[PATCH] bfd: tweak SET_ARCH_MACH of aout-cris.c
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
b3adc24a 2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
1f7f2abb
L
147 /* Which section this relocation is against? */
148 asection *sec;
21d799b5
NC
149
150 /* How many did we find? */
151 unsigned long count;
1f7f2abb
L
152
153 /* What kind of relocation? */
154 unsigned int rtype;
21d799b5
NC
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
2c3fc389 213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
68ffbac6 227/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
986f0783 283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
698600e4
AM
301/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304struct alpha_elf_find_line
305{
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308};
309
252b5132
RH
310/* We have some private fields hanging off of the elf_tdata structure. */
311
312struct alpha_elf_obj_tdata
313{
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
3765b1be
RH
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
252b5132 335
3765b1be 336 /* For every got, this is the sum of the number of words required
252b5132 337 to hold all of the member object's local got. */
3765b1be 338 int local_got_size;
698600e4
AM
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
252b5132
RH
343};
344
345#define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
0ffa91dd
NC
348#define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
4dfe6ac6 351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 352
b34976b6 353static bfd_boolean
a7519a3c 354elf64_alpha_mkobject (bfd *abfd)
252b5132 355{
0ffa91dd 356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 357 ALPHA_ELF_DATA);
252b5132
RH
358}
359
b34976b6 360static bfd_boolean
a7519a3c 361elf64_alpha_object_p (bfd *abfd)
252b5132 362{
252b5132
RH
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365}
366\f
a7519a3c
RH
367/* A relocation function which doesn't do anything. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 372 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378}
379
380/* A relocation function used for an unsupported reloc. */
381
382static bfd_reloc_status_type
383elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 385 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387{
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391}
392
393/* Do the work of the GPDISP relocation. */
394
395static bfd_reloc_status_type
396elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398{
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431}
432
433/* The special function for the GPDISP reloc. */
434
435static bfd_reloc_status_type
436elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440{
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476}
477
252b5132
RH
478/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480#define MINUS_ONE (((bfd_vma)0) - 1)
481
21d799b5 482
dfe57ca0 483#define SKIP_HOWTO(N) \
21d799b5 484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 485
252b5132
RH
486static reloc_howto_type elf64_alpha_howto_table[] =
487{
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
6346d5ca
AM
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
b34976b6 492 TRUE, /* pc_relative */
252b5132
RH
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
b34976b6 497 FALSE, /* partial_inplace */
252b5132
RH
498 0, /* src_mask */
499 0, /* dst_mask */
b34976b6 500 TRUE), /* pcrel_offset */
252b5132
RH
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
b34976b6 507 FALSE, /* pc_relative */
252b5132
RH
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 510 bfd_elf_generic_reloc, /* special_function */
252b5132 511 "REFLONG", /* name */
b34976b6 512 FALSE, /* partial_inplace */
252b5132
RH
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
b34976b6 515 FALSE), /* pcrel_offset */
252b5132
RH
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
b34976b6 522 FALSE, /* pc_relative */
252b5132
RH
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 525 bfd_elf_generic_reloc, /* special_function */
252b5132 526 "REFQUAD", /* name */
b34976b6 527 FALSE, /* partial_inplace */
252b5132
RH
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
b34976b6 530 FALSE), /* pcrel_offset */
252b5132
RH
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
b34976b6 539 FALSE, /* pc_relative */
252b5132
RH
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 542 bfd_elf_generic_reloc, /* special_function */
252b5132 543 "GPREL32", /* name */
b34976b6 544 FALSE, /* partial_inplace */
252b5132
RH
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
b34976b6 547 FALSE), /* pcrel_offset */
252b5132
RH
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
dfe57ca0 552 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 553 16, /* bitsize */
b34976b6 554 FALSE, /* pc_relative */
252b5132
RH
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 557 bfd_elf_generic_reloc, /* special_function */
252b5132 558 "ELF_LITERAL", /* name */
b34976b6 559 FALSE, /* partial_inplace */
252b5132
RH
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
b34976b6 562 FALSE), /* pcrel_offset */
252b5132
RH
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
dfe57ca0 573 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 574 32, /* bitsize */
b34976b6 575 FALSE, /* pc_relative */
252b5132
RH
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
b34976b6 580 FALSE, /* partial_inplace */
252b5132
RH
581 0, /* src_mask */
582 0, /* dst_mask */
b34976b6 583 FALSE), /* pcrel_offset */
252b5132
RH
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
b34976b6 605 FALSE, /* pc_relative */
252b5132
RH
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
b34976b6 610 FALSE, /* partial_inplace */
252b5132
RH
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
b34976b6 613 TRUE), /* pcrel_offset */
252b5132
RH
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
b34976b6 620 TRUE, /* pc_relative */
252b5132
RH
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 623 bfd_elf_generic_reloc, /* special_function */
252b5132 624 "BRADDR", /* name */
b34976b6 625 FALSE, /* partial_inplace */
252b5132
RH
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
b34976b6 628 TRUE), /* pcrel_offset */
252b5132
RH
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
dfe57ca0 633 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 634 14, /* bitsize */
b34976b6 635 TRUE, /* pc_relative */
252b5132
RH
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 638 bfd_elf_generic_reloc, /* special_function */
252b5132 639 "HINT", /* name */
b34976b6 640 FALSE, /* partial_inplace */
252b5132
RH
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
b34976b6 643 TRUE), /* pcrel_offset */
252b5132
RH
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 TRUE, /* pc_relative */
252b5132
RH
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 653 bfd_elf_generic_reloc, /* special_function */
252b5132 654 "SREL16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
252b5132
RH
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 TRUE), /* pcrel_offset */
252b5132
RH
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
252b5132
RH
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 668 bfd_elf_generic_reloc, /* special_function */
252b5132 669 "SREL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
252b5132
RH
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
252b5132
RH
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
b34976b6 680 TRUE, /* pc_relative */
252b5132
RH
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 683 bfd_elf_generic_reloc, /* special_function */
252b5132 684 "SREL64", /* name */
b34976b6 685 FALSE, /* partial_inplace */
252b5132
RH
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
b34976b6 688 TRUE), /* pcrel_offset */
252b5132 689
dfe57ca0
RH
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
252b5132
RH
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
dfe57ca0 700 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 705 bfd_elf_generic_reloc, /* special_function */
252b5132 706 "GPRELHIGH", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132
RH
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
dfe57ca0 715 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132
RH
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 720 bfd_elf_generic_reloc, /* special_function */
252b5132 721 "GPRELLOW", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132
RH
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132
RH
726
727 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 728 HOWTO (R_ALPHA_GPREL16,
252b5132 729 0, /* rightshift */
dfe57ca0 730 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 735 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 736 "GPREL16", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
dfe57ca0
RH
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
252b5132 747
fe8bc63d 748 /* Misc ELF relocations. */
252b5132
RH
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
b34976b6 758 FALSE,
252b5132
RH
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
b34976b6 763 FALSE,
252b5132
RH
764 0,
765 0,
b34976b6 766 TRUE),
252b5132
RH
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
b34976b6 773 FALSE,
252b5132
RH
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
b34976b6 778 FALSE,
252b5132
RH
779 0,
780 0,
b34976b6 781 TRUE),
252b5132
RH
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
b34976b6 788 FALSE,
252b5132
RH
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
b34976b6 793 FALSE,
252b5132
RH
794 0,
795 0,
b34976b6 796 TRUE),
252b5132
RH
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
b34976b6 803 FALSE,
252b5132
RH
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
b34976b6 808 FALSE,
252b5132
RH
809 0,
810 0,
b34976b6 811 TRUE),
7793f4d0
RH
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
7793f4d0
RH
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 821 bfd_elf_generic_reloc, /* special_function */
7793f4d0 822 "BRSGP", /* name */
b34976b6 823 FALSE, /* partial_inplace */
7793f4d0
RH
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
3765b1be
RH
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
b34976b6 833 FALSE, /* pc_relative */
3765b1be
RH
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 836 bfd_elf_generic_reloc, /* special_function */
3765b1be 837 "TLSGD", /* name */
b34976b6 838 FALSE, /* partial_inplace */
3765b1be
RH
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
b34976b6 841 FALSE), /* pcrel_offset */
3765b1be
RH
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 851 bfd_elf_generic_reloc, /* special_function */
3765b1be 852 "TLSLDM", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 866 bfd_elf_generic_reloc, /* special_function */
3765b1be 867 "DTPMOD64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
b34976b6 879 FALSE, /* pc_relative */
3765b1be
RH
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 882 bfd_elf_generic_reloc, /* special_function */
3765b1be 883 "GOTDTPREL", /* name */
b34976b6 884 FALSE, /* partial_inplace */
3765b1be
RH
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
b34976b6 887 FALSE), /* pcrel_offset */
3765b1be
RH
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
3765b1be
RH
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 897 bfd_elf_generic_reloc, /* special_function */
3765b1be 898 "DTPREL64", /* name */
b34976b6 899 FALSE, /* partial_inplace */
3765b1be
RH
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
3765b1be
RH
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
3765b1be
RH
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 912 bfd_elf_generic_reloc, /* special_function */
3765b1be 913 "DTPRELHI", /* name */
b34976b6 914 FALSE, /* partial_inplace */
3765b1be
RH
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
3765b1be
RH
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 927 bfd_elf_generic_reloc, /* special_function */
3765b1be 928 "DTPRELLO", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 942 bfd_elf_generic_reloc, /* special_function */
3765b1be 943 "DTPREL16", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
b34976b6 955 FALSE, /* pc_relative */
3765b1be
RH
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 958 bfd_elf_generic_reloc, /* special_function */
3765b1be 959 "GOTTPREL", /* name */
b34976b6 960 FALSE, /* partial_inplace */
3765b1be
RH
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
b34976b6 963 FALSE), /* pcrel_offset */
3765b1be
RH
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
b34976b6 970 FALSE, /* pc_relative */
3765b1be
RH
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 973 bfd_elf_generic_reloc, /* special_function */
3765b1be 974 "TPREL64", /* name */
b34976b6 975 FALSE, /* partial_inplace */
3765b1be
RH
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
b34976b6 978 FALSE), /* pcrel_offset */
3765b1be
RH
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
3765b1be
RH
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 988 bfd_elf_generic_reloc, /* special_function */
3765b1be 989 "TPRELHI", /* name */
b34976b6 990 FALSE, /* partial_inplace */
3765b1be
RH
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
3765b1be
RH
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
b34976b6 1000 FALSE, /* pc_relative */
3765b1be
RH
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1003 bfd_elf_generic_reloc, /* special_function */
3765b1be 1004 "TPRELLO", /* name */
b34976b6 1005 FALSE, /* partial_inplace */
3765b1be
RH
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
b34976b6 1008 FALSE), /* pcrel_offset */
3765b1be
RH
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
b34976b6 1015 FALSE, /* pc_relative */
3765b1be
RH
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1018 bfd_elf_generic_reloc, /* special_function */
3765b1be 1019 "TPREL16", /* name */
b34976b6 1020 FALSE, /* partial_inplace */
3765b1be
RH
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
b34976b6 1023 FALSE), /* pcrel_offset */
252b5132
RH
1024};
1025
252b5132
RH
1026/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028struct elf_reloc_map
1029{
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032};
1033
1034static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035{
dfe57ca0
RH
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1066};
1067
1068/* Given a BFD reloc type, return a HOWTO structure. */
1069
1070static reloc_howto_type *
a7519a3c
RH
1071elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
252b5132
RH
1073{
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083}
1084
157090f7
AM
1085static reloc_howto_type *
1086elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088{
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100}
1101
252b5132
RH
1102/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
f3185997 1104static bfd_boolean
0aa13fee 1105elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1106 Elf_Internal_Rela *dst)
252b5132 1107{
a7519a3c 1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
695344c0 1112 /* xgettext:c-format */
0aa13fee 1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1114 abfd, r_type);
cd21f5da 1115 bfd_set_error (bfd_error_bad_value);
f3185997 1116 return FALSE;
cd21f5da 1117 }
252b5132 1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1119 return TRUE;
252b5132 1120}
3765b1be
RH
1121
1122/* These two relocations create a two-word entry in the got. */
1123#define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1125
1126/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1127#define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1129
1130/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1132#define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1136\f
a7519a3c
RH
1137/* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
bf577467 1139 type. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
fd361982
AM
1170 if (!bfd_set_section_flags (newsect,
1171 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1172 return FALSE;
252b5132 1173 }
a7519a3c
RH
1174
1175 return TRUE;
252b5132
RH
1176}
1177
a7519a3c
RH
1178/* Convert Alpha specific section flags to bfd internal section flags. */
1179
b34976b6 1180static bfd_boolean
8c803a2d 1181elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
252b5132 1182{
a7519a3c 1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
8c803a2d 1184 hdr->bfd_section->flags |= SEC_SMALL_DATA;
252b5132 1185
a7519a3c
RH
1186 return TRUE;
1187}
252b5132 1188
a7519a3c
RH
1189/* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
9e756d64 1191
a7519a3c
RH
1192static bfd_boolean
1193elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194{
1195 register const char *name;
1196
fd361982 1197 name = bfd_section_name (sec);
a7519a3c
RH
1198
1199 if (strcmp (name, ".mdebug") == 0)
252b5132 1200 {
a7519a3c
RH
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1203 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
252b5132 1208 }
a7519a3c
RH
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1215
a7519a3c
RH
1216 return TRUE;
1217}
252b5132 1218
a7519a3c
RH
1219/* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222static bfd_boolean
1223elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228{
1229 if (sym->st_shndx == SHN_COMMON
0e1862bb 1230 && !bfd_link_relocatable (info)
a7519a3c 1231 && sym->st_size <= elf_gp_size (abfd))
252b5132 1232 {
a7519a3c
RH
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
ffcb7aff 1235
a7519a3c 1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1237
a7519a3c 1238 if (scomm == NULL)
252b5132 1239 {
a7519a3c
RH
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
ffcb7aff 1247
a7519a3c
RH
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
ffcb7aff 1251
a7519a3c
RH
1252 return TRUE;
1253}
252b5132 1254
a7519a3c 1255/* Create the .got section. */
252b5132 1256
a7519a3c
RH
1257static bfd_boolean
1258elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260{
85d162e6 1261 flagword flags;
a7519a3c 1262 asection *s;
252b5132 1263
0ffa91dd
NC
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
85d162e6
AM
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1270 if (s == NULL
fd361982 1271 || !bfd_set_section_alignment (s, 3))
a7519a3c 1272 return FALSE;
252b5132 1273
a7519a3c 1274 alpha_elf_tdata (abfd)->got = s;
252b5132 1275
85d162e6
AM
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
a7519a3c
RH
1281 return TRUE;
1282}
252b5132 1283
a7519a3c 1284/* Create all the dynamic sections. */
252b5132 1285
a7519a3c
RH
1286static bfd_boolean
1287elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288{
1289 asection *s;
85d162e6 1290 flagword flags;
a7519a3c 1291 struct elf_link_hash_entry *h;
252b5132 1292
0ffa91dd
NC
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
a7519a3c 1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1297
85d162e6
AM
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1302 elf_hash_table (info)->splt = s;
fd361982 1303 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1304 return FALSE;
