]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
PR threads/10729
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
66eb6687 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
4dfe6ac6 3 2006, 2007, 2008, 2009, 2010 Free Software Foundation, Inc.
252b5132
RH
4 Contributed by Richard Henderson <rth@tamu.edu>.
5
571fe01f 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
571fe01f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
571fe01f 11 (at your option) any later version.
252b5132 12
571fe01f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
571fe01f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
22
252b5132
RH
23
24/* We need a published ABI spec for this. Until one comes out, don't
25 assume this'll remain unchanged forever. */
26
252b5132 27#include "sysdep.h"
3db64b00 28#include "bfd.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
147 /* What kind of relocation? */
148 unsigned int rtype;
149
150 /* Is this against read-only section? */
151 unsigned int reltext : 1;
152
153 /* How many did we find? */
154 unsigned long count;
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
a7519a3c 213 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
986a241f
RH
227/* Should we do dynamic things to this symbol? This differs from the
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
dc810e39 283 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
301/* We have some private fields hanging off of the elf_tdata structure. */
302
303struct alpha_elf_obj_tdata
304{
305 struct elf_obj_tdata root;
306
307 /* For every input file, these are the got entries for that object's
308 local symbols. */
309 struct alpha_elf_got_entry ** local_got_entries;
310
311 /* For every input file, this is the object that owns the got that
312 this input file uses. */
313 bfd *gotobj;
314
315 /* For every got, this is a linked list through the objects using this got */
316 bfd *in_got_link_next;
317
318 /* For every got, this is a link to the next got subsegment. */
319 bfd *got_link_next;
320
321 /* For every got, this is the section. */
322 asection *got;
323
3765b1be
RH
324 /* For every got, this is it's total number of words. */
325 int total_got_size;
252b5132 326
3765b1be 327 /* For every got, this is the sum of the number of words required
252b5132 328 to hold all of the member object's local got. */
3765b1be 329 int local_got_size;
252b5132
RH
330};
331
332#define alpha_elf_tdata(abfd) \
333 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
334
0ffa91dd
NC
335#define is_alpha_elf(bfd) \
336 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
337 && elf_tdata (bfd) != NULL \
4dfe6ac6 338 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 339
b34976b6 340static bfd_boolean
a7519a3c 341elf64_alpha_mkobject (bfd *abfd)
252b5132 342{
0ffa91dd 343 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 344 ALPHA_ELF_DATA);
252b5132
RH
345}
346
b34976b6 347static bfd_boolean
a7519a3c 348elf64_alpha_object_p (bfd *abfd)
252b5132 349{
252b5132
RH
350 /* Set the right machine number for an Alpha ELF file. */
351 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
352}
353\f
a7519a3c
RH
354/* A relocation function which doesn't do anything. */
355
356static bfd_reloc_status_type
357elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
358 asymbol *sym ATTRIBUTE_UNUSED,
359 PTR data ATTRIBUTE_UNUSED, asection *sec,
360 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
361{
362 if (output_bfd)
363 reloc->address += sec->output_offset;
364 return bfd_reloc_ok;
365}
366
367/* A relocation function used for an unsupported reloc. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
372 PTR data ATTRIBUTE_UNUSED, asection *sec,
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_notsupported;
378}
379
380/* Do the work of the GPDISP relocation. */
381
382static bfd_reloc_status_type
383elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
384 bfd_byte *p_lda)
385{
386 bfd_reloc_status_type ret = bfd_reloc_ok;
387 bfd_vma addend;
388 unsigned long i_ldah, i_lda;
389
390 i_ldah = bfd_get_32 (abfd, p_ldah);
391 i_lda = bfd_get_32 (abfd, p_lda);
392
393 /* Complain if the instructions are not correct. */
394 if (((i_ldah >> 26) & 0x3f) != 0x09
395 || ((i_lda >> 26) & 0x3f) != 0x08)
396 ret = bfd_reloc_dangerous;
397
398 /* Extract the user-supplied offset, mirroring the sign extensions
399 that the instructions perform. */
400 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
401 addend = (addend ^ 0x80008000) - 0x80008000;
402
403 gpdisp += addend;
404
405 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
406 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
407 ret = bfd_reloc_overflow;
408
409 /* compensate for the sign extension again. */
410 i_ldah = ((i_ldah & 0xffff0000)
411 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
412 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
413
414 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
415 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
416
417 return ret;
418}
419
420/* The special function for the GPDISP reloc. */
421
422static bfd_reloc_status_type
423elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
424 asymbol *sym ATTRIBUTE_UNUSED, PTR data,
425 asection *input_section, bfd *output_bfd,
426 char **err_msg)
427{
428 bfd_reloc_status_type ret;
429 bfd_vma gp, relocation;
430 bfd_vma high_address;
431 bfd_byte *p_ldah, *p_lda;
432
433 /* Don't do anything if we're not doing a final link. */
434 if (output_bfd)
435 {
436 reloc_entry->address += input_section->output_offset;
437 return bfd_reloc_ok;
438 }
439
440 high_address = bfd_get_section_limit (abfd, input_section);
441 if (reloc_entry->address > high_address
442 || reloc_entry->address + reloc_entry->addend > high_address)
443 return bfd_reloc_outofrange;
444
445 /* The gp used in the portion of the output object to which this
446 input object belongs is cached on the input bfd. */
447 gp = _bfd_get_gp_value (abfd);
448
449 relocation = (input_section->output_section->vma
450 + input_section->output_offset
451 + reloc_entry->address);
452
453 p_ldah = (bfd_byte *) data + reloc_entry->address;
454 p_lda = p_ldah + reloc_entry->addend;
455
456 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
457
458 /* Complain if the instructions are not correct. */
459 if (ret == bfd_reloc_dangerous)
460 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
461
462 return ret;
463}
464
252b5132
RH
465/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
466 from smaller values. Start with zero, widen, *then* decrement. */
467#define MINUS_ONE (((bfd_vma)0) - 1)
468
21d799b5 469
dfe57ca0 470#define SKIP_HOWTO(N) \
21d799b5 471 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 472
252b5132
RH
473static reloc_howto_type elf64_alpha_howto_table[] =
474{
475 HOWTO (R_ALPHA_NONE, /* type */
476 0, /* rightshift */
477 0, /* size (0 = byte, 1 = short, 2 = long) */
478 8, /* bitsize */
b34976b6 479 TRUE, /* pc_relative */
252b5132
RH
480 0, /* bitpos */
481 complain_overflow_dont, /* complain_on_overflow */
482 elf64_alpha_reloc_nil, /* special_function */
483 "NONE", /* name */
b34976b6 484 FALSE, /* partial_inplace */
252b5132
RH
485 0, /* src_mask */
486 0, /* dst_mask */
b34976b6 487 TRUE), /* pcrel_offset */
252b5132
RH
488
489 /* A 32 bit reference to a symbol. */
490 HOWTO (R_ALPHA_REFLONG, /* type */
491 0, /* rightshift */
492 2, /* size (0 = byte, 1 = short, 2 = long) */
493 32, /* bitsize */
b34976b6 494 FALSE, /* pc_relative */
252b5132
RH
495 0, /* bitpos */
496 complain_overflow_bitfield, /* complain_on_overflow */
497 0, /* special_function */
498 "REFLONG", /* name */
b34976b6 499 FALSE, /* partial_inplace */
252b5132
RH
500 0xffffffff, /* src_mask */
501 0xffffffff, /* dst_mask */
b34976b6 502 FALSE), /* pcrel_offset */
252b5132
RH
503
504 /* A 64 bit reference to a symbol. */
505 HOWTO (R_ALPHA_REFQUAD, /* type */
506 0, /* rightshift */
507 4, /* size (0 = byte, 1 = short, 2 = long) */
508 64, /* bitsize */
b34976b6 509 FALSE, /* pc_relative */
252b5132
RH
510 0, /* bitpos */
511 complain_overflow_bitfield, /* complain_on_overflow */
512 0, /* special_function */
513 "REFQUAD", /* name */
b34976b6 514 FALSE, /* partial_inplace */
252b5132
RH
515 MINUS_ONE, /* src_mask */
516 MINUS_ONE, /* dst_mask */
b34976b6 517 FALSE), /* pcrel_offset */
252b5132
RH
518
519 /* A 32 bit GP relative offset. This is just like REFLONG except
520 that when the value is used the value of the gp register will be
521 added in. */
522 HOWTO (R_ALPHA_GPREL32, /* type */
523 0, /* rightshift */
524 2, /* size (0 = byte, 1 = short, 2 = long) */
525 32, /* bitsize */
b34976b6 526 FALSE, /* pc_relative */
252b5132
RH
527 0, /* bitpos */
528 complain_overflow_bitfield, /* complain_on_overflow */
529 0, /* special_function */
530 "GPREL32", /* name */
b34976b6 531 FALSE, /* partial_inplace */
252b5132
RH
532 0xffffffff, /* src_mask */
533 0xffffffff, /* dst_mask */
b34976b6 534 FALSE), /* pcrel_offset */
252b5132
RH
535
536 /* Used for an instruction that refers to memory off the GP register. */
537 HOWTO (R_ALPHA_LITERAL, /* type */
538 0, /* rightshift */
dfe57ca0 539 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 540 16, /* bitsize */
b34976b6 541 FALSE, /* pc_relative */
252b5132
RH
542 0, /* bitpos */
543 complain_overflow_signed, /* complain_on_overflow */
544 0, /* special_function */
545 "ELF_LITERAL", /* name */
b34976b6 546 FALSE, /* partial_inplace */
252b5132
RH
547 0xffff, /* src_mask */
548 0xffff, /* dst_mask */
b34976b6 549 FALSE), /* pcrel_offset */
252b5132
RH
550
551 /* This reloc only appears immediately following an ELF_LITERAL reloc.
552 It identifies a use of the literal. The symbol index is special:
553 1 means the literal address is in the base register of a memory
554 format instruction; 2 means the literal address is in the byte
555 offset register of a byte-manipulation instruction; 3 means the
556 literal address is in the target register of a jsr instruction.
557 This does not actually do any relocation. */
558 HOWTO (R_ALPHA_LITUSE, /* type */
559 0, /* rightshift */
dfe57ca0 560 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 561 32, /* bitsize */
b34976b6 562 FALSE, /* pc_relative */
252b5132
RH
563 0, /* bitpos */
564 complain_overflow_dont, /* complain_on_overflow */
565 elf64_alpha_reloc_nil, /* special_function */
566 "LITUSE", /* name */
b34976b6 567 FALSE, /* partial_inplace */
252b5132
RH
568 0, /* src_mask */
569 0, /* dst_mask */
b34976b6 570 FALSE), /* pcrel_offset */
252b5132
RH
571
572 /* Load the gp register. This is always used for a ldah instruction
573 which loads the upper 16 bits of the gp register. The symbol
574 index of the GPDISP instruction is an offset in bytes to the lda
575 instruction that loads the lower 16 bits. The value to use for
576 the relocation is the difference between the GP value and the
577 current location; the load will always be done against a register
578 holding the current address.
579
580 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
581 any offset is present in the instructions, it is an offset from
582 the register to the ldah instruction. This lets us avoid any
583 stupid hackery like inventing a gp value to do partial relocation
584 against. Also unlike ECOFF, we do the whole relocation off of
585 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
586 space consuming bit, that, since all the information was present
587 in the GPDISP_HI16 reloc. */
588 HOWTO (R_ALPHA_GPDISP, /* type */
589 16, /* rightshift */
590 2, /* size (0 = byte, 1 = short, 2 = long) */
591 16, /* bitsize */
b34976b6 592 FALSE, /* pc_relative */
252b5132
RH
593 0, /* bitpos */
594 complain_overflow_dont, /* complain_on_overflow */
595 elf64_alpha_reloc_gpdisp, /* special_function */
596 "GPDISP", /* name */
b34976b6 597 FALSE, /* partial_inplace */
252b5132
RH
598 0xffff, /* src_mask */
599 0xffff, /* dst_mask */
b34976b6 600 TRUE), /* pcrel_offset */
252b5132
RH
601
602 /* A 21 bit branch. */
603 HOWTO (R_ALPHA_BRADDR, /* type */
604 2, /* rightshift */
605 2, /* size (0 = byte, 1 = short, 2 = long) */
606 21, /* bitsize */
b34976b6 607 TRUE, /* pc_relative */
252b5132
RH
608 0, /* bitpos */
609 complain_overflow_signed, /* complain_on_overflow */
610 0, /* special_function */
611 "BRADDR", /* name */
b34976b6 612 FALSE, /* partial_inplace */
252b5132
RH
613 0x1fffff, /* src_mask */
614 0x1fffff, /* dst_mask */
b34976b6 615 TRUE), /* pcrel_offset */
252b5132
RH
616
617 /* A hint for a jump to a register. */
618 HOWTO (R_ALPHA_HINT, /* type */
619 2, /* rightshift */
dfe57ca0 620 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 621 14, /* bitsize */
b34976b6 622 TRUE, /* pc_relative */
252b5132
RH
623 0, /* bitpos */
624 complain_overflow_dont, /* complain_on_overflow */
625 0, /* special_function */
626 "HINT", /* name */
b34976b6 627 FALSE, /* partial_inplace */
252b5132
RH
628 0x3fff, /* src_mask */
629 0x3fff, /* dst_mask */
b34976b6 630 TRUE), /* pcrel_offset */
252b5132
RH
631
632 /* 16 bit PC relative offset. */
633 HOWTO (R_ALPHA_SREL16, /* type */
634 0, /* rightshift */
635 1, /* size (0 = byte, 1 = short, 2 = long) */
636 16, /* bitsize */
b34976b6 637 TRUE, /* pc_relative */
252b5132
RH
638 0, /* bitpos */
639 complain_overflow_signed, /* complain_on_overflow */
640 0, /* special_function */
641 "SREL16", /* name */
b34976b6 642 FALSE, /* partial_inplace */
252b5132
RH
643 0xffff, /* src_mask */
644 0xffff, /* dst_mask */
b34976b6 645 TRUE), /* pcrel_offset */
252b5132
RH
646
647 /* 32 bit PC relative offset. */
648 HOWTO (R_ALPHA_SREL32, /* type */
649 0, /* rightshift */
650 2, /* size (0 = byte, 1 = short, 2 = long) */
651 32, /* bitsize */
b34976b6 652 TRUE, /* pc_relative */
252b5132
RH
653 0, /* bitpos */
654 complain_overflow_signed, /* complain_on_overflow */
655 0, /* special_function */
656 "SREL32", /* name */
b34976b6 657 FALSE, /* partial_inplace */
252b5132
RH
658 0xffffffff, /* src_mask */
659 0xffffffff, /* dst_mask */
b34976b6 660 TRUE), /* pcrel_offset */
252b5132
RH
661
662 /* A 64 bit PC relative offset. */
663 HOWTO (R_ALPHA_SREL64, /* type */
664 0, /* rightshift */
665 4, /* size (0 = byte, 1 = short, 2 = long) */
666 64, /* bitsize */
b34976b6 667 TRUE, /* pc_relative */
252b5132
RH
668 0, /* bitpos */
669 complain_overflow_signed, /* complain_on_overflow */
670 0, /* special_function */
671 "SREL64", /* name */
b34976b6 672 FALSE, /* partial_inplace */
252b5132
RH
673 MINUS_ONE, /* src_mask */
674 MINUS_ONE, /* dst_mask */
b34976b6 675 TRUE), /* pcrel_offset */
252b5132 676
dfe57ca0
RH
677 /* Skip 12 - 16; deprecated ECOFF relocs. */
678 SKIP_HOWTO (12),
679 SKIP_HOWTO (13),
680 SKIP_HOWTO (14),
681 SKIP_HOWTO (15),
682 SKIP_HOWTO (16),
252b5132
RH
683
684 /* The high 16 bits of the displacement from GP to the target. */
685 HOWTO (R_ALPHA_GPRELHIGH,
686 0, /* rightshift */
dfe57ca0 687 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 688 16, /* bitsize */
b34976b6 689 FALSE, /* pc_relative */
252b5132
RH
690 0, /* bitpos */
691 complain_overflow_signed, /* complain_on_overflow */
dfe57ca0 692 0, /* special_function */
252b5132 693 "GPRELHIGH", /* name */
b34976b6 694 FALSE, /* partial_inplace */
252b5132
RH
695 0xffff, /* src_mask */
696 0xffff, /* dst_mask */
b34976b6 697 FALSE), /* pcrel_offset */
252b5132
RH
698
699 /* The low 16 bits of the displacement from GP to the target. */
700 HOWTO (R_ALPHA_GPRELLOW,
701 0, /* rightshift */
dfe57ca0 702 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 703 16, /* bitsize */
b34976b6 704 FALSE, /* pc_relative */
252b5132
RH
705 0, /* bitpos */
706 complain_overflow_dont, /* complain_on_overflow */
dfe57ca0 707 0, /* special_function */
252b5132 708 "GPRELLOW", /* name */
b34976b6 709 FALSE, /* partial_inplace */
252b5132
RH
710 0xffff, /* src_mask */
711 0xffff, /* dst_mask */
b34976b6 712 FALSE), /* pcrel_offset */
252b5132
RH
713
714 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 715 HOWTO (R_ALPHA_GPREL16,
252b5132 716 0, /* rightshift */
dfe57ca0 717 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 718 16, /* bitsize */
b34976b6 719 FALSE, /* pc_relative */
252b5132
RH
720 0, /* bitpos */
721 complain_overflow_signed, /* complain_on_overflow */
722 0, /* special_function */
dfe57ca0 723 "GPREL16", /* name */
b34976b6 724 FALSE, /* partial_inplace */
252b5132
RH
725 0xffff, /* src_mask */
726 0xffff, /* dst_mask */
b34976b6 727 FALSE), /* pcrel_offset */
252b5132 728
dfe57ca0
RH
729 /* Skip 20 - 23; deprecated ECOFF relocs. */
730 SKIP_HOWTO (20),
731 SKIP_HOWTO (21),
732 SKIP_HOWTO (22),
733 SKIP_HOWTO (23),
252b5132 734
fe8bc63d 735 /* Misc ELF relocations. */
252b5132
RH
736
737 /* A dynamic relocation to copy the target into our .dynbss section. */
738 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
739 is present because every other ELF has one, but should not be used
740 because .dynbss is an ugly thing. */
741 HOWTO (R_ALPHA_COPY,
742 0,
743 0,
744 0,
b34976b6 745 FALSE,
252b5132
RH
746 0,
747 complain_overflow_dont,
748 bfd_elf_generic_reloc,
749 "COPY",
b34976b6 750 FALSE,
252b5132
RH
751 0,
752 0,
b34976b6 753 TRUE),
252b5132
RH
754
755 /* A dynamic relocation for a .got entry. */
756 HOWTO (R_ALPHA_GLOB_DAT,
757 0,
758 0,
759 0,
b34976b6 760 FALSE,
252b5132
RH
761 0,
762 complain_overflow_dont,
763 bfd_elf_generic_reloc,
764 "GLOB_DAT",
b34976b6 765 FALSE,
252b5132
RH
766 0,
767 0,
b34976b6 768 TRUE),
252b5132
RH
769
770 /* A dynamic relocation for a .plt entry. */
771 HOWTO (R_ALPHA_JMP_SLOT,
772 0,
773 0,
774 0,
b34976b6 775 FALSE,
252b5132
RH
776 0,
777 complain_overflow_dont,
778 bfd_elf_generic_reloc,
779 "JMP_SLOT",
b34976b6 780 FALSE,
252b5132
RH
781 0,
782 0,
b34976b6 783 TRUE),
252b5132
RH
784
785 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
786 HOWTO (R_ALPHA_RELATIVE,
787 0,
788 0,
789 0,
b34976b6 790 FALSE,
252b5132
RH
791 0,
792 complain_overflow_dont,
793 bfd_elf_generic_reloc,
794 "RELATIVE",
b34976b6 795 FALSE,
252b5132
RH
796 0,
797 0,
b34976b6 798 TRUE),
7793f4d0
RH
799
800 /* A 21 bit branch that adjusts for gp loads. */
801 HOWTO (R_ALPHA_BRSGP, /* type */
802 2, /* rightshift */
803 2, /* size (0 = byte, 1 = short, 2 = long) */
804 21, /* bitsize */
b34976b6 805 TRUE, /* pc_relative */
7793f4d0
RH
806 0, /* bitpos */
807 complain_overflow_signed, /* complain_on_overflow */
808 0, /* special_function */
809 "BRSGP", /* name */
b34976b6 810 FALSE, /* partial_inplace */
7793f4d0
RH
811 0x1fffff, /* src_mask */
812 0x1fffff, /* dst_mask */
b34976b6 813 TRUE), /* pcrel_offset */
3765b1be
RH
814
815 /* Creates a tls_index for the symbol in the got. */
816 HOWTO (R_ALPHA_TLSGD, /* type */
817 0, /* rightshift */
818 1, /* size (0 = byte, 1 = short, 2 = long) */
819 16, /* bitsize */
b34976b6 820 FALSE, /* pc_relative */
3765b1be
RH
821 0, /* bitpos */
822 complain_overflow_signed, /* complain_on_overflow */
823 0, /* special_function */
824 "TLSGD", /* name */
b34976b6 825 FALSE, /* partial_inplace */
3765b1be
RH
826 0xffff, /* src_mask */
827 0xffff, /* dst_mask */
b34976b6 828 FALSE), /* pcrel_offset */
3765b1be
RH
829
830 /* Creates a tls_index for the (current) module in the got. */
831 HOWTO (R_ALPHA_TLSLDM, /* type */
832 0, /* rightshift */
833 1, /* size (0 = byte, 1 = short, 2 = long) */
834 16, /* bitsize */
b34976b6 835 FALSE, /* pc_relative */
3765b1be
RH
836 0, /* bitpos */
837 complain_overflow_signed, /* complain_on_overflow */
838 0, /* special_function */
839 "TLSLDM", /* name */
b34976b6 840 FALSE, /* partial_inplace */
3765b1be
RH
841 0xffff, /* src_mask */
842 0xffff, /* dst_mask */
b34976b6 843 FALSE), /* pcrel_offset */
3765b1be
RH
844
845 /* A dynamic relocation for a DTP module entry. */
846 HOWTO (R_ALPHA_DTPMOD64, /* type */
847 0, /* rightshift */
848 4, /* size (0 = byte, 1 = short, 2 = long) */
849 64, /* bitsize */
b34976b6 850 FALSE, /* pc_relative */
3765b1be
RH
851 0, /* bitpos */
852 complain_overflow_bitfield, /* complain_on_overflow */
853 0, /* special_function */
854 "DTPMOD64", /* name */
b34976b6 855 FALSE, /* partial_inplace */
3765b1be
RH
856 MINUS_ONE, /* src_mask */
857 MINUS_ONE, /* dst_mask */
b34976b6 858 FALSE), /* pcrel_offset */
3765b1be
RH
859
860 /* Creates a 64-bit offset in the got for the displacement
861 from DTP to the target. */
862 HOWTO (R_ALPHA_GOTDTPREL, /* type */
863 0, /* rightshift */
864 1, /* size (0 = byte, 1 = short, 2 = long) */
865 16, /* bitsize */
b34976b6 866 FALSE, /* pc_relative */
3765b1be
RH
867 0, /* bitpos */
868 complain_overflow_signed, /* complain_on_overflow */
869 0, /* special_function */
870 "GOTDTPREL", /* name */
b34976b6 871 FALSE, /* partial_inplace */
3765b1be
RH
872 0xffff, /* src_mask */
873 0xffff, /* dst_mask */
b34976b6 874 FALSE), /* pcrel_offset */
3765b1be
RH
875
876 /* A dynamic relocation for a displacement from DTP to the target. */
877 HOWTO (R_ALPHA_DTPREL64, /* type */
878 0, /* rightshift */
879 4, /* size (0 = byte, 1 = short, 2 = long) */
880 64, /* bitsize */
b34976b6 881 FALSE, /* pc_relative */
3765b1be
RH
882 0, /* bitpos */
883 complain_overflow_bitfield, /* complain_on_overflow */
884 0, /* special_function */
885 "DTPREL64", /* name */
b34976b6 886 FALSE, /* partial_inplace */
3765b1be
RH
887 MINUS_ONE, /* src_mask */
888 MINUS_ONE, /* dst_mask */
b34976b6 889 FALSE), /* pcrel_offset */
3765b1be
RH
890
891 /* The high 16 bits of the displacement from DTP to the target. */
892 HOWTO (R_ALPHA_DTPRELHI, /* type */
893 0, /* rightshift */
894 1, /* size (0 = byte, 1 = short, 2 = long) */
895 16, /* bitsize */
b34976b6 896 FALSE, /* pc_relative */
3765b1be
RH
897 0, /* bitpos */
898 complain_overflow_signed, /* complain_on_overflow */
899 0, /* special_function */
900 "DTPRELHI", /* name */
b34976b6 901 FALSE, /* partial_inplace */
