFLONG:
2580 case R_ALPHA_REFQUAD:
2581 case R_ALPHA_TPREL64:
2582 return dynamic || shared;
3765b1be 2583
a7519a3c
RH
2584 /* Everything else is illegal. We'll issue an error during
2585 relocate_section. */
2586 default:
2587 return 0;
2588 }
2589}
3765b1be 2590
a7519a3c 2591/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2592
a7519a3c
RH
2593static bfd_boolean
2594elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2595 struct bfd_link_info *info)
2596{
2597 bfd_boolean dynamic;
2598 struct alpha_elf_reloc_entry *relent;
2599 unsigned long entries;
3765b1be 2600
a7519a3c
RH
2601 if (h->root.root.type == bfd_link_hash_warning)
2602 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
3765b1be 2603
a7519a3c
RH
2604 /* If the symbol was defined as a common symbol in a regular object
2605 file, and there was no definition in any dynamic object, then the
2606 linker will have allocated space for the symbol in a common
2607 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2608 set. This is done for dynamic symbols in
2609 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2610 symbols, somehow. */
2611 if (!h->root.def_regular
2612 && h->root.ref_regular
2613 && !h->root.def_dynamic
2614 && (h->root.root.type == bfd_link_hash_defined
2615 || h->root.root.type == bfd_link_hash_defweak)
2616 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2617 h->root.def_regular = 1;
3765b1be 2618
a7519a3c
RH
2619 /* If the symbol is dynamic, we'll need all the relocations in their
2620 natural form. If this is a shared object, and it has been forced
2621 local, we'll need the same number of RELATIVE relocations. */
2622 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2623
a7519a3c
RH
2624 /* If the symbol is a hidden undefined weak, then we never have any
2625 relocations. Avoid the loop which may want to add RELATIVE relocs
2626 based on info->shared. */
2627 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2628 return TRUE;
2629
2630 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2631 {
a7519a3c
RH
2632 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
2633 info->shared);
2634 if (entries)
2635 {
2636 relent->srel->size +=
2637 entries * sizeof (Elf64_External_Rela) * relent->count;
2638 if (relent->reltext)
2639 info->flags |= DT_TEXTREL;
2640 }
2641 }
3765b1be 2642
a7519a3c
RH
2643 return TRUE;
2644}
3765b1be 2645
a7519a3c
RH
2646/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2647 global symbols. */
3765b1be 2648
a7519a3c
RH
2649static bfd_boolean
2650elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2651 struct bfd_link_info *info)
2652{
2653 bfd_boolean dynamic;
2654 struct alpha_elf_got_entry *gotent;
2655 unsigned long entries;
3765b1be 2656
a7519a3c
RH
2657 if (h->root.root.type == bfd_link_hash_warning)
2658 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
2659
6ec7057a
RH
2660 /* If we're using a plt for this symbol, then all of its relocations
2661 for its got entries go into .rela.plt. */
2662 if (h->root.needs_plt)
2663 return TRUE;
2664
a7519a3c
RH
2665 /* If the symbol is dynamic, we'll need all the relocations in their
2666 natural form. If this is a shared object, and it has been forced
2667 local, we'll need the same number of RELATIVE relocations. */
2668 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2669
2670 /* If the symbol is a hidden undefined weak, then we never have any
2671 relocations. Avoid the loop which may want to add RELATIVE relocs
2672 based on info->shared. */
2673 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2674 return TRUE;
2675
2676 entries = 0;
2677 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2678 if (gotent->use_count > 0)
2679 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type,
2680 dynamic, info->shared);
2681
a7519a3c
RH
2682 if (entries > 0)
2683 {
2684 bfd *dynobj = elf_hash_table(info)->dynobj;
2685 asection *srel = bfd_get_section_by_name (dynobj, ".rela.got");
2686 BFD_ASSERT (srel != NULL);
2687 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2688 }
3765b1be 2689
a7519a3c 2690 return TRUE;
3765b1be
RH
2691}
2692
a7519a3c 2693/* Set the sizes of the dynamic relocation sections. */
252b5132 2694
b34976b6 2695static bfd_boolean
a7519a3c 2696elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2697{
a7519a3c
RH
2698 unsigned long entries;
2699 bfd *i, *dynobj;
2700 asection *srel;
252b5132 2701
a7519a3c
RH
2702 /* Shared libraries often require RELATIVE relocs, and some relocs
2703 require attention for the main application as well. */
252b5132 2704
a7519a3c
RH
2705 entries = 0;
2706 for (i = alpha_elf_hash_table(info)->got_list;
2707 i ; i = alpha_elf_tdata(i)->got_link_next)
2708 {
2709 bfd *j;
3241278a 2710
a7519a3c
RH
2711 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2712 {
2713 struct alpha_elf_got_entry **local_got_entries, *gotent;
2714 int k, n;
252b5132 2715
a7519a3c
RH
2716 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2717 if (!local_got_entries)
2718 continue;
252b5132 2719
a7519a3c
RH
2720 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2721 for (gotent = local_got_entries[k];
2722 gotent ; gotent = gotent->next)
2723 if (gotent->use_count > 0)
2724 entries += (alpha_dynamic_entries_for_reloc
2725 (gotent->reloc_type, 0, info->shared));
2726 }
2727 }
3765b1be 2728
a7519a3c
RH
2729 dynobj = elf_hash_table(info)->dynobj;
2730 srel = bfd_get_section_by_name (dynobj, ".rela.got");
2731 if (!srel)
2732 {
2733 BFD_ASSERT (entries == 0);
2734 return TRUE;
2735 }
2736 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2737
a7519a3c
RH
2738 /* Now do the non-local symbols. */
2739 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2740 elf64_alpha_size_rela_got_1, info);
252b5132 2741
a7519a3c
RH
2742 return TRUE;
2743}
252b5132 2744
a7519a3c 2745/* Set the sizes of the dynamic sections. */
3765b1be 2746
a7519a3c
RH
2747static bfd_boolean
2748elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2749 struct bfd_link_info *info)
2750{
2751 bfd *dynobj;
2752 asection *s;
2753 bfd_boolean relplt;
3765b1be 2754
a7519a3c
RH
2755 dynobj = elf_hash_table(info)->dynobj;
2756 BFD_ASSERT(dynobj != NULL);
252b5132 2757
a7519a3c
RH
2758 if (elf_hash_table (info)->dynamic_sections_created)
2759 {
2760 /* Set the contents of the .interp section to the interpreter. */
2761 if (info->executable)
252b5132 2762 {
a7519a3c
RH
2763 s = bfd_get_section_by_name (dynobj, ".interp");
2764 BFD_ASSERT (s != NULL);
2765 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2766 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2767 }
3765b1be 2768
a7519a3c
RH
2769 /* Now that we've seen all of the input files, we can decide which
2770 symbols need dynamic relocation entries and which don't. We've
2771 collected information in check_relocs that we can now apply to
2772 size the dynamic relocation sections. */
2773 alpha_elf_link_hash_traverse (alpha_elf_hash_table (info),
2774 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2775
a7519a3c 2776 elf64_alpha_size_rela_got_section (info);
6ec7057a 2777 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2778 }
2779 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2780
a7519a3c
RH
2781 /* The check_relocs and adjust_dynamic_symbol entry points have
2782 determined the sizes of the various dynamic sections. Allocate
2783 memory for them. */
2784 relplt = FALSE;
2785 for (s = dynobj->sections; s != NULL; s = s->next)
2786 {
2787 const char *name;
2788 bfd_boolean strip;
3765b1be 2789
a7519a3c
RH
2790 if (!(s->flags & SEC_LINKER_CREATED))
2791 continue;
cc03ec80 2792
a7519a3c
RH
2793 /* It's OK to base decisions on the section name, because none
2794 of the dynobj section names depend upon the input files. */
2795 name = bfd_get_section_name (dynobj, s);
3765b1be 2796
a7519a3c
RH
2797 /* If we don't need this section, strip it from the output file.
2798 This is to handle .rela.bss and .rela.plt. We must create it
2799 in create_dynamic_sections, because it must be created before
2800 the linker maps input sections to output sections. The
2801 linker does that before adjust_dynamic_symbol is called, and
2802 it is that function which decides whether anything needs to
2803 go into these sections. */
3765b1be 2804
a7519a3c 2805 strip = FALSE;
3765b1be 2806
a7519a3c 2807 if (strncmp (name, ".rela", 5) == 0)
3765b1be 2808 {
a7519a3c 2809 strip = (s->size == 0);
252b5132 2810
a7519a3c
RH
2811 if (!strip)
2812 {
2813 if (strcmp(name, ".rela.plt") == 0)
2814 relplt = TRUE;
252b5132 2815
a7519a3c
RH
2816 /* We use the reloc_count field as a counter if we need
2817 to copy relocs into the output file. */
2818 s->reloc_count = 0;
252b5132 2819 }
3765b1be 2820 }
a7519a3c 2821 else if (strcmp (name, ".plt") != 0)
3765b1be 2822 {
a7519a3c
RH
2823 /* It's not one of our dynamic sections, so don't allocate space. */
2824 continue;
2825 }
252b5132 2826
a7519a3c
RH
2827 if (strip)
2828 s->flags |= SEC_EXCLUDE;
2829 else
2830 {
2831 /* Allocate memory for the section contents. */
2832 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2833 if (s->contents == NULL && s->size != 0)
b34976b6 2834 return FALSE;
a7519a3c
RH
2835 }
2836 }
3765b1be 2837
a7519a3c
RH
2838 if (elf_hash_table (info)->dynamic_sections_created)
2839 {
2840 /* Add some entries to the .dynamic section. We fill in the
2841 values later, in elf64_alpha_finish_dynamic_sections, but we
2842 must add the entries now so that we get the correct size for
2843 the .dynamic section. The DT_DEBUG entry is filled in by the
2844 dynamic linker and used by the debugger. */
2845#define add_dynamic_entry(TAG, VAL) \
2846 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2847
a7519a3c
RH
2848 if (info->executable)
2849 {
2850 if (!add_dynamic_entry (DT_DEBUG, 0))
2851 return FALSE;
3765b1be
RH
2852 }
2853
a7519a3c 2854 if (relplt)
3765b1be 2855 {
a7519a3c
RH
2856 if (!add_dynamic_entry (DT_PLTGOT, 0)
2857 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2858 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2859 || !add_dynamic_entry (DT_JMPREL, 0))
2860 return FALSE;
6ec7057a
RH
2861
2862 if (elf64_alpha_use_secureplt
2863 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2864 return FALSE;
a7519a3c 2865 }
252b5132 2866
a7519a3c
RH
2867 if (!add_dynamic_entry (DT_RELA, 0)
2868 || !add_dynamic_entry (DT_RELASZ, 0)
2869 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2870 return FALSE;
2871
2872 if (info->flags & DF_TEXTREL)
2873 {
2874 if (!add_dynamic_entry (DT_TEXTREL, 0))
2875 return FALSE;
252b5132
RH
2876 }
2877 }
a7519a3c 2878#undef add_dynamic_entry
252b5132 2879
b34976b6 2880 return TRUE;
252b5132 2881}
a7519a3c
RH
2882\f
2883/* These functions do relaxation for Alpha ELF.
252b5132 2884
a7519a3c
RH
2885 Currently I'm only handling what I can do with existing compiler
2886 and assembler support, which means no instructions are removed,
2887 though some may be nopped. At this time GCC does not emit enough
2888 information to do all of the relaxing that is possible. It will
2889 take some not small amount of work for that to happen.
