gdb/python: Add gdb.Architecture.registers method
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
b3adc24a 2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
1f7f2abb
L
147 /* Which section this relocation is against? */
148 asection *sec;
21d799b5
NC
149
150 /* How many did we find? */
151 unsigned long count;
1f7f2abb
L
152
153 /* What kind of relocation? */
154 unsigned int rtype;
21d799b5
NC
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
2c3fc389 213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
68ffbac6 227/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
986f0783 283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
698600e4
AM
301/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304struct alpha_elf_find_line
305{
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308};
309
252b5132
RH
310/* We have some private fields hanging off of the elf_tdata structure. */
311
312struct alpha_elf_obj_tdata
313{
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
3765b1be
RH
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
252b5132 335
3765b1be 336 /* For every got, this is the sum of the number of words required
252b5132 337 to hold all of the member object's local got. */
3765b1be 338 int local_got_size;
698600e4
AM
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
252b5132
RH
343};
344
345#define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
0ffa91dd
NC
348#define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
4dfe6ac6 351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 352
b34976b6 353static bfd_boolean
a7519a3c 354elf64_alpha_mkobject (bfd *abfd)
252b5132 355{
0ffa91dd 356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 357 ALPHA_ELF_DATA);
252b5132
RH
358}
359
b34976b6 360static bfd_boolean
a7519a3c 361elf64_alpha_object_p (bfd *abfd)
252b5132 362{
252b5132
RH
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365}
366\f
a7519a3c
RH
367/* A relocation function which doesn't do anything. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 372 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378}
379
380/* A relocation function used for an unsupported reloc. */
381
382static bfd_reloc_status_type
383elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 385 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387{
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391}
392
393/* Do the work of the GPDISP relocation. */
394
395static bfd_reloc_status_type
396elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398{
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431}
432
433/* The special function for the GPDISP reloc. */
434
435static bfd_reloc_status_type
436elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440{
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476}
477
252b5132
RH
478/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480#define MINUS_ONE (((bfd_vma)0) - 1)
481
21d799b5 482
dfe57ca0 483#define SKIP_HOWTO(N) \
21d799b5 484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 485
252b5132
RH
486static reloc_howto_type elf64_alpha_howto_table[] =
487{
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
6346d5ca
AM
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
b34976b6 492 TRUE, /* pc_relative */
252b5132
RH
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
b34976b6 497 FALSE, /* partial_inplace */
252b5132
RH
498 0, /* src_mask */
499 0, /* dst_mask */
b34976b6 500 TRUE), /* pcrel_offset */
252b5132
RH
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
b34976b6 507 FALSE, /* pc_relative */
252b5132
RH
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 510 bfd_elf_generic_reloc, /* special_function */
252b5132 511 "REFLONG", /* name */
b34976b6 512 FALSE, /* partial_inplace */
252b5132
RH
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
b34976b6 515 FALSE), /* pcrel_offset */
252b5132
RH
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
b34976b6 522 FALSE, /* pc_relative */
252b5132
RH
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 525 bfd_elf_generic_reloc, /* special_function */
252b5132 526 "REFQUAD", /* name */
b34976b6 527 FALSE, /* partial_inplace */
252b5132
RH
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
b34976b6 530 FALSE), /* pcrel_offset */
252b5132
RH
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
b34976b6 539 FALSE, /* pc_relative */
252b5132
RH
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 542 bfd_elf_generic_reloc, /* special_function */
252b5132 543 "GPREL32", /* name */
b34976b6 544 FALSE, /* partial_inplace */
252b5132
RH
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
b34976b6 547 FALSE), /* pcrel_offset */
252b5132
RH
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
dfe57ca0 552 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 553 16, /* bitsize */
b34976b6 554 FALSE, /* pc_relative */
252b5132
RH
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 557 bfd_elf_generic_reloc, /* special_function */
252b5132 558 "ELF_LITERAL", /* name */
b34976b6 559 FALSE, /* partial_inplace */
252b5132
RH
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
b34976b6 562 FALSE), /* pcrel_offset */
252b5132
RH
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
dfe57ca0 573 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 574 32, /* bitsize */
b34976b6 575 FALSE, /* pc_relative */
252b5132
RH
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
b34976b6 580 FALSE, /* partial_inplace */
252b5132
RH
581 0, /* src_mask */
582 0, /* dst_mask */
b34976b6 583 FALSE), /* pcrel_offset */
252b5132
RH
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
b34976b6 605 FALSE, /* pc_relative */
252b5132
RH
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
b34976b6 610 FALSE, /* partial_inplace */
252b5132
RH
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
b34976b6 613 TRUE), /* pcrel_offset */
252b5132
RH
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
b34976b6 620 TRUE, /* pc_relative */
252b5132
RH
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 623 bfd_elf_generic_reloc, /* special_function */
252b5132 624 "BRADDR", /* name */
b34976b6 625 FALSE, /* partial_inplace */
252b5132
RH
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
b34976b6 628 TRUE), /* pcrel_offset */
252b5132
RH
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
dfe57ca0 633 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 634 14, /* bitsize */
b34976b6 635 TRUE, /* pc_relative */
252b5132
RH
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 638 bfd_elf_generic_reloc, /* special_function */
252b5132 639 "HINT", /* name */
b34976b6 640 FALSE, /* partial_inplace */
252b5132
RH
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
b34976b6 643 TRUE), /* pcrel_offset */
252b5132
RH
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 TRUE, /* pc_relative */
252b5132
RH
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 653 bfd_elf_generic_reloc, /* special_function */
252b5132 654 "SREL16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
252b5132
RH
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 TRUE), /* pcrel_offset */
252b5132
RH
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
252b5132
RH
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 668 bfd_elf_generic_reloc, /* special_function */
252b5132 669 "SREL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
252b5132
RH
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
252b5132
RH
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
b34976b6 680 TRUE, /* pc_relative */
252b5132
RH
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 683 bfd_elf_generic_reloc, /* special_function */
252b5132 684 "SREL64", /* name */
b34976b6 685 FALSE, /* partial_inplace */
252b5132
RH
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
b34976b6 688 TRUE), /* pcrel_offset */
252b5132 689
dfe57ca0
RH
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
252b5132
RH
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
dfe57ca0 700 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 705 bfd_elf_generic_reloc, /* special_function */
252b5132 706 "GPRELHIGH", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132
RH
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
dfe57ca0 715 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132
RH
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 720 bfd_elf_generic_reloc, /* special_function */
252b5132 721 "GPRELLOW", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132
RH
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132
RH
726
727 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 728 HOWTO (R_ALPHA_GPREL16,
252b5132 729 0, /* rightshift */
dfe57ca0 730 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 735 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 736 "GPREL16", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
dfe57ca0
RH
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
252b5132 747
fe8bc63d 748 /* Misc ELF relocations. */
252b5132
RH
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
b34976b6 758 FALSE,
252b5132
RH
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
b34976b6 763 FALSE,
252b5132
RH
764 0,
765 0,
b34976b6 766 TRUE),
252b5132
RH
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
b34976b6 773 FALSE,
252b5132
RH
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
b34976b6 778 FALSE,
252b5132
RH
779 0,
780 0,
b34976b6 781 TRUE),
252b5132
RH
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
b34976b6 788 FALSE,
252b5132
RH
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
b34976b6 793 FALSE,
252b5132
RH
794 0,
795 0,
b34976b6 796 TRUE),
252b5132
RH
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
b34976b6 803 FALSE,
252b5132
RH
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
b34976b6 808 FALSE,
252b5132
RH
809 0,
810 0,
b34976b6 811 TRUE),
7793f4d0
RH
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
7793f4d0
RH
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 821 bfd_elf_generic_reloc, /* special_function */
7793f4d0 822 "BRSGP", /* name */
b34976b6 823 FALSE, /* partial_inplace */
7793f4d0
RH
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
3765b1be
RH
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
b34976b6 833 FALSE, /* pc_relative */
3765b1be
RH
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 836 bfd_elf_generic_reloc, /* special_function */
3765b1be 837 "TLSGD", /* name */
b34976b6 838 FALSE, /* partial_inplace */
3765b1be
RH
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
b34976b6 841 FALSE), /* pcrel_offset */
3765b1be
RH
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 851 bfd_elf_generic_reloc, /* special_function */
3765b1be 852 "TLSLDM", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 866 bfd_elf_generic_reloc, /* special_function */
3765b1be 867 "DTPMOD64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
b34976b6 879 FALSE, /* pc_relative */
3765b1be
RH
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 882 bfd_elf_generic_reloc, /* special_function */
3765b1be 883 "GOTDTPREL", /* name */
b34976b6 884 FALSE, /* partial_inplace */
3765b1be
RH
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
b34976b6 887 FALSE), /* pcrel_offset */
3765b1be
RH
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
3765b1be
RH
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 897 bfd_elf_generic_reloc, /* special_function */
3765b1be 898 "DTPREL64", /* name */
b34976b6 899 FALSE, /* partial_inplace */
3765b1be
RH
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
3765b1be
RH
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
3765b1be
RH
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 912 bfd_elf_generic_reloc, /* special_function */
3765b1be 913 "DTPRELHI", /* name */
b34976b6 914 FALSE, /* partial_inplace */
3765b1be
RH
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
3765b1be
RH
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 927 bfd_elf_generic_reloc, /* special_function */
3765b1be 928 "DTPRELLO", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 942 bfd_elf_generic_reloc, /* special_function */
3765b1be 943 "DTPREL16", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
b34976b6 955 FALSE, /* pc_relative */
3765b1be
RH
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 958 bfd_elf_generic_reloc, /* special_function */
3765b1be 959 "GOTTPREL", /* name */
b34976b6 960 FALSE, /* partial_inplace */
3765b1be
RH
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
b34976b6 963 FALSE), /* pcrel_offset */
3765b1be
RH
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
b34976b6 970 FALSE, /* pc_relative */
3765b1be
RH
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 973 bfd_elf_generic_reloc, /* special_function */
3765b1be 974 "TPREL64", /* name */
b34976b6 975 FALSE, /* partial_inplace */
3765b1be
RH
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
b34976b6 978 FALSE), /* pcrel_offset */
3765b1be
RH
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
3765b1be
RH
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 988 bfd_elf_generic_reloc, /* special_function */
3765b1be 989 "TPRELHI", /* name */
b34976b6 990 FALSE, /* partial_inplace */
3765b1be
RH
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
3765b1be
RH
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
b34976b6 1000 FALSE, /* pc_relative */
3765b1be
RH
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1003 bfd_elf_generic_reloc, /* special_function */
3765b1be 1004 "TPRELLO", /* name */
b34976b6 1005 FALSE, /* partial_inplace */
3765b1be
RH
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
b34976b6 1008 FALSE), /* pcrel_offset */
3765b1be
RH
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
b34976b6 1015 FALSE, /* pc_relative */
3765b1be
RH
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1018 bfd_elf_generic_reloc, /* special_function */
3765b1be 1019 "TPREL16", /* name */
b34976b6 1020 FALSE, /* partial_inplace */
3765b1be
RH
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
b34976b6 1023 FALSE), /* pcrel_offset */
252b5132
RH
1024};
1025
252b5132
RH
1026/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028struct elf_reloc_map
1029{
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032};
1033
1034static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035{
dfe57ca0
RH
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1066};
1067
1068/* Given a BFD reloc type, return a HOWTO structure. */
1069
1070static reloc_howto_type *
a7519a3c
RH
1071elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
252b5132
RH
1073{
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083}
1084
157090f7
AM
1085static reloc_howto_type *
1086elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088{
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100}
1101
252b5132
RH
1102/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
f3185997 1104static bfd_boolean
0aa13fee 1105elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1106 Elf_Internal_Rela *dst)
252b5132 1107{
a7519a3c 1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
695344c0 1112 /* xgettext:c-format */
0aa13fee 1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1114 abfd, r_type);
cd21f5da 1115 bfd_set_error (bfd_error_bad_value);
f3185997 1116 return FALSE;
cd21f5da 1117 }
252b5132 1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1119 return TRUE;
252b5132 1120}
3765b1be
RH
1121
1122/* These two relocations create a two-word entry in the got. */
1123#define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1125
1126/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1127#define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1129
1130/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1132#define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1136\f
a7519a3c
RH
1137/* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
bf577467 1139 type. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
fd361982
AM
1170 if (!bfd_set_section_flags (newsect,
1171 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1172 return FALSE;
252b5132 1173 }
a7519a3c
RH
1174
1175 return TRUE;
252b5132
RH
1176}
1177
a7519a3c
RH
1178/* Convert Alpha specific section flags to bfd internal section flags. */
1179
b34976b6 1180static bfd_boolean
8c803a2d 1181elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
252b5132 1182{
a7519a3c 1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
8c803a2d 1184 hdr->bfd_section->flags |= SEC_SMALL_DATA;
252b5132 1185
a7519a3c
RH
1186 return TRUE;
1187}
252b5132 1188
a7519a3c
RH
1189/* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
9e756d64 1191
a7519a3c
RH
1192static bfd_boolean
1193elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194{
1195 register const char *name;
1196
fd361982 1197 name = bfd_section_name (sec);
a7519a3c
RH
1198
1199 if (strcmp (name, ".mdebug") == 0)
252b5132 1200 {
a7519a3c
RH
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1203 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
252b5132 1208 }
a7519a3c
RH
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1215
a7519a3c
RH
1216 return TRUE;
1217}
252b5132 1218
a7519a3c
RH
1219/* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222static bfd_boolean
1223elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228{
1229 if (sym->st_shndx == SHN_COMMON
0e1862bb 1230 && !bfd_link_relocatable (info)
a7519a3c 1231 && sym->st_size <= elf_gp_size (abfd))
252b5132 1232 {
a7519a3c
RH
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
ffcb7aff 1235
a7519a3c 1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1237
a7519a3c 1238 if (scomm == NULL)
252b5132 1239 {
a7519a3c
RH
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
ffcb7aff 1247
a7519a3c
RH
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
ffcb7aff 1251
a7519a3c
RH
1252 return TRUE;
1253}
252b5132 1254
a7519a3c 1255/* Create the .got section. */
252b5132 1256
a7519a3c
RH
1257static bfd_boolean
1258elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260{
85d162e6 1261 flagword flags;
a7519a3c 1262 asection *s;
252b5132 1263
0ffa91dd
NC
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
85d162e6
AM
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1270 if (s == NULL
fd361982 1271 || !bfd_set_section_alignment (s, 3))
a7519a3c 1272 return FALSE;
252b5132 1273
a7519a3c 1274 alpha_elf_tdata (abfd)->got = s;
252b5132 1275
85d162e6
AM
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
a7519a3c
RH
1281 return TRUE;
1282}
252b5132 1283
a7519a3c 1284/* Create all the dynamic sections. */
252b5132 1285
a7519a3c
RH
1286static bfd_boolean
1287elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288{
1289 asection *s;
85d162e6 1290 flagword flags;
a7519a3c 1291 struct elf_link_hash_entry *h;
252b5132 1292
0ffa91dd
NC
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
a7519a3c 1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1297
85d162e6
AM
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1302 elf_hash_table (info)->splt = s;
fd361982 1303 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1304 return FALSE;
252b5132 1305
a7519a3c
RH
1306 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1307 .plt section. */
7325306f
RS
1308 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1309 "_PROCEDURE_LINKAGE_TABLE_");
1310 elf_hash_table (info)->hplt = h;
1311 if (h == NULL)
a7519a3c 1312 return FALSE;
d6ad34f6 1313
85d162e6
AM
1314 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1315 | SEC_LINKER_CREATED | SEC_READONLY);
1316 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1317 elf_hash_table (info)->srelplt = s;