3765b1be
RH
902 0xffff, /* src_mask */
903 0xffff, /* dst_mask */
b34976b6 904 FALSE), /* pcrel_offset */
3765b1be
RH
905
906 /* The low 16 bits of the displacement from DTP to the target. */
907 HOWTO (R_ALPHA_DTPRELLO, /* type */
908 0, /* rightshift */
909 1, /* size (0 = byte, 1 = short, 2 = long) */
910 16, /* bitsize */
b34976b6 911 FALSE, /* pc_relative */
3765b1be
RH
912 0, /* bitpos */
913 complain_overflow_dont, /* complain_on_overflow */
914 0, /* special_function */
915 "DTPRELLO", /* name */
b34976b6 916 FALSE, /* partial_inplace */
3765b1be
RH
917 0xffff, /* src_mask */
918 0xffff, /* dst_mask */
b34976b6 919 FALSE), /* pcrel_offset */
3765b1be
RH
920
921 /* A 16-bit displacement from DTP to the target. */
922 HOWTO (R_ALPHA_DTPREL16, /* type */
923 0, /* rightshift */
924 1, /* size (0 = byte, 1 = short, 2 = long) */
925 16, /* bitsize */
b34976b6 926 FALSE, /* pc_relative */
3765b1be
RH
927 0, /* bitpos */
928 complain_overflow_signed, /* complain_on_overflow */
929 0, /* special_function */
930 "DTPREL16", /* name */
b34976b6 931 FALSE, /* partial_inplace */
3765b1be
RH
932 0xffff, /* src_mask */
933 0xffff, /* dst_mask */
b34976b6 934 FALSE), /* pcrel_offset */
3765b1be
RH
935
936 /* Creates a 64-bit offset in the got for the displacement
937 from TP to the target. */
938 HOWTO (R_ALPHA_GOTTPREL, /* type */
939 0, /* rightshift */
940 1, /* size (0 = byte, 1 = short, 2 = long) */
941 16, /* bitsize */
b34976b6 942 FALSE, /* pc_relative */
3765b1be
RH
943 0, /* bitpos */
944 complain_overflow_signed, /* complain_on_overflow */
945 0, /* special_function */
946 "GOTTPREL", /* name */
b34976b6 947 FALSE, /* partial_inplace */
3765b1be
RH
948 0xffff, /* src_mask */
949 0xffff, /* dst_mask */
b34976b6 950 FALSE), /* pcrel_offset */
3765b1be
RH
951
952 /* A dynamic relocation for a displacement from TP to the target. */
953 HOWTO (R_ALPHA_TPREL64, /* type */
954 0, /* rightshift */
955 4, /* size (0 = byte, 1 = short, 2 = long) */
956 64, /* bitsize */
b34976b6 957 FALSE, /* pc_relative */
3765b1be
RH
958 0, /* bitpos */
959 complain_overflow_bitfield, /* complain_on_overflow */
960 0, /* special_function */
961 "TPREL64", /* name */
b34976b6 962 FALSE, /* partial_inplace */
3765b1be
RH
963 MINUS_ONE, /* src_mask */
964 MINUS_ONE, /* dst_mask */
b34976b6 965 FALSE), /* pcrel_offset */
3765b1be
RH
966
967 /* The high 16 bits of the displacement from TP to the target. */
968 HOWTO (R_ALPHA_TPRELHI, /* type */
969 0, /* rightshift */
970 1, /* size (0 = byte, 1 = short, 2 = long) */
971 16, /* bitsize */
b34976b6 972 FALSE, /* pc_relative */
3765b1be
RH
973 0, /* bitpos */
974 complain_overflow_signed, /* complain_on_overflow */
975 0, /* special_function */
976 "TPRELHI", /* name */
b34976b6 977 FALSE, /* partial_inplace */
3765b1be
RH
978 0xffff, /* src_mask */
979 0xffff, /* dst_mask */
b34976b6 980 FALSE), /* pcrel_offset */
3765b1be
RH
981
982 /* The low 16 bits of the displacement from TP to the target. */
983 HOWTO (R_ALPHA_TPRELLO, /* type */
984 0, /* rightshift */
985 1, /* size (0 = byte, 1 = short, 2 = long) */
986 16, /* bitsize */
b34976b6 987 FALSE, /* pc_relative */
3765b1be
RH
988 0, /* bitpos */
989 complain_overflow_dont, /* complain_on_overflow */
990 0, /* special_function */
991 "TPRELLO", /* name */
b34976b6 992 FALSE, /* partial_inplace */
3765b1be
RH
993 0xffff, /* src_mask */
994 0xffff, /* dst_mask */
b34976b6 995 FALSE), /* pcrel_offset */
3765b1be
RH
996
997 /* A 16-bit displacement from TP to the target. */
998 HOWTO (R_ALPHA_TPREL16, /* type */
999 0, /* rightshift */
1000 1, /* size (0 = byte, 1 = short, 2 = long) */
1001 16, /* bitsize */
b34976b6 1002 FALSE, /* pc_relative */
3765b1be
RH
1003 0, /* bitpos */
1004 complain_overflow_signed, /* complain_on_overflow */
1005 0, /* special_function */
1006 "TPREL16", /* name */
b34976b6 1007 FALSE, /* partial_inplace */
3765b1be
RH
1008 0xffff, /* src_mask */
1009 0xffff, /* dst_mask */
b34976b6 1010 FALSE), /* pcrel_offset */
252b5132
RH
1011};
1012
252b5132
RH
1013/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1014
1015struct elf_reloc_map
1016{
1017 bfd_reloc_code_real_type bfd_reloc_val;
1018 int elf_reloc_val;
1019};
1020
1021static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1022{
dfe57ca0
RH
1023 {BFD_RELOC_NONE, R_ALPHA_NONE},
1024 {BFD_RELOC_32, R_ALPHA_REFLONG},
1025 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1026 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1027 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1028 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1029 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1030 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1031 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1032 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1033 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1034 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1035 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1036 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1037 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1038 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1039 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1040 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1041 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1042 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1043 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1044 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1045 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1046 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1047 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1048 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1049 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1050 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1051 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1052 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1053};
1054
1055/* Given a BFD reloc type, return a HOWTO structure. */
1056
1057static reloc_howto_type *
a7519a3c
RH
1058elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1059 bfd_reloc_code_real_type code)
252b5132
RH
1060{
1061 const struct elf_reloc_map *i, *e;
1062 i = e = elf64_alpha_reloc_map;
1063 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1064 for (; i != e; ++i)
1065 {
1066 if (i->bfd_reloc_val == code)
1067 return &elf64_alpha_howto_table[i->elf_reloc_val];
1068 }
1069 return 0;
1070}
1071
157090f7
AM
1072static reloc_howto_type *
1073elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1074 const char *r_name)
1075{
1076 unsigned int i;
1077
1078 for (i = 0;
1079 i < (sizeof (elf64_alpha_howto_table)
1080 / sizeof (elf64_alpha_howto_table[0]));
1081 i++)
1082 if (elf64_alpha_howto_table[i].name != NULL
1083 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1084 return &elf64_alpha_howto_table[i];
1085
1086 return NULL;
1087}
1088
252b5132
RH
1089/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1090
1091static void
a7519a3c
RH
1092elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1093 Elf_Internal_Rela *dst)
252b5132 1094{
a7519a3c 1095 unsigned r_type = ELF64_R_TYPE(dst->r_info);
252b5132
RH
1096 BFD_ASSERT (r_type < (unsigned int) R_ALPHA_max);
1097 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1098}
3765b1be
RH
1099
1100/* These two relocations create a two-word entry in the got. */
1101#define alpha_got_entry_size(r_type) \
1102 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1103
1104/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1105#define alpha_get_dtprel_base(info) \
1106 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1107
1108/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1109 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1110#define alpha_get_tprel_base(info) \
1111 (elf_hash_table (info)->tls_sec->vma \
1112 - align_power ((bfd_vma) 16, \
1113 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1114\f
a7519a3c
RH
1115/* Handle an Alpha specific section when reading an object file. This
1116 is called when bfd_section_from_shdr finds a section with an unknown
1117 type.
1118 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1119 how to. */
252b5132 1120
a7519a3c
RH
1121static bfd_boolean
1122elf64_alpha_section_from_shdr (bfd *abfd,
1123 Elf_Internal_Shdr *hdr,
1124 const char *name,
1125 int shindex)
252b5132 1126{
a7519a3c
RH
1127 asection *newsect;
1128
1129 /* There ought to be a place to keep ELF backend specific flags, but
1130 at the moment there isn't one. We just keep track of the
1131 sections by their name, instead. Fortunately, the ABI gives
1132 suggested names for all the MIPS specific sections, so we will
1133 probably get away with this. */
1134 switch (hdr->sh_type)
1135 {
1136 case SHT_ALPHA_DEBUG:
1137 if (strcmp (name, ".mdebug") != 0)
1138 return FALSE;
1139 break;
1140 default:
1141 return FALSE;
1142 }
252b5132 1143
a7519a3c
RH
1144 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1145 return FALSE;
1146 newsect = hdr->bfd_section;
252b5132 1147
a7519a3c 1148 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1149 {
a7519a3c
RH
1150 if (! bfd_set_section_flags (abfd, newsect,
1151 (bfd_get_section_flags (abfd, newsect)
1152 | SEC_DEBUGGING)))
1153 return FALSE;
252b5132 1154 }
a7519a3c
RH
1155
1156 return TRUE;
252b5132
RH
1157}
1158
a7519a3c
RH
1159/* Convert Alpha specific section flags to bfd internal section flags. */
1160
b34976b6 1161static bfd_boolean
a7519a3c 1162elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1163{
a7519a3c
RH
1164 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1165 *flags |= SEC_SMALL_DATA;
252b5132 1166
a7519a3c
RH
1167 return TRUE;
1168}
252b5132 1169
a7519a3c
RH
1170/* Set the correct type for an Alpha ELF section. We do this by the
1171 section name, which is a hack, but ought to work. */
9e756d64 1172
a7519a3c
RH
1173static bfd_boolean
1174elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1175{
1176 register const char *name;
1177
1178 name = bfd_get_section_name (abfd, sec);
1179
1180 if (strcmp (name, ".mdebug") == 0)
252b5132 1181 {
a7519a3c
RH
1182 hdr->sh_type = SHT_ALPHA_DEBUG;
1183 /* In a shared object on Irix 5.3, the .mdebug section has an
1184 entsize of 0. FIXME: Does this matter? */
1185 if ((abfd->flags & DYNAMIC) != 0 )
1186 hdr->sh_entsize = 0;
1187 else
1188 hdr->sh_entsize = 1;
252b5132 1189 }
a7519a3c
RH
1190 else if ((sec->flags & SEC_SMALL_DATA)
1191 || strcmp (name, ".sdata") == 0
1192 || strcmp (name, ".sbss") == 0
1193 || strcmp (name, ".lit4") == 0
1194 || strcmp (name, ".lit8") == 0)
1195 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1196
a7519a3c
RH
1197 return TRUE;
1198}
252b5132 1199
a7519a3c
RH
1200/* Hook called by the linker routine which adds symbols from an object
1201 file. We use it to put .comm items in .sbss, and not .bss. */
1202
1203static bfd_boolean
1204elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1205 Elf_Internal_Sym *sym,
1206 const char **namep ATTRIBUTE_UNUSED,
1207 flagword *flagsp ATTRIBUTE_UNUSED,
1208 asection **secp, bfd_vma *valp)
1209{
1210 if (sym->st_shndx == SHN_COMMON
1211 && !info->relocatable
1212 && sym->st_size <= elf_gp_size (abfd))
252b5132 1213 {
a7519a3c
RH
1214 /* Common symbols less than or equal to -G nn bytes are
1215 automatically put into .sbss. */
ffcb7aff 1216
a7519a3c 1217 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1218
a7519a3c 1219 if (scomm == NULL)
252b5132 1220 {
a7519a3c
RH
1221 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1222 (SEC_ALLOC
1223 | SEC_IS_COMMON
1224 | SEC_LINKER_CREATED));
1225 if (scomm == NULL)
1226 return FALSE;
1227 }
ffcb7aff 1228
a7519a3c
RH
1229 *secp = scomm;
1230 *valp = sym->st_size;
1231 }
ffcb7aff 1232
a7519a3c
RH
1233 return TRUE;
1234}
252b5132 1235
a7519a3c 1236/* Create the .got section. */
252b5132 1237
a7519a3c
RH
1238static bfd_boolean
1239elf64_alpha_create_got_section (bfd *abfd,
1240 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1241{
85d162e6 1242 flagword flags;
a7519a3c 1243 asection *s;
252b5132 1244
0ffa91dd
NC
1245 if (! is_alpha_elf (abfd))
1246 return FALSE;
1247
85d162e6
AM
1248 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1249 | SEC_LINKER_CREATED);
1250 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1251 if (s == NULL
1252 || !bfd_set_section_alignment (abfd, s, 3))
1253 return FALSE;
252b5132 1254
a7519a3c 1255 alpha_elf_tdata (abfd)->got = s;
252b5132 1256
85d162e6
AM
1257 /* Make sure the object's gotobj is set to itself so that we default
1258 to every object with its own .got. We'll merge .gots later once
1259 we've collected each object's info. */
1260 alpha_elf_tdata (abfd)->gotobj = abfd;
1261
a7519a3c
RH
1262 return TRUE;
1263}
252b5132 1264
a7519a3c 1265/* Create all the dynamic sections. */
252b5132 1266
a7519a3c
RH
1267static bfd_boolean
1268elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1269{
1270 asection *s;
85d162e6 1271 flagword flags;
a7519a3c 1272 struct elf_link_hash_entry *h;
252b5132 1273
0ffa91dd
NC
1274 if (! is_alpha_elf (abfd))
1275 return FALSE;
1276
a7519a3c 1277 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1278
85d162e6
AM
1279 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1280 | SEC_LINKER_CREATED
1281 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1282 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
6ec7057a 1283 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1284 return FALSE;
252b5132 1285
a7519a3c
RH
1286 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1287 .plt section. */
7325306f
RS
1288 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1289 "_PROCEDURE_LINKAGE_TABLE_");
1290 elf_hash_table (info)->hplt = h;
1291 if (h == NULL)
a7519a3c 1292 return FALSE;
d6ad34f6 1293
85d162e6
AM
1294 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1295 | SEC_LINKER_CREATED | SEC_READONLY);
1296 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
6ec7057a 1297 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1298 return FALSE;
252b5132 1299
6ec7057a
RH
1300 if (elf64_alpha_use_secureplt)
1301 {
85d162e6
AM
1302 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1303 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
6ec7057a
RH
1304 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1305 return FALSE;
1306 }
1307
a7519a3c
RH
1308 /* We may or may not have created a .got section for this object, but
1309 we definitely havn't done the rest of the work. */
1cd6895c 1310
85d162e6
AM
1311 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1312 {
1313 if (!elf64_alpha_create_got_section (abfd, info))
1314 return FALSE;
1315 }
1cd6895c 1316
85d162e6
AM
1317 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1318 | SEC_LINKER_CREATED | SEC_READONLY);
1319 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
a7519a3c
RH
1320 if (s == NULL
1321 || !bfd_set_section_alignment (abfd, s, 3))
1322 return FALSE;
252b5132 1323
a7519a3c
RH
1324 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1325 dynobj's .got section. We don't do this in the linker script
1326 because we don't want to define the symbol if we are not creating
1327 a global offset table. */
d98685ac
AM
1328 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1329 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1330 elf_hash_table (info)->hgot = h;
d98685ac
AM
1331 if (h == NULL)
1332 return FALSE;
252b5132 1333
a7519a3c 1334 return TRUE;
252b5132 1335}
a7519a3c
RH
1336\f
1337/* Read ECOFF debugging information from a .mdebug section into a
1338 ecoff_debug_info structure. */
252b5132 1339
a7519a3c
RH
1340static bfd_boolean
1341elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1342 struct ecoff_debug_info *debug)
252b5132 1343{
a7519a3c
RH
1344 HDRR *symhdr;
1345 const struct ecoff_debug_swap *swap;
1346 char *ext_hdr = NULL;
252b5132 1347
a7519a3c
RH
1348 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1349 memset (debug, 0, sizeof (*debug));
252b5132 1350
a7519a3c
RH
1351 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1352 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1353 goto error_return;
252b5132 1354
a7519a3c
RH
1355 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1356 swap->external_hdr_size))
1357 goto error_return;
252b5132 1358
a7519a3c
RH
1359 symhdr = &debug->symbolic_header;
1360 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1361
a7519a3c
RH
1362 /* The symbolic header contains absolute file offsets and sizes to
1363 read. */
1364#define READ(ptr, offset, count, size, type) \
1365 if (symhdr->count == 0) \
1366 debug->ptr = NULL; \
1367 else \
1368 { \
1369 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1370 debug->ptr = (type) bfd_malloc (amt); \
1371 if (debug->ptr == NULL) \
1372 goto error_return; \
1373 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1374 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1375 goto error_return; \
1376 }
fe8bc63d 1377
a7519a3c
RH
1378 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
1379 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, PTR);
1380 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, PTR);
1381 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, PTR);
1382 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, PTR);
1383 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1384 union aux_ext *);
1385 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1386 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
1387 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, PTR);
1388 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, PTR);
1389 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, PTR);
1390#undef READ
252b5132 1391
a7519a3c 1392 debug->fdr = NULL;
252b5132 1393
a7519a3c 1394 return TRUE;
252b5132 1395
a7519a3c
RH
1396 error_return:
1397 if (ext_hdr != NULL)
1398 free (ext_hdr);
1399 if (debug->line != NULL)
1400 free (debug->line);
1401 if (debug->external_dnr != NULL)
1402 free (debug->external_dnr);
1403 if (debug->external_pdr != NULL)
1404 free (debug->external_pdr);
1405 if (debug->external_sym != NULL)
1406 free (debug->external_sym);
1407 if (debug->external_opt != NULL)
1408 free (debug->external_opt);
1409 if (debug->external_aux != NULL)
1410 free (debug->external_aux);
1411 if (debug->ss != NULL)
1412 free (debug->ss);
1413 if (debug->ssext != NULL)
1414 free (debug->ssext);
1415 if (debug->external_fdr != NULL)
1416 free (debug->external_fdr);
1417 if (debug->external_rfd != NULL)
1418 free (debug->external_rfd);
1419 if (debug->external_ext != NULL)
1420 free (debug->external_ext);
1421 return FALSE;
252b5132
RH
1422}
1423
a7519a3c
RH
1424/* Alpha ELF local labels start with '$'. */
1425
b34976b6 1426static bfd_boolean
a7519a3c 1427elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1428{
a7519a3c
RH
1429 return name[0] == '$';
1430}
9e756d64 1431
a7519a3c
RH
1432/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
1433 routine in order to handle the ECOFF debugging information. We
1434 still call this mips_elf_find_line because of the slot
1435 find_line_info in elf_obj_tdata is declared that way. */
d6ad34f6 1436
a7519a3c
RH
1437struct mips_elf_find_line
1438{
1439 struct ecoff_debug_info d;
1440 struct ecoff_find_line i;
1441};
d6ad34f6 1442
a7519a3c
RH
1443static bfd_boolean
1444elf64_alpha_find_nearest_line (bfd *abfd, asection *section, asymbol **symbols,
1445 bfd_vma offset, const char **filename_ptr,
1446 const char **functionname_ptr,
1447 unsigned int *line_ptr)
1448{
1449 asection *msec;
252b5132 1450
a7519a3c
RH
1451 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
1452 filename_ptr, functionname_ptr,
1453 line_ptr, 0,
1454 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1455 return TRUE;
9e756d64 1456
a7519a3c
RH
1457 msec = bfd_get_section_by_name (abfd, ".mdebug");
1458 if (msec != NULL)
1bbc9cec 1459 {
a7519a3c
RH
1460 flagword origflags;
1461 struct mips_elf_find_line *fi;
1462 const struct ecoff_debug_swap * const swap =
1463 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1464
a7519a3c
RH
1465 /* If we are called during a link, alpha_elf_final_link may have
1466 cleared the SEC_HAS_CONTENTS field. We force it back on here
1467 if appropriate (which it normally will be). */
1468 origflags = msec->flags;
1469 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1470 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1471
a7519a3c
RH
1472 fi = elf_tdata (abfd)->find_line_info;
1473 if (fi == NULL)
1474 {
1475 bfd_size_type external_fdr_size;
1476 char *fraw_src;
1477 char *fraw_end;
1478 struct fdr *fdr_ptr;
1479 bfd_size_type amt = sizeof (struct mips_elf_find_line);
9e756d64 1480
a7519a3c
RH
1481 fi = (struct mips_elf_find_line *) bfd_zalloc (abfd, amt);
1482 if (fi == NULL)
1483 {
1484 msec->flags = origflags;
1485 return FALSE;
1486 }
9e756d64 1487
a7519a3c
RH
1488 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1489 {
1490 msec->flags = origflags;
1491 return FALSE;
1492 }
9e756d64 1493
a7519a3c
RH
1494 /* Swap in the FDR information. */
1495 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1496 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1497 if (fi->d.fdr == NULL)
1498 {
1499 msec->flags = origflags;
1500 return FALSE;
1501 }
1502 external_fdr_size = swap->external_fdr_size;
1503 fdr_ptr = fi->d.fdr;
1504 fraw_src = (char *) fi->d.external_fdr;
1505 fraw_end = (fraw_src
1506 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1507 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
1508 (*swap->swap_fdr_in) (abfd, (PTR) fraw_src, fdr_ptr);
9e756d64 1509
a7519a3c 1510 elf_tdata (abfd)->find_line_info = fi;
9e756d64 1511
a7519a3c
RH
1512 /* Note that we don't bother to ever free this information.