252b5132 1305
a7519a3c
RH
1306 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1307 .plt section. */
7325306f
RS
1308 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1309 "_PROCEDURE_LINKAGE_TABLE_");
1310 elf_hash_table (info)->hplt = h;
1311 if (h == NULL)
a7519a3c 1312 return FALSE;
d6ad34f6 1313
85d162e6
AM
1314 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1315 | SEC_LINKER_CREATED | SEC_READONLY);
1316 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1317 elf_hash_table (info)->srelplt = s;
fd361982 1318 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1319 return FALSE;
252b5132 1320
6ec7057a
RH
1321 if (elf64_alpha_use_secureplt)
1322 {
85d162e6
AM
1323 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1324 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1325 elf_hash_table (info)->sgotplt = s;
fd361982 1326 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1327 return FALSE;
1328 }
1329
a7519a3c
RH
1330 /* We may or may not have created a .got section for this object, but
1331 we definitely havn't done the rest of the work. */
1cd6895c 1332
85d162e6
AM
1333 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1334 {
1335 if (!elf64_alpha_create_got_section (abfd, info))
1336 return FALSE;
1337 }
1cd6895c 1338
85d162e6
AM
1339 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1340 | SEC_LINKER_CREATED | SEC_READONLY);
1341 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1342 elf_hash_table (info)->srelgot = s;
a7519a3c 1343 if (s == NULL
fd361982 1344 || !bfd_set_section_alignment (s, 3))
a7519a3c 1345 return FALSE;
252b5132 1346
a7519a3c
RH
1347 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1348 dynobj's .got section. We don't do this in the linker script
1349 because we don't want to define the symbol if we are not creating
1350 a global offset table. */
d98685ac
AM
1351 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1352 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1353 elf_hash_table (info)->hgot = h;
d98685ac
AM
1354 if (h == NULL)
1355 return FALSE;
252b5132 1356
a7519a3c 1357 return TRUE;
252b5132 1358}
a7519a3c
RH
1359\f
1360/* Read ECOFF debugging information from a .mdebug section into a
1361 ecoff_debug_info structure. */
252b5132 1362
a7519a3c
RH
1363static bfd_boolean
1364elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1365 struct ecoff_debug_info *debug)
252b5132 1366{
a7519a3c
RH
1367 HDRR *symhdr;
1368 const struct ecoff_debug_swap *swap;
1369 char *ext_hdr = NULL;
252b5132 1370
a7519a3c
RH
1371 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1372 memset (debug, 0, sizeof (*debug));
252b5132 1373
a7519a3c
RH
1374 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1375 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1376 goto error_return;
252b5132 1377
a7519a3c
RH
1378 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1379 swap->external_hdr_size))
1380 goto error_return;
252b5132 1381
a7519a3c
RH
1382 symhdr = &debug->symbolic_header;
1383 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1384
a7519a3c
RH
1385 /* The symbolic header contains absolute file offsets and sizes to
1386 read. */
1387#define READ(ptr, offset, count, size, type) \
1f4361a7 1388 do \
a7519a3c 1389 { \
1f4361a7
AM
1390 size_t amt; \
1391 debug->ptr = NULL; \
1392 if (symhdr->count == 0) \
1393 break; \
1394 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1395 { \
1396 bfd_set_error (bfd_error_file_too_big); \
1397 goto error_return; \
1398 } \
2bb3687b 1399 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1400 goto error_return; \
2bb3687b
AM
1401 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1402 if (debug->ptr == NULL) \
a7519a3c 1403 goto error_return; \
1f4361a7 1404 } while (0)
fe8bc63d 1405
a7519a3c 1406 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1407 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1408 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1409 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1410 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1411 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1412 union aux_ext *);
1413 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1414 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1415 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1416 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1417 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1418#undef READ
252b5132 1419
a7519a3c 1420 debug->fdr = NULL;
252b5132 1421
a7519a3c 1422 return TRUE;
252b5132 1423
a7519a3c
RH
1424 error_return:
1425 if (ext_hdr != NULL)
1426 free (ext_hdr);
1427 if (debug->line != NULL)
1428 free (debug->line);
1429 if (debug->external_dnr != NULL)
1430 free (debug->external_dnr);
1431 if (debug->external_pdr != NULL)
1432 free (debug->external_pdr);
1433 if (debug->external_sym != NULL)
1434 free (debug->external_sym);
1435 if (debug->external_opt != NULL)
1436 free (debug->external_opt);
1437 if (debug->external_aux != NULL)
1438 free (debug->external_aux);
1439 if (debug->ss != NULL)
1440 free (debug->ss);
1441 if (debug->ssext != NULL)
1442 free (debug->ssext);
1443 if (debug->external_fdr != NULL)
1444 free (debug->external_fdr);
1445 if (debug->external_rfd != NULL)
1446 free (debug->external_rfd);
1447 if (debug->external_ext != NULL)
1448 free (debug->external_ext);
1449 return FALSE;
252b5132
RH
1450}
1451
a7519a3c
RH
1452/* Alpha ELF local labels start with '$'. */
1453
b34976b6 1454static bfd_boolean
a7519a3c 1455elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1456{
a7519a3c
RH
1457 return name[0] == '$';
1458}
9e756d64 1459
a7519a3c 1460static bfd_boolean
fb167eb2
AM
1461elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1462 asection *section, bfd_vma offset,
1463 const char **filename_ptr,
a7519a3c 1464 const char **functionname_ptr,
fb167eb2
AM
1465 unsigned int *line_ptr,
1466 unsigned int *discriminator_ptr)
a7519a3c
RH
1467{
1468 asection *msec;
252b5132 1469
fb167eb2 1470 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1471 filename_ptr, functionname_ptr,
fb167eb2 1472 line_ptr, discriminator_ptr,
9defd221 1473 dwarf_debug_sections,
7f3bf384
AM
1474 &elf_tdata (abfd)->dwarf2_find_line_info)
1475 == 1)
b34976b6 1476 return TRUE;
9e756d64 1477
a7519a3c
RH
1478 msec = bfd_get_section_by_name (abfd, ".mdebug");
1479 if (msec != NULL)
1bbc9cec 1480 {
a7519a3c 1481 flagword origflags;
698600e4 1482 struct alpha_elf_find_line *fi;
a7519a3c
RH
1483 const struct ecoff_debug_swap * const swap =
1484 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1485
a7519a3c
RH
1486 /* If we are called during a link, alpha_elf_final_link may have
1487 cleared the SEC_HAS_CONTENTS field. We force it back on here
1488 if appropriate (which it normally will be). */
1489 origflags = msec->flags;
1490 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1491 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1492
698600e4 1493 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1494 if (fi == NULL)
1495 {
1496 bfd_size_type external_fdr_size;
1497 char *fraw_src;
1498 char *fraw_end;
1499 struct fdr *fdr_ptr;
698600e4 1500 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1501
698600e4 1502 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1503 if (fi == NULL)
1504 {
1505 msec->flags = origflags;
1506 return FALSE;
1507 }
9e756d64 1508
a7519a3c
RH
1509 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1510 {
1511 msec->flags = origflags;
1512 return FALSE;
1513 }
9e756d64 1514
a7519a3c
RH
1515 /* Swap in the FDR information. */
1516 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1517 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1518 if (fi->d.fdr == NULL)
1519 {
1520 msec->flags = origflags;
1521 return FALSE;
1522 }
1523 external_fdr_size = swap->external_fdr_size;
1524 fdr_ptr = fi->d.fdr;
1525 fraw_src = (char *) fi->d.external_fdr;
1526 fraw_end = (fraw_src
1527 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1528 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1529 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1530
698600e4 1531 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1532
a7519a3c 1533 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1534 find_nearest_line is either called all the time, as in
1535 objdump -l, so the information should be saved, or it is
1536 rarely called, as in ld error messages, so the memory
1537 wasted is unimportant. Still, it would probably be a
1538 good idea for free_cached_info to throw it away. */
a7519a3c 1539 }
9e756d64 1540
a7519a3c
RH
1541 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1542 &fi->i, filename_ptr, functionname_ptr,
1543 line_ptr))
1544 {
1545 msec->flags = origflags;
1546 return TRUE;
1547 }
9e756d64 1548
a7519a3c 1549 msec->flags = origflags;
9e756d64 1550 }
9e756d64 1551
a7519a3c 1552 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1553
fb167eb2 1554 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1555 filename_ptr, functionname_ptr,
fb167eb2 1556 line_ptr, discriminator_ptr);
9e756d64 1557}
a7519a3c
RH
1558\f
1559/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1560
a7519a3c 1561struct extsym_info
9e756d64 1562{
a7519a3c
RH
1563 bfd *abfd;
1564 struct bfd_link_info *info;
1565 struct ecoff_debug_info *debug;
1566 const struct ecoff_debug_swap *swap;
1567 bfd_boolean failed;
1568};
9e756d64 1569
a7519a3c 1570static bfd_boolean
2c3fc389 1571elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1572{
1573 struct extsym_info *einfo = (struct extsym_info *) data;
1574 bfd_boolean strip;
1575 asection *sec, *output_section;
9e756d64 1576
a7519a3c
RH
1577 if (h->root.indx == -2)
1578 strip = FALSE;
1579 else if ((h->root.def_dynamic
1580 || h->root.ref_dynamic
1581 || h->root.root.type == bfd_link_hash_new)
1582 && !h->root.def_regular
1583 && !h->root.ref_regular)
1584 strip = TRUE;
1585 else if (einfo->info->strip == strip_all
1586 || (einfo->info->strip == strip_some
1587 && bfd_hash_lookup (einfo->info->keep_hash,
1588 h->root.root.root.string,
1589 FALSE, FALSE) == NULL))
1590 strip = TRUE;
1591 else
1592 strip = FALSE;
9e756d64 1593
a7519a3c 1594 if (strip)
b34976b6 1595 return TRUE;
9e756d64 1596
a7519a3c 1597 if (h->esym.ifd == -2)
9e756d64 1598 {
a7519a3c
RH
1599 h->esym.jmptbl = 0;
1600 h->esym.cobol_main = 0;
1601 h->esym.weakext = 0;
1602 h->esym.reserved = 0;
1603 h->esym.ifd = ifdNil;
1604 h->esym.asym.value = 0;
1605 h->esym.asym.st = stGlobal;
9e756d64 1606
a7519a3c
RH
1607 if (h->root.root.type != bfd_link_hash_defined
1608 && h->root.root.type != bfd_link_hash_defweak)
1609 h->esym.asym.sc = scAbs;
1610 else
1611 {
1612 const char *name;
9e756d64 1613
a7519a3c
RH
1614 sec = h->root.root.u.def.section;
1615 output_section = sec->output_section;
9e756d64 1616
a7519a3c
RH
1617 /* When making a shared library and symbol h is the one from
1618 the another shared library, OUTPUT_SECTION may be null. */
1619 if (output_section == NULL)
1620 h->esym.asym.sc = scUndefined;
1621 else
1622 {
fd361982 1623 name = bfd_section_name (output_section);
9e756d64 1624
a7519a3c
RH
1625 if (strcmp (name, ".text") == 0)
1626 h->esym.asym.sc = scText;
1627 else if (strcmp (name, ".data") == 0)
1628 h->esym.asym.sc = scData;
1629 else if (strcmp (name, ".sdata") == 0)
1630 h->esym.asym.sc = scSData;
1631 else if (strcmp (name, ".rodata") == 0
1632 || strcmp (name, ".rdata") == 0)
1633 h->esym.asym.sc = scRData;
1634 else if (strcmp (name, ".bss") == 0)
1635 h->esym.asym.sc = scBss;
1636 else if (strcmp (name, ".sbss") == 0)
1637 h->esym.asym.sc = scSBss;
1638 else if (strcmp (name, ".init") == 0)
1639 h->esym.asym.sc = scInit;
1640 else if (strcmp (name, ".fini") == 0)
1641 h->esym.asym.sc = scFini;
1642 else
1643 h->esym.asym.sc = scAbs;
1644 }
1645 }
9e756d64 1646
a7519a3c
RH
1647 h->esym.asym.reserved = 0;
1648 h->esym.asym.index = indexNil;
1649 }
9e756d64 1650
a7519a3c
RH
1651 if (h->root.root.type == bfd_link_hash_common)
1652 h->esym.asym.value = h->root.root.u.c.size;
1653 else if (h->root.root.type == bfd_link_hash_defined
1654 || h->root.root.type == bfd_link_hash_defweak)
1655 {
1656 if (h->esym.asym.sc == scCommon)
1657 h->esym.asym.sc = scBss;
1658 else if (h->esym.asym.sc == scSCommon)
1659 h->esym.asym.sc = scSBss;
9e756d64 1660
a7519a3c
RH
1661 sec = h->root.root.u.def.section;
1662 output_section = sec->output_section;
1663 if (output_section != NULL)
1664 h->esym.asym.value = (h->root.root.u.def.value
1665 + sec->output_offset
1666 + output_section->vma);
1667 else
1668 h->esym.asym.value = 0;
1669 }
9e756d64 1670
a7519a3c
RH
1671 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1672 h->root.root.root.string,
1673 &h->esym))
1674 {
1675 einfo->failed = TRUE;
1676 return FALSE;
9e756d64
RH
1677 }
1678
a7519a3c
RH
1679 return TRUE;
1680}
1681\f
1682/* Search for and possibly create a got entry. */
9e756d64 1683
a7519a3c
RH
1684static struct alpha_elf_got_entry *
1685get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1686 unsigned long r_type, unsigned long r_symndx,
1687 bfd_vma r_addend)
1688{
1689 struct alpha_elf_got_entry *gotent;
1690 struct alpha_elf_got_entry **slot;
9e756d64 1691
a7519a3c
RH
1692 if (h)
1693 slot = &h->got_entries;
1694 else
1695 {
1696 /* This is a local .got entry -- record for merge. */
9e756d64 1697
a7519a3c 1698 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1699
a7519a3c
RH
1700 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1701 if (!local_got_entries)
1702 {
1703 bfd_size_type size;
1704 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1705
a7519a3c
RH
1706 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1707 size = symtab_hdr->sh_info;
1708 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1709
a7519a3c
RH
1710 local_got_entries
1711 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1712 if (!local_got_entries)
1713 return NULL;
1714
1715 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1716 }
1717
1718 slot = &local_got_entries[r_symndx];
9e756d64
RH
1719 }
1720
a7519a3c
RH
1721 for (gotent = *slot; gotent ; gotent = gotent->next)
1722 if (gotent->gotobj == abfd
1723 && gotent->reloc_type == r_type
1724 && gotent->addend == r_addend)
1725 break;
1726
1727 if (!gotent)
9e756d64 1728 {
a7519a3c 1729 int entry_size;
986f0783 1730 size_t amt;
9e756d64 1731
a7519a3c
RH
1732 amt = sizeof (struct alpha_elf_got_entry);
1733 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1734 if (!gotent)
1735 return NULL;
9e756d64 1736
a7519a3c
RH
1737 gotent->gotobj = abfd;
1738 gotent->addend = r_addend;
1739 gotent->got_offset = -1;
6ec7057a 1740 gotent->plt_offset = -1;
a7519a3c
RH
1741 gotent->use_count = 1;
1742 gotent->reloc_type = r_type;
1743 gotent->reloc_done = 0;
1744 gotent->reloc_xlated = 0;
9e756d64 1745
a7519a3c
RH
1746 gotent->next = *slot;
1747 *slot = gotent;
9e756d64 1748
a7519a3c
RH
1749 entry_size = alpha_got_entry_size (r_type);
1750 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1751 if (!h)
1752 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1753 }
a7519a3c
RH
1754 else
1755 gotent->use_count += 1;
9e756d64 1756
a7519a3c 1757 return gotent;
9e756d64
RH
1758}
1759
6ec7057a
RH
1760static bfd_boolean
1761elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1762{
1763 return ((ah->root.type == STT_FUNC
1764 || ah->root.root.type == bfd_link_hash_undefweak
1765 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1766 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1767 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1768}
1769
6fc5bb57
AM
1770/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1771 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1772 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1773 relocs to be sorted. */
1774
1775static bfd_boolean
1776elf64_alpha_sort_relocs_p (asection *sec)
1777{
1778 return (sec->flags & SEC_CODE) == 0;
1779}
1780
1781
a7519a3c
RH
1782/* Handle dynamic relocations when doing an Alpha ELF link. */
1783
b34976b6 1784static bfd_boolean
a7519a3c
RH
1785elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1786 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1787{
a7519a3c
RH
1788 bfd *dynobj;
1789 asection *sreloc;
252b5132 1790 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1791 struct alpha_elf_link_hash_entry **sym_hashes;
1792 const Elf_Internal_Rela *rel, *relend;
252b5132 1793
0e1862bb 1794 if (bfd_link_relocatable (info))
a7519a3c 1795 return TRUE;
252b5132 1796
a7519a3c
RH
1797 /* Don't do anything special with non-loaded, non-alloced sections.
1798 In particular, any relocs in such sections should not affect GOT
1799 and PLT reference counting (ie. we don't allow them to create GOT
1800 or PLT entries), there's no possibility or desire to optimize TLS
1801 relocs, and there's not much point in propagating relocs to shared
1802 libs that the dynamic linker won't relocate. */
1803 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1804 return TRUE;
252b5132 1805
0ffa91dd
NC
1806 BFD_ASSERT (is_alpha_elf (abfd));
1807
1808 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1809 if (dynobj == NULL)
0ffa91dd 1810 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1811
a7519a3c 1812 sreloc = NULL;
0ffa91dd
NC
1813 symtab_hdr = &elf_symtab_hdr (abfd);
1814 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1815
1816 relend = relocs + sec->reloc_count;
1817 for (rel = relocs; rel < relend; ++rel)
1818 {
1819 enum {
1820 NEED_GOT = 1,
1821 NEED_GOT_ENTRY = 2,
1822 NEED_DYNREL = 4
1823 };
1824
1825 unsigned long r_symndx, r_type;
1826 struct alpha_elf_link_hash_entry *h;
1827 unsigned int gotent_flags;
1828 bfd_boolean maybe_dynamic;
1829 unsigned int need;
1830 bfd_vma addend;
1831
1832 r_symndx = ELF64_R_SYM (rel->r_info);
1833 if (r_symndx < symtab_hdr->sh_info)
1834 h = NULL;
1835 else
1836 {
1837 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1838
a7519a3c
RH
1839 while (h->root.root.type == bfd_link_hash_indirect
1840 || h->root.root.type == bfd_link_hash_warning)
1841 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1842
81fbe831
AM
1843 /* PR15323, ref flags aren't set for references in the same
1844 object. */
a7519a3c
RH
1845 h->root.ref_regular = 1;
1846 }
252b5132 1847
a7519a3c 1848 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1849 locally or externally defined, as not all of the input files
1850 have yet been processed. Do something with what we know, as
1851 this may help reduce memory usage and processing time later. */
a7519a3c 1852 maybe_dynamic = FALSE;
0e1862bb 1853 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1854 && (!info->symbolic
1855 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1856 || !h->root.def_regular
1857 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1858 maybe_dynamic = TRUE;
252b5132 1859
a7519a3c
RH
1860 need = 0;
1861 gotent_flags = 0;
1862 r_type = ELF64_R_TYPE (rel->r_info);
1863 addend = rel->r_addend;
9e756d64 1864
9e756d64
RH
1865 switch (r_type)
1866 {
1867 case R_ALPHA_LITERAL:
a7519a3c
RH
1868 need = NEED_GOT | NEED_GOT_ENTRY;
1869
1870 /* Remember how this literal is used from its LITUSEs.