fd361982 1318 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1319 return FALSE;
252b5132 1320
6ec7057a
RH
1321 if (elf64_alpha_use_secureplt)
1322 {
85d162e6
AM
1323 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1324 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1325 elf_hash_table (info)->sgotplt = s;
fd361982 1326 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1327 return FALSE;
1328 }
1329
a7519a3c
RH
1330 /* We may or may not have created a .got section for this object, but
1331 we definitely havn't done the rest of the work. */
1cd6895c 1332
85d162e6
AM
1333 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1334 {
1335 if (!elf64_alpha_create_got_section (abfd, info))
1336 return FALSE;
1337 }
1cd6895c 1338
85d162e6
AM
1339 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1340 | SEC_LINKER_CREATED | SEC_READONLY);
1341 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1342 elf_hash_table (info)->srelgot = s;
a7519a3c 1343 if (s == NULL
fd361982 1344 || !bfd_set_section_alignment (s, 3))
a7519a3c 1345 return FALSE;
252b5132 1346
a7519a3c
RH
1347 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1348 dynobj's .got section. We don't do this in the linker script
1349 because we don't want to define the symbol if we are not creating
1350 a global offset table. */
d98685ac
AM
1351 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1352 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1353 elf_hash_table (info)->hgot = h;
d98685ac
AM
1354 if (h == NULL)
1355 return FALSE;
252b5132 1356
a7519a3c 1357 return TRUE;
252b5132 1358}
a7519a3c
RH
1359\f
1360/* Read ECOFF debugging information from a .mdebug section into a
1361 ecoff_debug_info structure. */
252b5132 1362
a7519a3c
RH
1363static bfd_boolean
1364elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1365 struct ecoff_debug_info *debug)
252b5132 1366{
a7519a3c
RH
1367 HDRR *symhdr;
1368 const struct ecoff_debug_swap *swap;
1369 char *ext_hdr = NULL;
252b5132 1370
a7519a3c
RH
1371 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1372 memset (debug, 0, sizeof (*debug));
252b5132 1373
a7519a3c
RH
1374 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1375 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1376 goto error_return;
252b5132 1377
a7519a3c
RH
1378 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1379 swap->external_hdr_size))
1380 goto error_return;
252b5132 1381
a7519a3c
RH
1382 symhdr = &debug->symbolic_header;
1383 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1384
a7519a3c
RH
1385 /* The symbolic header contains absolute file offsets and sizes to
1386 read. */
1387#define READ(ptr, offset, count, size, type) \
1f4361a7 1388 do \
a7519a3c 1389 { \
1f4361a7
AM
1390 size_t amt; \
1391 debug->ptr = NULL; \
1392 if (symhdr->count == 0) \
1393 break; \
1394 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1395 { \
1396 bfd_set_error (bfd_error_file_too_big); \
1397 goto error_return; \
1398 } \
2bb3687b 1399 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1400 goto error_return; \
2bb3687b
AM
1401 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1402 if (debug->ptr == NULL) \
a7519a3c 1403 goto error_return; \
1f4361a7 1404 } while (0)
fe8bc63d 1405
a7519a3c 1406 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1407 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1408 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1409 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1410 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1411 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1412 union aux_ext *);
1413 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1414 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1415 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1416 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1417 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1418#undef READ
252b5132 1419
a7519a3c 1420 debug->fdr = NULL;
252b5132 1421
a7519a3c 1422 return TRUE;
252b5132 1423
a7519a3c 1424 error_return:
c9594989
AM
1425 free (ext_hdr);
1426 free (debug->line);
1427 free (debug->external_dnr);
1428 free (debug->external_pdr);
1429 free (debug->external_sym);
1430 free (debug->external_opt);
1431 free (debug->external_aux);
1432 free (debug->ss);
1433 free (debug->ssext);
1434 free (debug->external_fdr);
1435 free (debug->external_rfd);
1436 free (debug->external_ext);
a7519a3c 1437 return FALSE;
252b5132
RH
1438}
1439
a7519a3c
RH
1440/* Alpha ELF local labels start with '$'. */
1441
b34976b6 1442static bfd_boolean
a7519a3c 1443elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1444{
a7519a3c
RH
1445 return name[0] == '$';
1446}
9e756d64 1447
a7519a3c 1448static bfd_boolean
fb167eb2
AM
1449elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1450 asection *section, bfd_vma offset,
1451 const char **filename_ptr,
a7519a3c 1452 const char **functionname_ptr,
fb167eb2
AM
1453 unsigned int *line_ptr,
1454 unsigned int *discriminator_ptr)
a7519a3c
RH
1455{
1456 asection *msec;
252b5132 1457
fb167eb2 1458 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1459 filename_ptr, functionname_ptr,
fb167eb2 1460 line_ptr, discriminator_ptr,
9defd221 1461 dwarf_debug_sections,
7f3bf384
AM
1462 &elf_tdata (abfd)->dwarf2_find_line_info)
1463 == 1)
b34976b6 1464 return TRUE;
9e756d64 1465
a7519a3c
RH
1466 msec = bfd_get_section_by_name (abfd, ".mdebug");
1467 if (msec != NULL)
1bbc9cec 1468 {
a7519a3c 1469 flagword origflags;
698600e4 1470 struct alpha_elf_find_line *fi;
a7519a3c
RH
1471 const struct ecoff_debug_swap * const swap =
1472 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1473
a7519a3c
RH
1474 /* If we are called during a link, alpha_elf_final_link may have
1475 cleared the SEC_HAS_CONTENTS field. We force it back on here
1476 if appropriate (which it normally will be). */
1477 origflags = msec->flags;
1478 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1479 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1480
698600e4 1481 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1482 if (fi == NULL)
1483 {
1484 bfd_size_type external_fdr_size;
1485 char *fraw_src;
1486 char *fraw_end;
1487 struct fdr *fdr_ptr;
698600e4 1488 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1489
698600e4 1490 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1491 if (fi == NULL)
1492 {
1493 msec->flags = origflags;
1494 return FALSE;
1495 }
9e756d64 1496
a7519a3c
RH
1497 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1498 {
1499 msec->flags = origflags;
1500 return FALSE;
1501 }
9e756d64 1502
a7519a3c
RH
1503 /* Swap in the FDR information. */
1504 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1505 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1506 if (fi->d.fdr == NULL)
1507 {
1508 msec->flags = origflags;
1509 return FALSE;
1510 }
1511 external_fdr_size = swap->external_fdr_size;
1512 fdr_ptr = fi->d.fdr;
1513 fraw_src = (char *) fi->d.external_fdr;
1514 fraw_end = (fraw_src
1515 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1516 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1517 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1518
698600e4 1519 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1520
a7519a3c 1521 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1522 find_nearest_line is either called all the time, as in
1523 objdump -l, so the information should be saved, or it is
1524 rarely called, as in ld error messages, so the memory
1525 wasted is unimportant. Still, it would probably be a
1526 good idea for free_cached_info to throw it away. */
a7519a3c 1527 }
9e756d64 1528
a7519a3c
RH
1529 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1530 &fi->i, filename_ptr, functionname_ptr,
1531 line_ptr))
1532 {
1533 msec->flags = origflags;
1534 return TRUE;
1535 }
9e756d64 1536
a7519a3c 1537 msec->flags = origflags;
9e756d64 1538 }
9e756d64 1539
a7519a3c 1540 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1541
fb167eb2 1542 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1543 filename_ptr, functionname_ptr,
fb167eb2 1544 line_ptr, discriminator_ptr);
9e756d64 1545}
a7519a3c
RH
1546\f
1547/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1548
a7519a3c 1549struct extsym_info
9e756d64 1550{
a7519a3c
RH
1551 bfd *abfd;
1552 struct bfd_link_info *info;
1553 struct ecoff_debug_info *debug;
1554 const struct ecoff_debug_swap *swap;
1555 bfd_boolean failed;
1556};
9e756d64 1557
a7519a3c 1558static bfd_boolean
2c3fc389 1559elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1560{
1561 struct extsym_info *einfo = (struct extsym_info *) data;
1562 bfd_boolean strip;
1563 asection *sec, *output_section;
9e756d64 1564
a7519a3c
RH
1565 if (h->root.indx == -2)
1566 strip = FALSE;
1567 else if ((h->root.def_dynamic
1568 || h->root.ref_dynamic
1569 || h->root.root.type == bfd_link_hash_new)
1570 && !h->root.def_regular
1571 && !h->root.ref_regular)
1572 strip = TRUE;
1573 else if (einfo->info->strip == strip_all
1574 || (einfo->info->strip == strip_some
1575 && bfd_hash_lookup (einfo->info->keep_hash,
1576 h->root.root.root.string,
1577 FALSE, FALSE) == NULL))
1578 strip = TRUE;
1579 else
1580 strip = FALSE;
9e756d64 1581
a7519a3c 1582 if (strip)
b34976b6 1583 return TRUE;
9e756d64 1584
a7519a3c 1585 if (h->esym.ifd == -2)
9e756d64 1586 {
a7519a3c
RH
1587 h->esym.jmptbl = 0;
1588 h->esym.cobol_main = 0;
1589 h->esym.weakext = 0;
1590 h->esym.reserved = 0;
1591 h->esym.ifd = ifdNil;
1592 h->esym.asym.value = 0;
1593 h->esym.asym.st = stGlobal;
9e756d64 1594
a7519a3c
RH
1595 if (h->root.root.type != bfd_link_hash_defined
1596 && h->root.root.type != bfd_link_hash_defweak)
1597 h->esym.asym.sc = scAbs;
1598 else
1599 {
1600 const char *name;
9e756d64 1601
a7519a3c
RH
1602 sec = h->root.root.u.def.section;
1603 output_section = sec->output_section;
9e756d64 1604
a7519a3c
RH
1605 /* When making a shared library and symbol h is the one from
1606 the another shared library, OUTPUT_SECTION may be null. */
1607 if (output_section == NULL)
1608 h->esym.asym.sc = scUndefined;
1609 else
1610 {
fd361982 1611 name = bfd_section_name (output_section);
9e756d64 1612
a7519a3c
RH
1613 if (strcmp (name, ".text") == 0)
1614 h->esym.asym.sc = scText;
1615 else if (strcmp (name, ".data") == 0)
1616 h->esym.asym.sc = scData;
1617 else if (strcmp (name, ".sdata") == 0)
1618 h->esym.asym.sc = scSData;
1619 else if (strcmp (name, ".rodata") == 0
1620 || strcmp (name, ".rdata") == 0)
1621 h->esym.asym.sc = scRData;
1622 else if (strcmp (name, ".bss") == 0)
1623 h->esym.asym.sc = scBss;
1624 else if (strcmp (name, ".sbss") == 0)
1625 h->esym.asym.sc = scSBss;
1626 else if (strcmp (name, ".init") == 0)
1627 h->esym.asym.sc = scInit;
1628 else if (strcmp (name, ".fini") == 0)
1629 h->esym.asym.sc = scFini;
1630 else
1631 h->esym.asym.sc = scAbs;
1632 }
1633 }
9e756d64 1634
a7519a3c
RH
1635 h->esym.asym.reserved = 0;
1636 h->esym.asym.index = indexNil;
1637 }
9e756d64 1638
a7519a3c
RH
1639 if (h->root.root.type == bfd_link_hash_common)
1640 h->esym.asym.value = h->root.root.u.c.size;
1641 else if (h->root.root.type == bfd_link_hash_defined
1642 || h->root.root.type == bfd_link_hash_defweak)
1643 {
1644 if (h->esym.asym.sc == scCommon)
1645 h->esym.asym.sc = scBss;
1646 else if (h->esym.asym.sc == scSCommon)
1647 h->esym.asym.sc = scSBss;
9e756d64 1648
a7519a3c
RH
1649 sec = h->root.root.u.def.section;
1650 output_section = sec->output_section;
1651 if (output_section != NULL)
1652 h->esym.asym.value = (h->root.root.u.def.value
1653 + sec->output_offset
1654 + output_section->vma);
1655 else
1656 h->esym.asym.value = 0;
1657 }
9e756d64 1658
a7519a3c
RH
1659 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1660 h->root.root.root.string,
1661 &h->esym))
1662 {
1663 einfo->failed = TRUE;
1664 return FALSE;
9e756d64
RH
1665 }
1666
a7519a3c
RH
1667 return TRUE;
1668}
1669\f
1670/* Search for and possibly create a got entry. */
9e756d64 1671
a7519a3c
RH
1672static struct alpha_elf_got_entry *
1673get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1674 unsigned long r_type, unsigned long r_symndx,
1675 bfd_vma r_addend)
1676{
1677 struct alpha_elf_got_entry *gotent;
1678 struct alpha_elf_got_entry **slot;
9e756d64 1679
a7519a3c
RH
1680 if (h)
1681 slot = &h->got_entries;
1682 else
1683 {
1684 /* This is a local .got entry -- record for merge. */
9e756d64 1685
a7519a3c 1686 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1687
a7519a3c
RH
1688 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1689 if (!local_got_entries)
1690 {
1691 bfd_size_type size;
1692 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1693
a7519a3c
RH
1694 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1695 size = symtab_hdr->sh_info;
1696 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1697
a7519a3c
RH
1698 local_got_entries
1699 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1700 if (!local_got_entries)
1701 return NULL;
1702
1703 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1704 }
1705
1706 slot = &local_got_entries[r_symndx];
9e756d64
RH
1707 }
1708
a7519a3c
RH
1709 for (gotent = *slot; gotent ; gotent = gotent->next)
1710 if (gotent->gotobj == abfd
1711 && gotent->reloc_type == r_type
1712 && gotent->addend == r_addend)
1713 break;
1714
1715 if (!gotent)
9e756d64 1716 {
a7519a3c 1717 int entry_size;
986f0783 1718 size_t amt;
9e756d64 1719
a7519a3c
RH
1720 amt = sizeof (struct alpha_elf_got_entry);
1721 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1722 if (!gotent)
1723 return NULL;
9e756d64 1724
a7519a3c
RH
1725 gotent->gotobj = abfd;
1726 gotent->addend = r_addend;
1727 gotent->got_offset = -1;
6ec7057a 1728 gotent->plt_offset = -1;
a7519a3c
RH
1729 gotent->use_count = 1;
1730 gotent->reloc_type = r_type;
1731 gotent->reloc_done = 0;
1732 gotent->reloc_xlated = 0;
9e756d64 1733
a7519a3c
RH
1734 gotent->next = *slot;
1735 *slot = gotent;
9e756d64 1736
a7519a3c
RH
1737 entry_size = alpha_got_entry_size (r_type);
1738 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1739 if (!h)
1740 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1741 }
a7519a3c
RH
1742 else
1743 gotent->use_count += 1;
9e756d64 1744
a7519a3c 1745 return gotent;
9e756d64
RH
1746}
1747
6ec7057a
RH
1748static bfd_boolean
1749elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1750{
1751 return ((ah->root.type == STT_FUNC
1752 || ah->root.root.type == bfd_link_hash_undefweak
1753 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1754 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1755 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1756}
1757
6fc5bb57
AM
1758/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1759 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1760 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1761 relocs to be sorted. */
1762
1763static bfd_boolean
1764elf64_alpha_sort_relocs_p (asection *sec)
1765{
1766 return (sec->flags & SEC_CODE) == 0;
1767}
1768
1769
a7519a3c
RH
1770/* Handle dynamic relocations when doing an Alpha ELF link. */
1771
b34976b6 1772static bfd_boolean
a7519a3c
RH
1773elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1774 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1775{
a7519a3c
RH
1776 bfd *dynobj;
1777 asection *sreloc;
252b5132 1778 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1779 struct alpha_elf_link_hash_entry **sym_hashes;
1780 const Elf_Internal_Rela *rel, *relend;
252b5132 1781
0e1862bb 1782 if (bfd_link_relocatable (info))
a7519a3c 1783 return TRUE;
252b5132 1784
0ffa91dd
NC
1785 BFD_ASSERT (is_alpha_elf (abfd));
1786
1787 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1788 if (dynobj == NULL)
0ffa91dd 1789 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1790
a7519a3c 1791 sreloc = NULL;
0ffa91dd
NC
1792 symtab_hdr = &elf_symtab_hdr (abfd);
1793 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1794
1795 relend = relocs + sec->reloc_count;
1796 for (rel = relocs; rel < relend; ++rel)
1797 {
1798 enum {
1799 NEED_GOT = 1,
1800 NEED_GOT_ENTRY = 2,
1801 NEED_DYNREL = 4
1802 };
1803
1804 unsigned long r_symndx, r_type;
1805 struct alpha_elf_link_hash_entry *h;
1806 unsigned int gotent_flags;
1807 bfd_boolean maybe_dynamic;
1808 unsigned int need;
1809 bfd_vma addend;
1810
1811 r_symndx = ELF64_R_SYM (rel->r_info);
1812 if (r_symndx < symtab_hdr->sh_info)
1813 h = NULL;
1814 else
1815 {
1816 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1817
a7519a3c
RH
1818 while (h->root.root.type == bfd_link_hash_indirect
1819 || h->root.root.type == bfd_link_hash_warning)
1820 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1821
81fbe831
AM
1822 /* PR15323, ref flags aren't set for references in the same
1823 object. */
a7519a3c
RH
1824 h->root.ref_regular = 1;
1825 }
252b5132 1826
a7519a3c 1827 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1828 locally or externally defined, as not all of the input files
1829 have yet been processed. Do something with what we know, as
1830 this may help reduce memory usage and processing time later. */
a7519a3c 1831 maybe_dynamic = FALSE;
0e1862bb 1832 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1833 && (!info->symbolic
1834 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1835 || !h->root.def_regular
1836 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1837 maybe_dynamic = TRUE;
252b5132 1838
a7519a3c
RH
1839 need = 0;
1840 gotent_flags = 0;
1841 r_type = ELF64_R_TYPE (rel->r_info);
1842 addend = rel->r_addend;
9e756d64 1843
9e756d64
RH
1844 switch (r_type)
1845 {
1846 case R_ALPHA_LITERAL:
a7519a3c
RH
1847 need = NEED_GOT | NEED_GOT_ENTRY;
1848
1849 /* Remember how this literal is used from its LITUSEs.
1850 This will be important when it comes to decide if we can
1851 create a .plt entry for a function symbol. */
1852 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1853 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1854 gotent_flags |= 1 << rel->r_addend;
1855 --rel;
1856
1857 /* No LITUSEs -- presumably the address is used somehow. */
1858 if (gotent_flags == 0)
1859 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1860 break;
1861
1862 case R_ALPHA_GPDISP:
1863 case R_ALPHA_GPREL16:
1864 case R_ALPHA_GPREL32:
9e756d64
RH
1865 case R_ALPHA_GPRELHIGH:
1866 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1867 case R_ALPHA_BRSGP:
1868 need = NEED_GOT;
1869 break;
1870
1871 case R_ALPHA_REFLONG:
1872 case R_ALPHA_REFQUAD:
0e1862bb 1873 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1874 need = NEED_DYNREL;
cc03ec80
RH
1875 break;
1876
9e756d64 1877 case R_ALPHA_TLSLDM:
cc03ec80 1878 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1879 reloc to the STN_UNDEF (0) symbol so that they all match. */
1880 r_symndx = STN_UNDEF;
a7519a3c
RH
1881 h = 0;
1882 maybe_dynamic = FALSE;
1883 /* FALLTHRU */
1884
1885 case R_ALPHA_TLSGD:
1886 case R_ALPHA_GOTDTPREL:
1887 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1888 break;
cc03ec80 1889
a7519a3c
RH
1890 case R_ALPHA_GOTTPREL:
1891 need = NEED_GOT | NEED_GOT_ENTRY;
1892 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1893 if (bfd_link_pic (info))
a7519a3c
RH
1894 info->flags |= DF_STATIC_TLS;
1895 break;
1896
1897 case R_ALPHA_TPREL64:
3cbc1e5e 1898 if (bfd_link_dll (info))
e366eeae
RH
1899 {
1900 info->flags |= DF_STATIC_TLS;
1901 need = NEED_DYNREL;
1902 }
1903 else if (maybe_dynamic)
a7519a3c 1904 need = NEED_DYNREL;
a7519a3c 1905 break;
252b5132
RH
1906 }
1907
a7519a3c 1908 if (need & NEED_GOT)
252b5132 1909 {
85d162e6 1910 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1911 {
a7519a3c
RH
1912 if (!elf64_alpha_create_got_section (abfd, info))
1913 return FALSE;
c328dc3f 1914 }