1513 find_nearest_line is either called all the time, as in
1514 objdump -l, so the information should be saved, or it is
1515 rarely called, as in ld error messages, so the memory
1516 wasted is unimportant. Still, it would probably be a
1517 good idea for free_cached_info to throw it away. */
1518 }
9e756d64 1519
a7519a3c
RH
1520 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1521 &fi->i, filename_ptr, functionname_ptr,
1522 line_ptr))
1523 {
1524 msec->flags = origflags;
1525 return TRUE;
1526 }
9e756d64 1527
a7519a3c 1528 msec->flags = origflags;
9e756d64 1529 }
9e756d64 1530
a7519a3c 1531 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1532
a7519a3c
RH
1533 return _bfd_elf_find_nearest_line (abfd, section, symbols, offset,
1534 filename_ptr, functionname_ptr,
1535 line_ptr);
9e756d64 1536}
a7519a3c
RH
1537\f
1538/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1539
a7519a3c 1540struct extsym_info
9e756d64 1541{
a7519a3c
RH
1542 bfd *abfd;
1543 struct bfd_link_info *info;
1544 struct ecoff_debug_info *debug;
1545 const struct ecoff_debug_swap *swap;
1546 bfd_boolean failed;
1547};
9e756d64 1548
a7519a3c
RH
1549static bfd_boolean
1550elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, PTR data)
1551{
1552 struct extsym_info *einfo = (struct extsym_info *) data;
1553 bfd_boolean strip;
1554 asection *sec, *output_section;
9e756d64 1555
a7519a3c
RH
1556 if (h->root.root.type == bfd_link_hash_warning)
1557 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
9e756d64 1558
a7519a3c
RH
1559 if (h->root.indx == -2)
1560 strip = FALSE;
1561 else if ((h->root.def_dynamic
1562 || h->root.ref_dynamic
1563 || h->root.root.type == bfd_link_hash_new)
1564 && !h->root.def_regular
1565 && !h->root.ref_regular)
1566 strip = TRUE;
1567 else if (einfo->info->strip == strip_all
1568 || (einfo->info->strip == strip_some
1569 && bfd_hash_lookup (einfo->info->keep_hash,
1570 h->root.root.root.string,
1571 FALSE, FALSE) == NULL))
1572 strip = TRUE;
1573 else
1574 strip = FALSE;
9e756d64 1575
a7519a3c 1576 if (strip)
b34976b6 1577 return TRUE;
9e756d64 1578
a7519a3c 1579 if (h->esym.ifd == -2)
9e756d64 1580 {
a7519a3c
RH
1581 h->esym.jmptbl = 0;
1582 h->esym.cobol_main = 0;
1583 h->esym.weakext = 0;
1584 h->esym.reserved = 0;
1585 h->esym.ifd = ifdNil;
1586 h->esym.asym.value = 0;
1587 h->esym.asym.st = stGlobal;
9e756d64 1588
a7519a3c
RH
1589 if (h->root.root.type != bfd_link_hash_defined
1590 && h->root.root.type != bfd_link_hash_defweak)
1591 h->esym.asym.sc = scAbs;
1592 else
1593 {
1594 const char *name;
9e756d64 1595
a7519a3c
RH
1596 sec = h->root.root.u.def.section;
1597 output_section = sec->output_section;
9e756d64 1598
a7519a3c
RH
1599 /* When making a shared library and symbol h is the one from
1600 the another shared library, OUTPUT_SECTION may be null. */
1601 if (output_section == NULL)
1602 h->esym.asym.sc = scUndefined;
1603 else
1604 {
1605 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1606
a7519a3c
RH
1607 if (strcmp (name, ".text") == 0)
1608 h->esym.asym.sc = scText;
1609 else if (strcmp (name, ".data") == 0)
1610 h->esym.asym.sc = scData;
1611 else if (strcmp (name, ".sdata") == 0)
1612 h->esym.asym.sc = scSData;
1613 else if (strcmp (name, ".rodata") == 0
1614 || strcmp (name, ".rdata") == 0)
1615 h->esym.asym.sc = scRData;
1616 else if (strcmp (name, ".bss") == 0)
1617 h->esym.asym.sc = scBss;
1618 else if (strcmp (name, ".sbss") == 0)
1619 h->esym.asym.sc = scSBss;
1620 else if (strcmp (name, ".init") == 0)
1621 h->esym.asym.sc = scInit;
1622 else if (strcmp (name, ".fini") == 0)
1623 h->esym.asym.sc = scFini;
1624 else
1625 h->esym.asym.sc = scAbs;
1626 }
1627 }
9e756d64 1628
a7519a3c
RH
1629 h->esym.asym.reserved = 0;
1630 h->esym.asym.index = indexNil;
1631 }
9e756d64 1632
a7519a3c
RH
1633 if (h->root.root.type == bfd_link_hash_common)
1634 h->esym.asym.value = h->root.root.u.c.size;
1635 else if (h->root.root.type == bfd_link_hash_defined
1636 || h->root.root.type == bfd_link_hash_defweak)
1637 {
1638 if (h->esym.asym.sc == scCommon)
1639 h->esym.asym.sc = scBss;
1640 else if (h->esym.asym.sc == scSCommon)
1641 h->esym.asym.sc = scSBss;
9e756d64 1642
a7519a3c
RH
1643 sec = h->root.root.u.def.section;
1644 output_section = sec->output_section;
1645 if (output_section != NULL)
1646 h->esym.asym.value = (h->root.root.u.def.value
1647 + sec->output_offset
1648 + output_section->vma);
1649 else
1650 h->esym.asym.value = 0;
1651 }
9e756d64 1652
a7519a3c
RH
1653 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1654 h->root.root.root.string,
1655 &h->esym))
1656 {
1657 einfo->failed = TRUE;
1658 return FALSE;
9e756d64
RH
1659 }
1660
a7519a3c
RH
1661 return TRUE;
1662}
1663\f
1664/* Search for and possibly create a got entry. */
9e756d64 1665
a7519a3c
RH
1666static struct alpha_elf_got_entry *
1667get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1668 unsigned long r_type, unsigned long r_symndx,
1669 bfd_vma r_addend)
1670{
1671 struct alpha_elf_got_entry *gotent;
1672 struct alpha_elf_got_entry **slot;
9e756d64 1673
a7519a3c
RH
1674 if (h)
1675 slot = &h->got_entries;
1676 else
1677 {
1678 /* This is a local .got entry -- record for merge. */
9e756d64 1679
a7519a3c 1680 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1681
a7519a3c
RH
1682 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1683 if (!local_got_entries)
1684 {
1685 bfd_size_type size;
1686 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1687
a7519a3c
RH
1688 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1689 size = symtab_hdr->sh_info;
1690 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1691
a7519a3c
RH
1692 local_got_entries
1693 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1694 if (!local_got_entries)
1695 return NULL;
1696
1697 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1698 }
1699
1700 slot = &local_got_entries[r_symndx];
9e756d64
RH
1701 }
1702
a7519a3c
RH
1703 for (gotent = *slot; gotent ; gotent = gotent->next)
1704 if (gotent->gotobj == abfd
1705 && gotent->reloc_type == r_type
1706 && gotent->addend == r_addend)
1707 break;
1708
1709 if (!gotent)
9e756d64 1710 {
a7519a3c
RH
1711 int entry_size;
1712 bfd_size_type amt;
9e756d64 1713
a7519a3c
RH
1714 amt = sizeof (struct alpha_elf_got_entry);
1715 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1716 if (!gotent)
1717 return NULL;
9e756d64 1718
a7519a3c
RH
1719 gotent->gotobj = abfd;
1720 gotent->addend = r_addend;
1721 gotent->got_offset = -1;
6ec7057a 1722 gotent->plt_offset = -1;
a7519a3c
RH
1723 gotent->use_count = 1;
1724 gotent->reloc_type = r_type;
1725 gotent->reloc_done = 0;
1726 gotent->reloc_xlated = 0;
9e756d64 1727
a7519a3c
RH
1728 gotent->next = *slot;
1729 *slot = gotent;
9e756d64 1730
a7519a3c
RH
1731 entry_size = alpha_got_entry_size (r_type);
1732 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1733 if (!h)
1734 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1735 }
a7519a3c
RH
1736 else
1737 gotent->use_count += 1;
9e756d64 1738
a7519a3c 1739 return gotent;
9e756d64
RH
1740}
1741
6ec7057a
RH
1742static bfd_boolean
1743elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1744{
1745 return ((ah->root.type == STT_FUNC
1746 || ah->root.root.type == bfd_link_hash_undefweak
1747 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1748 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1749 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1750}
1751
a7519a3c
RH
1752/* Handle dynamic relocations when doing an Alpha ELF link. */
1753
b34976b6 1754static bfd_boolean
a7519a3c
RH
1755elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1756 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1757{
a7519a3c
RH
1758 bfd *dynobj;
1759 asection *sreloc;
252b5132 1760 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1761 struct alpha_elf_link_hash_entry **sym_hashes;
1762 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1763 bfd_size_type amt;
252b5132 1764
a7519a3c
RH
1765 if (info->relocatable)
1766 return TRUE;
252b5132 1767
a7519a3c
RH
1768 /* Don't do anything special with non-loaded, non-alloced sections.
1769 In particular, any relocs in such sections should not affect GOT
1770 and PLT reference counting (ie. we don't allow them to create GOT
1771 or PLT entries), there's no possibility or desire to optimize TLS
1772 relocs, and there's not much point in propagating relocs to shared
1773 libs that the dynamic linker won't relocate. */
1774 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1775 return TRUE;
252b5132 1776
0ffa91dd
NC
1777 BFD_ASSERT (is_alpha_elf (abfd));
1778
1779 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1780 if (dynobj == NULL)
0ffa91dd 1781 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1782
a7519a3c 1783 sreloc = NULL;
0ffa91dd
NC
1784 symtab_hdr = &elf_symtab_hdr (abfd);
1785 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1786
1787 relend = relocs + sec->reloc_count;
1788 for (rel = relocs; rel < relend; ++rel)
1789 {
1790 enum {
1791 NEED_GOT = 1,
1792 NEED_GOT_ENTRY = 2,
1793 NEED_DYNREL = 4
1794 };
1795
1796 unsigned long r_symndx, r_type;
1797 struct alpha_elf_link_hash_entry *h;
1798 unsigned int gotent_flags;
1799 bfd_boolean maybe_dynamic;
1800 unsigned int need;
1801 bfd_vma addend;
1802
1803 r_symndx = ELF64_R_SYM (rel->r_info);
1804 if (r_symndx < symtab_hdr->sh_info)
1805 h = NULL;
1806 else
1807 {
1808 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1809
a7519a3c
RH
1810 while (h->root.root.type == bfd_link_hash_indirect
1811 || h->root.root.type == bfd_link_hash_warning)
1812 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1813
a7519a3c
RH
1814 h->root.ref_regular = 1;
1815 }
252b5132 1816
a7519a3c
RH
1817 /* We can only get preliminary data on whether a symbol is
1818 locally or externally defined, as not all of the input files
1819 have yet been processed. Do something with what we know, as
1820 this may help reduce memory usage and processing time later. */
1821 maybe_dynamic = FALSE;
1822 if (h && ((info->shared
1823 && (!info->symbolic
1824 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1825 || !h->root.def_regular
1826 || h->root.root.type == bfd_link_hash_defweak))
1827 maybe_dynamic = TRUE;
252b5132 1828
a7519a3c
RH
1829 need = 0;
1830 gotent_flags = 0;
1831 r_type = ELF64_R_TYPE (rel->r_info);
1832 addend = rel->r_addend;
9e756d64 1833
9e756d64
RH
1834 switch (r_type)
1835 {
1836 case R_ALPHA_LITERAL:
a7519a3c
RH
1837 need = NEED_GOT | NEED_GOT_ENTRY;
1838
1839 /* Remember how this literal is used from its LITUSEs.
1840 This will be important when it comes to decide if we can
1841 create a .plt entry for a function symbol. */
1842 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1843 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1844 gotent_flags |= 1 << rel->r_addend;
1845 --rel;
1846
1847 /* No LITUSEs -- presumably the address is used somehow. */
1848 if (gotent_flags == 0)
1849 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1850 break;
1851
1852 case R_ALPHA_GPDISP:
1853 case R_ALPHA_GPREL16:
1854 case R_ALPHA_GPREL32:
9e756d64
RH
1855 case R_ALPHA_GPRELHIGH:
1856 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1857 case R_ALPHA_BRSGP:
1858 need = NEED_GOT;
1859 break;
1860
1861 case R_ALPHA_REFLONG:
1862 case R_ALPHA_REFQUAD:
1863 if (info->shared || maybe_dynamic)
1864 need = NEED_DYNREL;
cc03ec80
RH
1865 break;
1866
9e756d64 1867 case R_ALPHA_TLSLDM:
cc03ec80 1868 /* The symbol for a TLSLDM reloc is ignored. Collapse the
a7519a3c 1869 reloc to the 0 symbol so that they all match. */
cc03ec80 1870 r_symndx = 0;
a7519a3c
RH
1871 h = 0;
1872 maybe_dynamic = FALSE;
1873 /* FALLTHRU */
1874
1875 case R_ALPHA_TLSGD:
1876 case R_ALPHA_GOTDTPREL:
1877 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1878 break;
cc03ec80 1879
a7519a3c
RH
1880 case R_ALPHA_GOTTPREL:
1881 need = NEED_GOT | NEED_GOT_ENTRY;
1882 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1883 if (info->shared)
1884 info->flags |= DF_STATIC_TLS;
1885 break;
1886
1887 case R_ALPHA_TPREL64:
1888 if (info->shared || maybe_dynamic)
1889 need = NEED_DYNREL;
1890 if (info->shared)
1891 info->flags |= DF_STATIC_TLS;
1892 break;
252b5132
RH
1893 }
1894
a7519a3c 1895 if (need & NEED_GOT)
252b5132 1896 {
85d162e6 1897 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1898 {
a7519a3c
RH
1899 if (!elf64_alpha_create_got_section (abfd, info))
1900 return FALSE;
c328dc3f 1901 }
252b5132 1902 }
252b5132 1903
a7519a3c
RH
1904 if (need & NEED_GOT_ENTRY)
1905 {
1906 struct alpha_elf_got_entry *gotent;
252b5132 1907
a7519a3c
RH
1908 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1909 if (!gotent)
1910 return FALSE;
4a67a098 1911
a7519a3c 1912 if (gotent_flags)
cc03ec80 1913 {
a7519a3c
RH
1914 gotent->flags |= gotent_flags;
1915 if (h)
1916 {
1917 gotent_flags |= h->flags;
1918 h->flags = gotent_flags;
4a67a098 1919
a7519a3c 1920 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1921 /* ??? It appears that we won't make it into
1922 adjust_dynamic_symbol for symbols that remain
1923 totally undefined. Copying this check here means
1924 we can create a plt entry for them too. */
1925 h->root.needs_plt
1926 = (maybe_dynamic && elf64_alpha_want_plt (h));
1927 }
a7519a3c 1928 }
252b5132
RH
1929 }
1930
a7519a3c 1931 if (need & NEED_DYNREL)
9e756d64 1932 {
a7519a3c
RH
1933 /* We need to create the section here now whether we eventually
1934 use it or not so that it gets mapped to an output section by
83bac4b0 1935 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1936 if (sreloc == NULL)
9e756d64 1937 {
83bac4b0
NC
1938 sreloc = _bfd_elf_make_dynamic_reloc_section
1939 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1940
a7519a3c 1941 if (sreloc == NULL)
83bac4b0 1942 return FALSE;
9e756d64 1943 }
252b5132 1944
a7519a3c
RH
1945 if (h)
1946 {
1947 /* Since we havn't seen all of the input symbols yet, we
1948 don't know whether we'll actually need a dynamic relocation
1949 entry for this reloc. So make a record of it. Once we
1950 find out if this thing needs dynamic relocation we'll
1951 expand the relocation sections by the appropriate amount. */
9e756d64 1952
a7519a3c 1953 struct alpha_elf_reloc_entry *rent;
9e756d64 1954
a7519a3c
RH
1955 for (rent = h->reloc_entries; rent; rent = rent->next)
1956 if (rent->rtype == r_type && rent->srel == sreloc)
1957 break;
252b5132 1958
a7519a3c
RH
1959 if (!rent)
1960 {
1961 amt = sizeof (struct alpha_elf_reloc_entry);
1962 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1963 if (!rent)
1964 return FALSE;
252b5132 1965
a7519a3c
RH
1966 rent->srel = sreloc;
1967 rent->rtype = r_type;
1968 rent->count = 1;
1969 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 1970
a7519a3c
RH
1971 rent->next = h->reloc_entries;
1972 h->reloc_entries = rent;
1973 }
1974 else
1975 rent->count++;
1976 }
1977 else if (info->shared)
1978 {
1979 /* If this is a shared library, and the section is to be
1980 loaded into memory, we need a RELATIVE reloc. */
1981 sreloc->size += sizeof (Elf64_External_Rela);
1982 if (sec->flags & SEC_READONLY)
1983 info->flags |= DF_TEXTREL;
1984 }
252b5132
RH
1985 }
1986 }
1987
b34976b6 1988 return TRUE;
252b5132 1989}
252b5132 1990
a7519a3c
RH
1991/* Adjust a symbol defined by a dynamic object and referenced by a
1992 regular object. The current definition is in some section of the
1993 dynamic object, but we're not including those sections. We have to
1994 change the definition to something the rest of the link can
1995 understand. */
252b5132 1996
b34976b6 1997static bfd_boolean
a7519a3c
RH
1998elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
1999 struct elf_link_hash_entry *h)
252b5132 2000{
a7519a3c
RH
2001 bfd *dynobj;
2002 asection *s;
2003 struct alpha_elf_link_hash_entry *ah;
252b5132 2004
a7519a3c
RH
2005 dynobj = elf_hash_table(info)->dynobj;
2006 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2007
a7519a3c 2008 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2009 about whether this symbol should get a .plt entry. Irritatingly, it
2010 is common for folk to leave undefined symbols in shared libraries,
2011 and they still expect lazy binding; accept undefined symbols in lieu
2012 of STT_FUNC. */
2013 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2014 {
6ec7057a 2015 h->needs_plt = TRUE;
252b5132 2016
a7519a3c
RH
2017 s = bfd_get_section_by_name(dynobj, ".plt");
2018 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2019 return FALSE;
204692d7 2020
6ec7057a
RH
2021 /* We need one plt entry per got subsection. Delay allocation of
2022 the actual plt entries until size_plt_section, called from
2023 size_dynamic_sections or during relaxation. */
252b5132 2024
a7519a3c
RH
2025 return TRUE;
2026 }
2027 else
6ec7057a 2028 h->needs_plt = FALSE;
252b5132 2029
a7519a3c
RH
2030 /* If this is a weak symbol, and there is a real definition, the
2031 processor independent code will have arranged for us to see the
2032 real definition first, and we can just use the same value. */
2033 if (h->u.weakdef != NULL)
252b5132 2034 {
a7519a3c
RH
2035 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2036 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2037 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2038 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2039 return TRUE;
252b5132 2040 }
a7519a3c
RH
2041
2042 /* This is a reference to a symbol defined by a dynamic object which
2043 is not a function. The Alpha, since it uses .got entries for all
2044 symbols even in regular objects, does not need the hackery of a
2045 .dynbss section and COPY dynamic relocations. */
252b5132 2046
b34976b6 2047 return TRUE;
252b5132
RH
2048}
2049
747ffa7b
AM
2050/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2051
2052static void
2053elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2054 const Elf_Internal_Sym *isym,
2055 bfd_boolean definition,
2056 bfd_boolean dynamic)
2057{
2058 if (!dynamic && definition)
2059 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2060 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2061}
2062
a7519a3c
RH
2063/* Symbol versioning can create new symbols, and make our old symbols
2064 indirect to the new ones. Consolidate the got and reloc information
2065 in these situations. */
252b5132 2066
b34976b6 2067static bfd_boolean
a7519a3c
RH
2068elf64_alpha_merge_ind_symbols (struct alpha_elf_link_hash_entry *hi,
2069 PTR dummy ATTRIBUTE_UNUSED)
252b5132 2070{
a7519a3c 2071 struct alpha_elf_link_hash_entry *hs;
252b5132 2072
a7519a3c
RH
2073 if (hi->root.root.type != bfd_link_hash_indirect)
2074 return TRUE;
2075 hs = hi;
2076 do {
2077 hs = (struct alpha_elf_link_hash_entry *)hs->root.root.u.i.link;
2078 } while (hs->root.root.type == bfd_link_hash_indirect);
252b5132 2079
a7519a3c
RH
2080 /* Merge the flags. Whee. */
2081
2082 hs->flags |= hi->flags;
2083
2084 /* Merge the .got entries. Cannibalize the old symbol's list in
2085 doing so, since we don't need it anymore. */
2086
2087 if (hs->got_entries == NULL)
2088 hs->got_entries = hi->got_entries;
2089 else
2090 {
2091 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2092
2093 gsh = hs->got_entries;
2094 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2095 {
a7519a3c
RH
2096 gin = gi->next;
2097 for (gs = gsh; gs ; gs = gs->next)
2098 if (gi->gotobj == gs->gotobj
2099 && gi->reloc_type == gs->reloc_type
2100 && gi->addend == gs->addend)
2101 {
2102 gi->use_count += gs->use_count;
2103 goto got_found;
2104 }
2105 gi->next = hs->got_entries;
2106 hs->got_entries = gi;
2107 got_found:;
252b5132 2108 }
a7519a3c
RH
2109 }
2110 hi->got_entries = NULL;
252b5132 2111
a7519a3c
RH
2112 /* And similar for the reloc entries. */
2113
2114 if (hs->reloc_entries == NULL)
2115 hs->reloc_entries = hi->reloc_entries;
2116 else
2117 {
2118 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2119
2120 rsh = hs->reloc_entries;
2121 for (ri = hi->reloc_entries; ri ; ri = rin)
2122 {
2123 rin = ri->next;
2124 for (rs = rsh; rs ; rs = rs->next)
2125 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2126 {
2127 rs->count += ri->count;
2128 goto found_reloc;
2129 }
2130 ri->next = hs->reloc_entries;
2131 hs->reloc_entries = ri;
2132 found_reloc:;
2133 }
252b5132 2134 }
a7519a3c 2135 hi->reloc_entries = NULL;
252b5132 2136
b34976b6 2137 return TRUE;
252b5132
RH
2138}
2139
a7519a3c 2140/* Is it possible to merge two object file's .got tables? */
252b5132 2141
b34976b6 2142static bfd_boolean
a7519a3c 2143elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2144{
a7519a3c
RH
2145 int total = alpha_elf_tdata (a)->total_got_size;
2146 bfd *bsub;
252b5132 2147
a7519a3c
RH
2148 /* Trivial quick fallout test. */
2149 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2150 return TRUE;
252b5132 2151
a7519a3c
RH
2152 /* By their nature, local .got entries cannot be merged. */
2153 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2154 return FALSE;
252b5132 2155
a7519a3c
RH
2156 /* Failing the common trivial comparison, we must effectively
2157 perform the merge. Not actually performing the merge means that
2158 we don't have to store undo information in case we fail. */
2159 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2160 {
2161 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2162 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2163 int i, n;
2164
2165 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2166 for (i = 0; i < n; ++i)
2167 {
2168 struct alpha_elf_got_entry *ae, *be;
2169 struct alpha_elf_link_hash_entry *h;
2170
2171 h = hashes[i];
2172 while (h->root.root.type == bfd_link_hash_indirect
2173 || h->root.root.type == bfd_link_hash_warning)
2174 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2175