252b5132 2890
a7519a3c
RH
2891 There are a couple of interesting papers that I once read on this
2892 subject, that I cannot find references to at the moment, that
2893 related to Alpha in particular. They are by David Wall, then of
2894 DEC WRL. */
252b5132 2895
a7519a3c
RH
2896struct alpha_relax_info
2897{
2898 bfd *abfd;
2899 asection *sec;
2900 bfd_byte *contents;
2901 Elf_Internal_Shdr *symtab_hdr;
2902 Elf_Internal_Rela *relocs, *relend;
2903 struct bfd_link_info *link_info;
2904 bfd_vma gp;
2905 bfd *gotobj;
2906 asection *tsec;
2907 struct alpha_elf_link_hash_entry *h;
2908 struct alpha_elf_got_entry **first_gotent;
2909 struct alpha_elf_got_entry *gotent;
2910 bfd_boolean changed_contents;
2911 bfd_boolean changed_relocs;
2912 unsigned char other;
2913};
252b5132 2914
a7519a3c
RH
2915static Elf_Internal_Rela *
2916elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2917 Elf_Internal_Rela *relend,
2918 bfd_vma offset, int type)
2919{
2920 while (rel < relend)
252b5132 2921 {
a7519a3c
RH
2922 if (rel->r_offset == offset
2923 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2924 return rel;
2925 ++rel;
2926 }
2927 return NULL;
2928}
252b5132 2929
a7519a3c
RH
2930static bfd_boolean
2931elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
2932 Elf_Internal_Rela *irel, unsigned long r_type)
2933{
2934 unsigned int insn;
2935 bfd_signed_vma disp;
252b5132 2936
a7519a3c
RH
2937 /* Get the instruction. */
2938 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 2939
a7519a3c
RH
2940 if (insn >> 26 != OP_LDQ)
2941 {
2942 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
2943 ((*_bfd_error_handler)
2944 ("%B: %A+0x%lx: warning: %s relocation against unexpected insn",
2945 info->abfd, info->sec,
2946 (unsigned long) irel->r_offset, howto->name));
2947 return TRUE;
2948 }
252b5132 2949
a7519a3c
RH
2950 /* Can't relax dynamic symbols. */
2951 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
2952 return TRUE;
252b5132 2953
a7519a3c
RH
2954 /* Can't use local-exec relocations in shared libraries. */
2955 if (r_type == R_ALPHA_GOTTPREL && info->link_info->shared)
2956 return TRUE;
252b5132 2957
a7519a3c
RH
2958 if (r_type == R_ALPHA_LITERAL)
2959 {
2960 /* Look for nice constant addresses. This includes the not-uncommon
2961 special case of 0 for undefweak symbols. */
2962 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
2963 || (!info->link_info->shared
2964 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
2965 {
2966 disp = 0;
2967 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
2968 insn |= (symval & 0xffff);
2969 r_type = R_ALPHA_NONE;
2970 }
2971 else
2972 {
2973 disp = symval - info->gp;
2974 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
2975 r_type = R_ALPHA_GPREL16;
2976 }
252b5132
RH
2977 }
2978 else
252b5132 2979 {
a7519a3c 2980 bfd_vma dtp_base, tp_base;
252b5132 2981
a7519a3c
RH
2982 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
2983 dtp_base = alpha_get_dtprel_base (info->link_info);
2984 tp_base = alpha_get_tprel_base (info->link_info);
2985 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 2986
a7519a3c 2987 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 2988
a7519a3c
RH
2989 switch (r_type)
2990 {
2991 case R_ALPHA_GOTDTPREL:
2992 r_type = R_ALPHA_DTPREL16;
2993 break;
2994 case R_ALPHA_GOTTPREL:
2995 r_type = R_ALPHA_TPREL16;
2996 break;
2997 default:
2998 BFD_ASSERT (0);
2999 return FALSE;
3000 }
3001 }
252b5132 3002
a7519a3c 3003 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3004 return TRUE;
252b5132 3005
a7519a3c
RH
3006 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3007 info->changed_contents = TRUE;
252b5132 3008
a7519a3c
RH
3009 /* Reduce the use count on this got entry by one, possibly
3010 eliminating it. */
3011 if (--info->gotent->use_count == 0)
252b5132 3012 {
a7519a3c
RH
3013 int sz = alpha_got_entry_size (r_type);
3014 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3015 if (!info->h)
3016 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3017 }
252b5132 3018
a7519a3c
RH
3019 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3020 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3021 info->changed_relocs = TRUE;
3022
3023 /* ??? Search forward through this basic block looking for insns
3024 that use the target register. Stop after an insn modifying the
3025 register is seen, or after a branch or call.
252b5132 3026
a7519a3c
RH
3027 Any such memory load insn may be substituted by a load directly
3028 off the GP. This allows the memory load insn to be issued before
3029 the calculated GP register would otherwise be ready.
252b5132 3030
a7519a3c
RH
3031 Any such jsr insn can be replaced by a bsr if it is in range.
3032
3033 This would mean that we'd have to _add_ relocations, the pain of
3034 which gives one pause. */
252b5132 3035
b34976b6 3036 return TRUE;
252b5132
RH
3037}
3038
a7519a3c
RH
3039static bfd_vma
3040elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3041{
a7519a3c
RH
3042 /* If the function has the same gp, and we can identify that the
3043 function does not use its function pointer, we can eliminate the
3044 address load. */
252b5132 3045
a7519a3c
RH
3046 /* If the symbol is marked NOPV, we are being told the function never
3047 needs its procedure value. */
3048 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3049 return symval;
252b5132 3050
a7519a3c
RH
3051 /* If the symbol is marked STD_GP, we are being told the function does
3052 a normal ldgp in the first two words. */
3053 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3054 ;
252b5132 3055
a7519a3c
RH
3056 /* Otherwise, we may be able to identify a GP load in the first two
3057 words, which we can then skip. */
3058 else
252b5132 3059 {
a7519a3c
RH
3060 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3061 bfd_vma ofs;
252b5132 3062
a7519a3c
RH
3063 /* Load the relocations from the section that the target symbol is in. */
3064 if (info->sec == info->tsec)
252b5132 3065 {
a7519a3c
RH
3066 tsec_relocs = info->relocs;
3067 tsec_relend = info->relend;
3068 tsec_free = NULL;
3069 }
3070 else
3071 {
3072 tsec_relocs = (_bfd_elf_link_read_relocs
3073 (info->abfd, info->tsec, (PTR) NULL,
3074 (Elf_Internal_Rela *) NULL,
3075 info->link_info->keep_memory));
3076 if (tsec_relocs == NULL)
3077 return 0;
3078 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3079 tsec_free = (info->link_info->keep_memory ? NULL : tsec_relocs);
3080 }
252b5132 3081
a7519a3c
RH
3082 /* Recover the symbol's offset within the section. */
3083 ofs = (symval - info->tsec->output_section->vma
3084 - info->tsec->output_offset);
252b5132 3085
a7519a3c
RH
3086 /* Look for a GPDISP reloc. */
3087 gpdisp = (elf64_alpha_find_reloc_at_ofs
3088 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3089
a7519a3c
RH
3090 if (!gpdisp || gpdisp->r_addend != 4)
3091 {
3092 if (tsec_free)
3093 free (tsec_free);
3094 return 0;
252b5132 3095 }
a7519a3c
RH
3096 if (tsec_free)
3097 free (tsec_free);
252b5132
RH
3098 }
3099
a7519a3c
RH
3100 /* We've now determined that we can skip an initial gp load. Verify
3101 that the call and the target use the same gp. */
3102 if (info->link_info->hash->creator != info->tsec->owner->xvec
3103 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3104 return 0;
252b5132 3105
a7519a3c
RH
3106 return symval + 8;
3107}
252b5132 3108
a7519a3c
RH
3109static bfd_boolean
3110elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3111 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3112{
a7519a3c
RH
3113 Elf_Internal_Rela *urel, *irelend = info->relend;
3114 int flags, count, i;
3115 bfd_signed_vma disp;
3116 bfd_boolean fits16;
3117 bfd_boolean fits32;
3118 bfd_boolean lit_reused = FALSE;
3119 bfd_boolean all_optimized = TRUE;
3120 unsigned int lit_insn;
252b5132 3121
a7519a3c
RH
3122 lit_insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
3123 if (lit_insn >> 26 != OP_LDQ)
3124 {
3125 ((*_bfd_error_handler)
3126 ("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn",
3127 info->abfd, info->sec,
3128 (unsigned long) irel->r_offset));
3129 return TRUE;
3130 }
252b5132 3131
a7519a3c
RH
3132 /* Can't relax dynamic symbols. */
3133 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3134 return TRUE;
3135
3136 /* Summarize how this particular LITERAL is used. */
3137 for (urel = irel+1, flags = count = 0; urel < irelend; ++urel, ++count)
252b5132 3138 {
a7519a3c
RH
3139 if (ELF64_R_TYPE (urel->r_info) != R_ALPHA_LITUSE)
3140 break;
8288a39e 3141 if (urel->r_addend <= 6)
a7519a3c
RH
3142 flags |= 1 << urel->r_addend;
3143 }
252b5132 3144
a7519a3c
RH
3145 /* A little preparation for the loop... */
3146 disp = symval - info->gp;
252b5132 3147
a7519a3c
RH
3148 for (urel = irel+1, i = 0; i < count; ++i, ++urel)
3149 {
3150 unsigned int insn;
3151 int insn_disp;
3152 bfd_signed_vma xdisp;
252b5132 3153
a7519a3c 3154 insn = bfd_get_32 (info->abfd, info->contents + urel->r_offset);
252b5132 3155
a7519a3c
RH
3156 switch (urel->r_addend)
3157 {
3158 case LITUSE_ALPHA_ADDR:
3159 default:
3160 /* This type is really just a placeholder to note that all
3161 uses cannot be optimized, but to still allow some. */
3162 all_optimized = FALSE;
3163 break;
252b5132 3164
a7519a3c
RH
3165 case LITUSE_ALPHA_BASE:
3166 /* We can always optimize 16-bit displacements. */
252b5132 3167
a7519a3c
RH
3168 /* Extract the displacement from the instruction, sign-extending
3169 it if necessary, then test whether it is within 16 or 32 bits
3170 displacement from GP. */
3171 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3172
3173 xdisp = disp + insn_disp;
3174 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3175 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3176 && xdisp < 0x7fff8000);
3177
3178 if (fits16)
3179 {
3180 /* Take the op code and dest from this insn, take the base
3181 register from the literal insn. Leave the offset alone. */
3182 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
3183 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3184 R_ALPHA_GPREL16);
3185 urel->r_addend = irel->r_addend;
3186 info->changed_relocs = TRUE;
252b5132 3187
a7519a3c
RH
3188 bfd_put_32 (info->abfd, (bfd_vma) insn,
3189 info->contents + urel->r_offset);
3190 info->changed_contents = TRUE;
252b5132 3191 }
252b5132 3192
a7519a3c
RH
3193 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3194 else if (fits32 && !(flags & ~6))
3195 {
3196 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3197
a7519a3c
RH
3198 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3199 R_ALPHA_GPRELHIGH);
3200 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
3201 bfd_put_32 (info->abfd, (bfd_vma) lit_insn,
3202 info->contents + irel->r_offset);
3203 lit_reused = TRUE;
3204 info->changed_contents = TRUE;
252b5132 3205
a7519a3c
RH
3206 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3207 R_ALPHA_GPRELLOW);
3208 urel->r_addend = irel->r_addend;
3209 info->changed_relocs = TRUE;
3210 }
3211 else
3212 all_optimized = FALSE;
3213 break;
252b5132 3214
a7519a3c
RH
3215 case LITUSE_ALPHA_BYTOFF:
3216 /* We can always optimize byte instructions. */
252b5132 3217
a7519a3c
RH
3218 /* FIXME: sanity check the insn for byte op. Check that the
3219 literal dest reg is indeed Rb in the byte insn. */
252b5132 3220
a7519a3c
RH
3221 insn &= ~ (unsigned) 0x001ff000;
3222 insn |= ((symval & 7) << 13) | 0x1000;
252b5132 3223
a7519a3c
RH
3224 urel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3225 urel->r_addend = 0;
3226 info->changed_relocs = TRUE;
e92d460e 3227
a7519a3c
RH
3228 bfd_put_32 (info->abfd, (bfd_vma) insn,
3229 info->contents + urel->r_offset);
3230 info->changed_contents = TRUE;
3231 break;
252b5132 3232
a7519a3c
RH
3233 case LITUSE_ALPHA_JSR:
3234 case LITUSE_ALPHA_TLSGD:
3235 case LITUSE_ALPHA_TLSLDM:
8288a39e 3236 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3237 {
a7519a3c
RH
3238 bfd_vma optdest, org;
3239 bfd_signed_vma odisp;
252b5132 3240
a7519a3c
RH
3241 /* For undefined weak symbols, we're mostly interested in getting
3242 rid of the got entry whenever possible, so optimize this to a
3243 use of the zero register. */
3244 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3245 {
3246 insn |= 31 << 16;
3247 bfd_put_32 (info->abfd, (bfd_vma) insn,
3248 info->contents + urel->r_offset);
252b5132 3249
a7519a3c
RH
3250 info->changed_contents = TRUE;
3251 break;
3252 }
252b5132 3253
a7519a3c
RH
3254 /* If not zero, place to jump without needing pv. */
3255 optdest = elf64_alpha_relax_opt_call (info, symval);
3256 org = (info->sec->output_section->vma
3257 + info->sec->output_offset
3258 + urel->r_offset + 4);
3259 odisp = (optdest ? optdest : symval) - org;
252b5132 3260
a7519a3c
RH
3261 if (odisp >= -0x400000 && odisp < 0x400000)
3262 {
3263 Elf_Internal_Rela *xrel;
252b5132 3264
a7519a3c
RH
3265 /* Preserve branch prediction call stack when possible. */
3266 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3267 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3268 else
3269 insn = (OP_BR << 26) | (insn & 0x03e00000);
252b5132 3270
a7519a3c
RH
3271 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3272 R_ALPHA_BRADDR);
3273 urel->r_addend = irel->r_addend;
252b5132 3274
a7519a3c
RH
3275 if (optdest)
3276 urel->r_addend += optdest - symval;
3277 else
3278 all_optimized = FALSE;
252b5132 3279
a7519a3c
RH
3280 bfd_put_32 (info->abfd, (bfd_vma) insn,
3281 info->contents + urel->r_offset);
252b5132 3282
a7519a3c
RH
3283 /* Kill any HINT reloc that might exist for this insn. */
3284 xrel = (elf64_alpha_find_reloc_at_ofs
3285 (info->relocs, info->relend, urel->r_offset,
3286 R_ALPHA_HINT));
3287 if (xrel)
3288 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3289
a7519a3c
RH
3290 info->changed_contents = TRUE;
3291 info->changed_relocs = TRUE;
3292 }
3293 else
3294 all_optimized = FALSE;
252b5132 3295
a7519a3c
RH
3296 /* Even if the target is not in range for a direct branch,
3297 if we share a GP, we can eliminate the gp reload. */
3298 if (optdest)
3299 {
3300 Elf_Internal_Rela *gpdisp
3301 = (elf64_alpha_find_reloc_at_ofs
3302 (info->relocs, irelend, urel->r_offset + 4,
3303 R_ALPHA_GPDISP));
3304 if (gpdisp)
3305 {
3306 bfd_byte *p_ldah = info->contents + gpdisp->r_offset;
3307 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
3308 unsigned int ldah = bfd_get_32 (info->abfd, p_ldah);
3309 unsigned int lda = bfd_get_32 (info->abfd, p_lda);
252b5132 3310
a7519a3c
RH
3311 /* Verify that the instruction is "ldah $29,0($26)".