252b5132 1915 }
252b5132 1916
a7519a3c
RH
1917 if (need & NEED_GOT_ENTRY)
1918 {
1919 struct alpha_elf_got_entry *gotent;
252b5132 1920
a7519a3c
RH
1921 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1922 if (!gotent)
1923 return FALSE;
4a67a098 1924
a7519a3c 1925 if (gotent_flags)
cc03ec80 1926 {
a7519a3c
RH
1927 gotent->flags |= gotent_flags;
1928 if (h)
1929 {
1930 gotent_flags |= h->flags;
1931 h->flags = gotent_flags;
4a67a098 1932
a7519a3c 1933 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1934 /* ??? It appears that we won't make it into
1935 adjust_dynamic_symbol for symbols that remain
1936 totally undefined. Copying this check here means
1937 we can create a plt entry for them too. */
1938 h->root.needs_plt
1939 = (maybe_dynamic && elf64_alpha_want_plt (h));
1940 }
a7519a3c 1941 }
252b5132
RH
1942 }
1943
a7519a3c 1944 if (need & NEED_DYNREL)
9e756d64 1945 {
a7519a3c
RH
1946 /* We need to create the section here now whether we eventually
1947 use it or not so that it gets mapped to an output section by
83bac4b0 1948 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1949 if (sreloc == NULL)
9e756d64 1950 {
83bac4b0
NC
1951 sreloc = _bfd_elf_make_dynamic_reloc_section
1952 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1953
a7519a3c 1954 if (sreloc == NULL)
83bac4b0 1955 return FALSE;
9e756d64 1956 }
252b5132 1957
a7519a3c
RH
1958 if (h)
1959 {
1960 /* Since we havn't seen all of the input symbols yet, we
1961 don't know whether we'll actually need a dynamic relocation
1962 entry for this reloc. So make a record of it. Once we
1963 find out if this thing needs dynamic relocation we'll
1964 expand the relocation sections by the appropriate amount. */
9e756d64 1965
a7519a3c 1966 struct alpha_elf_reloc_entry *rent;
9e756d64 1967
a7519a3c
RH
1968 for (rent = h->reloc_entries; rent; rent = rent->next)
1969 if (rent->rtype == r_type && rent->srel == sreloc)
1970 break;
252b5132 1971
a7519a3c
RH
1972 if (!rent)
1973 {
986f0783 1974 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1975 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1976 if (!rent)
1977 return FALSE;
252b5132 1978
a7519a3c 1979 rent->srel = sreloc;
1f7f2abb 1980 rent->sec = sec;
a7519a3c
RH
1981 rent->rtype = r_type;
1982 rent->count = 1;
252b5132 1983
a7519a3c
RH
1984 rent->next = h->reloc_entries;
1985 h->reloc_entries = rent;
1986 }
1987 else
1988 rent->count++;
1989 }
0e1862bb 1990 else if (bfd_link_pic (info))
a7519a3c
RH
1991 {
1992 /* If this is a shared library, and the section is to be
1993 loaded into memory, we need a RELATIVE reloc. */
1994 sreloc->size += sizeof (Elf64_External_Rela);
1995 if (sec->flags & SEC_READONLY)
1f7f2abb
L
1996 {
1997 info->flags |= DF_TEXTREL;
1998 info->callbacks->minfo
1999 (_("%pB: dynamic relocation against `%pT' in "
2000 "read-only section `%pA'\n"),
2001 sec->owner, h->root.root.root.string, sec);
2002 }
a7519a3c 2003 }
252b5132
RH
2004 }
2005 }
2006
b34976b6 2007 return TRUE;
252b5132 2008}
252b5132 2009
e117360e
RH
2010/* Return the section that should be marked against GC for a given
2011 relocation. */
2012
2013static asection *
2014elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2015 Elf_Internal_Rela *rel,
2016 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2017{
2018 /* These relocations don't really reference a symbol. Instead we store
2019 extra data in their addend slot. Ignore the symbol. */
2020 switch (ELF64_R_TYPE (rel->r_info))
2021 {
2022 case R_ALPHA_LITUSE:
2023 case R_ALPHA_GPDISP:
2024 case R_ALPHA_HINT:
2025 return NULL;
2026 }
2027
2028 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2029}
2030
a7519a3c
RH
2031/* Adjust a symbol defined by a dynamic object and referenced by a
2032 regular object. The current definition is in some section of the
2033 dynamic object, but we're not including those sections. We have to
2034 change the definition to something the rest of the link can
2035 understand. */
252b5132 2036
b34976b6 2037static bfd_boolean
a7519a3c
RH
2038elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2039 struct elf_link_hash_entry *h)
252b5132 2040{
a7519a3c
RH
2041 bfd *dynobj;
2042 asection *s;
2043 struct alpha_elf_link_hash_entry *ah;
252b5132 2044
a7519a3c
RH
2045 dynobj = elf_hash_table(info)->dynobj;
2046 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2047
a7519a3c 2048 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2049 about whether this symbol should get a .plt entry. Irritatingly, it
2050 is common for folk to leave undefined symbols in shared libraries,
2051 and they still expect lazy binding; accept undefined symbols in lieu
2052 of STT_FUNC. */
2053 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2054 {
6ec7057a 2055 h->needs_plt = TRUE;
252b5132 2056
ce558b89 2057 s = elf_hash_table(info)->splt;
a7519a3c
RH
2058 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2059 return FALSE;
204692d7 2060
6ec7057a
RH
2061 /* We need one plt entry per got subsection. Delay allocation of
2062 the actual plt entries until size_plt_section, called from
2063 size_dynamic_sections or during relaxation. */
252b5132 2064
a7519a3c
RH
2065 return TRUE;
2066 }
2067 else
6ec7057a 2068 h->needs_plt = FALSE;
252b5132 2069
a7519a3c
RH
2070 /* If this is a weak symbol, and there is a real definition, the
2071 processor independent code will have arranged for us to see the
2072 real definition first, and we can just use the same value. */
60d67dc8 2073 if (h->is_weakalias)
252b5132 2074 {
60d67dc8
AM
2075 struct elf_link_hash_entry *def = weakdef (h);
2076 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2077 h->root.u.def.section = def->root.u.def.section;
2078 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2079 return TRUE;
252b5132 2080 }
a7519a3c
RH
2081
2082 /* This is a reference to a symbol defined by a dynamic object which
2083 is not a function. The Alpha, since it uses .got entries for all
2084 symbols even in regular objects, does not need the hackery of a
2085 .dynbss section and COPY dynamic relocations. */
252b5132 2086
b34976b6 2087 return TRUE;
252b5132
RH
2088}
2089
747ffa7b
AM
2090/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2091
2092static void
2093elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2094 const Elf_Internal_Sym *isym,
2095 bfd_boolean definition,
2096 bfd_boolean dynamic)
2097{
2098 if (!dynamic && definition)
2099 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2100 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2101}
2102
a7519a3c
RH
2103/* Symbol versioning can create new symbols, and make our old symbols
2104 indirect to the new ones. Consolidate the got and reloc information
2105 in these situations. */
252b5132 2106
48f4b4f5
RH
2107static void
2108elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2109 struct elf_link_hash_entry *dir,
2110 struct elf_link_hash_entry *ind)
252b5132 2111{
48f4b4f5
RH
2112 struct alpha_elf_link_hash_entry *hi
2113 = (struct alpha_elf_link_hash_entry *) ind;
2114 struct alpha_elf_link_hash_entry *hs
2115 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2116
48f4b4f5
RH
2117 /* Do the merging in the superclass. */
2118 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2119
a7519a3c 2120 /* Merge the flags. Whee. */
a7519a3c
RH
2121 hs->flags |= hi->flags;
2122
48f4b4f5
RH
2123 /* ??? It's unclear to me what's really supposed to happen when
2124 "merging" defweak and defined symbols, given that we don't
2125 actually throw away the defweak. This more-or-less copies
2126 the logic related to got and plt entries in the superclass. */
2127 if (ind->root.type != bfd_link_hash_indirect)
2128 return;
2129
a7519a3c
RH
2130 /* Merge the .got entries. Cannibalize the old symbol's list in
2131 doing so, since we don't need it anymore. */
2132
2133 if (hs->got_entries == NULL)
2134 hs->got_entries = hi->got_entries;
2135 else
2136 {
2137 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2138
2139 gsh = hs->got_entries;
2140 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2141 {
a7519a3c
RH
2142 gin = gi->next;
2143 for (gs = gsh; gs ; gs = gs->next)
2144 if (gi->gotobj == gs->gotobj
2145 && gi->reloc_type == gs->reloc_type
2146 && gi->addend == gs->addend)
2147 {
68994ca2 2148 gs->use_count += gi->use_count;
07d6d2b8 2149 goto got_found;
a7519a3c
RH
2150 }
2151 gi->next = hs->got_entries;
2152 hs->got_entries = gi;
2153 got_found:;
252b5132 2154 }
a7519a3c
RH
2155 }
2156 hi->got_entries = NULL;
252b5132 2157
a7519a3c
RH
2158 /* And similar for the reloc entries. */
2159
2160 if (hs->reloc_entries == NULL)
2161 hs->reloc_entries = hi->reloc_entries;
2162 else
2163 {
2164 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2165
2166 rsh = hs->reloc_entries;
2167 for (ri = hi->reloc_entries; ri ; ri = rin)
2168 {
2169 rin = ri->next;
2170 for (rs = rsh; rs ; rs = rs->next)
2171 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2172 {
2173 rs->count += ri->count;
2174 goto found_reloc;
2175 }
2176 ri->next = hs->reloc_entries;
2177 hs->reloc_entries = ri;
2178 found_reloc:;
2179 }
252b5132 2180 }
a7519a3c 2181 hi->reloc_entries = NULL;
252b5132
RH
2182}
2183
a7519a3c 2184/* Is it possible to merge two object file's .got tables? */
252b5132 2185
b34976b6 2186static bfd_boolean
a7519a3c 2187elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2188{
a7519a3c
RH
2189 int total = alpha_elf_tdata (a)->total_got_size;
2190 bfd *bsub;
252b5132 2191
a7519a3c
RH
2192 /* Trivial quick fallout test. */
2193 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2194 return TRUE;
252b5132 2195
a7519a3c
RH
2196 /* By their nature, local .got entries cannot be merged. */
2197 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2198 return FALSE;
252b5132 2199
a7519a3c
RH
2200 /* Failing the common trivial comparison, we must effectively
2201 perform the merge. Not actually performing the merge means that
2202 we don't have to store undo information in case we fail. */
2203 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2204 {
2205 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2206 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2207 int i, n;
2208
2209 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2210 for (i = 0; i < n; ++i)
2211 {
2212 struct alpha_elf_got_entry *ae, *be;
2213 struct alpha_elf_link_hash_entry *h;
2214
2215 h = hashes[i];
2216 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2217 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2218 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2219
2220 for (be = h->got_entries; be ; be = be->next)
2221 {
2222 if (be->use_count == 0)
07d6d2b8 2223 continue;
a7519a3c 2224 if (be->gotobj != b)
07d6d2b8 2225 continue;
a7519a3c
RH
2226
2227 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2228 if (ae->gotobj == a
a7519a3c
RH
2229 && ae->reloc_type == be->reloc_type
2230 && ae->addend == be->addend)
2231 goto global_found;
2232
2233 total += alpha_got_entry_size (be->reloc_type);
2234 if (total > MAX_GOT_SIZE)
07d6d2b8 2235 return FALSE;
a7519a3c
RH
2236 global_found:;
2237 }
2238 }
2239 }
252b5132 2240
b34976b6 2241 return TRUE;
252b5132
RH
2242}
2243
a7519a3c 2244/* Actually merge two .got tables. */
252b5132 2245
a7519a3c
RH
2246static void
2247elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2248{
a7519a3c
RH
2249 int total = alpha_elf_tdata (a)->total_got_size;
2250 bfd *bsub;
252b5132 2251
a7519a3c
RH
2252 /* Remember local expansion. */
2253 {
2254 int e = alpha_elf_tdata (b)->local_got_size;
2255 total += e;
2256 alpha_elf_tdata (a)->local_got_size += e;
2257 }
252b5132 2258
a7519a3c
RH
2259 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2260 {
2261 struct alpha_elf_got_entry **local_got_entries;
2262 struct alpha_elf_link_hash_entry **hashes;
2263 Elf_Internal_Shdr *symtab_hdr;
2264 int i, n;
252b5132 2265
a7519a3c
RH
2266 /* Let the local .got entries know they are part of a new subsegment. */
2267 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2268 if (local_got_entries)
07d6d2b8 2269 {
a7519a3c
RH
2270 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2271 for (i = 0; i < n; ++i)
2272 {
2273 struct alpha_elf_got_entry *ent;
2274 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2275 ent->gotobj = a;
a7519a3c 2276 }
07d6d2b8 2277 }
252b5132 2278
a7519a3c
RH
2279 /* Merge the global .got entries. */
2280 hashes = alpha_elf_sym_hashes (bsub);
2281 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2282
a7519a3c
RH
2283 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2284 for (i = 0; i < n; ++i)
07d6d2b8 2285 {
a7519a3c
RH
2286 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2287 struct alpha_elf_link_hash_entry *h;
252b5132 2288
a7519a3c
RH
2289 h = hashes[i];
2290 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2291 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2292 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2293
a7519a3c
RH
2294 pbe = start = &h->got_entries;
2295 while ((be = *pbe) != NULL)
2296 {
2297 if (be->use_count == 0)
07d6d2b8 2298 {
a7519a3c
RH
2299 *pbe = be->next;
2300 memset (be, 0xa5, sizeof (*be));
2301 goto kill;
07d6d2b8 2302 }
a7519a3c 2303 if (be->gotobj != b)
07d6d2b8 2304 goto next;
a7519a3c
RH
2305
2306 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2307 if (ae->gotobj == a
a7519a3c
RH
2308 && ae->reloc_type == be->reloc_type
2309 && ae->addend == be->addend)
2310 {
2311 ae->flags |= be->flags;
2312 ae->use_count += be->use_count;
2313 *pbe = be->next;
2314 memset (be, 0xa5, sizeof (*be));
2315 goto kill;
2316 }
2317 be->gotobj = a;
2318 total += alpha_got_entry_size (be->reloc_type);
252b5132 2319
a7519a3c
RH
2320 next:;
2321 pbe = &be->next;
2322 kill:;
2323 }
07d6d2b8 2324 }
252b5132 2325
a7519a3c
RH
2326 alpha_elf_tdata (bsub)->gotobj = a;
2327 }
2328 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2329
a7519a3c
RH
2330 /* Merge the two in_got chains. */
2331 {
2332 bfd *next;
252b5132 2333
a7519a3c
RH
2334 bsub = a;
2335 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2336 bsub = next;
252b5132 2337
a7519a3c
RH
2338 alpha_elf_tdata (bsub)->in_got_link_next = b;
2339 }
252b5132 2340}
a7519a3c
RH
2341
2342/* Calculate the offsets for the got entries. */
252b5132 2343
b34976b6 2344static bfd_boolean
a7519a3c 2345elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2346 void * arg ATTRIBUTE_UNUSED)
252b5132 2347{
a7519a3c 2348 struct alpha_elf_got_entry *gotent;
252b5132 2349
a7519a3c
RH
2350 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2351 if (gotent->use_count > 0)
2352 {
2353 struct alpha_elf_obj_tdata *td;
2354 bfd_size_type *plge;
252b5132 2355
a7519a3c 2356 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2357 plge = &td->got->size;
2358 gotent->got_offset = *plge;
2359 *plge += alpha_got_entry_size (gotent->reloc_type);
2360 }
252b5132 2361
6ec7057a 2362 return TRUE;
a7519a3c 2363}
252b5132 2364
a7519a3c
RH
2365static void
2366elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2367{
4dfe6ac6
NC
2368 bfd *i, *got_list;
2369 struct alpha_elf_link_hash_table * htab;
2370
2371 htab = alpha_elf_hash_table (info);
2372 if (htab == NULL)
2373 return;
2374 got_list = htab->got_list;
252b5132 2375
a7519a3c
RH
2376 /* First, zero out the .got sizes, as we may be recalculating the
2377 .got after optimizing it. */
2378 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2379 alpha_elf_tdata(i)->got->size = 0;
252b5132 2380
a7519a3c 2381 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2382 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2383 elf64_alpha_calc_got_offsets_for_symbol,
2384 NULL);
252b5132 2385
a7519a3c
RH
2386 /* Finally, fill in the offsets for the local entries. */
2387 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2388 {
2389 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2390 bfd *j;
252b5132 2391
a7519a3c
RH
2392 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2393 {
2394 struct alpha_elf_got_entry **local_got_entries, *gotent;
2395 int k, n;
252b5132 2396
a7519a3c
RH
2397 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2398 if (!local_got_entries)
2399 continue;
252b5132 2400
a7519a3c
RH
2401 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2402 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2403 if (gotent->use_count > 0)
07d6d2b8 2404 {
a7519a3c
RH
2405 gotent->got_offset = got_offset;
2406 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2407 }
a7519a3c 2408 }
252b5132 2409
a7519a3c
RH
2410 alpha_elf_tdata(i)->got->size = got_offset;
2411 }
2412}
252b5132 2413
a7519a3c 2414/* Constructs the gots. */
252b5132 2415
b34976b6 2416static bfd_boolean
d1c109de 2417elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2418 bfd_boolean may_merge)
252b5132 2419{
a7519a3c 2420 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2421 struct alpha_elf_link_hash_table * htab;
252b5132 2422
4dfe6ac6
NC
2423 htab = alpha_elf_hash_table (info);
2424 if (htab == NULL)
2425 return FALSE;
2426 got_list = htab->got_list;
95404643 2427
a7519a3c
RH
2428 /* On the first time through, pretend we have an existing got list
2429 consisting of all of the input files. */
2430 if (got_list == NULL)
252b5132 2431 {
c72f2fb2 2432 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2433 {
0ffa91dd
NC
2434 bfd *this_got;
2435
2436 if (! is_alpha_elf (i))
2437 continue;
2438
2439 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2440 if (this_got == NULL)
2441 continue;
252b5132 2442
a7519a3c
RH
2443 /* We are assuming no merging has yet occurred. */
2444 BFD_ASSERT (this_got == i);
252b5132 2445
07d6d2b8 2446 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2447 {
a7519a3c 2448 /* Yikes! A single object file has too many entries. */
4eca0228 2449 _bfd_error_handler
695344c0 2450 /* xgettext:c-format */
871b3ab2 2451 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2452 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2453 return FALSE;
252b5132 2454 }
252b5132 2455
a7519a3c
RH
2456 if (got_list == NULL)
2457 got_list = this_got;
2458 else
2459 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2460 cur_got_obj = this_got;
252b5132
RH
2461 }
2462
a7519a3c
RH
2463 /* Strange degenerate case of no got references. */
2464 if (got_list == NULL)
2465 return TRUE;
2466
4dfe6ac6 2467 htab->got_list = got_list;
a7519a3c
RH
2468 }
2469
2470 cur_got_obj = got_list;
0ffa91dd
NC
2471 if (cur_got_obj == NULL)
2472 return FALSE;
2473
d1c109de 2474 if (may_merge)
a7519a3c 2475 {
d1c109de
RH
2476 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2477 while (i != NULL)
252b5132 2478 {
d1c109de
RH
2479 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2480 {
2481 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2482
d1c109de
RH
2483 alpha_elf_tdata(i)->got->size = 0;
2484 i = alpha_elf_tdata(i)->got_link_next;
2485 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2486 }
2487 else
2488 {
2489 cur_got_obj = i;
2490 i = alpha_elf_tdata(i)->got_link_next;
2491 }
a7519a3c 2492 }
252b5132
RH
2493 }
2494
a7519a3c
RH
2495 /* Once the gots have been merged, fill in the got offsets for
2496 everything therein. */
4a828aab 2497 elf64_alpha_calc_got_offsets (info);
252b5132 2498
a7519a3c 2499 return TRUE;
252b5132 2500}
252b5132 2501
b34976b6 2502static bfd_boolean
2c3fc389
NC
2503elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2504 void * data)
252b5132 2505{
a7519a3c
RH
2506 asection *splt = (asection *) data;
2507 struct alpha_elf_got_entry *gotent;
6ec7057a 2508 bfd_boolean saw_one = FALSE;
252b5132 2509
a7519a3c
RH
2510 /* If we didn't need an entry before, we still don't. */
2511 if (!h->root.needs_plt)
2512 return TRUE;
e92d460e 2513