2176 for (be = h->got_entries; be ; be = be->next)
2177 {
2178 if (be->use_count == 0)
2179 continue;
2180 if (be->gotobj != b)
2181 continue;
2182
2183 for (ae = h->got_entries; ae ; ae = ae->next)
2184 if (ae->gotobj == a
2185 && ae->reloc_type == be->reloc_type
2186 && ae->addend == be->addend)
2187 goto global_found;
2188
2189 total += alpha_got_entry_size (be->reloc_type);
2190 if (total > MAX_GOT_SIZE)
2191 return FALSE;
2192 global_found:;
2193 }
2194 }
2195 }
252b5132 2196
b34976b6 2197 return TRUE;
252b5132
RH
2198}
2199
a7519a3c 2200/* Actually merge two .got tables. */
252b5132 2201
a7519a3c
RH
2202static void
2203elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2204{
a7519a3c
RH
2205 int total = alpha_elf_tdata (a)->total_got_size;
2206 bfd *bsub;
252b5132 2207
a7519a3c
RH
2208 /* Remember local expansion. */
2209 {
2210 int e = alpha_elf_tdata (b)->local_got_size;
2211 total += e;
2212 alpha_elf_tdata (a)->local_got_size += e;
2213 }
252b5132 2214
a7519a3c
RH
2215 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2216 {
2217 struct alpha_elf_got_entry **local_got_entries;
2218 struct alpha_elf_link_hash_entry **hashes;
2219 Elf_Internal_Shdr *symtab_hdr;
2220 int i, n;
252b5132 2221
a7519a3c
RH
2222 /* Let the local .got entries know they are part of a new subsegment. */
2223 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2224 if (local_got_entries)
2225 {
2226 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2227 for (i = 0; i < n; ++i)
2228 {
2229 struct alpha_elf_got_entry *ent;
2230 for (ent = local_got_entries[i]; ent; ent = ent->next)
2231 ent->gotobj = a;
2232 }
2233 }
252b5132 2234
a7519a3c
RH
2235 /* Merge the global .got entries. */
2236 hashes = alpha_elf_sym_hashes (bsub);
2237 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2238
a7519a3c
RH
2239 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2240 for (i = 0; i < n; ++i)
2241 {
2242 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2243 struct alpha_elf_link_hash_entry *h;
252b5132 2244
a7519a3c
RH
2245 h = hashes[i];
2246 while (h->root.root.type == bfd_link_hash_indirect
2247 || h->root.root.type == bfd_link_hash_warning)
2248 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2249
a7519a3c
RH
2250 pbe = start = &h->got_entries;
2251 while ((be = *pbe) != NULL)
2252 {
2253 if (be->use_count == 0)
2254 {
2255 *pbe = be->next;
2256 memset (be, 0xa5, sizeof (*be));
2257 goto kill;
2258 }
2259 if (be->gotobj != b)
2260 goto next;
2261
2262 for (ae = *start; ae ; ae = ae->next)
2263 if (ae->gotobj == a
2264 && ae->reloc_type == be->reloc_type
2265 && ae->addend == be->addend)
2266 {
2267 ae->flags |= be->flags;
2268 ae->use_count += be->use_count;
2269 *pbe = be->next;
2270 memset (be, 0xa5, sizeof (*be));
2271 goto kill;
2272 }
2273 be->gotobj = a;
2274 total += alpha_got_entry_size (be->reloc_type);
252b5132 2275
a7519a3c
RH
2276 next:;
2277 pbe = &be->next;
2278 kill:;
2279 }
2280 }
252b5132 2281
a7519a3c
RH
2282 alpha_elf_tdata (bsub)->gotobj = a;
2283 }
2284 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2285
a7519a3c
RH
2286 /* Merge the two in_got chains. */
2287 {
2288 bfd *next;
252b5132 2289
a7519a3c
RH
2290 bsub = a;
2291 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2292 bsub = next;
252b5132 2293
a7519a3c
RH
2294 alpha_elf_tdata (bsub)->in_got_link_next = b;
2295 }
252b5132 2296}
a7519a3c
RH
2297
2298/* Calculate the offsets for the got entries. */
252b5132 2299
b34976b6 2300static bfd_boolean
a7519a3c
RH
2301elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2302 PTR arg ATTRIBUTE_UNUSED)
252b5132 2303{
a7519a3c 2304 struct alpha_elf_got_entry *gotent;
252b5132 2305
a7519a3c
RH
2306 if (h->root.root.type == bfd_link_hash_warning)
2307 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
252b5132 2308
a7519a3c
RH
2309 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2310 if (gotent->use_count > 0)
2311 {
2312 struct alpha_elf_obj_tdata *td;
2313 bfd_size_type *plge;
252b5132 2314
a7519a3c 2315 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2316 plge = &td->got->size;
2317 gotent->got_offset = *plge;
2318 *plge += alpha_got_entry_size (gotent->reloc_type);
2319 }
252b5132 2320
6ec7057a 2321 return TRUE;
a7519a3c 2322}
252b5132 2323
a7519a3c
RH
2324static void
2325elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2326{
4dfe6ac6
NC
2327 bfd *i, *got_list;
2328 struct alpha_elf_link_hash_table * htab;
2329
2330 htab = alpha_elf_hash_table (info);
2331 if (htab == NULL)
2332 return;
2333 got_list = htab->got_list;
252b5132 2334
a7519a3c
RH
2335 /* First, zero out the .got sizes, as we may be recalculating the
2336 .got after optimizing it. */
2337 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2338 alpha_elf_tdata(i)->got->size = 0;
252b5132 2339
a7519a3c 2340 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2341 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2342 elf64_alpha_calc_got_offsets_for_symbol,
2343 NULL);
252b5132 2344
a7519a3c
RH
2345 /* Finally, fill in the offsets for the local entries. */
2346 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2347 {
2348 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2349 bfd *j;
252b5132 2350
a7519a3c
RH
2351 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2352 {
2353 struct alpha_elf_got_entry **local_got_entries, *gotent;
2354 int k, n;
252b5132 2355
a7519a3c
RH
2356 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2357 if (!local_got_entries)
2358 continue;
252b5132 2359
a7519a3c
RH
2360 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2361 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2362 if (gotent->use_count > 0)
2363 {
2364 gotent->got_offset = got_offset;
2365 got_offset += alpha_got_entry_size (gotent->reloc_type);
2366 }
2367 }
252b5132 2368
a7519a3c
RH
2369 alpha_elf_tdata(i)->got->size = got_offset;
2370 }
2371}
252b5132 2372
a7519a3c 2373/* Constructs the gots. */
252b5132 2374
b34976b6 2375static bfd_boolean
a7519a3c 2376elf64_alpha_size_got_sections (struct bfd_link_info *info)
252b5132 2377{
a7519a3c 2378 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2379 struct alpha_elf_link_hash_table * htab;
252b5132 2380
4dfe6ac6
NC
2381 htab = alpha_elf_hash_table (info);
2382 if (htab == NULL)
2383 return FALSE;
2384 got_list = htab->got_list;
95404643 2385
a7519a3c
RH
2386 /* On the first time through, pretend we have an existing got list
2387 consisting of all of the input files. */
2388 if (got_list == NULL)
252b5132 2389 {
a7519a3c 2390 for (i = info->input_bfds; i ; i = i->link_next)
252b5132 2391 {
0ffa91dd
NC
2392 bfd *this_got;
2393
2394 if (! is_alpha_elf (i))
2395 continue;
2396
2397 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2398 if (this_got == NULL)
2399 continue;
252b5132 2400
a7519a3c
RH
2401 /* We are assuming no merging has yet occurred. */
2402 BFD_ASSERT (this_got == i);
252b5132 2403
a7519a3c 2404 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2405 {
a7519a3c
RH
2406 /* Yikes! A single object file has too many entries. */
2407 (*_bfd_error_handler)
2408 (_("%B: .got subsegment exceeds 64K (size %d)"),
2409 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2410 return FALSE;
252b5132 2411 }
252b5132 2412
a7519a3c
RH
2413 if (got_list == NULL)
2414 got_list = this_got;
2415 else
2416 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2417 cur_got_obj = this_got;
252b5132
RH
2418 }
2419
a7519a3c
RH
2420 /* Strange degenerate case of no got references. */
2421 if (got_list == NULL)
2422 return TRUE;
2423
4dfe6ac6 2424 htab->got_list = got_list;
a7519a3c
RH
2425 }
2426
2427 cur_got_obj = got_list;
0ffa91dd
NC
2428 if (cur_got_obj == NULL)
2429 return FALSE;
2430
a7519a3c
RH
2431 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2432 while (i != NULL)
2433 {
2434 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
252b5132 2435 {
a7519a3c 2436 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2437
a7519a3c
RH
2438 alpha_elf_tdata(i)->got->size = 0;
2439 i = alpha_elf_tdata(i)->got_link_next;
2440 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
a7519a3c
RH
2441 }
2442 else
2443 {
2444 cur_got_obj = i;
2445 i = alpha_elf_tdata(i)->got_link_next;
2446 }
252b5132
RH
2447 }
2448
a7519a3c
RH
2449 /* Once the gots have been merged, fill in the got offsets for
2450 everything therein. */
4a828aab 2451 elf64_alpha_calc_got_offsets (info);
252b5132 2452
a7519a3c 2453 return TRUE;
252b5132 2454}
252b5132 2455
b34976b6 2456static bfd_boolean
a7519a3c 2457elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h, PTR data)
252b5132 2458{
a7519a3c
RH
2459 asection *splt = (asection *) data;
2460 struct alpha_elf_got_entry *gotent;
6ec7057a 2461 bfd_boolean saw_one = FALSE;
252b5132 2462
a7519a3c
RH
2463 /* If we didn't need an entry before, we still don't. */
2464 if (!h->root.needs_plt)
2465 return TRUE;
e92d460e 2466
6ec7057a 2467 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2468 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2469 if (gotent->reloc_type == R_ALPHA_LITERAL
2470 && gotent->use_count > 0)
6ec7057a
RH
2471 {
2472 if (splt->size == 0)
2473 splt->size = PLT_HEADER_SIZE;
2474 gotent->plt_offset = splt->size;
2475 splt->size += PLT_ENTRY_SIZE;
2476 saw_one = TRUE;
2477 }
a7519a3c 2478
6ec7057a
RH
2479 /* If there weren't any, there's no longer a need for the PLT entry. */
2480 if (!saw_one)
2481 h->root.needs_plt = FALSE;
a7519a3c
RH
2482
2483 return TRUE;
2484}
2485
4a828aab
RH
2486/* Called from relax_section to rebuild the PLT in light of potential changes
2487 in the function's status. */
a7519a3c 2488
4a828aab 2489static void
a7519a3c
RH
2490elf64_alpha_size_plt_section (struct bfd_link_info *info)
2491{
6ec7057a 2492 asection *splt, *spltrel, *sgotplt;
a7519a3c
RH
2493 unsigned long entries;
2494 bfd *dynobj;
4dfe6ac6
NC
2495 struct alpha_elf_link_hash_table * htab;
2496
2497 htab = alpha_elf_hash_table (info);
2498 if (htab == NULL)
2499 return;
a7519a3c
RH
2500
2501 dynobj = elf_hash_table(info)->dynobj;
6ec7057a 2502 splt = bfd_get_section_by_name (dynobj, ".plt");
a7519a3c 2503 if (splt == NULL)
4a828aab 2504 return;
252b5132 2505
a7519a3c 2506 splt->size = 0;
252b5132 2507
4dfe6ac6 2508 alpha_elf_link_hash_traverse (htab,
a7519a3c 2509 elf64_alpha_size_plt_section_1, splt);
e92d460e 2510
a7519a3c
RH
2511 /* Every plt entry requires a JMP_SLOT relocation. */
2512 spltrel = bfd_get_section_by_name (dynobj, ".rela.plt");
4a828aab 2513 entries = 0;
a7519a3c 2514 if (splt->size)
6ec7057a
RH
2515 {
2516 if (elf64_alpha_use_secureplt)
2517 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2518 else
2519 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2520 }
a7519a3c 2521 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2522
6ec7057a
RH
2523 /* When using the secureplt, we need two words somewhere in the data
2524 segment for the dynamic linker to tell us where to go. This is the
2525 entire contents of the .got.plt section. */
2526 if (elf64_alpha_use_secureplt)
2527 {
2528 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
2529 sgotplt->size = entries ? 16 : 0;
2530 }
a7519a3c 2531}
e92d460e 2532
a7519a3c
RH
2533static bfd_boolean
2534elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2535 struct bfd_link_info *info)
2536{
2537 bfd *i;
4dfe6ac6 2538 struct alpha_elf_link_hash_table * htab;
252b5132 2539
a7519a3c
RH
2540 if (info->relocatable)
2541 return TRUE;
252b5132 2542
4dfe6ac6
NC
2543 htab = alpha_elf_hash_table (info);
2544 if (htab == NULL)
2545 return FALSE;
2546
a7519a3c 2547 /* First, take care of the indirect symbols created by versioning. */
4dfe6ac6 2548 alpha_elf_link_hash_traverse (htab, elf64_alpha_merge_ind_symbols,
a7519a3c 2549 NULL);
252b5132 2550
a7519a3c
RH
2551 if (!elf64_alpha_size_got_sections (info))
2552 return FALSE;
252b5132 2553
a7519a3c 2554 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2555 i = htab->got_list;
a7519a3c 2556 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2557 {
a7519a3c
RH
2558 asection *s = alpha_elf_tdata(i)->got;
2559 if (s->size > 0)
2560 {
2561 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2562 if (s->contents == NULL)
2563 return FALSE;
2564 }
252b5132
RH
2565 }
2566
b34976b6 2567 return TRUE;
252b5132 2568}
3765b1be 2569
a7519a3c 2570/* The number of dynamic relocations required by a static relocation. */
3765b1be 2571
a7519a3c
RH
2572static int
2573alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared)
2574{
2575 switch (r_type)
3765b1be 2576 {
a7519a3c
RH
2577 /* May appear in GOT entries. */
2578 case R_ALPHA_TLSGD:
2579 return (dynamic ? 2 : shared ? 1 : 0);
2580 case R_ALPHA_TLSLDM:
2581 return shared;
2582 case R_ALPHA_LITERAL:
2583 case R_ALPHA_GOTTPREL:
2584 return dynamic || shared;
2585 case R_ALPHA_GOTDTPREL:
2586 return dynamic;
3765b1be 2587
a7519a3c
RH
2588 /* May appear in data sections. */
2589 case R_ALPHA_REFLONG:
2590 case R_ALPHA_REFQUAD:
2591 case R_ALPHA_TPREL64:
2592 return dynamic || shared;
3765b1be 2593
a7519a3c
RH
2594 /* Everything else is illegal. We'll issue an error during
2595 relocate_section. */
2596 default:
2597 return 0;
2598 }
2599}
3765b1be 2600
a7519a3c 2601/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2602
a7519a3c
RH
2603static bfd_boolean
2604elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2605 struct bfd_link_info *info)
2606{
2607 bfd_boolean dynamic;
2608 struct alpha_elf_reloc_entry *relent;
2609 unsigned long entries;
3765b1be 2610
a7519a3c
RH
2611 if (h->root.root.type == bfd_link_hash_warning)
2612 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
3765b1be 2613
a7519a3c
RH
2614 /* If the symbol was defined as a common symbol in a regular object
2615 file, and there was no definition in any dynamic object, then the
2616 linker will have allocated space for the symbol in a common
2617 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2618 set. This is done for dynamic symbols in
2619 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2620 symbols, somehow. */
2621 if (!h->root.def_regular
2622 && h->root.ref_regular
2623 && !h->root.def_dynamic
2624 && (h->root.root.type == bfd_link_hash_defined
2625 || h->root.root.type == bfd_link_hash_defweak)
2626 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2627 h->root.def_regular = 1;
3765b1be 2628
a7519a3c
RH
2629 /* If the symbol is dynamic, we'll need all the relocations in their
2630 natural form. If this is a shared object, and it has been forced
2631 local, we'll need the same number of RELATIVE relocations. */
2632 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2633
a7519a3c
RH
2634 /* If the symbol is a hidden undefined weak, then we never have any
2635 relocations. Avoid the loop which may want to add RELATIVE relocs
2636 based on info->shared. */
2637 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2638 return TRUE;
2639
2640 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2641 {
a7519a3c
RH
2642 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
2643 info->shared);
2644 if (entries)
2645 {
2646 relent->srel->size +=
2647 entries * sizeof (Elf64_External_Rela) * relent->count;
2648 if (relent->reltext)
2649 info->flags |= DT_TEXTREL;
2650 }
2651 }
3765b1be 2652
a7519a3c
RH
2653 return TRUE;
2654}
3765b1be 2655
a7519a3c
RH
2656/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2657 global symbols. */
3765b1be 2658
a7519a3c
RH
2659static bfd_boolean
2660elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2661 struct bfd_link_info *info)
2662{
2663 bfd_boolean dynamic;
2664 struct alpha_elf_got_entry *gotent;
2665 unsigned long entries;
3765b1be 2666
a7519a3c
RH
2667 if (h->root.root.type == bfd_link_hash_warning)
2668 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
2669
6ec7057a
RH
2670 /* If we're using a plt for this symbol, then all of its relocations
2671 for its got entries go into .rela.plt. */
2672 if (h->root.needs_plt)
2673 return TRUE;
2674
a7519a3c
RH
2675 /* If the symbol is dynamic, we'll need all the relocations in their
2676 natural form. If this is a shared object, and it has been forced
2677 local, we'll need the same number of RELATIVE relocations. */
2678 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2679
2680 /* If the symbol is a hidden undefined weak, then we never have any
2681 relocations. Avoid the loop which may want to add RELATIVE relocs
2682 based on info->shared. */
2683 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2684 return TRUE;
2685
2686 entries = 0;
2687 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2688 if (gotent->use_count > 0)
2689 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type,
2690 dynamic, info->shared);
2691
a7519a3c
RH
2692 if (entries > 0)
2693 {
2694 bfd *dynobj = elf_hash_table(info)->dynobj;
2695 asection *srel = bfd_get_section_by_name (dynobj, ".rela.got");
2696 BFD_ASSERT (srel != NULL);
2697 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2698 }
3765b1be 2699
a7519a3c 2700 return TRUE;
3765b1be
RH
2701}
2702
a7519a3c 2703/* Set the sizes of the dynamic relocation sections. */
252b5132 2704
4a828aab 2705static void
a7519a3c 2706elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2707{
a7519a3c
RH
2708 unsigned long entries;
2709 bfd *i, *dynobj;
2710 asection *srel;
4dfe6ac6
NC
2711 struct alpha_elf_link_hash_table * htab;
2712
2713 htab = alpha_elf_hash_table (info);
2714 if (htab == NULL)
2715 return;
252b5132 2716
a7519a3c
RH
2717 /* Shared libraries often require RELATIVE relocs, and some relocs
2718 require attention for the main application as well. */
252b5132 2719
a7519a3c 2720 entries = 0;
4dfe6ac6 2721 for (i = htab->got_list;
a7519a3c
RH
2722 i ; i = alpha_elf_tdata(i)->got_link_next)
2723 {
2724 bfd *j;
3241278a 2725
a7519a3c
RH
2726 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2727 {
2728 struct alpha_elf_got_entry **local_got_entries, *gotent;
2729 int k, n;
252b5132 2730
a7519a3c
RH
2731 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2732 if (!local_got_entries)
2733 continue;
252b5132 2734
a7519a3c
RH
2735 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2736 for (gotent = local_got_entries[k];
2737 gotent ; gotent = gotent->next)
2738 if (gotent->use_count > 0)
2739 entries += (alpha_dynamic_entries_for_reloc
2740 (gotent->reloc_type, 0, info->shared));
2741 }
2742 }
3765b1be 2743
a7519a3c
RH
2744 dynobj = elf_hash_table(info)->dynobj;
2745 srel = bfd_get_section_by_name (dynobj, ".rela.got");
2746 if (!srel)
2747 {
2748 BFD_ASSERT (entries == 0);
4a828aab 2749 return;
a7519a3c
RH
2750 }
2751 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2752
a7519a3c 2753 /* Now do the non-local symbols. */
4dfe6ac6 2754 alpha_elf_link_hash_traverse (htab,
a7519a3c 2755 elf64_alpha_size_rela_got_1, info);
a7519a3c 2756}
252b5132 2757
a7519a3c 2758/* Set the sizes of the dynamic sections. */
3765b1be 2759
a7519a3c
RH
2760static bfd_boolean
2761elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2762 struct bfd_link_info *info)
2763{
2764 bfd *dynobj;
2765 asection *s;
2766 bfd_boolean relplt;
4dfe6ac6
NC
2767 struct alpha_elf_link_hash_table * htab;
2768
2769 htab = alpha_elf_hash_table (info);
2770 if (htab == NULL)
2771 return FALSE;
3765b1be 2772
a7519a3c
RH
2773 dynobj = elf_hash_table(info)->dynobj;
2774 BFD_ASSERT(dynobj != NULL);
252b5132 2775
a7519a3c
RH
2776 if (elf_hash_table (info)->dynamic_sections_created)
2777 {
2778 /* Set the contents of the .interp section to the interpreter. */
2779 if (info->executable)
252b5132 2780 {
a7519a3c
RH
2781 s = bfd_get_section_by_name (dynobj, ".interp");
2782 BFD_ASSERT (s != NULL);
2783 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2784 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2785 }
3765b1be 2786
a7519a3c
RH
2787 /* Now that we've seen all of the input files, we can decide which
2788 symbols need dynamic relocation entries and which don't. We've
2789 collected information in check_relocs that we can now apply to
2790 size the dynamic relocation sections. */
4dfe6ac6 2791 alpha_elf_link_hash_traverse (htab,
a7519a3c 2792 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2793
a7519a3c 2794 elf64_alpha_size_rela_got_section (info);
6ec7057a 2795 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2796 }
2797 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2798
a7519a3c
RH
2799 /* The check_relocs and adjust_dynamic_symbol entry points have
2800 determined the sizes of the various dynamic sections. Allocate
2801 memory for them. */
2802 relplt = FALSE;
2803 for (s = dynobj->sections; s != NULL; s = s->next)
2804 {
2805 const char *name;
3765b1be 2806
a7519a3c
RH
2807 if (!(s->flags & SEC_LINKER_CREATED))
2808 continue;
cc03ec80 2809
a7519a3c
RH
2810 /* It's OK to base decisions on the section name, because none
2811 of the dynobj section names depend upon the input files. */
2812 name = bfd_get_section_name (dynobj, s);
3765b1be 2813
0112cd26 2814 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2815 {
c456f082 2816 if (s->size != 0)
a7519a3c 2817 {
c456f082 2818 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2819 relplt = TRUE;
252b5132 2820
a7519a3c
RH
2821 /* We use the reloc_count field as a counter if we need
2822 to copy relocs into the output file. */
2823 s->reloc_count = 0;
252b5132 2824 }
3765b1be 2825 }
0112cd26 2826 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2827 && strcmp (name, ".plt") != 0
2828 && strcmp (name, ".dynbss") != 0)
3765b1be 2829 {
a7519a3c
RH
2830 /* It's not one of our dynamic sections, so don't allocate space. */
2831 continue;
2832 }
252b5132 2833
c456f082
AM
2834 if (s->size == 0)
2835 {
2836 /* If we don't need this section, strip it from the output file.