3312 Consider a function that ends in a noreturn call,
3313 and that the next function begins with an ldgp,
3314 and that by accident there is no padding between.
3315 In that case the insn would use $27 as the base. */
3316 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3317 {
3318 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_ldah);
3319 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3320
a7519a3c
RH
3321 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3322 info->changed_contents = TRUE;
3323 info->changed_relocs = TRUE;
3324 }
3325 }
3326 }
3327 }
3328 break;
252b5132 3329 }
252b5132
RH
3330 }
3331
a7519a3c
RH
3332 /* If all cases were optimized, we can reduce the use count on this
3333 got entry by one, possibly eliminating it. */
3334 if (all_optimized)
252b5132 3335 {
a7519a3c 3336 if (--info->gotent->use_count == 0)
252b5132 3337 {
a7519a3c
RH
3338 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3339 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3340 if (!info->h)
3341 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3342 }
a7519a3c
RH
3343
3344 /* If the literal instruction is no longer needed (it may have been
3345 reused. We can eliminate it. */
3346 /* ??? For now, I don't want to deal with compacting the section,
3347 so just nop it out. */
3348 if (!lit_reused)
252b5132 3349 {
a7519a3c
RH
3350 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3351 info->changed_relocs = TRUE;
252b5132 3352
a7519a3c
RH
3353 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP,
3354 info->contents + irel->r_offset);
3355 info->changed_contents = TRUE;
3356 }
252b5132 3357
a7519a3c
RH
3358 return TRUE;
3359 }
3360 else
3361 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3362}
3363
b34976b6 3364static bfd_boolean
a7519a3c
RH
3365elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3366 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3367{
a7519a3c
RH
3368 bfd_byte *pos[5];
3369 unsigned int insn;
3370 Elf_Internal_Rela *gpdisp, *hint;
3371 bfd_boolean dynamic, use_gottprel, pos1_unusable;
3372 unsigned long new_symndx;
f44f99a5 3373
a7519a3c 3374 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3375
a7519a3c
RH
3376 /* If a TLS symbol is accessed using IE at least once, there is no point
3377 to use dynamic model for it. */
3378 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3379 ;
f44f99a5 3380
a7519a3c
RH
3381 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3382 then we might as well relax to IE. */
3383 else if (info->link_info->shared && !dynamic
3384 && (info->link_info->flags & DF_STATIC_TLS))
3385 ;
f44f99a5 3386
a7519a3c
RH
3387 /* Otherwise we must be building an executable to do anything. */
3388 else if (info->link_info->shared)
3389 return TRUE;
f44f99a5 3390
a7519a3c
RH
3391 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3392 the matching LITUSE_TLS relocations. */
3393 if (irel + 2 >= info->relend)
3394 return TRUE;
3395 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3396 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3397 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3398 return TRUE;
f44f99a5 3399
a7519a3c
RH
3400 /* There must be a GPDISP relocation positioned immediately after the
3401 LITUSE relocation. */
3402 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3403 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3404 if (!gpdisp)
b34976b6 3405 return TRUE;
f44f99a5 3406
a7519a3c
RH
3407 pos[0] = info->contents + irel[0].r_offset;
3408 pos[1] = info->contents + irel[1].r_offset;
3409 pos[2] = info->contents + irel[2].r_offset;
3410 pos[3] = info->contents + gpdisp->r_offset;
3411 pos[4] = pos[3] + gpdisp->r_addend;
3412 pos1_unusable = FALSE;
f44f99a5 3413
a7519a3c
RH
3414 /* Generally, the positions are not allowed to be out of order, lest the
3415 modified insn sequence have different register lifetimes. We can make
3416 an exception when pos 1 is adjacent to pos 0. */
3417 if (pos[1] + 4 == pos[0])
f44f99a5 3418 {
a7519a3c
RH
3419 bfd_byte *tmp = pos[0];
3420 pos[0] = pos[1];
3421 pos[1] = tmp;
f44f99a5 3422 }
a7519a3c
RH
3423 else if (pos[1] < pos[0])
3424 pos1_unusable = TRUE;
3425 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3426 return TRUE;
cc03ec80 3427
a7519a3c
RH
3428 /* Reduce the use count on the LITERAL relocation. Do this before we
3429 smash the symndx when we adjust the relocations below. */
3430 {
3431 struct alpha_elf_got_entry *lit_gotent;
3432 struct alpha_elf_link_hash_entry *lit_h;
3433 unsigned long indx;
f44f99a5 3434
a7519a3c
RH
3435 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3436 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3437 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3438
a7519a3c
RH
3439 while (lit_h->root.root.type == bfd_link_hash_indirect
3440 || lit_h->root.root.type == bfd_link_hash_warning)
3441 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3442
a7519a3c
RH
3443 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3444 lit_gotent = lit_gotent->next)
3445 if (lit_gotent->gotobj == info->gotobj
3446 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3447 && lit_gotent->addend == irel[1].r_addend)
3448 break;
3449 BFD_ASSERT (lit_gotent);
252b5132 3450
a7519a3c
RH
3451 if (--lit_gotent->use_count == 0)
3452 {
3453 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3454 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3455 }
3456 }
252b5132 3457
a7519a3c 3458 /* Change
252b5132 3459
a7519a3c
RH
3460 lda $16,x($gp) !tlsgd!1
3461 ldq $27,__tls_get_addr($gp) !literal!1
3462 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3463 ldah $29,0($26) !gpdisp!2
3464 lda $29,0($29) !gpdisp!2
3465 to
3466 ldq $16,x($gp) !gottprel
3467 unop
3468 call_pal rduniq
3469 addq $16,$0,$0
3470 unop
3471 or the first pair to
3472 lda $16,x($gp) !tprel
3473 unop
3474 or
3475 ldah $16,x($gp) !tprelhi
3476 lda $16,x($16) !tprello
3477
3478 as appropriate. */
3479
3480 use_gottprel = FALSE;
3481 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : 0;
3482 switch (!dynamic && !info->link_info->shared)
252b5132 3483 {
a7519a3c
RH
3484 case 1:
3485 {
3486 bfd_vma tp_base;
3487 bfd_signed_vma disp;
252b5132 3488
a7519a3c
RH
3489 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3490 tp_base = alpha_get_tprel_base (info->link_info);
3491 disp = symval - tp_base;
252b5132 3492
a7519a3c
RH
3493 if (disp >= -0x8000 && disp < 0x8000)
3494 {
3495 insn = (OP_LDA << 26) | (16 << 21) | (31 << 16);
3496 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3497 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3498
a7519a3c
RH
3499 irel[0].r_offset = pos[0] - info->contents;
3500 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3501 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3502 break;
3503 }
3504 else if (disp >= -(bfd_signed_vma) 0x80000000
3505 && disp < (bfd_signed_vma) 0x7fff8000
3506 && !pos1_unusable)
3507 {
3508 insn = (OP_LDAH << 26) | (16 << 21) | (31 << 16);
3509 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3510 insn = (OP_LDA << 26) | (16 << 21) | (16 << 16);
3511 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3512
a7519a3c
RH
3513 irel[0].r_offset = pos[0] - info->contents;
3514 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3515 irel[1].r_offset = pos[1] - info->contents;
3516 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3517 break;
3518 }
3519 }
3520 /* FALLTHRU */
3765b1be 3521
3765b1be 3522 default:
a7519a3c
RH
3523 use_gottprel = TRUE;
3524
3525 insn = (OP_LDQ << 26) | (16 << 21) | (29 << 16);
3526 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3527 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3528
3529 irel[0].r_offset = pos[0] - info->contents;
3530 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3531 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3532 break;
3765b1be 3533 }
3765b1be 3534
a7519a3c 3535 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3536
a7519a3c
RH
3537 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3538 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3539
a7519a3c 3540 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3541
a7519a3c
RH
3542 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3543 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3544
a7519a3c
RH
3545 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3546 irel[2].r_offset, R_ALPHA_HINT);
3547 if (hint)
3548 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3549
a7519a3c
RH
3550 info->changed_contents = TRUE;
3551 info->changed_relocs = TRUE;
d6ad34f6 3552
a7519a3c
RH
3553 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3554 if (--info->gotent->use_count == 0)
3765b1be 3555 {
a7519a3c
RH
3556 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3557 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3558 if (!info->h)
3559 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3560 }
252b5132 3561
a7519a3c
RH
3562 /* If we've switched to a GOTTPREL relocation, increment the reference
3563 count on that got entry. */
3564 if (use_gottprel)
f44f99a5 3565 {
a7519a3c 3566 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3567
a7519a3c
RH
3568 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3569 tprel_gotent = tprel_gotent->next)
3570 if (tprel_gotent->gotobj == info->gotobj
3571 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3572 && tprel_gotent->addend == irel->r_addend)
3573 break;
3574 if (tprel_gotent)
3575 tprel_gotent->use_count++;
3576 else
f44f99a5 3577 {
a7519a3c
RH
3578 if (info->gotent->use_count == 0)
3579 tprel_gotent = info->gotent;
3580 else
3581 {
3582 tprel_gotent = (struct alpha_elf_got_entry *)
3583 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3584 if (!tprel_gotent)
3585 return FALSE;
f44f99a5 3586
a7519a3c
RH
3587 tprel_gotent->next = *info->first_gotent;
3588 *info->first_gotent = tprel_gotent;
f44f99a5 3589
a7519a3c
RH
3590 tprel_gotent->gotobj = info->gotobj;
3591 tprel_gotent->addend = irel->r_addend;
3592 tprel_gotent->got_offset = -1;
3593 tprel_gotent->reloc_done = 0;
3594 tprel_gotent->reloc_xlated = 0;
3595 }
f44f99a5 3596
a7519a3c
RH
3597 tprel_gotent->use_count = 1;
