alpha-coff: large memory allocation
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
b3adc24a 2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
147 /* What kind of relocation? */
148 unsigned int rtype;
149
150 /* Is this against read-only section? */
151 unsigned int reltext : 1;
152
153 /* How many did we find? */
154 unsigned long count;
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
2c3fc389 213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
68ffbac6 227/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
986f0783 283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
698600e4
AM
301/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304struct alpha_elf_find_line
305{
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308};
309
252b5132
RH
310/* We have some private fields hanging off of the elf_tdata structure. */
311
312struct alpha_elf_obj_tdata
313{
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
3765b1be
RH
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
252b5132 335
3765b1be 336 /* For every got, this is the sum of the number of words required
252b5132 337 to hold all of the member object's local got. */
3765b1be 338 int local_got_size;
698600e4
AM
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
252b5132
RH
343};
344
345#define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
0ffa91dd
NC
348#define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
4dfe6ac6 351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 352
b34976b6 353static bfd_boolean
a7519a3c 354elf64_alpha_mkobject (bfd *abfd)
252b5132 355{
0ffa91dd 356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 357 ALPHA_ELF_DATA);
252b5132
RH
358}
359
b34976b6 360static bfd_boolean
a7519a3c 361elf64_alpha_object_p (bfd *abfd)
252b5132 362{
252b5132
RH
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365}
366\f
a7519a3c
RH
367/* A relocation function which doesn't do anything. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 372 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378}
379
380/* A relocation function used for an unsupported reloc. */
381
382static bfd_reloc_status_type
383elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 385 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387{
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391}
392
393/* Do the work of the GPDISP relocation. */
394
395static bfd_reloc_status_type
396elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398{
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431}
432
433/* The special function for the GPDISP reloc. */
434
435static bfd_reloc_status_type
436elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440{
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476}
477
252b5132
RH
478/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480#define MINUS_ONE (((bfd_vma)0) - 1)
481
21d799b5 482
dfe57ca0 483#define SKIP_HOWTO(N) \
21d799b5 484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 485
252b5132
RH
486static reloc_howto_type elf64_alpha_howto_table[] =
487{
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
6346d5ca
AM
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
b34976b6 492 TRUE, /* pc_relative */
252b5132
RH
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
b34976b6 497 FALSE, /* partial_inplace */
252b5132
RH
498 0, /* src_mask */
499 0, /* dst_mask */
b34976b6 500 TRUE), /* pcrel_offset */
252b5132
RH
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
b34976b6 507 FALSE, /* pc_relative */
252b5132
RH
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 510 bfd_elf_generic_reloc, /* special_function */
252b5132 511 "REFLONG", /* name */
b34976b6 512 FALSE, /* partial_inplace */
252b5132
RH
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
b34976b6 515 FALSE), /* pcrel_offset */
252b5132
RH
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
b34976b6 522 FALSE, /* pc_relative */
252b5132
RH
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 525 bfd_elf_generic_reloc, /* special_function */
252b5132 526 "REFQUAD", /* name */
b34976b6 527 FALSE, /* partial_inplace */
252b5132
RH
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
b34976b6 530 FALSE), /* pcrel_offset */
252b5132
RH
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
b34976b6 539 FALSE, /* pc_relative */
252b5132
RH
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 542 bfd_elf_generic_reloc, /* special_function */
252b5132 543 "GPREL32", /* name */
b34976b6 544 FALSE, /* partial_inplace */
252b5132
RH
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
b34976b6 547 FALSE), /* pcrel_offset */
252b5132
RH
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
dfe57ca0 552 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 553 16, /* bitsize */
b34976b6 554 FALSE, /* pc_relative */
252b5132
RH
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 557 bfd_elf_generic_reloc, /* special_function */
252b5132 558 "ELF_LITERAL", /* name */
b34976b6 559 FALSE, /* partial_inplace */
252b5132
RH
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
b34976b6 562 FALSE), /* pcrel_offset */
252b5132
RH
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
dfe57ca0 573 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 574 32, /* bitsize */
b34976b6 575 FALSE, /* pc_relative */
252b5132
RH
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
b34976b6 580 FALSE, /* partial_inplace */
252b5132
RH
581 0, /* src_mask */
582 0, /* dst_mask */
b34976b6 583 FALSE), /* pcrel_offset */
252b5132
RH
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
b34976b6 605 FALSE, /* pc_relative */
252b5132
RH
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
b34976b6 610 FALSE, /* partial_inplace */
252b5132
RH
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
b34976b6 613 TRUE), /* pcrel_offset */
252b5132
RH
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
b34976b6 620 TRUE, /* pc_relative */
252b5132
RH
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 623 bfd_elf_generic_reloc, /* special_function */
252b5132 624 "BRADDR", /* name */
b34976b6 625 FALSE, /* partial_inplace */
252b5132
RH
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
b34976b6 628 TRUE), /* pcrel_offset */
252b5132
RH
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
dfe57ca0 633 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 634 14, /* bitsize */
b34976b6 635 TRUE, /* pc_relative */
252b5132
RH
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 638 bfd_elf_generic_reloc, /* special_function */
252b5132 639 "HINT", /* name */
b34976b6 640 FALSE, /* partial_inplace */
252b5132
RH
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
b34976b6 643 TRUE), /* pcrel_offset */
252b5132
RH
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 TRUE, /* pc_relative */
252b5132
RH
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 653 bfd_elf_generic_reloc, /* special_function */
252b5132 654 "SREL16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
252b5132
RH
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 TRUE), /* pcrel_offset */
252b5132
RH
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
252b5132
RH
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 668 bfd_elf_generic_reloc, /* special_function */
252b5132 669 "SREL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
252b5132
RH
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
252b5132
RH
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
b34976b6 680 TRUE, /* pc_relative */
252b5132
RH
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 683 bfd_elf_generic_reloc, /* special_function */
252b5132 684 "SREL64", /* name */
b34976b6 685 FALSE, /* partial_inplace */
252b5132
RH
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
b34976b6 688 TRUE), /* pcrel_offset */
252b5132 689
dfe57ca0
RH
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
252b5132
RH
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
dfe57ca0 700 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 705 bfd_elf_generic_reloc, /* special_function */
252b5132 706 "GPRELHIGH", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132
RH
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
dfe57ca0 715 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132
RH
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 720 bfd_elf_generic_reloc, /* special_function */
252b5132 721 "GPRELLOW", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132
RH
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132
RH
726
727 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 728 HOWTO (R_ALPHA_GPREL16,
252b5132 729 0, /* rightshift */
dfe57ca0 730 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 735 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 736 "GPREL16", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
dfe57ca0
RH
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
252b5132 747
fe8bc63d 748 /* Misc ELF relocations. */
252b5132
RH
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
b34976b6 758 FALSE,
252b5132
RH
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
b34976b6 763 FALSE,
252b5132
RH
764 0,
765 0,
b34976b6 766 TRUE),
252b5132
RH
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
b34976b6 773 FALSE,
252b5132
RH
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
b34976b6 778 FALSE,
252b5132
RH
779 0,
780 0,
b34976b6 781 TRUE),
252b5132
RH
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
b34976b6 788 FALSE,
252b5132
RH
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
b34976b6 793 FALSE,
252b5132
RH
794 0,
795 0,
b34976b6 796 TRUE),
252b5132
RH
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
b34976b6 803 FALSE,
252b5132
RH
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
b34976b6 808 FALSE,
252b5132
RH
809 0,
810 0,
b34976b6 811 TRUE),
7793f4d0
RH
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
7793f4d0
RH
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 821 bfd_elf_generic_reloc, /* special_function */
7793f4d0 822 "BRSGP", /* name */
b34976b6 823 FALSE, /* partial_inplace */
7793f4d0
RH
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
3765b1be
RH
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
b34976b6 833 FALSE, /* pc_relative */
3765b1be
RH
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 836 bfd_elf_generic_reloc, /* special_function */
3765b1be 837 "TLSGD", /* name */
b34976b6 838 FALSE, /* partial_inplace */
3765b1be
RH
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
b34976b6 841 FALSE), /* pcrel_offset */
3765b1be
RH
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 851 bfd_elf_generic_reloc, /* special_function */
3765b1be 852 "TLSLDM", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 866 bfd_elf_generic_reloc, /* special_function */
3765b1be 867 "DTPMOD64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
b34976b6 879 FALSE, /* pc_relative */
3765b1be
RH
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 882 bfd_elf_generic_reloc, /* special_function */
3765b1be 883 "GOTDTPREL", /* name */
b34976b6 884 FALSE, /* partial_inplace */
3765b1be
RH
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
b34976b6 887 FALSE), /* pcrel_offset */
3765b1be
RH
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
3765b1be
RH
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 897 bfd_elf_generic_reloc, /* special_function */
3765b1be 898 "DTPREL64", /* name */
b34976b6 899 FALSE, /* partial_inplace */
3765b1be
RH
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
3765b1be
RH
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
3765b1be
RH
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 912 bfd_elf_generic_reloc, /* special_function */
3765b1be 913 "DTPRELHI", /* name */
b34976b6 914 FALSE, /* partial_inplace */
3765b1be
RH
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
3765b1be
RH
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 927 bfd_elf_generic_reloc, /* special_function */
3765b1be 928 "DTPRELLO", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 942 bfd_elf_generic_reloc, /* special_function */
3765b1be 943 "DTPREL16", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
b34976b6 955 FALSE, /* pc_relative */
3765b1be
RH
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 958 bfd_elf_generic_reloc, /* special_function */
3765b1be 959 "GOTTPREL", /* name */
b34976b6 960 FALSE, /* partial_inplace */
3765b1be
RH
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
b34976b6 963 FALSE), /* pcrel_offset */
3765b1be
RH
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
b34976b6 970 FALSE, /* pc_relative */
3765b1be
RH
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 973 bfd_elf_generic_reloc, /* special_function */
3765b1be 974 "TPREL64", /* name */
b34976b6 975 FALSE, /* partial_inplace */
3765b1be
RH
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
b34976b6 978 FALSE), /* pcrel_offset */
3765b1be
RH
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
3765b1be
RH
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 988 bfd_elf_generic_reloc, /* special_function */
3765b1be 989 "TPRELHI", /* name */
b34976b6 990 FALSE, /* partial_inplace */
3765b1be
RH
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
3765b1be
RH
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
b34976b6 1000 FALSE, /* pc_relative */
3765b1be
RH
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1003 bfd_elf_generic_reloc, /* special_function */
3765b1be 1004 "TPRELLO", /* name */
b34976b6 1005 FALSE, /* partial_inplace */
3765b1be
RH
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
b34976b6 1008 FALSE), /* pcrel_offset */
3765b1be
RH
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
b34976b6 1015 FALSE, /* pc_relative */
3765b1be
RH
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1018 bfd_elf_generic_reloc, /* special_function */
3765b1be 1019 "TPREL16", /* name */
b34976b6 1020 FALSE, /* partial_inplace */
3765b1be
RH
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
b34976b6 1023 FALSE), /* pcrel_offset */
252b5132
RH
1024};
1025
252b5132
RH
1026/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028struct elf_reloc_map
1029{
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032};
1033
1034static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035{
dfe57ca0
RH
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1066};
1067
1068/* Given a BFD reloc type, return a HOWTO structure. */
1069
1070static reloc_howto_type *
a7519a3c
RH
1071elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
252b5132
RH
1073{
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083}
1084
157090f7
AM
1085static reloc_howto_type *
1086elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088{
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100}
1101
252b5132
RH
1102/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
f3185997 1104static bfd_boolean
0aa13fee 1105elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1106 Elf_Internal_Rela *dst)
252b5132 1107{
a7519a3c 1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
695344c0 1112 /* xgettext:c-format */
0aa13fee 1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1114 abfd, r_type);
cd21f5da 1115 bfd_set_error (bfd_error_bad_value);
f3185997 1116 return FALSE;
cd21f5da 1117 }
252b5132 1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1119 return TRUE;
252b5132 1120}
3765b1be
RH
1121
1122/* These two relocations create a two-word entry in the got. */
1123#define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1125
1126/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1127#define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1129
1130/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1132#define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1136\f
a7519a3c
RH
1137/* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
1139 type.