2837 This is to handle .rela.bss and .rela.plt. We must create it
2838 in create_dynamic_sections, because it must be created before
2839 the linker maps input sections to output sections. The
2840 linker does that before adjust_dynamic_symbol is called, and
2841 it is that function which decides whether anything needs to
2842 go into these sections. */
2843 s->flags |= SEC_EXCLUDE;
2844 }
2845 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2846 {
2847 /* Allocate memory for the section contents. */
2848 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2849 if (s->contents == NULL)
b34976b6 2850 return FALSE;
a7519a3c
RH
2851 }
2852 }
3765b1be 2853
a7519a3c
RH
2854 if (elf_hash_table (info)->dynamic_sections_created)
2855 {
2856 /* Add some entries to the .dynamic section. We fill in the
2857 values later, in elf64_alpha_finish_dynamic_sections, but we
2858 must add the entries now so that we get the correct size for
2859 the .dynamic section. The DT_DEBUG entry is filled in by the
2860 dynamic linker and used by the debugger. */
2861#define add_dynamic_entry(TAG, VAL) \
2862 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2863
a7519a3c
RH
2864 if (info->executable)
2865 {
2866 if (!add_dynamic_entry (DT_DEBUG, 0))
2867 return FALSE;
3765b1be
RH
2868 }
2869
a7519a3c 2870 if (relplt)
3765b1be 2871 {
a7519a3c
RH
2872 if (!add_dynamic_entry (DT_PLTGOT, 0)
2873 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2874 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2875 || !add_dynamic_entry (DT_JMPREL, 0))
2876 return FALSE;
6ec7057a
RH
2877
2878 if (elf64_alpha_use_secureplt
2879 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2880 return FALSE;
a7519a3c 2881 }
252b5132 2882
a7519a3c
RH
2883 if (!add_dynamic_entry (DT_RELA, 0)
2884 || !add_dynamic_entry (DT_RELASZ, 0)
2885 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2886 return FALSE;
2887
2888 if (info->flags & DF_TEXTREL)
2889 {
2890 if (!add_dynamic_entry (DT_TEXTREL, 0))
2891 return FALSE;
252b5132
RH
2892 }
2893 }
a7519a3c 2894#undef add_dynamic_entry
252b5132 2895
b34976b6 2896 return TRUE;
252b5132 2897}
a7519a3c
RH
2898\f
2899/* These functions do relaxation for Alpha ELF.
252b5132 2900
a7519a3c
RH
2901 Currently I'm only handling what I can do with existing compiler
2902 and assembler support, which means no instructions are removed,
2903 though some may be nopped. At this time GCC does not emit enough
2904 information to do all of the relaxing that is possible. It will
2905 take some not small amount of work for that to happen.
252b5132 2906
a7519a3c
RH
2907 There are a couple of interesting papers that I once read on this
2908 subject, that I cannot find references to at the moment, that
2909 related to Alpha in particular. They are by David Wall, then of
2910 DEC WRL. */
252b5132 2911
a7519a3c
RH
2912struct alpha_relax_info
2913{
2914 bfd *abfd;
2915 asection *sec;
2916 bfd_byte *contents;
2917 Elf_Internal_Shdr *symtab_hdr;
2918 Elf_Internal_Rela *relocs, *relend;
2919 struct bfd_link_info *link_info;
2920 bfd_vma gp;
2921 bfd *gotobj;
2922 asection *tsec;
2923 struct alpha_elf_link_hash_entry *h;
2924 struct alpha_elf_got_entry **first_gotent;
2925 struct alpha_elf_got_entry *gotent;
2926 bfd_boolean changed_contents;
2927 bfd_boolean changed_relocs;
2928 unsigned char other;
2929};
252b5132 2930
a7519a3c
RH
2931static Elf_Internal_Rela *
2932elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2933 Elf_Internal_Rela *relend,
2934 bfd_vma offset, int type)
2935{
2936 while (rel < relend)
252b5132 2937 {
a7519a3c
RH
2938 if (rel->r_offset == offset
2939 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2940 return rel;
2941 ++rel;
2942 }
2943 return NULL;
2944}
252b5132 2945
a7519a3c
RH
2946static bfd_boolean
2947elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
2948 Elf_Internal_Rela *irel, unsigned long r_type)
2949{
2950 unsigned int insn;
2951 bfd_signed_vma disp;
252b5132 2952
a7519a3c
RH
2953 /* Get the instruction. */
2954 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 2955
a7519a3c
RH
2956 if (insn >> 26 != OP_LDQ)
2957 {
2958 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
2959 ((*_bfd_error_handler)
2960 ("%B: %A+0x%lx: warning: %s relocation against unexpected insn",
2961 info->abfd, info->sec,
2962 (unsigned long) irel->r_offset, howto->name));
2963 return TRUE;
2964 }
252b5132 2965
a7519a3c
RH
2966 /* Can't relax dynamic symbols. */
2967 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
2968 return TRUE;
252b5132 2969
a7519a3c
RH
2970 /* Can't use local-exec relocations in shared libraries. */
2971 if (r_type == R_ALPHA_GOTTPREL && info->link_info->shared)
2972 return TRUE;
252b5132 2973
a7519a3c
RH
2974 if (r_type == R_ALPHA_LITERAL)
2975 {
2976 /* Look for nice constant addresses. This includes the not-uncommon
2977 special case of 0 for undefweak symbols. */
2978 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
2979 || (!info->link_info->shared
2980 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
2981 {
2982 disp = 0;
2983 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
2984 insn |= (symval & 0xffff);
2985 r_type = R_ALPHA_NONE;
2986 }
2987 else
2988 {
2989 disp = symval - info->gp;
2990 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
2991 r_type = R_ALPHA_GPREL16;
2992 }
252b5132
RH
2993 }
2994 else
252b5132 2995 {
a7519a3c 2996 bfd_vma dtp_base, tp_base;
252b5132 2997
a7519a3c
RH
2998 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
2999 dtp_base = alpha_get_dtprel_base (info->link_info);
3000 tp_base = alpha_get_tprel_base (info->link_info);
3001 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3002
a7519a3c 3003 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3004
a7519a3c
RH
3005 switch (r_type)
3006 {
3007 case R_ALPHA_GOTDTPREL:
3008 r_type = R_ALPHA_DTPREL16;
3009 break;
3010 case R_ALPHA_GOTTPREL:
3011 r_type = R_ALPHA_TPREL16;
3012 break;
3013 default:
3014 BFD_ASSERT (0);
3015 return FALSE;
3016 }
3017 }
252b5132 3018
a7519a3c 3019 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3020 return TRUE;
252b5132 3021
a7519a3c
RH
3022 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3023 info->changed_contents = TRUE;
252b5132 3024
a7519a3c
RH
3025 /* Reduce the use count on this got entry by one, possibly
3026 eliminating it. */
3027 if (--info->gotent->use_count == 0)
252b5132 3028 {
a7519a3c
RH
3029 int sz = alpha_got_entry_size (r_type);
3030 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3031 if (!info->h)
3032 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3033 }
252b5132 3034
a7519a3c
RH
3035 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3036 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3037 info->changed_relocs = TRUE;
3038
3039 /* ??? Search forward through this basic block looking for insns
3040 that use the target register. Stop after an insn modifying the
3041 register is seen, or after a branch or call.
252b5132 3042
a7519a3c
RH
3043 Any such memory load insn may be substituted by a load directly
3044 off the GP. This allows the memory load insn to be issued before
3045 the calculated GP register would otherwise be ready.
252b5132 3046
a7519a3c
RH
3047 Any such jsr insn can be replaced by a bsr if it is in range.
3048
3049 This would mean that we'd have to _add_ relocations, the pain of
3050 which gives one pause. */
252b5132 3051
b34976b6 3052 return TRUE;
252b5132
RH
3053}
3054
a7519a3c
RH
3055static bfd_vma
3056elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3057{
a7519a3c
RH
3058 /* If the function has the same gp, and we can identify that the
3059 function does not use its function pointer, we can eliminate the
3060 address load. */
252b5132 3061
a7519a3c
RH
3062 /* If the symbol is marked NOPV, we are being told the function never
3063 needs its procedure value. */
3064 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3065 return symval;
252b5132 3066
a7519a3c
RH
3067 /* If the symbol is marked STD_GP, we are being told the function does
3068 a normal ldgp in the first two words. */
3069 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3070 ;
252b5132 3071
a7519a3c
RH
3072 /* Otherwise, we may be able to identify a GP load in the first two
3073 words, which we can then skip. */
3074 else
252b5132 3075 {
a7519a3c
RH
3076 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3077 bfd_vma ofs;
252b5132 3078
a7519a3c
RH
3079 /* Load the relocations from the section that the target symbol is in. */
3080 if (info->sec == info->tsec)
252b5132 3081 {
a7519a3c
RH
3082 tsec_relocs = info->relocs;
3083 tsec_relend = info->relend;
3084 tsec_free = NULL;
3085 }
3086 else
3087 {
3088 tsec_relocs = (_bfd_elf_link_read_relocs
3089 (info->abfd, info->tsec, (PTR) NULL,
3090 (Elf_Internal_Rela *) NULL,
3091 info->link_info->keep_memory));
3092 if (tsec_relocs == NULL)
3093 return 0;
3094 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3095 tsec_free = (info->link_info->keep_memory ? NULL : tsec_relocs);
3096 }
252b5132 3097
a7519a3c
RH
3098 /* Recover the symbol's offset within the section. */
3099 ofs = (symval - info->tsec->output_section->vma
3100 - info->tsec->output_offset);
252b5132 3101
a7519a3c
RH
3102 /* Look for a GPDISP reloc. */
3103 gpdisp = (elf64_alpha_find_reloc_at_ofs
3104 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3105
a7519a3c
RH
3106 if (!gpdisp || gpdisp->r_addend != 4)
3107 {
3108 if (tsec_free)
3109 free (tsec_free);
3110 return 0;
252b5132 3111 }
a7519a3c
RH
3112 if (tsec_free)
3113 free (tsec_free);
252b5132
RH
3114 }
3115
a7519a3c
RH
3116 /* We've now determined that we can skip an initial gp load. Verify
3117 that the call and the target use the same gp. */
f13a99db 3118 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3119 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3120 return 0;
252b5132 3121
a7519a3c
RH
3122 return symval + 8;
3123}
252b5132 3124
a7519a3c
RH
3125static bfd_boolean
3126elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3127 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3128{
a7519a3c
RH
3129 Elf_Internal_Rela *urel, *irelend = info->relend;
3130 int flags, count, i;
3131 bfd_signed_vma disp;
3132 bfd_boolean fits16;
3133 bfd_boolean fits32;
3134 bfd_boolean lit_reused = FALSE;
3135 bfd_boolean all_optimized = TRUE;
3136 unsigned int lit_insn;
252b5132 3137
a7519a3c
RH
3138 lit_insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
3139 if (lit_insn >> 26 != OP_LDQ)
3140 {
3141 ((*_bfd_error_handler)
3142 ("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn",
3143 info->abfd, info->sec,
3144 (unsigned long) irel->r_offset));
3145 return TRUE;
3146 }
252b5132 3147
a7519a3c
RH
3148 /* Can't relax dynamic symbols. */
3149 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3150 return TRUE;
3151
3152 /* Summarize how this particular LITERAL is used. */
3153 for (urel = irel+1, flags = count = 0; urel < irelend; ++urel, ++count)
252b5132 3154 {
a7519a3c
RH
3155 if (ELF64_R_TYPE (urel->r_info) != R_ALPHA_LITUSE)
3156 break;
8288a39e 3157 if (urel->r_addend <= 6)
a7519a3c
RH
3158 flags |= 1 << urel->r_addend;
3159 }
252b5132 3160
a7519a3c
RH
3161 /* A little preparation for the loop... */
3162 disp = symval - info->gp;
252b5132 3163
a7519a3c
RH
3164 for (urel = irel+1, i = 0; i < count; ++i, ++urel)
3165 {
3166 unsigned int insn;
3167 int insn_disp;
3168 bfd_signed_vma xdisp;
252b5132 3169
a7519a3c 3170 insn = bfd_get_32 (info->abfd, info->contents + urel->r_offset);
252b5132 3171
a7519a3c
RH
3172 switch (urel->r_addend)
3173 {
3174 case LITUSE_ALPHA_ADDR:
3175 default:
3176 /* This type is really just a placeholder to note that all
3177 uses cannot be optimized, but to still allow some. */
3178 all_optimized = FALSE;
3179 break;
252b5132 3180
a7519a3c
RH
3181 case LITUSE_ALPHA_BASE:
3182 /* We can always optimize 16-bit displacements. */
252b5132 3183
a7519a3c
RH
3184 /* Extract the displacement from the instruction, sign-extending
3185 it if necessary, then test whether it is within 16 or 32 bits
3186 displacement from GP. */
3187 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3188
3189 xdisp = disp + insn_disp;
3190 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3191 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3192 && xdisp < 0x7fff8000);
3193
3194 if (fits16)
3195 {
3196 /* Take the op code and dest from this insn, take the base
3197 register from the literal insn. Leave the offset alone. */
3198 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
3199 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3200 R_ALPHA_GPREL16);
3201 urel->r_addend = irel->r_addend;
3202 info->changed_relocs = TRUE;
252b5132 3203
a7519a3c
RH
3204 bfd_put_32 (info->abfd, (bfd_vma) insn,
3205 info->contents + urel->r_offset);
3206 info->changed_contents = TRUE;
252b5132 3207 }
252b5132 3208
a7519a3c
RH
3209 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3210 else if (fits32 && !(flags & ~6))
3211 {
3212 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3213
a7519a3c
RH
3214 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3215 R_ALPHA_GPRELHIGH);
3216 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
3217 bfd_put_32 (info->abfd, (bfd_vma) lit_insn,
3218 info->contents + irel->r_offset);
3219 lit_reused = TRUE;
3220 info->changed_contents = TRUE;
252b5132 3221
a7519a3c
RH
3222 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3223 R_ALPHA_GPRELLOW);
3224 urel->r_addend = irel->r_addend;
3225 info->changed_relocs = TRUE;
3226 }
3227 else
3228 all_optimized = FALSE;
3229 break;
252b5132 3230
a7519a3c
RH
3231 case LITUSE_ALPHA_BYTOFF:
3232 /* We can always optimize byte instructions. */
252b5132 3233
a7519a3c
RH
3234 /* FIXME: sanity check the insn for byte op. Check that the
3235 literal dest reg is indeed Rb in the byte insn. */
252b5132 3236
a7519a3c
RH
3237 insn &= ~ (unsigned) 0x001ff000;
3238 insn |= ((symval & 7) << 13) | 0x1000;
252b5132 3239
a7519a3c
RH
3240 urel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3241 urel->r_addend = 0;
3242 info->changed_relocs = TRUE;
e92d460e 3243
a7519a3c
RH
3244 bfd_put_32 (info->abfd, (bfd_vma) insn,
3245 info->contents + urel->r_offset);
3246 info->changed_contents = TRUE;
3247 break;
252b5132 3248
a7519a3c
RH
3249 case LITUSE_ALPHA_JSR:
3250 case LITUSE_ALPHA_TLSGD:
3251 case LITUSE_ALPHA_TLSLDM:
8288a39e 3252 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3253 {
a7519a3c
RH
3254 bfd_vma optdest, org;
3255 bfd_signed_vma odisp;
252b5132 3256
a7519a3c
RH
3257 /* For undefined weak symbols, we're mostly interested in getting
3258 rid of the got entry whenever possible, so optimize this to a
3259 use of the zero register. */
3260 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3261 {
3262 insn |= 31 << 16;
3263 bfd_put_32 (info->abfd, (bfd_vma) insn,
3264 info->contents + urel->r_offset);
252b5132 3265
a7519a3c
RH
3266 info->changed_contents = TRUE;
3267 break;
3268 }
252b5132 3269
a7519a3c
RH
3270 /* If not zero, place to jump without needing pv. */
3271 optdest = elf64_alpha_relax_opt_call (info, symval);
3272 org = (info->sec->output_section->vma
3273 + info->sec->output_offset
3274 + urel->r_offset + 4);
3275 odisp = (optdest ? optdest : symval) - org;
252b5132 3276
a7519a3c
RH
3277 if (odisp >= -0x400000 && odisp < 0x400000)
3278 {
3279 Elf_Internal_Rela *xrel;
252b5132 3280
a7519a3c
RH
3281 /* Preserve branch prediction call stack when possible. */
3282 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3283 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3284 else
3285 insn = (OP_BR << 26) | (insn & 0x03e00000);
252b5132 3286
a7519a3c
RH
3287 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3288 R_ALPHA_BRADDR);
3289 urel->r_addend = irel->r_addend;
252b5132 3290
a7519a3c
RH
3291 if (optdest)
3292 urel->r_addend += optdest - symval;
3293 else
3294 all_optimized = FALSE;
252b5132 3295
a7519a3c
RH
3296 bfd_put_32 (info->abfd, (bfd_vma) insn,
3297 info->contents + urel->r_offset);
252b5132 3298
a7519a3c
RH
3299 /* Kill any HINT reloc that might exist for this insn. */
3300 xrel = (elf64_alpha_find_reloc_at_ofs
3301 (info->relocs, info->relend, urel->r_offset,
3302 R_ALPHA_HINT));
3303 if (xrel)
3304 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3305
a7519a3c
RH
3306 info->changed_contents = TRUE;
3307 info->changed_relocs = TRUE;
3308 }
3309 else
3310 all_optimized = FALSE;
252b5132 3311
a7519a3c
RH
3312 /* Even if the target is not in range for a direct branch,
3313 if we share a GP, we can eliminate the gp reload. */
3314 if (optdest)
3315 {
3316 Elf_Internal_Rela *gpdisp
3317 = (elf64_alpha_find_reloc_at_ofs
3318 (info->relocs, irelend, urel->r_offset + 4,
3319 R_ALPHA_GPDISP));
3320 if (gpdisp)
3321 {
3322 bfd_byte *p_ldah = info->contents + gpdisp->r_offset;
3323 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
3324 unsigned int ldah = bfd_get_32 (info->abfd, p_ldah);
3325 unsigned int lda = bfd_get_32 (info->abfd, p_lda);
252b5132 3326
a7519a3c
RH
3327 /* Verify that the instruction is "ldah $29,0($26)".
3328 Consider a function that ends in a noreturn call,
3329 and that the next function begins with an ldgp,
3330 and that by accident there is no padding between.