3598 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3599 }
f44f99a5 3600 }
f44f99a5 3601
b34976b6 3602 return TRUE;
f44f99a5
RH
3603}
3604
b34976b6 3605static bfd_boolean
a7519a3c
RH
3606elf64_alpha_relax_section (bfd *abfd, asection *sec,
3607 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3608{
a7519a3c
RH
3609 Elf_Internal_Shdr *symtab_hdr;
3610 Elf_Internal_Rela *internal_relocs;
3611 Elf_Internal_Rela *irel, *irelend;
3612 Elf_Internal_Sym *isymbuf = NULL;
3613 struct alpha_elf_got_entry **local_got_entries;
3614 struct alpha_relax_info info;
f44f99a5 3615
a7519a3c
RH
3616 /* We are not currently changing any sizes, so only one pass. */
3617 *again = FALSE;
f44f99a5 3618
a7519a3c
RH
3619 if (link_info->relocatable
3620 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3621 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3622 || sec->reloc_count == 0)
d6ad34f6
RH
3623 return TRUE;
3624
a7519a3c
RH
3625 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3626 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3627
a7519a3c
RH
3628 /* Load the relocations for this section. */
3629 internal_relocs = (_bfd_elf_link_read_relocs
3630 (abfd, sec, (PTR) NULL, (Elf_Internal_Rela *) NULL,
3631 link_info->keep_memory));
3632 if (internal_relocs == NULL)
3633 return FALSE;
252b5132 3634
a7519a3c
RH
3635 memset(&info, 0, sizeof (info));
3636 info.abfd = abfd;
3637 info.sec = sec;
3638 info.link_info = link_info;
3639 info.symtab_hdr = symtab_hdr;
3640 info.relocs = internal_relocs;
3641 info.relend = irelend = internal_relocs + sec->reloc_count;
3642
3643 /* Find the GP for this object. Do not store the result back via
3644 _bfd_set_gp_value, since this could change again before final. */
3645 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3646 if (info.gotobj)
3765b1be 3647 {
a7519a3c
RH
3648 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3649 info.gp = (sgot->output_section->vma
3650 + sgot->output_offset
3651 + 0x8000);
252b5132
RH
3652 }
3653
a7519a3c
RH
3654 /* Get the section contents. */
3655 if (elf_section_data (sec)->this_hdr.contents != NULL)
3656 info.contents = elf_section_data (sec)->this_hdr.contents;
3657 else
3658 {
3659 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3660 goto error_return;
3661 }
252b5132 3662
a7519a3c
RH
3663 for (irel = internal_relocs; irel < irelend; irel++)
3664 {
3665 bfd_vma symval;
3666 struct alpha_elf_got_entry *gotent;
3667 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3668 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3669
3670 /* Early exit for unhandled or unrelaxable relocations. */
3671 switch (r_type)
3672 {
3673 case R_ALPHA_LITERAL:
3674 case R_ALPHA_GPRELHIGH:
3675 case R_ALPHA_GPRELLOW:
3676 case R_ALPHA_GOTDTPREL:
3677 case R_ALPHA_GOTTPREL:
3678 case R_ALPHA_TLSGD:
3679 break;
3680
3681 case R_ALPHA_TLSLDM:
3682 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3683 reloc to the 0 symbol so that they all match. */
3684 r_symndx = 0;
3685 break;
3686
3687 default:
3688 continue;
3689 }
3690
3691 /* Get the value of the symbol referred to by the reloc. */
3692 if (r_symndx < symtab_hdr->sh_info)
3693 {
3694 /* A local symbol. */
3695 Elf_Internal_Sym *isym;
3696
3697 /* Read this BFD's local symbols. */
3698 if (isymbuf == NULL)
3699 {
3700 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3701 if (isymbuf == NULL)
3702 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3703 symtab_hdr->sh_info, 0,
3704 NULL, NULL, NULL);
3705 if (isymbuf == NULL)
3706 goto error_return;
3707 }
252b5132 3708
a7519a3c 3709 isym = isymbuf + r_symndx;
252b5132 3710
a7519a3c
RH
3711 /* Given the symbol for a TLSLDM reloc is ignored, this also
3712 means forcing the symbol value to the tp base. */
3713 if (r_type == R_ALPHA_TLSLDM)
3714 {
3715 info.tsec = bfd_abs_section_ptr;
3716 symval = alpha_get_tprel_base (info.link_info);
3717 }
3718 else
3719 {
3720 symval = isym->st_value;
3721 if (isym->st_shndx == SHN_UNDEF)
3722 continue;
3723 else if (isym->st_shndx == SHN_ABS)
3724 info.tsec = bfd_abs_section_ptr;
3725 else if (isym->st_shndx == SHN_COMMON)
3726 info.tsec = bfd_com_section_ptr;
3727 else
3728 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3729 }
252b5132 3730
a7519a3c
RH
3731 info.h = NULL;
3732 info.other = isym->st_other;
3733 if (local_got_entries)
3734 info.first_gotent = &local_got_entries[r_symndx];
3735 else
3736 {
3737 info.first_gotent = &info.gotent;
3738 info.gotent = NULL;
3739 }
252b5132 3740 }
a7519a3c
RH
3741 else
3742 {
3743 unsigned long indx;
3744 struct alpha_elf_link_hash_entry *h;
252b5132 3745
a7519a3c
RH
3746 indx = r_symndx - symtab_hdr->sh_info;
3747 h = alpha_elf_sym_hashes (abfd)[indx];
3748 BFD_ASSERT (h != NULL);
252b5132 3749
a7519a3c
RH
3750 while (h->root.root.type == bfd_link_hash_indirect
3751 || h->root.root.type == bfd_link_hash_warning)
3752 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3753
a7519a3c
RH
3754 /* If the symbol is undefined, we can't do anything with it. */
3755 if (h->root.root.type == bfd_link_hash_undefined)
3756 continue;
252b5132 3757
a7519a3c
RH
3758 /* If the symbol isn't defined in the current module,
3759 again we can't do anything. */
3760 if (h->root.root.type == bfd_link_hash_undefweak)
3761 {
3762 info.tsec = bfd_abs_section_ptr;
3763 symval = 0;
3764 }
3765 else if (!h->root.def_regular)
3766 {
3767 /* Except for TLSGD relocs, which can sometimes be
3768 relaxed to GOTTPREL relocs. */
3769 if (r_type != R_ALPHA_TLSGD)
3770 continue;
3771 info.tsec = bfd_abs_section_ptr;
3772 symval = 0;
3773 }
3774 else
3775 {
3776 info.tsec = h->root.root.u.def.section;
3777 symval = h->root.root.u.def.value;
3778 }
252b5132 3779
a7519a3c
RH
3780 info.h = h;
3781 info.other = h->root.other;
3782 info.first_gotent = &h->got_entries;
3783 }
252b5132 3784
a7519a3c
RH
3785 /* Search for the got entry to be used by this relocation. */
3786 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3787 if (gotent->gotobj == info.gotobj
3788 && gotent->reloc_type == r_type
3789 && gotent->addend == irel->r_addend)
3790 break;
3791 info.gotent = gotent;
252b5132 3792
a7519a3c
RH
3793 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3794 symval += irel->r_addend;
252b5132 3795
a7519a3c 3796 switch (r_type)
252b5132 3797 {
a7519a3c
RH
3798 case R_ALPHA_LITERAL:
3799 BFD_ASSERT(info.gotent != NULL);
252b5132 3800
a7519a3c
RH
3801 /* If there exist LITUSE relocations immediately following, this
3802 opens up all sorts of interesting optimizations, because we
3803 now know every location that this address load is used. */
3804 if (irel+1 < irelend
3805 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3806 {
a7519a3c
RH
3807 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3808 goto error_return;
252b5132 3809 }
a7519a3c
RH
3810 else
3811 {
3812 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3813 goto error_return;
3814 }
3815 break;
252b5132 3816
a7519a3c
RH
3817 case R_ALPHA_GOTDTPREL:
3818 case R_ALPHA_GOTTPREL:
3819 BFD_ASSERT(info.gotent != NULL);
3820 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3821 goto error_return;
3822 break;
3823
3824 case R_ALPHA_TLSGD:
3825 case R_ALPHA_TLSLDM:
3826 BFD_ASSERT(info.gotent != NULL);
3827 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3828 r_type == R_ALPHA_TLSGD))
3829 goto error_return;
3830 break;
252b5132
RH
3831 }
3832 }
3833
a7519a3c
RH
3834 if (!elf64_alpha_size_plt_section (link_info))
3835 return FALSE;
3836 if (!elf64_alpha_size_got_sections (link_info))
3837 return FALSE;
3838 if (!elf64_alpha_size_rela_got_section (link_info))
3839 return FALSE;
dc810e39 3840
a7519a3c
RH
3841 if (isymbuf != NULL
3842 && symtab_hdr->contents != (unsigned char *) isymbuf)
3843 {
3844 if (!link_info->keep_memory)
3845 free (isymbuf);
3846 else
252b5132 3847 {
a7519a3c
RH
3848 /* Cache the symbols for elf_link_input_bfd. */
3849 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3850 }
a7519a3c 3851 }
252b5132 3852
a7519a3c
RH
3853 if (info.contents != NULL
3854 && elf_section_data (sec)->this_hdr.contents != info.contents)
3855 {
3856 if (!info.changed_contents && !link_info->keep_memory)
3857 free (info.contents);
3858 else
252b5132 3859 {
a7519a3c
RH
3860 /* Cache the section contents for elf_link_input_bfd. */
3861 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 3862 }
a7519a3c 3863 }
252b5132 3864
a7519a3c
RH
3865 if (elf_section_data (sec)->relocs != internal_relocs)
3866 {
3867 if (!info.changed_relocs)
3868 free (internal_relocs);
3869 else
3870 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3871 }
a7519a3c
RH
3872
3873 *again = info.changed_contents || info.changed_relocs;
252b5132 3874
b34976b6 3875 return TRUE;
252b5132 3876
a7519a3c
RH
3877 error_return:
3878 if (isymbuf != NULL
3879 && symtab_hdr->contents != (unsigned char *) isymbuf)
3880 free (isymbuf);
3881 if (info.contents != NULL
3882 && elf_section_data (sec)->this_hdr.contents != info.contents)
3883 free (info.contents);
3884 if (internal_relocs != NULL
3885 && elf_section_data (sec)->relocs != internal_relocs)
3886 free (internal_relocs);
3887 return FALSE;
3888}
3889\f
1bbc9cec
RH
3890/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
3891 into the next available slot in SREL. */
3892
3893static void
a7519a3c
RH
3894elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
3895 asection *sec, asection *srel, bfd_vma offset,
3896 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
3897{
3898 Elf_Internal_Rela outrel;
3899 bfd_byte *loc;
3900
3901 BFD_ASSERT (srel != NULL);
3902
3903 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
3904 outrel.r_addend = addend;
3905
3906 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
3907 if ((offset | 1) != (bfd_vma) -1)
3908 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
3909 else
3910 memset (&outrel, 0, sizeof (outrel));
3911
3912 loc = srel->contents;
3913 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
3914 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 3915 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
3916}
3917
4a67a098
RH
3918/* Relocate an Alpha ELF section for a relocatable link.