1871 This will be important when it comes to decide if we can
1872 create a .plt entry for a function symbol. */
1873 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1874 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1875 gotent_flags |= 1 << rel->r_addend;
1876 --rel;
1877
1878 /* No LITUSEs -- presumably the address is used somehow. */
1879 if (gotent_flags == 0)
1880 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1881 break;
1882
1883 case R_ALPHA_GPDISP:
1884 case R_ALPHA_GPREL16:
1885 case R_ALPHA_GPREL32:
9e756d64
RH
1886 case R_ALPHA_GPRELHIGH:
1887 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1888 case R_ALPHA_BRSGP:
1889 need = NEED_GOT;
1890 break;
1891
1892 case R_ALPHA_REFLONG:
1893 case R_ALPHA_REFQUAD:
0e1862bb 1894 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1895 need = NEED_DYNREL;
cc03ec80
RH
1896 break;
1897
9e756d64 1898 case R_ALPHA_TLSLDM:
cc03ec80 1899 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1900 reloc to the STN_UNDEF (0) symbol so that they all match. */
1901 r_symndx = STN_UNDEF;
a7519a3c
RH
1902 h = 0;
1903 maybe_dynamic = FALSE;
1904 /* FALLTHRU */
1905
1906 case R_ALPHA_TLSGD:
1907 case R_ALPHA_GOTDTPREL:
1908 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1909 break;
cc03ec80 1910
a7519a3c
RH
1911 case R_ALPHA_GOTTPREL:
1912 need = NEED_GOT | NEED_GOT_ENTRY;
1913 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1914 if (bfd_link_pic (info))
a7519a3c
RH
1915 info->flags |= DF_STATIC_TLS;
1916 break;
1917
1918 case R_ALPHA_TPREL64:
3cbc1e5e 1919 if (bfd_link_dll (info))
e366eeae
RH
1920 {
1921 info->flags |= DF_STATIC_TLS;
1922 need = NEED_DYNREL;
1923 }
1924 else if (maybe_dynamic)
a7519a3c 1925 need = NEED_DYNREL;
a7519a3c 1926 break;
252b5132
RH
1927 }
1928
a7519a3c 1929 if (need & NEED_GOT)
252b5132 1930 {
85d162e6 1931 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1932 {
a7519a3c
RH
1933 if (!elf64_alpha_create_got_section (abfd, info))
1934 return FALSE;
c328dc3f 1935 }
252b5132 1936 }
252b5132 1937
a7519a3c
RH
1938 if (need & NEED_GOT_ENTRY)
1939 {
1940 struct alpha_elf_got_entry *gotent;
252b5132 1941
a7519a3c
RH
1942 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1943 if (!gotent)
1944 return FALSE;
4a67a098 1945
a7519a3c 1946 if (gotent_flags)
cc03ec80 1947 {
a7519a3c
RH
1948 gotent->flags |= gotent_flags;
1949 if (h)
1950 {
1951 gotent_flags |= h->flags;
1952 h->flags = gotent_flags;
4a67a098 1953
a7519a3c 1954 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1955 /* ??? It appears that we won't make it into
1956 adjust_dynamic_symbol for symbols that remain
1957 totally undefined. Copying this check here means
1958 we can create a plt entry for them too. */
1959 h->root.needs_plt
1960 = (maybe_dynamic && elf64_alpha_want_plt (h));
1961 }
a7519a3c 1962 }
252b5132
RH
1963 }
1964
a7519a3c 1965 if (need & NEED_DYNREL)
9e756d64 1966 {
a7519a3c
RH
1967 /* We need to create the section here now whether we eventually
1968 use it or not so that it gets mapped to an output section by
83bac4b0 1969 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1970 if (sreloc == NULL)
9e756d64 1971 {
83bac4b0
NC
1972 sreloc = _bfd_elf_make_dynamic_reloc_section
1973 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1974
a7519a3c 1975 if (sreloc == NULL)
83bac4b0 1976 return FALSE;
9e756d64 1977 }
252b5132 1978
a7519a3c
RH
1979 if (h)
1980 {
1981 /* Since we havn't seen all of the input symbols yet, we
1982 don't know whether we'll actually need a dynamic relocation
1983 entry for this reloc. So make a record of it. Once we
1984 find out if this thing needs dynamic relocation we'll
1985 expand the relocation sections by the appropriate amount. */
9e756d64 1986
a7519a3c 1987 struct alpha_elf_reloc_entry *rent;
9e756d64 1988
a7519a3c
RH
1989 for (rent = h->reloc_entries; rent; rent = rent->next)
1990 if (rent->rtype == r_type && rent->srel == sreloc)
1991 break;
252b5132 1992
a7519a3c
RH
1993 if (!rent)
1994 {
986f0783 1995 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1996 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1997 if (!rent)
1998 return FALSE;
252b5132 1999
a7519a3c 2000 rent->srel = sreloc;
1f7f2abb 2001 rent->sec = sec;
a7519a3c
RH
2002 rent->rtype = r_type;
2003 rent->count = 1;
252b5132 2004
a7519a3c
RH
2005 rent->next = h->reloc_entries;
2006 h->reloc_entries = rent;
2007 }
2008 else
2009 rent->count++;
2010 }
0e1862bb 2011 else if (bfd_link_pic (info))
a7519a3c
RH
2012 {
2013 /* If this is a shared library, and the section is to be
2014 loaded into memory, we need a RELATIVE reloc. */
2015 sreloc->size += sizeof (Elf64_External_Rela);
2016 if (sec->flags & SEC_READONLY)
1f7f2abb
L
2017 {
2018 info->flags |= DF_TEXTREL;
2019 info->callbacks->minfo
2020 (_("%pB: dynamic relocation against `%pT' in "
2021 "read-only section `%pA'\n"),
2022 sec->owner, h->root.root.root.string, sec);
2023 }
a7519a3c 2024 }
252b5132
RH
2025 }
2026 }
2027
b34976b6 2028 return TRUE;
252b5132 2029}
252b5132 2030
e117360e
RH
2031/* Return the section that should be marked against GC for a given
2032 relocation. */
2033
2034static asection *
2035elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2036 Elf_Internal_Rela *rel,
2037 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2038{
2039 /* These relocations don't really reference a symbol. Instead we store
2040 extra data in their addend slot. Ignore the symbol. */
2041 switch (ELF64_R_TYPE (rel->r_info))
2042 {
2043 case R_ALPHA_LITUSE:
2044 case R_ALPHA_GPDISP:
2045 case R_ALPHA_HINT:
2046 return NULL;
2047 }
2048
2049 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2050}
2051
a7519a3c
RH
2052/* Adjust a symbol defined by a dynamic object and referenced by a
2053 regular object. The current definition is in some section of the
2054 dynamic object, but we're not including those sections. We have to
2055 change the definition to something the rest of the link can
2056 understand. */
252b5132 2057
b34976b6 2058static bfd_boolean
a7519a3c
RH
2059elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2060 struct elf_link_hash_entry *h)
252b5132 2061{
a7519a3c
RH
2062 bfd *dynobj;
2063 asection *s;
2064 struct alpha_elf_link_hash_entry *ah;
252b5132 2065
a7519a3c
RH
2066 dynobj = elf_hash_table(info)->dynobj;
2067 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2068
a7519a3c 2069 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2070 about whether this symbol should get a .plt entry. Irritatingly, it
2071 is common for folk to leave undefined symbols in shared libraries,
2072 and they still expect lazy binding; accept undefined symbols in lieu
2073 of STT_FUNC. */
2074 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2075 {
6ec7057a 2076 h->needs_plt = TRUE;
252b5132 2077
ce558b89 2078 s = elf_hash_table(info)->splt;
a7519a3c
RH
2079 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2080 return FALSE;
204692d7 2081
6ec7057a
RH
2082 /* We need one plt entry per got subsection. Delay allocation of
2083 the actual plt entries until size_plt_section, called from
2084 size_dynamic_sections or during relaxation. */
252b5132 2085
a7519a3c
RH
2086 return TRUE;
2087 }
2088 else
6ec7057a 2089 h->needs_plt = FALSE;
252b5132 2090
a7519a3c
RH
2091 /* If this is a weak symbol, and there is a real definition, the
2092 processor independent code will have arranged for us to see the
2093 real definition first, and we can just use the same value. */
60d67dc8 2094 if (h->is_weakalias)
252b5132 2095 {
60d67dc8
AM
2096 struct elf_link_hash_entry *def = weakdef (h);
2097 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2098 h->root.u.def.section = def->root.u.def.section;
2099 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2100 return TRUE;
252b5132 2101 }
a7519a3c
RH
2102
2103 /* This is a reference to a symbol defined by a dynamic object which
2104 is not a function. The Alpha, since it uses .got entries for all
2105 symbols even in regular objects, does not need the hackery of a
2106 .dynbss section and COPY dynamic relocations. */
252b5132 2107
b34976b6 2108 return TRUE;
252b5132
RH
2109}
2110
747ffa7b
AM
2111/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2112
2113static void
2114elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2115 const Elf_Internal_Sym *isym,
2116 bfd_boolean definition,
2117 bfd_boolean dynamic)
2118{
2119 if (!dynamic && definition)
2120 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2121 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2122}
2123
a7519a3c
RH
2124/* Symbol versioning can create new symbols, and make our old symbols
2125 indirect to the new ones. Consolidate the got and reloc information
2126 in these situations. */
252b5132 2127
48f4b4f5
RH
2128static void
2129elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2130 struct elf_link_hash_entry *dir,
2131 struct elf_link_hash_entry *ind)
252b5132 2132{
48f4b4f5
RH
2133 struct alpha_elf_link_hash_entry *hi
2134 = (struct alpha_elf_link_hash_entry *) ind;
2135 struct alpha_elf_link_hash_entry *hs
2136 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2137
48f4b4f5
RH
2138 /* Do the merging in the superclass. */
2139 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2140
a7519a3c 2141 /* Merge the flags. Whee. */
a7519a3c
RH
2142 hs->flags |= hi->flags;
2143
48f4b4f5
RH
2144 /* ??? It's unclear to me what's really supposed to happen when
2145 "merging" defweak and defined symbols, given that we don't
2146 actually throw away the defweak. This more-or-less copies
2147 the logic related to got and plt entries in the superclass. */
2148 if (ind->root.type != bfd_link_hash_indirect)
2149 return;
2150
a7519a3c
RH
2151 /* Merge the .got entries. Cannibalize the old symbol's list in
2152 doing so, since we don't need it anymore. */
2153
2154 if (hs->got_entries == NULL)
2155 hs->got_entries = hi->got_entries;
2156 else
2157 {
2158 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2159
2160 gsh = hs->got_entries;
2161 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2162 {
a7519a3c
RH
2163 gin = gi->next;
2164 for (gs = gsh; gs ; gs = gs->next)
2165 if (gi->gotobj == gs->gotobj
2166 && gi->reloc_type == gs->reloc_type
2167 && gi->addend == gs->addend)
2168 {
68994ca2 2169 gs->use_count += gi->use_count;
07d6d2b8 2170 goto got_found;
a7519a3c
RH
2171 }
2172 gi->next = hs->got_entries;
2173 hs->got_entries = gi;
2174 got_found:;
252b5132 2175 }
a7519a3c
RH
2176 }
2177 hi->got_entries = NULL;
252b5132 2178
a7519a3c
RH
2179 /* And similar for the reloc entries. */
2180
2181 if (hs->reloc_entries == NULL)
2182 hs->reloc_entries = hi->reloc_entries;
2183 else
2184 {
2185 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2186
2187 rsh = hs->reloc_entries;
2188 for (ri = hi->reloc_entries; ri ; ri = rin)
2189 {
2190 rin = ri->next;
2191 for (rs = rsh; rs ; rs = rs->next)
2192 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2193 {
2194 rs->count += ri->count;
2195 goto found_reloc;
2196 }
2197 ri->next = hs->reloc_entries;
2198 hs->reloc_entries = ri;
2199 found_reloc:;
2200 }
252b5132 2201 }
a7519a3c 2202 hi->reloc_entries = NULL;
252b5132
RH
2203}
2204
a7519a3c 2205/* Is it possible to merge two object file's .got tables? */
252b5132 2206
b34976b6 2207static bfd_boolean
a7519a3c 2208elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2209{
a7519a3c
RH
2210 int total = alpha_elf_tdata (a)->total_got_size;
2211 bfd *bsub;
252b5132 2212
a7519a3c
RH
2213 /* Trivial quick fallout test. */
2214 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2215 return TRUE;
252b5132 2216
a7519a3c
RH
2217 /* By their nature, local .got entries cannot be merged. */
2218 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2219 return FALSE;
252b5132 2220
a7519a3c
RH
2221 /* Failing the common trivial comparison, we must effectively
2222 perform the merge. Not actually performing the merge means that
2223 we don't have to store undo information in case we fail. */
2224 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2225 {
2226 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2227 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2228 int i, n;
2229
2230 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2231 for (i = 0; i < n; ++i)
2232 {
2233 struct alpha_elf_got_entry *ae, *be;
2234 struct alpha_elf_link_hash_entry *h;
2235
2236 h = hashes[i];
2237 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2238 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2239 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2240
2241 for (be = h->got_entries; be ; be = be->next)
2242 {
2243 if (be->use_count == 0)
07d6d2b8 2244 continue;
a7519a3c 2245 if (be->gotobj != b)
07d6d2b8 2246 continue;
a7519a3c
RH
2247
2248 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2249 if (ae->gotobj == a
a7519a3c
RH
2250 && ae->reloc_type == be->reloc_type
2251 && ae->addend == be->addend)
2252 goto global_found;
2253
2254 total += alpha_got_entry_size (be->reloc_type);
2255 if (total > MAX_GOT_SIZE)
07d6d2b8 2256 return FALSE;
a7519a3c
RH
2257 global_found:;
2258 }
2259 }
2260 }
252b5132 2261
b34976b6 2262 return TRUE;
252b5132
RH
2263}
2264
a7519a3c 2265/* Actually merge two .got tables. */
252b5132 2266
a7519a3c
RH
2267static void
2268elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2269{
a7519a3c
RH
2270 int total = alpha_elf_tdata (a)->total_got_size;
2271 bfd *bsub;
252b5132 2272
a7519a3c
RH
2273 /* Remember local expansion. */
2274 {
2275 int e = alpha_elf_tdata (b)->local_got_size;
2276 total += e;
2277 alpha_elf_tdata (a)->local_got_size += e;
2278 }
252b5132 2279
a7519a3c
RH
2280 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2281 {
2282 struct alpha_elf_got_entry **local_got_entries;
2283 struct alpha_elf_link_hash_entry **hashes;
2284 Elf_Internal_Shdr *symtab_hdr;
2285 int i, n;
252b5132 2286
a7519a3c
RH
2287 /* Let the local .got entries know they are part of a new subsegment. */
2288 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2289 if (local_got_entries)
07d6d2b8 2290 {
a7519a3c
RH
2291 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2292 for (i = 0; i < n; ++i)
2293 {
2294 struct alpha_elf_got_entry *ent;
2295 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2296 ent->gotobj = a;
a7519a3c 2297 }
07d6d2b8 2298 }
252b5132 2299
a7519a3c
RH
2300 /* Merge the global .got entries. */
2301 hashes = alpha_elf_sym_hashes (bsub);
2302 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2303
a7519a3c
RH
2304 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2305 for (i = 0; i < n; ++i)
07d6d2b8 2306 {
a7519a3c
RH
2307 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2308 struct alpha_elf_link_hash_entry *h;
252b5132 2309
a7519a3c
RH
2310 h = hashes[i];
2311 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2312 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2313 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2314
a7519a3c
RH
2315 pbe = start = &h->got_entries;
2316 while ((be = *pbe) != NULL)
2317 {
2318 if (be->use_count == 0)
07d6d2b8 2319 {
a7519a3c
RH
2320 *pbe = be->next;
2321 memset (be, 0xa5, sizeof (*be));
2322 goto kill;
07d6d2b8 2323 }
a7519a3c 2324 if (be->gotobj != b)
07d6d2b8 2325 goto next;
a7519a3c
RH
2326
2327 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2328 if (ae->gotobj == a
a7519a3c
RH
2329 && ae->reloc_type == be->reloc_type
2330 && ae->addend == be->addend)
2331 {
2332 ae->flags |= be->flags;
2333 ae->use_count += be->use_count;
2334 *pbe = be->next;
2335 memset (be, 0xa5, sizeof (*be));
2336 goto kill;
2337 }
2338 be->gotobj = a;
2339 total += alpha_got_entry_size (be->reloc_type);
252b5132 2340
a7519a3c
RH
2341 next:;
2342 pbe = &be->next;
2343 kill:;
2344 }
07d6d2b8 2345 }
252b5132 2346
a7519a3c
RH
2347 alpha_elf_tdata (bsub)->gotobj = a;
2348 }
2349 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2350
a7519a3c
RH
2351 /* Merge the two in_got chains. */
2352 {
2353 bfd *next;
252b5132 2354
a7519a3c
RH
2355 bsub = a;
2356 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2357 bsub = next;
252b5132 2358
a7519a3c
RH
2359 alpha_elf_tdata (bsub)->in_got_link_next = b;
2360 }
252b5132 2361}
a7519a3c
RH
2362
2363/* Calculate the offsets for the got entries. */
252b5132 2364
b34976b6 2365static bfd_boolean
a7519a3c 2366elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2367 void * arg ATTRIBUTE_UNUSED)
252b5132 2368{
a7519a3c 2369 struct alpha_elf_got_entry *gotent;
252b5132 2370
a7519a3c
RH
2371 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2372 if (gotent->use_count > 0)
2373 {
2374 struct alpha_elf_obj_tdata *td;
2375 bfd_size_type *plge;
252b5132 2376
a7519a3c 2377 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2378 plge = &td->got->size;
2379 gotent->got_offset = *plge;
2380 *plge += alpha_got_entry_size (gotent->reloc_type);
2381 }
252b5132 2382
6ec7057a 2383 return TRUE;
a7519a3c 2384}
252b5132 2385
a7519a3c
RH
2386static void
2387elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2388{
4dfe6ac6
NC
2389 bfd *i, *got_list;
2390 struct alpha_elf_link_hash_table * htab;
2391
2392 htab = alpha_elf_hash_table (info);
2393 if (htab == NULL)
2394 return;
2395 got_list = htab->got_list;
252b5132 2396
a7519a3c
RH
2397 /* First, zero out the .got sizes, as we may be recalculating the
2398 .got after optimizing it. */
2399 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2400 alpha_elf_tdata(i)->got->size = 0;
252b5132 2401
a7519a3c 2402 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2403 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2404 elf64_alpha_calc_got_offsets_for_symbol,
2405 NULL);
252b5132 2406
a7519a3c
RH
2407 /* Finally, fill in the offsets for the local entries. */
2408 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2409 {
2410 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2411 bfd *j;
252b5132 2412
a7519a3c
RH
2413 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2414 {
2415 struct alpha_elf_got_entry **local_got_entries, *gotent;
2416 int k, n;
252b5132 2417
a7519a3c
RH
2418 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2419 if (!local_got_entries)
2420 continue;
252b5132 2421
a7519a3c
RH
2422 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2423 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2424 if (gotent->use_count > 0)
07d6d2b8 2425 {
a7519a3c
RH
2426 gotent->got_offset = got_offset;
2427 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2428 }
a7519a3c 2429 }
252b5132 2430
a7519a3c
RH
2431 alpha_elf_tdata(i)->got->size = got_offset;
2432 }
2433}
252b5132 2434
a7519a3c 2435/* Constructs the gots. */
252b5132 2436
b34976b6 2437static bfd_boolean
d1c109de 2438elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2439 bfd_boolean may_merge)
252b5132 2440{
a7519a3c 2441 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2442 struct alpha_elf_link_hash_table * htab;
252b5132 2443
4dfe6ac6
NC
2444 htab = alpha_elf_hash_table (info);
2445 if (htab == NULL)
2446 return FALSE;
2447 got_list = htab->got_list;
95404643 2448
a7519a3c
RH
2449 /* On the first time through, pretend we have an existing got list
2450 consisting of all of the input files. */
2451 if (got_list == NULL)
252b5132 2452 {
c72f2fb2 2453 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2454 {
0ffa91dd
NC
2455 bfd *this_got;
2456
2457 if (! is_alpha_elf (i))
2458 continue;
2459
2460 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2461 if (this_got == NULL)
2462 continue;
252b5132 2463
a7519a3c
RH
2464 /* We are assuming no merging has yet occurred. */
2465 BFD_ASSERT (this_got == i);
252b5132 2466
07d6d2b8 2467 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2468 {
a7519a3c 2469 /* Yikes! A single object file has too many entries. */
4eca0228 2470 _bfd_error_handler
695344c0 2471 /* xgettext:c-format */
871b3ab2 2472 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2473 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2474 return FALSE;
252b5132 2475 }
252b5132 2476
a7519a3c
RH
2477 if (got_list == NULL)
2478 got_list = this_got;
2479 else
2480 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2481 cur_got_obj = this_got;
252b5132
RH
2482 }
2483
a7519a3c
RH
2484 /* Strange degenerate case of no got references. */
2485 if (got_list == NULL)
2486 return TRUE;
2487
4dfe6ac6 2488 htab->got_list = got_list;
a7519a3c
RH
2489 }
2490
2491 cur_got_obj = got_list;
0ffa91dd
NC
2492 if (cur_got_obj == NULL)
2493 return FALSE;
2494
d1c109de 2495 if (may_merge)
a7519a3c 2496 {
d1c109de
RH
2497 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2498 while (i != NULL)
252b5132 2499 {
d1c109de
RH
2500 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2501 {
2502 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2503
d1c109de
RH
2504 alpha_elf_tdata(i)->got->size = 0;
2505 i = alpha_elf_tdata(i)->got_link_next;
2506 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2507 }
2508 else
2509 {
2510 cur_got_obj = i;
2511 i = alpha_elf_tdata(i)->got_link_next;
2512 }
a7519a3c 2513 }
252b5132
RH
2514 }
2515
a7519a3c
RH