1140 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1141 how to. */
252b5132 1142
a7519a3c
RH
1143static bfd_boolean
1144elf64_alpha_section_from_shdr (bfd *abfd,
1145 Elf_Internal_Shdr *hdr,
1146 const char *name,
1147 int shindex)
252b5132 1148{
a7519a3c
RH
1149 asection *newsect;
1150
1151 /* There ought to be a place to keep ELF backend specific flags, but
1152 at the moment there isn't one. We just keep track of the
1153 sections by their name, instead. Fortunately, the ABI gives
1154 suggested names for all the MIPS specific sections, so we will
1155 probably get away with this. */
1156 switch (hdr->sh_type)
1157 {
1158 case SHT_ALPHA_DEBUG:
1159 if (strcmp (name, ".mdebug") != 0)
1160 return FALSE;
1161 break;
1162 default:
1163 return FALSE;
1164 }
252b5132 1165
a7519a3c
RH
1166 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1167 return FALSE;
1168 newsect = hdr->bfd_section;
252b5132 1169
a7519a3c 1170 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1171 {
fd361982
AM
1172 if (!bfd_set_section_flags (newsect,
1173 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1174 return FALSE;
252b5132 1175 }
a7519a3c
RH
1176
1177 return TRUE;
252b5132
RH
1178}
1179
a7519a3c
RH
1180/* Convert Alpha specific section flags to bfd internal section flags. */
1181
b34976b6 1182static bfd_boolean
a7519a3c 1183elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1184{
a7519a3c
RH
1185 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1186 *flags |= SEC_SMALL_DATA;
252b5132 1187
a7519a3c
RH
1188 return TRUE;
1189}
252b5132 1190
a7519a3c
RH
1191/* Set the correct type for an Alpha ELF section. We do this by the
1192 section name, which is a hack, but ought to work. */
9e756d64 1193
a7519a3c
RH
1194static bfd_boolean
1195elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1196{
1197 register const char *name;
1198
fd361982 1199 name = bfd_section_name (sec);
a7519a3c
RH
1200
1201 if (strcmp (name, ".mdebug") == 0)
252b5132 1202 {
a7519a3c
RH
1203 hdr->sh_type = SHT_ALPHA_DEBUG;
1204 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1205 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1206 if ((abfd->flags & DYNAMIC) != 0 )
1207 hdr->sh_entsize = 0;
1208 else
1209 hdr->sh_entsize = 1;
252b5132 1210 }
a7519a3c
RH
1211 else if ((sec->flags & SEC_SMALL_DATA)
1212 || strcmp (name, ".sdata") == 0
1213 || strcmp (name, ".sbss") == 0
1214 || strcmp (name, ".lit4") == 0
1215 || strcmp (name, ".lit8") == 0)
1216 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1217
a7519a3c
RH
1218 return TRUE;
1219}
252b5132 1220
a7519a3c
RH
1221/* Hook called by the linker routine which adds symbols from an object
1222 file. We use it to put .comm items in .sbss, and not .bss. */
1223
1224static bfd_boolean
1225elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1226 Elf_Internal_Sym *sym,
1227 const char **namep ATTRIBUTE_UNUSED,
1228 flagword *flagsp ATTRIBUTE_UNUSED,
1229 asection **secp, bfd_vma *valp)
1230{
1231 if (sym->st_shndx == SHN_COMMON
0e1862bb 1232 && !bfd_link_relocatable (info)
a7519a3c 1233 && sym->st_size <= elf_gp_size (abfd))
252b5132 1234 {
a7519a3c
RH
1235 /* Common symbols less than or equal to -G nn bytes are
1236 automatically put into .sbss. */
ffcb7aff 1237
a7519a3c 1238 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1239
a7519a3c 1240 if (scomm == NULL)
252b5132 1241 {
a7519a3c
RH
1242 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1243 (SEC_ALLOC
1244 | SEC_IS_COMMON
1245 | SEC_LINKER_CREATED));
1246 if (scomm == NULL)
1247 return FALSE;
1248 }
ffcb7aff 1249
a7519a3c
RH
1250 *secp = scomm;
1251 *valp = sym->st_size;
1252 }
ffcb7aff 1253
a7519a3c
RH
1254 return TRUE;
1255}
252b5132 1256
a7519a3c 1257/* Create the .got section. */
252b5132 1258
a7519a3c
RH
1259static bfd_boolean
1260elf64_alpha_create_got_section (bfd *abfd,
1261 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1262{
85d162e6 1263 flagword flags;
a7519a3c 1264 asection *s;
252b5132 1265
0ffa91dd
NC
1266 if (! is_alpha_elf (abfd))
1267 return FALSE;
1268
85d162e6
AM
1269 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1270 | SEC_LINKER_CREATED);
1271 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1272 if (s == NULL
fd361982 1273 || !bfd_set_section_alignment (s, 3))
a7519a3c 1274 return FALSE;
252b5132 1275
a7519a3c 1276 alpha_elf_tdata (abfd)->got = s;
252b5132 1277
85d162e6
AM
1278 /* Make sure the object's gotobj is set to itself so that we default
1279 to every object with its own .got. We'll merge .gots later once
1280 we've collected each object's info. */
1281 alpha_elf_tdata (abfd)->gotobj = abfd;
1282
a7519a3c
RH
1283 return TRUE;
1284}
252b5132 1285
a7519a3c 1286/* Create all the dynamic sections. */
252b5132 1287
a7519a3c
RH
1288static bfd_boolean
1289elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1290{
1291 asection *s;
85d162e6 1292 flagword flags;
a7519a3c 1293 struct elf_link_hash_entry *h;
252b5132 1294
0ffa91dd
NC
1295 if (! is_alpha_elf (abfd))
1296 return FALSE;
1297
a7519a3c 1298 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1299
85d162e6
AM
1300 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1301 | SEC_LINKER_CREATED
1302 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1303 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1304 elf_hash_table (info)->splt = s;
fd361982 1305 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1306 return FALSE;
252b5132 1307
a7519a3c
RH
1308 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1309 .plt section. */
7325306f
RS
1310 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1311 "_PROCEDURE_LINKAGE_TABLE_");
1312 elf_hash_table (info)->hplt = h;
1313 if (h == NULL)
a7519a3c 1314 return FALSE;
d6ad34f6 1315
85d162e6
AM
1316 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1317 | SEC_LINKER_CREATED | SEC_READONLY);
1318 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1319 elf_hash_table (info)->srelplt = s;
fd361982 1320 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1321 return FALSE;
252b5132 1322
6ec7057a
RH
1323 if (elf64_alpha_use_secureplt)
1324 {
85d162e6
AM
1325 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1326 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1327 elf_hash_table (info)->sgotplt = s;
fd361982 1328 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1329 return FALSE;
1330 }
1331
a7519a3c
RH
1332 /* We may or may not have created a .got section for this object, but
1333 we definitely havn't done the rest of the work. */
1cd6895c 1334
85d162e6
AM
1335 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1336 {
1337 if (!elf64_alpha_create_got_section (abfd, info))
1338 return FALSE;
1339 }
1cd6895c 1340
85d162e6
AM
1341 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1342 | SEC_LINKER_CREATED | SEC_READONLY);
1343 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1344 elf_hash_table (info)->srelgot = s;
a7519a3c 1345 if (s == NULL
fd361982 1346 || !bfd_set_section_alignment (s, 3))
a7519a3c 1347 return FALSE;
252b5132 1348
a7519a3c
RH
1349 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1350 dynobj's .got section. We don't do this in the linker script
1351 because we don't want to define the symbol if we are not creating
1352 a global offset table. */
d98685ac
AM
1353 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1354 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1355 elf_hash_table (info)->hgot = h;
d98685ac
AM
1356 if (h == NULL)
1357 return FALSE;
252b5132 1358
a7519a3c 1359 return TRUE;
252b5132 1360}
a7519a3c
RH
1361\f
1362/* Read ECOFF debugging information from a .mdebug section into a
1363 ecoff_debug_info structure. */
252b5132 1364
a7519a3c
RH
1365static bfd_boolean
1366elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1367 struct ecoff_debug_info *debug)
252b5132 1368{
a7519a3c
RH
1369 HDRR *symhdr;
1370 const struct ecoff_debug_swap *swap;
1371 char *ext_hdr = NULL;
252b5132 1372
a7519a3c
RH
1373 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1374 memset (debug, 0, sizeof (*debug));
252b5132 1375
a7519a3c
RH
1376 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1377 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1378 goto error_return;
252b5132 1379
a7519a3c
RH
1380 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1381 swap->external_hdr_size))
1382 goto error_return;
252b5132 1383
a7519a3c
RH
1384 symhdr = &debug->symbolic_header;
1385 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1386
a7519a3c
RH
1387 /* The symbolic header contains absolute file offsets and sizes to
1388 read. */
1389#define READ(ptr, offset, count, size, type) \
1f4361a7 1390 do \
a7519a3c 1391 { \
1f4361a7
AM
1392 size_t amt; \
1393 debug->ptr = NULL; \
1394 if (symhdr->count == 0) \
1395 break; \
1396 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1397 { \
1398 bfd_set_error (bfd_error_file_too_big); \
1399 goto error_return; \
1400 } \
2bb3687b 1401 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1402 goto error_return; \
2bb3687b
AM
1403 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1404 if (debug->ptr == NULL) \
a7519a3c 1405 goto error_return; \
1f4361a7 1406 } while (0)
fe8bc63d 1407
a7519a3c 1408 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1409 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1410 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1411 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1412 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1413 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1414 union aux_ext *);
1415 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1416 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1417 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1418 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1419 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1420#undef READ