3331 In that case the insn would use $27 as the base. */
3332 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3333 {
3334 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_ldah);
3335 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3336
a7519a3c
RH
3337 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3338 info->changed_contents = TRUE;
3339 info->changed_relocs = TRUE;
3340 }
3341 }
3342 }
3343 }
3344 break;
252b5132 3345 }
252b5132
RH
3346 }
3347
a7519a3c
RH
3348 /* If all cases were optimized, we can reduce the use count on this
3349 got entry by one, possibly eliminating it. */
3350 if (all_optimized)
252b5132 3351 {
a7519a3c 3352 if (--info->gotent->use_count == 0)
252b5132 3353 {
a7519a3c
RH
3354 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3355 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3356 if (!info->h)
3357 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3358 }
a7519a3c
RH
3359
3360 /* If the literal instruction is no longer needed (it may have been
3361 reused. We can eliminate it. */
3362 /* ??? For now, I don't want to deal with compacting the section,
3363 so just nop it out. */
3364 if (!lit_reused)
252b5132 3365 {
a7519a3c
RH
3366 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3367 info->changed_relocs = TRUE;
252b5132 3368
a7519a3c
RH
3369 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP,
3370 info->contents + irel->r_offset);
3371 info->changed_contents = TRUE;
3372 }
252b5132 3373
a7519a3c
RH
3374 return TRUE;
3375 }
3376 else
3377 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3378}
3379
b34976b6 3380static bfd_boolean
a7519a3c
RH
3381elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3382 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3383{
a7519a3c 3384 bfd_byte *pos[5];
891caa9b 3385 unsigned int insn, tlsgd_reg;
a7519a3c 3386 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3387 bfd_boolean dynamic, use_gottprel;
a7519a3c 3388 unsigned long new_symndx;
f44f99a5 3389
a7519a3c 3390 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3391
a7519a3c
RH
3392 /* If a TLS symbol is accessed using IE at least once, there is no point
3393 to use dynamic model for it. */
3394 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3395 ;
f44f99a5 3396
a7519a3c
RH
3397 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3398 then we might as well relax to IE. */
3399 else if (info->link_info->shared && !dynamic
3400 && (info->link_info->flags & DF_STATIC_TLS))
3401 ;
f44f99a5 3402
a7519a3c
RH
3403 /* Otherwise we must be building an executable to do anything. */
3404 else if (info->link_info->shared)
3405 return TRUE;
f44f99a5 3406
a7519a3c
RH
3407 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3408 the matching LITUSE_TLS relocations. */
3409 if (irel + 2 >= info->relend)
3410 return TRUE;
3411 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3412 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3413 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3414 return TRUE;
f44f99a5 3415
a7519a3c
RH
3416 /* There must be a GPDISP relocation positioned immediately after the
3417 LITUSE relocation. */
3418 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3419 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3420 if (!gpdisp)
b34976b6 3421 return TRUE;
f44f99a5 3422
a7519a3c
RH
3423 pos[0] = info->contents + irel[0].r_offset;
3424 pos[1] = info->contents + irel[1].r_offset;
3425 pos[2] = info->contents + irel[2].r_offset;
3426 pos[3] = info->contents + gpdisp->r_offset;
3427 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3428
a7519a3c
RH
3429 /* Generally, the positions are not allowed to be out of order, lest the
3430 modified insn sequence have different register lifetimes. We can make
3431 an exception when pos 1 is adjacent to pos 0. */
3432 if (pos[1] + 4 == pos[0])
f44f99a5 3433 {
a7519a3c
RH
3434 bfd_byte *tmp = pos[0];
3435 pos[0] = pos[1];
3436 pos[1] = tmp;
f44f99a5 3437 }
a7519a3c
RH
3438 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3439 return TRUE;
cc03ec80 3440
a7519a3c
RH
3441 /* Reduce the use count on the LITERAL relocation. Do this before we
3442 smash the symndx when we adjust the relocations below. */
3443 {
3444 struct alpha_elf_got_entry *lit_gotent;
3445 struct alpha_elf_link_hash_entry *lit_h;
3446 unsigned long indx;
f44f99a5 3447
a7519a3c
RH
3448 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3449 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3450 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3451
a7519a3c
RH
3452 while (lit_h->root.root.type == bfd_link_hash_indirect
3453 || lit_h->root.root.type == bfd_link_hash_warning)
3454 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3455
a7519a3c
RH
3456 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3457 lit_gotent = lit_gotent->next)
3458 if (lit_gotent->gotobj == info->gotobj
3459 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3460 && lit_gotent->addend == irel[1].r_addend)
3461 break;
3462 BFD_ASSERT (lit_gotent);
252b5132 3463
a7519a3c
RH
3464 if (--lit_gotent->use_count == 0)
3465 {
3466 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3467 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3468 }
3469 }
252b5132 3470
a7519a3c 3471 /* Change
252b5132 3472
a7519a3c
RH
3473 lda $16,x($gp) !tlsgd!1
3474 ldq $27,__tls_get_addr($gp) !literal!1
3475 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3476 ldah $29,0($26) !gpdisp!2
3477 lda $29,0($29) !gpdisp!2
3478 to
3479 ldq $16,x($gp) !gottprel
3480 unop
3481 call_pal rduniq
3482 addq $16,$0,$0
3483 unop
3484 or the first pair to
3485 lda $16,x($gp) !tprel
3486 unop
3487 or
3488 ldah $16,x($gp) !tprelhi
3489 lda $16,x($16) !tprello
3490
3491 as appropriate. */
3492
3493 use_gottprel = FALSE;
3494 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : 0;
891caa9b
RH
3495
3496 /* Beware of the compiler hoisting part of the sequence out a loop
3497 and adjusting the destination register for the TLSGD insn. If this
3498 happens, there will be a move into $16 before the JSR insn, so only
3499 transformations of the first insn pair should use this register. */
3500 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3501 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3502
a7519a3c 3503 switch (!dynamic && !info->link_info->shared)
252b5132 3504 {
a7519a3c
RH
3505 case 1:
3506 {
3507 bfd_vma tp_base;
3508 bfd_signed_vma disp;
252b5132 3509
a7519a3c
RH
3510 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3511 tp_base = alpha_get_tprel_base (info->link_info);
3512 disp = symval - tp_base;
252b5132 3513
a7519a3c
RH
3514 if (disp >= -0x8000 && disp < 0x8000)
3515 {
891caa9b 3516 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3517 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3518 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3519
a7519a3c
RH
3520 irel[0].r_offset = pos[0] - info->contents;
3521 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3522 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3523 break;
3524 }
3525 else if (disp >= -(bfd_signed_vma) 0x80000000
3526 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3527 && pos[0] + 4 == pos[1])
a7519a3c 3528 {
891caa9b 3529 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3530 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3531 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3532 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3533
a7519a3c
RH
3534 irel[0].r_offset = pos[0] - info->contents;
3535 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3536 irel[1].r_offset = pos[1] - info->contents;
3537 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3538 break;
3539 }
3540 }
3541 /* FALLTHRU */
3765b1be 3542
3765b1be 3543 default:
a7519a3c
RH
3544 use_gottprel = TRUE;
3545
891caa9b 3546 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3547 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3548 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3549
3550 irel[0].r_offset = pos[0] - info->contents;
3551 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3552 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3553 break;
3765b1be 3554 }
3765b1be 3555
a7519a3c 3556 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3557
a7519a3c
RH
3558 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3559 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3560
a7519a3c 3561 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3562
a7519a3c
RH
3563 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3564 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3565
a7519a3c
RH
3566 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3567 irel[2].r_offset, R_ALPHA_HINT);
3568 if (hint)
3569 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3570
a7519a3c
RH
3571 info->changed_contents = TRUE;
3572 info->changed_relocs = TRUE;
d6ad34f6 3573
a7519a3c
RH
3574 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3575 if (--info->gotent->use_count == 0)
3765b1be 3576 {
a7519a3c
RH
3577 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3578 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3579 if (!info->h)
3580 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3581 }
252b5132 3582
a7519a3c
RH
3583 /* If we've switched to a GOTTPREL relocation, increment the reference
3584 count on that got entry. */
3585 if (use_gottprel)
f44f99a5 3586 {
a7519a3c 3587 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3588
a7519a3c
RH
3589 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3590 tprel_gotent = tprel_gotent->next)
3591 if (tprel_gotent->gotobj == info->gotobj
3592 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3593 && tprel_gotent->addend == irel->r_addend)
3594 break;
3595 if (tprel_gotent)
3596 tprel_gotent->use_count++;
3597 else
f44f99a5 3598 {
a7519a3c
RH
3599 if (info->gotent->use_count == 0)
3600 tprel_gotent = info->gotent;
3601 else
3602 {
3603 tprel_gotent = (struct alpha_elf_got_entry *)
3604 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3605 if (!tprel_gotent)
3606 return FALSE;
f44f99a5 3607
a7519a3c
RH
3608 tprel_gotent->next = *info->first_gotent;
3609 *info->first_gotent = tprel_gotent;
f44f99a5 3610
a7519a3c
RH
3611 tprel_gotent->gotobj = info->gotobj;
3612 tprel_gotent->addend = irel->r_addend;
3613 tprel_gotent->got_offset = -1;
3614 tprel_gotent->reloc_done = 0;
3615 tprel_gotent->reloc_xlated = 0;
3616 }
f44f99a5 3617
a7519a3c
RH
3618 tprel_gotent->use_count = 1;
3619 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3620 }
f44f99a5 3621 }
f44f99a5 3622
b34976b6 3623 return TRUE;
f44f99a5
RH
3624}
3625
b34976b6 3626static bfd_boolean
a7519a3c
RH
3627elf64_alpha_relax_section (bfd *abfd, asection *sec,
3628 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3629{
a7519a3c
RH
3630 Elf_Internal_Shdr *symtab_hdr;
3631 Elf_Internal_Rela *internal_relocs;
3632 Elf_Internal_Rela *irel, *irelend;
3633 Elf_Internal_Sym *isymbuf = NULL;
3634 struct alpha_elf_got_entry **local_got_entries;
3635 struct alpha_relax_info info;
4dfe6ac6
NC
3636 struct alpha_elf_link_hash_table * htab;
3637
3638 htab = alpha_elf_hash_table (link_info);
3639 if (htab == NULL)
3640 return FALSE;
f44f99a5 3641
4a828aab 3642 /* There's nothing to change, yet. */
a7519a3c 3643 *again = FALSE;
f44f99a5 3644
a7519a3c
RH
3645 if (link_info->relocatable
3646 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3647 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3648 || sec->reloc_count == 0)
d6ad34f6
RH
3649 return TRUE;
3650
0ffa91dd
NC
3651 BFD_ASSERT (is_alpha_elf (abfd));
3652
4a828aab 3653 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3654 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3655 {
4dfe6ac6 3656 htab->relax_trip = link_info->relax_trip;
4a828aab
RH
3657
3658 /* This should never fail after the initial round, since the only
3659 error is GOT overflow, and relaxation only shrinks the table. */
3660 if (!elf64_alpha_size_got_sections (link_info))
3661 abort ();
3662 if (elf_hash_table (link_info)->dynamic_sections_created)
3663 {
3664 elf64_alpha_size_plt_section (link_info);
3665 elf64_alpha_size_rela_got_section (link_info);
3666 }
3667 }
3668
0ffa91dd 3669 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3670 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3671
a7519a3c
RH
3672 /* Load the relocations for this section. */
3673 internal_relocs = (_bfd_elf_link_read_relocs
3674 (abfd, sec, (PTR) NULL, (Elf_Internal_Rela *) NULL,
3675 link_info->keep_memory));
3676 if (internal_relocs == NULL)
3677 return FALSE;
252b5132 3678
a7519a3c
RH
3679 memset(&info, 0, sizeof (info));
3680 info.abfd = abfd;
3681 info.sec = sec;
3682 info.link_info = link_info;
3683 info.symtab_hdr = symtab_hdr;
3684 info.relocs = internal_relocs;
3685 info.relend = irelend = internal_relocs + sec->reloc_count;
3686
3687 /* Find the GP for this object. Do not store the result back via
3688 _bfd_set_gp_value, since this could change again before final. */
3689 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3690 if (info.gotobj)
3765b1be 3691 {
a7519a3c
RH
3692 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3693 info.gp = (sgot->output_section->vma
3694 + sgot->output_offset
3695 + 0x8000);
252b5132
RH
3696 }
3697
a7519a3c
RH
3698 /* Get the section contents. */
3699 if (elf_section_data (sec)->this_hdr.contents != NULL)
3700 info.contents = elf_section_data (sec)->this_hdr.contents;
3701 else
3702 {
3703 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3704 goto error_return;
3705 }
252b5132 3706
a7519a3c
RH
3707 for (irel = internal_relocs; irel < irelend; irel++)
3708 {
3709 bfd_vma symval;
3710 struct alpha_elf_got_entry *gotent;
3711 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3712 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3713
3714 /* Early exit for unhandled or unrelaxable relocations. */
3715 switch (r_type)
3716 {
3717 case R_ALPHA_LITERAL:
3718 case R_ALPHA_GPRELHIGH:
3719 case R_ALPHA_GPRELLOW:
3720 case R_ALPHA_GOTDTPREL:
3721 case R_ALPHA_GOTTPREL:
3722 case R_ALPHA_TLSGD:
3723 break;
3724
3725 case R_ALPHA_TLSLDM:
3726 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3727 reloc to the 0 symbol so that they all match. */
3728 r_symndx = 0;
3729 break;
3730
3731 default:
3732 continue;
3733 }
3734
3735 /* Get the value of the symbol referred to by the reloc. */
3736 if (r_symndx < symtab_hdr->sh_info)
3737 {
3738 /* A local symbol. */
3739 Elf_Internal_Sym *isym;
3740
3741 /* Read this BFD's local symbols. */
3742 if (isymbuf == NULL)
3743 {
3744 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3745 if (isymbuf == NULL)
3746 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3747 symtab_hdr->sh_info, 0,
3748 NULL, NULL, NULL);
3749 if (isymbuf == NULL)
3750 goto error_return;
3751 }
252b5132 3752
a7519a3c 3753 isym = isymbuf + r_symndx;
252b5132 3754
a7519a3c
RH
3755 /* Given the symbol for a TLSLDM reloc is ignored, this also
3756 means forcing the symbol value to the tp base. */
3757 if (r_type == R_ALPHA_TLSLDM)
3758 {
3759 info.tsec = bfd_abs_section_ptr;
3760 symval = alpha_get_tprel_base (info.link_info);
3761 }
3762 else
3763 {
3764 symval = isym->st_value;
3765 if (isym->st_shndx == SHN_UNDEF)
3766 continue;
3767 else if (isym->st_shndx == SHN_ABS)
3768 info.tsec = bfd_abs_section_ptr;
3769 else if (isym->st_shndx == SHN_COMMON)
3770 info.tsec = bfd_com_section_ptr;
3771 else
3772 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3773 }
252b5132 3774
a7519a3c
RH
3775 info.h = NULL;
3776 info.other = isym->st_other;
3777 if (local_got_entries)
3778 info.first_gotent = &local_got_entries[r_symndx];
3779 else
3780 {
3781 info.first_gotent = &info.gotent;
3782 info.gotent = NULL;
3783 }
252b5132 3784 }
a7519a3c
RH
3785 else
3786 {
3787 unsigned long indx;
3788 struct alpha_elf_link_hash_entry *h;
252b5132 3789
a7519a3c
RH
3790 indx = r_symndx - symtab_hdr->sh_info;
3791 h = alpha_elf_sym_hashes (abfd)[indx];
3792 BFD_ASSERT (h != NULL);
252b5132 3793
a7519a3c
RH
3794 while (h->root.root.type == bfd_link_hash_indirect
3795 || h->root.root.type == bfd_link_hash_warning)
3796 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3797
a7519a3c
RH
3798 /* If the symbol is undefined, we can't do anything with it. */
3799 if (h->root.root.type == bfd_link_hash_undefined)
3800 continue;
252b5132 3801
a7519a3c
RH
3802 /* If the symbol isn't defined in the current module,
3803 again we can't do anything. */
3804 if (h->root.root.type == bfd_link_hash_undefweak)
3805 {
3806 info.tsec = bfd_abs_section_ptr;
3807 symval = 0;
3808 }
3809 else if (!h->root.def_regular)
3810 {
3811 /* Except for TLSGD relocs, which can sometimes be
3812 relaxed to GOTTPREL relocs. */
3813 if (r_type != R_ALPHA_TLSGD)
3814 continue;
3815 info.tsec = bfd_abs_section_ptr;
3816 symval = 0;
3817 }
3818 else
3819 {
3820 info.tsec = h->root.root.u.def.section;
3821 symval = h->root.root.u.def.value;
3822 }
252b5132 3823
a7519a3c
RH
3824 info.h = h;
3825 info.other = h->root.other;
3826 info.first_gotent = &h->got_entries;
3827 }
252b5132 3828
a7519a3c
RH
3829 /* Search for the got entry to be used by this relocation. */
3830 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3831 if (gotent->gotobj == info.gotobj
3832 && gotent->reloc_type == r_type
3833 && gotent->addend == irel->r_addend)
3834 break;
3835 info.gotent = gotent;
252b5132 3836
a7519a3c
RH
3837 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3838 symval += irel->r_addend;
252b5132 3839
a7519a3c 3840 switch (r_type)
252b5132 3841 {
a7519a3c
RH
3842 case R_ALPHA_LITERAL:
3843 BFD_ASSERT(info.gotent != NULL);
252b5132 3844
a7519a3c
RH
3845 /* If there exist LITUSE relocations immediately following, this
3846 opens up all sorts of interesting optimizations, because we
3847 now know every location that this address load is used. */
3848 if (irel+1 < irelend
3849 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3850 {
a7519a3c
RH
3851 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3852 goto error_return;
252b5132 3853 }
a7519a3c
RH
3854 else
3855 {
3856 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3857 goto error_return;
3858 }
3859 break;
252b5132 3860
a7519a3c
RH
3861 case R_ALPHA_GOTDTPREL:
3862 case R_ALPHA_GOTTPREL:
3863 BFD_ASSERT(info.gotent != NULL);
3864 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3865 goto error_return;
3866 break;
3867
3868 case R_ALPHA_TLSGD:
3869 case R_ALPHA_TLSLDM:
3870 BFD_ASSERT(info.gotent != NULL);
3871 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3872 r_type == R_ALPHA_TLSGD))
3873 goto error_return;
3874 break;
252b5132
RH
3875 }
3876 }
3877
a7519a3c
RH
3878 if (isymbuf != NULL
3879 && symtab_hdr->contents != (unsigned char *) isymbuf)
3880 {
3881 if (!link_info->keep_memory)
3882 free (isymbuf);
3883 else
252b5132 3884 {
a7519a3c
RH
3885 /* Cache the symbols for elf_link_input_bfd. */
3886 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3887 }
a7519a3c 3888 }
252b5132 3889
a7519a3c
RH
3890 if (info.contents != NULL
3891 && elf_section_data (sec)->this_hdr.contents != info.contents)
3892 {
3893 if (!info.changed_contents && !link_info->keep_memory)
3894 free (info.contents);
3895 else
252b5132 3896 {
a7519a3c
RH
3897 /* Cache the section contents for elf_link_input_bfd. */
3898 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 3899 }
a7519a3c 3900 }
252b5132 3901
a7519a3c
RH
3902 if (elf_section_data (sec)->relocs != internal_relocs)
3903 {
3904 if (!info.changed_relocs)
3905 free (internal_relocs);
3906 else
3907 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3908 }
a7519a3c
RH
3909
3910 *again = info.changed_contents || info.changed_relocs;
252b5132 3911
b34976b6 3912 return TRUE;
252b5132 3913
a7519a3c
RH
3914 error_return:
3915 if (isymbuf != NULL
3916 && symtab_hdr->contents != (unsigned char *) isymbuf)
3917 free (isymbuf);
3918 if (info.contents != NULL
3919 && elf_section_data (sec)->this_hdr.contents != info.contents)
3920 free (info.contents);
3921 if (internal_relocs != NULL
3922 && elf_section_data (sec)->relocs != internal_relocs)
3923 free (internal_relocs);
3924 return FALSE;
3925}
3926\f
1bbc9cec
RH
3927/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
3928 into the next available slot in SREL. */
3929
3930static void
a7519a3c
RH
3931elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
3932 asection *sec, asection *srel, bfd_vma offset,
3933 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
3934{
3935 Elf_Internal_Rela outrel;
3936 bfd_byte *loc;
3937
3938 BFD_ASSERT (srel != NULL);
3939
3940 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
3941 outrel.r_addend = addend;
3942
3943 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
3944 if ((offset | 1) != (bfd_vma) -1)
3945 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
3946 else
3947 memset (&outrel, 0, sizeof (outrel));
3948
3949 loc = srel->contents;
3950 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
3951 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 3952 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
3953}
3954
4a67a098
RH
3955/* Relocate an Alpha ELF section for a relocatable link.
3956
3957 We don't have to change anything unless the reloc is against a section
3958 symbol, in which case we have to adjust according to where the section
3959 symbol winds up in the output section. */
3960
b34976b6 3961static bfd_boolean
a7519a3c
RH
3962elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
3963 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3964 bfd *input_bfd, asection *input_section,
3965 bfd_byte *contents ATTRIBUTE_UNUSED,
3966 Elf_Internal_Rela *relocs,
3967 Elf_Internal_Sym *local_syms,
3968 asection **local_sections)
4a67a098
RH
3969{
3970 unsigned long symtab_hdr_sh_info;
3971 Elf_Internal_Rela *rel;
3972 Elf_Internal_Rela *relend;
ab96bf03 3973 struct elf_link_hash_entry **sym_hashes;
b34976b6 3974 bfd_boolean ret_val = TRUE;
4a67a098 3975
0ffa91dd 3976 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 3977 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
3978
3979 relend = relocs + input_section->reloc_count;
3980 for (rel = relocs; rel < relend; rel++)
3981 {
3982 unsigned long r_symndx;
3983 Elf_Internal_Sym *sym;
3984 asection *sec;
3985 unsigned long r_type;
3986
ab96bf03 3987 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
3988 if (r_type >= R_ALPHA_max)
3989 {
3990 (*_bfd_error_handler)
d003868e
AM
3991 (_("%B: unknown relocation type %d"),
3992 input_bfd, (int) r_type);
4a67a098 3993 bfd_set_error (bfd_error_bad_value);
b34976b6 3994 ret_val = FALSE;
4a67a098
RH
3995 continue;
3996 }
3997
4a67a098
RH
3998 /* The symbol associated with GPDISP and LITUSE is
3999 immaterial. Only the addend is significant. */
4000 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4001 continue;
4002
ab96bf03 4003 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4004 if (r_symndx < symtab_hdr_sh_info)
4005 {
4006 sym = local_syms + r_symndx;
ab96bf03 4007 sec = local_sections[r_symndx];
4a67a098 4008 }
ab96bf03
AM
4009 else
4010 {
4011 struct elf_link_hash_entry *h;
4012
4013 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4014
4015 while (h->root.type == bfd_link_hash_indirect
4016 || h->root.type == bfd_link_hash_warning)
4017 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4018
4019 if (h->root.type != bfd_link_hash_defined
4020 && h->root.type != bfd_link_hash_defweak)
4021 continue;
4022
4023 sym = NULL;
4024 sec = h->root.u.def.section;
4025 }
4026
4027 if (sec != NULL && elf_discarded_section (sec))
4028 {
4029 /* For relocs against symbols from removed linkonce sections,
4030 or sections discarded by a linker script, we just want the
4031 section contents zeroed. */
4032 _bfd_clear_contents (elf64_alpha_howto_table + r_type,
4033 input_bfd, contents + rel->r_offset);
4034 rel->r_info = 0;
4035 rel->r_addend = 0;
4036 continue;
4037 }
4038
4039 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4040 rel->r_addend += sec->output_offset;
4a67a098
RH
4041 }
4042
4043 return ret_val;
4044}
4045
252b5132
RH
4046/* Relocate an Alpha ELF section. */
4047
b34976b6 4048static bfd_boolean
a7519a3c
RH
4049elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4050 bfd *input_bfd, asection *input_section,
4051 bfd_byte *contents, Elf_Internal_Rela *relocs,
4052 Elf_Internal_Sym *local_syms,
4053 asection **local_sections)
252b5132 4054{
4a67a098 4055 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4056 Elf_Internal_Rela *rel;
4057 Elf_Internal_Rela *relend;
4a67a098
RH
4058 asection *sgot, *srel, *srelgot;
4059 bfd *dynobj, *gotobj;
4060 bfd_vma gp, tp_base, dtp_base;
4061 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4062 bfd_boolean ret_val;
252b5132 4063
0ffa91dd
NC
4064 BFD_ASSERT (is_alpha_elf (input_bfd));
4065
4a67a098 4066 /* Handle relocatable links with a smaller loop. */
1049f94e 4067 if (info->relocatable)
4a67a098
RH
4068 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4069 input_section, contents, relocs,
4070 local_syms, local_sections);
4071
4072 /* This is a final link. */
4073
b34976b6 4074 ret_val = TRUE;
252b5132 4075
0ffa91dd 4076 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4077
4a67a098
RH
4078 dynobj = elf_hash_table (info)->dynobj;
4079 if (dynobj)
4080 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
4081 else
4082 srelgot = NULL;
4083
3241278a
RH
4084 if (input_section->flags & SEC_ALLOC)
4085 {
4086 const char *section_name;
4087 section_name = (bfd_elf_string_from_elf_section
4088 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
4089 elf_section_data(input_section)->rel_hdr.sh_name));
4090 BFD_ASSERT(section_name != NULL);
4091 srel = bfd_get_section_by_name (dynobj, section_name);
4092 }
4093 else
4094 srel = NULL;
3765b1be 4095
4a67a098
RH
4096 /* Find the gp value for this input bfd. */
4097 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4098 if (gotobj)
4099 {
4100 sgot = alpha_elf_tdata (gotobj)->got;
4101 gp = _bfd_get_gp_value (gotobj);
4102 if (gp == 0)
252b5132 4103 {
4a67a098
RH
4104 gp = (sgot->output_section->vma
4105 + sgot->output_offset
4106 + 0x8000);
4107 _bfd_set_gp_value (gotobj, gp);
4108 }
4109 }
4110 else
4111 {
4112 sgot = NULL;
4113 gp = 0;
4114 }
3765b1be 4115
4a67a098
RH
4116 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4117
e1918d23 4118 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4119 {
e1918d23
AM
4120 dtp_base = alpha_get_dtprel_base (info);