2516 /* Once the gots have been merged, fill in the got offsets for
2517 everything therein. */
4a828aab 2518 elf64_alpha_calc_got_offsets (info);
252b5132 2519
a7519a3c 2520 return TRUE;
252b5132 2521}
252b5132 2522
b34976b6 2523static bfd_boolean
2c3fc389
NC
2524elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2525 void * data)
252b5132 2526{
a7519a3c
RH
2527 asection *splt = (asection *) data;
2528 struct alpha_elf_got_entry *gotent;
6ec7057a 2529 bfd_boolean saw_one = FALSE;
252b5132 2530
a7519a3c
RH
2531 /* If we didn't need an entry before, we still don't. */
2532 if (!h->root.needs_plt)
2533 return TRUE;
e92d460e 2534
6ec7057a 2535 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2536 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2537 if (gotent->reloc_type == R_ALPHA_LITERAL
2538 && gotent->use_count > 0)
6ec7057a
RH
2539 {
2540 if (splt->size == 0)
2541 splt->size = PLT_HEADER_SIZE;
2542 gotent->plt_offset = splt->size;
2543 splt->size += PLT_ENTRY_SIZE;
2544 saw_one = TRUE;
2545 }
a7519a3c 2546
6ec7057a
RH
2547 /* If there weren't any, there's no longer a need for the PLT entry. */
2548 if (!saw_one)
2549 h->root.needs_plt = FALSE;
a7519a3c
RH
2550
2551 return TRUE;
2552}
2553
4a828aab
RH
2554/* Called from relax_section to rebuild the PLT in light of potential changes
2555 in the function's status. */
a7519a3c 2556
4a828aab 2557static void
a7519a3c
RH
2558elf64_alpha_size_plt_section (struct bfd_link_info *info)
2559{
6ec7057a 2560 asection *splt, *spltrel, *sgotplt;
a7519a3c 2561 unsigned long entries;
4dfe6ac6
NC
2562 struct alpha_elf_link_hash_table * htab;
2563
2564 htab = alpha_elf_hash_table (info);
2565 if (htab == NULL)
2566 return;
a7519a3c 2567
ce558b89 2568 splt = elf_hash_table(info)->splt;
a7519a3c 2569 if (splt == NULL)
4a828aab 2570 return;
252b5132 2571
a7519a3c 2572 splt->size = 0;
252b5132 2573
4dfe6ac6 2574 alpha_elf_link_hash_traverse (htab,
a7519a3c 2575 elf64_alpha_size_plt_section_1, splt);
e92d460e 2576
a7519a3c 2577 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2578 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2579 entries = 0;
a7519a3c 2580 if (splt->size)
6ec7057a
RH
2581 {
2582 if (elf64_alpha_use_secureplt)
2583 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2584 else
2585 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2586 }
a7519a3c 2587 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2588
6ec7057a
RH
2589 /* When using the secureplt, we need two words somewhere in the data
2590 segment for the dynamic linker to tell us where to go. This is the
2591 entire contents of the .got.plt section. */
2592 if (elf64_alpha_use_secureplt)
2593 {
ce558b89 2594 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2595 sgotplt->size = entries ? 16 : 0;
2596 }
a7519a3c 2597}
e92d460e 2598
a7519a3c
RH
2599static bfd_boolean
2600elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2601 struct bfd_link_info *info)
2602{
2603 bfd *i;
4dfe6ac6 2604 struct alpha_elf_link_hash_table * htab;
252b5132 2605
0e1862bb 2606 if (bfd_link_relocatable (info))
a7519a3c 2607 return TRUE;
252b5132 2608
4dfe6ac6
NC
2609 htab = alpha_elf_hash_table (info);
2610 if (htab == NULL)
2611 return FALSE;
2612
d1c109de 2613 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2614 return FALSE;
252b5132 2615
a7519a3c 2616 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2617 i = htab->got_list;
a7519a3c 2618 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2619 {
a7519a3c
RH
2620 asection *s = alpha_elf_tdata(i)->got;
2621 if (s->size > 0)
2622 {
2623 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2624 if (s->contents == NULL)
2625 return FALSE;
2626 }
252b5132
RH
2627 }
2628
b34976b6 2629 return TRUE;
252b5132 2630}
3765b1be 2631
a7519a3c 2632/* The number of dynamic relocations required by a static relocation. */
3765b1be 2633
a7519a3c 2634static int
e366eeae 2635alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2636{
2637 switch (r_type)
3765b1be 2638 {
a7519a3c
RH
2639 /* May appear in GOT entries. */
2640 case R_ALPHA_TLSGD:
2641 return (dynamic ? 2 : shared ? 1 : 0);
2642 case R_ALPHA_TLSLDM:
2643 return shared;
2644 case R_ALPHA_LITERAL:
a7519a3c 2645 return dynamic || shared;
e366eeae
RH
2646 case R_ALPHA_GOTTPREL:
2647 return dynamic || (shared && !pie);
a7519a3c
RH
2648 case R_ALPHA_GOTDTPREL:
2649 return dynamic;
3765b1be 2650
a7519a3c
RH
2651 /* May appear in data sections. */
2652 case R_ALPHA_REFLONG:
2653 case R_ALPHA_REFQUAD:
a7519a3c 2654 return dynamic || shared;
e366eeae
RH
2655 case R_ALPHA_TPREL64:
2656 return dynamic || (shared && !pie);
3765b1be 2657
a7519a3c
RH
2658 /* Everything else is illegal. We'll issue an error during
2659 relocate_section. */
2660 default:
2661 return 0;
2662 }
2663}
3765b1be 2664
a7519a3c 2665/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2666
a7519a3c
RH
2667static bfd_boolean
2668elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2669 struct bfd_link_info *info)
2670{
2671 bfd_boolean dynamic;
2672 struct alpha_elf_reloc_entry *relent;
2673 unsigned long entries;
3765b1be 2674
a7519a3c
RH
2675 /* If the symbol was defined as a common symbol in a regular object
2676 file, and there was no definition in any dynamic object, then the
2677 linker will have allocated space for the symbol in a common
2678 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2679 set. This is done for dynamic symbols in
2680 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2681 symbols, somehow. */
2682 if (!h->root.def_regular
2683 && h->root.ref_regular
2684 && !h->root.def_dynamic
2685 && (h->root.root.type == bfd_link_hash_defined
2686 || h->root.root.type == bfd_link_hash_defweak)
2687 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2688 h->root.def_regular = 1;
3765b1be 2689
a7519a3c
RH
2690 /* If the symbol is dynamic, we'll need all the relocations in their
2691 natural form. If this is a shared object, and it has been forced
2692 local, we'll need the same number of RELATIVE relocations. */
2693 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2694
a7519a3c
RH
2695 /* If the symbol is a hidden undefined weak, then we never have any
2696 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2697 based on bfd_link_pic (info). */
a7519a3c
RH
2698 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2699 return TRUE;
2700
2701 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2702 {
a7519a3c 2703 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2704 bfd_link_pic (info),
2705 bfd_link_pie (info));
a7519a3c
RH
2706 if (entries)
2707 {
1f7f2abb 2708 asection *sec = relent->sec;
a7519a3c
RH
2709 relent->srel->size +=
2710 entries * sizeof (Elf64_External_Rela) * relent->count;
1f7f2abb
L
2711 if ((sec->flags & SEC_READONLY) != 0)
2712 {
2713 info->flags |= DT_TEXTREL;
2714 info->callbacks->minfo
2715 (_("%pB: dynamic relocation against `%pT' in "
2716 "read-only section `%pA'\n"),
2717 sec->owner, h->root.root.root.string, sec);
2718 }
a7519a3c
RH
2719 }
2720 }
3765b1be 2721
a7519a3c
RH
2722 return TRUE;
2723}
3765b1be 2724
a7519a3c
RH
2725/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2726 global symbols. */
3765b1be 2727
a7519a3c
RH
2728static bfd_boolean
2729elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2730 struct bfd_link_info *info)
2731{
2732 bfd_boolean dynamic;
2733 struct alpha_elf_got_entry *gotent;
2734 unsigned long entries;
3765b1be 2735
6ec7057a
RH
2736 /* If we're using a plt for this symbol, then all of its relocations
2737 for its got entries go into .rela.plt. */
2738 if (h->root.needs_plt)
2739 return TRUE;
2740
a7519a3c
RH
2741 /* If the symbol is dynamic, we'll need all the relocations in their
2742 natural form. If this is a shared object, and it has been forced
2743 local, we'll need the same number of RELATIVE relocations. */
2744 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2745
2746 /* If the symbol is a hidden undefined weak, then we never have any
2747 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2748 based on bfd_link_pic (info). */
a7519a3c
RH
2749 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2750 return TRUE;
2751
2752 entries = 0;
2753 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2754 if (gotent->use_count > 0)
e366eeae 2755 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2756 bfd_link_pic (info),
2757 bfd_link_pie (info));
a7519a3c 2758
a7519a3c
RH
2759 if (entries > 0)
2760 {
ce558b89 2761 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2762 BFD_ASSERT (srel != NULL);
2763 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2764 }
3765b1be 2765
a7519a3c 2766 return TRUE;
3765b1be
RH
2767}
2768
a7519a3c 2769/* Set the sizes of the dynamic relocation sections. */
252b5132 2770
4a828aab 2771static void
a7519a3c 2772elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2773{
a7519a3c 2774 unsigned long entries;
ce558b89 2775 bfd *i;
a7519a3c 2776 asection *srel;
4dfe6ac6
NC
2777 struct alpha_elf_link_hash_table * htab;
2778
2779 htab = alpha_elf_hash_table (info);
2780 if (htab == NULL)
2781 return;
252b5132 2782
a7519a3c
RH
2783 /* Shared libraries often require RELATIVE relocs, and some relocs
2784 require attention for the main application as well. */
252b5132 2785
a7519a3c 2786 entries = 0;
4dfe6ac6 2787 for (i = htab->got_list;
a7519a3c
RH
2788 i ; i = alpha_elf_tdata(i)->got_link_next)
2789 {
2790 bfd *j;
3241278a 2791
a7519a3c
RH
2792 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2793 {
2794 struct alpha_elf_got_entry **local_got_entries, *gotent;
2795 int k, n;
252b5132 2796
a7519a3c
RH
2797 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2798 if (!local_got_entries)
2799 continue;
252b5132 2800
a7519a3c
RH
2801 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2802 for (gotent = local_got_entries[k];
2803 gotent ; gotent = gotent->next)
2804 if (gotent->use_count > 0)
2805 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2806 (gotent->reloc_type, 0, bfd_link_pic (info),
2807 bfd_link_pie (info)));
a7519a3c
RH
2808 }
2809 }
3765b1be 2810
ce558b89 2811 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2812 if (!srel)
2813 {
2814 BFD_ASSERT (entries == 0);
4a828aab 2815 return;
a7519a3c
RH
2816 }
2817 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2818
a7519a3c 2819 /* Now do the non-local symbols. */
4dfe6ac6 2820 alpha_elf_link_hash_traverse (htab,
a7519a3c 2821 elf64_alpha_size_rela_got_1, info);
a7519a3c 2822}
252b5132 2823
a7519a3c 2824/* Set the sizes of the dynamic sections. */
3765b1be 2825
a7519a3c
RH
2826static bfd_boolean
2827elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2828 struct bfd_link_info *info)
2829{
2830 bfd *dynobj;
2831 asection *s;
24f1a751 2832 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2833 struct alpha_elf_link_hash_table * htab;
2834
2835 htab = alpha_elf_hash_table (info);
2836 if (htab == NULL)
2837 return FALSE;
3765b1be 2838
a7519a3c
RH
2839 dynobj = elf_hash_table(info)->dynobj;
2840 BFD_ASSERT(dynobj != NULL);
252b5132 2841
a7519a3c
RH
2842 if (elf_hash_table (info)->dynamic_sections_created)
2843 {
2844 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2845 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2846 {
3d4d4302 2847 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2848 BFD_ASSERT (s != NULL);
2849 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2850 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2851 }
3765b1be 2852
a7519a3c
RH
2853 /* Now that we've seen all of the input files, we can decide which
2854 symbols need dynamic relocation entries and which don't. We've
2855 collected information in check_relocs that we can now apply to
2856 size the dynamic relocation sections. */
4dfe6ac6 2857 alpha_elf_link_hash_traverse (htab,
a7519a3c 2858 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2859
a7519a3c 2860 elf64_alpha_size_rela_got_section (info);
6ec7057a 2861 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2862 }
2863 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2864
a7519a3c
RH
2865 /* The check_relocs and adjust_dynamic_symbol entry points have
2866 determined the sizes of the various dynamic sections. Allocate
2867 memory for them. */
2868 relplt = FALSE;
24f1a751 2869 relocs = FALSE;
a7519a3c
RH
2870 for (s = dynobj->sections; s != NULL; s = s->next)
2871 {
2872 const char *name;
3765b1be 2873
a7519a3c
RH
2874 if (!(s->flags & SEC_LINKER_CREATED))
2875 continue;
cc03ec80 2876
a7519a3c
RH
2877 /* It's OK to base decisions on the section name, because none
2878 of the dynobj section names depend upon the input files. */
fd361982 2879 name = bfd_section_name (s);
3765b1be 2880
0112cd26 2881 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2882 {
c456f082 2883 if (s->size != 0)
a7519a3c 2884 {
c456f082 2885 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2886 relplt = TRUE;
24f1a751
AM
2887 else
2888 relocs = TRUE;
252b5132 2889
a7519a3c
RH
2890 /* We use the reloc_count field as a counter if we need
2891 to copy relocs into the output file. */
2892 s->reloc_count = 0;
252b5132 2893 }
3765b1be 2894 }
0112cd26 2895 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2896 && strcmp (name, ".plt") != 0
2897 && strcmp (name, ".dynbss") != 0)
3765b1be 2898 {
a7519a3c
RH
2899 /* It's not one of our dynamic sections, so don't allocate space. */
2900 continue;
2901 }
252b5132 2902
c456f082
AM
2903 if (s->size == 0)
2904 {
2905 /* If we don't need this section, strip it from the output file.
2906 This is to handle .rela.bss and .rela.plt. We must create it
2907 in create_dynamic_sections, because it must be created before
2908 the linker maps input sections to output sections. The
2909 linker does that before adjust_dynamic_symbol is called, and
2910 it is that function which decides whether anything needs to
2911 go into these sections. */
6452a567
RH
2912 if (!CONST_STRNEQ (name, ".got"))
2913 s->flags |= SEC_EXCLUDE;
c456f082
AM
2914 }
2915 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2916 {
2917 /* Allocate memory for the section contents. */
2918 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2919 if (s->contents == NULL)
b34976b6 2920 return FALSE;
a7519a3c
RH
2921 }
2922 }
3765b1be 2923
a7519a3c
RH
2924 if (elf_hash_table (info)->dynamic_sections_created)
2925 {
2926 /* Add some entries to the .dynamic section. We fill in the
2927 values later, in elf64_alpha_finish_dynamic_sections, but we
2928 must add the entries now so that we get the correct size for
2929 the .dynamic section. The DT_DEBUG entry is filled in by the
2930 dynamic linker and used by the debugger. */
2931#define add_dynamic_entry(TAG, VAL) \
2932 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2933
0e1862bb 2934 if (bfd_link_executable (info))
a7519a3c
RH
2935 {
2936 if (!add_dynamic_entry (DT_DEBUG, 0))
2937 return FALSE;
3765b1be
RH
2938 }
2939
a7519a3c 2940 if (relplt)
3765b1be 2941 {
a7519a3c
RH
2942 if (!add_dynamic_entry (DT_PLTGOT, 0)
2943 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2944 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2945 || !add_dynamic_entry (DT_JMPREL, 0))
2946 return FALSE;
6ec7057a
RH
2947
2948 if (elf64_alpha_use_secureplt
2949 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2950 return FALSE;
a7519a3c 2951 }
252b5132 2952
24f1a751 2953 if (relocs)
a7519a3c 2954 {
24f1a751
AM
2955 if (!add_dynamic_entry (DT_RELA, 0)
2956 || !add_dynamic_entry (DT_RELASZ, 0)
2957 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2958 return FALSE;
24f1a751
AM
2959
2960 if (info->flags & DF_TEXTREL)
2961 {
2962 if (!add_dynamic_entry (DT_TEXTREL, 0))
2963 return FALSE;
2964 }
252b5132
RH
2965 }
2966 }
a7519a3c 2967#undef add_dynamic_entry
252b5132 2968
b34976b6 2969 return TRUE;
252b5132 2970}
a7519a3c
RH
2971\f
2972/* These functions do relaxation for Alpha ELF.
252b5132 2973
a7519a3c
RH
2974 Currently I'm only handling what I can do with existing compiler
2975 and assembler support, which means no instructions are removed,
2976 though some may be nopped. At this time GCC does not emit enough
2977 information to do all of the relaxing that is possible. It will
2978 take some not small amount of work for that to happen.
252b5132 2979
a7519a3c
RH
2980 There are a couple of interesting papers that I once read on this
2981 subject, that I cannot find references to at the moment, that
2982 related to Alpha in particular. They are by David Wall, then of
2983 DEC WRL. */
252b5132 2984
a7519a3c
RH
2985struct alpha_relax_info
2986{
2987 bfd *abfd;
2988 asection *sec;
2989 bfd_byte *contents;
2990 Elf_Internal_Shdr *symtab_hdr;
2991 Elf_Internal_Rela *relocs, *relend;
2992 struct bfd_link_info *link_info;
2993 bfd_vma gp;
2994 bfd *gotobj;
2995 asection *tsec;
2996 struct alpha_elf_link_hash_entry *h;
2997 struct alpha_elf_got_entry **first_gotent;
2998 struct alpha_elf_got_entry *gotent;
2999 bfd_boolean changed_contents;
3000 bfd_boolean changed_relocs;
3001 unsigned char other;
3002};
252b5132 3003
a7519a3c
RH
3004static Elf_Internal_Rela *
3005elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
3006 Elf_Internal_Rela *relend,
3007 bfd_vma offset, int type)
3008{
3009 while (rel < relend)
252b5132 3010 {
a7519a3c
RH
3011 if (rel->r_offset == offset
3012 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3013 return rel;
3014 ++rel;
3015 }
3016 return NULL;
3017}
252b5132 3018
a7519a3c
RH
3019static bfd_boolean
3020elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3021 Elf_Internal_Rela *irel, unsigned long r_type)
3022{
3023 unsigned int insn;
3024 bfd_signed_vma disp;
252b5132 3025
a7519a3c
RH
3026 /* Get the instruction. */
3027 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3028
a7519a3c
RH
3029 if (insn >> 26 != OP_LDQ)
3030 {
3031 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3032 _bfd_error_handler
695344c0 3033 /* xgettext:c-format */
2dcf00ce
AM
3034 (_("%pB: %pA+%#" PRIx64 ": warning: "
3035 "%s relocation against unexpected insn"),
3036 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
3037 return TRUE;
3038 }
252b5132 3039
a7519a3c
RH
3040 /* Can't relax dynamic symbols. */
3041 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3042 return TRUE;
252b5132 3043
a7519a3c 3044 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3045 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3046 && bfd_link_dll (info->link_info))
a7519a3c 3047 return TRUE;
252b5132 3048
a7519a3c
RH
3049 if (r_type == R_ALPHA_LITERAL)
3050 {
3051 /* Look for nice constant addresses. This includes the not-uncommon
3052 special case of 0 for undefweak symbols. */
3053 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3054 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3055 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3056 {
3057 disp = 0;
3058 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3059 insn |= (symval & 0xffff);
3060 r_type = R_ALPHA_NONE;
3061 }
3062 else
3063 {
d1c109de
RH
3064 /* We may only create GPREL relocs during the second pass. */
3065 if (info->link_info->relax_pass == 0)
3066 return TRUE;
3067
a7519a3c
RH
3068 disp = symval - info->gp;
3069 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3070 r_type = R_ALPHA_GPREL16;
3071 }
252b5132
RH
3072 }
3073 else
252b5132 3074 {
a7519a3c 3075 bfd_vma dtp_base, tp_base;
252b5132 3076
a7519a3c
RH
3077 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3078 dtp_base = alpha_get_dtprel_base (info->link_info);
3079 tp_base = alpha_get_tprel_base (info->link_info);
3080 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3081
a7519a3c 3082 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3083
a7519a3c
RH
3084 switch (r_type)
3085 {
3086 case R_ALPHA_GOTDTPREL:
3087 r_type = R_ALPHA_DTPREL16;
3088 break;
3089 case R_ALPHA_GOTTPREL:
3090 r_type = R_ALPHA_TPREL16;
3091 break;
3092 default:
3093 BFD_ASSERT (0);
3094 return FALSE;
3095 }
3096 }
252b5132 3097
a7519a3c 3098 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3099 return TRUE;
252b5132 3100
a7519a3c
RH
3101 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3102 info->changed_contents = TRUE;
252b5132 3103
a7519a3c
RH
3104 /* Reduce the use count on this got entry by one, possibly
3105 eliminating it. */
3106 if (--info->gotent->use_count == 0)
252b5132 3107 {
a7519a3c
RH
3108 int sz = alpha_got_entry_size (r_type);
3109 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3110 if (!info->h)
3111 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3112 }
252b5132 3113
a7519a3c
RH
3114 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3115 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3116 info->changed_relocs = TRUE;
3117
3118 /* ??? Search forward through this basic block looking for insns
3119 that use the target register. Stop after an insn modifying the
3120 register is seen, or after a branch or call.
252b5132 3121
a7519a3c
RH
3122 Any such memory load insn may be substituted by a load directly
3123 off the GP. This allows the memory load insn to be issued before
3124 the calculated GP register would otherwise be ready.