6ec7057a 2514 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2515 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2516 if (gotent->reloc_type == R_ALPHA_LITERAL
2517 && gotent->use_count > 0)
6ec7057a
RH
2518 {
2519 if (splt->size == 0)
2520 splt->size = PLT_HEADER_SIZE;
2521 gotent->plt_offset = splt->size;
2522 splt->size += PLT_ENTRY_SIZE;
2523 saw_one = TRUE;
2524 }
a7519a3c 2525
6ec7057a
RH
2526 /* If there weren't any, there's no longer a need for the PLT entry. */
2527 if (!saw_one)
2528 h->root.needs_plt = FALSE;
a7519a3c
RH
2529
2530 return TRUE;
2531}
2532
4a828aab
RH
2533/* Called from relax_section to rebuild the PLT in light of potential changes
2534 in the function's status. */
a7519a3c 2535
4a828aab 2536static void
a7519a3c
RH
2537elf64_alpha_size_plt_section (struct bfd_link_info *info)
2538{
6ec7057a 2539 asection *splt, *spltrel, *sgotplt;
a7519a3c 2540 unsigned long entries;
4dfe6ac6
NC
2541 struct alpha_elf_link_hash_table * htab;
2542
2543 htab = alpha_elf_hash_table (info);
2544 if (htab == NULL)
2545 return;
a7519a3c 2546
ce558b89 2547 splt = elf_hash_table(info)->splt;
a7519a3c 2548 if (splt == NULL)
4a828aab 2549 return;
252b5132 2550
a7519a3c 2551 splt->size = 0;
252b5132 2552
4dfe6ac6 2553 alpha_elf_link_hash_traverse (htab,
a7519a3c 2554 elf64_alpha_size_plt_section_1, splt);
e92d460e 2555
a7519a3c 2556 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2557 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2558 entries = 0;
a7519a3c 2559 if (splt->size)
6ec7057a
RH
2560 {
2561 if (elf64_alpha_use_secureplt)
2562 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2563 else
2564 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2565 }
a7519a3c 2566 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2567
6ec7057a
RH
2568 /* When using the secureplt, we need two words somewhere in the data
2569 segment for the dynamic linker to tell us where to go. This is the
2570 entire contents of the .got.plt section. */
2571 if (elf64_alpha_use_secureplt)
2572 {
ce558b89 2573 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2574 sgotplt->size = entries ? 16 : 0;
2575 }
a7519a3c 2576}
e92d460e 2577
a7519a3c
RH
2578static bfd_boolean
2579elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2580 struct bfd_link_info *info)
2581{
2582 bfd *i;
4dfe6ac6 2583 struct alpha_elf_link_hash_table * htab;
252b5132 2584
0e1862bb 2585 if (bfd_link_relocatable (info))
a7519a3c 2586 return TRUE;
252b5132 2587
4dfe6ac6
NC
2588 htab = alpha_elf_hash_table (info);
2589 if (htab == NULL)
2590 return FALSE;
2591
d1c109de 2592 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2593 return FALSE;
252b5132 2594
a7519a3c 2595 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2596 i = htab->got_list;
a7519a3c 2597 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2598 {
a7519a3c
RH
2599 asection *s = alpha_elf_tdata(i)->got;
2600 if (s->size > 0)
2601 {
2602 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2603 if (s->contents == NULL)
2604 return FALSE;
2605 }
252b5132
RH
2606 }
2607
b34976b6 2608 return TRUE;
252b5132 2609}
3765b1be 2610
a7519a3c 2611/* The number of dynamic relocations required by a static relocation. */
3765b1be 2612
a7519a3c 2613static int
e366eeae 2614alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2615{
2616 switch (r_type)
3765b1be 2617 {
a7519a3c
RH
2618 /* May appear in GOT entries. */
2619 case R_ALPHA_TLSGD:
2620 return (dynamic ? 2 : shared ? 1 : 0);
2621 case R_ALPHA_TLSLDM:
2622 return shared;
2623 case R_ALPHA_LITERAL:
a7519a3c 2624 return dynamic || shared;
e366eeae
RH
2625 case R_ALPHA_GOTTPREL:
2626 return dynamic || (shared && !pie);
a7519a3c
RH
2627 case R_ALPHA_GOTDTPREL:
2628 return dynamic;
3765b1be 2629
a7519a3c
RH
2630 /* May appear in data sections. */
2631 case R_ALPHA_REFLONG:
2632 case R_ALPHA_REFQUAD:
a7519a3c 2633 return dynamic || shared;
e366eeae
RH
2634 case R_ALPHA_TPREL64:
2635 return dynamic || (shared && !pie);
3765b1be 2636
a7519a3c
RH
2637 /* Everything else is illegal. We'll issue an error during
2638 relocate_section. */
2639 default:
2640 return 0;
2641 }
2642}
3765b1be 2643
a7519a3c 2644/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2645
a7519a3c
RH
2646static bfd_boolean
2647elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2648 struct bfd_link_info *info)
2649{
2650 bfd_boolean dynamic;
2651 struct alpha_elf_reloc_entry *relent;
2652 unsigned long entries;
3765b1be 2653
a7519a3c
RH
2654 /* If the symbol was defined as a common symbol in a regular object
2655 file, and there was no definition in any dynamic object, then the
2656 linker will have allocated space for the symbol in a common
2657 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2658 set. This is done for dynamic symbols in
2659 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2660 symbols, somehow. */
2661 if (!h->root.def_regular
2662 && h->root.ref_regular
2663 && !h->root.def_dynamic
2664 && (h->root.root.type == bfd_link_hash_defined
2665 || h->root.root.type == bfd_link_hash_defweak)
2666 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2667 h->root.def_regular = 1;
3765b1be 2668
a7519a3c
RH
2669 /* If the symbol is dynamic, we'll need all the relocations in their
2670 natural form. If this is a shared object, and it has been forced
2671 local, we'll need the same number of RELATIVE relocations. */
2672 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2673
a7519a3c
RH
2674 /* If the symbol is a hidden undefined weak, then we never have any
2675 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2676 based on bfd_link_pic (info). */
a7519a3c
RH
2677 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2678 return TRUE;
2679
2680 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2681 {
a7519a3c 2682 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2683 bfd_link_pic (info),
2684 bfd_link_pie (info));
a7519a3c
RH
2685 if (entries)
2686 {
1f7f2abb 2687 asection *sec = relent->sec;
a7519a3c
RH
2688 relent->srel->size +=
2689 entries * sizeof (Elf64_External_Rela) * relent->count;
1f7f2abb
L
2690 if ((sec->flags & SEC_READONLY) != 0)
2691 {
2692 info->flags |= DT_TEXTREL;
2693 info->callbacks->minfo
2694 (_("%pB: dynamic relocation against `%pT' in "
2695 "read-only section `%pA'\n"),
2696 sec->owner, h->root.root.root.string, sec);
2697 }
a7519a3c
RH
2698 }
2699 }
3765b1be 2700
a7519a3c
RH
2701 return TRUE;
2702}
3765b1be 2703
a7519a3c
RH
2704/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2705 global symbols. */
3765b1be 2706
a7519a3c
RH
2707static bfd_boolean
2708elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2709 struct bfd_link_info *info)
2710{
2711 bfd_boolean dynamic;
2712 struct alpha_elf_got_entry *gotent;
2713 unsigned long entries;
3765b1be 2714
6ec7057a
RH
2715 /* If we're using a plt for this symbol, then all of its relocations
2716 for its got entries go into .rela.plt. */
2717 if (h->root.needs_plt)
2718 return TRUE;
2719
a7519a3c
RH
2720 /* If the symbol is dynamic, we'll need all the relocations in their
2721 natural form. If this is a shared object, and it has been forced
2722 local, we'll need the same number of RELATIVE relocations. */
2723 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2724
2725 /* If the symbol is a hidden undefined weak, then we never have any
2726 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2727 based on bfd_link_pic (info). */
a7519a3c
RH
2728 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2729 return TRUE;
2730
2731 entries = 0;
2732 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2733 if (gotent->use_count > 0)
e366eeae 2734 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2735 bfd_link_pic (info),
2736 bfd_link_pie (info));
a7519a3c 2737
a7519a3c
RH
2738 if (entries > 0)
2739 {
ce558b89 2740 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2741 BFD_ASSERT (srel != NULL);
2742 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2743 }
3765b1be 2744
a7519a3c 2745 return TRUE;
3765b1be
RH
2746}
2747
a7519a3c 2748/* Set the sizes of the dynamic relocation sections. */
252b5132 2749
4a828aab 2750static void
a7519a3c 2751elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2752{
a7519a3c 2753 unsigned long entries;
ce558b89 2754 bfd *i;
a7519a3c 2755 asection *srel;
4dfe6ac6
NC
2756 struct alpha_elf_link_hash_table * htab;
2757
2758 htab = alpha_elf_hash_table (info);
2759 if (htab == NULL)
2760 return;
252b5132 2761
a7519a3c
RH
2762 /* Shared libraries often require RELATIVE relocs, and some relocs
2763 require attention for the main application as well. */
252b5132 2764
a7519a3c 2765 entries = 0;
4dfe6ac6 2766 for (i = htab->got_list;
a7519a3c
RH
2767 i ; i = alpha_elf_tdata(i)->got_link_next)
2768 {
2769 bfd *j;
3241278a 2770
a7519a3c
RH
2771 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2772 {
2773 struct alpha_elf_got_entry **local_got_entries, *gotent;
2774 int k, n;
252b5132 2775
a7519a3c
RH
2776 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2777 if (!local_got_entries)
2778 continue;
252b5132 2779
a7519a3c
RH
2780 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2781 for (gotent = local_got_entries[k];
2782 gotent ; gotent = gotent->next)
2783 if (gotent->use_count > 0)
2784 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2785 (gotent->reloc_type, 0, bfd_link_pic (info),
2786 bfd_link_pie (info)));
a7519a3c
RH
2787 }
2788 }
3765b1be 2789
ce558b89 2790 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2791 if (!srel)
2792 {
2793 BFD_ASSERT (entries == 0);
4a828aab 2794 return;
a7519a3c
RH
2795 }
2796 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2797
a7519a3c 2798 /* Now do the non-local symbols. */
4dfe6ac6 2799 alpha_elf_link_hash_traverse (htab,
a7519a3c 2800 elf64_alpha_size_rela_got_1, info);
a7519a3c 2801}
252b5132 2802
a7519a3c 2803/* Set the sizes of the dynamic sections. */
3765b1be 2804
a7519a3c
RH
2805static bfd_boolean
2806elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2807 struct bfd_link_info *info)
2808{
2809 bfd *dynobj;
2810 asection *s;
24f1a751 2811 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2812 struct alpha_elf_link_hash_table * htab;
2813
2814 htab = alpha_elf_hash_table (info);
2815 if (htab == NULL)
2816 return FALSE;
3765b1be 2817
a7519a3c
RH
2818 dynobj = elf_hash_table(info)->dynobj;
2819 BFD_ASSERT(dynobj != NULL);
252b5132 2820
a7519a3c
RH
2821 if (elf_hash_table (info)->dynamic_sections_created)
2822 {
2823 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2824 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2825 {
3d4d4302 2826 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2827 BFD_ASSERT (s != NULL);
2828 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2829 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2830 }
3765b1be 2831
a7519a3c
RH
2832 /* Now that we've seen all of the input files, we can decide which
2833 symbols need dynamic relocation entries and which don't. We've
2834 collected information in check_relocs that we can now apply to
2835 size the dynamic relocation sections. */
4dfe6ac6 2836 alpha_elf_link_hash_traverse (htab,
a7519a3c 2837 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2838
a7519a3c 2839 elf64_alpha_size_rela_got_section (info);
6ec7057a 2840 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2841 }
2842 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2843
a7519a3c
RH
2844 /* The check_relocs and adjust_dynamic_symbol entry points have
2845 determined the sizes of the various dynamic sections. Allocate
2846 memory for them. */
2847 relplt = FALSE;
24f1a751 2848 relocs = FALSE;
a7519a3c
RH
2849 for (s = dynobj->sections; s != NULL; s = s->next)
2850 {
2851 const char *name;
3765b1be 2852
a7519a3c
RH
2853 if (!(s->flags & SEC_LINKER_CREATED))
2854 continue;
cc03ec80 2855
a7519a3c
RH
2856 /* It's OK to base decisions on the section name, because none
2857 of the dynobj section names depend upon the input files. */
fd361982 2858 name = bfd_section_name (s);
3765b1be 2859
0112cd26 2860 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2861 {
c456f082 2862 if (s->size != 0)
a7519a3c 2863 {
c456f082 2864 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2865 relplt = TRUE;
24f1a751
AM
2866 else
2867 relocs = TRUE;
252b5132 2868
a7519a3c
RH
2869 /* We use the reloc_count field as a counter if we need
2870 to copy relocs into the output file. */
2871 s->reloc_count = 0;
252b5132 2872 }
3765b1be 2873 }
0112cd26 2874 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2875 && strcmp (name, ".plt") != 0
2876 && strcmp (name, ".dynbss") != 0)
3765b1be 2877 {
a7519a3c
RH
2878 /* It's not one of our dynamic sections, so don't allocate space. */
2879 continue;
2880 }
252b5132 2881
c456f082
AM
2882 if (s->size == 0)
2883 {
2884 /* If we don't need this section, strip it from the output file.
2885 This is to handle .rela.bss and .rela.plt. We must create it
2886 in create_dynamic_sections, because it must be created before
2887 the linker maps input sections to output sections. The
2888 linker does that before adjust_dynamic_symbol is called, and
2889 it is that function which decides whether anything needs to
2890 go into these sections. */
6452a567
RH
2891 if (!CONST_STRNEQ (name, ".got"))
2892 s->flags |= SEC_EXCLUDE;
c456f082
AM
2893 }
2894 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2895 {
2896 /* Allocate memory for the section contents. */
2897 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2898 if (s->contents == NULL)
b34976b6 2899 return FALSE;
a7519a3c
RH
2900 }
2901 }
3765b1be 2902
a7519a3c
RH
2903 if (elf_hash_table (info)->dynamic_sections_created)
2904 {
2905 /* Add some entries to the .dynamic section. We fill in the
2906 values later, in elf64_alpha_finish_dynamic_sections, but we
2907 must add the entries now so that we get the correct size for
2908 the .dynamic section. The DT_DEBUG entry is filled in by the
2909 dynamic linker and used by the debugger. */
2910#define add_dynamic_entry(TAG, VAL) \
2911 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2912
3084d7a2
L
2913 if (!_bfd_elf_add_dynamic_tags (output_bfd, info,
2914 relocs || relplt))
2915 return FALSE;
24f1a751 2916
3084d7a2
L
2917 if (relplt
2918 && elf64_alpha_use_secureplt
2919 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2920 return FALSE;
252b5132 2921 }
a7519a3c 2922#undef add_dynamic_entry
252b5132 2923
b34976b6 2924 return TRUE;
252b5132 2925}
a7519a3c
RH
2926\f
2927/* These functions do relaxation for Alpha ELF.
252b5132 2928
a7519a3c
RH
2929 Currently I'm only handling what I can do with existing compiler
2930 and assembler support, which means no instructions are removed,
2931 though some may be nopped. At this time GCC does not emit enough
2932 information to do all of the relaxing that is possible. It will
2933 take some not small amount of work for that to happen.
252b5132 2934
a7519a3c
RH
2935 There are a couple of interesting papers that I once read on this
2936 subject, that I cannot find references to at the moment, that
2937 related to Alpha in particular. They are by David Wall, then of
2938 DEC WRL. */
252b5132 2939
a7519a3c
RH
2940struct alpha_relax_info
2941{
2942 bfd *abfd;
2943 asection *sec;
2944 bfd_byte *contents;
2945 Elf_Internal_Shdr *symtab_hdr;
2946 Elf_Internal_Rela *relocs, *relend;
2947 struct bfd_link_info *link_info;
2948 bfd_vma gp;
2949 bfd *gotobj;
2950 asection *tsec;
2951 struct alpha_elf_link_hash_entry *h;
2952 struct alpha_elf_got_entry **first_gotent;
2953 struct alpha_elf_got_entry *gotent;
2954 bfd_boolean changed_contents;
2955 bfd_boolean changed_relocs;
2956 unsigned char other;
2957};
252b5132 2958
a7519a3c
RH
2959static Elf_Internal_Rela *
2960elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2961 Elf_Internal_Rela *relend,
2962 bfd_vma offset, int type)
2963{
2964 while (rel < relend)
252b5132 2965 {
a7519a3c
RH
2966 if (rel->r_offset == offset
2967 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2968 return rel;
2969 ++rel;
2970 }
2971 return NULL;
2972}
252b5132 2973
a7519a3c
RH
2974static bfd_boolean
2975elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
2976 Elf_Internal_Rela *irel, unsigned long r_type)
2977{
2978 unsigned int insn;
2979 bfd_signed_vma disp;
252b5132 2980
a7519a3c
RH
2981 /* Get the instruction. */
2982 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 2983
a7519a3c
RH
2984 if (insn >> 26 != OP_LDQ)
2985 {
2986 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 2987 _bfd_error_handler
695344c0 2988 /* xgettext:c-format */
2dcf00ce
AM
2989 (_("%pB: %pA+%#" PRIx64 ": warning: "
2990 "%s relocation against unexpected insn"),
2991 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
2992 return TRUE;
2993 }
252b5132 2994
a7519a3c
RH
2995 /* Can't relax dynamic symbols. */
2996 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
2997 return TRUE;
252b5132 2998
a7519a3c 2999 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3000 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3001 && bfd_link_dll (info->link_info))
a7519a3c 3002 return TRUE;
252b5132 3003
a7519a3c
RH
3004 if (r_type == R_ALPHA_LITERAL)
3005 {
3006 /* Look for nice constant addresses. This includes the not-uncommon
3007 special case of 0 for undefweak symbols. */
3008 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3009 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3010 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3011 {
3012 disp = 0;
3013 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3014 insn |= (symval & 0xffff);
3015 r_type = R_ALPHA_NONE;
3016 }
3017 else
3018 {
d1c109de
RH
3019 /* We may only create GPREL relocs during the second pass. */
3020 if (info->link_info->relax_pass == 0)
3021 return TRUE;
3022
a7519a3c
RH
3023 disp = symval - info->gp;
3024 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3025 r_type = R_ALPHA_GPREL16;
3026 }
252b5132
RH
3027 }
3028 else
252b5132 3029 {
a7519a3c 3030 bfd_vma dtp_base, tp_base;
252b5132 3031
a7519a3c
RH
3032 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3033 dtp_base = alpha_get_dtprel_base (info->link_info);
3034 tp_base = alpha_get_tprel_base (info->link_info);
3035 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3036
a7519a3c 3037 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3038
a7519a3c
RH
3039 switch (r_type)
3040 {
3041 case R_ALPHA_GOTDTPREL:
3042 r_type = R_ALPHA_DTPREL16;
3043 break;
3044 case R_ALPHA_GOTTPREL:
3045 r_type = R_ALPHA_TPREL16;
3046 break;
3047 default:
3048 BFD_ASSERT (0);
3049 return FALSE;
3050 }
3051 }
252b5132 3052
a7519a3c 3053 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3054 return TRUE;
252b5132 3055
a7519a3c
RH
3056 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3057 info->changed_contents = TRUE;
252b5132 3058
a7519a3c
RH
3059 /* Reduce the use count on this got entry by one, possibly
3060 eliminating it. */
3061 if (--info->gotent->use_count == 0)
252b5132 3062 {
a7519a3c
RH
3063 int sz = alpha_got_entry_size (r_type);
3064 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3065 if (!info->h)
3066 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3067 }
252b5132 3068
a7519a3c
RH
3069 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3070 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3071 info->changed_relocs = TRUE;
3072
3073 /* ??? Search forward through this basic block looking for insns
3074 that use the target register. Stop after an insn modifying the
3075 register is seen, or after a branch or call.
252b5132 3076
a7519a3c
RH
3077 Any such memory load insn may be substituted by a load directly
3078 off the GP. This allows the memory load insn to be issued before
3079 the calculated GP register would otherwise be ready.