3919
3920 We don't have to change anything unless the reloc is against a section
3921 symbol, in which case we have to adjust according to where the section
3922 symbol winds up in the output section. */
3923
b34976b6 3924static bfd_boolean
a7519a3c
RH
3925elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
3926 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3927 bfd *input_bfd, asection *input_section,
3928 bfd_byte *contents ATTRIBUTE_UNUSED,
3929 Elf_Internal_Rela *relocs,
3930 Elf_Internal_Sym *local_syms,
3931 asection **local_sections)
4a67a098
RH
3932{
3933 unsigned long symtab_hdr_sh_info;
3934 Elf_Internal_Rela *rel;
3935 Elf_Internal_Rela *relend;
b34976b6 3936 bfd_boolean ret_val = TRUE;
4a67a098
RH
3937
3938 symtab_hdr_sh_info = elf_tdata (input_bfd)->symtab_hdr.sh_info;
3939
3940 relend = relocs + input_section->reloc_count;
3941 for (rel = relocs; rel < relend; rel++)
3942 {
3943 unsigned long r_symndx;
3944 Elf_Internal_Sym *sym;
3945 asection *sec;
3946 unsigned long r_type;
3947
3948 r_type = ELF64_R_TYPE(rel->r_info);
3949 if (r_type >= R_ALPHA_max)
3950 {
3951 (*_bfd_error_handler)
d003868e
AM
3952 (_("%B: unknown relocation type %d"),
3953 input_bfd, (int) r_type);
4a67a098 3954 bfd_set_error (bfd_error_bad_value);
b34976b6 3955 ret_val = FALSE;
4a67a098
RH
3956 continue;
3957 }
3958
3959 r_symndx = ELF64_R_SYM(rel->r_info);
3960
3961 /* The symbol associated with GPDISP and LITUSE is
3962 immaterial. Only the addend is significant. */
3963 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
3964 continue;
3965
3966 if (r_symndx < symtab_hdr_sh_info)
3967 {
3968 sym = local_syms + r_symndx;
3969 if (ELF_ST_TYPE(sym->st_info) == STT_SECTION)
3970 {
3971 sec = local_sections[r_symndx];
3972 rel->r_addend += sec->output_offset + sym->st_value;
3973 }
3974 }
3975 }
3976
3977 return ret_val;
3978}
3979
252b5132
RH
3980/* Relocate an Alpha ELF section. */
3981
b34976b6 3982static bfd_boolean
a7519a3c
RH
3983elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
3984 bfd *input_bfd, asection *input_section,
3985 bfd_byte *contents, Elf_Internal_Rela *relocs,
3986 Elf_Internal_Sym *local_syms,
3987 asection **local_sections)
252b5132 3988{
4a67a098 3989 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
3990 Elf_Internal_Rela *rel;
3991 Elf_Internal_Rela *relend;
4a67a098
RH
3992 asection *sgot, *srel, *srelgot;
3993 bfd *dynobj, *gotobj;
3994 bfd_vma gp, tp_base, dtp_base;
3995 struct alpha_elf_got_entry **local_got_entries;
b34976b6 3996 bfd_boolean ret_val;
252b5132 3997
4a67a098 3998 /* Handle relocatable links with a smaller loop. */
1049f94e 3999 if (info->relocatable)
4a67a098
RH
4000 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4001 input_section, contents, relocs,
4002 local_syms, local_sections);
4003
4004 /* This is a final link. */
4005
b34976b6 4006 ret_val = TRUE;
252b5132 4007
4a67a098 4008 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3765b1be 4009
4a67a098
RH
4010 dynobj = elf_hash_table (info)->dynobj;
4011 if (dynobj)
4012 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
4013 else
4014 srelgot = NULL;
4015
3241278a
RH
4016 if (input_section->flags & SEC_ALLOC)
4017 {
4018 const char *section_name;
4019 section_name = (bfd_elf_string_from_elf_section
4020 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
4021 elf_section_data(input_section)->rel_hdr.sh_name));
4022 BFD_ASSERT(section_name != NULL);
4023 srel = bfd_get_section_by_name (dynobj, section_name);
4024 }
4025 else
4026 srel = NULL;
3765b1be 4027
4a67a098
RH
4028 /* Find the gp value for this input bfd. */
4029 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4030 if (gotobj)
4031 {
4032 sgot = alpha_elf_tdata (gotobj)->got;
4033 gp = _bfd_get_gp_value (gotobj);
4034 if (gp == 0)
252b5132 4035 {
4a67a098
RH
4036 gp = (sgot->output_section->vma
4037 + sgot->output_offset
4038 + 0x8000);
4039 _bfd_set_gp_value (gotobj, gp);
4040 }
4041 }
4042 else
4043 {
4044 sgot = NULL;
4045 gp = 0;
4046 }
3765b1be 4047
4a67a098
RH
4048 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4049
e1918d23 4050 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4051 {
e1918d23
AM
4052 dtp_base = alpha_get_dtprel_base (info);
4053 tp_base = alpha_get_tprel_base (info);
252b5132 4054 }
4a67a098
RH
4055 else
4056 dtp_base = tp_base = 0;
252b5132 4057
252b5132 4058 relend = relocs + input_section->reloc_count;
4a67a098 4059 for (rel = relocs; rel < relend; rel++)
252b5132 4060 {
4a67a098 4061 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4062 struct alpha_elf_got_entry *gotent;
4063 bfd_reloc_status_type r;
252b5132
RH
4064 reloc_howto_type *howto;
4065 unsigned long r_symndx;
4a67a098
RH
4066 Elf_Internal_Sym *sym = NULL;
4067 asection *sec = NULL;
3765b1be 4068 bfd_vma value;
dc810e39 4069 bfd_vma addend;
b34976b6
AM
4070 bfd_boolean dynamic_symbol_p;
4071 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4072 unsigned long r_type;
252b5132
RH
4073
4074 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4075 if (r_type >= R_ALPHA_max)
252b5132 4076 {
3765b1be 4077 (*_bfd_error_handler)
d003868e
AM
4078 (_("%B: unknown relocation type %d"),
4079 input_bfd, (int) r_type);
252b5132 4080 bfd_set_error (bfd_error_bad_value);
b34976b6 4081 ret_val = FALSE;
3765b1be 4082 continue;
252b5132 4083 }
252b5132 4084
3765b1be 4085 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4086 r_symndx = ELF64_R_SYM(rel->r_info);
4087
cc03ec80
RH
4088 /* The symbol for a TLSLDM reloc is ignored. Collapse the
4089 reloc to the 0 symbol so that they all match. */
4090 if (r_type == R_ALPHA_TLSLDM)
4091 r_symndx = 0;
4092
252b5132
RH
4093 if (r_symndx < symtab_hdr->sh_info)
4094 {
8517fae7 4095 asection *msec;
252b5132
RH
4096 sym = local_syms + r_symndx;
4097 sec = local_sections[r_symndx];
8517fae7
AM
4098 msec = sec;
4099 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4100
cc03ec80
RH
4101 /* If this is a tp-relative relocation against sym 0,
4102 this is hackery from relax_section. Force the value to
f915360b 4103 be the tls module base. */
cc03ec80
RH
4104 if (r_symndx == 0
4105 && (r_type == R_ALPHA_TLSLDM
4106 || r_type == R_ALPHA_GOTTPREL
4107 || r_type == R_ALPHA_TPREL64
4108 || r_type == R_ALPHA_TPRELHI
4109 || r_type == R_ALPHA_TPRELLO
4110 || r_type == R_ALPHA_TPREL16))
f915360b 4111 value = dtp_base;
cc03ec80 4112
4a67a098
RH
4113 if (local_got_entries)
4114 gotent = local_got_entries[r_symndx];
4115 else
4116 gotent = NULL;
3765b1be
RH
4117
4118 /* Need to adjust local GOT entries' addends for SEC_MERGE
4119 unless it has been done already. */
4120 if ((sec->flags & SEC_MERGE)
048d873d 4121 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 4122 && sec->sec_info_type == ELF_INFO_TYPE_MERGE
048d873d
RH
4123 && gotent
4124 && !gotent->reloc_xlated)
3765b1be
RH
4125 {
4126 struct alpha_elf_got_entry *ent;
3765b1be
RH
4127
4128 for (ent = gotent; ent; ent = ent->next)
4129 {
4130 ent->reloc_xlated = 1;
4131 if (ent->use_count == 0)
4132 continue;
4133 msec = sec;
4134 ent->addend =
4135 _bfd_merged_section_offset (output_bfd, &msec,
4136 elf_section_data (sec)->
4137 sec_info,
753731ee 4138 sym->st_value + ent->addend);
3765b1be
RH
4139 ent->addend -= sym->st_value;
4140 ent->addend += msec->output_section->vma
4141 + msec->output_offset
4142 - sec->output_section->vma
4143 - sec->output_offset;
4144 }
4145 }
4146
b34976b6 4147 dynamic_symbol_p = FALSE;
252b5132
RH
4148 }
4149 else
4150 {
560e09e9
NC
4151 bfd_boolean warned;
4152 bfd_boolean unresolved_reloc;
4153 struct elf_link_hash_entry *hh;
b2a8e766
AM
4154 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4155
4156 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4157 r_symndx, symtab_hdr, sym_hashes,
4158 hh, sec, value,
4159 unresolved_reloc, warned);
560e09e9
NC
4160
4161 if (warned)
4162 continue;
252b5132 4163
560e09e9
NC
4164 if (value == 0
4165 && ! unresolved_reloc
4166 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4167 undef_weak_ref = TRUE;
3765b1be 4168
560e09e9 4169 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4170 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4171 gotent = h->got_entries;
252b5132 4172 }
3765b1be 4173
252b5132 4174 addend = rel->r_addend;
3765b1be
RH
4175 value += addend;
4176
4177 /* Search for the proper got entry. */
4178 for (; gotent ; gotent = gotent->next)
4179 if (gotent->gotobj == gotobj
4180 && gotent->reloc_type == r_type
4181 && gotent->addend == addend)
4182 break;
252b5132
RH
4183
4184 switch (r_type)
4185 {
4186 case R_ALPHA_GPDISP:
4187 {
4188 bfd_byte *p_ldah, *p_lda;
4189
4190 BFD_ASSERT(gp != 0);
4191
3765b1be
RH
4192 value = (input_section->output_section->vma
4193 + input_section->output_offset
4194 + rel->r_offset);
252b5132 4195
3765b1be 4196 p_ldah = contents + rel->r_offset;
252b5132
RH
4197 p_lda = p_ldah + rel->r_addend;
4198
3765b1be 4199 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4200 p_ldah, p_lda);
4201 }
4202 break;
4203
252b5132 4204 case R_ALPHA_LITERAL:
3765b1be
RH
4205 BFD_ASSERT(sgot != NULL);
4206 BFD_ASSERT(gp != 0);
4207 BFD_ASSERT(gotent != NULL);
4208 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4209
3765b1be
RH
4210 if (!gotent->reloc_done)
4211 {
4212 gotent->reloc_done = 1;
252b5132 4213
3765b1be
RH
4214 bfd_put_64 (output_bfd, value,
4215 sgot->contents + gotent->got_offset);
252b5132 4216
3765b1be
RH
4217 /* If the symbol has been forced local, output a
4218 RELATIVE reloc, otherwise it will be handled in
4219 finish_dynamic_symbol. */
d6ad34f6 4220 if (info->shared && !dynamic_symbol_p && !undef_weak_ref)
1bbc9cec
RH
4221 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4222 gotent->got_offset, 0,
4223 R_ALPHA_RELATIVE, value);
3765b1be 4224 }
252b5132 4225
3765b1be
RH
4226 value = (sgot->output_section->vma
4227 + sgot->output_offset
4228 + gotent->got_offset);
4229 value -= gp;
252b5132
RH
4230 goto default_reloc;
4231
4232 case R_ALPHA_GPREL32:
ec1659c8
RH
4233 /* If the target section was a removed linkonce section,
4234 r_symndx will be zero. In this case, assume that the
4235 switch will not be used, so don't fill it in. If we
4236 do nothing here, we'll get relocation truncated messages,
4237 due to the placement of the application above 4GB. */
4238 if (r_symndx == 0)
4239 {
4240 r = bfd_reloc_ok;
4241 break;
4242 }
4243 /* FALLTHRU */
4244
4245 case R_ALPHA_GPREL16:
252b5132 4246 case R_ALPHA_GPRELLOW:
3765b1be 4247 if (dynamic_symbol_p)
f16fbd61
RH
4248 {
4249 (*_bfd_error_handler)
d003868e
AM
4250 (_("%B: gp-relative relocation against dynamic symbol %s"),
4251 input_bfd, h->root.root.root.string);
b34976b6 4252 ret_val = FALSE;
f16fbd61 4253 }
252b5132 4254 BFD_ASSERT(gp != 0);
3765b1be 4255 value -= gp;
252b5132
RH
4256 goto default_reloc;
4257
4258 case R_ALPHA_GPRELHIGH:
3765b1be 4259 if (dynamic_symbol_p)
f16fbd61
RH
4260 {
4261 (*_bfd_error_handler)
d003868e
AM
4262 (_("%B: gp-relative relocation against dynamic symbol %s"),
4263 input_bfd, h->root.root.root.string);
b34976b6 4264 ret_val = FALSE;
f16fbd61 4265 }
252b5132 4266 BFD_ASSERT(gp != 0);
3765b1be
RH
4267 value -= gp;
4268 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4269 goto default_reloc;
4270
252b5132 4271 case R_ALPHA_HINT:
f94952df
RH
4272 /* A call to a dynamic symbol is definitely out of range of
4273 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4274 if (dynamic_symbol_p)
f94952df
RH
4275 {
4276 r = bfd_reloc_ok;
4277 break;
4278 }
3765b1be
RH
4279 /* The regular PC-relative stuff measures from the start of
4280 the instruction rather than the end. */
4281 value -= 4;
4282 goto default_reloc;
f94952df
RH
4283
4284 case R_ALPHA_BRADDR:
3765b1be