252b5132 1421
a7519a3c 1422 debug->fdr = NULL;
252b5132 1423
a7519a3c 1424 return TRUE;
252b5132 1425
a7519a3c
RH
1426 error_return:
1427 if (ext_hdr != NULL)
1428 free (ext_hdr);
1429 if (debug->line != NULL)
1430 free (debug->line);
1431 if (debug->external_dnr != NULL)
1432 free (debug->external_dnr);
1433 if (debug->external_pdr != NULL)
1434 free (debug->external_pdr);
1435 if (debug->external_sym != NULL)
1436 free (debug->external_sym);
1437 if (debug->external_opt != NULL)
1438 free (debug->external_opt);
1439 if (debug->external_aux != NULL)
1440 free (debug->external_aux);
1441 if (debug->ss != NULL)
1442 free (debug->ss);
1443 if (debug->ssext != NULL)
1444 free (debug->ssext);
1445 if (debug->external_fdr != NULL)
1446 free (debug->external_fdr);
1447 if (debug->external_rfd != NULL)
1448 free (debug->external_rfd);
1449 if (debug->external_ext != NULL)
1450 free (debug->external_ext);
1451 return FALSE;
252b5132
RH
1452}
1453
a7519a3c
RH
1454/* Alpha ELF local labels start with '$'. */
1455
b34976b6 1456static bfd_boolean
a7519a3c 1457elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1458{
a7519a3c
RH
1459 return name[0] == '$';
1460}
9e756d64 1461
a7519a3c 1462static bfd_boolean
fb167eb2
AM
1463elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1464 asection *section, bfd_vma offset,
1465 const char **filename_ptr,
a7519a3c 1466 const char **functionname_ptr,
fb167eb2
AM
1467 unsigned int *line_ptr,
1468 unsigned int *discriminator_ptr)
a7519a3c
RH
1469{
1470 asection *msec;
252b5132 1471
fb167eb2 1472 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1473 filename_ptr, functionname_ptr,
fb167eb2 1474 line_ptr, discriminator_ptr,
9defd221 1475 dwarf_debug_sections,
7f3bf384
AM
1476 &elf_tdata (abfd)->dwarf2_find_line_info)
1477 == 1)
b34976b6 1478 return TRUE;
9e756d64 1479
a7519a3c
RH
1480 msec = bfd_get_section_by_name (abfd, ".mdebug");
1481 if (msec != NULL)
1bbc9cec 1482 {
a7519a3c 1483 flagword origflags;
698600e4 1484 struct alpha_elf_find_line *fi;
a7519a3c
RH
1485 const struct ecoff_debug_swap * const swap =
1486 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1487
a7519a3c
RH
1488 /* If we are called during a link, alpha_elf_final_link may have
1489 cleared the SEC_HAS_CONTENTS field. We force it back on here
1490 if appropriate (which it normally will be). */
1491 origflags = msec->flags;
1492 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1493 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1494
698600e4 1495 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1496 if (fi == NULL)
1497 {
1498 bfd_size_type external_fdr_size;
1499 char *fraw_src;
1500 char *fraw_end;
1501 struct fdr *fdr_ptr;
698600e4 1502 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1503
698600e4 1504 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1505 if (fi == NULL)
1506 {
1507 msec->flags = origflags;
1508 return FALSE;
1509 }
9e756d64 1510
a7519a3c
RH
1511 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1512 {
1513 msec->flags = origflags;
1514 return FALSE;
1515 }
9e756d64 1516
a7519a3c
RH
1517 /* Swap in the FDR information. */
1518 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1519 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1520 if (fi->d.fdr == NULL)
1521 {
1522 msec->flags = origflags;
1523 return FALSE;
1524 }
1525 external_fdr_size = swap->external_fdr_size;
1526 fdr_ptr = fi->d.fdr;
1527 fraw_src = (char *) fi->d.external_fdr;
1528 fraw_end = (fraw_src
1529 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1530 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1531 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1532
698600e4 1533 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1534
a7519a3c 1535 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1536 find_nearest_line is either called all the time, as in
1537 objdump -l, so the information should be saved, or it is
1538 rarely called, as in ld error messages, so the memory
1539 wasted is unimportant. Still, it would probably be a
1540 good idea for free_cached_info to throw it away. */
a7519a3c 1541 }
9e756d64 1542
a7519a3c
RH
1543 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1544 &fi->i, filename_ptr, functionname_ptr,
1545 line_ptr))
1546 {
1547 msec->flags = origflags;
1548 return TRUE;
1549 }
9e756d64 1550
a7519a3c 1551 msec->flags = origflags;
9e756d64 1552 }
9e756d64 1553
a7519a3c 1554 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1555
fb167eb2 1556 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1557 filename_ptr, functionname_ptr,
fb167eb2 1558 line_ptr, discriminator_ptr);
9e756d64 1559}
a7519a3c
RH
1560\f
1561/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1562
a7519a3c 1563struct extsym_info
9e756d64 1564{
a7519a3c
RH
1565 bfd *abfd;
1566 struct bfd_link_info *info;
1567 struct ecoff_debug_info *debug;
1568 const struct ecoff_debug_swap *swap;
1569 bfd_boolean failed;
1570};
9e756d64 1571
a7519a3c 1572static bfd_boolean
2c3fc389 1573elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1574{
1575 struct extsym_info *einfo = (struct extsym_info *) data;
1576 bfd_boolean strip;
1577 asection *sec, *output_section;
9e756d64 1578
a7519a3c
RH
1579 if (h->root.indx == -2)
1580 strip = FALSE;
1581 else if ((h->root.def_dynamic
1582 || h->root.ref_dynamic
1583 || h->root.root.type == bfd_link_hash_new)
1584 && !h->root.def_regular
1585 && !h->root.ref_regular)
1586 strip = TRUE;
1587 else if (einfo->info->strip == strip_all
1588 || (einfo->info->strip == strip_some
1589 && bfd_hash_lookup (einfo->info->keep_hash,
1590 h->root.root.root.string,
1591 FALSE, FALSE) == NULL))
1592 strip = TRUE;
1593 else
1594 strip = FALSE;
9e756d64 1595
a7519a3c 1596 if (strip)
b34976b6 1597 return TRUE;
9e756d64 1598
a7519a3c 1599 if (h->esym.ifd == -2)
9e756d64 1600 {
a7519a3c
RH
1601 h->esym.jmptbl = 0;
1602 h->esym.cobol_main = 0;
1603 h->esym.weakext = 0;
1604 h->esym.reserved = 0;
1605 h->esym.ifd = ifdNil;
1606 h->esym.asym.value = 0;
1607 h->esym.asym.st = stGlobal;
9e756d64 1608
a7519a3c
RH
1609 if (h->root.root.type != bfd_link_hash_defined
1610 && h->root.root.type != bfd_link_hash_defweak)
1611 h->esym.asym.sc = scAbs;
1612 else
1613 {
1614 const char *name;
9e756d64 1615
a7519a3c
RH
1616 sec = h->root.root.u.def.section;
1617 output_section = sec->output_section;
9e756d64 1618
a7519a3c
RH
1619 /* When making a shared library and symbol h is the one from
1620 the another shared library, OUTPUT_SECTION may be null. */
1621 if (output_section == NULL)
1622 h->esym.asym.sc = scUndefined;
1623 else
1624 {
fd361982 1625 name = bfd_section_name (output_section);
9e756d64 1626
a7519a3c
RH
1627 if (strcmp (name, ".text") == 0)
1628 h->esym.asym.sc = scText;
1629 else if (strcmp (name, ".data") == 0)
1630 h->esym.asym.sc = scData;
1631 else if (strcmp (name, ".sdata") == 0)
1632 h->esym.asym.sc = scSData;
1633 else if (strcmp (name, ".rodata") == 0
1634 || strcmp (name, ".rdata") == 0)
1635 h->esym.asym.sc = scRData;
1636 else if (strcmp (name, ".bss") == 0)
1637 h->esym.asym.sc = scBss;
1638 else if (strcmp (name, ".sbss") == 0)
1639 h->esym.asym.sc = scSBss;
1640 else if (strcmp (name, ".init") == 0)
1641 h->esym.asym.sc = scInit;
1642 else if (strcmp (name, ".fini") == 0)
1643 h->esym.asym.sc = scFini;
1644 else
1645 h->esym.asym.sc = scAbs;
1646 }
1647 }
9e756d64 1648
a7519a3c
RH
1649 h->esym.asym.reserved = 0;
1650 h->esym.asym.index = indexNil;
1651 }
9e756d64 1652
a7519a3c
RH
1653 if (h->root.root.type == bfd_link_hash_common)
1654 h->esym.asym.value = h->root.root.u.c.size;
1655 else if (h->root.root.type == bfd_link_hash_defined
1656 || h->root.root.type == bfd_link_hash_defweak)
1657 {
1658 if (h->esym.asym.sc == scCommon)
1659 h->esym.asym.sc = scBss;
1660 else if (h->esym.asym.sc == scSCommon)
1661 h->esym.asym.sc = scSBss;
9e756d64 1662
a7519a3c
RH
1663 sec = h->root.root.u.def.section;
1664 output_section = sec->output_section;
1665 if (output_section != NULL)
1666 h->esym.asym.value = (h->root.root.u.def.value
1667 + sec->output_offset
1668 + output_section->vma);
1669 else
1670 h->esym.asym.value = 0;
1671 }
9e756d64 1672
a7519a3c
RH
1673 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1674 h->root.root.root.string,
1675 &h->esym))
1676 {
1677 einfo->failed = TRUE;
1678 return FALSE;
9e756d64
RH
1679 }
1680
a7519a3c
RH
1681 return TRUE;
1682}
1683\f
1684/* Search for and possibly create a got entry. */
9e756d64 1685
a7519a3c
RH
1686static struct alpha_elf_got_entry *
1687get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1688 unsigned long r_type, unsigned long r_symndx,
1689 bfd_vma r_addend)
1690{
1691 struct alpha_elf_got_entry *gotent;
1692 struct alpha_elf_got_entry **slot;
9e756d64 1693
a7519a3c
RH
1694 if (h)
1695 slot = &h->got_entries;
1696 else
1697 {
1698 /* This is a local .got entry -- record for merge. */
9e756d64 1699
a7519a3c 1700 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1701
a7519a3c
RH
1702 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1703 if (!local_got_entries)
1704 {
1705 bfd_size_type size;
1706 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1707
a7519a3c
RH
1708 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1709 size = symtab_hdr->sh_info;
1710 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1711
a7519a3c
RH
1712 local_got_entries
1713 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1714 if (!local_got_entries)
1715 return NULL;
1716
1717 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1718 }
1719
1720 slot = &local_got_entries[r_symndx];
9e756d64
RH
1721 }
1722
a7519a3c
RH
1723 for (gotent = *slot; gotent ; gotent = gotent->next)