4121 tp_base = alpha_get_tprel_base (info);
252b5132 4122 }
4a67a098
RH
4123 else
4124 dtp_base = tp_base = 0;
252b5132 4125
252b5132 4126 relend = relocs + input_section->reloc_count;
4a67a098 4127 for (rel = relocs; rel < relend; rel++)
252b5132 4128 {
4a67a098 4129 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4130 struct alpha_elf_got_entry *gotent;
4131 bfd_reloc_status_type r;
252b5132
RH
4132 reloc_howto_type *howto;
4133 unsigned long r_symndx;
4a67a098
RH
4134 Elf_Internal_Sym *sym = NULL;
4135 asection *sec = NULL;
3765b1be 4136 bfd_vma value;
dc810e39 4137 bfd_vma addend;
b34976b6
AM
4138 bfd_boolean dynamic_symbol_p;
4139 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4140 unsigned long r_type;
252b5132
RH
4141
4142 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4143 if (r_type >= R_ALPHA_max)
252b5132 4144 {
3765b1be 4145 (*_bfd_error_handler)
d003868e
AM
4146 (_("%B: unknown relocation type %d"),
4147 input_bfd, (int) r_type);
252b5132 4148 bfd_set_error (bfd_error_bad_value);
b34976b6 4149 ret_val = FALSE;
3765b1be 4150 continue;
252b5132 4151 }
252b5132 4152
3765b1be 4153 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4154 r_symndx = ELF64_R_SYM(rel->r_info);
4155
cc03ec80
RH
4156 /* The symbol for a TLSLDM reloc is ignored. Collapse the
4157 reloc to the 0 symbol so that they all match. */
4158 if (r_type == R_ALPHA_TLSLDM)
4159 r_symndx = 0;
4160
252b5132
RH
4161 if (r_symndx < symtab_hdr->sh_info)
4162 {
8517fae7 4163 asection *msec;
252b5132
RH
4164 sym = local_syms + r_symndx;
4165 sec = local_sections[r_symndx];
8517fae7
AM
4166 msec = sec;
4167 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4168
cc03ec80
RH
4169 /* If this is a tp-relative relocation against sym 0,
4170 this is hackery from relax_section. Force the value to
f915360b 4171 be the tls module base. */
cc03ec80
RH
4172 if (r_symndx == 0
4173 && (r_type == R_ALPHA_TLSLDM
4174 || r_type == R_ALPHA_GOTTPREL
4175 || r_type == R_ALPHA_TPREL64
4176 || r_type == R_ALPHA_TPRELHI
4177 || r_type == R_ALPHA_TPRELLO
4178 || r_type == R_ALPHA_TPREL16))
f915360b 4179 value = dtp_base;
cc03ec80 4180
4a67a098
RH
4181 if (local_got_entries)
4182 gotent = local_got_entries[r_symndx];
4183 else
4184 gotent = NULL;
3765b1be
RH
4185
4186 /* Need to adjust local GOT entries' addends for SEC_MERGE
4187 unless it has been done already. */
4188 if ((sec->flags & SEC_MERGE)
048d873d 4189 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 4190 && sec->sec_info_type == ELF_INFO_TYPE_MERGE
048d873d
RH
4191 && gotent
4192 && !gotent->reloc_xlated)
3765b1be
RH
4193 {
4194 struct alpha_elf_got_entry *ent;
3765b1be
RH
4195
4196 for (ent = gotent; ent; ent = ent->next)
4197 {
4198 ent->reloc_xlated = 1;
4199 if (ent->use_count == 0)
4200 continue;
4201 msec = sec;
4202 ent->addend =
4203 _bfd_merged_section_offset (output_bfd, &msec,
4204 elf_section_data (sec)->
4205 sec_info,
753731ee 4206 sym->st_value + ent->addend);
3765b1be
RH
4207 ent->addend -= sym->st_value;
4208 ent->addend += msec->output_section->vma
4209 + msec->output_offset
4210 - sec->output_section->vma
4211 - sec->output_offset;
4212 }
4213 }
4214
b34976b6 4215 dynamic_symbol_p = FALSE;
252b5132
RH
4216 }
4217 else
4218 {
560e09e9
NC
4219 bfd_boolean warned;
4220 bfd_boolean unresolved_reloc;
4221 struct elf_link_hash_entry *hh;
b2a8e766
AM
4222 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4223
4224 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4225 r_symndx, symtab_hdr, sym_hashes,
4226 hh, sec, value,
4227 unresolved_reloc, warned);
560e09e9
NC
4228
4229 if (warned)
4230 continue;
252b5132 4231
560e09e9
NC
4232 if (value == 0
4233 && ! unresolved_reloc
4234 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4235 undef_weak_ref = TRUE;
3765b1be 4236
560e09e9 4237 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4238 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4239 gotent = h->got_entries;
252b5132 4240 }
3765b1be 4241
ab96bf03
AM
4242 if (sec != NULL && elf_discarded_section (sec))
4243 {
4244 /* For relocs against symbols from removed linkonce sections,
4245 or sections discarded by a linker script, we just want the
4246 section contents zeroed. Avoid any special processing. */
4247 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
4248 rel->r_info = 0;
4249 rel->r_addend = 0;
4250 continue;
4251 }
4252
252b5132 4253 addend = rel->r_addend;
3765b1be
RH
4254 value += addend;
4255
4256 /* Search for the proper got entry. */
4257 for (; gotent ; gotent = gotent->next)
4258 if (gotent->gotobj == gotobj
4259 && gotent->reloc_type == r_type
4260 && gotent->addend == addend)
4261 break;
252b5132
RH
4262
4263 switch (r_type)
4264 {
4265 case R_ALPHA_GPDISP:
4266 {
4267 bfd_byte *p_ldah, *p_lda;
4268
4269 BFD_ASSERT(gp != 0);
4270
3765b1be
RH
4271 value = (input_section->output_section->vma
4272 + input_section->output_offset
4273 + rel->r_offset);
252b5132 4274
3765b1be 4275 p_ldah = contents + rel->r_offset;
252b5132
RH
4276 p_lda = p_ldah + rel->r_addend;
4277
3765b1be 4278 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4279 p_ldah, p_lda);
4280 }
4281 break;
4282
252b5132 4283 case R_ALPHA_LITERAL:
3765b1be
RH
4284 BFD_ASSERT(sgot != NULL);
4285 BFD_ASSERT(gp != 0);
4286 BFD_ASSERT(gotent != NULL);
4287 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4288
3765b1be
RH
4289 if (!gotent->reloc_done)
4290 {
4291 gotent->reloc_done = 1;
252b5132 4292
3765b1be
RH
4293 bfd_put_64 (output_bfd, value,
4294 sgot->contents + gotent->got_offset);
252b5132 4295
3765b1be
RH
4296 /* If the symbol has been forced local, output a
4297 RELATIVE reloc, otherwise it will be handled in
4298 finish_dynamic_symbol. */
d6ad34f6 4299 if (info->shared && !dynamic_symbol_p && !undef_weak_ref)
1bbc9cec
RH
4300 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4301 gotent->got_offset, 0,
4302 R_ALPHA_RELATIVE, value);
3765b1be 4303 }
252b5132 4304
3765b1be
RH
4305 value = (sgot->output_section->vma
4306 + sgot->output_offset
4307 + gotent->got_offset);
4308 value -= gp;
252b5132
RH
4309 goto default_reloc;
4310
4311 case R_ALPHA_GPREL32:
ec1659c8 4312 case R_ALPHA_GPREL16:
252b5132 4313 case R_ALPHA_GPRELLOW:
3765b1be 4314 if (dynamic_symbol_p)
f16fbd61
RH
4315 {
4316 (*_bfd_error_handler)
d003868e
AM
4317 (_("%B: gp-relative relocation against dynamic symbol %s"),
4318 input_bfd, h->root.root.root.string);
b34976b6 4319 ret_val = FALSE;
f16fbd61 4320 }
252b5132 4321 BFD_ASSERT(gp != 0);
3765b1be 4322 value -= gp;
252b5132
RH
4323 goto default_reloc;
4324
4325 case R_ALPHA_GPRELHIGH:
3765b1be 4326 if (dynamic_symbol_p)
f16fbd61
RH
4327 {
4328 (*_bfd_error_handler)
d003868e
AM
4329 (_("%B: gp-relative relocation against dynamic symbol %s"),
4330 input_bfd, h->root.root.root.string);
b34976b6 4331 ret_val = FALSE;
f16fbd61 4332 }
252b5132 4333 BFD_ASSERT(gp != 0);
3765b1be
RH
4334 value -= gp;
4335 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4336 goto default_reloc;
4337
252b5132 4338 case R_ALPHA_HINT:
f94952df
RH
4339 /* A call to a dynamic symbol is definitely out of range of
4340 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4341 if (dynamic_symbol_p)
f94952df
RH
4342 {
4343 r = bfd_reloc_ok;
4344 break;
4345 }
3765b1be
RH
4346 /* The regular PC-relative stuff measures from the start of
4347 the instruction rather than the end. */
4348 value -= 4;
4349 goto default_reloc;
f94952df
RH
4350
4351 case R_ALPHA_BRADDR:
3765b1be
RH
4352 if (dynamic_symbol_p)
4353 {
4354 (*_bfd_error_handler)
d003868e
AM
4355 (_("%B: pc-relative relocation against dynamic symbol %s"),
4356 input_bfd, h->root.root.root.string);
b34976b6 4357 ret_val = FALSE;
3765b1be 4358 }
252b5132
RH
4359 /* The regular PC-relative stuff measures from the start of
4360 the instruction rather than the end. */
3765b1be 4361 value -= 4;
252b5132
RH
4362 goto default_reloc;
4363
7793f4d0
RH
4364 case R_ALPHA_BRSGP:
4365 {
4366 int other;
4367 const char *name;
4368
4369 /* The regular PC-relative stuff measures from the start of
4370 the instruction rather than the end. */
3765b1be 4371 value -= 4;
7793f4d0 4372
ccf00ab6
RH
4373 /* The source and destination gp must be the same. Note that
4374 the source will always have an assigned gp, since we forced
4375 one in check_relocs, but that the destination may not, as
cedb70c5 4376 it might not have had any relocations at all. Also take
ccf00ab6
RH
4377 care not to crash if H is an undefined symbol. */
4378 if (h != NULL && sec != NULL
4379 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4380 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4381 {
7793f4d0 4382 (*_bfd_error_handler)
d003868e
AM
4383 (_("%B: change in gp: BRSGP %s"),
4384 input_bfd, h->root.root.root.string);
b34976b6 4385 ret_val = FALSE;
7793f4d0
RH
4386 }
4387
4388 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4389 if (h != NULL)
4390 other = h->root.other;
4391 else
4392 other = sym->st_other;
4393 switch (other & STO_ALPHA_STD_GPLOAD)
4394 {
4395 case STO_ALPHA_NOPV:
4396 break;
4397 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4398 value += 8;
7793f4d0
RH
4399 break;
4400 default:
4401 if (h != NULL)
4402 name = h->root.root.root.string;
4403 else
4404 {
4405 name = (bfd_elf_string_from_elf_section
4406 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4407 if (name == NULL)
4408 name = _("<unknown>");
4409 else if (name[0] == 0)
4410 name = bfd_section_name (input_bfd, sec);
4411 }
4412 (*_bfd_error_handler)
d003868e
AM
4413 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4414 input_bfd, name);
b34976b6 4415 ret_val = FALSE;
7793f4d0
RH
4416 break;
4417 }
4418
4419 goto default_reloc;
4420 }
4421
252b5132
RH
4422 case R_ALPHA_REFLONG:
4423 case R_ALPHA_REFQUAD:
3765b1be
RH
4424 case R_ALPHA_DTPREL64:
4425 case R_ALPHA_TPREL64:
252b5132 4426 {
1bbc9cec
RH
4427 long dynindx, dyntype = r_type;
4428 bfd_vma dynaddend;
252b5132
RH
4429
4430 /* Careful here to remember RELATIVE relocations for global
4431 variables for symbolic shared objects. */
4432
3765b1be 4433 if (dynamic_symbol_p)
252b5132
RH
4434 {
4435 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4436 dynindx = h->root.dynindx;
4437 dynaddend = addend;
3765b1be
RH
4438 addend = 0, value = 0;
4439 }
4440 else if (r_type == R_ALPHA_DTPREL64)
4441 {
e1918d23 4442 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4443 value -= dtp_base;
4444 goto default_reloc;
4445 }
4446 else if (r_type == R_ALPHA_TPREL64)
4447 {
e1918d23 4448 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4449 if (!info->shared)
4450 {
4451 value -= tp_base;
4452 goto default_reloc;
4453 }
4454 dynindx = 0;
4455 dynaddend = value - dtp_base;
252b5132 4456 }
ec338859
AM
4457 else if (info->shared
4458 && r_symndx != 0
d6ad34f6
RH
4459 && (input_section->flags & SEC_ALLOC)
4460 && !undef_weak_ref)
252b5132 4461 {
3765b1be
RH
4462 if (r_type == R_ALPHA_REFLONG)
4463 {
4464 (*_bfd_error_handler)
d003868e
AM
4465 (_("%B: unhandled dynamic relocation against %s"),
4466 input_bfd,
3765b1be 4467 h->root.root.root.string);
b34976b6 4468 ret_val = FALSE;
3765b1be 4469 }
1bbc9cec
RH
4470 dynindx = 0;
4471 dyntype = R_ALPHA_RELATIVE;
4472 dynaddend = value;
252b5132
RH
4473 }
4474 else
4475 goto default_reloc;
4476
3241278a
RH
4477 if (input_section->flags & SEC_ALLOC)
4478 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4479 srel, rel->r_offset, dynindx,
4480 dyntype, dynaddend);
252b5132
RH
4481 }
4482 goto default_reloc;
4483
3765b1be 4484 case R_ALPHA_SREL16:
84de6048
RH
4485 case R_ALPHA_SREL32:
4486 case R_ALPHA_SREL64:
3765b1be
RH
4487 if (dynamic_symbol_p)
4488 {
4489 (*_bfd_error_handler)
d003868e
AM
4490 (_("%B: pc-relative relocation against dynamic symbol %s"),
4491 input_bfd, h->root.root.root.string);
b34976b6 4492 ret_val = FALSE;
3765b1be 4493 }
d6ad34f6
RH
4494 else if ((info->shared || info->pie) && undef_weak_ref)
4495 {
4496 (*_bfd_error_handler)
4497 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4498 input_bfd, h->root.root.root.string);
4499 ret_val = FALSE;
4500 }
4501
3765b1be 4502
84de6048
RH
4503 /* ??? .eh_frame references to discarded sections will be smashed
4504 to relocations against SHN_UNDEF. The .eh_frame format allows
4505 NULL to be encoded as 0 in any format, so this works here. */
4506 if (r_symndx == 0)
4507 howto = (elf64_alpha_howto_table
4508 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4509 goto default_reloc;
4510
3765b1be
RH
4511 case R_ALPHA_TLSLDM:
4512 /* Ignore the symbol for the relocation. The result is always
4513 the current module. */
4514 dynamic_symbol_p = 0;
4515 /* FALLTHRU */
4516
4517 case R_ALPHA_TLSGD:
4518 if (!gotent->reloc_done)
4519 {
4520 gotent->reloc_done = 1;
4521
4522 /* Note that the module index for the main program is 1. */
4523 bfd_put_64 (output_bfd, !info->shared && !dynamic_symbol_p,
4524 sgot->contents + gotent->got_offset);
4525
4526 /* If the symbol has been forced local, output a
4527 DTPMOD64 reloc, otherwise it will be handled in
4528 finish_dynamic_symbol. */
4529 if (info->shared && !dynamic_symbol_p)
1bbc9cec
RH
4530 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4531 gotent->got_offset, 0,
4532 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4533
4534 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4535 value = 0;
4536 else
4537 {
e1918d23 4538 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4539 value -= dtp_base;
4540 }
4541 bfd_put_64 (output_bfd, value,
4542 sgot->contents + gotent->got_offset + 8);
4543 }
4544
4545 value = (sgot->output_section->vma
4546 + sgot->output_offset
4547 + gotent->got_offset);
4548 value -= gp;
4549 goto default_reloc;
4550
4551 case R_ALPHA_DTPRELHI:
4552 case R_ALPHA_DTPRELLO:
4553 case R_ALPHA_DTPREL16:
4554 if (dynamic_symbol_p)
4555 {
4556 (*_bfd_error_handler)
d003868e
AM
4557 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4558 input_bfd, h->root.root.root.string);
b34976b6 4559 ret_val = FALSE;
3765b1be 4560 }
e1918d23 4561 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4562 value -= dtp_base;
9e756d64
RH
4563 if (r_type == R_ALPHA_DTPRELHI)
4564 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4565 goto default_reloc;
4566
4567 case R_ALPHA_TPRELHI:
4568 case R_ALPHA_TPRELLO:
4569 case R_ALPHA_TPREL16:
9e756d64
RH
4570 if (info->shared)
4571 {
4572 (*_bfd_error_handler)
d003868e
AM
4573 (_("%B: TLS local exec code cannot be linked into shared objects"),
4574 input_bfd);
b34976b6 4575 ret_val = FALSE;
9e756d64
RH
4576 }
4577 else if (dynamic_symbol_p)
3765b1be
RH
4578 {
4579 (*_bfd_error_handler)
d003868e
AM
4580 (_("%B: tp-relative relocation against dynamic symbol %s"),
4581 input_bfd, h->root.root.root.string);
b34976b6 4582 ret_val = FALSE;
3765b1be 4583 }
e1918d23 4584 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4585 value -= tp_base;
9e756d64
RH
4586 if (r_type == R_ALPHA_TPRELHI)
4587 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4588 goto default_reloc;
4589
4590 case R_ALPHA_GOTDTPREL:
4591 case R_ALPHA_GOTTPREL:
4592 BFD_ASSERT(sgot != NULL);
4593 BFD_ASSERT(gp != 0);
4594 BFD_ASSERT(gotent != NULL);
4595 BFD_ASSERT(gotent->use_count >= 1);
4596
4597 if (!gotent->reloc_done)
4598 {
4599 gotent->reloc_done = 1;
4600
4601 if (dynamic_symbol_p)
4602 value = 0;
4603 else
4604 {
e1918d23 4605 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4606 if (r_type == R_ALPHA_GOTDTPREL)
4607 value -= dtp_base;
4608 else if (!info->shared)
4609 value -= tp_base;
4610 else
4611 {
4612 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4613 gotent->got_offset, 0,
4614 R_ALPHA_TPREL64,
4615 value - dtp_base);
4616 value = 0;
4617 }
3765b1be
RH
4618 }
4619 bfd_put_64 (output_bfd, value,
4620 sgot->contents + gotent->got_offset);
4621 }
4622
4623 value = (sgot->output_section->vma
4624 + sgot->output_offset
4625 + gotent->got_offset);
4626 value -= gp;
4627 goto default_reloc;
4628
252b5132
RH
4629 default:
4630 default_reloc:
4631 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4632 contents, rel->r_offset, value, 0);
252b5132
RH
4633 break;
4634 }
4635
4636 switch (r)
4637 {
4638 case bfd_reloc_ok:
4639 break;
4640
4641 case bfd_reloc_overflow:
4642 {
4643 const char *name;
4644
ed4de5e2
JJ
4645 /* Don't warn if the overflow is due to pc relative reloc
4646 against discarded section. Section optimization code should
4647 handle it. */
4648
4649 if (r_symndx < symtab_hdr->sh_info
4650 && sec != NULL && howto->pc_relative
4651 && elf_discarded_section (sec))
4652 break;
4653
252b5132 4654 if (h != NULL)
dfeffb9f 4655 name = NULL;
252b5132
RH
4656 else
4657 {
4658 name = (bfd_elf_string_from_elf_section
4659 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4660 if (name == NULL)
b34976b6 4661 return FALSE;
252b5132
RH
4662 if (*name == '\0')
4663 name = bfd_section_name (input_bfd, sec);
4664 }
4665 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
4666 (info, (h ? &h->root.root : NULL), name, howto->name,
4667 (bfd_vma) 0, input_bfd, input_section,
4668 rel->r_offset)))
b34976b6 4669 ret_val = FALSE;
252b5132
RH
4670 }
4671 break;
4672
4673 default:
4674 case bfd_reloc_outofrange:
4675 abort ();
4676 }
4677 }
4678
f16fbd61 4679 return ret_val;
252b5132
RH
4680}
4681
4682/* Finish up dynamic symbol handling. We set the contents of various
4683 dynamic sections here. */
4684
b34976b6 4685static bfd_boolean
a7519a3c
RH
4686elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4687 struct elf_link_hash_entry *h,
4688 Elf_Internal_Sym *sym)
252b5132 4689{
6ec7057a 4690 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132
RH
4691 bfd *dynobj = elf_hash_table(info)->dynobj;
4692
6ec7057a 4693 if (h->needs_plt)
252b5132
RH
4694 {
4695 /* Fill in the .plt entry for this symbol. */
4696 asection *splt, *sgot, *srel;
4697 Elf_Internal_Rela outrel;
947216bf 4698 bfd_byte *loc;
252b5132
RH
4699 bfd_vma got_addr, plt_addr;
4700 bfd_vma plt_index;
4701 struct alpha_elf_got_entry *gotent;
4702
4703 BFD_ASSERT (h->dynindx != -1);
4704
252b5132
RH
4705 splt = bfd_get_section_by_name (dynobj, ".plt");
4706 BFD_ASSERT (splt != NULL);
4707 srel = bfd_get_section_by_name (dynobj, ".rela.plt");
4708 BFD_ASSERT (srel != NULL);
252b5132 4709
6ec7057a
RH
4710 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4711 if (gotent->reloc_type == R_ALPHA_LITERAL
4712 && gotent->use_count > 0)
4713 {
4714 unsigned int insn;
4715 int disp;
252b5132 4716
6ec7057a
RH
4717 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4718 BFD_ASSERT (sgot != NULL);
252b5132 4719
6ec7057a
RH
4720 BFD_ASSERT (gotent->got_offset != -1);
4721 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4722
6ec7057a
RH
4723 got_addr = (sgot->output_section->vma
4724 + sgot->output_offset
4725 + gotent->got_offset);
4726 plt_addr = (splt->output_section->vma
4727 + splt->output_offset
4728 + gotent->plt_offset);
252b5132 4729
6ec7057a 4730 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4731
6ec7057a
RH
4732 /* Fill in the entry in the procedure linkage table. */
4733 if (elf64_alpha_use_secureplt)
4734 {
4735 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4736 insn = INSN_AD (INSN_BR, 31, disp);
4737 bfd_put_32 (output_bfd, insn,
4738 splt->contents + gotent->plt_offset);
252b5132 4739
6ec7057a
RH
4740 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4741 / NEW_PLT_ENTRY_SIZE);
4742 }
4743 else
4744 {
4745 disp = -(gotent->plt_offset + 4);
4746 insn = INSN_AD (INSN_BR, 28, disp);
4747 bfd_put_32 (output_bfd, insn,
4748 splt->contents + gotent->plt_offset);
4749 bfd_put_32 (output_bfd, INSN_UNOP,
4750 splt->contents + gotent->plt_offset + 4);
4751 bfd_put_32 (output_bfd, INSN_UNOP,
4752 splt->contents + gotent->plt_offset + 8);
4753
4754 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4755 / OLD_PLT_ENTRY_SIZE);
4756 }
252b5132 4757
6ec7057a
RH
4758 /* Fill in the entry in the .rela.plt section. */
4759 outrel.r_offset = got_addr;
4760 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4761 outrel.r_addend = 0;
252b5132 4762
6ec7057a
RH
4763 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4764 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4765
6ec7057a
RH
4766 /* Fill in the entry in the .got. */
4767 bfd_put_64 (output_bfd, plt_addr,
4768 sgot->contents + gotent->got_offset);
4769 }
252b5132
RH
4770 }
4771 else if (alpha_elf_dynamic_symbol_p (h, info))
4772 {
4773 /* Fill in the dynamic relocations for this symbol's .got entries. */
4774 asection *srel;
252b5132
RH
4775 struct alpha_elf_got_entry *gotent;
4776
4777 srel = bfd_get_section_by_name (dynobj, ".rela.got");
4778 BFD_ASSERT (srel != NULL);
4779
252b5132
RH
4780 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4781 gotent != NULL;
4782 gotent = gotent->next)
4783 {
f44f99a5 4784 asection *sgot;
1bbc9cec 4785 long r_type;
3765b1be 4786
f44f99a5
RH
4787 if (gotent->use_count == 0)
4788 continue;
4789
4790 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4791
4792 r_type = gotent->reloc_type;
4793 switch (r_type)
4794 {
4795 case R_ALPHA_LITERAL:
4796 r_type = R_ALPHA_GLOB_DAT;
4797 break;
4798 case R_ALPHA_TLSGD:
4799 r_type = R_ALPHA_DTPMOD64;
4800 break;
4801 case R_ALPHA_GOTDTPREL:
4802 r_type = R_ALPHA_DTPREL64;
4803 break;
4804 case R_ALPHA_GOTTPREL:
4805 r_type = R_ALPHA_TPREL64;
4806 break;
4807 case R_ALPHA_TLSLDM:
4808 default:
4809 abort ();
4810 }
4811
1bbc9cec
RH
4812 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4813 gotent->got_offset, h->dynindx,
4814 r_type, gotent->addend);
3765b1be
RH
4815
4816 if (gotent->reloc_type == R_ALPHA_TLSGD)
1bbc9cec
RH
4817 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
4818 gotent->got_offset + 8, h->dynindx,
4819 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4820 }
4821 }
4822
4823 /* Mark some specially defined symbols as absolute. */
4824 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1
RS
4825 || h == elf_hash_table (info)->hgot
4826 || h == elf_hash_table (info)->hplt)
252b5132
RH
4827 sym->st_shndx = SHN_ABS;
4828
b34976b6 4829 return TRUE;
252b5132
RH
4830}
4831
4832/* Finish up the dynamic sections. */
4833
b34976b6 4834static bfd_boolean
a7519a3c
RH
4835elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4836 struct bfd_link_info *info)
252b5132
RH
4837{
4838 bfd *dynobj;
4839 asection *sdyn;
4840
4841 dynobj = elf_hash_table (info)->dynobj;
4842 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4843
4844 if (elf_hash_table (info)->dynamic_sections_created)
4845 {
6ec7057a 4846 asection *splt, *sgotplt, *srelaplt;
252b5132 4847 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4848 bfd_vma plt_vma, gotplt_vma;
252b5132
RH
4849
4850 splt = bfd_get_section_by_name (dynobj, ".plt");
6ec7057a 4851 srelaplt = bfd_get_section_by_name (output_bfd, ".rela.plt");
252b5132
RH
4852 BFD_ASSERT (splt != NULL && sdyn != NULL);
4853
6ec7057a
RH
4854 plt_vma = splt->output_section->vma + splt->output_offset;
4855
4856 gotplt_vma = 0;
4857 if (elf64_alpha_use_secureplt)
4858 {
4859 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
4860 BFD_ASSERT (sgotplt != NULL);
4861 if (sgotplt->size > 0)
4862 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4863 }
4864
252b5132 4865 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4866 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4867 for (; dyncon < dynconend; dyncon++)
4868 {
4869 Elf_Internal_Dyn dyn;
252b5132
RH
4870
4871 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4872
4873 switch (dyn.d_tag)
4874 {
4875 case DT_PLTGOT:
6ec7057a
RH
4876 dyn.d_un.d_ptr
4877 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4878 break;
252b5132 4879 case DT_PLTRELSZ:
6ec7057a
RH
4880 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4881 break;
252b5132 4882 case DT_JMPREL:
6ec7057a
RH
4883 dyn.d_un.d_ptr = srelaplt ? srelaplt->vma : 0;
4884 break;
252b5132
RH
4885
4886 case DT_RELASZ:
4887 /* My interpretation of the TIS v1.1 ELF document indicates
4888 that RELASZ should not include JMPREL. This is not what
4889 the rest of the BFD does. It is, however, what the
4890 glibc ld.so wants. Do this fixup here until we found
4891 out who is right. */
6ec7057a
RH
4892 if (srelaplt)
4893 dyn.d_un.d_val -= srelaplt->size;
252b5132
RH
4894 break;
4895 }
4896
4897 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4898 }
4899
6ec7057a 4900 /* Initialize the plt header. */
eea6121a 4901 if (splt->size > 0)
252b5132 4902 {
6ec7057a
RH
4903 unsigned int insn;
4904 int ofs;
4905
4906 if (elf64_alpha_use_secureplt)
4907 {
4908 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
4909
4910 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
4911 bfd_put_32 (output_bfd, insn, splt->contents);
4912
4913 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
4914 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4915
4916 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
4917 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4918
4919 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
4920 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4921
4922 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
4923 bfd_put_32 (output_bfd, insn, splt->contents + 16);
4924
4925 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
4926 bfd_put_32 (output_bfd, insn, splt->contents + 20);
4927
4928 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
4929 bfd_put_32 (output_bfd, insn, splt->contents + 24);
4930
4931 insn = INSN_AB (INSN_JMP, 31, 27);
4932 bfd_put_32 (output_bfd, insn, splt->contents + 28);
4933
4934 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
4935 bfd_put_32 (output_bfd, insn, splt->contents + 32);
4936 }
4937 else
4938 {
4939 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
4940 bfd_put_32 (output_bfd, insn, splt->contents);
4941
4942 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
4943 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4944
4945 insn = INSN_UNOP;
4946 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4947
4948 insn = INSN_AB (INSN_JMP, 27, 27);
4949 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4950
4951 /* The next two words will be filled in by ld.so. */
4952 bfd_put_64 (output_bfd, 0, splt->contents + 16);
4953 bfd_put_64 (output_bfd, 0, splt->contents + 24);
4954 }
252b5132 4955
eecdbe52 4956 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
4957 }
4958 }
4959
b34976b6 4960 return TRUE;
252b5132
RH
4961}
4962
96e2734b
RH
4963/* We need to use a special link routine to handle the .mdebug section.