RH
4285 if (dynamic_symbol_p)
4286 {
4287 (*_bfd_error_handler)
d003868e
AM
4288 (_("%B: pc-relative relocation against dynamic symbol %s"),
4289 input_bfd, h->root.root.root.string);
b34976b6 4290 ret_val = FALSE;
3765b1be 4291 }
252b5132
RH
4292 /* The regular PC-relative stuff measures from the start of
4293 the instruction rather than the end. */
3765b1be 4294 value -= 4;
252b5132
RH
4295 goto default_reloc;
4296
7793f4d0
RH
4297 case R_ALPHA_BRSGP:
4298 {
4299 int other;
4300 const char *name;
4301
4302 /* The regular PC-relative stuff measures from the start of
4303 the instruction rather than the end. */
3765b1be 4304 value -= 4;
7793f4d0 4305
ccf00ab6
RH
4306 /* The source and destination gp must be the same. Note that
4307 the source will always have an assigned gp, since we forced
4308 one in check_relocs, but that the destination may not, as
cedb70c5 4309 it might not have had any relocations at all. Also take
ccf00ab6
RH
4310 care not to crash if H is an undefined symbol. */
4311 if (h != NULL && sec != NULL
4312 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4313 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4314 {
7793f4d0 4315 (*_bfd_error_handler)
d003868e
AM
4316 (_("%B: change in gp: BRSGP %s"),
4317 input_bfd, h->root.root.root.string);
b34976b6 4318 ret_val = FALSE;
7793f4d0
RH
4319 }
4320
4321 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4322 if (h != NULL)
4323 other = h->root.other;
4324 else
4325 other = sym->st_other;
4326 switch (other & STO_ALPHA_STD_GPLOAD)
4327 {
4328 case STO_ALPHA_NOPV:
4329 break;
4330 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4331 value += 8;
7793f4d0
RH
4332 break;
4333 default:
4334 if (h != NULL)
4335 name = h->root.root.root.string;
4336 else
4337 {
4338 name = (bfd_elf_string_from_elf_section
4339 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4340 if (name == NULL)
4341 name = _("<unknown>");
4342 else if (name[0] == 0)
4343 name = bfd_section_name (input_bfd, sec);
4344 }
4345 (*_bfd_error_handler)
d003868e
AM
4346 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4347 input_bfd, name);
b34976b6 4348 ret_val = FALSE;
7793f4d0
RH
4349 break;
4350 }
4351
4352 goto default_reloc;
4353 }
4354
252b5132
RH
4355 case R_ALPHA_REFLONG:
4356 case R_ALPHA_REFQUAD:
3765b1be
RH
4357 case R_ALPHA_DTPREL64:
4358 case R_ALPHA_TPREL64:
252b5132 4359 {
1bbc9cec
RH
4360 long dynindx, dyntype = r_type;
4361 bfd_vma dynaddend;
252b5132
RH
4362
4363 /* Careful here to remember RELATIVE relocations for global
4364 variables for symbolic shared objects. */
4365
3765b1be 4366 if (dynamic_symbol_p)
252b5132
RH
4367 {
4368 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4369 dynindx = h->root.dynindx;
4370 dynaddend = addend;
3765b1be
RH
4371 addend = 0, value = 0;
4372 }
4373 else if (r_type == R_ALPHA_DTPREL64)
4374 {
e1918d23 4375 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4376 value -= dtp_base;
4377 goto default_reloc;
4378 }
4379 else if (r_type == R_ALPHA_TPREL64)
4380 {
e1918d23 4381 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4382 if (!info->shared)
4383 {
4384 value -= tp_base;
4385 goto default_reloc;
4386 }
4387 dynindx = 0;
4388 dynaddend = value - dtp_base;
252b5132 4389 }
ec338859
AM
4390 else if (info->shared
4391 && r_symndx != 0
d6ad34f6
RH
4392 && (input_section->flags & SEC_ALLOC)
4393 && !undef_weak_ref)
252b5132 4394 {
3765b1be
RH
4395 if (r_type == R_ALPHA_REFLONG)
4396 {
4397 (*_bfd_error_handler)
d003868e
AM
4398 (_("%B: unhandled dynamic relocation against %s"),
4399 input_bfd,
3765b1be 4400 h->root.root.root.string);
b34976b6 4401 ret_val = FALSE;
3765b1be 4402 }
1bbc9cec
RH
4403 dynindx = 0;
4404 dyntype = R_ALPHA_RELATIVE;
4405 dynaddend = value;
252b5132
RH
4406 }
4407 else
4408 goto default_reloc;
4409
3241278a
RH
4410 if (input_section->flags & SEC_ALLOC)
4411 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4412 srel, rel->r_offset, dynindx,
4413 dyntype, dynaddend);
252b5132
RH
4414 }
4415 goto default_reloc;
4416
3765b1be 4417 case R_ALPHA_SREL16:
84de6048
RH
4418 case R_ALPHA_SREL32:
4419 case R_ALPHA_SREL64:
3765b1be
RH
4420 if (dynamic_symbol_p)
4421 {
4422 (*_bfd_error_handler)
d003868e
AM
4423 (_("%B: pc-relative relocation against dynamic symbol %s"),
4424 input_bfd, h->root.root.root.string);
b34976b6 4425 ret_val = FALSE;
3765b1be 4426 }
d6ad34f6
RH
4427 else if ((info->shared || info->pie) && undef_weak_ref)
4428 {
4429 (*_bfd_error_handler)
4430 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4431 input_bfd, h->root.root.root.string);
4432 ret_val = FALSE;
4433 }
4434
3765b1be 4435
84de6048
RH
4436 /* ??? .eh_frame references to discarded sections will be smashed
4437 to relocations against SHN_UNDEF. The .eh_frame format allows
4438 NULL to be encoded as 0 in any format, so this works here. */
4439 if (r_symndx == 0)
4440 howto = (elf64_alpha_howto_table
4441 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4442 goto default_reloc;
4443
3765b1be
RH
4444 case R_ALPHA_TLSLDM:
4445 /* Ignore the symbol for the relocation. The result is always
4446 the current module. */
4447 dynamic_symbol_p = 0;
4448 /* FALLTHRU */
4449
4450 case R_ALPHA_TLSGD:
4451 if (!gotent->reloc_done)
4452 {
4453 gotent->reloc_done = 1;
4454
4455 /* Note that the module index for the main program is 1. */
4456 bfd_put_64 (output_bfd, !info->shared && !dynamic_symbol_p,
4457 sgot->contents + gotent->got_offset);
4458
4459 /* If the symbol has been forced local, output a
4460 DTPMOD64 reloc, otherwise it will be handled in
4461 finish_dynamic_symbol. */
4462 if (info->shared && !dynamic_symbol_p)
1bbc9cec
RH
4463 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4464 gotent->got_offset, 0,
4465 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4466
4467 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4468 value = 0;
4469 else
4470 {
e1918d23 4471 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4472 value -= dtp_base;
4473 }
4474 bfd_put_64 (output_bfd, value,
4475 sgot->contents + gotent->got_offset + 8);
4476 }
4477
4478 value = (sgot->output_section->vma
4479 + sgot->output_offset
4480 + gotent->got_offset);
4481 value -= gp;
4482 goto default_reloc;
4483
4484 case R_ALPHA_DTPRELHI:
4485 case R_ALPHA_DTPRELLO:
4486 case R_ALPHA_DTPREL16:
4487 if (dynamic_symbol_p)
4488 {
4489 (*_bfd_error_handler)
d003868e
AM
4490 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4491 input_bfd, h->root.root.root.string);
b34976b6 4492 ret_val = FALSE;
3765b1be 4493 }
e1918d23 4494 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4495 value -= dtp_base;
9e756d64
RH
4496 if (r_type == R_ALPHA_DTPRELHI)
4497 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4498 goto default_reloc;
4499
4500 case R_ALPHA_TPRELHI:
4501 case R_ALPHA_TPRELLO:
4502 case R_ALPHA_TPREL16:
9e756d64
RH
4503 if (info->shared)
4504 {
4505 (*_bfd_error_handler)
d003868e
AM
4506 (_("%B: TLS local exec code cannot be linked into shared objects"),
4507 input_bfd);
b34976b6 4508 ret_val = FALSE;
9e756d64
RH
4509 }
4510 else if (dynamic_symbol_p)
3765b1be
RH
4511 {
4512 (*_bfd_error_handler)
d003868e
AM
4513 (_("%B: tp-relative relocation against dynamic symbol %s"),
4514 input_bfd, h->root.root.root.string);
b34976b6 4515 ret_val = FALSE;
3765b1be 4516 }
e1918d23 4517 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4518 value -= tp_base;
9e756d64
RH
4519 if (r_type == R_ALPHA_TPRELHI)
4520 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4521 goto default_reloc;
4522
4523 case R_ALPHA_GOTDTPREL:
4524 case R_ALPHA_GOTTPREL:
4525 BFD_ASSERT(sgot != NULL);
4526 BFD_ASSERT(gp != 0);
4527 BFD_ASSERT(gotent != NULL);
4528 BFD_ASSERT(gotent->use_count >= 1);
4529
4530 if (!gotent->reloc_done)
4531 {
4532 gotent->reloc_done = 1;
4533
4534 if (dynamic_symbol_p)
4535 value = 0;
4536 else
4537 {
e1918d23 4538 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4539 if (r_type == R_ALPHA_GOTDTPREL)
4540 value -= dtp_base;
4541 else if (!info->shared)
4542 value -= tp_base;
4543 else
4544 {
4545 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4546 gotent->got_offset, 0,
4547 R_ALPHA_TPREL64,
4548 value - dtp_base);
4549 value = 0;
4550 }
3765b1be
RH
4551 }
4552 bfd_put_64 (output_bfd, value,
4553 sgot->contents + gotent->got_offset);
4554 }
4555
4556 value = (sgot->output_section->vma
4557 + sgot->output_offset
4558 + gotent->got_offset);
4559 value -= gp;
4560 goto default_reloc;
4561
252b5132
RH
4562 default:
4563 default_reloc:
4564 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4565 contents, rel->r_offset, value, 0);
252b5132
RH
4566 break;
4567 }
4568
4569 switch (r)
4570 {
4571 case bfd_reloc_ok:
4572 break;
4573
4574 case bfd_reloc_overflow:
4575 {
4576 const char *name;
4577
ed4de5e2
JJ
4578 /* Don't warn if the overflow is due to pc relative reloc
4579 against discarded section. Section optimization code should
4580 handle it. */
4581
4582 if (r_symndx < symtab_hdr->sh_info
4583 && sec != NULL && howto->pc_relative
4584 && elf_discarded_section (sec))
4585 break;
4586
252b5132 4587 if (h != NULL)
dfeffb9f 4588 name = NULL;
252b5132
RH
4589 else
4590 {
4591 name = (bfd_elf_string_from_elf_section
4592 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4593 if (name == NULL)
b34976b6 4594 return FALSE;
252b5132
RH
4595 if (*name == '\0')
4596 name = bfd_section_name (input_bfd, sec);
4597 }
4598 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
4599 (info, (h ? &h->root.root : NULL), name, howto->name,
4600 (bfd_vma) 0, input_bfd, input_section,
4601 rel->r_offset)))
b34976b6 4602 ret_val = FALSE;
252b5132
RH
4603 }
4604 break;
4605
4606 default:
4607 case bfd_reloc_outofrange:
4608 abort ();
4609 }
4610 }
4611
f16fbd61 4612 return ret_val;
252b5132
RH
4613}
4614
4615/* Finish up dynamic symbol handling. We set the contents of various
4616 dynamic sections here. */
4617
b34976b6 4618static bfd_boolean
a7519a3c
RH
4619elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4620 struct elf_link_hash_entry *h,
4621 Elf_Internal_Sym *sym)
252b5132 4622{
6ec7057a 4623 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132
RH
4624 bfd *dynobj = elf_hash_table(info)->dynobj;
4625
6ec7057a 4626 if (h->needs_plt)
252b5132
RH
4627 {
4628 /* Fill in the .plt entry for this symbol. */
4629 asection *splt, *sgot, *srel;
4630 Elf_Internal_Rela outrel;
947216bf 4631 bfd_byte *loc;
252b5132
RH
4632 bfd_vma got_addr, plt_addr;
4633 bfd_vma plt_index;
4634 struct alpha_elf_got_entry *gotent;
4635
4636 BFD_ASSERT (h->dynindx != -1);
4637
252b5132
RH
4638 splt = bfd_get_section_by_name (dynobj, ".plt");
4639 BFD_ASSERT (splt != NULL);
4640 srel = bfd_get_section_by_name (dynobj, ".rela.plt");
4641 BFD_ASSERT (srel != NULL);
252b5132 4642
6ec7057a
RH
4643 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4644 if (gotent->reloc_type == R_ALPHA_LITERAL
4645 && gotent->use_count > 0)
4646 {
4647 unsigned int insn;
4648 int disp;
252b5132 4649
6ec7057a
RH
4650 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4651 BFD_ASSERT (sgot != NULL);
252b5132 4652
6ec7057a
RH
4653 BFD_ASSERT (gotent->got_offset != -1);
4654 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4655
6ec7057a
RH
4656 got_addr = (sgot->output_section->vma
4657 + sgot->output_offset
4658 + gotent->got_offset);
4659 plt_addr = (splt->output_section->vma
4660 + splt->output_offset
4661 + gotent->plt_offset);
252b5132 4662
6ec7057a 4663 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4664
6ec7057a
RH
4665 /* Fill in the entry in the procedure linkage table. */
4666 if (elf64_alpha_use_secureplt)
4667 {
4668 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4669 insn = INSN_AD (INSN_BR, 31, disp);