1724 if (gotent->gotobj == abfd
1725 && gotent->reloc_type == r_type
1726 && gotent->addend == r_addend)
1727 break;
1728
1729 if (!gotent)
9e756d64 1730 {
a7519a3c 1731 int entry_size;
986f0783 1732 size_t amt;
9e756d64 1733
a7519a3c
RH
1734 amt = sizeof (struct alpha_elf_got_entry);
1735 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1736 if (!gotent)
1737 return NULL;
9e756d64 1738
a7519a3c
RH
1739 gotent->gotobj = abfd;
1740 gotent->addend = r_addend;
1741 gotent->got_offset = -1;
6ec7057a 1742 gotent->plt_offset = -1;
a7519a3c
RH
1743 gotent->use_count = 1;
1744 gotent->reloc_type = r_type;
1745 gotent->reloc_done = 0;
1746 gotent->reloc_xlated = 0;
9e756d64 1747
a7519a3c
RH
1748 gotent->next = *slot;
1749 *slot = gotent;
9e756d64 1750
a7519a3c
RH
1751 entry_size = alpha_got_entry_size (r_type);
1752 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1753 if (!h)
1754 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1755 }
a7519a3c
RH
1756 else
1757 gotent->use_count += 1;
9e756d64 1758
a7519a3c 1759 return gotent;
9e756d64
RH
1760}
1761
6ec7057a
RH
1762static bfd_boolean
1763elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1764{
1765 return ((ah->root.type == STT_FUNC
1766 || ah->root.root.type == bfd_link_hash_undefweak
1767 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1768 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1769 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1770}
1771
6fc5bb57
AM
1772/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1773 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1774 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1775 relocs to be sorted. */
1776
1777static bfd_boolean
1778elf64_alpha_sort_relocs_p (asection *sec)
1779{
1780 return (sec->flags & SEC_CODE) == 0;
1781}
1782
1783
a7519a3c
RH
1784/* Handle dynamic relocations when doing an Alpha ELF link. */
1785
b34976b6 1786static bfd_boolean
a7519a3c
RH
1787elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1788 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1789{
a7519a3c
RH
1790 bfd *dynobj;
1791 asection *sreloc;
252b5132 1792 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1793 struct alpha_elf_link_hash_entry **sym_hashes;
1794 const Elf_Internal_Rela *rel, *relend;
252b5132 1795
0e1862bb 1796 if (bfd_link_relocatable (info))
a7519a3c 1797 return TRUE;
252b5132 1798
a7519a3c
RH
1799 /* Don't do anything special with non-loaded, non-alloced sections.
1800 In particular, any relocs in such sections should not affect GOT
1801 and PLT reference counting (ie. we don't allow them to create GOT
1802 or PLT entries), there's no possibility or desire to optimize TLS
1803 relocs, and there's not much point in propagating relocs to shared
1804 libs that the dynamic linker won't relocate. */
1805 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1806 return TRUE;
252b5132 1807
0ffa91dd
NC
1808 BFD_ASSERT (is_alpha_elf (abfd));
1809
1810 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1811 if (dynobj == NULL)
0ffa91dd 1812 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1813
a7519a3c 1814 sreloc = NULL;
0ffa91dd
NC
1815 symtab_hdr = &elf_symtab_hdr (abfd);
1816 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1817
1818 relend = relocs + sec->reloc_count;
1819 for (rel = relocs; rel < relend; ++rel)
1820 {
1821 enum {
1822 NEED_GOT = 1,
1823 NEED_GOT_ENTRY = 2,
1824 NEED_DYNREL = 4
1825 };
1826
1827 unsigned long r_symndx, r_type;
1828 struct alpha_elf_link_hash_entry *h;
1829 unsigned int gotent_flags;
1830 bfd_boolean maybe_dynamic;
1831 unsigned int need;
1832 bfd_vma addend;
1833
1834 r_symndx = ELF64_R_SYM (rel->r_info);
1835 if (r_symndx < symtab_hdr->sh_info)
1836 h = NULL;
1837 else
1838 {
1839 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1840
a7519a3c
RH
1841 while (h->root.root.type == bfd_link_hash_indirect
1842 || h->root.root.type == bfd_link_hash_warning)
1843 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1844
81fbe831
AM
1845 /* PR15323, ref flags aren't set for references in the same
1846 object. */
a7519a3c
RH
1847 h->root.ref_regular = 1;
1848 }
252b5132 1849
a7519a3c 1850 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1851 locally or externally defined, as not all of the input files
1852 have yet been processed. Do something with what we know, as
1853 this may help reduce memory usage and processing time later. */
a7519a3c 1854 maybe_dynamic = FALSE;
0e1862bb 1855 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1856 && (!info->symbolic
1857 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1858 || !h->root.def_regular
1859 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1860 maybe_dynamic = TRUE;
252b5132 1861
a7519a3c
RH
1862 need = 0;
1863 gotent_flags = 0;
1864 r_type = ELF64_R_TYPE (rel->r_info);
1865 addend = rel->r_addend;
9e756d64 1866
9e756d64
RH
1867 switch (r_type)
1868 {
1869 case R_ALPHA_LITERAL:
a7519a3c
RH
1870 need = NEED_GOT | NEED_GOT_ENTRY;
1871
1872 /* Remember how this literal is used from its LITUSEs.
1873 This will be important when it comes to decide if we can
1874 create a .plt entry for a function symbol. */
1875 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1876 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1877 gotent_flags |= 1 << rel->r_addend;
1878 --rel;
1879
1880 /* No LITUSEs -- presumably the address is used somehow. */
1881 if (gotent_flags == 0)
1882 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1883 break;
1884
1885 case R_ALPHA_GPDISP:
1886 case R_ALPHA_GPREL16:
1887 case R_ALPHA_GPREL32:
9e756d64
RH
1888 case R_ALPHA_GPRELHIGH:
1889 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1890 case R_ALPHA_BRSGP:
1891 need = NEED_GOT;
1892 break;
1893
1894 case R_ALPHA_REFLONG:
1895 case R_ALPHA_REFQUAD:
0e1862bb 1896 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1897 need = NEED_DYNREL;
cc03ec80
RH
1898 break;
1899
9e756d64 1900 case R_ALPHA_TLSLDM:
cc03ec80 1901 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1902 reloc to the STN_UNDEF (0) symbol so that they all match. */
1903 r_symndx = STN_UNDEF;
a7519a3c
RH
1904 h = 0;
1905 maybe_dynamic = FALSE;
1906 /* FALLTHRU */
1907
1908 case R_ALPHA_TLSGD:
1909 case R_ALPHA_GOTDTPREL:
1910 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1911 break;
cc03ec80 1912
a7519a3c
RH
1913 case R_ALPHA_GOTTPREL:
1914 need = NEED_GOT | NEED_GOT_ENTRY;
1915 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1916 if (bfd_link_pic (info))
a7519a3c
RH
1917 info->flags |= DF_STATIC_TLS;
1918 break;
1919
1920 case R_ALPHA_TPREL64:
3cbc1e5e 1921 if (bfd_link_dll (info))
e366eeae
RH
1922 {
1923 info->flags |= DF_STATIC_TLS;
1924 need = NEED_DYNREL;
1925 }
1926 else if (maybe_dynamic)
a7519a3c 1927 need = NEED_DYNREL;
a7519a3c 1928 break;
252b5132
RH
1929 }
1930
a7519a3c 1931 if (need & NEED_GOT)
252b5132 1932 {
85d162e6 1933 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1934 {
a7519a3c
RH
1935 if (!elf64_alpha_create_got_section (abfd, info))
1936 return FALSE;
c328dc3f 1937 }
252b5132 1938 }
252b5132 1939
a7519a3c
RH
1940 if (need & NEED_GOT_ENTRY)
1941 {
1942 struct alpha_elf_got_entry *gotent;
252b5132 1943
a7519a3c
RH
1944 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1945 if (!gotent)
1946 return FALSE;
4a67a098 1947
a7519a3c 1948 if (gotent_flags)
cc03ec80 1949 {
a7519a3c
RH
1950 gotent->flags |= gotent_flags;
1951 if (h)
1952 {
1953 gotent_flags |= h->flags;
1954 h->flags = gotent_flags;
4a67a098 1955
a7519a3c 1956 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1957 /* ??? It appears that we won't make it into
1958 adjust_dynamic_symbol for symbols that remain
1959 totally undefined. Copying this check here means
1960 we can create a plt entry for them too. */
1961 h->root.needs_plt
1962 = (maybe_dynamic && elf64_alpha_want_plt (h));
1963 }
a7519a3c 1964 }
252b5132
RH
1965 }
1966
a7519a3c 1967 if (need & NEED_DYNREL)
9e756d64 1968 {
a7519a3c
RH
1969 /* We need to create the section here now whether we eventually
1970 use it or not so that it gets mapped to an output section by
83bac4b0 1971 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1972 if (sreloc == NULL)
9e756d64 1973 {
83bac4b0
NC
1974 sreloc = _bfd_elf_make_dynamic_reloc_section
1975 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1976
a7519a3c 1977 if (sreloc == NULL)
83bac4b0 1978 return FALSE;
9e756d64 1979 }
252b5132 1980
a7519a3c
RH
1981 if (h)
1982 {
1983 /* Since we havn't seen all of the input symbols yet, we
1984 don't know whether we'll actually need a dynamic relocation
1985 entry for this reloc. So make a record of it. Once we
1986 find out if this thing needs dynamic relocation we'll
1987 expand the relocation sections by the appropriate amount. */
9e756d64 1988
a7519a3c 1989 struct alpha_elf_reloc_entry *rent;
9e756d64 1990
a7519a3c
RH
1991 for (rent = h->reloc_entries; rent; rent = rent->next)
1992 if (rent->rtype == r_type && rent->srel == sreloc)
1993 break;
252b5132 1994
a7519a3c
RH
1995 if (!rent)
1996 {
986f0783 1997 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1998 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1999 if (!rent)
2000 return FALSE;
252b5132 2001
a7519a3c
RH
2002 rent->srel = sreloc;
2003 rent->rtype = r_type;
2004 rent->count = 1;
2005 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 2006
a7519a3c
RH
2007 rent->next = h->reloc_entries;
2008 h->reloc_entries = rent;
2009 }
2010 else
2011 rent->count++;
2012 }
0e1862bb 2013 else if (bfd_link_pic (info))
a7519a3c
RH
2014 {
2015 /* If this is a shared library, and the section is to be
2016 loaded into memory, we need a RELATIVE reloc. */
2017 sreloc->size += sizeof (Elf64_External_Rela);
2018 if (sec->flags & SEC_READONLY)
2019 info->flags |= DF_TEXTREL;
2020 }
252b5132
RH
2021 }
2022 }