252b5132 3080
a7519a3c
RH
3081 Any such jsr insn can be replaced by a bsr if it is in range.
3082
3083 This would mean that we'd have to _add_ relocations, the pain of
3084 which gives one pause. */
252b5132 3085
b34976b6 3086 return TRUE;
252b5132
RH
3087}
3088
a7519a3c
RH
3089static bfd_vma
3090elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3091{
a7519a3c
RH
3092 /* If the function has the same gp, and we can identify that the
3093 function does not use its function pointer, we can eliminate the
3094 address load. */
252b5132 3095
a7519a3c
RH
3096 /* If the symbol is marked NOPV, we are being told the function never
3097 needs its procedure value. */
3098 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3099 return symval;
252b5132 3100
a7519a3c
RH
3101 /* If the symbol is marked STD_GP, we are being told the function does
3102 a normal ldgp in the first two words. */
3103 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3104 ;
252b5132 3105
a7519a3c
RH
3106 /* Otherwise, we may be able to identify a GP load in the first two
3107 words, which we can then skip. */
3108 else
252b5132 3109 {
a7519a3c
RH
3110 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3111 bfd_vma ofs;
252b5132 3112
a7519a3c
RH
3113 /* Load the relocations from the section that the target symbol is in. */
3114 if (info->sec == info->tsec)
252b5132 3115 {
a7519a3c
RH
3116 tsec_relocs = info->relocs;
3117 tsec_relend = info->relend;
3118 tsec_free = NULL;
3119 }
3120 else
3121 {
3122 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3123 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3124 (Elf_Internal_Rela *) NULL,
3125 info->link_info->keep_memory));
3126 if (tsec_relocs == NULL)
3127 return 0;
3128 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3129 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3130 ? NULL
3131 : tsec_relocs);
a7519a3c 3132 }
252b5132 3133
a7519a3c
RH
3134 /* Recover the symbol's offset within the section. */
3135 ofs = (symval - info->tsec->output_section->vma
3136 - info->tsec->output_offset);
252b5132 3137
a7519a3c
RH
3138 /* Look for a GPDISP reloc. */
3139 gpdisp = (elf64_alpha_find_reloc_at_ofs
3140 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3141
a7519a3c
RH
3142 if (!gpdisp || gpdisp->r_addend != 4)
3143 {
c9594989 3144 free (tsec_free);
a7519a3c 3145 return 0;
252b5132 3146 }
c9594989 3147 free (tsec_free);
252b5132
RH
3148 }
3149
a7519a3c
RH
3150 /* We've now determined that we can skip an initial gp load. Verify
3151 that the call and the target use the same gp. */
f13a99db 3152 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3153 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3154 return 0;
252b5132 3155
a7519a3c
RH
3156 return symval + 8;
3157}
252b5132 3158
a7519a3c
RH
3159static bfd_boolean
3160elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3161 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3162{
d1c109de
RH
3163 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3164 int flags;
a7519a3c
RH
3165 bfd_signed_vma disp;
3166 bfd_boolean fits16;
3167 bfd_boolean fits32;
3168 bfd_boolean lit_reused = FALSE;
3169 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3170 bfd_boolean changed_contents;
3171 bfd_boolean changed_relocs;
3172 bfd_byte *contents = info->contents;
3173 bfd *abfd = info->abfd;
3174 bfd_vma sec_output_vma;
a7519a3c 3175 unsigned int lit_insn;
d1c109de 3176 int relax_pass;
252b5132 3177
d1c109de 3178 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3179 if (lit_insn >> 26 != OP_LDQ)
3180 {
4eca0228 3181 _bfd_error_handler
695344c0 3182 /* xgettext:c-format */
2dcf00ce 3183 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3184 "%s relocation against unexpected insn"),
3185 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3186 return TRUE;
3187 }
252b5132 3188
a7519a3c
RH
3189 /* Can't relax dynamic symbols. */
3190 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3191 return TRUE;
3192
d1c109de
RH
3193 changed_contents = info->changed_contents;
3194 changed_relocs = info->changed_relocs;
3195 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3196 relax_pass = info->link_info->relax_pass;
3197
a7519a3c 3198 /* Summarize how this particular LITERAL is used. */
d1c109de 3199 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3200 {
d1c109de 3201 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3202 break;
d1c109de
RH
3203 if (erel->r_addend <= 6)
3204 flags |= 1 << erel->r_addend;
a7519a3c 3205 }
252b5132 3206
a7519a3c
RH
3207 /* A little preparation for the loop... */
3208 disp = symval - info->gp;
252b5132 3209
d1c109de 3210 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3211 {
d1c109de 3212 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3213 unsigned int insn;
3214 int insn_disp;
3215 bfd_signed_vma xdisp;
d1c109de 3216 Elf_Internal_Rela nrel;
252b5132 3217
d1c109de 3218 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3219
a7519a3c
RH
3220 switch (urel->r_addend)
3221 {
3222 case LITUSE_ALPHA_ADDR:
3223 default:
3224 /* This type is really just a placeholder to note that all
3225 uses cannot be optimized, but to still allow some. */
3226 all_optimized = FALSE;
3227 break;
252b5132 3228
a7519a3c 3229 case LITUSE_ALPHA_BASE:
d1c109de
RH
3230 /* We may only create GPREL relocs during the second pass. */
3231 if (relax_pass == 0)
3232 {
3233 all_optimized = FALSE;
3234 break;
3235 }
3236
a7519a3c 3237 /* We can always optimize 16-bit displacements. */
252b5132 3238
a7519a3c
RH
3239 /* Extract the displacement from the instruction, sign-extending
3240 it if necessary, then test whether it is within 16 or 32 bits
3241 displacement from GP. */
3242 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3243
3244 xdisp = disp + insn_disp;
3245 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3246 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3247 && xdisp < 0x7fff8000);
3248
3249 if (fits16)
3250 {
3251 /* Take the op code and dest from this insn, take the base
3252 register from the literal insn. Leave the offset alone. */
3253 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3254 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3255 changed_contents = TRUE;
3256
3257 nrel = *urel;
3258 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3259 R_ALPHA_GPREL16);
3260 nrel.r_addend = irel->r_addend;
3261
3262 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3263 break the LITERAL+LITUSE chain. */
d1c109de 3264 if (urel < --erel)
07d6d2b8 3265 *urel-- = *erel;
d1c109de
RH
3266 *erel = nrel;
3267 changed_relocs = TRUE;
252b5132 3268 }
252b5132 3269
a7519a3c
RH
3270 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3271 else if (fits32 && !(flags & ~6))
3272 {
3273 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3274
a7519a3c
RH
3275 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3276 R_ALPHA_GPRELHIGH);
3277 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3278 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3279 lit_reused = TRUE;
d1c109de 3280 changed_contents = TRUE;
252b5132 3281
07d6d2b8
AM
3282 /* Since all relocs must be optimized, don't bother swapping
3283 this relocation to the end. */
a7519a3c
RH
3284 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3285 R_ALPHA_GPRELLOW);
3286 urel->r_addend = irel->r_addend;
d1c109de 3287 changed_relocs = TRUE;
a7519a3c
RH
3288 }
3289 else
3290 all_optimized = FALSE;
3291 break;
252b5132 3292
a7519a3c
RH
3293 case LITUSE_ALPHA_BYTOFF:
3294 /* We can always optimize byte instructions. */
252b5132 3295
a7519a3c
RH
3296 /* FIXME: sanity check the insn for byte op. Check that the
3297 literal dest reg is indeed Rb in the byte insn. */
252b5132 3298
a7519a3c
RH
3299 insn &= ~ (unsigned) 0x001ff000;
3300 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3301 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3302 changed_contents = TRUE;
3303
3304 nrel = *urel;
3305 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3306 nrel.r_addend = 0;
3307
3308 /* As we adjust, move the reloc to the end so that we don't
3309 break the LITERAL+LITUSE chain. */
3310 if (urel < --erel)
3311 *urel-- = *erel;
3312 *erel = nrel;
3313 changed_relocs = TRUE;
a7519a3c 3314 break;
252b5132 3315
a7519a3c
RH
3316 case LITUSE_ALPHA_JSR:
3317 case LITUSE_ALPHA_TLSGD:
3318 case LITUSE_ALPHA_TLSLDM:
8288a39e 3319 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3320 {
a7519a3c
RH
3321 bfd_vma optdest, org;
3322 bfd_signed_vma odisp;
252b5132 3323
a7519a3c
RH
3324 /* For undefined weak symbols, we're mostly interested in getting
3325 rid of the got entry whenever possible, so optimize this to a
3326 use of the zero register. */
3327 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3328 {
3329 insn |= 31 << 16;
d1c109de 3330 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3331
d1c109de 3332 changed_contents = TRUE;
a7519a3c
RH
3333 break;
3334 }
252b5132 3335
a7519a3c
RH
3336 /* If not zero, place to jump without needing pv. */
3337 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3338 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3339 odisp = (optdest ? optdest : symval) - org;
252b5132 3340
a7519a3c
RH
3341 if (odisp >= -0x400000 && odisp < 0x400000)
3342 {
3343 Elf_Internal_Rela *xrel;
252b5132 3344
a7519a3c
RH
3345 /* Preserve branch prediction call stack when possible. */
3346 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3347 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3348 else
3349 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3350 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3351 changed_contents = TRUE;
252b5132 3352
d1c109de
RH
3353 nrel = *urel;
3354 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3355 R_ALPHA_BRADDR);
3356 nrel.r_addend = irel->r_addend;
252b5132 3357
a7519a3c 3358 if (optdest)
d1c109de 3359 nrel.r_addend += optdest - symval;
a7519a3c
RH
3360 else
3361 all_optimized = FALSE;
252b5132 3362
a7519a3c
RH
3363 /* Kill any HINT reloc that might exist for this insn. */
3364 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3365 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3366 R_ALPHA_HINT));
3367 if (xrel)
3368 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3369
d1c109de
RH
3370 /* As we adjust, move the reloc to the end so that we don't
3371 break the LITERAL+LITUSE chain. */
3372 if (urel < --erel)
3373 *urel-- = *erel;
3374 *erel = nrel;
3375
a7519a3c
RH
3376 info->changed_relocs = TRUE;
3377 }
3378 else
3379 all_optimized = FALSE;
252b5132 3380
a7519a3c
RH
3381 /* Even if the target is not in range for a direct branch,
3382 if we share a GP, we can eliminate the gp reload. */
3383 if (optdest)
3384 {
3385 Elf_Internal_Rela *gpdisp
3386 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3387 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3388 R_ALPHA_GPDISP));
3389 if (gpdisp)
3390 {
d1c109de 3391 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3392 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3393 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3394 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3395
a7519a3c
RH
3396 /* Verify that the instruction is "ldah $29,0($26)".
3397 Consider a function that ends in a noreturn call,
3398 and that the next function begins with an ldgp,
3399 and that by accident there is no padding between.
3400 In that case the insn would use $27 as the base. */
3401 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3402 {
d1c109de
RH
3403 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3404 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3405
a7519a3c 3406 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3407 changed_contents = TRUE;
3408 changed_relocs = TRUE;
a7519a3c
RH
3409 }
3410 }
3411 }
3412 }
3413 break;
252b5132 3414 }
252b5132
RH
3415 }
3416
d1c109de
RH
3417 /* If we reused the literal instruction, we must have optimized all. */
3418 BFD_ASSERT(!lit_reused || all_optimized);
3419
a7519a3c
RH
3420 /* If all cases were optimized, we can reduce the use count on this
3421 got entry by one, possibly eliminating it. */
3422 if (all_optimized)
252b5132 3423 {
a7519a3c 3424 if (--info->gotent->use_count == 0)
252b5132 3425 {
a7519a3c
RH
3426 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3427 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3428 if (!info->h)
3429 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3430 }
a7519a3c
RH
3431
3432 /* If the literal instruction is no longer needed (it may have been
3433 reused. We can eliminate it. */
3434 /* ??? For now, I don't want to deal with compacting the section,
3435 so just nop it out. */
3436 if (!lit_reused)
252b5132 3437 {
a7519a3c 3438 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3439 changed_relocs = TRUE;
252b5132 3440
d1c109de
RH
3441 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3442 changed_contents = TRUE;
a7519a3c 3443 }
a7519a3c 3444 }
d1c109de
RH
3445
3446 info->changed_contents = changed_contents;
3447 info->changed_relocs = changed_relocs;
3448
3449 if (all_optimized || relax_pass == 0)
3450 return TRUE;
3451 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3452}
3453
b34976b6 3454static bfd_boolean
a7519a3c
RH
3455elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3456 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3457{
a7519a3c 3458 bfd_byte *pos[5];
891caa9b 3459 unsigned int insn, tlsgd_reg;
a7519a3c 3460 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3461 bfd_boolean dynamic, use_gottprel;
a7519a3c 3462 unsigned long new_symndx;
f44f99a5 3463
a7519a3c 3464 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3465
a7519a3c
RH
3466 /* If a TLS symbol is accessed using IE at least once, there is no point
3467 to use dynamic model for it. */
3468 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3469 ;
f44f99a5 3470
a7519a3c
RH
3471 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3472 then we might as well relax to IE. */
0e1862bb 3473 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3474 && (info->link_info->flags & DF_STATIC_TLS))
3475 ;
f44f99a5 3476
a7519a3c 3477 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3478 else if (bfd_link_pic (info->link_info))
a7519a3c 3479 return TRUE;
f44f99a5 3480
a7519a3c
RH
3481 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3482 the matching LITUSE_TLS relocations. */
3483 if (irel + 2 >= info->relend)
3484 return TRUE;
3485 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3486 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3487 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3488 return TRUE;
f44f99a5 3489
a7519a3c
RH
3490 /* There must be a GPDISP relocation positioned immediately after the
3491 LITUSE relocation. */
3492 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3493 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3494 if (!gpdisp)
b34976b6 3495 return TRUE;
f44f99a5 3496
a7519a3c
RH
3497 pos[0] = info->contents + irel[0].r_offset;
3498 pos[1] = info->contents + irel[1].r_offset;
3499 pos[2] = info->contents + irel[2].r_offset;
3500 pos[3] = info->contents + gpdisp->r_offset;
3501 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3502
7dbf3b76
RH
3503 /* Beware of the compiler hoisting part of the sequence out a loop
3504 and adjusting the destination register for the TLSGD insn. If this
3505 happens, there will be a move into $16 before the JSR insn, so only
3506 transformations of the first insn pair should use this register. */
3507 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3508 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3509
a7519a3c
RH
3510 /* Generally, the positions are not allowed to be out of order, lest the
3511 modified insn sequence have different register lifetimes. We can make
3512 an exception when pos 1 is adjacent to pos 0. */
3513 if (pos[1] + 4 == pos[0])
f44f99a5 3514 {
a7519a3c
RH
3515 bfd_byte *tmp = pos[0];
3516 pos[0] = pos[1];
3517 pos[1] = tmp;
f44f99a5 3518 }
a7519a3c
RH
3519 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3520 return TRUE;
cc03ec80 3521
a7519a3c
RH
3522 /* Reduce the use count on the LITERAL relocation. Do this before we
3523 smash the symndx when we adjust the relocations below. */
3524 {
3525 struct alpha_elf_got_entry *lit_gotent;
3526 struct alpha_elf_link_hash_entry *lit_h;
3527 unsigned long indx;
f44f99a5 3528
a7519a3c
RH
3529 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3530 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3531 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3532
a7519a3c
RH
3533 while (lit_h->root.root.type == bfd_link_hash_indirect
3534 || lit_h->root.root.type == bfd_link_hash_warning)
3535 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3536
a7519a3c
RH
3537 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3538 lit_gotent = lit_gotent->next)
3539 if (lit_gotent->gotobj == info->gotobj
3540 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3541 && lit_gotent->addend == irel[1].r_addend)
3542 break;
3543 BFD_ASSERT (lit_gotent);
252b5132 3544
a7519a3c
RH
3545 if (--lit_gotent->use_count == 0)
3546 {
3547 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3548 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3549 }
3550 }
252b5132 3551
a7519a3c 3552 /* Change
252b5132 3553
a7519a3c
RH
3554 lda $16,x($gp) !tlsgd!1
3555 ldq $27,__tls_get_addr($gp) !literal!1
3556 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3557 ldah $29,0($26) !gpdisp!2
3558 lda $29,0($29) !gpdisp!2
3559 to
3560 ldq $16,x($gp) !gottprel
3561 unop
3562 call_pal rduniq
3563 addq $16,$0,$0
3564 unop
3565 or the first pair to
3566 lda $16,x($gp) !tprel
3567 unop
3568 or
3569 ldah $16,x($gp) !tprelhi
3570 lda $16,x($16) !tprello
3571
3572 as appropriate. */
3573
3574 use_gottprel = FALSE;
cf35638d 3575 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3576
9a757e4d
RM
3577 /* Some compilers warn about a Boolean-looking expression being
3578 used in a switch. The explicit cast silences them. */
0e1862bb 3579 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3580 {
a7519a3c
RH
3581 case 1:
3582 {
3583 bfd_vma tp_base;
3584 bfd_signed_vma disp;
252b5132 3585
a7519a3c
RH
3586 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3587 tp_base = alpha_get_tprel_base (info->link_info);
3588 disp = symval - tp_base;
252b5132 3589
a7519a3c
RH
3590 if (disp >= -0x8000 && disp < 0x8000)
3591 {
891caa9b 3592 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3593 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3594 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3595
a7519a3c
RH
3596 irel[0].r_offset = pos[0] - info->contents;
3597 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3598 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3599 break;
3600 }
3601 else if (disp >= -(bfd_signed_vma) 0x80000000
3602 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3603 && pos[0] + 4 == pos[1])
a7519a3c 3604 {
891caa9b 3605 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3606 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3607 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3608 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3609
a7519a3c
RH
3610 irel[0].r_offset = pos[0] - info->contents;
3611 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3612 irel[1].r_offset = pos[1] - info->contents;
3613 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3614 break;
3615 }
3616 }
3617 /* FALLTHRU */
3765b1be 3618
3765b1be 3619 default:
a7519a3c
RH
3620 use_gottprel = TRUE;
3621
891caa9b 3622 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3623 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3624 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3625
3626 irel[0].r_offset = pos[0] - info->contents;
3627 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3628 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3629 break;
3765b1be 3630 }
3765b1be 3631
a7519a3c 3632 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3633
a7519a3c
RH
3634 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3635 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3636
a7519a3c 3637 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3638
a7519a3c
RH
3639 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3640 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3641
a7519a3c
RH
3642 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3643 irel[2].r_offset, R_ALPHA_HINT);
3644 if (hint)
3645 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3646
a7519a3c
RH
3647 info->changed_contents = TRUE;
3648 info->changed_relocs = TRUE;
d6ad34f6 3649
a7519a3c
RH
3650 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3651 if (--info->gotent->use_count == 0)
3765b1be 3652 {
a7519a3c
RH
3653 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3654 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3655 if (!info->h)
3656 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3657 }
252b5132 3658
a7519a3c
RH
3659 /* If we've switched to a GOTTPREL relocation, increment the reference
3660 count on that got entry. */
3661 if (use_gottprel)
f44f99a5 3662 {
a7519a3c 3663 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3664
a7519a3c
RH
3665 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3666 tprel_gotent = tprel_gotent->next)
3667 if (tprel_gotent->gotobj == info->gotobj
3668 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3669 && tprel_gotent->addend == irel->r_addend)
3670 break;
3671 if (tprel_gotent)
3672 tprel_gotent->use_count++;
3673 else
f44f99a5 3674 {
a7519a3c
RH
3675 if (info->gotent->use_count == 0)
3676 tprel_gotent = info->gotent;
3677 else
3678 {
3679 tprel_gotent = (struct alpha_elf_got_entry *)
3680 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3681 if (!tprel_gotent)