4670 bfd_put_32 (output_bfd, insn,
4671 splt->contents + gotent->plt_offset);
252b5132 4672
6ec7057a
RH
4673 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4674 / NEW_PLT_ENTRY_SIZE);
4675 }
4676 else
4677 {
4678 disp = -(gotent->plt_offset + 4);
4679 insn = INSN_AD (INSN_BR, 28, disp);
4680 bfd_put_32 (output_bfd, insn,
4681 splt->contents + gotent->plt_offset);
4682 bfd_put_32 (output_bfd, INSN_UNOP,
4683 splt->contents + gotent->plt_offset + 4);
4684 bfd_put_32 (output_bfd, INSN_UNOP,
4685 splt->contents + gotent->plt_offset + 8);
4686
4687 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4688 / OLD_PLT_ENTRY_SIZE);
4689 }
252b5132 4690
6ec7057a
RH
4691 /* Fill in the entry in the .rela.plt section. */
4692 outrel.r_offset = got_addr;
4693 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4694 outrel.r_addend = 0;
252b5132 4695
6ec7057a
RH
4696 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4697 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4698
6ec7057a
RH
4699 /* Fill in the entry in the .got. */
4700 bfd_put_64 (output_bfd, plt_addr,
4701 sgot->contents + gotent->got_offset);
4702 }
252b5132
RH
4703 }
4704 else if (alpha_elf_dynamic_symbol_p (h, info))
4705 {
4706 /* Fill in the dynamic relocations for this symbol's .got entries. */
4707 asection *srel;
252b5132
RH
4708 struct alpha_elf_got_entry *gotent;
4709
4710 srel = bfd_get_section_by_name (dynobj, ".rela.got");
4711 BFD_ASSERT (srel != NULL);
4712
252b5132
RH
4713 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4714 gotent != NULL;
4715 gotent = gotent->next)
4716 {
f44f99a5 4717 asection *sgot;
1bbc9cec 4718 long r_type;
3765b1be 4719
f44f99a5
RH
4720 if (gotent->use_count == 0)
4721 continue;
4722
4723 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4724
4725 r_type = gotent->reloc_type;
4726 switch (r_type)
4727 {
4728 case R_ALPHA_LITERAL:
4729 r_type = R_ALPHA_GLOB_DAT;
4730 break;
4731 case R_ALPHA_TLSGD:
4732 r_type = R_ALPHA_DTPMOD64;
4733 break;
4734 case R_ALPHA_GOTDTPREL:
4735 r_type = R_ALPHA_DTPREL64;
4736 break;
4737 case R_ALPHA_GOTTPREL:
4738 r_type = R_ALPHA_TPREL64;
4739 break;
4740 case R_ALPHA_TLSLDM:
4741 default:
4742 abort ();
4743 }
4744
1bbc9cec
RH
4745 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4746 gotent->got_offset, h->dynindx,
4747 r_type, gotent->addend);
3765b1be
RH
4748
4749 if (gotent->reloc_type == R_ALPHA_TLSGD)
1bbc9cec
RH
4750 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4751 gotent->got_offset + 8, h->dynindx,
4752 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4753 }
4754 }
4755
4756 /* Mark some specially defined symbols as absolute. */
4757 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
4758 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0
4759 || strcmp (h->root.root.string, "_PROCEDURE_LINKAGE_TABLE_") == 0)
4760 sym->st_shndx = SHN_ABS;
4761
b34976b6 4762 return TRUE;
252b5132
RH
4763}
4764
4765/* Finish up the dynamic sections. */
4766
b34976b6 4767static bfd_boolean
a7519a3c
RH
4768elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4769 struct bfd_link_info *info)
252b5132
RH
4770{
4771 bfd *dynobj;
4772 asection *sdyn;
4773
4774 dynobj = elf_hash_table (info)->dynobj;
4775 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4776
4777 if (elf_hash_table (info)->dynamic_sections_created)
4778 {
6ec7057a 4779 asection *splt, *sgotplt, *srelaplt;
252b5132 4780 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4781 bfd_vma plt_vma, gotplt_vma;
252b5132
RH
4782
4783 splt = bfd_get_section_by_name (dynobj, ".plt");
6ec7057a 4784 srelaplt = bfd_get_section_by_name (output_bfd, ".rela.plt");
252b5132
RH
4785 BFD_ASSERT (splt != NULL && sdyn != NULL);
4786
6ec7057a
RH
4787 plt_vma = splt->output_section->vma + splt->output_offset;
4788
4789 gotplt_vma = 0;
4790 if (elf64_alpha_use_secureplt)
4791 {
4792 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
4793 BFD_ASSERT (sgotplt != NULL);
4794 if (sgotplt->size > 0)
4795 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4796 }
4797
252b5132 4798 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4799 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4800 for (; dyncon < dynconend; dyncon++)
4801 {
4802 Elf_Internal_Dyn dyn;
252b5132
RH
4803
4804 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4805
4806 switch (dyn.d_tag)
4807 {
4808 case DT_PLTGOT:
6ec7057a
RH
4809 dyn.d_un.d_ptr
4810 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4811 break;
252b5132 4812 case DT_PLTRELSZ:
6ec7057a
RH
4813 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4814 break;
252b5132 4815 case DT_JMPREL:
6ec7057a
RH
4816 dyn.d_un.d_ptr = srelaplt ? srelaplt->vma : 0;
4817 break;
252b5132
RH
4818
4819 case DT_RELASZ:
4820 /* My interpretation of the TIS v1.1 ELF document indicates
4821 that RELASZ should not include JMPREL. This is not what
4822 the rest of the BFD does. It is, however, what the
4823 glibc ld.so wants. Do this fixup here until we found
4824 out who is right. */
6ec7057a
RH
4825 if (srelaplt)
4826 dyn.d_un.d_val -= srelaplt->size;
252b5132
RH
4827 break;
4828 }
4829
4830 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4831 }
4832
6ec7057a 4833 /* Initialize the plt header. */
eea6121a 4834 if (splt->size > 0)
252b5132 4835 {
6ec7057a
RH
4836 unsigned int insn;
4837 int ofs;
4838
4839 if (elf64_alpha_use_secureplt)
4840 {
4841 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
4842
4843 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
4844 bfd_put_32 (output_bfd, insn, splt->contents);
4845
4846 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
4847 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4848
4849 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
4850 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4851
4852 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
4853 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4854
4855 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
4856 bfd_put_32 (output_bfd, insn, splt->contents + 16);
4857
4858 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
4859 bfd_put_32 (output_bfd, insn, splt->contents + 20);
4860
4861 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
4862 bfd_put_32 (output_bfd, insn, splt->contents + 24);
4863
4864 insn = INSN_AB (INSN_JMP, 31, 27);
4865 bfd_put_32 (output_bfd, insn, splt->contents + 28);
4866
4867 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
4868 bfd_put_32 (output_bfd, insn, splt->contents + 32);
4869 }
4870 else
4871 {
4872 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
4873 bfd_put_32 (output_bfd, insn, splt->contents);
4874
4875 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
4876 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4877
4878 insn = INSN_UNOP;
4879 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4880
4881 insn = INSN_AB (INSN_JMP, 27, 27);
4882 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4883
4884 /* The next two words will be filled in by ld.so. */
4885 bfd_put_64 (output_bfd, 0, splt->contents + 16);
4886 bfd_put_64 (output_bfd, 0, splt->contents + 24);
4887 }
252b5132 4888
eecdbe52 4889 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
4890 }
4891 }
4892
b34976b6 4893 return TRUE;
252b5132
RH
4894}
4895
96e2734b
RH
4896/* We need to use a special link routine to handle the .mdebug section.
4897 We need to merge all instances of these sections together, not write
4898 them all out sequentially. */
252b5132 4899
b34976b6 4900static bfd_boolean
a7519a3c 4901elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
4902{
4903 asection *o;
4904 struct bfd_link_order *p;
96e2734b 4905 asection *mdebug_sec;
252b5132
RH
4906 struct ecoff_debug_info debug;
4907 const struct ecoff_debug_swap *swap
4908 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
4909 HDRR *symhdr = &debug.symbolic_header;
4910 PTR mdebug_handle = NULL;
4911
96e2734b 4912 /* Go through the sections and collect the mdebug information. */
252b5132 4913 mdebug_sec = NULL;
252b5132
RH
4914 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4915 {
252b5132
RH
4916 if (strcmp (o->name, ".mdebug") == 0)
4917 {
4918 struct extsym_info einfo;
4919
4920 /* We have found the .mdebug section in the output file.
4921 Look through all the link_orders comprising it and merge
4922 the information together. */
4923 symhdr->magic = swap->sym_magic;
4924 /* FIXME: What should the version stamp be? */
4925 symhdr->vstamp = 0;
4926 symhdr->ilineMax = 0;
4927 symhdr->cbLine = 0;
4928 symhdr->idnMax = 0;
4929 symhdr->ipdMax = 0;
4930 symhdr->isymMax = 0;
4931 symhdr->ioptMax = 0;
4932 symhdr->iauxMax = 0;
4933 symhdr->issMax = 0;
4934 symhdr->issExtMax = 0;
4935 symhdr->ifdMax = 0;
4936 symhdr->crfd = 0;
4937 symhdr->iextMax = 0;
4938
4939 /* We accumulate the debugging information itself in the
4940 debug_info structure. */
4941 debug.line = NULL;
4942 debug.external_dnr = NULL;
4943 debug.external_pdr = NULL;
4944 debug.external_sym = NULL;
4945 debug.external_opt = NULL;
4946 debug.external_aux = NULL;
4947 debug.ss = NULL;
4948 debug.ssext = debug.ssext_end = NULL;
4949 debug.external_fdr = NULL;
4950 debug.external_rfd = NULL;
4951 debug.external_ext = debug.external_ext_end = NULL;
4952
4953 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
4954 if (mdebug_handle == (PTR) NULL)
b34976b6 4955 return FALSE;
252b5132
RH
4956
4957 if (1)
4958 {
4959 asection *s;
4960 EXTR esym;
52b9d213 4961 bfd_vma last = 0;
252b5132
RH
4962 unsigned int i;
4963 static const char * const name[] =
4964 {
4965 ".text", ".init", ".fini", ".data",
4966 ".rodata", ".sdata", ".sbss", ".bss"
4967 };
4968 static const int sc[] = { scText, scInit, scFini, scData,
4969 scRData, scSData, scSBss, scBss };
4970
4971 esym.jmptbl = 0;
4972 esym.cobol_main = 0;
4973 esym.weakext = 0;
4974 esym.reserved = 0;
4975 esym.ifd = ifdNil;
4976 esym.asym.iss = issNil;
4977 esym.asym.st = stLocal;
4978 esym.asym.reserved = 0;
4979 esym.asym.index = indexNil;
4980 for (i = 0; i < 8; i++)
4981 {
4982 esym.asym.sc = sc[i];
4983 s = bfd_get_section_by_name (abfd, name[i]);
4984 if (s != NULL)
4985 {
4986 esym.asym.value = s->vma;
eea6121a 4987 last = s->vma + s->size;
252b5132
RH
4988 }
4989 else
4990 esym.asym.value = last;
4991
4992 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
4993 name[i], &esym))
b34976b6 4994 return FALSE;
252b5132
RH
4995 }
4996 }
4997
8423293d 4998 for (p = o->map_head.link_order;
252b5132
RH
4999 p != (struct bfd_link_order *) NULL;
5000 p = p->next)
5001 {
5002 asection *input_section;
5003 bfd *input_bfd;
5004 const struct ecoff_debug_swap *input_swap;
5005 struct ecoff_debug_info input_debug;
5006 char *eraw_src;
5007 char *eraw_end;
5008
5009 if (p->type != bfd_indirect_link_order)
5010 {
fd96f80f 5011 if (p->type == bfd_data_link_order)
252b5132
RH
5012 continue;
5013 abort ();
5014 }
5015
5016 input_section = p->u.indirect.section;
5017 input_bfd = input_section->owner;
5018
5019 if (bfd_get_flavour (input_bfd) != bfd_target_elf_flavour
5020 || (get_elf_backend_data (input_bfd)
5021 ->elf_backend_ecoff_debug_swap) == NULL)
5022 {
5023 /* I don't know what a non ALPHA ELF bfd would be
5024 doing with a .mdebug section, but I don't really
5025 want to deal with it. */
5026 continue;
5027 }
5028
5029 input_swap = (get_elf_backend_data (input_bfd)
5030 ->elf_backend_ecoff_debug_swap);
5031
eea6121a 5032 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5033
5034 /* The ECOFF linking code expects that we have already
5035 read in the debugging information and set up an
5036 ecoff_debug_info structure, so we do that now. */