252b5132 3125
a7519a3c
RH
3126 Any such jsr insn can be replaced by a bsr if it is in range.
3127
3128 This would mean that we'd have to _add_ relocations, the pain of
3129 which gives one pause. */
252b5132 3130
b34976b6 3131 return TRUE;
252b5132
RH
3132}
3133
a7519a3c
RH
3134static bfd_vma
3135elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3136{
a7519a3c
RH
3137 /* If the function has the same gp, and we can identify that the
3138 function does not use its function pointer, we can eliminate the
3139 address load. */
252b5132 3140
a7519a3c
RH
3141 /* If the symbol is marked NOPV, we are being told the function never
3142 needs its procedure value. */
3143 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3144 return symval;
252b5132 3145
a7519a3c
RH
3146 /* If the symbol is marked STD_GP, we are being told the function does
3147 a normal ldgp in the first two words. */
3148 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3149 ;
252b5132 3150
a7519a3c
RH
3151 /* Otherwise, we may be able to identify a GP load in the first two
3152 words, which we can then skip. */
3153 else
252b5132 3154 {
a7519a3c
RH
3155 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3156 bfd_vma ofs;
252b5132 3157
a7519a3c
RH
3158 /* Load the relocations from the section that the target symbol is in. */
3159 if (info->sec == info->tsec)
252b5132 3160 {
a7519a3c
RH
3161 tsec_relocs = info->relocs;
3162 tsec_relend = info->relend;
3163 tsec_free = NULL;
3164 }
3165 else
3166 {
3167 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3168 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3169 (Elf_Internal_Rela *) NULL,
3170 info->link_info->keep_memory));
3171 if (tsec_relocs == NULL)
3172 return 0;
3173 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3174 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3175 ? NULL
3176 : tsec_relocs);
a7519a3c 3177 }
252b5132 3178
a7519a3c
RH
3179 /* Recover the symbol's offset within the section. */
3180 ofs = (symval - info->tsec->output_section->vma
3181 - info->tsec->output_offset);
252b5132 3182
a7519a3c
RH
3183 /* Look for a GPDISP reloc. */
3184 gpdisp = (elf64_alpha_find_reloc_at_ofs
3185 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3186
a7519a3c
RH
3187 if (!gpdisp || gpdisp->r_addend != 4)
3188 {
3189 if (tsec_free)
3190 free (tsec_free);
3191 return 0;
252b5132 3192 }
a7519a3c 3193 if (tsec_free)
07d6d2b8 3194 free (tsec_free);
252b5132
RH
3195 }
3196
a7519a3c
RH
3197 /* We've now determined that we can skip an initial gp load. Verify
3198 that the call and the target use the same gp. */
f13a99db 3199 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3200 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3201 return 0;
252b5132 3202
a7519a3c
RH
3203 return symval + 8;
3204}
252b5132 3205
a7519a3c
RH
3206static bfd_boolean
3207elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3208 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3209{
d1c109de
RH
3210 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3211 int flags;
a7519a3c
RH
3212 bfd_signed_vma disp;
3213 bfd_boolean fits16;
3214 bfd_boolean fits32;
3215 bfd_boolean lit_reused = FALSE;
3216 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3217 bfd_boolean changed_contents;
3218 bfd_boolean changed_relocs;
3219 bfd_byte *contents = info->contents;
3220 bfd *abfd = info->abfd;
3221 bfd_vma sec_output_vma;
a7519a3c 3222 unsigned int lit_insn;
d1c109de 3223 int relax_pass;
252b5132 3224
d1c109de 3225 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3226 if (lit_insn >> 26 != OP_LDQ)
3227 {
4eca0228 3228 _bfd_error_handler
695344c0 3229 /* xgettext:c-format */
2dcf00ce 3230 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3231 "%s relocation against unexpected insn"),
3232 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3233 return TRUE;
3234 }
252b5132 3235
a7519a3c
RH
3236 /* Can't relax dynamic symbols. */
3237 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3238 return TRUE;
3239
d1c109de
RH
3240 changed_contents = info->changed_contents;
3241 changed_relocs = info->changed_relocs;
3242 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3243 relax_pass = info->link_info->relax_pass;
3244
a7519a3c 3245 /* Summarize how this particular LITERAL is used. */
d1c109de 3246 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3247 {
d1c109de 3248 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3249 break;
d1c109de
RH
3250 if (erel->r_addend <= 6)
3251 flags |= 1 << erel->r_addend;
a7519a3c 3252 }
252b5132 3253
a7519a3c
RH
3254 /* A little preparation for the loop... */
3255 disp = symval - info->gp;
252b5132 3256
d1c109de 3257 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3258 {
d1c109de 3259 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3260 unsigned int insn;
3261 int insn_disp;
3262 bfd_signed_vma xdisp;
d1c109de 3263 Elf_Internal_Rela nrel;
252b5132 3264
d1c109de 3265 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3266
a7519a3c
RH
3267 switch (urel->r_addend)
3268 {
3269 case LITUSE_ALPHA_ADDR:
3270 default:
3271 /* This type is really just a placeholder to note that all
3272 uses cannot be optimized, but to still allow some. */
3273 all_optimized = FALSE;
3274 break;
252b5132 3275
a7519a3c 3276 case LITUSE_ALPHA_BASE:
d1c109de
RH
3277 /* We may only create GPREL relocs during the second pass. */
3278 if (relax_pass == 0)
3279 {
3280 all_optimized = FALSE;
3281 break;
3282 }
3283
a7519a3c 3284 /* We can always optimize 16-bit displacements. */
252b5132 3285
a7519a3c
RH
3286 /* Extract the displacement from the instruction, sign-extending
3287 it if necessary, then test whether it is within 16 or 32 bits
3288 displacement from GP. */
3289 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3290
3291 xdisp = disp + insn_disp;
3292 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3293 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3294 && xdisp < 0x7fff8000);
3295
3296 if (fits16)
3297 {
3298 /* Take the op code and dest from this insn, take the base
3299 register from the literal insn. Leave the offset alone. */
3300 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3301 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3302 changed_contents = TRUE;
3303
3304 nrel = *urel;
3305 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3306 R_ALPHA_GPREL16);
3307 nrel.r_addend = irel->r_addend;
3308
3309 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3310 break the LITERAL+LITUSE chain. */
d1c109de 3311 if (urel < --erel)
07d6d2b8 3312 *urel-- = *erel;
d1c109de
RH
3313 *erel = nrel;
3314 changed_relocs = TRUE;
252b5132 3315 }
252b5132 3316
a7519a3c
RH
3317 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3318 else if (fits32 && !(flags & ~6))
3319 {
3320 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3321
a7519a3c
RH
3322 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3323 R_ALPHA_GPRELHIGH);
3324 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3325 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3326 lit_reused = TRUE;
d1c109de 3327 changed_contents = TRUE;
252b5132 3328
07d6d2b8
AM
3329 /* Since all relocs must be optimized, don't bother swapping
3330 this relocation to the end. */
a7519a3c
RH
3331 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3332 R_ALPHA_GPRELLOW);
3333 urel->r_addend = irel->r_addend;
d1c109de 3334 changed_relocs = TRUE;
a7519a3c
RH
3335 }
3336 else
3337 all_optimized = FALSE;
3338 break;
252b5132 3339
a7519a3c
RH
3340 case LITUSE_ALPHA_BYTOFF:
3341 /* We can always optimize byte instructions. */
252b5132 3342
a7519a3c
RH
3343 /* FIXME: sanity check the insn for byte op. Check that the
3344 literal dest reg is indeed Rb in the byte insn. */
252b5132 3345
a7519a3c
RH
3346 insn &= ~ (unsigned) 0x001ff000;
3347 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3348 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3349 changed_contents = TRUE;
3350
3351 nrel = *urel;
3352 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3353 nrel.r_addend = 0;
3354
3355 /* As we adjust, move the reloc to the end so that we don't
3356 break the LITERAL+LITUSE chain. */
3357 if (urel < --erel)
3358 *urel-- = *erel;
3359 *erel = nrel;
3360 changed_relocs = TRUE;
a7519a3c 3361 break;
252b5132 3362
a7519a3c
RH
3363 case LITUSE_ALPHA_JSR:
3364 case LITUSE_ALPHA_TLSGD:
3365 case LITUSE_ALPHA_TLSLDM:
8288a39e 3366 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3367 {
a7519a3c
RH
3368 bfd_vma optdest, org;
3369 bfd_signed_vma odisp;
252b5132 3370
a7519a3c
RH
3371 /* For undefined weak symbols, we're mostly interested in getting
3372 rid of the got entry whenever possible, so optimize this to a
3373 use of the zero register. */
3374 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3375 {
3376 insn |= 31 << 16;
d1c109de 3377 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3378
d1c109de 3379 changed_contents = TRUE;
a7519a3c
RH
3380 break;
3381 }
252b5132 3382
a7519a3c
RH
3383 /* If not zero, place to jump without needing pv. */
3384 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3385 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3386 odisp = (optdest ? optdest : symval) - org;
252b5132 3387
a7519a3c
RH
3388 if (odisp >= -0x400000 && odisp < 0x400000)
3389 {
3390 Elf_Internal_Rela *xrel;
252b5132 3391
a7519a3c
RH
3392 /* Preserve branch prediction call stack when possible. */
3393 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3394 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3395 else
3396 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3397 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3398 changed_contents = TRUE;
252b5132 3399
d1c109de
RH
3400 nrel = *urel;
3401 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3402 R_ALPHA_BRADDR);
3403 nrel.r_addend = irel->r_addend;
252b5132 3404
a7519a3c 3405 if (optdest)
d1c109de 3406 nrel.r_addend += optdest - symval;
a7519a3c
RH
3407 else
3408 all_optimized = FALSE;
252b5132 3409
a7519a3c
RH
3410 /* Kill any HINT reloc that might exist for this insn. */
3411 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3412 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3413 R_ALPHA_HINT));
3414 if (xrel)
3415 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3416
d1c109de
RH
3417 /* As we adjust, move the reloc to the end so that we don't
3418 break the LITERAL+LITUSE chain. */
3419 if (urel < --erel)
3420 *urel-- = *erel;
3421 *erel = nrel;
3422
a7519a3c
RH
3423 info->changed_relocs = TRUE;
3424 }
3425 else
3426 all_optimized = FALSE;
252b5132 3427
a7519a3c
RH
3428 /* Even if the target is not in range for a direct branch,
3429 if we share a GP, we can eliminate the gp reload. */
3430 if (optdest)
3431 {
3432 Elf_Internal_Rela *gpdisp
3433 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3434 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3435 R_ALPHA_GPDISP));
3436 if (gpdisp)
3437 {
d1c109de 3438 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3439 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3440 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3441 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3442
a7519a3c
RH
3443 /* Verify that the instruction is "ldah $29,0($26)".
3444 Consider a function that ends in a noreturn call,
3445 and that the next function begins with an ldgp,
3446 and that by accident there is no padding between.
3447 In that case the insn would use $27 as the base. */
3448 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3449 {
d1c109de
RH
3450 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3451 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3452
a7519a3c 3453 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3454 changed_contents = TRUE;
3455 changed_relocs = TRUE;
a7519a3c
RH
3456 }
3457 }
3458 }
3459 }
3460 break;
252b5132 3461 }
252b5132
RH
3462 }
3463
d1c109de
RH
3464 /* If we reused the literal instruction, we must have optimized all. */
3465 BFD_ASSERT(!lit_reused || all_optimized);
3466
a7519a3c
RH
3467 /* If all cases were optimized, we can reduce the use count on this
3468 got entry by one, possibly eliminating it. */
3469 if (all_optimized)
252b5132 3470 {
a7519a3c 3471 if (--info->gotent->use_count == 0)
252b5132 3472 {
a7519a3c
RH
3473 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3474 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3475 if (!info->h)
3476 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3477 }
a7519a3c
RH
3478
3479 /* If the literal instruction is no longer needed (it may have been
3480 reused. We can eliminate it. */
3481 /* ??? For now, I don't want to deal with compacting the section,
3482 so just nop it out. */
3483 if (!lit_reused)
252b5132 3484 {
a7519a3c 3485 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3486 changed_relocs = TRUE;
252b5132 3487
d1c109de
RH
3488 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3489 changed_contents = TRUE;
a7519a3c 3490 }
a7519a3c 3491 }
d1c109de
RH
3492
3493 info->changed_contents = changed_contents;
3494 info->changed_relocs = changed_relocs;
3495
3496 if (all_optimized || relax_pass == 0)
3497 return TRUE;
3498 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3499}
3500
b34976b6 3501static bfd_boolean
a7519a3c
RH
3502elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3503 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3504{
a7519a3c 3505 bfd_byte *pos[5];
891caa9b 3506 unsigned int insn, tlsgd_reg;
a7519a3c 3507 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3508 bfd_boolean dynamic, use_gottprel;
a7519a3c 3509 unsigned long new_symndx;
f44f99a5 3510
a7519a3c 3511 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3512
a7519a3c
RH
3513 /* If a TLS symbol is accessed using IE at least once, there is no point
3514 to use dynamic model for it. */
3515 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3516 ;
f44f99a5 3517
a7519a3c
RH
3518 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3519 then we might as well relax to IE. */
0e1862bb 3520 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3521 && (info->link_info->flags & DF_STATIC_TLS))
3522 ;
f44f99a5 3523
a7519a3c 3524 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3525 else if (bfd_link_pic (info->link_info))
a7519a3c 3526 return TRUE;
f44f99a5 3527
a7519a3c
RH
3528 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3529 the matching LITUSE_TLS relocations. */
3530 if (irel + 2 >= info->relend)
3531 return TRUE;
3532 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3533 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3534 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3535 return TRUE;
f44f99a5 3536
a7519a3c
RH
3537 /* There must be a GPDISP relocation positioned immediately after the
3538 LITUSE relocation. */
3539 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3540 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3541 if (!gpdisp)
b34976b6 3542 return TRUE;
f44f99a5 3543
a7519a3c
RH
3544 pos[0] = info->contents + irel[0].r_offset;
3545 pos[1] = info->contents + irel[1].r_offset;
3546 pos[2] = info->contents + irel[2].r_offset;
3547 pos[3] = info->contents + gpdisp->r_offset;
3548 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3549
7dbf3b76
RH
3550 /* Beware of the compiler hoisting part of the sequence out a loop
3551 and adjusting the destination register for the TLSGD insn. If this
3552 happens, there will be a move into $16 before the JSR insn, so only
3553 transformations of the first insn pair should use this register. */
3554 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3555 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3556
a7519a3c
RH
3557 /* Generally, the positions are not allowed to be out of order, lest the
3558 modified insn sequence have different register lifetimes. We can make
3559 an exception when pos 1 is adjacent to pos 0. */
3560 if (pos[1] + 4 == pos[0])
f44f99a5 3561 {
a7519a3c
RH
3562 bfd_byte *tmp = pos[0];
3563 pos[0] = pos[1];
3564 pos[1] = tmp;
f44f99a5 3565 }
a7519a3c
RH
3566 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3567 return TRUE;
cc03ec80 3568
a7519a3c
RH
3569 /* Reduce the use count on the LITERAL relocation. Do this before we
3570 smash the symndx when we adjust the relocations below. */
3571 {
3572 struct alpha_elf_got_entry *lit_gotent;
3573 struct alpha_elf_link_hash_entry *lit_h;
3574 unsigned long indx;
f44f99a5 3575
a7519a3c
RH
3576 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3577 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3578 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3579
a7519a3c
RH
3580 while (lit_h->root.root.type == bfd_link_hash_indirect
3581 || lit_h->root.root.type == bfd_link_hash_warning)
3582 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3583
a7519a3c
RH
3584 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3585 lit_gotent = lit_gotent->next)
3586 if (lit_gotent->gotobj == info->gotobj
3587 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3588 && lit_gotent->addend == irel[1].r_addend)
3589 break;
3590 BFD_ASSERT (lit_gotent);
252b5132 3591
a7519a3c
RH
3592 if (--lit_gotent->use_count == 0)
3593 {
3594 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3595 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3596 }
3597 }
252b5132 3598
a7519a3c 3599 /* Change
252b5132 3600
a7519a3c
RH
3601 lda $16,x($gp) !tlsgd!1
3602 ldq $27,__tls_get_addr($gp) !literal!1
3603 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3604 ldah $29,0($26) !gpdisp!2
3605 lda $29,0($29) !gpdisp!2
3606 to
3607 ldq $16,x($gp) !gottprel
3608 unop
3609 call_pal rduniq
3610 addq $16,$0,$0
3611 unop
3612 or the first pair to
3613 lda $16,x($gp) !tprel
3614 unop
3615 or
3616 ldah $16,x($gp) !tprelhi
3617 lda $16,x($16) !tprello
3618
3619 as appropriate. */
3620
3621 use_gottprel = FALSE;
cf35638d 3622 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3623
9a757e4d
RM
3624 /* Some compilers warn about a Boolean-looking expression being
3625 used in a switch. The explicit cast silences them. */
0e1862bb 3626 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3627 {
a7519a3c
RH
3628 case 1:
3629 {
3630 bfd_vma tp_base;
3631 bfd_signed_vma disp;
252b5132 3632
a7519a3c
RH
3633 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3634 tp_base = alpha_get_tprel_base (info->link_info);
3635 disp = symval - tp_base;
252b5132 3636
a7519a3c
RH
3637 if (disp >= -0x8000 && disp < 0x8000)
3638 {
891caa9b 3639 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3640 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3641 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3642
a7519a3c
RH
3643 irel[0].r_offset = pos[0] - info->contents;
3644 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3645 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3646 break;
3647 }
3648 else if (disp >= -(bfd_signed_vma) 0x80000000
3649 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3650 && pos[0] + 4 == pos[1])
a7519a3c 3651 {
891caa9b 3652 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3653 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3654 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3655 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3656
a7519a3c
RH
3657 irel[0].r_offset = pos[0] - info->contents;
3658 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3659 irel[1].r_offset = pos[1] - info->contents;
3660 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3661 break;
3662 }
3663 }
3664 /* FALLTHRU */
3765b1be 3665
3765b1be 3666 default:
a7519a3c
RH
3667 use_gottprel = TRUE;
3668
891caa9b 3669 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3670 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3671 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3672
3673 irel[0].r_offset = pos[0] - info->contents;
3674 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3675 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3676 break;
3765b1be 3677 }
3765b1be 3678
a7519a3c 3679 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3680
a7519a3c
RH
3681 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3682 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3683
a7519a3c 3684 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3685
a7519a3c
RH
3686 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3687 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3688
a7519a3c
RH
3689 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3690 irel[2].r_offset, R_ALPHA_HINT);
3691 if (hint)
3692 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3693
a7519a3c
RH
3694 info->changed_contents = TRUE;
3695 info->changed_relocs = TRUE;
d6ad34f6 3696
a7519a3c
RH
3697 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3698 if (--info->gotent->use_count == 0)
3765b1be 3699 {
a7519a3c
RH
3700 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3701 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3702 if (!info->h)
3703 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3704 }
252b5132 3705
a7519a3c
RH
3706 /* If we've switched to a GOTTPREL relocation, increment the reference
3707 count on that got entry. */
3708 if (use_gottprel)
f44f99a5 3709 {
a7519a3c 3710 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3711
a7519a3c
RH
3712 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3713 tprel_gotent = tprel_gotent->next)
3714 if (tprel_gotent->gotobj == info->gotobj
3715 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3716 && tprel_gotent->addend == irel->r_addend)
3717 break;
3718 if (tprel_gotent)
3719 tprel_gotent->use_count++;
3720 else
f44f99a5 3721 {
a7519a3c
RH
3722 if (info->gotent->use_count == 0)
3723 tprel_gotent = info->gotent;
3724 else
3725 {
3726 tprel_gotent = (struct alpha_elf_got_entry *)
3727 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3728 if (!tprel_gotent)