3682 return FALSE;
f44f99a5 3683
a7519a3c
RH
3684 tprel_gotent->next = *info->first_gotent;
3685 *info->first_gotent = tprel_gotent;
f44f99a5 3686
a7519a3c
RH
3687 tprel_gotent->gotobj = info->gotobj;
3688 tprel_gotent->addend = irel->r_addend;
3689 tprel_gotent->got_offset = -1;
3690 tprel_gotent->reloc_done = 0;
3691 tprel_gotent->reloc_xlated = 0;
3692 }
f44f99a5 3693
a7519a3c
RH
3694 tprel_gotent->use_count = 1;
3695 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3696 }
f44f99a5 3697 }
f44f99a5 3698
b34976b6 3699 return TRUE;
f44f99a5
RH
3700}
3701
b34976b6 3702static bfd_boolean
a7519a3c
RH
3703elf64_alpha_relax_section (bfd *abfd, asection *sec,
3704 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3705{
a7519a3c
RH
3706 Elf_Internal_Shdr *symtab_hdr;
3707 Elf_Internal_Rela *internal_relocs;
3708 Elf_Internal_Rela *irel, *irelend;
3709 Elf_Internal_Sym *isymbuf = NULL;
3710 struct alpha_elf_got_entry **local_got_entries;
3711 struct alpha_relax_info info;
4dfe6ac6 3712 struct alpha_elf_link_hash_table * htab;
d1c109de 3713 int relax_pass;
4dfe6ac6
NC
3714
3715 htab = alpha_elf_hash_table (link_info);
3716 if (htab == NULL)
3717 return FALSE;
f44f99a5 3718
4a828aab 3719 /* There's nothing to change, yet. */
a7519a3c 3720 *again = FALSE;
f44f99a5 3721
0e1862bb 3722 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3723 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3724 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3725 || sec->reloc_count == 0)
d6ad34f6
RH
3726 return TRUE;
3727
0ffa91dd 3728 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3729 relax_pass = link_info->relax_pass;
0ffa91dd 3730
4a828aab 3731 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3732 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3733 {
4dfe6ac6 3734 htab->relax_trip = link_info->relax_trip;
4a828aab 3735
d1c109de 3736 /* This should never fail after the initial round, since the only error
07d6d2b8 3737 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3738 may only merge got sections during the first pass. If we merge
3739 sections after we've created GPREL relocs, the GP for the merged
3740 section backs up which may put the relocs out of range. */
3741 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3742 abort ();
3743 if (elf_hash_table (link_info)->dynamic_sections_created)
3744 {
3745 elf64_alpha_size_plt_section (link_info);
3746 elf64_alpha_size_rela_got_section (link_info);
3747 }
3748 }
3749
0ffa91dd 3750 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3751 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3752
a7519a3c
RH
3753 /* Load the relocations for this section. */
3754 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3755 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3756 link_info->keep_memory));
3757 if (internal_relocs == NULL)
3758 return FALSE;
252b5132 3759
a7519a3c
RH
3760 memset(&info, 0, sizeof (info));
3761 info.abfd = abfd;
3762 info.sec = sec;
3763 info.link_info = link_info;
3764 info.symtab_hdr = symtab_hdr;
3765 info.relocs = internal_relocs;
3766 info.relend = irelend = internal_relocs + sec->reloc_count;
3767
3768 /* Find the GP for this object. Do not store the result back via
3769 _bfd_set_gp_value, since this could change again before final. */
3770 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3771 if (info.gotobj)
3765b1be 3772 {
a7519a3c
RH
3773 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3774 info.gp = (sgot->output_section->vma
3775 + sgot->output_offset
3776 + 0x8000);
252b5132
RH
3777 }
3778
a7519a3c
RH
3779 /* Get the section contents. */
3780 if (elf_section_data (sec)->this_hdr.contents != NULL)
3781 info.contents = elf_section_data (sec)->this_hdr.contents;
3782 else
3783 {
3784 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3785 goto error_return;
3786 }
252b5132 3787
a7519a3c
RH
3788 for (irel = internal_relocs; irel < irelend; irel++)
3789 {
3790 bfd_vma symval;
3791 struct alpha_elf_got_entry *gotent;
3792 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3793 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3794
3795 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3796 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3797 {
3798 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3799 if (relax_pass != 0)
3800 continue;
3801 if (r_type == R_ALPHA_TLSLDM)
3802 {
3803 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3804 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3805 r_symndx = STN_UNDEF;
3806 }
3807 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3808 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3809 && r_type != R_ALPHA_TLSGD)
3810 continue;
a7519a3c
RH
3811 }
3812
3813 /* Get the value of the symbol referred to by the reloc. */
3814 if (r_symndx < symtab_hdr->sh_info)
3815 {
3816 /* A local symbol. */
3817 Elf_Internal_Sym *isym;
3818
3819 /* Read this BFD's local symbols. */
3820 if (isymbuf == NULL)
3821 {
3822 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3823 if (isymbuf == NULL)
3824 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3825 symtab_hdr->sh_info, 0,
3826 NULL, NULL, NULL);
3827 if (isymbuf == NULL)
3828 goto error_return;
3829 }
252b5132 3830
a7519a3c 3831 isym = isymbuf + r_symndx;
252b5132 3832
a7519a3c
RH
3833 /* Given the symbol for a TLSLDM reloc is ignored, this also
3834 means forcing the symbol value to the tp base. */
3835 if (r_type == R_ALPHA_TLSLDM)
3836 {
3837 info.tsec = bfd_abs_section_ptr;
3838 symval = alpha_get_tprel_base (info.link_info);
3839 }
3840 else
3841 {
3842 symval = isym->st_value;
3843 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3844 continue;
a7519a3c 3845 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3846 info.tsec = bfd_abs_section_ptr;
a7519a3c 3847 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3848 info.tsec = bfd_com_section_ptr;
a7519a3c 3849 else
07d6d2b8 3850 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3851 }
252b5132 3852
a7519a3c
RH
3853 info.h = NULL;
3854 info.other = isym->st_other;
3855 if (local_got_entries)
3856 info.first_gotent = &local_got_entries[r_symndx];
3857 else
3858 {
3859 info.first_gotent = &info.gotent;
3860 info.gotent = NULL;
3861 }
252b5132 3862 }
a7519a3c
RH
3863 else
3864 {
3865 unsigned long indx;
3866 struct alpha_elf_link_hash_entry *h;
252b5132 3867
a7519a3c
RH
3868 indx = r_symndx - symtab_hdr->sh_info;
3869 h = alpha_elf_sym_hashes (abfd)[indx];
3870 BFD_ASSERT (h != NULL);
252b5132 3871
a7519a3c
RH
3872 while (h->root.root.type == bfd_link_hash_indirect
3873 || h->root.root.type == bfd_link_hash_warning)
3874 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3875
a7519a3c
RH
3876 /* If the symbol is undefined, we can't do anything with it. */
3877 if (h->root.root.type == bfd_link_hash_undefined)
3878 continue;
252b5132 3879
a7519a3c
RH
3880 /* If the symbol isn't defined in the current module,
3881 again we can't do anything. */
3882 if (h->root.root.type == bfd_link_hash_undefweak)
3883 {
3884 info.tsec = bfd_abs_section_ptr;
3885 symval = 0;
3886 }
3887 else if (!h->root.def_regular)
3888 {
3889 /* Except for TLSGD relocs, which can sometimes be
3890 relaxed to GOTTPREL relocs. */
3891 if (r_type != R_ALPHA_TLSGD)
3892 continue;
3893 info.tsec = bfd_abs_section_ptr;
3894 symval = 0;
3895 }
3896 else
3897 {
3898 info.tsec = h->root.root.u.def.section;
3899 symval = h->root.root.u.def.value;
3900 }
252b5132 3901
a7519a3c
RH
3902 info.h = h;
3903 info.other = h->root.other;
3904 info.first_gotent = &h->got_entries;
3905 }
252b5132 3906
a7519a3c
RH
3907 /* Search for the got entry to be used by this relocation. */
3908 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3909 if (gotent->gotobj == info.gotobj
3910 && gotent->reloc_type == r_type
3911 && gotent->addend == irel->r_addend)
3912 break;
3913 info.gotent = gotent;
252b5132 3914
a7519a3c
RH
3915 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3916 symval += irel->r_addend;
252b5132 3917
a7519a3c 3918 switch (r_type)
252b5132 3919 {
a7519a3c
RH
3920 case R_ALPHA_LITERAL:
3921 BFD_ASSERT(info.gotent != NULL);
252b5132 3922
a7519a3c
RH
3923 /* If there exist LITUSE relocations immediately following, this
3924 opens up all sorts of interesting optimizations, because we
3925 now know every location that this address load is used. */
3926 if (irel+1 < irelend
3927 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3928 {
a7519a3c
RH
3929 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3930 goto error_return;
252b5132 3931 }
a7519a3c
RH
3932 else
3933 {
3934 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3935 goto error_return;
3936 }
3937 break;
252b5132 3938
a7519a3c
RH
3939 case R_ALPHA_GOTDTPREL:
3940 case R_ALPHA_GOTTPREL:
3941 BFD_ASSERT(info.gotent != NULL);
3942 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3943 goto error_return;
3944 break;
3945
3946 case R_ALPHA_TLSGD:
3947 case R_ALPHA_TLSLDM:
3948 BFD_ASSERT(info.gotent != NULL);
3949 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3950 r_type == R_ALPHA_TLSGD))
3951 goto error_return;
3952 break;
252b5132
RH
3953 }
3954 }
3955
a7519a3c
RH
3956 if (isymbuf != NULL
3957 && symtab_hdr->contents != (unsigned char *) isymbuf)
3958 {
3959 if (!link_info->keep_memory)
3960 free (isymbuf);
3961 else
252b5132 3962 {
a7519a3c
RH
3963 /* Cache the symbols for elf_link_input_bfd. */
3964 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3965 }
a7519a3c 3966 }
252b5132 3967
a7519a3c
RH
3968 if (info.contents != NULL
3969 && elf_section_data (sec)->this_hdr.contents != info.contents)
3970 {
3971 if (!info.changed_contents && !link_info->keep_memory)
3972 free (info.contents);
3973 else
252b5132 3974 {
a7519a3c
RH
3975 /* Cache the section contents for elf_link_input_bfd. */
3976 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 3977 }
a7519a3c 3978 }
252b5132 3979
a7519a3c
RH
3980 if (elf_section_data (sec)->relocs != internal_relocs)
3981 {
3982 if (!info.changed_relocs)
3983 free (internal_relocs);
3984 else
3985 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3986 }
a7519a3c
RH
3987
3988 *again = info.changed_contents || info.changed_relocs;
252b5132 3989
b34976b6 3990 return TRUE;
252b5132 3991
a7519a3c 3992 error_return:
c9594989 3993 if (symtab_hdr->contents != (unsigned char *) isymbuf)
a7519a3c 3994 free (isymbuf);
c9594989 3995 if (elf_section_data (sec)->this_hdr.contents != info.contents)
a7519a3c 3996 free (info.contents);
c9594989 3997 if (elf_section_data (sec)->relocs != internal_relocs)
a7519a3c
RH
3998 free (internal_relocs);
3999 return FALSE;
4000}
4001\f
1bbc9cec
RH
4002/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4003 into the next available slot in SREL. */
4004
4005static void
a7519a3c
RH
4006elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4007 asection *sec, asection *srel, bfd_vma offset,
4008 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4009{
4010 Elf_Internal_Rela outrel;
4011 bfd_byte *loc;
4012
4013 BFD_ASSERT (srel != NULL);
4014
4015 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4016 outrel.r_addend = addend;
4017
4018 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4019 if ((offset | 1) != (bfd_vma) -1)
4020 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4021 else
4022 memset (&outrel, 0, sizeof (outrel));
4023
4024 loc = srel->contents;
4025 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4026 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4027 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4028}
4029
4a67a098
RH
4030/* Relocate an Alpha ELF section for a relocatable link.
4031
4032 We don't have to change anything unless the reloc is against a section
4033 symbol, in which case we have to adjust according to where the section
4034 symbol winds up in the output section. */
4035
b34976b6 4036static bfd_boolean
a7519a3c
RH
4037elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4038 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4039 bfd *input_bfd, asection *input_section,
4040 bfd_byte *contents ATTRIBUTE_UNUSED,
4041 Elf_Internal_Rela *relocs,
4042 Elf_Internal_Sym *local_syms,
4043 asection **local_sections)
4a67a098
RH
4044{
4045 unsigned long symtab_hdr_sh_info;
4046 Elf_Internal_Rela *rel;
4047 Elf_Internal_Rela *relend;
ab96bf03 4048 struct elf_link_hash_entry **sym_hashes;
b34976b6 4049 bfd_boolean ret_val = TRUE;
4a67a098 4050
0ffa91dd 4051 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4052 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4053
4054 relend = relocs + input_section->reloc_count;
4055 for (rel = relocs; rel < relend; rel++)
4056 {
4057 unsigned long r_symndx;
4058 Elf_Internal_Sym *sym;
4059 asection *sec;
4060 unsigned long r_type;
4061
ab96bf03 4062 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4063 if (r_type >= R_ALPHA_max)
4064 {
4eca0228 4065 _bfd_error_handler
695344c0 4066 /* xgettext:c-format */
0aa13fee 4067 (_("%pB: unsupported relocation type %#x"),
d003868e 4068 input_bfd, (int) r_type);
4a67a098 4069 bfd_set_error (bfd_error_bad_value);
b34976b6 4070 ret_val = FALSE;
4a67a098
RH
4071 continue;
4072 }
4073
4a67a098
RH
4074 /* The symbol associated with GPDISP and LITUSE is
4075 immaterial. Only the addend is significant. */
4076 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4077 continue;
4078
ab96bf03 4079 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4080 if (r_symndx < symtab_hdr_sh_info)
4081 {
4082 sym = local_syms + r_symndx;
ab96bf03 4083 sec = local_sections[r_symndx];
4a67a098 4084 }
ab96bf03
AM
4085 else
4086 {
4087 struct elf_link_hash_entry *h;
4088
4089 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4090
4091 while (h->root.type == bfd_link_hash_indirect
4092 || h->root.type == bfd_link_hash_warning)
4093 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4094
4095 if (h->root.type != bfd_link_hash_defined
4096 && h->root.type != bfd_link_hash_defweak)
4097 continue;
4098
4099 sym = NULL;
4100 sec = h->root.u.def.section;
4101 }
4102
dbaa2011 4103 if (sec != NULL && discarded_section (sec))
e4067dbb 4104 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4105 rel, 1, relend,
4106 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4107 contents);
ab96bf03
AM
4108
4109 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4110 rel->r_addend += sec->output_offset;
4a67a098
RH
4111 }
4112
4113 return ret_val;
4114}
4115
252b5132
RH
4116/* Relocate an Alpha ELF section. */
4117
b34976b6 4118static bfd_boolean
a7519a3c
RH
4119elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4120 bfd *input_bfd, asection *input_section,
4121 bfd_byte *contents, Elf_Internal_Rela *relocs,
4122 Elf_Internal_Sym *local_syms,
4123 asection **local_sections)
252b5132 4124{
4a67a098 4125 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4126 Elf_Internal_Rela *rel;
4127 Elf_Internal_Rela *relend;
4a67a098
RH
4128 asection *sgot, *srel, *srelgot;
4129 bfd *dynobj, *gotobj;
4130 bfd_vma gp, tp_base, dtp_base;
4131 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4132 bfd_boolean ret_val;
252b5132 4133
0ffa91dd 4134 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4135
4a67a098 4136 /* Handle relocatable links with a smaller loop. */
0e1862bb 4137 if (bfd_link_relocatable (info))
4a67a098
RH
4138 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4139 input_section, contents, relocs,
4140 local_syms, local_sections);
4141
4142 /* This is a final link. */
4143
b34976b6 4144 ret_val = TRUE;
252b5132 4145
0ffa91dd 4146 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4147
4a67a098 4148 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4149 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4150
3241278a
RH
4151 if (input_section->flags & SEC_ALLOC)
4152 {
4153 const char *section_name;
4154 section_name = (bfd_elf_string_from_elf_section
4155 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4156 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4157 BFD_ASSERT(section_name != NULL);
3d4d4302 4158 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4159 }
4160 else
4161 srel = NULL;
3765b1be 4162
4a67a098
RH
4163 /* Find the gp value for this input bfd. */
4164 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4165 if (gotobj)
4166 {
4167 sgot = alpha_elf_tdata (gotobj)->got;
4168 gp = _bfd_get_gp_value (gotobj);
4169 if (gp == 0)
252b5132 4170 {
4a67a098
RH
4171 gp = (sgot->output_section->vma
4172 + sgot->output_offset
4173 + 0x8000);
4174 _bfd_set_gp_value (gotobj, gp);
4175 }
4176 }
4177 else
4178 {
4179 sgot = NULL;
4180 gp = 0;
4181 }
3765b1be 4182
4a67a098
RH
4183 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4184
e1918d23 4185 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4186 {
e1918d23
AM
4187 dtp_base = alpha_get_dtprel_base (info);
4188 tp_base = alpha_get_tprel_base (info);
252b5132 4189 }
4a67a098
RH
4190 else
4191 dtp_base = tp_base = 0;
252b5132 4192
252b5132 4193 relend = relocs + input_section->reloc_count;
4a67a098 4194 for (rel = relocs; rel < relend; rel++)
252b5132 4195 {
4a67a098 4196 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4197 struct alpha_elf_got_entry *gotent;
4198 bfd_reloc_status_type r;
252b5132
RH
4199 reloc_howto_type *howto;
4200 unsigned long r_symndx;
4a67a098
RH
4201 Elf_Internal_Sym *sym = NULL;
4202 asection *sec = NULL;
3765b1be 4203 bfd_vma value;
dc810e39 4204 bfd_vma addend;
b34976b6 4205 bfd_boolean dynamic_symbol_p;
1d5316ab 4206 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4207 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4208 unsigned long r_type;
252b5132
RH
4209
4210 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4211 if (r_type >= R_ALPHA_max)
252b5132 4212 {
4eca0228 4213 _bfd_error_handler
695344c0 4214 /* xgettext:c-format */
0aa13fee 4215 (_("%pB: unsupported relocation type %#x"),
d003868e 4216 input_bfd, (int) r_type);
252b5132 4217 bfd_set_error (bfd_error_bad_value);
b34976b6 4218 ret_val = FALSE;
3765b1be 4219 continue;
252b5132 4220 }
252b5132 4221
3765b1be 4222 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4223 r_symndx = ELF64_R_SYM(rel->r_info);
4224
cc03ec80 4225 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4226 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4227 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4228 r_symndx = STN_UNDEF;
cc03ec80 4229
252b5132
RH
4230 if (r_symndx < symtab_hdr->sh_info)
4231 {
8517fae7 4232 asection *msec;
252b5132
RH
4233 sym = local_syms + r_symndx;
4234 sec = local_sections[r_symndx];
8517fae7
AM
4235 msec = sec;
4236 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4237
cf35638d 4238 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4239 this is hackery from relax_section. Force the value to
f915360b 4240 be the tls module base. */
cf35638d 4241 if (r_symndx == STN_UNDEF
cc03ec80
RH
4242 && (r_type == R_ALPHA_TLSLDM
4243 || r_type == R_ALPHA_GOTTPREL
4244 || r_type == R_ALPHA_TPREL64
4245 || r_type == R_ALPHA_TPRELHI
4246 || r_type == R_ALPHA_TPRELLO
4247 || r_type == R_ALPHA_TPREL16))
f915360b 4248 value = dtp_base;
cc03ec80 4249
4a67a098
RH
4250 if (local_got_entries)
4251 gotent = local_got_entries[r_symndx];
4252 else
4253 gotent = NULL;
3765b1be
RH
4254
4255 /* Need to adjust local GOT entries' addends for SEC_MERGE
4256 unless it has been done already. */
4257 if ((sec->flags & SEC_MERGE)
048d873d 4258 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4259 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4260 && gotent
4261 && !gotent->reloc_xlated)
3765b1be
RH
4262 {
4263 struct alpha_elf_got_entry *ent;
3765b1be
RH
4264
4265 for (ent = gotent; ent; ent = ent->next)
4266 {
4267 ent->reloc_xlated = 1;
4268 if (ent->use_count == 0)
4269 continue;
4270 msec = sec;
4271 ent->addend =
4272 _bfd_merged_section_offset (output_bfd, &msec,
4273 elf_section_data (sec)->
4274 sec_info,
753731ee 4275 sym->st_value + ent->addend);
3765b1be
RH
4276 ent->addend -= sym->st_value;
4277 ent->addend += msec->output_section->vma
4278 + msec->output_offset
4279 - sec->output_section->vma
4280 - sec->output_offset;
4281 }
4282 }
4283
b34976b6 4284 dynamic_symbol_p = FALSE;
252b5132
RH
4285 }
4286 else
4287 {
62d887d4 4288 bfd_boolean warned, ignored;
560e09e9 4289 struct elf_link_hash_entry *hh;
b2a8e766
AM
4290 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4291
4292 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4293 r_symndx, symtab_hdr, sym_hashes,
4294 hh, sec, value,
62d887d4 4295 unresolved_reloc, warned, ignored);
560e09e9
NC
4296
4297 if (warned)
4298 continue;
252b5132 4299
560e09e9
NC
4300 if (value == 0
4301 && ! unresolved_reloc
4302 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4303 undef_weak_ref = TRUE;
3765b1be 4304
560e09e9 4305 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4306 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4307 gotent = h->got_entries;
252b5132 4308 }
3765b1be 4309
dbaa2011 4310 if (sec != NULL && discarded_section (sec))
e4067dbb 4311 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4312 rel, 1, relend, howto, 0, contents);
ab96bf03 4313
252b5132 4314 addend = rel->r_addend;
3765b1be
RH
4315 value += addend;
4316
4317 /* Search for the proper got entry. */
4318 for (; gotent ; gotent = gotent->next)
4319 if (gotent->gotobj == gotobj
4320 && gotent->reloc_type == r_type
4321 && gotent->addend == addend)
4322 break;
252b5132
RH
4323
4324 switch (r_type)
4325 {
4326 case R_ALPHA_GPDISP:
4327 {
4328 bfd_byte *p_ldah, *p_lda;
4329
4330 BFD_ASSERT(gp != 0);
4331
3765b1be
RH
4332 value = (input_section->output_section->vma
4333 + input_section->output_offset
4334 + rel->r_offset);
252b5132 4335
3765b1be 4336 p_ldah = contents + rel->r_offset;
252b5132
RH
4337 p_lda = p_ldah + rel->r_addend;
4338