2023
b34976b6 2024 return TRUE;
252b5132 2025}
252b5132 2026
e117360e
RH
2027/* Return the section that should be marked against GC for a given
2028 relocation. */
2029
2030static asection *
2031elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2032 Elf_Internal_Rela *rel,
2033 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2034{
2035 /* These relocations don't really reference a symbol. Instead we store
2036 extra data in their addend slot. Ignore the symbol. */
2037 switch (ELF64_R_TYPE (rel->r_info))
2038 {
2039 case R_ALPHA_LITUSE:
2040 case R_ALPHA_GPDISP:
2041 case R_ALPHA_HINT:
2042 return NULL;
2043 }
2044
2045 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2046}
2047
a7519a3c
RH
2048/* Adjust a symbol defined by a dynamic object and referenced by a
2049 regular object. The current definition is in some section of the
2050 dynamic object, but we're not including those sections. We have to
2051 change the definition to something the rest of the link can
2052 understand. */
252b5132 2053
b34976b6 2054static bfd_boolean
a7519a3c
RH
2055elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2056 struct elf_link_hash_entry *h)
252b5132 2057{
a7519a3c
RH
2058 bfd *dynobj;
2059 asection *s;
2060 struct alpha_elf_link_hash_entry *ah;
252b5132 2061
a7519a3c
RH
2062 dynobj = elf_hash_table(info)->dynobj;
2063 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2064
a7519a3c 2065 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2066 about whether this symbol should get a .plt entry. Irritatingly, it
2067 is common for folk to leave undefined symbols in shared libraries,
2068 and they still expect lazy binding; accept undefined symbols in lieu
2069 of STT_FUNC. */
2070 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2071 {
6ec7057a 2072 h->needs_plt = TRUE;
252b5132 2073
ce558b89 2074 s = elf_hash_table(info)->splt;
a7519a3c
RH
2075 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2076 return FALSE;
204692d7 2077
6ec7057a
RH
2078 /* We need one plt entry per got subsection. Delay allocation of
2079 the actual plt entries until size_plt_section, called from
2080 size_dynamic_sections or during relaxation. */
252b5132 2081
a7519a3c
RH
2082 return TRUE;
2083 }
2084 else
6ec7057a 2085 h->needs_plt = FALSE;
252b5132 2086
a7519a3c
RH
2087 /* If this is a weak symbol, and there is a real definition, the
2088 processor independent code will have arranged for us to see the
2089 real definition first, and we can just use the same value. */
60d67dc8 2090 if (h->is_weakalias)
252b5132 2091 {
60d67dc8
AM
2092 struct elf_link_hash_entry *def = weakdef (h);
2093 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2094 h->root.u.def.section = def->root.u.def.section;
2095 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2096 return TRUE;
252b5132 2097 }
a7519a3c
RH
2098
2099 /* This is a reference to a symbol defined by a dynamic object which
2100 is not a function. The Alpha, since it uses .got entries for all
2101 symbols even in regular objects, does not need the hackery of a
2102 .dynbss section and COPY dynamic relocations. */
252b5132 2103
b34976b6 2104 return TRUE;
252b5132
RH
2105}
2106
747ffa7b
AM
2107/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2108
2109static void
2110elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2111 const Elf_Internal_Sym *isym,
2112 bfd_boolean definition,
2113 bfd_boolean dynamic)
2114{
2115 if (!dynamic && definition)
2116 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2117 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2118}
2119
a7519a3c
RH
2120/* Symbol versioning can create new symbols, and make our old symbols
2121 indirect to the new ones. Consolidate the got and reloc information
2122 in these situations. */
252b5132 2123
48f4b4f5
RH
2124static void
2125elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2126 struct elf_link_hash_entry *dir,
2127 struct elf_link_hash_entry *ind)
252b5132 2128{
48f4b4f5
RH
2129 struct alpha_elf_link_hash_entry *hi
2130 = (struct alpha_elf_link_hash_entry *) ind;
2131 struct alpha_elf_link_hash_entry *hs
2132 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2133
48f4b4f5
RH
2134 /* Do the merging in the superclass. */
2135 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2136
a7519a3c 2137 /* Merge the flags. Whee. */
a7519a3c
RH
2138 hs->flags |= hi->flags;
2139
48f4b4f5
RH
2140 /* ??? It's unclear to me what's really supposed to happen when
2141 "merging" defweak and defined symbols, given that we don't
2142 actually throw away the defweak. This more-or-less copies
2143 the logic related to got and plt entries in the superclass. */
2144 if (ind->root.type != bfd_link_hash_indirect)
2145 return;
2146
a7519a3c
RH
2147 /* Merge the .got entries. Cannibalize the old symbol's list in
2148 doing so, since we don't need it anymore. */
2149
2150 if (hs->got_entries == NULL)
2151 hs->got_entries = hi->got_entries;
2152 else
2153 {
2154 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2155
2156 gsh = hs->got_entries;
2157 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2158 {
a7519a3c
RH
2159 gin = gi->next;
2160 for (gs = gsh; gs ; gs = gs->next)
2161 if (gi->gotobj == gs->gotobj
2162 && gi->reloc_type == gs->reloc_type
2163 && gi->addend == gs->addend)
2164 {
68994ca2 2165 gs->use_count += gi->use_count;
07d6d2b8 2166 goto got_found;
a7519a3c
RH
2167 }
2168 gi->next = hs->got_entries;
2169 hs->got_entries = gi;
2170 got_found:;
252b5132 2171 }
a7519a3c
RH
2172 }
2173 hi->got_entries = NULL;
252b5132 2174
a7519a3c
RH
2175 /* And similar for the reloc entries. */
2176
2177 if (hs->reloc_entries == NULL)
2178 hs->reloc_entries = hi->reloc_entries;
2179 else
2180 {
2181 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2182
2183 rsh = hs->reloc_entries;
2184 for (ri = hi->reloc_entries; ri ; ri = rin)
2185 {
2186 rin = ri->next;
2187 for (rs = rsh; rs ; rs = rs->next)
2188 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2189 {
2190 rs->count += ri->count;
2191 goto found_reloc;
2192 }
2193 ri->next = hs->reloc_entries;
2194 hs->reloc_entries = ri;
2195 found_reloc:;
2196 }
252b5132 2197 }
a7519a3c 2198 hi->reloc_entries = NULL;
252b5132
RH
2199}
2200
a7519a3c 2201/* Is it possible to merge two object file's .got tables? */
252b5132 2202
b34976b6 2203static bfd_boolean
a7519a3c 2204elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2205{
a7519a3c
RH
2206 int total = alpha_elf_tdata (a)->total_got_size;
2207 bfd *bsub;
252b5132 2208
a7519a3c
RH
2209 /* Trivial quick fallout test. */
2210 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2211 return TRUE;
252b5132 2212
a7519a3c
RH
2213 /* By their nature, local .got entries cannot be merged. */
2214 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2215 return FALSE;
252b5132 2216
a7519a3c
RH
2217 /* Failing the common trivial comparison, we must effectively
2218 perform the merge. Not actually performing the merge means that
2219 we don't have to store undo information in case we fail. */
2220 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2221 {
2222 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2223 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2224 int i, n;
2225
2226 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2227 for (i = 0; i < n; ++i)
2228 {
2229 struct alpha_elf_got_entry *ae, *be;
2230 struct alpha_elf_link_hash_entry *h;
2231
2232 h = hashes[i];
2233 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2234 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2235 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2236
2237 for (be = h->got_entries; be ; be = be->next)
2238 {
2239 if (be->use_count == 0)
07d6d2b8 2240 continue;
a7519a3c 2241 if (be->gotobj != b)
07d6d2b8 2242 continue;
a7519a3c
RH
2243
2244 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2245 if (ae->gotobj == a
a7519a3c
RH
2246 && ae->reloc_type == be->reloc_type
2247 && ae->addend == be->addend)
2248 goto global_found;
2249
2250 total += alpha_got_entry_size (be->reloc_type);
2251 if (total > MAX_GOT_SIZE)
07d6d2b8 2252 return FALSE;
a7519a3c
RH
2253 global_found:;
2254 }
2255 }
2256 }
252b5132 2257
b34976b6 2258 return TRUE;
252b5132
RH
2259}
2260
a7519a3c 2261/* Actually merge two .got tables. */
252b5132 2262
a7519a3c
RH
2263static void
2264elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2265{
a7519a3c
RH
2266 int total = alpha_elf_tdata (a)->total_got_size;
2267 bfd *bsub;
252b5132 2268
a7519a3c
RH
2269 /* Remember local expansion. */
2270 {
2271 int e = alpha_elf_tdata (b)->local_got_size;
2272 total += e;
2273 alpha_elf_tdata (a)->local_got_size += e;
2274 }
252b5132 2275
a7519a3c
RH
2276 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2277 {
2278 struct alpha_elf_got_entry **local_got_entries;
2279 struct alpha_elf_link_hash_entry **hashes;
2280 Elf_Internal_Shdr *symtab_hdr;
2281 int i, n;
252b5132 2282
a7519a3c
RH
2283 /* Let the local .got entries know they are part of a new subsegment. */
2284 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2285 if (local_got_entries)
07d6d2b8 2286 {
a7519a3c
RH
2287 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2288 for (i = 0; i < n; ++i)
2289 {
2290 struct alpha_elf_got_entry *ent;
2291 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2292 ent->gotobj = a;
a7519a3c 2293 }
07d6d2b8 2294 }
252b5132 2295
a7519a3c
RH
2296 /* Merge the global .got entries. */
2297 hashes = alpha_elf_sym_hashes (bsub);
2298 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2299
a7519a3c
RH
2300 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2301 for (i = 0; i < n; ++i)
07d6d2b8 2302 {
a7519a3c
RH
2303 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2304 struct alpha_elf_link_hash_entry *h;
252b5132 2305
a7519a3c
RH