3729 return FALSE;
f44f99a5 3730
a7519a3c
RH
3731 tprel_gotent->next = *info->first_gotent;
3732 *info->first_gotent = tprel_gotent;
f44f99a5 3733
a7519a3c
RH
3734 tprel_gotent->gotobj = info->gotobj;
3735 tprel_gotent->addend = irel->r_addend;
3736 tprel_gotent->got_offset = -1;
3737 tprel_gotent->reloc_done = 0;
3738 tprel_gotent->reloc_xlated = 0;
3739 }
f44f99a5 3740
a7519a3c
RH
3741 tprel_gotent->use_count = 1;
3742 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3743 }
f44f99a5 3744 }
f44f99a5 3745
b34976b6 3746 return TRUE;
f44f99a5
RH
3747}
3748
b34976b6 3749static bfd_boolean
a7519a3c
RH
3750elf64_alpha_relax_section (bfd *abfd, asection *sec,
3751 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3752{
a7519a3c
RH
3753 Elf_Internal_Shdr *symtab_hdr;
3754 Elf_Internal_Rela *internal_relocs;
3755 Elf_Internal_Rela *irel, *irelend;
3756 Elf_Internal_Sym *isymbuf = NULL;
3757 struct alpha_elf_got_entry **local_got_entries;
3758 struct alpha_relax_info info;
4dfe6ac6 3759 struct alpha_elf_link_hash_table * htab;
d1c109de 3760 int relax_pass;
4dfe6ac6
NC
3761
3762 htab = alpha_elf_hash_table (link_info);
3763 if (htab == NULL)
3764 return FALSE;
f44f99a5 3765
4a828aab 3766 /* There's nothing to change, yet. */
a7519a3c 3767 *again = FALSE;
f44f99a5 3768
0e1862bb 3769 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3770 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3771 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3772 || sec->reloc_count == 0)
d6ad34f6
RH
3773 return TRUE;
3774
0ffa91dd 3775 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3776 relax_pass = link_info->relax_pass;
0ffa91dd 3777
4a828aab 3778 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3779 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3780 {
4dfe6ac6 3781 htab->relax_trip = link_info->relax_trip;
4a828aab 3782
d1c109de 3783 /* This should never fail after the initial round, since the only error
07d6d2b8 3784 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3785 may only merge got sections during the first pass. If we merge
3786 sections after we've created GPREL relocs, the GP for the merged
3787 section backs up which may put the relocs out of range. */
3788 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3789 abort ();
3790 if (elf_hash_table (link_info)->dynamic_sections_created)
3791 {
3792 elf64_alpha_size_plt_section (link_info);
3793 elf64_alpha_size_rela_got_section (link_info);
3794 }
3795 }
3796
0ffa91dd 3797 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3798 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3799
a7519a3c
RH
3800 /* Load the relocations for this section. */
3801 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3802 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3803 link_info->keep_memory));
3804 if (internal_relocs == NULL)
3805 return FALSE;
252b5132 3806
a7519a3c
RH
3807 memset(&info, 0, sizeof (info));
3808 info.abfd = abfd;
3809 info.sec = sec;
3810 info.link_info = link_info;
3811 info.symtab_hdr = symtab_hdr;
3812 info.relocs = internal_relocs;
3813 info.relend = irelend = internal_relocs + sec->reloc_count;
3814
3815 /* Find the GP for this object. Do not store the result back via
3816 _bfd_set_gp_value, since this could change again before final. */
3817 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3818 if (info.gotobj)
3765b1be 3819 {
a7519a3c
RH
3820 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3821 info.gp = (sgot->output_section->vma
3822 + sgot->output_offset
3823 + 0x8000);
252b5132
RH
3824 }
3825
a7519a3c
RH
3826 /* Get the section contents. */
3827 if (elf_section_data (sec)->this_hdr.contents != NULL)
3828 info.contents = elf_section_data (sec)->this_hdr.contents;
3829 else
3830 {
3831 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3832 goto error_return;
3833 }
252b5132 3834
a7519a3c
RH
3835 for (irel = internal_relocs; irel < irelend; irel++)
3836 {
3837 bfd_vma symval;
3838 struct alpha_elf_got_entry *gotent;
3839 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3840 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3841
3842 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3843 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3844 {
3845 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3846 if (relax_pass != 0)
3847 continue;
3848 if (r_type == R_ALPHA_TLSLDM)
3849 {
3850 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3851 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3852 r_symndx = STN_UNDEF;
3853 }
3854 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3855 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3856 && r_type != R_ALPHA_TLSGD)
3857 continue;
a7519a3c
RH
3858 }
3859
3860 /* Get the value of the symbol referred to by the reloc. */
3861 if (r_symndx < symtab_hdr->sh_info)
3862 {
3863 /* A local symbol. */
3864 Elf_Internal_Sym *isym;
3865
3866 /* Read this BFD's local symbols. */
3867 if (isymbuf == NULL)
3868 {
3869 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3870 if (isymbuf == NULL)
3871 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3872 symtab_hdr->sh_info, 0,
3873 NULL, NULL, NULL);
3874 if (isymbuf == NULL)
3875 goto error_return;
3876 }
252b5132 3877
a7519a3c 3878 isym = isymbuf + r_symndx;
252b5132 3879
a7519a3c
RH
3880 /* Given the symbol for a TLSLDM reloc is ignored, this also
3881 means forcing the symbol value to the tp base. */
3882 if (r_type == R_ALPHA_TLSLDM)
3883 {
3884 info.tsec = bfd_abs_section_ptr;
3885 symval = alpha_get_tprel_base (info.link_info);
3886 }
3887 else
3888 {
3889 symval = isym->st_value;
3890 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3891 continue;
a7519a3c 3892 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3893 info.tsec = bfd_abs_section_ptr;
a7519a3c 3894 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3895 info.tsec = bfd_com_section_ptr;
a7519a3c 3896 else
07d6d2b8 3897 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3898 }
252b5132 3899
a7519a3c
RH
3900 info.h = NULL;
3901 info.other = isym->st_other;
3902 if (local_got_entries)
3903 info.first_gotent = &local_got_entries[r_symndx];
3904 else
3905 {
3906 info.first_gotent = &info.gotent;
3907 info.gotent = NULL;
3908 }
252b5132 3909 }
a7519a3c
RH
3910 else
3911 {
3912 unsigned long indx;
3913 struct alpha_elf_link_hash_entry *h;
252b5132 3914
a7519a3c
RH
3915 indx = r_symndx - symtab_hdr->sh_info;
3916 h = alpha_elf_sym_hashes (abfd)[indx];
3917 BFD_ASSERT (h != NULL);
252b5132 3918
a7519a3c
RH
3919 while (h->root.root.type == bfd_link_hash_indirect
3920 || h->root.root.type == bfd_link_hash_warning)
3921 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3922
a7519a3c
RH
3923 /* If the symbol is undefined, we can't do anything with it. */
3924 if (h->root.root.type == bfd_link_hash_undefined)
3925 continue;
252b5132 3926
a7519a3c
RH
3927 /* If the symbol isn't defined in the current module,
3928 again we can't do anything. */
3929 if (h->root.root.type == bfd_link_hash_undefweak)
3930 {
3931 info.tsec = bfd_abs_section_ptr;
3932 symval = 0;
3933 }
3934 else if (!h->root.def_regular)
3935 {
3936 /* Except for TLSGD relocs, which can sometimes be
3937 relaxed to GOTTPREL relocs. */
3938 if (r_type != R_ALPHA_TLSGD)
3939 continue;
3940 info.tsec = bfd_abs_section_ptr;
3941 symval = 0;
3942 }
3943 else
3944 {
3945 info.tsec = h->root.root.u.def.section;
3946 symval = h->root.root.u.def.value;
3947 }
252b5132 3948
a7519a3c
RH
3949 info.h = h;
3950 info.other = h->root.other;
3951 info.first_gotent = &h->got_entries;
3952 }
252b5132 3953
a7519a3c
RH
3954 /* Search for the got entry to be used by this relocation. */
3955 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3956 if (gotent->gotobj == info.gotobj
3957 && gotent->reloc_type == r_type
3958 && gotent->addend == irel->r_addend)
3959 break;
3960 info.gotent = gotent;
252b5132 3961
a7519a3c
RH
3962 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3963 symval += irel->r_addend;
252b5132 3964
a7519a3c 3965 switch (r_type)
252b5132 3966 {
a7519a3c
RH
3967 case R_ALPHA_LITERAL:
3968 BFD_ASSERT(info.gotent != NULL);
252b5132 3969
a7519a3c
RH
3970 /* If there exist LITUSE relocations immediately following, this
3971 opens up all sorts of interesting optimizations, because we
3972 now know every location that this address load is used. */
3973 if (irel+1 < irelend
3974 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3975 {
a7519a3c
RH
3976 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3977 goto error_return;
252b5132 3978 }
a7519a3c
RH
3979 else
3980 {
3981 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3982 goto error_return;
3983 }
3984 break;
252b5132 3985
a7519a3c
RH
3986 case R_ALPHA_GOTDTPREL:
3987 case R_ALPHA_GOTTPREL:
3988 BFD_ASSERT(info.gotent != NULL);
3989 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3990 goto error_return;
3991 break;
3992
3993 case R_ALPHA_TLSGD:
3994 case R_ALPHA_TLSLDM:
3995 BFD_ASSERT(info.gotent != NULL);
3996 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3997 r_type == R_ALPHA_TLSGD))
3998 goto error_return;
3999 break;
252b5132
RH
4000 }
4001 }
4002
a7519a3c
RH
4003 if (isymbuf != NULL
4004 && symtab_hdr->contents != (unsigned char *) isymbuf)
4005 {
4006 if (!link_info->keep_memory)
4007 free (isymbuf);
4008 else
252b5132 4009 {
a7519a3c
RH
4010 /* Cache the symbols for elf_link_input_bfd. */
4011 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 4012 }
a7519a3c 4013 }
252b5132 4014
a7519a3c
RH
4015 if (info.contents != NULL
4016 && elf_section_data (sec)->this_hdr.contents != info.contents)
4017 {
4018 if (!info.changed_contents && !link_info->keep_memory)
4019 free (info.contents);
4020 else
252b5132 4021 {
a7519a3c
RH
4022 /* Cache the section contents for elf_link_input_bfd. */
4023 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4024 }
a7519a3c 4025 }
252b5132 4026
a7519a3c
RH
4027 if (elf_section_data (sec)->relocs != internal_relocs)
4028 {
4029 if (!info.changed_relocs)
4030 free (internal_relocs);
4031 else
4032 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4033 }
a7519a3c
RH
4034
4035 *again = info.changed_contents || info.changed_relocs;
252b5132 4036
b34976b6 4037 return TRUE;
252b5132 4038
a7519a3c
RH
4039 error_return:
4040 if (isymbuf != NULL
4041 && symtab_hdr->contents != (unsigned char *) isymbuf)
4042 free (isymbuf);
4043 if (info.contents != NULL
4044 && elf_section_data (sec)->this_hdr.contents != info.contents)
4045 free (info.contents);
4046 if (internal_relocs != NULL
4047 && elf_section_data (sec)->relocs != internal_relocs)
4048 free (internal_relocs);
4049 return FALSE;
4050}
4051\f
1bbc9cec
RH
4052/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4053 into the next available slot in SREL. */
4054
4055static void
a7519a3c
RH
4056elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4057 asection *sec, asection *srel, bfd_vma offset,
4058 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4059{
4060 Elf_Internal_Rela outrel;
4061 bfd_byte *loc;
4062
4063 BFD_ASSERT (srel != NULL);
4064
4065 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4066 outrel.r_addend = addend;
4067
4068 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4069 if ((offset | 1) != (bfd_vma) -1)
4070 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4071 else
4072 memset (&outrel, 0, sizeof (outrel));
4073
4074 loc = srel->contents;
4075 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4076 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4077 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4078}
4079
4a67a098
RH
4080/* Relocate an Alpha ELF section for a relocatable link.
4081
4082 We don't have to change anything unless the reloc is against a section
4083 symbol, in which case we have to adjust according to where the section
4084 symbol winds up in the output section. */
4085
b34976b6 4086static bfd_boolean
a7519a3c
RH
4087elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4088 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4089 bfd *input_bfd, asection *input_section,
4090 bfd_byte *contents ATTRIBUTE_UNUSED,
4091 Elf_Internal_Rela *relocs,
4092 Elf_Internal_Sym *local_syms,
4093 asection **local_sections)
4a67a098
RH
4094{
4095 unsigned long symtab_hdr_sh_info;
4096 Elf_Internal_Rela *rel;
4097 Elf_Internal_Rela *relend;
ab96bf03 4098 struct elf_link_hash_entry **sym_hashes;
b34976b6 4099 bfd_boolean ret_val = TRUE;
4a67a098 4100
0ffa91dd 4101 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4102 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4103
4104 relend = relocs + input_section->reloc_count;
4105 for (rel = relocs; rel < relend; rel++)
4106 {
4107 unsigned long r_symndx;
4108 Elf_Internal_Sym *sym;
4109 asection *sec;
4110 unsigned long r_type;
4111
ab96bf03 4112 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4113 if (r_type >= R_ALPHA_max)
4114 {
4eca0228 4115 _bfd_error_handler
695344c0 4116 /* xgettext:c-format */
0aa13fee 4117 (_("%pB: unsupported relocation type %#x"),
d003868e 4118 input_bfd, (int) r_type);
4a67a098 4119 bfd_set_error (bfd_error_bad_value);
b34976b6 4120 ret_val = FALSE;
4a67a098
RH
4121 continue;
4122 }
4123
4a67a098
RH
4124 /* The symbol associated with GPDISP and LITUSE is
4125 immaterial. Only the addend is significant. */
4126 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4127 continue;
4128
ab96bf03 4129 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4130 if (r_symndx < symtab_hdr_sh_info)
4131 {
4132 sym = local_syms + r_symndx;
ab96bf03 4133 sec = local_sections[r_symndx];
4a67a098 4134 }
ab96bf03
AM
4135 else
4136 {
4137 struct elf_link_hash_entry *h;
4138
4139 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4140
4141 while (h->root.type == bfd_link_hash_indirect
4142 || h->root.type == bfd_link_hash_warning)
4143 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4144
4145 if (h->root.type != bfd_link_hash_defined
4146 && h->root.type != bfd_link_hash_defweak)
4147 continue;
4148
4149 sym = NULL;
4150 sec = h->root.u.def.section;
4151 }
4152
dbaa2011 4153 if (sec != NULL && discarded_section (sec))
e4067dbb 4154 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4155 rel, 1, relend,
4156 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4157 contents);
ab96bf03
AM
4158
4159 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4160 rel->r_addend += sec->output_offset;
4a67a098
RH
4161 }
4162
4163 return ret_val;
4164}
4165
252b5132
RH
4166/* Relocate an Alpha ELF section. */
4167
b34976b6 4168static bfd_boolean
a7519a3c
RH
4169elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4170 bfd *input_bfd, asection *input_section,
4171 bfd_byte *contents, Elf_Internal_Rela *relocs,
4172 Elf_Internal_Sym *local_syms,
4173 asection **local_sections)
252b5132 4174{
4a67a098 4175 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4176 Elf_Internal_Rela *rel;
4177 Elf_Internal_Rela *relend;
4a67a098
RH
4178 asection *sgot, *srel, *srelgot;
4179 bfd *dynobj, *gotobj;
4180 bfd_vma gp, tp_base, dtp_base;
4181 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4182 bfd_boolean ret_val;
252b5132 4183
0ffa91dd 4184 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4185
4a67a098 4186 /* Handle relocatable links with a smaller loop. */
0e1862bb 4187 if (bfd_link_relocatable (info))
4a67a098
RH
4188 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4189 input_section, contents, relocs,
4190 local_syms, local_sections);
4191
4192 /* This is a final link. */
4193
b34976b6 4194 ret_val = TRUE;
252b5132 4195
0ffa91dd 4196 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4197
4a67a098 4198 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4199 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4200
3241278a
RH
4201 if (input_section->flags & SEC_ALLOC)
4202 {
4203 const char *section_name;
4204 section_name = (bfd_elf_string_from_elf_section
4205 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4206 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4207 BFD_ASSERT(section_name != NULL);
3d4d4302 4208 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4209 }
4210 else
4211 srel = NULL;
3765b1be 4212
4a67a098
RH
4213 /* Find the gp value for this input bfd. */
4214 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4215 if (gotobj)
4216 {
4217 sgot = alpha_elf_tdata (gotobj)->got;
4218 gp = _bfd_get_gp_value (gotobj);
4219 if (gp == 0)
252b5132 4220 {
4a67a098
RH
4221 gp = (sgot->output_section->vma
4222 + sgot->output_offset
4223 + 0x8000);
4224 _bfd_set_gp_value (gotobj, gp);
4225 }
4226 }
4227 else
4228 {
4229 sgot = NULL;
4230 gp = 0;
4231 }
3765b1be 4232
4a67a098
RH
4233 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4234
e1918d23 4235 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4236 {
e1918d23
AM
4237 dtp_base = alpha_get_dtprel_base (info);
4238 tp_base = alpha_get_tprel_base (info);
252b5132 4239 }
4a67a098
RH
4240 else
4241 dtp_base = tp_base = 0;
252b5132 4242
252b5132 4243 relend = relocs + input_section->reloc_count;
4a67a098 4244 for (rel = relocs; rel < relend; rel++)
252b5132 4245 {
4a67a098 4246 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4247 struct alpha_elf_got_entry *gotent;
4248 bfd_reloc_status_type r;
252b5132
RH
4249 reloc_howto_type *howto;
4250 unsigned long r_symndx;
4a67a098
RH
4251 Elf_Internal_Sym *sym = NULL;
4252 asection *sec = NULL;
3765b1be 4253 bfd_vma value;
dc810e39 4254 bfd_vma addend;
b34976b6 4255 bfd_boolean dynamic_symbol_p;
1d5316ab 4256 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4257 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4258 unsigned long r_type;
252b5132
RH
4259
4260 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4261 if (r_type >= R_ALPHA_max)
252b5132 4262 {
4eca0228 4263 _bfd_error_handler
695344c0 4264 /* xgettext:c-format */
0aa13fee 4265 (_("%pB: unsupported relocation type %#x"),
d003868e 4266 input_bfd, (int) r_type);
252b5132 4267 bfd_set_error (bfd_error_bad_value);
b34976b6 4268 ret_val = FALSE;
3765b1be 4269 continue;
252b5132 4270 }
252b5132 4271
3765b1be 4272 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4273 r_symndx = ELF64_R_SYM(rel->r_info);
4274
cc03ec80 4275 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4276 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4277 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4278 r_symndx = STN_UNDEF;
cc03ec80 4279
252b5132
RH
4280 if (r_symndx < symtab_hdr->sh_info)
4281 {
8517fae7 4282 asection *msec;
252b5132
RH
4283 sym = local_syms + r_symndx;
4284 sec = local_sections[r_symndx];
8517fae7
AM
4285 msec = sec;
4286 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4287
cf35638d 4288 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4289 this is hackery from relax_section. Force the value to
f915360b 4290 be the tls module base. */
cf35638d 4291 if (r_symndx == STN_UNDEF
cc03ec80
RH
4292 && (r_type == R_ALPHA_TLSLDM
4293 || r_type == R_ALPHA_GOTTPREL
4294 || r_type == R_ALPHA_TPREL64
4295 || r_type == R_ALPHA_TPRELHI
4296 || r_type == R_ALPHA_TPRELLO
4297 || r_type == R_ALPHA_TPREL16))
f915360b 4298 value = dtp_base;
cc03ec80 4299
4a67a098
RH
4300 if (local_got_entries)
4301 gotent = local_got_entries[r_symndx];
4302 else
4303 gotent = NULL;
3765b1be
RH
4304
4305 /* Need to adjust local GOT entries' addends for SEC_MERGE
4306 unless it has been done already. */
4307 if ((sec->flags & SEC_MERGE)
048d873d 4308 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4309 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4310 && gotent
4311 && !gotent->reloc_xlated)
3765b1be
RH
4312 {
4313 struct alpha_elf_got_entry *ent;
3765b1be
RH
4314
4315 for (ent = gotent; ent; ent = ent->next)
4316 {
4317 ent->reloc_xlated = 1;
4318 if (ent->use_count == 0)
4319 continue;
4320 msec = sec;
4321 ent->addend =
4322 _bfd_merged_section_offset (output_bfd, &msec,
4323 elf_section_data (sec)->
4324 sec_info,
753731ee 4325 sym->st_value + ent->addend);
3765b1be
RH
4326 ent->addend -= sym->st_value;
4327 ent->addend += msec->output_section->vma
4328 + msec->output_offset
4329 - sec->output_section->vma
4330 - sec->output_offset;
4331 }
4332 }
4333
b34976b6 4334 dynamic_symbol_p = FALSE;
252b5132
RH
4335 }
4336 else
4337 {
62d887d4 4338 bfd_boolean warned, ignored;
560e09e9 4339 struct elf_link_hash_entry *hh;
b2a8e766
AM
4340 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4341
4342 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4343 r_symndx, symtab_hdr, sym_hashes,
4344 hh, sec, value,
62d887d4 4345 unresolved_reloc, warned, ignored);
560e09e9
NC
4346
4347 if (warned)
4348 continue;
252b5132 4349
560e09e9
NC
4350 if (value == 0
4351 && ! unresolved_reloc
4352 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4353 undef_weak_ref = TRUE;
3765b1be 4354
560e09e9 4355 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4356 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4357 gotent = h->got_entries;
252b5132 4358 }
3765b1be 4359
dbaa2011 4360 if (sec != NULL && discarded_section (sec))
e4067dbb 4361 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4362 rel, 1, relend, howto, 0, contents);
ab96bf03 4363
252b5132 4364 addend = rel->r_addend;
3765b1be
RH
4365 value += addend;
4366
4367 /* Search for the proper got entry. */
4368 for (; gotent ; gotent = gotent->next)
4369 if (gotent->gotobj == gotobj
4370 && gotent->reloc_type == r_type
4371 && gotent->addend == addend)
4372 break;
252b5132
RH
4373
4374 switch (r_type)
4375 {
4376 case R_ALPHA_GPDISP:
4377 {
4378 bfd_byte *p_ldah, *p_lda;
4379
4380 BFD_ASSERT(gp != 0);
4381
3765b1be
RH
4382 value = (input_section->output_section->vma
4383 + input_section->output_offset
4384 + rel->r_offset);
252b5132 4385
3765b1be 4386 p_ldah = contents + rel->r_offset;
252b5132
RH
4387 p_lda = p_ldah + rel->r_addend;
4388