3765b1be 4339 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4340 p_ldah, p_lda);
4341 }
4342 break;
4343
252b5132 4344 case R_ALPHA_LITERAL:
3765b1be
RH
4345 BFD_ASSERT(sgot != NULL);
4346 BFD_ASSERT(gp != 0);
4347 BFD_ASSERT(gotent != NULL);
4348 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4349
3765b1be
RH
4350 if (!gotent->reloc_done)
4351 {
4352 gotent->reloc_done = 1;
252b5132 4353
3765b1be
RH
4354 bfd_put_64 (output_bfd, value,
4355 sgot->contents + gotent->got_offset);
252b5132 4356
3765b1be
RH
4357 /* If the symbol has been forced local, output a
4358 RELATIVE reloc, otherwise it will be handled in
4359 finish_dynamic_symbol. */
0e1862bb
L
4360 if (bfd_link_pic (info)
4361 && !dynamic_symbol_p
4362 && !undef_weak_ref)
1bbc9cec
RH
4363 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4364 gotent->got_offset, 0,
4365 R_ALPHA_RELATIVE, value);
3765b1be 4366 }
252b5132 4367
3765b1be
RH
4368 value = (sgot->output_section->vma
4369 + sgot->output_offset
4370 + gotent->got_offset);
4371 value -= gp;
252b5132
RH
4372 goto default_reloc;
4373
4374 case R_ALPHA_GPREL32:
ec1659c8 4375 case R_ALPHA_GPREL16:
252b5132 4376 case R_ALPHA_GPRELLOW:
3765b1be 4377 if (dynamic_symbol_p)
07d6d2b8 4378 {
4eca0228 4379 _bfd_error_handler
695344c0 4380 /* xgettext:c-format */
871b3ab2 4381 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4382 input_bfd, h->root.root.root.string);
4383 ret_val = FALSE;
4384 }
252b5132 4385 BFD_ASSERT(gp != 0);
3765b1be 4386 value -= gp;
252b5132
RH
4387 goto default_reloc;
4388
4389 case R_ALPHA_GPRELHIGH:
3765b1be 4390 if (dynamic_symbol_p)
07d6d2b8 4391 {
4eca0228 4392 _bfd_error_handler
695344c0 4393 /* xgettext:c-format */
871b3ab2 4394 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4395 input_bfd, h->root.root.root.string);
4396 ret_val = FALSE;
4397 }
252b5132 4398 BFD_ASSERT(gp != 0);
3765b1be
RH
4399 value -= gp;
4400 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4401 goto default_reloc;
4402
252b5132 4403 case R_ALPHA_HINT:
f94952df
RH
4404 /* A call to a dynamic symbol is definitely out of range of
4405 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4406 if (dynamic_symbol_p)
f94952df
RH
4407 {
4408 r = bfd_reloc_ok;
4409 break;
4410 }
3765b1be
RH
4411 /* The regular PC-relative stuff measures from the start of
4412 the instruction rather than the end. */
4413 value -= 4;
4414 goto default_reloc;
f94952df
RH
4415
4416 case R_ALPHA_BRADDR:
3765b1be 4417 if (dynamic_symbol_p)
07d6d2b8 4418 {
4eca0228 4419 _bfd_error_handler
695344c0 4420 /* xgettext:c-format */
871b3ab2 4421 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4422 input_bfd, h->root.root.root.string);
4423 ret_val = FALSE;
4424 }
252b5132
RH
4425 /* The regular PC-relative stuff measures from the start of
4426 the instruction rather than the end. */
3765b1be 4427 value -= 4;
252b5132
RH
4428 goto default_reloc;
4429
7793f4d0
RH
4430 case R_ALPHA_BRSGP:
4431 {
4432 int other;
4433 const char *name;
4434
4435 /* The regular PC-relative stuff measures from the start of
4436 the instruction rather than the end. */
3765b1be 4437 value -= 4;
7793f4d0 4438
ccf00ab6
RH
4439 /* The source and destination gp must be the same. Note that
4440 the source will always have an assigned gp, since we forced
4441 one in check_relocs, but that the destination may not, as
cedb70c5 4442 it might not have had any relocations at all. Also take
ccf00ab6
RH
4443 care not to crash if H is an undefined symbol. */
4444 if (h != NULL && sec != NULL
4445 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4446 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4447 {
4eca0228 4448 _bfd_error_handler
695344c0 4449 /* xgettext:c-format */
871b3ab2 4450 (_("%pB: change in gp: BRSGP %s"),
d003868e 4451 input_bfd, h->root.root.root.string);
b34976b6 4452 ret_val = FALSE;
7793f4d0
RH
4453 }
4454
4455 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4456 if (h != NULL)
4457 other = h->root.other;
4458 else
4459 other = sym->st_other;
4460 switch (other & STO_ALPHA_STD_GPLOAD)
4461 {
4462 case STO_ALPHA_NOPV:
07d6d2b8 4463 break;
7793f4d0 4464 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4465 value += 8;
7793f4d0
RH
4466 break;
4467 default:
4468 if (h != NULL)
4469 name = h->root.root.root.string;
4470 else
4471 {
4472 name = (bfd_elf_string_from_elf_section
4473 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4474 if (name == NULL)
4475 name = _("<unknown>");
4476 else if (name[0] == 0)
fd361982 4477 name = bfd_section_name (sec);
7793f4d0 4478 }
4eca0228 4479 _bfd_error_handler
695344c0 4480 /* xgettext:c-format */
871b3ab2 4481 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4482 input_bfd, name);
b34976b6 4483 ret_val = FALSE;
7793f4d0
RH
4484 break;
4485 }
4486
4487 goto default_reloc;
4488 }
4489
252b5132
RH
4490 case R_ALPHA_REFLONG:
4491 case R_ALPHA_REFQUAD:
3765b1be
RH
4492 case R_ALPHA_DTPREL64:
4493 case R_ALPHA_TPREL64:
252b5132 4494 {
1bbc9cec
RH
4495 long dynindx, dyntype = r_type;
4496 bfd_vma dynaddend;
252b5132
RH
4497
4498 /* Careful here to remember RELATIVE relocations for global
4499 variables for symbolic shared objects. */
4500
3765b1be 4501 if (dynamic_symbol_p)
252b5132
RH
4502 {
4503 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4504 dynindx = h->root.dynindx;
4505 dynaddend = addend;
3765b1be
RH
4506 addend = 0, value = 0;
4507 }
4508 else if (r_type == R_ALPHA_DTPREL64)
4509 {
e1918d23 4510 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4511 value -= dtp_base;
4512 goto default_reloc;
4513 }
4514 else if (r_type == R_ALPHA_TPREL64)
4515 {
e1918d23 4516 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4517 if (!bfd_link_dll (info))
1bbc9cec
RH
4518 {
4519 value -= tp_base;
4520 goto default_reloc;
4521 }
4522 dynindx = 0;
4523 dynaddend = value - dtp_base;
252b5132 4524 }
0e1862bb 4525 else if (bfd_link_pic (info)
cf35638d 4526 && r_symndx != STN_UNDEF
d6ad34f6 4527 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4528 && !undef_weak_ref
4529 && !(unresolved_reloc
4530 && (_bfd_elf_section_offset (output_bfd, info,
4531 input_section,
4532 rel->r_offset)
4533 == (bfd_vma) -1)))
252b5132 4534 {
3765b1be
RH
4535 if (r_type == R_ALPHA_REFLONG)
4536 {
4eca0228 4537 _bfd_error_handler
695344c0 4538 /* xgettext:c-format */
871b3ab2 4539 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4540 input_bfd,
3765b1be 4541 h->root.root.root.string);
b34976b6 4542 ret_val = FALSE;
3765b1be 4543 }
1bbc9cec
RH
4544 dynindx = 0;
4545 dyntype = R_ALPHA_RELATIVE;
4546 dynaddend = value;
252b5132
RH
4547 }
4548 else
4549 goto default_reloc;
4550
3241278a
RH
4551 if (input_section->flags & SEC_ALLOC)
4552 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4553 srel, rel->r_offset, dynindx,
4554 dyntype, dynaddend);
252b5132
RH
4555 }
4556 goto default_reloc;
4557
3765b1be 4558 case R_ALPHA_SREL16:
84de6048
RH
4559 case R_ALPHA_SREL32:
4560 case R_ALPHA_SREL64:
3765b1be 4561 if (dynamic_symbol_p)
07d6d2b8 4562 {
4eca0228 4563 _bfd_error_handler
695344c0 4564 /* xgettext:c-format */
871b3ab2 4565 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4566 input_bfd, h->root.root.root.string);
4567 ret_val = FALSE;
4568 }
3cbc1e5e 4569 else if (bfd_link_pic (info)
0e1862bb 4570 && undef_weak_ref)
07d6d2b8 4571 {
4eca0228 4572 _bfd_error_handler
695344c0 4573 /* xgettext:c-format */
871b3ab2 4574 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4575 input_bfd, h->root.root.root.string);
4576 ret_val = FALSE;
4577 }
d6ad34f6 4578
3765b1be 4579
84de6048
RH
4580 /* ??? .eh_frame references to discarded sections will be smashed
4581 to relocations against SHN_UNDEF. The .eh_frame format allows
4582 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4583 if (r_symndx == STN_UNDEF
4584 || (unresolved_reloc
4585 && _bfd_elf_section_offset (output_bfd, info,
4586 input_section,
4587 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4588 howto = (elf64_alpha_howto_table
4589 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4590 goto default_reloc;
4591
3765b1be
RH
4592 case R_ALPHA_TLSLDM:
4593 /* Ignore the symbol for the relocation. The result is always
4594 the current module. */
4595 dynamic_symbol_p = 0;
4596 /* FALLTHRU */
4597
4598 case R_ALPHA_TLSGD:
4599 if (!gotent->reloc_done)
4600 {
4601 gotent->reloc_done = 1;
4602
4603 /* Note that the module index for the main program is 1. */
0e1862bb
L
4604 bfd_put_64 (output_bfd,
4605 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4606 sgot->contents + gotent->got_offset);
4607
4608 /* If the symbol has been forced local, output a
4609 DTPMOD64 reloc, otherwise it will be handled in
4610 finish_dynamic_symbol. */
0e1862bb 4611 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4612 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4613 gotent->got_offset, 0,
4614 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4615
4616 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4617 value = 0;
4618 else
4619 {
e1918d23 4620 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4621 value -= dtp_base;
3765b1be
RH
4622 }
4623 bfd_put_64 (output_bfd, value,
4624 sgot->contents + gotent->got_offset + 8);
4625 }
4626
4627 value = (sgot->output_section->vma
4628 + sgot->output_offset
4629 + gotent->got_offset);
4630 value -= gp;
4631 goto default_reloc;
4632
4633 case R_ALPHA_DTPRELHI:
4634 case R_ALPHA_DTPRELLO:
4635 case R_ALPHA_DTPREL16:
4636 if (dynamic_symbol_p)
07d6d2b8 4637 {
4eca0228 4638 _bfd_error_handler
695344c0 4639 /* xgettext:c-format */
871b3ab2 4640 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4641 input_bfd, h->root.root.root.string);
4642 ret_val = FALSE;
4643 }
e1918d23 4644 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4645 value -= dtp_base;
9e756d64
RH
4646 if (r_type == R_ALPHA_DTPRELHI)
4647 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4648 goto default_reloc;
4649
4650 case R_ALPHA_TPRELHI:
4651 case R_ALPHA_TPRELLO:
4652 case R_ALPHA_TPREL16:
3cbc1e5e 4653 if (bfd_link_dll (info))
9e756d64 4654 {
4eca0228 4655 _bfd_error_handler
695344c0 4656 /* xgettext:c-format */
871b3ab2 4657 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4658 input_bfd);
07d6d2b8 4659 ret_val = FALSE;
9e756d64
RH
4660 }
4661 else if (dynamic_symbol_p)
07d6d2b8 4662 {
4eca0228 4663 _bfd_error_handler
695344c0 4664 /* xgettext:c-format */
871b3ab2 4665 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4666 input_bfd, h->root.root.root.string);
4667 ret_val = FALSE;
4668 }
e1918d23 4669 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4670 value -= tp_base;
9e756d64
RH
4671 if (r_type == R_ALPHA_TPRELHI)
4672 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4673 goto default_reloc;
4674
4675 case R_ALPHA_GOTDTPREL:
4676 case R_ALPHA_GOTTPREL:
4677 BFD_ASSERT(sgot != NULL);
4678 BFD_ASSERT(gp != 0);
4679 BFD_ASSERT(gotent != NULL);
4680 BFD_ASSERT(gotent->use_count >= 1);
4681
4682 if (!gotent->reloc_done)
4683 {
4684 gotent->reloc_done = 1;
4685
4686 if (dynamic_symbol_p)
4687 value = 0;
4688 else
4689 {
e1918d23 4690 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4691 if (r_type == R_ALPHA_GOTDTPREL)
4692 value -= dtp_base;
28fbeab8 4693 else if (bfd_link_executable (info))
1bbc9cec
RH
4694 value -= tp_base;
4695 else
4696 {
4697 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4698 gotent->got_offset, 0,
4699 R_ALPHA_TPREL64,
4700 value - dtp_base);
4701 value = 0;
4702 }
3765b1be
RH
4703 }
4704 bfd_put_64 (output_bfd, value,
4705 sgot->contents + gotent->got_offset);
4706 }
4707
4708 value = (sgot->output_section->vma
4709 + sgot->output_offset
4710 + gotent->got_offset);
4711 value -= gp;
4712 goto default_reloc;
4713
252b5132
RH
4714 default:
4715 default_reloc:
4716 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4717 contents, rel->r_offset, value, 0);
252b5132
RH
4718 break;
4719 }
4720
4721 switch (r)
4722 {
4723 case bfd_reloc_ok:
4724 break;
4725
4726 case bfd_reloc_overflow:
4727 {
4728 const char *name;
4729
ed4de5e2
JJ
4730 /* Don't warn if the overflow is due to pc relative reloc
4731 against discarded section. Section optimization code should
4732 handle it. */
4733
4734 if (r_symndx < symtab_hdr->sh_info
4735 && sec != NULL && howto->pc_relative
dbaa2011 4736 && discarded_section (sec))
ed4de5e2
JJ
4737 break;
4738
252b5132 4739 if (h != NULL)
dfeffb9f 4740 name = NULL;
252b5132
RH
4741 else
4742 {
4743 name = (bfd_elf_string_from_elf_section
4744 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4745 if (name == NULL)
b34976b6 4746 return FALSE;
252b5132 4747 if (*name == '\0')
fd361982 4748 name = bfd_section_name (sec);
252b5132 4749 }
1a72702b
AM
4750 (*info->callbacks->reloc_overflow)
4751 (info, (h ? &h->root.root : NULL), name, howto->name,
4752 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4753 }
4754 break;
4755
4756 default:
4757 case bfd_reloc_outofrange:
4758 abort ();
4759 }
4760 }
4761
f16fbd61 4762 return ret_val;
252b5132
RH
4763}
4764
4765/* Finish up dynamic symbol handling. We set the contents of various
4766 dynamic sections here. */
4767
b34976b6 4768static bfd_boolean
a7519a3c
RH
4769elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4770 struct elf_link_hash_entry *h,
4771 Elf_Internal_Sym *sym)
252b5132 4772{
6ec7057a 4773 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4774
6ec7057a 4775 if (h->needs_plt)
252b5132
RH
4776 {
4777 /* Fill in the .plt entry for this symbol. */
4778 asection *splt, *sgot, *srel;
4779 Elf_Internal_Rela outrel;
947216bf 4780 bfd_byte *loc;
252b5132
RH
4781 bfd_vma got_addr, plt_addr;
4782 bfd_vma plt_index;
4783 struct alpha_elf_got_entry *gotent;
4784
4785 BFD_ASSERT (h->dynindx != -1);
4786
ce558b89 4787 splt = elf_hash_table (info)->splt;
252b5132 4788 BFD_ASSERT (splt != NULL);
ce558b89 4789 srel = elf_hash_table (info)->srelplt;
252b5132 4790 BFD_ASSERT (srel != NULL);
252b5132 4791
6ec7057a
RH
4792 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4793 if (gotent->reloc_type == R_ALPHA_LITERAL
4794 && gotent->use_count > 0)
4795 {
4796 unsigned int insn;
4797 int disp;
252b5132 4798
6ec7057a
RH
4799 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4800 BFD_ASSERT (sgot != NULL);
252b5132 4801
6ec7057a
RH
4802 BFD_ASSERT (gotent->got_offset != -1);
4803 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4804
6ec7057a
RH
4805 got_addr = (sgot->output_section->vma
4806 + sgot->output_offset
4807 + gotent->got_offset);
4808 plt_addr = (splt->output_section->vma
4809 + splt->output_offset
4810 + gotent->plt_offset);
252b5132 4811
6ec7057a 4812 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4813
6ec7057a
RH
4814 /* Fill in the entry in the procedure linkage table. */
4815 if (elf64_alpha_use_secureplt)
4816 {
4817 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4818 insn = INSN_AD (INSN_BR, 31, disp);
4819 bfd_put_32 (output_bfd, insn,
4820 splt->contents + gotent->plt_offset);
252b5132 4821
6ec7057a
RH
4822 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4823 / NEW_PLT_ENTRY_SIZE);
4824 }
4825 else
4826 {
4827 disp = -(gotent->plt_offset + 4);
4828 insn = INSN_AD (INSN_BR, 28, disp);
4829 bfd_put_32 (output_bfd, insn,
4830 splt->contents + gotent->plt_offset);
4831 bfd_put_32 (output_bfd, INSN_UNOP,
4832 splt->contents + gotent->plt_offset + 4);
4833 bfd_put_32 (output_bfd, INSN_UNOP,
4834 splt->contents + gotent->plt_offset + 8);
4835
4836 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4837 / OLD_PLT_ENTRY_SIZE);
4838 }
252b5132 4839
6ec7057a
RH
4840 /* Fill in the entry in the .rela.plt section. */
4841 outrel.r_offset = got_addr;
4842 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4843 outrel.r_addend = 0;
252b5132 4844
6ec7057a
RH
4845 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4846 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4847
6ec7057a
RH
4848 /* Fill in the entry in the .got. */
4849 bfd_put_64 (output_bfd, plt_addr,
4850 sgot->contents + gotent->got_offset);
4851 }
252b5132
RH
4852 }
4853 else if (alpha_elf_dynamic_symbol_p (h, info))
4854 {
4855 /* Fill in the dynamic relocations for this symbol's .got entries. */
4856 asection *srel;
252b5132
RH
4857 struct alpha_elf_got_entry *gotent;
4858
ce558b89 4859 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4860 BFD_ASSERT (srel != NULL);
4861
252b5132
RH
4862 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4863 gotent != NULL;
4864 gotent = gotent->next)
4865 {
f44f99a5 4866 asection *sgot;
1bbc9cec 4867 long r_type;
3765b1be 4868
f44f99a5
RH
4869 if (gotent->use_count == 0)
4870 continue;
4871
4872 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4873
4874 r_type = gotent->reloc_type;
4875 switch (r_type)
4876 {
4877 case R_ALPHA_LITERAL:
4878 r_type = R_ALPHA_GLOB_DAT;
4879 break;
4880 case R_ALPHA_TLSGD:
4881 r_type = R_ALPHA_DTPMOD64;
4882 break;
4883 case R_ALPHA_GOTDTPREL:
4884 r_type = R_ALPHA_DTPREL64;
4885 break;
4886 case R_ALPHA_GOTTPREL:
4887 r_type = R_ALPHA_TPREL64;
4888 break;
4889 case R_ALPHA_TLSLDM:
4890 default:
4891 abort ();
4892 }
4893
68ffbac6 4894 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4895 gotent->got_offset, h->dynindx,
4896 r_type, gotent->addend);
3765b1be
RH
4897
4898 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4899 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4900 gotent->got_offset + 8, h->dynindx,
4901 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4902 }
4903 }
4904
4905 /* Mark some specially defined symbols as absolute. */
9637f6ef 4906 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4907 || h == elf_hash_table (info)->hgot
4908 || h == elf_hash_table (info)->hplt)
252b5132
RH
4909 sym->st_shndx = SHN_ABS;
4910
b34976b6 4911 return TRUE;
252b5132
RH
4912}
4913
4914/* Finish up the dynamic sections. */
4915
b34976b6 4916static bfd_boolean
a7519a3c
RH
4917elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4918 struct bfd_link_info *info)
252b5132
RH
4919{
4920 bfd *dynobj;
4921 asection *sdyn;
4922
4923 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4924 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4925
4926 if (elf_hash_table (info)->dynamic_sections_created)
4927 {
6ec7057a 4928 asection *splt, *sgotplt, *srelaplt;
252b5132 4929 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4930 bfd_vma plt_vma, gotplt_vma;
252b5132 4931
ce558b89
AM
4932 splt = elf_hash_table (info)->splt;
4933 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4934 BFD_ASSERT (splt != NULL && sdyn != NULL);
4935
6ec7057a
RH
4936 plt_vma = splt->output_section->vma + splt->output_offset;
4937
4938 gotplt_vma = 0;
4939 if (elf64_alpha_use_secureplt)
4940 {
ce558b89 4941 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4942 BFD_ASSERT (sgotplt != NULL);
4943 if (sgotplt->size > 0)
4944 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4945 }
4946
252b5132 4947 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4948 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4949 for (; dyncon < dynconend; dyncon++)
4950 {
4951 Elf_Internal_Dyn dyn;
252b5132
RH
4952
4953 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4954
4955 switch (dyn.d_tag)
4956 {
4957 case DT_PLTGOT:
6ec7057a
RH
4958 dyn.d_un.d_ptr
4959 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4960 break;
252b5132 4961 case DT_PLTRELSZ:
6ec7057a
RH
4962 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4963 break;
252b5132 4964 case DT_JMPREL:
4ade44b7
AM
4965 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4966 + srelaplt->output_offset) : 0;
6ec7057a 4967 break;
252b5132
RH
4968 }
4969
4970 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4971 }
4972
6ec7057a 4973 /* Initialize the plt header. */
eea6121a 4974 if (splt->size > 0)
252b5132 4975 {
6ec7057a
RH
4976 unsigned int insn;
4977 int ofs;
4978
4979 if (elf64_alpha_use_secureplt)
4980 {
4981 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
4982
4983 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
4984 bfd_put_32 (output_bfd, insn, splt->contents);
4985
4986 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
4987 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4988
4989 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
4990 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4991
4992 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
4993 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4994
4995 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
4996 bfd_put_32 (output_bfd, insn, splt->contents + 16);
4997
4998 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
4999 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5000
5001 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5002 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5003
5004 insn = INSN_AB (INSN_JMP, 31, 27);
5005 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5006
5007 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5008 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5009 }
5010 else
5011 {
5012 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5013 bfd_put_32 (output_bfd, insn, splt->contents);
5014
5015 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5016 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5017
5018 insn = INSN_UNOP;
5019 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5020
5021 insn = INSN_AB (INSN_JMP, 27, 27);
5022 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5023
5024 /* The next two words will be filled in by ld.so. */
5025 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5026 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5027 }
252b5132 5028
eecdbe52 5029 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5030 }
5031 }
5032
b34976b6 5033 return TRUE;
252b5132
RH
5034}
5035
96e2734b
RH
5036/* We need to use a special link routine to handle the .mdebug section.