2306 h = hashes[i];
2307 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2308 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2309 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2310
a7519a3c
RH
2311 pbe = start = &h->got_entries;
2312 while ((be = *pbe) != NULL)
2313 {
2314 if (be->use_count == 0)
07d6d2b8 2315 {
a7519a3c
RH
2316 *pbe = be->next;
2317 memset (be, 0xa5, sizeof (*be));
2318 goto kill;
07d6d2b8 2319 }
a7519a3c 2320 if (be->gotobj != b)
07d6d2b8 2321 goto next;
a7519a3c
RH
2322
2323 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2324 if (ae->gotobj == a
a7519a3c
RH
2325 && ae->reloc_type == be->reloc_type
2326 && ae->addend == be->addend)
2327 {
2328 ae->flags |= be->flags;
2329 ae->use_count += be->use_count;
2330 *pbe = be->next;
2331 memset (be, 0xa5, sizeof (*be));
2332 goto kill;
2333 }
2334 be->gotobj = a;
2335 total += alpha_got_entry_size (be->reloc_type);
252b5132 2336
a7519a3c
RH
2337 next:;
2338 pbe = &be->next;
2339 kill:;
2340 }
07d6d2b8 2341 }
252b5132 2342
a7519a3c
RH
2343 alpha_elf_tdata (bsub)->gotobj = a;
2344 }
2345 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2346
a7519a3c
RH
2347 /* Merge the two in_got chains. */
2348 {
2349 bfd *next;
252b5132 2350
a7519a3c
RH
2351 bsub = a;
2352 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2353 bsub = next;
252b5132 2354
a7519a3c
RH
2355 alpha_elf_tdata (bsub)->in_got_link_next = b;
2356 }
252b5132 2357}
a7519a3c
RH
2358
2359/* Calculate the offsets for the got entries. */
252b5132 2360
b34976b6 2361static bfd_boolean
a7519a3c 2362elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2363 void * arg ATTRIBUTE_UNUSED)
252b5132 2364{
a7519a3c 2365 struct alpha_elf_got_entry *gotent;
252b5132 2366
a7519a3c
RH
2367 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2368 if (gotent->use_count > 0)
2369 {
2370 struct alpha_elf_obj_tdata *td;
2371 bfd_size_type *plge;
252b5132 2372
a7519a3c 2373 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2374 plge = &td->got->size;
2375 gotent->got_offset = *plge;
2376 *plge += alpha_got_entry_size (gotent->reloc_type);
2377 }
252b5132 2378
6ec7057a 2379 return TRUE;
a7519a3c 2380}
252b5132 2381
a7519a3c
RH
2382static void
2383elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2384{
4dfe6ac6
NC
2385 bfd *i, *got_list;
2386 struct alpha_elf_link_hash_table * htab;
2387
2388 htab = alpha_elf_hash_table (info);
2389 if (htab == NULL)
2390 return;
2391 got_list = htab->got_list;
252b5132 2392
a7519a3c
RH
2393 /* First, zero out the .got sizes, as we may be recalculating the
2394 .got after optimizing it. */
2395 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2396 alpha_elf_tdata(i)->got->size = 0;
252b5132 2397
a7519a3c 2398 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2399 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2400 elf64_alpha_calc_got_offsets_for_symbol,
2401 NULL);
252b5132 2402
a7519a3c
RH
2403 /* Finally, fill in the offsets for the local entries. */
2404 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2405 {
2406 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2407 bfd *j;
252b5132 2408
a7519a3c
RH
2409 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2410 {
2411 struct alpha_elf_got_entry **local_got_entries, *gotent;
2412 int k, n;
252b5132 2413
a7519a3c
RH
2414 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2415 if (!local_got_entries)
2416 continue;
252b5132 2417
a7519a3c
RH
2418 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2419 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2420 if (gotent->use_count > 0)
07d6d2b8 2421 {
a7519a3c
RH
2422 gotent->got_offset = got_offset;
2423 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2424 }
a7519a3c 2425 }
252b5132 2426
a7519a3c
RH
2427 alpha_elf_tdata(i)->got->size = got_offset;
2428 }
2429}
252b5132 2430
a7519a3c 2431/* Constructs the gots. */
252b5132 2432
b34976b6 2433static bfd_boolean
d1c109de 2434elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2435 bfd_boolean may_merge)
252b5132 2436{
a7519a3c 2437 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2438 struct alpha_elf_link_hash_table * htab;
252b5132 2439
4dfe6ac6
NC
2440 htab = alpha_elf_hash_table (info);
2441 if (htab == NULL)
2442 return FALSE;
2443 got_list = htab->got_list;
95404643 2444
a7519a3c
RH
2445 /* On the first time through, pretend we have an existing got list
2446 consisting of all of the input files. */
2447 if (got_list == NULL)
252b5132 2448 {
c72f2fb2 2449 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2450 {
0ffa91dd
NC
2451 bfd *this_got;
2452
2453 if (! is_alpha_elf (i))
2454 continue;
2455
2456 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2457 if (this_got == NULL)
2458 continue;
252b5132 2459
a7519a3c
RH
2460 /* We are assuming no merging has yet occurred. */
2461 BFD_ASSERT (this_got == i);
252b5132 2462
07d6d2b8 2463 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2464 {
a7519a3c 2465 /* Yikes! A single object file has too many entries. */
4eca0228 2466 _bfd_error_handler
695344c0 2467 /* xgettext:c-format */
871b3ab2 2468 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2469 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2470 return FALSE;
252b5132 2471 }
252b5132 2472
a7519a3c
RH
2473 if (got_list == NULL)
2474 got_list = this_got;
2475 else
2476 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2477 cur_got_obj = this_got;
252b5132
RH
2478 }
2479
a7519a3c
RH
2480 /* Strange degenerate case of no got references. */
2481 if (got_list == NULL)
2482 return TRUE;
2483
4dfe6ac6 2484 htab->got_list = got_list;
a7519a3c
RH
2485 }
2486
2487 cur_got_obj = got_list;
0ffa91dd
NC
2488 if (cur_got_obj == NULL)
2489 return FALSE;
2490
d1c109de 2491 if (may_merge)
a7519a3c 2492 {
d1c109de
RH
2493 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2494 while (i != NULL)
252b5132 2495 {
d1c109de
RH
2496 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2497 {
2498 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2499
d1c109de
RH
2500 alpha_elf_tdata(i)->got->size = 0;
2501 i = alpha_elf_tdata(i)->got_link_next;
2502 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2503 }
2504 else
2505 {
2506 cur_got_obj = i;
2507 i = alpha_elf_tdata(i)->got_link_next;
2508 }
a7519a3c 2509 }
252b5132
RH
2510 }
2511
a7519a3c
RH
2512 /* Once the gots have been merged, fill in the got offsets for
2513 everything therein. */
4a828aab 2514 elf64_alpha_calc_got_offsets (info);
252b5132 2515
a7519a3c 2516 return TRUE;
252b5132 2517}
252b5132 2518
b34976b6 2519static bfd_boolean
2c3fc389
NC
2520elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2521 void * data)
252b5132 2522{
a7519a3c
RH
2523 asection *splt = (asection *) data;
2524 struct alpha_elf_got_entry *gotent;
6ec7057a 2525 bfd_boolean saw_one = FALSE;
252b5132 2526
a7519a3c
RH
2527 /* If we didn't need an entry before, we still don't. */
2528 if (!h->root.needs_plt)
2529 return TRUE;
e92d460e 2530
6ec7057a 2531 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2532 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2533 if (gotent->reloc_type == R_ALPHA_LITERAL
2534 && gotent->use_count > 0)
6ec7057a
RH
2535 {
2536 if (splt->size == 0)
2537 splt->size = PLT_HEADER_SIZE;
2538 gotent->plt_offset = splt->size;
2539 splt->size += PLT_ENTRY_SIZE;
2540 saw_one = TRUE;
2541 }
a7519a3c 2542
6ec7057a
RH
2543 /* If there weren't any, there's no longer a need for the PLT entry. */
2544 if (!saw_one)
2545 h->root.needs_plt = FALSE;
a7519a3c
RH
2546
2547 return TRUE;
2548}
2549
4a828aab
RH
2550/* Called from relax_section to rebuild the PLT in light of potential changes
2551 in the function's status. */
a7519a3c 2552
4a828aab 2553static void
a7519a3c
RH
2554elf64_alpha_size_plt_section (struct bfd_link_info *info)
2555{
6ec7057a 2556 asection *splt, *spltrel, *sgotplt;
a7519a3c 2557 unsigned long entries;
4dfe6ac6
NC
2558 struct alpha_elf_link_hash_table * htab;
2559
2560 htab = alpha_elf_hash_table (info);
2561 if (htab == NULL)
2562 return;
a7519a3c 2563
ce558b89 2564 splt = elf_hash_table(info)->splt;
a7519a3c 2565 if (splt == NULL)
4a828aab 2566 return;
252b5132 2567
a7519a3c 2568 splt->size = 0;
252b5132 2569
4dfe6ac6 2570 alpha_elf_link_hash_traverse (htab,
a7519a3c 2571 elf64_alpha_size_plt_section_1, splt);
e92d460e 2572
a7519a3c 2573 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2574 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2575 entries = 0;
a7519a3c 2576 if (splt->size)
6ec7057a
RH
2577 {
2578 if (elf64_alpha_use_secureplt)
2579 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2580 else
2581 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2582 }
a7519a3c 2583 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2584
6ec7057a
RH
2585 /* When using the secureplt, we need two words somewhere in the data
2586 segment for the dynamic linker to tell us where to go. This is the
2587 entire contents of the .got.plt section. */
2588 if (elf64_alpha_use_secureplt)
2589 {
ce558b89 2590 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2591 sgotplt->size = entries ? 16 : 0;
2592 }
a7519a3c 2593}
e92d460e 2594
a7519a3c
RH
2595static bfd_boolean
2596elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2597 struct bfd_link_info *info)
2598{
2599 bfd *i;
4dfe6ac6 2600 struct alpha_elf_link_hash_table * htab;
252b5132 2601
0e1862bb 2602 if (bfd_link_relocatable (info))
a7519a3c 2603 return TRUE;
252b5132 2604
4dfe6ac6
NC
2605 htab = alpha_elf_hash_table (info);
2606 if (htab == NULL)
2607 return FALSE;
2608
d1c109de 2609 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2610 return FALSE;
252b5132 2611
a7519a3c 2612 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2613 i = htab->got_list;
a7519a3c 2614 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2615 {