3765b1be 4389 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4390 p_ldah, p_lda);
4391 }
4392 break;
4393
252b5132 4394 case R_ALPHA_LITERAL:
3765b1be
RH
4395 BFD_ASSERT(sgot != NULL);
4396 BFD_ASSERT(gp != 0);
4397 BFD_ASSERT(gotent != NULL);
4398 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4399
3765b1be
RH
4400 if (!gotent->reloc_done)
4401 {
4402 gotent->reloc_done = 1;
252b5132 4403
3765b1be
RH
4404 bfd_put_64 (output_bfd, value,
4405 sgot->contents + gotent->got_offset);
252b5132 4406
3765b1be
RH
4407 /* If the symbol has been forced local, output a
4408 RELATIVE reloc, otherwise it will be handled in
4409 finish_dynamic_symbol. */
0e1862bb
L
4410 if (bfd_link_pic (info)
4411 && !dynamic_symbol_p
4412 && !undef_weak_ref)
1bbc9cec
RH
4413 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4414 gotent->got_offset, 0,
4415 R_ALPHA_RELATIVE, value);
3765b1be 4416 }
252b5132 4417
3765b1be
RH
4418 value = (sgot->output_section->vma
4419 + sgot->output_offset
4420 + gotent->got_offset);
4421 value -= gp;
252b5132
RH
4422 goto default_reloc;
4423
4424 case R_ALPHA_GPREL32:
ec1659c8 4425 case R_ALPHA_GPREL16:
252b5132 4426 case R_ALPHA_GPRELLOW:
3765b1be 4427 if (dynamic_symbol_p)
07d6d2b8 4428 {
4eca0228 4429 _bfd_error_handler
695344c0 4430 /* xgettext:c-format */
871b3ab2 4431 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4432 input_bfd, h->root.root.root.string);
4433 ret_val = FALSE;
4434 }
252b5132 4435 BFD_ASSERT(gp != 0);
3765b1be 4436 value -= gp;
252b5132
RH
4437 goto default_reloc;
4438
4439 case R_ALPHA_GPRELHIGH:
3765b1be 4440 if (dynamic_symbol_p)
07d6d2b8 4441 {
4eca0228 4442 _bfd_error_handler
695344c0 4443 /* xgettext:c-format */
871b3ab2 4444 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4445 input_bfd, h->root.root.root.string);
4446 ret_val = FALSE;
4447 }
252b5132 4448 BFD_ASSERT(gp != 0);
3765b1be
RH
4449 value -= gp;
4450 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4451 goto default_reloc;
4452
252b5132 4453 case R_ALPHA_HINT:
f94952df
RH
4454 /* A call to a dynamic symbol is definitely out of range of
4455 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4456 if (dynamic_symbol_p)
f94952df
RH
4457 {
4458 r = bfd_reloc_ok;
4459 break;
4460 }
3765b1be
RH
4461 /* The regular PC-relative stuff measures from the start of
4462 the instruction rather than the end. */
4463 value -= 4;
4464 goto default_reloc;
f94952df
RH
4465
4466 case R_ALPHA_BRADDR:
3765b1be 4467 if (dynamic_symbol_p)
07d6d2b8 4468 {
4eca0228 4469 _bfd_error_handler
695344c0 4470 /* xgettext:c-format */
871b3ab2 4471 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4472 input_bfd, h->root.root.root.string);
4473 ret_val = FALSE;
4474 }
252b5132
RH
4475 /* The regular PC-relative stuff measures from the start of
4476 the instruction rather than the end. */
3765b1be 4477 value -= 4;
252b5132
RH
4478 goto default_reloc;
4479
7793f4d0
RH
4480 case R_ALPHA_BRSGP:
4481 {
4482 int other;
4483 const char *name;
4484
4485 /* The regular PC-relative stuff measures from the start of
4486 the instruction rather than the end. */
3765b1be 4487 value -= 4;
7793f4d0 4488
ccf00ab6
RH
4489 /* The source and destination gp must be the same. Note that
4490 the source will always have an assigned gp, since we forced
4491 one in check_relocs, but that the destination may not, as
cedb70c5 4492 it might not have had any relocations at all. Also take
ccf00ab6
RH
4493 care not to crash if H is an undefined symbol. */
4494 if (h != NULL && sec != NULL
4495 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4496 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4497 {
4eca0228 4498 _bfd_error_handler
695344c0 4499 /* xgettext:c-format */
871b3ab2 4500 (_("%pB: change in gp: BRSGP %s"),
d003868e 4501 input_bfd, h->root.root.root.string);
b34976b6 4502 ret_val = FALSE;
7793f4d0
RH
4503 }
4504
4505 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4506 if (h != NULL)
4507 other = h->root.other;
4508 else
4509 other = sym->st_other;
4510 switch (other & STO_ALPHA_STD_GPLOAD)
4511 {
4512 case STO_ALPHA_NOPV:
07d6d2b8 4513 break;
7793f4d0 4514 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4515 value += 8;
7793f4d0
RH
4516 break;
4517 default:
4518 if (h != NULL)
4519 name = h->root.root.root.string;
4520 else
4521 {
4522 name = (bfd_elf_string_from_elf_section
4523 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4524 if (name == NULL)
4525 name = _("<unknown>");
4526 else if (name[0] == 0)
fd361982 4527 name = bfd_section_name (sec);
7793f4d0 4528 }
4eca0228 4529 _bfd_error_handler
695344c0 4530 /* xgettext:c-format */
871b3ab2 4531 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4532 input_bfd, name);
b34976b6 4533 ret_val = FALSE;
7793f4d0
RH
4534 break;
4535 }
4536
4537 goto default_reloc;
4538 }
4539
252b5132
RH
4540 case R_ALPHA_REFLONG:
4541 case R_ALPHA_REFQUAD:
3765b1be
RH
4542 case R_ALPHA_DTPREL64:
4543 case R_ALPHA_TPREL64:
252b5132 4544 {
1bbc9cec
RH
4545 long dynindx, dyntype = r_type;
4546 bfd_vma dynaddend;
252b5132
RH
4547
4548 /* Careful here to remember RELATIVE relocations for global
4549 variables for symbolic shared objects. */
4550
3765b1be 4551 if (dynamic_symbol_p)
252b5132
RH
4552 {
4553 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4554 dynindx = h->root.dynindx;
4555 dynaddend = addend;
3765b1be
RH
4556 addend = 0, value = 0;
4557 }
4558 else if (r_type == R_ALPHA_DTPREL64)
4559 {
e1918d23 4560 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4561 value -= dtp_base;
4562 goto default_reloc;
4563 }
4564 else if (r_type == R_ALPHA_TPREL64)
4565 {
e1918d23 4566 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4567 if (!bfd_link_dll (info))
1bbc9cec
RH
4568 {
4569 value -= tp_base;
4570 goto default_reloc;
4571 }
4572 dynindx = 0;
4573 dynaddend = value - dtp_base;
252b5132 4574 }
0e1862bb 4575 else if (bfd_link_pic (info)
cf35638d 4576 && r_symndx != STN_UNDEF
d6ad34f6 4577 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4578 && !undef_weak_ref
4579 && !(unresolved_reloc
4580 && (_bfd_elf_section_offset (output_bfd, info,
4581 input_section,
4582 rel->r_offset)
4583 == (bfd_vma) -1)))
252b5132 4584 {
3765b1be
RH
4585 if (r_type == R_ALPHA_REFLONG)
4586 {
4eca0228 4587 _bfd_error_handler
695344c0 4588 /* xgettext:c-format */
871b3ab2 4589 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4590 input_bfd,
3765b1be 4591 h->root.root.root.string);
b34976b6 4592 ret_val = FALSE;
3765b1be 4593 }
1bbc9cec
RH
4594 dynindx = 0;
4595 dyntype = R_ALPHA_RELATIVE;
4596 dynaddend = value;
252b5132
RH
4597 }
4598 else
4599 goto default_reloc;
4600
3241278a
RH
4601 if (input_section->flags & SEC_ALLOC)
4602 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4603 srel, rel->r_offset, dynindx,
4604 dyntype, dynaddend);
252b5132
RH
4605 }
4606 goto default_reloc;
4607
3765b1be 4608 case R_ALPHA_SREL16:
84de6048
RH
4609 case R_ALPHA_SREL32:
4610 case R_ALPHA_SREL64:
3765b1be 4611 if (dynamic_symbol_p)
07d6d2b8 4612 {
4eca0228 4613 _bfd_error_handler
695344c0 4614 /* xgettext:c-format */
871b3ab2 4615 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4616 input_bfd, h->root.root.root.string);
4617 ret_val = FALSE;
4618 }
3cbc1e5e 4619 else if (bfd_link_pic (info)
0e1862bb 4620 && undef_weak_ref)
07d6d2b8 4621 {
4eca0228 4622 _bfd_error_handler
695344c0 4623 /* xgettext:c-format */
871b3ab2 4624 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4625 input_bfd, h->root.root.root.string);
4626 ret_val = FALSE;
4627 }
d6ad34f6 4628
3765b1be 4629
84de6048
RH
4630 /* ??? .eh_frame references to discarded sections will be smashed
4631 to relocations against SHN_UNDEF. The .eh_frame format allows
4632 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4633 if (r_symndx == STN_UNDEF
4634 || (unresolved_reloc
4635 && _bfd_elf_section_offset (output_bfd, info,
4636 input_section,
4637 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4638 howto = (elf64_alpha_howto_table
4639 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4640 goto default_reloc;
4641
3765b1be
RH
4642 case R_ALPHA_TLSLDM:
4643 /* Ignore the symbol for the relocation. The result is always
4644 the current module. */
4645 dynamic_symbol_p = 0;
4646 /* FALLTHRU */
4647
4648 case R_ALPHA_TLSGD:
4649 if (!gotent->reloc_done)
4650 {
4651 gotent->reloc_done = 1;
4652
4653 /* Note that the module index for the main program is 1. */
0e1862bb
L
4654 bfd_put_64 (output_bfd,
4655 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4656 sgot->contents + gotent->got_offset);
4657
4658 /* If the symbol has been forced local, output a
4659 DTPMOD64 reloc, otherwise it will be handled in
4660 finish_dynamic_symbol. */
0e1862bb 4661 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4662 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4663 gotent->got_offset, 0,
4664 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4665
4666 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4667 value = 0;
4668 else
4669 {
e1918d23 4670 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4671 value -= dtp_base;
3765b1be
RH
4672 }
4673 bfd_put_64 (output_bfd, value,
4674 sgot->contents + gotent->got_offset + 8);
4675 }
4676
4677 value = (sgot->output_section->vma
4678 + sgot->output_offset
4679 + gotent->got_offset);
4680 value -= gp;
4681 goto default_reloc;
4682
4683 case R_ALPHA_DTPRELHI:
4684 case R_ALPHA_DTPRELLO:
4685 case R_ALPHA_DTPREL16:
4686 if (dynamic_symbol_p)
07d6d2b8 4687 {
4eca0228 4688 _bfd_error_handler
695344c0 4689 /* xgettext:c-format */
871b3ab2 4690 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4691 input_bfd, h->root.root.root.string);
4692 ret_val = FALSE;
4693 }
e1918d23 4694 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4695 value -= dtp_base;
9e756d64
RH
4696 if (r_type == R_ALPHA_DTPRELHI)
4697 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4698 goto default_reloc;
4699
4700 case R_ALPHA_TPRELHI:
4701 case R_ALPHA_TPRELLO:
4702 case R_ALPHA_TPREL16:
3cbc1e5e 4703 if (bfd_link_dll (info))
9e756d64 4704 {
4eca0228 4705 _bfd_error_handler
695344c0 4706 /* xgettext:c-format */
871b3ab2 4707 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4708 input_bfd);
07d6d2b8 4709 ret_val = FALSE;
9e756d64
RH
4710 }
4711 else if (dynamic_symbol_p)
07d6d2b8 4712 {
4eca0228 4713 _bfd_error_handler
695344c0 4714 /* xgettext:c-format */
871b3ab2 4715 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4716 input_bfd, h->root.root.root.string);
4717 ret_val = FALSE;
4718 }
e1918d23 4719 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4720 value -= tp_base;
9e756d64
RH
4721 if (r_type == R_ALPHA_TPRELHI)
4722 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4723 goto default_reloc;
4724
4725 case R_ALPHA_GOTDTPREL:
4726 case R_ALPHA_GOTTPREL:
4727 BFD_ASSERT(sgot != NULL);
4728 BFD_ASSERT(gp != 0);
4729 BFD_ASSERT(gotent != NULL);
4730 BFD_ASSERT(gotent->use_count >= 1);
4731
4732 if (!gotent->reloc_done)
4733 {
4734 gotent->reloc_done = 1;
4735
4736 if (dynamic_symbol_p)
4737 value = 0;
4738 else
4739 {
e1918d23 4740 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4741 if (r_type == R_ALPHA_GOTDTPREL)
4742 value -= dtp_base;
28fbeab8 4743 else if (bfd_link_executable (info))
1bbc9cec
RH
4744 value -= tp_base;
4745 else
4746 {
4747 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4748 gotent->got_offset, 0,
4749 R_ALPHA_TPREL64,
4750 value - dtp_base);
4751 value = 0;
4752 }
3765b1be
RH
4753 }
4754 bfd_put_64 (output_bfd, value,
4755 sgot->contents + gotent->got_offset);
4756 }
4757
4758 value = (sgot->output_section->vma
4759 + sgot->output_offset
4760 + gotent->got_offset);
4761 value -= gp;
4762 goto default_reloc;
4763
252b5132
RH
4764 default:
4765 default_reloc:
4766 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4767 contents, rel->r_offset, value, 0);
252b5132
RH
4768 break;
4769 }
4770
4771 switch (r)
4772 {
4773 case bfd_reloc_ok:
4774 break;
4775
4776 case bfd_reloc_overflow:
4777 {
4778 const char *name;
4779
ed4de5e2
JJ
4780 /* Don't warn if the overflow is due to pc relative reloc
4781 against discarded section. Section optimization code should
4782 handle it. */
4783
4784 if (r_symndx < symtab_hdr->sh_info
4785 && sec != NULL && howto->pc_relative
dbaa2011 4786 && discarded_section (sec))
ed4de5e2
JJ
4787 break;
4788
252b5132 4789 if (h != NULL)
dfeffb9f 4790 name = NULL;
252b5132
RH
4791 else
4792 {
4793 name = (bfd_elf_string_from_elf_section
4794 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4795 if (name == NULL)
b34976b6 4796 return FALSE;
252b5132 4797 if (*name == '\0')
fd361982 4798 name = bfd_section_name (sec);
252b5132 4799 }
1a72702b
AM
4800 (*info->callbacks->reloc_overflow)
4801 (info, (h ? &h->root.root : NULL), name, howto->name,
4802 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4803 }
4804 break;
4805
4806 default:
4807 case bfd_reloc_outofrange:
4808 abort ();
4809 }
4810 }
4811
f16fbd61 4812 return ret_val;
252b5132
RH
4813}
4814
4815/* Finish up dynamic symbol handling. We set the contents of various
4816 dynamic sections here. */
4817
b34976b6 4818static bfd_boolean
a7519a3c
RH
4819elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4820 struct elf_link_hash_entry *h,
4821 Elf_Internal_Sym *sym)
252b5132 4822{
6ec7057a 4823 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4824
6ec7057a 4825 if (h->needs_plt)
252b5132
RH
4826 {
4827 /* Fill in the .plt entry for this symbol. */
4828 asection *splt, *sgot, *srel;
4829 Elf_Internal_Rela outrel;
947216bf 4830 bfd_byte *loc;
252b5132
RH
4831 bfd_vma got_addr, plt_addr;
4832 bfd_vma plt_index;
4833 struct alpha_elf_got_entry *gotent;
4834
4835 BFD_ASSERT (h->dynindx != -1);
4836
ce558b89 4837 splt = elf_hash_table (info)->splt;
252b5132 4838 BFD_ASSERT (splt != NULL);
ce558b89 4839 srel = elf_hash_table (info)->srelplt;
252b5132 4840 BFD_ASSERT (srel != NULL);
252b5132 4841
6ec7057a
RH
4842 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4843 if (gotent->reloc_type == R_ALPHA_LITERAL
4844 && gotent->use_count > 0)
4845 {
4846 unsigned int insn;
4847 int disp;
252b5132 4848
6ec7057a
RH
4849 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4850 BFD_ASSERT (sgot != NULL);
252b5132 4851
6ec7057a
RH
4852 BFD_ASSERT (gotent->got_offset != -1);
4853 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4854
6ec7057a
RH
4855 got_addr = (sgot->output_section->vma
4856 + sgot->output_offset
4857 + gotent->got_offset);
4858 plt_addr = (splt->output_section->vma
4859 + splt->output_offset
4860 + gotent->plt_offset);
252b5132 4861
6ec7057a 4862 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4863
6ec7057a
RH
4864 /* Fill in the entry in the procedure linkage table. */
4865 if (elf64_alpha_use_secureplt)
4866 {
4867 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4868 insn = INSN_AD (INSN_BR, 31, disp);
4869 bfd_put_32 (output_bfd, insn,
4870 splt->contents + gotent->plt_offset);
252b5132 4871
6ec7057a
RH
4872 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4873 / NEW_PLT_ENTRY_SIZE);
4874 }
4875 else
4876 {
4877 disp = -(gotent->plt_offset + 4);
4878 insn = INSN_AD (INSN_BR, 28, disp);
4879 bfd_put_32 (output_bfd, insn,
4880 splt->contents + gotent->plt_offset);
4881 bfd_put_32 (output_bfd, INSN_UNOP,
4882 splt->contents + gotent->plt_offset + 4);
4883 bfd_put_32 (output_bfd, INSN_UNOP,
4884 splt->contents + gotent->plt_offset + 8);
4885
4886 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4887 / OLD_PLT_ENTRY_SIZE);
4888 }
252b5132 4889
6ec7057a
RH
4890 /* Fill in the entry in the .rela.plt section. */
4891 outrel.r_offset = got_addr;
4892 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4893 outrel.r_addend = 0;
252b5132 4894
6ec7057a
RH
4895 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4896 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4897
6ec7057a
RH
4898 /* Fill in the entry in the .got. */
4899 bfd_put_64 (output_bfd, plt_addr,
4900 sgot->contents + gotent->got_offset);
4901 }
252b5132
RH
4902 }
4903 else if (alpha_elf_dynamic_symbol_p (h, info))
4904 {
4905 /* Fill in the dynamic relocations for this symbol's .got entries. */
4906 asection *srel;
252b5132
RH
4907 struct alpha_elf_got_entry *gotent;
4908
ce558b89 4909 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4910 BFD_ASSERT (srel != NULL);
4911
252b5132
RH
4912 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4913 gotent != NULL;
4914 gotent = gotent->next)
4915 {
f44f99a5 4916 asection *sgot;
1bbc9cec 4917 long r_type;
3765b1be 4918
f44f99a5
RH
4919 if (gotent->use_count == 0)
4920 continue;
4921
4922 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4923
4924 r_type = gotent->reloc_type;
4925 switch (r_type)
4926 {
4927 case R_ALPHA_LITERAL:
4928 r_type = R_ALPHA_GLOB_DAT;
4929 break;
4930 case R_ALPHA_TLSGD:
4931 r_type = R_ALPHA_DTPMOD64;
4932 break;
4933 case R_ALPHA_GOTDTPREL:
4934 r_type = R_ALPHA_DTPREL64;
4935 break;
4936 case R_ALPHA_GOTTPREL:
4937 r_type = R_ALPHA_TPREL64;
4938 break;
4939 case R_ALPHA_TLSLDM:
4940 default:
4941 abort ();
4942 }
4943
68ffbac6 4944 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4945 gotent->got_offset, h->dynindx,
4946 r_type, gotent->addend);
3765b1be
RH
4947
4948 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4949 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4950 gotent->got_offset + 8, h->dynindx,
4951 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4952 }
4953 }
4954
4955 /* Mark some specially defined symbols as absolute. */
9637f6ef 4956 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4957 || h == elf_hash_table (info)->hgot
4958 || h == elf_hash_table (info)->hplt)
252b5132
RH
4959 sym->st_shndx = SHN_ABS;
4960
b34976b6 4961 return TRUE;
252b5132
RH
4962}
4963
4964/* Finish up the dynamic sections. */
4965
b34976b6 4966static bfd_boolean
a7519a3c
RH
4967elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4968 struct bfd_link_info *info)
252b5132
RH
4969{
4970 bfd *dynobj;
4971 asection *sdyn;
4972
4973 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4974 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4975
4976 if (elf_hash_table (info)->dynamic_sections_created)
4977 {
6ec7057a 4978 asection *splt, *sgotplt, *srelaplt;
252b5132 4979 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4980 bfd_vma plt_vma, gotplt_vma;
252b5132 4981
ce558b89
AM
4982 splt = elf_hash_table (info)->splt;
4983 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4984 BFD_ASSERT (splt != NULL && sdyn != NULL);
4985
6ec7057a
RH
4986 plt_vma = splt->output_section->vma + splt->output_offset;
4987
4988 gotplt_vma = 0;
4989 if (elf64_alpha_use_secureplt)
4990 {
ce558b89 4991 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4992 BFD_ASSERT (sgotplt != NULL);
4993 if (sgotplt->size > 0)
4994 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4995 }
4996
252b5132 4997 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4998 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4999 for (; dyncon < dynconend; dyncon++)
5000 {
5001 Elf_Internal_Dyn dyn;
252b5132
RH
5002
5003 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
5004
5005 switch (dyn.d_tag)
5006 {
5007 case DT_PLTGOT:
6ec7057a
RH
5008 dyn.d_un.d_ptr
5009 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
5010 break;
252b5132 5011 case DT_PLTRELSZ:
6ec7057a
RH
5012 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5013 break;
252b5132 5014 case DT_JMPREL:
4ade44b7
AM
5015 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
5016 + srelaplt->output_offset) : 0;
6ec7057a 5017 break;
252b5132
RH
5018 }
5019
5020 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5021 }
5022
6ec7057a 5023 /* Initialize the plt header. */
eea6121a 5024 if (splt->size > 0)
252b5132 5025 {
6ec7057a
RH
5026 unsigned int insn;
5027 int ofs;
5028
5029 if (elf64_alpha_use_secureplt)
5030 {
5031 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5032
5033 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5034 bfd_put_32 (output_bfd, insn, splt->contents);
5035
5036 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5037 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5038
5039 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5040 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5041
5042 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5043 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5044
5045 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5046 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5047
5048 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5049 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5050
5051 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5052 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5053
5054 insn = INSN_AB (INSN_JMP, 31, 27);
5055 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5056
5057 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5058 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5059 }
5060 else
5061 {
5062 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5063 bfd_put_32 (output_bfd, insn, splt->contents);
5064
5065 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5066 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5067
5068 insn = INSN_UNOP;
5069 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5070
5071 insn = INSN_AB (INSN_JMP, 27, 27);
5072 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5073
5074 /* The next two words will be filled in by ld.so. */
5075 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5076 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5077 }
252b5132 5078
eecdbe52 5079 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5080 }
5081 }
5082
b34976b6 5083 return TRUE;
252b5132
RH
5084}
5085
96e2734b
RH
5086/* We need to use a special link routine to handle the .mdebug section.