5037 We need to merge all instances of these sections together, not write
5038 them all out sequentially. */
252b5132 5039
b34976b6 5040static bfd_boolean
a7519a3c 5041elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5042{
5043 asection *o;
5044 struct bfd_link_order *p;
96e2734b 5045 asection *mdebug_sec;
252b5132
RH
5046 struct ecoff_debug_info debug;
5047 const struct ecoff_debug_swap *swap
5048 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5049 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5050 void * mdebug_handle = NULL;
5051 struct alpha_elf_link_hash_table * htab;
5052
5053 htab = alpha_elf_hash_table (info);
5054 if (htab == NULL)
5055 return FALSE;
252b5132 5056
96e2734b 5057 /* Go through the sections and collect the mdebug information. */
252b5132 5058 mdebug_sec = NULL;
252b5132
RH
5059 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5060 {
252b5132
RH
5061 if (strcmp (o->name, ".mdebug") == 0)
5062 {
5063 struct extsym_info einfo;
5064
5065 /* We have found the .mdebug section in the output file.
5066 Look through all the link_orders comprising it and merge
5067 the information together. */
5068 symhdr->magic = swap->sym_magic;
5069 /* FIXME: What should the version stamp be? */
5070 symhdr->vstamp = 0;
5071 symhdr->ilineMax = 0;
5072 symhdr->cbLine = 0;
5073 symhdr->idnMax = 0;
5074 symhdr->ipdMax = 0;
5075 symhdr->isymMax = 0;
5076 symhdr->ioptMax = 0;
5077 symhdr->iauxMax = 0;
5078 symhdr->issMax = 0;
5079 symhdr->issExtMax = 0;
5080 symhdr->ifdMax = 0;
5081 symhdr->crfd = 0;
5082 symhdr->iextMax = 0;
5083
5084 /* We accumulate the debugging information itself in the
5085 debug_info structure. */
5086 debug.line = NULL;
5087 debug.external_dnr = NULL;
5088 debug.external_pdr = NULL;
5089 debug.external_sym = NULL;
5090 debug.external_opt = NULL;
5091 debug.external_aux = NULL;
5092 debug.ss = NULL;
5093 debug.ssext = debug.ssext_end = NULL;
5094 debug.external_fdr = NULL;
5095 debug.external_rfd = NULL;
5096 debug.external_ext = debug.external_ext_end = NULL;
5097
5098 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5099 if (mdebug_handle == NULL)
b34976b6 5100 return FALSE;
252b5132
RH
5101
5102 if (1)
5103 {
5104 asection *s;
5105 EXTR esym;
52b9d213 5106 bfd_vma last = 0;
252b5132
RH
5107 unsigned int i;
5108 static const char * const name[] =
5109 {
5110 ".text", ".init", ".fini", ".data",
5111 ".rodata", ".sdata", ".sbss", ".bss"
5112 };
5113 static const int sc[] = { scText, scInit, scFini, scData,
5114 scRData, scSData, scSBss, scBss };
5115
5116 esym.jmptbl = 0;
5117 esym.cobol_main = 0;
5118 esym.weakext = 0;
5119 esym.reserved = 0;
5120 esym.ifd = ifdNil;
5121 esym.asym.iss = issNil;
5122 esym.asym.st = stLocal;
5123 esym.asym.reserved = 0;
5124 esym.asym.index = indexNil;
5125 for (i = 0; i < 8; i++)
5126 {
5127 esym.asym.sc = sc[i];
5128 s = bfd_get_section_by_name (abfd, name[i]);
5129 if (s != NULL)
5130 {
5131 esym.asym.value = s->vma;
eea6121a 5132 last = s->vma + s->size;
252b5132
RH
5133 }
5134 else
5135 esym.asym.value = last;
5136
5137 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5138 name[i], &esym))
b34976b6 5139 return FALSE;
252b5132
RH
5140 }
5141 }
5142
8423293d 5143 for (p = o->map_head.link_order;
252b5132
RH
5144 p != (struct bfd_link_order *) NULL;
5145 p = p->next)
5146 {
5147 asection *input_section;
5148 bfd *input_bfd;
5149 const struct ecoff_debug_swap *input_swap;
5150 struct ecoff_debug_info input_debug;
5151 char *eraw_src;
5152 char *eraw_end;
5153
5154 if (p->type != bfd_indirect_link_order)
5155 {
fd96f80f 5156 if (p->type == bfd_data_link_order)
252b5132
RH
5157 continue;
5158 abort ();
5159 }
5160
5161 input_section = p->u.indirect.section;
5162 input_bfd = input_section->owner;
5163
0ffa91dd
NC
5164 if (! is_alpha_elf (input_bfd))
5165 /* I don't know what a non ALPHA ELF bfd would be
5166 doing with a .mdebug section, but I don't really
5167 want to deal with it. */
5168 continue;
252b5132
RH
5169
5170 input_swap = (get_elf_backend_data (input_bfd)
5171 ->elf_backend_ecoff_debug_swap);
5172
eea6121a 5173 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5174
5175 /* The ECOFF linking code expects that we have already
5176 read in the debugging information and set up an
5177 ecoff_debug_info structure, so we do that now. */
5178 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5179 &input_debug))
b34976b6 5180 return FALSE;
252b5132
RH
5181
5182 if (! (bfd_ecoff_debug_accumulate
5183 (mdebug_handle, abfd, &debug, swap, input_bfd,
5184 &input_debug, input_swap, info)))
b34976b6 5185 return FALSE;
252b5132
RH
5186
5187 /* Loop through the external symbols. For each one with
5188 interesting information, try to find the symbol in
5189 the linker global hash table and save the information
5190 for the output external symbols. */
21d799b5 5191 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5192 eraw_end = (eraw_src
5193 + (input_debug.symbolic_header.iextMax
5194 * input_swap->external_ext_size));
5195 for (;
5196 eraw_src < eraw_end;
5197 eraw_src += input_swap->external_ext_size)
5198 {
5199 EXTR ext;
5200 const char *name;
5201 struct alpha_elf_link_hash_entry *h;
5202
2c3fc389 5203 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5204 if (ext.asym.sc == scNil
5205 || ext.asym.sc == scUndefined
5206 || ext.asym.sc == scSUndefined)
5207 continue;
5208
5209 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5210 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5211 if (h == NULL || h->esym.ifd != -2)
5212 continue;
5213
5214 if (ext.ifd != -1)
5215 {
5216 BFD_ASSERT (ext.ifd
5217 < input_debug.symbolic_header.ifdMax);
5218 ext.ifd = input_debug.ifdmap[ext.ifd];
5219 }
5220
5221 h->esym = ext;
5222 }
5223
5224 /* Free up the information we just read. */
5225 free (input_debug.line);
5226 free (input_debug.external_dnr);
5227 free (input_debug.external_pdr);
5228 free (input_debug.external_sym);
5229 free (input_debug.external_opt);
5230 free (input_debug.external_aux);
5231 free (input_debug.ss);
5232 free (input_debug.ssext);
5233 free (input_debug.external_fdr);
5234 free (input_debug.external_rfd);
5235 free (input_debug.external_ext);
5236
5237 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5238 elf_link_input_bfd ignores this section. */
5239 input_section->flags &=~ SEC_HAS_CONTENTS;
5240 }
5241
252b5132
RH
5242 /* Build the external symbol information. */
5243 einfo.abfd = abfd;
5244 einfo.info = info;
5245 einfo.debug = &debug;
5246 einfo.swap = swap;
b34976b6 5247 einfo.failed = FALSE;
252b5132
RH
5248 elf_link_hash_traverse (elf_hash_table (info),
5249 elf64_alpha_output_extsym,
2c3fc389 5250 &einfo);
252b5132 5251 if (einfo.failed)
b34976b6 5252 return FALSE;
252b5132
RH
5253
5254 /* Set the size of the .mdebug section. */
eea6121a 5255 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5256
5257 /* Skip this section later on (I don't think this currently
5258 matters, but someday it might). */
8423293d 5259 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5260
5261 mdebug_sec = o;
5262 }
252b5132
RH
5263 }
5264
5265 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5266 if (! bfd_elf_final_link (abfd, info))
b34976b6 5267 return FALSE;
252b5132
RH
5268
5269 /* Now write out the computed sections. */
5270
5271 /* The .got subsections... */
5272 {
5273 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5274 for (i = htab->got_list;
252b5132
RH
5275 i != NULL;
5276 i = alpha_elf_tdata(i)->got_link_next)
5277 {
5278 asection *sgot;
5279
5280 /* elf_bfd_final_link already did everything in dynobj. */
5281 if (i == dynobj)
5282 continue;
5283
5284 sgot = alpha_elf_tdata(i)->got;
5285 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5286 sgot->contents,
5287 (file_ptr) sgot->output_offset,
eea6121a 5288 sgot->size))
b34976b6 5289 return FALSE;
252b5132
RH
5290 }
5291 }
5292
252b5132
RH
5293 if (mdebug_sec != (asection *) NULL)
5294 {
5295 BFD_ASSERT (abfd->output_has_begun);
5296 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5297 swap, info,
5298 mdebug_sec->filepos))
b34976b6 5299 return FALSE;
252b5132
RH
5300
5301 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5302 }
5303
b34976b6 5304 return TRUE;
252b5132 5305}
fcfbdf31
JJ
5306
5307static enum elf_reloc_type_class
7e612e98
AM
5308elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5309 const asection *rel_sec ATTRIBUTE_UNUSED,
5310 const Elf_Internal_Rela *rela)
fcfbdf31 5311{
f51e552e 5312 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5313 {
5314 case R_ALPHA_RELATIVE:
5315 return reloc_class_relative;
5316 case R_ALPHA_JMP_SLOT:
5317 return reloc_class_plt;
5318 case R_ALPHA_COPY:
5319 return reloc_class_copy;
5320 default:
5321 return reloc_class_normal;
5322 }
5323}
252b5132 5324\f
b35d266b 5325static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5326{
07d6d2b8 5327 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5328 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5329 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5330};
5331
252b5132
RH
5332/* ECOFF swapping routines. These are used when dealing with the
5333 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5334 from elf32-mips.c. */
252b5132
RH
5335static const struct ecoff_debug_swap
5336elf64_alpha_ecoff_debug_swap =
5337{
5338 /* Symbol table magic number. */
5339 magicSym2,
5340 /* Alignment of debugging information. E.g., 4. */
5341 8,
5342 /* Sizes of external symbolic information. */
5343 sizeof (struct hdr_ext),
5344 sizeof (struct dnr_ext),
5345 sizeof (struct pdr_ext),
5346 sizeof (struct sym_ext),
5347 sizeof (struct opt_ext),
5348 sizeof (struct fdr_ext),
5349 sizeof (struct rfd_ext),
5350 sizeof (struct ext_ext),
5351 /* Functions to swap in external symbolic data. */
5352 ecoff_swap_hdr_in,
5353 ecoff_swap_dnr_in,
5354 ecoff_swap_pdr_in,
5355 ecoff_swap_sym_in,
5356 ecoff_swap_opt_in,
5357 ecoff_swap_fdr_in,
5358 ecoff_swap_rfd_in,
5359 ecoff_swap_ext_in,
5360 _bfd_ecoff_swap_tir_in,
5361 _bfd_ecoff_swap_rndx_in,
5362 /* Functions to swap out external symbolic data. */
5363 ecoff_swap_hdr_out,
5364 ecoff_swap_dnr_out,
5365 ecoff_swap_pdr_out,
5366 ecoff_swap_sym_out,
5367 ecoff_swap_opt_out,
5368 ecoff_swap_fdr_out,
5369 ecoff_swap_rfd_out,
5370 ecoff_swap_ext_out,
5371 _bfd_ecoff_swap_tir_out,
5372 _bfd_ecoff_swap_rndx_out,
5373 /* Function to read in symbolic data. */
5374 elf64_alpha_read_ecoff_info
5375};
5376\f
70bcb145
JW
5377/* Use a non-standard hash bucket size of 8. */
5378
562ace6b 5379static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5380{
5381 sizeof (Elf64_External_Ehdr),
5382 sizeof (Elf64_External_Phdr),
5383 sizeof (Elf64_External_Shdr),
5384 sizeof (Elf64_External_Rel),
5385 sizeof (Elf64_External_Rela),
5386 sizeof (Elf64_External_Sym),
5387 sizeof (Elf64_External_Dyn),
5388 sizeof (Elf_External_Note),
5389 8,
5390 1,
45d6a902 5391 64, 3,
70bcb145
JW
5392 ELFCLASS64, EV_CURRENT,
5393 bfd_elf64_write_out_phdrs,
5394 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5395 bfd_elf64_checksum_contents,
70bcb145 5396 bfd_elf64_write_relocs,
73ff0d56 5397 bfd_elf64_swap_symbol_in,
70bcb145
JW
5398 bfd_elf64_swap_symbol_out,
5399 bfd_elf64_slurp_reloc_table,
5400 bfd_elf64_slurp_symbol_table,
5401 bfd_elf64_swap_dyn_in,
5402 bfd_elf64_swap_dyn_out,
947216bf
AM
5403 bfd_elf64_swap_reloc_in,
5404 bfd_elf64_swap_reloc_out,
5405 bfd_elf64_swap_reloca_in,
5406 bfd_elf64_swap_reloca_out
70bcb145
JW
5407};
5408
6d00b590 5409#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5410#define TARGET_LITTLE_NAME "elf64-alpha"
5411#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5412#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5413#define ELF_MACHINE_CODE EM_ALPHA
5414#define ELF_MAXPAGESIZE 0x10000
24718e3b 5415#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5416
5417#define bfd_elf64_bfd_link_hash_table_create \
5418 elf64_alpha_bfd_link_hash_table_create
5419
5420#define bfd_elf64_bfd_reloc_type_lookup \
5421 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5422#define bfd_elf64_bfd_reloc_name_lookup \
5423 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5424#define elf_info_to_howto \
5425 elf64_alpha_info_to_howto
5426
5427#define bfd_elf64_mkobject \
5428 elf64_alpha_mkobject
5429#define elf_backend_object_p \
5430 elf64_alpha_object_p
5431
5432#define elf_backend_section_from_shdr \
5433 elf64_alpha_section_from_shdr
204692d7
RH
5434#define elf_backend_section_flags \
5435 elf64_alpha_section_flags
252b5132
RH
5436#define elf_backend_fake_sections \
5437 elf64_alpha_fake_sections
5438
5439#define bfd_elf64_bfd_is_local_label_name \
5440 elf64_alpha_is_local_label_name
5441#define bfd_elf64_find_nearest_line \
5442 elf64_alpha_find_nearest_line
5443#define bfd_elf64_bfd_relax_section \
5444 elf64_alpha_relax_section
5445
5446#define elf_backend_add_symbol_hook \
5447 elf64_alpha_add_symbol_hook
13285a1b
AM
5448#define elf_backend_relocs_compatible \
5449 _bfd_elf_relocs_compatible
6fc5bb57
AM
5450#define elf_backend_sort_relocs_p \
5451 elf64_alpha_sort_relocs_p
252b5132
RH
5452#define elf_backend_check_relocs \
5453 elf64_alpha_check_relocs
5454#define elf_backend_create_dynamic_sections \
5455 elf64_alpha_create_dynamic_sections
5456#define elf_backend_adjust_dynamic_symbol \
5457 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5458#define elf_backend_merge_symbol_attribute \
5459 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5460#define elf_backend_copy_indirect_symbol \
5461 elf64_alpha_copy_indirect_symbol
252b5132
RH
5462#define elf_backend_always_size_sections \
5463 elf64_alpha_always_size_sections
5464#define elf_backend_size_dynamic_sections \
5465 elf64_alpha_size_dynamic_sections
74541ad4 5466#define elf_backend_omit_section_dynsym \
d00dd7dc 5467 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5468#define elf_backend_relocate_section \
5469 elf64_alpha_relocate_section
5470#define elf_backend_finish_dynamic_symbol \
5471 elf64_alpha_finish_dynamic_symbol
5472#define elf_backend_finish_dynamic_sections \
5473 elf64_alpha_finish_dynamic_sections
5474#define bfd_elf64_bfd_final_link \
5475 elf64_alpha_final_link
fcfbdf31
JJ
5476#define elf_backend_reloc_type_class \
5477 elf64_alpha_reloc_type_class
252b5132 5478
e117360e
RH
5479#define elf_backend_can_gc_sections 1
5480#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5481
252b5132
RH
5482#define elf_backend_ecoff_debug_swap \
5483 &elf64_alpha_ecoff_debug_swap
5484
70bcb145
JW
5485#define elf_backend_size_info \
5486 alpha_elf_size_info
5487
29ef7005
L
5488#define elf_backend_special_sections \
5489 elf64_alpha_special_sections
2f89ff8d 5490
6f6fd151
L
5491#define elf_backend_strip_zero_sized_dynamic_sections \
5492 _bfd_elf_strip_zero_sized_dynamic_sections
5493
38b1a46c 5494/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5495#define elf_backend_want_got_plt 0
5496#define elf_backend_plt_readonly 0
5497#define elf_backend_want_plt_sym 1
5498#define elf_backend_got_header_size 0
64f52338 5499#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5500
5501#include "elf64-target.h"
2238051f
RH
5502\f
5503/* FreeBSD support. */
5504
5505#undef TARGET_LITTLE_SYM
6d00b590 5506#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5507#undef TARGET_LITTLE_NAME
5508#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5509#undef ELF_OSABI
5510#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5511
5512/* The kernel recognizes executables as valid only if they carry a
5513 "FreeBSD" label in the ELF header. So we put this label on all
5514 executables and (for simplicity) also all other object files. */
5515
ed7e9d0b
AM
5516static bfd_boolean
5517elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5518{
5519 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5520
ed7e9d0b
AM
5521 if (!_bfd_elf_init_file_header (abfd, info))
5522 return FALSE;
5523
2238051f
RH
5524 i_ehdrp = elf_elfheader (abfd);
5525
5526 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5527 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5528#ifdef OLD_FREEBSD_ABI_LABEL
5529 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5530 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5531#endif
ed7e9d0b 5532 return TRUE;
2238051f
RH
5533}
5534
ed7e9d0b
AM
5535#undef elf_backend_init_file_header
5536#define elf_backend_init_file_header \
5537 elf64_alpha_fbsd_init_file_header
2238051f 5538
571fe01f 5539#undef elf64_bed
2238051f
RH
5540#define elf64_bed elf64_alpha_fbsd_bed
5541
5542#include "elf64-target.h"
This page took 1.54709 seconds and 4 git commands to generate.