a7519a3c
RH
2616 asection *s = alpha_elf_tdata(i)->got;
2617 if (s->size > 0)
2618 {
2619 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2620 if (s->contents == NULL)
2621 return FALSE;
2622 }
252b5132
RH
2623 }
2624
b34976b6 2625 return TRUE;
252b5132 2626}
3765b1be 2627
a7519a3c 2628/* The number of dynamic relocations required by a static relocation. */
3765b1be 2629
a7519a3c 2630static int
e366eeae 2631alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2632{
2633 switch (r_type)
3765b1be 2634 {
a7519a3c
RH
2635 /* May appear in GOT entries. */
2636 case R_ALPHA_TLSGD:
2637 return (dynamic ? 2 : shared ? 1 : 0);
2638 case R_ALPHA_TLSLDM:
2639 return shared;
2640 case R_ALPHA_LITERAL:
a7519a3c 2641 return dynamic || shared;
e366eeae
RH
2642 case R_ALPHA_GOTTPREL:
2643 return dynamic || (shared && !pie);
a7519a3c
RH
2644 case R_ALPHA_GOTDTPREL:
2645 return dynamic;
3765b1be 2646
a7519a3c
RH
2647 /* May appear in data sections. */
2648 case R_ALPHA_REFLONG:
2649 case R_ALPHA_REFQUAD:
a7519a3c 2650 return dynamic || shared;
e366eeae
RH
2651 case R_ALPHA_TPREL64:
2652 return dynamic || (shared && !pie);
3765b1be 2653
a7519a3c
RH
2654 /* Everything else is illegal. We'll issue an error during
2655 relocate_section. */
2656 default:
2657 return 0;
2658 }
2659}
3765b1be 2660
a7519a3c 2661/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2662
a7519a3c
RH
2663static bfd_boolean
2664elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2665 struct bfd_link_info *info)
2666{
2667 bfd_boolean dynamic;
2668 struct alpha_elf_reloc_entry *relent;
2669 unsigned long entries;
3765b1be 2670
a7519a3c
RH
2671 /* If the symbol was defined as a common symbol in a regular object
2672 file, and there was no definition in any dynamic object, then the
2673 linker will have allocated space for the symbol in a common
2674 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2675 set. This is done for dynamic symbols in
2676 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2677 symbols, somehow. */
2678 if (!h->root.def_regular
2679 && h->root.ref_regular
2680 && !h->root.def_dynamic
2681 && (h->root.root.type == bfd_link_hash_defined
2682 || h->root.root.type == bfd_link_hash_defweak)
2683 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2684 h->root.def_regular = 1;
3765b1be 2685
a7519a3c
RH
2686 /* If the symbol is dynamic, we'll need all the relocations in their
2687 natural form. If this is a shared object, and it has been forced
2688 local, we'll need the same number of RELATIVE relocations. */
2689 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2690
a7519a3c
RH
2691 /* If the symbol is a hidden undefined weak, then we never have any
2692 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2693 based on bfd_link_pic (info). */
a7519a3c
RH
2694 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2695 return TRUE;
2696
2697 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2698 {
a7519a3c 2699 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2700 bfd_link_pic (info),
2701 bfd_link_pie (info));
a7519a3c
RH
2702 if (entries)
2703 {
2704 relent->srel->size +=
2705 entries * sizeof (Elf64_External_Rela) * relent->count;
2706 if (relent->reltext)
2707 info->flags |= DT_TEXTREL;
2708 }
2709 }
3765b1be 2710
a7519a3c
RH
2711 return TRUE;
2712}
3765b1be 2713
a7519a3c
RH
2714/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2715 global symbols. */
3765b1be 2716
a7519a3c
RH
2717static bfd_boolean
2718elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2719 struct bfd_link_info *info)
2720{
2721 bfd_boolean dynamic;
2722 struct alpha_elf_got_entry *gotent;
2723 unsigned long entries;
3765b1be 2724
6ec7057a
RH
2725 /* If we're using a plt for this symbol, then all of its relocations
2726 for its got entries go into .rela.plt. */
2727 if (h->root.needs_plt)
2728 return TRUE;
2729
a7519a3c
RH
2730 /* If the symbol is dynamic, we'll need all the relocations in their
2731 natural form. If this is a shared object, and it has been forced
2732 local, we'll need the same number of RELATIVE relocations. */
2733 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2734
2735 /* If the symbol is a hidden undefined weak, then we never have any
2736 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2737 based on bfd_link_pic (info). */
a7519a3c
RH
2738 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2739 return TRUE;
2740
2741 entries = 0;
2742 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2743 if (gotent->use_count > 0)
e366eeae 2744 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2745 bfd_link_pic (info),
2746 bfd_link_pie (info));
a7519a3c 2747
a7519a3c
RH
2748 if (entries > 0)
2749 {
ce558b89 2750 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2751 BFD_ASSERT (srel != NULL);
2752 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2753 }
3765b1be 2754
a7519a3c 2755 return TRUE;
3765b1be
RH
2756}
2757
a7519a3c 2758/* Set the sizes of the dynamic relocation sections. */
252b5132 2759
4a828aab 2760static void
a7519a3c 2761elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2762{
a7519a3c 2763 unsigned long entries;
ce558b89 2764 bfd *i;
a7519a3c 2765 asection *srel;
4dfe6ac6
NC
2766 struct alpha_elf_link_hash_table * htab;
2767
2768 htab = alpha_elf_hash_table (info);
2769 if (htab == NULL)
2770 return;
252b5132 2771
a7519a3c
RH
2772 /* Shared libraries often require RELATIVE relocs, and some relocs
2773 require attention for the main application as well. */
252b5132 2774
a7519a3c 2775 entries = 0;
4dfe6ac6 2776 for (i = htab->got_list;
a7519a3c
RH
2777 i ; i = alpha_elf_tdata(i)->got_link_next)
2778 {
2779 bfd *j;
3241278a 2780
a7519a3c
RH
2781 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2782 {
2783 struct alpha_elf_got_entry **local_got_entries, *gotent;
2784 int k, n;
252b5132 2785
a7519a3c
RH
2786 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2787 if (!local_got_entries)
2788 continue;
252b5132 2789
a7519a3c
RH
2790 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2791 for (gotent = local_got_entries[k];
2792 gotent ; gotent = gotent->next)
2793 if (gotent->use_count > 0)
2794 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2795 (gotent->reloc_type, 0, bfd_link_pic (info),
2796 bfd_link_pie (info)));
a7519a3c
RH
2797 }
2798 }
3765b1be 2799
ce558b89 2800 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2801 if (!srel)
2802 {
2803 BFD_ASSERT (entries == 0);
4a828aab 2804 return;
a7519a3c
RH
2805 }
2806 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2807
a7519a3c 2808 /* Now do the non-local symbols. */
4dfe6ac6 2809 alpha_elf_link_hash_traverse (htab,
a7519a3c 2810 elf64_alpha_size_rela_got_1, info);
a7519a3c 2811}
252b5132 2812
a7519a3c 2813/* Set the sizes of the dynamic sections. */
3765b1be 2814
a7519a3c
RH
2815static bfd_boolean
2816elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2817 struct bfd_link_info *info)
2818{
2819 bfd *dynobj;
2820 asection *s;
24f1a751 2821 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2822 struct alpha_elf_link_hash_table * htab;
2823
2824 htab = alpha_elf_hash_table (info);
2825 if (htab == NULL)
2826 return FALSE;
3765b1be 2827
a7519a3c
RH
2828 dynobj = elf_hash_table(info)->dynobj;
2829 BFD_ASSERT(dynobj != NULL);
252b5132 2830
a7519a3c
RH
2831 if (elf_hash_table (info)->dynamic_sections_created)
2832 {
2833 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2834 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2835 {
3d4d4302 2836 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2837 BFD_ASSERT (s != NULL);
2838 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2839 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2840 }
3765b1be 2841
a7519a3c
RH
2842 /* Now that we've seen all of the input files, we can decide which
2843 symbols need dynamic relocation entries and which don't. We've
2844 collected information in check_relocs that we can now apply to
2845 size the dynamic relocation sections. */
4dfe6ac6 2846 alpha_elf_link_hash_traverse (htab,
a7519a3c 2847 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2848
a7519a3c 2849 elf64_alpha_size_rela_got_section (info);
6ec7057a 2850 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2851 }
2852 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2853
a7519a3c
RH
2854 /* The check_relocs and adjust_dynamic_symbol entry points have
2855 determined the sizes of the various dynamic sections. Allocate
2856 memory for them. */
2857 relplt = FALSE;
24f1a751 2858 relocs = FALSE;
a7519a3c
RH
2859 for (s = dynobj->sections; s != NULL; s = s->next)
2860 {
2861 const char *name;
3765b1be 2862
a7519a3c
RH
2863 if (!(s->flags & SEC_LINKER_CREATED))
2864 continue;
cc03ec80 2865
a7519a3c
RH
2866 /* It's OK to base decisions on the section name, because none
2867 of the dynobj section names depend upon the input files. */
fd361982 2868 name = bfd_section_name (s);
3765b1be 2869
0112cd26 2870 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2871 {
c456f082 2872 if (s->size != 0)
a7519a3c 2873 {
c456f082 2874 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2875 relplt = TRUE;
24f1a751
AM
2876 else
2877 relocs = TRUE;
252b5132 2878
a7519a3c
RH
2879 /* We use the reloc_count field as a counter if we need
2880 to copy relocs into the output file. */
2881 s->reloc_count = 0;
252b5132 2882 }
3765b1be 2883 }
0112cd26 2884 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2885 && strcmp (name, ".plt") != 0
2886 && strcmp (name, ".dynbss") != 0)
3765b1be 2887 {
a7519a3c
RH
2888 /* It's not one of our dynamic sections, so don't allocate space. */
2889 continue;
2890 }
252b5132 2891
c456f082
AM
2892 if (s->size == 0)
2893 {
2894 /* If we don't need this section, strip it from the output file.