5087 We need to merge all instances of these sections together, not write
5088 them all out sequentially. */
252b5132 5089
b34976b6 5090static bfd_boolean
a7519a3c 5091elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5092{
5093 asection *o;
5094 struct bfd_link_order *p;
96e2734b 5095 asection *mdebug_sec;
252b5132
RH
5096 struct ecoff_debug_info debug;
5097 const struct ecoff_debug_swap *swap
5098 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5099 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5100 void * mdebug_handle = NULL;
5101 struct alpha_elf_link_hash_table * htab;
5102
5103 htab = alpha_elf_hash_table (info);
5104 if (htab == NULL)
5105 return FALSE;
252b5132 5106
96e2734b 5107 /* Go through the sections and collect the mdebug information. */
252b5132 5108 mdebug_sec = NULL;
252b5132
RH
5109 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5110 {
252b5132
RH
5111 if (strcmp (o->name, ".mdebug") == 0)
5112 {
5113 struct extsym_info einfo;
5114
5115 /* We have found the .mdebug section in the output file.
5116 Look through all the link_orders comprising it and merge
5117 the information together. */
5118 symhdr->magic = swap->sym_magic;
5119 /* FIXME: What should the version stamp be? */
5120 symhdr->vstamp = 0;
5121 symhdr->ilineMax = 0;
5122 symhdr->cbLine = 0;
5123 symhdr->idnMax = 0;
5124 symhdr->ipdMax = 0;
5125 symhdr->isymMax = 0;
5126 symhdr->ioptMax = 0;
5127 symhdr->iauxMax = 0;
5128 symhdr->issMax = 0;
5129 symhdr->issExtMax = 0;
5130 symhdr->ifdMax = 0;
5131 symhdr->crfd = 0;
5132 symhdr->iextMax = 0;
5133
5134 /* We accumulate the debugging information itself in the
5135 debug_info structure. */
5136 debug.line = NULL;
5137 debug.external_dnr = NULL;
5138 debug.external_pdr = NULL;
5139 debug.external_sym = NULL;
5140 debug.external_opt = NULL;
5141 debug.external_aux = NULL;
5142 debug.ss = NULL;
5143 debug.ssext = debug.ssext_end = NULL;
5144 debug.external_fdr = NULL;
5145 debug.external_rfd = NULL;
5146 debug.external_ext = debug.external_ext_end = NULL;
5147
5148 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5149 if (mdebug_handle == NULL)
b34976b6 5150 return FALSE;
252b5132
RH
5151
5152 if (1)
5153 {
5154 asection *s;
5155 EXTR esym;
52b9d213 5156 bfd_vma last = 0;
252b5132
RH
5157 unsigned int i;
5158 static const char * const name[] =
5159 {
5160 ".text", ".init", ".fini", ".data",
5161 ".rodata", ".sdata", ".sbss", ".bss"
5162 };
5163 static const int sc[] = { scText, scInit, scFini, scData,
5164 scRData, scSData, scSBss, scBss };
5165
5166 esym.jmptbl = 0;
5167 esym.cobol_main = 0;
5168 esym.weakext = 0;
5169 esym.reserved = 0;
5170 esym.ifd = ifdNil;
5171 esym.asym.iss = issNil;
5172 esym.asym.st = stLocal;
5173 esym.asym.reserved = 0;
5174 esym.asym.index = indexNil;
5175 for (i = 0; i < 8; i++)
5176 {
5177 esym.asym.sc = sc[i];
5178 s = bfd_get_section_by_name (abfd, name[i]);
5179 if (s != NULL)
5180 {
5181 esym.asym.value = s->vma;
eea6121a 5182 last = s->vma + s->size;
252b5132
RH
5183 }
5184 else
5185 esym.asym.value = last;
5186
5187 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5188 name[i], &esym))
b34976b6 5189 return FALSE;
252b5132
RH
5190 }
5191 }
5192
8423293d 5193 for (p = o->map_head.link_order;
252b5132
RH
5194 p != (struct bfd_link_order *) NULL;
5195 p = p->next)
5196 {
5197 asection *input_section;
5198 bfd *input_bfd;
5199 const struct ecoff_debug_swap *input_swap;
5200 struct ecoff_debug_info input_debug;
5201 char *eraw_src;
5202 char *eraw_end;
5203
5204 if (p->type != bfd_indirect_link_order)
5205 {
fd96f80f 5206 if (p->type == bfd_data_link_order)
252b5132
RH
5207 continue;
5208 abort ();
5209 }
5210
5211 input_section = p->u.indirect.section;
5212 input_bfd = input_section->owner;
5213
0ffa91dd
NC
5214 if (! is_alpha_elf (input_bfd))
5215 /* I don't know what a non ALPHA ELF bfd would be
5216 doing with a .mdebug section, but I don't really
5217 want to deal with it. */
5218 continue;
252b5132
RH
5219
5220 input_swap = (get_elf_backend_data (input_bfd)
5221 ->elf_backend_ecoff_debug_swap);
5222
eea6121a 5223 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5224
5225 /* The ECOFF linking code expects that we have already
5226 read in the debugging information and set up an
5227 ecoff_debug_info structure, so we do that now. */
5228 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5229 &input_debug))
b34976b6 5230 return FALSE;
252b5132
RH
5231
5232 if (! (bfd_ecoff_debug_accumulate
5233 (mdebug_handle, abfd, &debug, swap, input_bfd,
5234 &input_debug, input_swap, info)))
b34976b6 5235 return FALSE;
252b5132
RH
5236
5237 /* Loop through the external symbols. For each one with
5238 interesting information, try to find the symbol in
5239 the linker global hash table and save the information
5240 for the output external symbols. */
21d799b5 5241 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5242 eraw_end = (eraw_src
5243 + (input_debug.symbolic_header.iextMax
5244 * input_swap->external_ext_size));
5245 for (;
5246 eraw_src < eraw_end;
5247 eraw_src += input_swap->external_ext_size)
5248 {
5249 EXTR ext;
5250 const char *name;
5251 struct alpha_elf_link_hash_entry *h;
5252
2c3fc389 5253 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5254 if (ext.asym.sc == scNil
5255 || ext.asym.sc == scUndefined
5256 || ext.asym.sc == scSUndefined)
5257 continue;
5258
5259 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5260 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5261 if (h == NULL || h->esym.ifd != -2)
5262 continue;
5263
5264 if (ext.ifd != -1)
5265 {
5266 BFD_ASSERT (ext.ifd
5267 < input_debug.symbolic_header.ifdMax);
5268 ext.ifd = input_debug.ifdmap[ext.ifd];
5269 }
5270
5271 h->esym = ext;
5272 }
5273
5274 /* Free up the information we just read. */
5275 free (input_debug.line);
5276 free (input_debug.external_dnr);
5277 free (input_debug.external_pdr);
5278 free (input_debug.external_sym);
5279 free (input_debug.external_opt);
5280 free (input_debug.external_aux);
5281 free (input_debug.ss);
5282 free (input_debug.ssext);
5283 free (input_debug.external_fdr);
5284 free (input_debug.external_rfd);
5285 free (input_debug.external_ext);
5286
5287 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5288 elf_link_input_bfd ignores this section. */
5289 input_section->flags &=~ SEC_HAS_CONTENTS;
5290 }
5291
252b5132
RH
5292 /* Build the external symbol information. */
5293 einfo.abfd = abfd;
5294 einfo.info = info;
5295 einfo.debug = &debug;
5296 einfo.swap = swap;
b34976b6 5297 einfo.failed = FALSE;
252b5132
RH
5298 elf_link_hash_traverse (elf_hash_table (info),
5299 elf64_alpha_output_extsym,
2c3fc389 5300 &einfo);
252b5132 5301 if (einfo.failed)
b34976b6 5302 return FALSE;
252b5132
RH
5303
5304 /* Set the size of the .mdebug section. */
eea6121a 5305 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5306
5307 /* Skip this section later on (I don't think this currently
5308 matters, but someday it might). */
8423293d 5309 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5310
5311 mdebug_sec = o;
5312 }
252b5132
RH
5313 }
5314
5315 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5316 if (! bfd_elf_final_link (abfd, info))
b34976b6 5317 return FALSE;
252b5132
RH
5318
5319 /* Now write out the computed sections. */
5320
5321 /* The .got subsections... */
5322 {
5323 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5324 for (i = htab->got_list;
252b5132
RH
5325 i != NULL;
5326 i = alpha_elf_tdata(i)->got_link_next)
5327 {
5328 asection *sgot;
5329
5330 /* elf_bfd_final_link already did everything in dynobj. */
5331 if (i == dynobj)
5332 continue;
5333
5334 sgot = alpha_elf_tdata(i)->got;
5335 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5336 sgot->contents,
5337 (file_ptr) sgot->output_offset,
eea6121a 5338 sgot->size))
b34976b6 5339 return FALSE;
252b5132
RH
5340 }
5341 }
5342
252b5132
RH
5343 if (mdebug_sec != (asection *) NULL)
5344 {
5345 BFD_ASSERT (abfd->output_has_begun);
5346 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5347 swap, info,
5348 mdebug_sec->filepos))
b34976b6 5349 return FALSE;
252b5132
RH
5350
5351 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5352 }
5353
b34976b6 5354 return TRUE;
252b5132 5355}
fcfbdf31
JJ
5356
5357static enum elf_reloc_type_class
7e612e98
AM
5358elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5359 const asection *rel_sec ATTRIBUTE_UNUSED,
5360 const Elf_Internal_Rela *rela)
fcfbdf31 5361{
f51e552e 5362 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5363 {
5364 case R_ALPHA_RELATIVE:
5365 return reloc_class_relative;
5366 case R_ALPHA_JMP_SLOT:
5367 return reloc_class_plt;
5368 case R_ALPHA_COPY:
5369 return reloc_class_copy;
5370 default:
5371 return reloc_class_normal;
5372 }
5373}
252b5132 5374\f
b35d266b 5375static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5376{
07d6d2b8 5377 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5378 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5379 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5380};
5381
252b5132
RH
5382/* ECOFF swapping routines. These are used when dealing with the
5383 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5384 from elf32-mips.c. */
252b5132
RH
5385static const struct ecoff_debug_swap
5386elf64_alpha_ecoff_debug_swap =
5387{
5388 /* Symbol table magic number. */
5389 magicSym2,
5390 /* Alignment of debugging information. E.g., 4. */
5391 8,
5392 /* Sizes of external symbolic information. */
5393 sizeof (struct hdr_ext),
5394 sizeof (struct dnr_ext),
5395 sizeof (struct pdr_ext),
5396 sizeof (struct sym_ext),
5397 sizeof (struct opt_ext),
5398 sizeof (struct fdr_ext),
5399 sizeof (struct rfd_ext),
5400 sizeof (struct ext_ext),
5401 /* Functions to swap in external symbolic data. */
5402 ecoff_swap_hdr_in,
5403 ecoff_swap_dnr_in,
5404 ecoff_swap_pdr_in,
5405 ecoff_swap_sym_in,
5406 ecoff_swap_opt_in,
5407 ecoff_swap_fdr_in,
5408 ecoff_swap_rfd_in,
5409 ecoff_swap_ext_in,
5410 _bfd_ecoff_swap_tir_in,
5411 _bfd_ecoff_swap_rndx_in,
5412 /* Functions to swap out external symbolic data. */
5413 ecoff_swap_hdr_out,
5414 ecoff_swap_dnr_out,
5415 ecoff_swap_pdr_out,
5416 ecoff_swap_sym_out,
5417 ecoff_swap_opt_out,
5418 ecoff_swap_fdr_out,
5419 ecoff_swap_rfd_out,
5420 ecoff_swap_ext_out,
5421 _bfd_ecoff_swap_tir_out,
5422 _bfd_ecoff_swap_rndx_out,
5423 /* Function to read in symbolic data. */
5424 elf64_alpha_read_ecoff_info
5425};
5426\f
70bcb145
JW
5427/* Use a non-standard hash bucket size of 8. */
5428
562ace6b 5429static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5430{
5431 sizeof (Elf64_External_Ehdr),
5432 sizeof (Elf64_External_Phdr),
5433 sizeof (Elf64_External_Shdr),
5434 sizeof (Elf64_External_Rel),
5435 sizeof (Elf64_External_Rela),
5436 sizeof (Elf64_External_Sym),
5437 sizeof (Elf64_External_Dyn),
5438 sizeof (Elf_External_Note),
5439 8,
5440 1,
45d6a902 5441 64, 3,
70bcb145
JW
5442 ELFCLASS64, EV_CURRENT,
5443 bfd_elf64_write_out_phdrs,
5444 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5445 bfd_elf64_checksum_contents,
70bcb145 5446 bfd_elf64_write_relocs,
73ff0d56 5447 bfd_elf64_swap_symbol_in,
70bcb145
JW
5448 bfd_elf64_swap_symbol_out,
5449 bfd_elf64_slurp_reloc_table,
5450 bfd_elf64_slurp_symbol_table,
5451 bfd_elf64_swap_dyn_in,
5452 bfd_elf64_swap_dyn_out,
947216bf
AM
5453 bfd_elf64_swap_reloc_in,
5454 bfd_elf64_swap_reloc_out,
5455 bfd_elf64_swap_reloca_in,
5456 bfd_elf64_swap_reloca_out
70bcb145
JW
5457};
5458
6d00b590 5459#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5460#define TARGET_LITTLE_NAME "elf64-alpha"
5461#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5462#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5463#define ELF_MACHINE_CODE EM_ALPHA
5464#define ELF_MAXPAGESIZE 0x10000
24718e3b 5465#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5466
5467#define bfd_elf64_bfd_link_hash_table_create \
5468 elf64_alpha_bfd_link_hash_table_create
5469
5470#define bfd_elf64_bfd_reloc_type_lookup \
5471 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5472#define bfd_elf64_bfd_reloc_name_lookup \
5473 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5474#define elf_info_to_howto \
5475 elf64_alpha_info_to_howto
5476
5477#define bfd_elf64_mkobject \
5478 elf64_alpha_mkobject
5479#define elf_backend_object_p \
5480 elf64_alpha_object_p
5481
5482#define elf_backend_section_from_shdr \
5483 elf64_alpha_section_from_shdr
204692d7
RH
5484#define elf_backend_section_flags \
5485 elf64_alpha_section_flags
252b5132
RH
5486#define elf_backend_fake_sections \
5487 elf64_alpha_fake_sections
5488
5489#define bfd_elf64_bfd_is_local_label_name \
5490 elf64_alpha_is_local_label_name
5491#define bfd_elf64_find_nearest_line \
5492 elf64_alpha_find_nearest_line
5493#define bfd_elf64_bfd_relax_section \
5494 elf64_alpha_relax_section
5495
5496#define elf_backend_add_symbol_hook \
5497 elf64_alpha_add_symbol_hook
13285a1b
AM
5498#define elf_backend_relocs_compatible \
5499 _bfd_elf_relocs_compatible
6fc5bb57
AM
5500#define elf_backend_sort_relocs_p \
5501 elf64_alpha_sort_relocs_p
252b5132
RH
5502#define elf_backend_check_relocs \
5503 elf64_alpha_check_relocs
5504#define elf_backend_create_dynamic_sections \
5505 elf64_alpha_create_dynamic_sections
5506#define elf_backend_adjust_dynamic_symbol \
5507 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5508#define elf_backend_merge_symbol_attribute \
5509 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5510#define elf_backend_copy_indirect_symbol \
5511 elf64_alpha_copy_indirect_symbol
252b5132
RH
5512#define elf_backend_always_size_sections \
5513 elf64_alpha_always_size_sections
5514#define elf_backend_size_dynamic_sections \
5515 elf64_alpha_size_dynamic_sections
74541ad4 5516#define elf_backend_omit_section_dynsym \
d00dd7dc 5517 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5518#define elf_backend_relocate_section \
5519 elf64_alpha_relocate_section
5520#define elf_backend_finish_dynamic_symbol \
5521 elf64_alpha_finish_dynamic_symbol
5522#define elf_backend_finish_dynamic_sections \
5523 elf64_alpha_finish_dynamic_sections
5524#define bfd_elf64_bfd_final_link \
5525 elf64_alpha_final_link
fcfbdf31
JJ
5526#define elf_backend_reloc_type_class \
5527 elf64_alpha_reloc_type_class
252b5132 5528
e117360e
RH
5529#define elf_backend_can_gc_sections 1
5530#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5531
252b5132
RH
5532#define elf_backend_ecoff_debug_swap \
5533 &elf64_alpha_ecoff_debug_swap
5534
70bcb145
JW
5535#define elf_backend_size_info \
5536 alpha_elf_size_info
5537
29ef7005
L
5538#define elf_backend_special_sections \
5539 elf64_alpha_special_sections
2f89ff8d 5540
6f6fd151
L
5541#define elf_backend_strip_zero_sized_dynamic_sections \
5542 _bfd_elf_strip_zero_sized_dynamic_sections
5543
38b1a46c 5544/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5545#define elf_backend_want_got_plt 0
5546#define elf_backend_plt_readonly 0
5547#define elf_backend_want_plt_sym 1
5548#define elf_backend_got_header_size 0
64f52338 5549#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5550
5551#include "elf64-target.h"
2238051f
RH
5552\f
5553/* FreeBSD support. */
5554
5555#undef TARGET_LITTLE_SYM
6d00b590 5556#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5557#undef TARGET_LITTLE_NAME
5558#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5559#undef ELF_OSABI
5560#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5561
5562/* The kernel recognizes executables as valid only if they carry a
5563 "FreeBSD" label in the ELF header. So we put this label on all
5564 executables and (for simplicity) also all other object files. */
5565
ed7e9d0b
AM
5566static bfd_boolean
5567elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5568{
5569 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5570
ed7e9d0b
AM
5571 if (!_bfd_elf_init_file_header (abfd, info))
5572 return FALSE;
5573
2238051f
RH
5574 i_ehdrp = elf_elfheader (abfd);
5575
5576 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5577 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5578#ifdef OLD_FREEBSD_ABI_LABEL
5579 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5580 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5581#endif
ed7e9d0b 5582 return TRUE;
2238051f
RH
5583}
5584
ed7e9d0b
AM
5585#undef elf_backend_init_file_header
5586#define elf_backend_init_file_header \
5587 elf64_alpha_fbsd_init_file_header
2238051f 5588
571fe01f 5589#undef elf64_bed
2238051f
RH
5590#define elf64_bed elf64_alpha_fbsd_bed
5591
5592#include "elf64-target.h"
This page took 1.601002 seconds and 4 git commands to generate.