4964 We need to merge all instances of these sections together, not write
4965 them all out sequentially. */
252b5132 4966
b34976b6 4967static bfd_boolean
a7519a3c 4968elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
4969{
4970 asection *o;
4971 struct bfd_link_order *p;
96e2734b 4972 asection *mdebug_sec;
252b5132
RH
4973 struct ecoff_debug_info debug;
4974 const struct ecoff_debug_swap *swap
4975 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
4976 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
4977 void * mdebug_handle = NULL;
4978 struct alpha_elf_link_hash_table * htab;
4979
4980 htab = alpha_elf_hash_table (info);
4981 if (htab == NULL)
4982 return FALSE;
252b5132 4983
96e2734b 4984 /* Go through the sections and collect the mdebug information. */
252b5132 4985 mdebug_sec = NULL;
252b5132
RH
4986 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4987 {
252b5132
RH
4988 if (strcmp (o->name, ".mdebug") == 0)
4989 {
4990 struct extsym_info einfo;
4991
4992 /* We have found the .mdebug section in the output file.
4993 Look through all the link_orders comprising it and merge
4994 the information together. */
4995 symhdr->magic = swap->sym_magic;
4996 /* FIXME: What should the version stamp be? */
4997 symhdr->vstamp = 0;
4998 symhdr->ilineMax = 0;
4999 symhdr->cbLine = 0;
5000 symhdr->idnMax = 0;
5001 symhdr->ipdMax = 0;
5002 symhdr->isymMax = 0;
5003 symhdr->ioptMax = 0;
5004 symhdr->iauxMax = 0;
5005 symhdr->issMax = 0;
5006 symhdr->issExtMax = 0;
5007 symhdr->ifdMax = 0;
5008 symhdr->crfd = 0;
5009 symhdr->iextMax = 0;
5010
5011 /* We accumulate the debugging information itself in the
5012 debug_info structure. */
5013 debug.line = NULL;
5014 debug.external_dnr = NULL;
5015 debug.external_pdr = NULL;
5016 debug.external_sym = NULL;
5017 debug.external_opt = NULL;
5018 debug.external_aux = NULL;
5019 debug.ss = NULL;
5020 debug.ssext = debug.ssext_end = NULL;
5021 debug.external_fdr = NULL;
5022 debug.external_rfd = NULL;
5023 debug.external_ext = debug.external_ext_end = NULL;
5024
5025 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
5026 if (mdebug_handle == (PTR) NULL)
b34976b6 5027 return FALSE;
252b5132
RH
5028
5029 if (1)
5030 {
5031 asection *s;
5032 EXTR esym;
52b9d213 5033 bfd_vma last = 0;
252b5132
RH
5034 unsigned int i;
5035 static const char * const name[] =
5036 {
5037 ".text", ".init", ".fini", ".data",
5038 ".rodata", ".sdata", ".sbss", ".bss"
5039 };
5040 static const int sc[] = { scText, scInit, scFini, scData,
5041 scRData, scSData, scSBss, scBss };
5042
5043 esym.jmptbl = 0;
5044 esym.cobol_main = 0;
5045 esym.weakext = 0;
5046 esym.reserved = 0;
5047 esym.ifd = ifdNil;
5048 esym.asym.iss = issNil;
5049 esym.asym.st = stLocal;
5050 esym.asym.reserved = 0;
5051 esym.asym.index = indexNil;
5052 for (i = 0; i < 8; i++)
5053 {
5054 esym.asym.sc = sc[i];
5055 s = bfd_get_section_by_name (abfd, name[i]);
5056 if (s != NULL)
5057 {
5058 esym.asym.value = s->vma;
eea6121a 5059 last = s->vma + s->size;
252b5132
RH
5060 }
5061 else
5062 esym.asym.value = last;
5063
5064 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5065 name[i], &esym))
b34976b6 5066 return FALSE;
252b5132
RH
5067 }
5068 }
5069
8423293d 5070 for (p = o->map_head.link_order;
252b5132
RH
5071 p != (struct bfd_link_order *) NULL;
5072 p = p->next)
5073 {
5074 asection *input_section;
5075 bfd *input_bfd;
5076 const struct ecoff_debug_swap *input_swap;
5077 struct ecoff_debug_info input_debug;
5078 char *eraw_src;
5079 char *eraw_end;
5080
5081 if (p->type != bfd_indirect_link_order)
5082 {
fd96f80f 5083 if (p->type == bfd_data_link_order)
252b5132
RH
5084 continue;
5085 abort ();
5086 }
5087
5088 input_section = p->u.indirect.section;
5089 input_bfd = input_section->owner;
5090
0ffa91dd
NC
5091 if (! is_alpha_elf (input_bfd))
5092 /* I don't know what a non ALPHA ELF bfd would be
5093 doing with a .mdebug section, but I don't really
5094 want to deal with it. */
5095 continue;
252b5132
RH
5096
5097 input_swap = (get_elf_backend_data (input_bfd)
5098 ->elf_backend_ecoff_debug_swap);
5099
eea6121a 5100 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5101
5102 /* The ECOFF linking code expects that we have already
5103 read in the debugging information and set up an
5104 ecoff_debug_info structure, so we do that now. */
5105 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5106 &input_debug))
b34976b6 5107 return FALSE;
252b5132
RH
5108
5109 if (! (bfd_ecoff_debug_accumulate
5110 (mdebug_handle, abfd, &debug, swap, input_bfd,
5111 &input_debug, input_swap, info)))
b34976b6 5112 return FALSE;
252b5132
RH
5113
5114 /* Loop through the external symbols. For each one with
5115 interesting information, try to find the symbol in
5116 the linker global hash table and save the information
5117 for the output external symbols. */
21d799b5 5118 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5119 eraw_end = (eraw_src
5120 + (input_debug.symbolic_header.iextMax
5121 * input_swap->external_ext_size));
5122 for (;
5123 eraw_src < eraw_end;
5124 eraw_src += input_swap->external_ext_size)
5125 {
5126 EXTR ext;
5127 const char *name;
5128 struct alpha_elf_link_hash_entry *h;
5129
5130 (*input_swap->swap_ext_in) (input_bfd, (PTR) eraw_src, &ext);
5131 if (ext.asym.sc == scNil
5132 || ext.asym.sc == scUndefined
5133 || ext.asym.sc == scSUndefined)
5134 continue;
5135
5136 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5137 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5138 if (h == NULL || h->esym.ifd != -2)
5139 continue;
5140
5141 if (ext.ifd != -1)
5142 {
5143 BFD_ASSERT (ext.ifd
5144 < input_debug.symbolic_header.ifdMax);
5145 ext.ifd = input_debug.ifdmap[ext.ifd];
5146 }
5147
5148 h->esym = ext;
5149 }
5150
5151 /* Free up the information we just read. */
5152 free (input_debug.line);
5153 free (input_debug.external_dnr);
5154 free (input_debug.external_pdr);
5155 free (input_debug.external_sym);
5156 free (input_debug.external_opt);
5157 free (input_debug.external_aux);
5158 free (input_debug.ss);
5159 free (input_debug.ssext);
5160 free (input_debug.external_fdr);
5161 free (input_debug.external_rfd);
5162 free (input_debug.external_ext);
5163
5164 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5165 elf_link_input_bfd ignores this section. */
5166 input_section->flags &=~ SEC_HAS_CONTENTS;
5167 }
5168
252b5132
RH
5169 /* Build the external symbol information. */
5170 einfo.abfd = abfd;
5171 einfo.info = info;
5172 einfo.debug = &debug;
5173 einfo.swap = swap;
b34976b6 5174 einfo.failed = FALSE;
252b5132
RH
5175 elf_link_hash_traverse (elf_hash_table (info),
5176 elf64_alpha_output_extsym,
5177 (PTR) &einfo);
5178 if (einfo.failed)
b34976b6 5179 return FALSE;
252b5132
RH
5180
5181 /* Set the size of the .mdebug section. */
eea6121a 5182 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5183
5184 /* Skip this section later on (I don't think this currently
5185 matters, but someday it might). */
8423293d 5186 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5187
5188 mdebug_sec = o;
5189 }
252b5132
RH
5190 }
5191
5192 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5193 if (! bfd_elf_final_link (abfd, info))
b34976b6 5194 return FALSE;
252b5132
RH
5195
5196 /* Now write out the computed sections. */
5197
5198 /* The .got subsections... */
5199 {
5200 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5201 for (i = htab->got_list;
252b5132
RH
5202 i != NULL;
5203 i = alpha_elf_tdata(i)->got_link_next)
5204 {
5205 asection *sgot;
5206
5207 /* elf_bfd_final_link already did everything in dynobj. */
5208 if (i == dynobj)
5209 continue;
5210
5211 sgot = alpha_elf_tdata(i)->got;
5212 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5213 sgot->contents,
5214 (file_ptr) sgot->output_offset,
eea6121a 5215 sgot->size))
b34976b6 5216 return FALSE;
252b5132
RH
5217 }
5218 }
5219
252b5132
RH
5220 if (mdebug_sec != (asection *) NULL)
5221 {
5222 BFD_ASSERT (abfd->output_has_begun);
5223 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5224 swap, info,
5225 mdebug_sec->filepos))
b34976b6 5226 return FALSE;
252b5132
RH
5227
5228 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5229 }
5230
b34976b6 5231 return TRUE;
252b5132 5232}
fcfbdf31
JJ
5233
5234static enum elf_reloc_type_class
a7519a3c 5235elf64_alpha_reloc_type_class (const Elf_Internal_Rela *rela)
fcfbdf31 5236{
f51e552e 5237 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5238 {
5239 case R_ALPHA_RELATIVE:
5240 return reloc_class_relative;
5241 case R_ALPHA_JMP_SLOT:
5242 return reloc_class_plt;
5243 case R_ALPHA_COPY:
5244 return reloc_class_copy;
5245 default:
5246 return reloc_class_normal;
5247 }
5248}
252b5132 5249\f
b35d266b 5250static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5251{
0112cd26
NC
5252 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5253 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5254 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5255};
5256
252b5132
RH
5257/* ECOFF swapping routines. These are used when dealing with the
5258 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5259 from elf32-mips.c. */
252b5132
RH
5260static const struct ecoff_debug_swap
5261elf64_alpha_ecoff_debug_swap =
5262{
5263 /* Symbol table magic number. */
5264 magicSym2,
5265 /* Alignment of debugging information. E.g., 4. */
5266 8,
5267 /* Sizes of external symbolic information. */
5268 sizeof (struct hdr_ext),
5269 sizeof (struct dnr_ext),
5270 sizeof (struct pdr_ext),
5271 sizeof (struct sym_ext),
5272 sizeof (struct opt_ext),
5273 sizeof (struct fdr_ext),
5274 sizeof (struct rfd_ext),
5275 sizeof (struct ext_ext),
5276 /* Functions to swap in external symbolic data. */
5277 ecoff_swap_hdr_in,
5278 ecoff_swap_dnr_in,
5279 ecoff_swap_pdr_in,
5280 ecoff_swap_sym_in,
5281 ecoff_swap_opt_in,
5282 ecoff_swap_fdr_in,
5283 ecoff_swap_rfd_in,
5284 ecoff_swap_ext_in,
5285 _bfd_ecoff_swap_tir_in,
5286 _bfd_ecoff_swap_rndx_in,
5287 /* Functions to swap out external symbolic data. */
5288 ecoff_swap_hdr_out,
5289 ecoff_swap_dnr_out,
5290 ecoff_swap_pdr_out,
5291 ecoff_swap_sym_out,
5292 ecoff_swap_opt_out,
5293 ecoff_swap_fdr_out,
5294 ecoff_swap_rfd_out,
5295 ecoff_swap_ext_out,
5296 _bfd_ecoff_swap_tir_out,
5297 _bfd_ecoff_swap_rndx_out,
5298 /* Function to read in symbolic data. */
5299 elf64_alpha_read_ecoff_info
5300};
5301\f
70bcb145
JW
5302/* Use a non-standard hash bucket size of 8. */
5303
562ace6b 5304static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5305{
5306 sizeof (Elf64_External_Ehdr),
5307 sizeof (Elf64_External_Phdr),
5308 sizeof (Elf64_External_Shdr),
5309 sizeof (Elf64_External_Rel),
5310 sizeof (Elf64_External_Rela),
5311 sizeof (Elf64_External_Sym),
5312 sizeof (Elf64_External_Dyn),
5313 sizeof (Elf_External_Note),
5314 8,
5315 1,
45d6a902 5316 64, 3,
70bcb145
JW
5317 ELFCLASS64, EV_CURRENT,
5318 bfd_elf64_write_out_phdrs,
5319 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5320 bfd_elf64_checksum_contents,
70bcb145 5321 bfd_elf64_write_relocs,
73ff0d56 5322 bfd_elf64_swap_symbol_in,
70bcb145
JW
5323 bfd_elf64_swap_symbol_out,
5324 bfd_elf64_slurp_reloc_table,
5325 bfd_elf64_slurp_symbol_table,
5326 bfd_elf64_swap_dyn_in,
5327 bfd_elf64_swap_dyn_out,
947216bf
AM
5328 bfd_elf64_swap_reloc_in,
5329 bfd_elf64_swap_reloc_out,
5330 bfd_elf64_swap_reloca_in,
5331 bfd_elf64_swap_reloca_out
70bcb145
JW
5332};
5333
252b5132
RH
5334#define TARGET_LITTLE_SYM bfd_elf64_alpha_vec
5335#define TARGET_LITTLE_NAME "elf64-alpha"
5336#define ELF_ARCH bfd_arch_alpha
56fc028e
AJ
5337#define ELF_MACHINE_CODE EM_ALPHA
5338#define ELF_MAXPAGESIZE 0x10000
24718e3b 5339#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5340
5341#define bfd_elf64_bfd_link_hash_table_create \
5342 elf64_alpha_bfd_link_hash_table_create
5343
5344#define bfd_elf64_bfd_reloc_type_lookup \
5345 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5346#define bfd_elf64_bfd_reloc_name_lookup \
5347 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5348#define elf_info_to_howto \
5349 elf64_alpha_info_to_howto
5350
5351#define bfd_elf64_mkobject \
5352 elf64_alpha_mkobject
5353#define elf_backend_object_p \
5354 elf64_alpha_object_p
5355
5356#define elf_backend_section_from_shdr \
5357 elf64_alpha_section_from_shdr
204692d7
RH
5358#define elf_backend_section_flags \
5359 elf64_alpha_section_flags
252b5132
RH
5360#define elf_backend_fake_sections \
5361 elf64_alpha_fake_sections
5362
5363#define bfd_elf64_bfd_is_local_label_name \
5364 elf64_alpha_is_local_label_name
5365#define bfd_elf64_find_nearest_line \
5366 elf64_alpha_find_nearest_line
5367#define bfd_elf64_bfd_relax_section \
5368 elf64_alpha_relax_section
5369
5370#define elf_backend_add_symbol_hook \
5371 elf64_alpha_add_symbol_hook
13285a1b
AM
5372#define elf_backend_relocs_compatible \
5373 _bfd_elf_relocs_compatible
252b5132
RH
5374#define elf_backend_check_relocs \
5375 elf64_alpha_check_relocs
5376#define elf_backend_create_dynamic_sections \
5377 elf64_alpha_create_dynamic_sections
5378#define elf_backend_adjust_dynamic_symbol \
5379 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5380#define elf_backend_merge_symbol_attribute \
5381 elf64_alpha_merge_symbol_attribute
252b5132
RH
5382#define elf_backend_always_size_sections \
5383 elf64_alpha_always_size_sections
5384#define elf_backend_size_dynamic_sections \
5385 elf64_alpha_size_dynamic_sections
74541ad4
AM
5386#define elf_backend_omit_section_dynsym \
5387 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
252b5132
RH
5388#define elf_backend_relocate_section \
5389 elf64_alpha_relocate_section
5390#define elf_backend_finish_dynamic_symbol \
5391 elf64_alpha_finish_dynamic_symbol
5392#define elf_backend_finish_dynamic_sections \
5393 elf64_alpha_finish_dynamic_sections
5394#define bfd_elf64_bfd_final_link \
5395 elf64_alpha_final_link
fcfbdf31
JJ
5396#define elf_backend_reloc_type_class \
5397 elf64_alpha_reloc_type_class
252b5132
RH
5398
5399#define elf_backend_ecoff_debug_swap \
5400 &elf64_alpha_ecoff_debug_swap
5401
70bcb145
JW
5402#define elf_backend_size_info \
5403 alpha_elf_size_info
5404
29ef7005
L
5405#define elf_backend_special_sections \
5406 elf64_alpha_special_sections
2f89ff8d 5407
38b1a46c 5408/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5409#define elf_backend_want_got_plt 0
5410#define elf_backend_plt_readonly 0
5411#define elf_backend_want_plt_sym 1
5412#define elf_backend_got_header_size 0
252b5132
RH
5413
5414#include "elf64-target.h"
2238051f
RH
5415\f
5416/* FreeBSD support. */
5417
5418#undef TARGET_LITTLE_SYM
5419#define TARGET_LITTLE_SYM bfd_elf64_alpha_freebsd_vec
5420#undef TARGET_LITTLE_NAME
5421#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5422#undef ELF_OSABI
5423#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5424
5425/* The kernel recognizes executables as valid only if they carry a
5426 "FreeBSD" label in the ELF header. So we put this label on all
5427 executables and (for simplicity) also all other object files. */
5428
2238051f 5429static void
a7519a3c
RH
5430elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5431 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5432{
5433 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5434
5435 i_ehdrp = elf_elfheader (abfd);
5436
5437 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5438 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5439#ifdef OLD_FREEBSD_ABI_LABEL
5440 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5441 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5442#endif
5443}
5444
5445#undef elf_backend_post_process_headers
5446#define elf_backend_post_process_headers \
5447 elf64_alpha_fbsd_post_process_headers
5448
571fe01f 5449#undef elf64_bed
2238051f
RH
5450#define elf64_bed elf64_alpha_fbsd_bed
5451
5452#include "elf64-target.h"