5037 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5038 &input_debug))
b34976b6 5039 return FALSE;
252b5132
RH
5040
5041 if (! (bfd_ecoff_debug_accumulate
5042 (mdebug_handle, abfd, &debug, swap, input_bfd,
5043 &input_debug, input_swap, info)))
b34976b6 5044 return FALSE;
252b5132
RH
5045
5046 /* Loop through the external symbols. For each one with
5047 interesting information, try to find the symbol in
5048 the linker global hash table and save the information
5049 for the output external symbols. */
5050 eraw_src = input_debug.external_ext;
5051 eraw_end = (eraw_src
5052 + (input_debug.symbolic_header.iextMax
5053 * input_swap->external_ext_size));
5054 for (;
5055 eraw_src < eraw_end;
5056 eraw_src += input_swap->external_ext_size)
5057 {
5058 EXTR ext;
5059 const char *name;
5060 struct alpha_elf_link_hash_entry *h;
5061
5062 (*input_swap->swap_ext_in) (input_bfd, (PTR) eraw_src, &ext);
5063 if (ext.asym.sc == scNil
5064 || ext.asym.sc == scUndefined
5065 || ext.asym.sc == scSUndefined)
5066 continue;
5067
5068 name = input_debug.ssext + ext.asym.iss;
5069 h = alpha_elf_link_hash_lookup (alpha_elf_hash_table (info),
b34976b6 5070 name, FALSE, FALSE, TRUE);
252b5132
RH
5071 if (h == NULL || h->esym.ifd != -2)
5072 continue;
5073
5074 if (ext.ifd != -1)
5075 {
5076 BFD_ASSERT (ext.ifd
5077 < input_debug.symbolic_header.ifdMax);
5078 ext.ifd = input_debug.ifdmap[ext.ifd];
5079 }
5080
5081 h->esym = ext;
5082 }
5083
5084 /* Free up the information we just read. */
5085 free (input_debug.line);
5086 free (input_debug.external_dnr);
5087 free (input_debug.external_pdr);
5088 free (input_debug.external_sym);
5089 free (input_debug.external_opt);
5090 free (input_debug.external_aux);
5091 free (input_debug.ss);
5092 free (input_debug.ssext);
5093 free (input_debug.external_fdr);
5094 free (input_debug.external_rfd);
5095 free (input_debug.external_ext);
5096
5097 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5098 elf_link_input_bfd ignores this section. */
5099 input_section->flags &=~ SEC_HAS_CONTENTS;
5100 }
5101
252b5132
RH
5102 /* Build the external symbol information. */
5103 einfo.abfd = abfd;
5104 einfo.info = info;
5105 einfo.debug = &debug;
5106 einfo.swap = swap;
b34976b6 5107 einfo.failed = FALSE;
252b5132
RH
5108 elf_link_hash_traverse (elf_hash_table (info),
5109 elf64_alpha_output_extsym,
5110 (PTR) &einfo);
5111 if (einfo.failed)
b34976b6 5112 return FALSE;
252b5132
RH
5113
5114 /* Set the size of the .mdebug section. */
eea6121a 5115 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5116
5117 /* Skip this section later on (I don't think this currently
5118 matters, but someday it might). */
8423293d 5119 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5120
5121 mdebug_sec = o;
5122 }
252b5132
RH
5123 }
5124
5125 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5126 if (! bfd_elf_final_link (abfd, info))
b34976b6 5127 return FALSE;
252b5132
RH
5128
5129 /* Now write out the computed sections. */
5130
5131 /* The .got subsections... */
5132 {
5133 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
5134 for (i = alpha_elf_hash_table(info)->got_list;
5135 i != NULL;
5136 i = alpha_elf_tdata(i)->got_link_next)
5137 {
5138 asection *sgot;
5139
5140 /* elf_bfd_final_link already did everything in dynobj. */
5141 if (i == dynobj)
5142 continue;
5143
5144 sgot = alpha_elf_tdata(i)->got;
5145 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5146 sgot->contents,
5147 (file_ptr) sgot->output_offset,
eea6121a 5148 sgot->size))
b34976b6 5149 return FALSE;
252b5132
RH
5150 }
5151 }
5152
252b5132
RH
5153 if (mdebug_sec != (asection *) NULL)
5154 {
5155 BFD_ASSERT (abfd->output_has_begun);
5156 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5157 swap, info,
5158 mdebug_sec->filepos))
b34976b6 5159 return FALSE;
252b5132
RH
5160
5161 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5162 }
5163
b34976b6 5164 return TRUE;
252b5132 5165}
fcfbdf31
JJ
5166
5167static enum elf_reloc_type_class
a7519a3c 5168elf64_alpha_reloc_type_class (const Elf_Internal_Rela *rela)
fcfbdf31 5169{
f51e552e 5170 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5171 {
5172 case R_ALPHA_RELATIVE:
5173 return reloc_class_relative;
5174 case R_ALPHA_JMP_SLOT:
5175 return reloc_class_plt;
5176 case R_ALPHA_COPY:
5177 return reloc_class_copy;
5178 default:
5179 return reloc_class_normal;
5180 }
5181}
252b5132 5182\f
7f4d3958
L
5183static struct bfd_elf_special_section const
5184 alpha_special_sections_s[]=
2f89ff8d 5185{
7dcb9820
AM
5186 { ".sdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5187 { ".sbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5188 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5189};
5190
7f4d3958
L
5191static struct bfd_elf_special_section const *
5192 elf64_alpha_special_sections[27] =
5193{
5194 NULL, /* 'a' */
5195 NULL, /* 'b' */
5196 NULL, /* 'c' */
5197 NULL, /* 'd' */
5198 NULL, /* 'e' */
5199 NULL, /* 'f' */
5200 NULL, /* 'g' */
5201 NULL, /* 'h' */
5202 NULL, /* 'i' */
5203 NULL, /* 'j' */
5204 NULL, /* 'k' */
5205 NULL, /* 'l' */
5206 NULL, /* 'm' */
5207 NULL, /* 'n' */
5208 NULL, /* 'o' */
5209 NULL, /* 'p' */
5210 NULL, /* 'q' */
5211 NULL, /* 'r' */
5212 alpha_special_sections_s, /* 's' */
5213 NULL, /* 't' */
5214 NULL, /* 'u' */
5215 NULL, /* 'v' */
5216 NULL, /* 'w' */
5217 NULL, /* 'x' */
5218 NULL, /* 'y' */
5219 NULL, /* 'z' */
5220 NULL /* other */
5221};
5222
252b5132
RH
5223/* ECOFF swapping routines. These are used when dealing with the
5224 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5225 from elf32-mips.c. */
252b5132
RH
5226static const struct ecoff_debug_swap
5227elf64_alpha_ecoff_debug_swap =
5228{
5229 /* Symbol table magic number. */
5230 magicSym2,
5231 /* Alignment of debugging information. E.g., 4. */
5232 8,
5233 /* Sizes of external symbolic information. */
5234 sizeof (struct hdr_ext),
5235 sizeof (struct dnr_ext),
5236 sizeof (struct pdr_ext),
5237 sizeof (struct sym_ext),
5238 sizeof (struct opt_ext),
5239 sizeof (struct fdr_ext),
5240 sizeof (struct rfd_ext),
5241 sizeof (struct ext_ext),
5242 /* Functions to swap in external symbolic data. */
5243 ecoff_swap_hdr_in,
5244 ecoff_swap_dnr_in,
5245 ecoff_swap_pdr_in,
5246 ecoff_swap_sym_in,
5247 ecoff_swap_opt_in,
5248 ecoff_swap_fdr_in,
5249 ecoff_swap_rfd_in,
5250 ecoff_swap_ext_in,
5251 _bfd_ecoff_swap_tir_in,
5252 _bfd_ecoff_swap_rndx_in,
5253 /* Functions to swap out external symbolic data. */
5254 ecoff_swap_hdr_out,
5255 ecoff_swap_dnr_out,
5256 ecoff_swap_pdr_out,
5257 ecoff_swap_sym_out,
5258 ecoff_swap_opt_out,
5259 ecoff_swap_fdr_out,
5260 ecoff_swap_rfd_out,
5261 ecoff_swap_ext_out,
5262 _bfd_ecoff_swap_tir_out,
5263 _bfd_ecoff_swap_rndx_out,
5264 /* Function to read in symbolic data. */
5265 elf64_alpha_read_ecoff_info
5266};
5267\f
70bcb145
JW
5268/* Use a non-standard hash bucket size of 8. */
5269
562ace6b 5270static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5271{
5272 sizeof (Elf64_External_Ehdr),
5273 sizeof (Elf64_External_Phdr),
5274 sizeof (Elf64_External_Shdr),
5275 sizeof (Elf64_External_Rel),
5276 sizeof (Elf64_External_Rela),
5277 sizeof (Elf64_External_Sym),
5278 sizeof (Elf64_External_Dyn),
5279 sizeof (Elf_External_Note),
5280 8,
5281 1,
45d6a902 5282 64, 3,
70bcb145
JW
5283 ELFCLASS64, EV_CURRENT,
5284 bfd_elf64_write_out_phdrs,
5285 bfd_elf64_write_shdrs_and_ehdr,
5286 bfd_elf64_write_relocs,
73ff0d56 5287 bfd_elf64_swap_symbol_in,
70bcb145
JW
5288 bfd_elf64_swap_symbol_out,
5289 bfd_elf64_slurp_reloc_table,
5290 bfd_elf64_slurp_symbol_table,
5291 bfd_elf64_swap_dyn_in,
5292 bfd_elf64_swap_dyn_out,
947216bf
AM
5293 bfd_elf64_swap_reloc_in,
5294 bfd_elf64_swap_reloc_out,
5295 bfd_elf64_swap_reloca_in,
5296 bfd_elf64_swap_reloca_out
70bcb145
JW
5297};
5298
252b5132
RH
5299#define TARGET_LITTLE_SYM bfd_elf64_alpha_vec
5300#define TARGET_LITTLE_NAME "elf64-alpha"
5301#define ELF_ARCH bfd_arch_alpha
56fc028e
AJ
5302#define ELF_MACHINE_CODE EM_ALPHA
5303#define ELF_MAXPAGESIZE 0x10000
252b5132
RH
5304
5305#define bfd_elf64_bfd_link_hash_table_create \
5306 elf64_alpha_bfd_link_hash_table_create
5307
5308#define bfd_elf64_bfd_reloc_type_lookup \
5309 elf64_alpha_bfd_reloc_type_lookup
5310#define elf_info_to_howto \
5311 elf64_alpha_info_to_howto
5312
5313#define bfd_elf64_mkobject \
5314 elf64_alpha_mkobject
5315#define elf_backend_object_p \
5316 elf64_alpha_object_p
5317
5318#define elf_backend_section_from_shdr \
5319 elf64_alpha_section_from_shdr
204692d7
RH
5320#define elf_backend_section_flags \
5321 elf64_alpha_section_flags
252b5132
RH
5322#define elf_backend_fake_sections \
5323 elf64_alpha_fake_sections
5324
5325#define bfd_elf64_bfd_is_local_label_name \
5326 elf64_alpha_is_local_label_name
5327#define bfd_elf64_find_nearest_line \
5328 elf64_alpha_find_nearest_line
5329#define bfd_elf64_bfd_relax_section \
5330 elf64_alpha_relax_section
5331
5332#define elf_backend_add_symbol_hook \
5333 elf64_alpha_add_symbol_hook
5334#define elf_backend_check_relocs \
5335 elf64_alpha_check_relocs
5336#define elf_backend_create_dynamic_sections \
5337 elf64_alpha_create_dynamic_sections
5338#define elf_backend_adjust_dynamic_symbol \
5339 elf64_alpha_adjust_dynamic_symbol
5340#define elf_backend_always_size_sections \
5341 elf64_alpha_always_size_sections
5342#define elf_backend_size_dynamic_sections \
5343 elf64_alpha_size_dynamic_sections
5344#define elf_backend_relocate_section \
5345 elf64_alpha_relocate_section
5346#define elf_backend_finish_dynamic_symbol \
5347 elf64_alpha_finish_dynamic_symbol
5348#define elf_backend_finish_dynamic_sections \
5349 elf64_alpha_finish_dynamic_sections
5350#define bfd_elf64_bfd_final_link \
5351 elf64_alpha_final_link
fcfbdf31
JJ
5352#define elf_backend_reloc_type_class \
5353 elf64_alpha_reloc_type_class
252b5132
RH
5354
5355#define elf_backend_ecoff_debug_swap \
5356 &elf64_alpha_ecoff_debug_swap
5357
70bcb145
JW
5358#define elf_backend_size_info \
5359 alpha_elf_size_info
5360
2f89ff8d
L
5361#define elf_backend_special_sections \
5362 elf64_alpha_special_sections
5363
38b1a46c 5364/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5365#define elf_backend_want_got_plt 0
5366#define elf_backend_plt_readonly 0
5367#define elf_backend_want_plt_sym 1
5368#define elf_backend_got_header_size 0
252b5132
RH
5369
5370#include "elf64-target.h"
2238051f
RH
5371\f
5372/* FreeBSD support. */
5373
5374#undef TARGET_LITTLE_SYM
5375#define TARGET_LITTLE_SYM bfd_elf64_alpha_freebsd_vec
5376#undef TARGET_LITTLE_NAME
5377#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
5378
5379/* The kernel recognizes executables as valid only if they carry a
5380 "FreeBSD" label in the ELF header. So we put this label on all
5381 executables and (for simplicity) also all other object files. */
5382
2238051f 5383static void
a7519a3c
RH
5384elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5385 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5386{
5387 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5388
5389 i_ehdrp = elf_elfheader (abfd);
5390
5391 /* Put an ABI label supported by FreeBSD >= 4.1. */
5392 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_FREEBSD;
5393#ifdef OLD_FREEBSD_ABI_LABEL
5394 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5395 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5396#endif
5397}
5398
5399#undef elf_backend_post_process_headers
5400#define elf_backend_post_process_headers \
5401 elf64_alpha_fbsd_post_process_headers
5402
571fe01f 5403#undef elf64_bed
2238051f
RH
5404#define elf64_bed elf64_alpha_fbsd_bed
5405
5406#include "elf64-target.h"
This page took 0.66833 seconds and 4 git commands to generate.