2895 This is to handle .rela.bss and .rela.plt. We must create it
2896 in create_dynamic_sections, because it must be created before
2897 the linker maps input sections to output sections. The
2898 linker does that before adjust_dynamic_symbol is called, and
2899 it is that function which decides whether anything needs to
2900 go into these sections. */
6452a567
RH
2901 if (!CONST_STRNEQ (name, ".got"))
2902 s->flags |= SEC_EXCLUDE;
c456f082
AM
2903 }
2904 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2905 {
2906 /* Allocate memory for the section contents. */
2907 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2908 if (s->contents == NULL)
b34976b6 2909 return FALSE;
a7519a3c
RH
2910 }
2911 }
3765b1be 2912
a7519a3c
RH
2913 if (elf_hash_table (info)->dynamic_sections_created)
2914 {
2915 /* Add some entries to the .dynamic section. We fill in the
2916 values later, in elf64_alpha_finish_dynamic_sections, but we
2917 must add the entries now so that we get the correct size for
2918 the .dynamic section. The DT_DEBUG entry is filled in by the
2919 dynamic linker and used by the debugger. */
2920#define add_dynamic_entry(TAG, VAL) \
2921 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2922
0e1862bb 2923 if (bfd_link_executable (info))
a7519a3c
RH
2924 {
2925 if (!add_dynamic_entry (DT_DEBUG, 0))
2926 return FALSE;
3765b1be
RH
2927 }
2928
a7519a3c 2929 if (relplt)
3765b1be 2930 {
a7519a3c
RH
2931 if (!add_dynamic_entry (DT_PLTGOT, 0)
2932 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2933 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2934 || !add_dynamic_entry (DT_JMPREL, 0))
2935 return FALSE;
6ec7057a
RH
2936
2937 if (elf64_alpha_use_secureplt
2938 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2939 return FALSE;
a7519a3c 2940 }
252b5132 2941
24f1a751 2942 if (relocs)
a7519a3c 2943 {
24f1a751
AM
2944 if (!add_dynamic_entry (DT_RELA, 0)
2945 || !add_dynamic_entry (DT_RELASZ, 0)
2946 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2947 return FALSE;
24f1a751
AM
2948
2949 if (info->flags & DF_TEXTREL)
2950 {
2951 if (!add_dynamic_entry (DT_TEXTREL, 0))
2952 return FALSE;
2953 }
252b5132
RH
2954 }
2955 }
a7519a3c 2956#undef add_dynamic_entry
252b5132 2957
b34976b6 2958 return TRUE;
252b5132 2959}
a7519a3c
RH
2960\f
2961/* These functions do relaxation for Alpha ELF.
252b5132 2962
a7519a3c
RH
2963 Currently I'm only handling what I can do with existing compiler
2964 and assembler support, which means no instructions are removed,
2965 though some may be nopped. At this time GCC does not emit enough
2966 information to do all of the relaxing that is possible. It will
2967 take some not small amount of work for that to happen.
252b5132 2968
a7519a3c
RH
2969 There are a couple of interesting papers that I once read on this
2970 subject, that I cannot find references to at the moment, that
2971 related to Alpha in particular. They are by David Wall, then of
2972 DEC WRL. */
252b5132 2973
a7519a3c
RH
2974struct alpha_relax_info
2975{
2976 bfd *abfd;
2977 asection *sec;
2978 bfd_byte *contents;
2979 Elf_Internal_Shdr *symtab_hdr;
2980 Elf_Internal_Rela *relocs, *relend;
2981 struct bfd_link_info *link_info;
2982 bfd_vma gp;
2983 bfd *gotobj;
2984 asection *tsec;
2985 struct alpha_elf_link_hash_entry *h;
2986 struct alpha_elf_got_entry **first_gotent;
2987 struct alpha_elf_got_entry *gotent;
2988 bfd_boolean changed_contents;
2989 bfd_boolean changed_relocs;
2990 unsigned char other;
2991};
252b5132 2992
a7519a3c
RH
2993static Elf_Internal_Rela *
2994elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2995 Elf_Internal_Rela *relend,
2996 bfd_vma offset, int type)
2997{
2998 while (rel < relend)
252b5132 2999 {
a7519a3c
RH
3000 if (rel->r_offset == offset
3001 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3002 return rel;
3003 ++rel;
3004 }
3005 return NULL;
3006}
252b5132 3007
a7519a3c
RH
3008static bfd_boolean
3009elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3010 Elf_Internal_Rela *irel, unsigned long r_type)
3011{
3012 unsigned int insn;
3013 bfd_signed_vma disp;
252b5132 3014
a7519a3c
RH
3015 /* Get the instruction. */
3016 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3017
a7519a3c
RH
3018 if (insn >> 26 != OP_LDQ)
3019 {
3020 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3021 _bfd_error_handler
695344c0 3022 /* xgettext:c-format */
2dcf00ce
AM
3023 (_("%pB: %pA+%#" PRIx64 ": warning: "
3024 "%s relocation against unexpected insn"),
3025 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
3026 return TRUE;
3027 }
252b5132 3028
a7519a3c
RH
3029 /* Can't relax dynamic symbols. */
3030 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3031 return TRUE;
252b5132 3032
a7519a3c 3033 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3034 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3035 && bfd_link_dll (info->link_info))
a7519a3c 3036 return TRUE;
252b5132 3037
a7519a3c
RH
3038 if (r_type == R_ALPHA_LITERAL)
3039 {
3040 /* Look for nice constant addresses. This includes the not-uncommon
3041 special case of 0 for undefweak symbols. */
3042 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3043 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3044 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3045 {
3046 disp = 0;
3047 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3048 insn |= (symval & 0xffff);
3049 r_type = R_ALPHA_NONE;
3050 }
3051 else
3052 {
d1c109de
RH
3053 /* We may only create GPREL relocs during the second pass. */
3054 if (info->link_info->relax_pass == 0)
3055 return TRUE;
3056
a7519a3c
RH
3057 disp = symval - info->gp;
3058 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3059 r_type = R_ALPHA_GPREL16;
3060 }
252b5132
RH
3061 }
3062 else
252b5132 3063 {
a7519a3c 3064 bfd_vma dtp_base, tp_base;
252b5132 3065
a7519a3c
RH
3066 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3067 dtp_base = alpha_get_dtprel_base (info->link_info);
3068 tp_base = alpha_get_tprel_base (info->link_info);
3069 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3070
a7519a3c 3071 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3072
a7519a3c
RH
3073 switch (r_type)
3074 {
3075 case R_ALPHA_GOTDTPREL:
3076 r_type = R_ALPHA_DTPREL16;
3077 break;
3078 case R_ALPHA_GOTTPREL:
3079 r_type = R_ALPHA_TPREL16;
3080 break;
3081 default:
3082 BFD_ASSERT (0);
3083 return FALSE;
3084 }
3085 }
252b5132 3086
a7519a3c 3087 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3088 return TRUE;
252b5132 3089
a7519a3c
RH
3090 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3091 info->changed_contents = TRUE;
252b5132 3092
a7519a3c
RH
3093 /* Reduce the use count on this got entry by one, possibly
3094 eliminating it. */
3095 if (--info->gotent->use_count == 0)
252b5132 3096 {
a7519a3c
RH
3097 int sz = alpha_got_entry_size (r_type);
3098 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3099 if (!info->h)
3100 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3101 }
252b5132 3102
a7519a3c
RH
3103 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3104 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3105 info->changed_relocs = TRUE;
3106
3107 /* ??? Search forward through this basic block looking for insns
3108 that use the target register. Stop after an insn modifying the
3109 register is seen, or after a branch or call.
252b5132 3110
a7519a3c
RH
3111 Any such memory load insn may be substituted by a load directly
3112 off the GP. This allows the memory load insn to be issued before
3113 the calculated GP register would otherwise be ready.
252b5132 3114
a7519a3c
RH
3115 Any such jsr insn can be replaced by a bsr if it is in range.
3116
3117 This would mean that we'd have to _add_ relocations, the pain of
3118 which gives one pause. */
252b5132 3119
b34976b6 3120 return TRUE;
252b5132
RH
3121}
3122
a7519a3c
RH
3123static bfd_vma
3124elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3125{
a7519a3c
RH
3126 /* If the function has the same gp, and we can identify that the
3127 function does not use its function pointer, we can eliminate the
3128 address load. */
252b5132 3129
a7519a3c
RH
3130 /* If the symbol is marked NOPV, we are being told the function never
3131 needs its procedure value. */
3132 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3133 return symval;
252b5132 3134
a7519a3c
RH
3135 /* If the symbol is marked STD_GP, we are being told the function does
3136 a normal ldgp in the first two words. */
3137 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3138 ;
252b5132 3139
a7519a3c
RH
3140 /* Otherwise, we may be able to identify a GP load in the first two
3141 words, which we can then skip. */
3142 else
252b5132 3143 {
a7519a3c
RH
3144 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3145 bfd_vma ofs;
252b5132 3146
a7519a3c
RH
3147 /* Load the relocations from the section that the target symbol is in. */
3148 if (info->sec == info->tsec)
252b5132 3149 {
a7519a3c
RH
3150 tsec_relocs = info->relocs;
3151 tsec_relend = info->relend;
3152 tsec_free = NULL;
3153 }
3154 else
3155 {
3156 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3157 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3158 (Elf_Internal_Rela *) NULL,
3159 info->link_info->keep_memory));
3160 if (tsec_relocs == NULL)
3161 return 0;
3162 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3163 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3164 ? NULL
3165 : tsec_relocs);
a7519a3c 3166 }
252b5132 3167
a7519a3c
RH
3168 /* Recover the symbol's offset within the section. */
3169 ofs = (symval - info->tsec->output_section->vma
3170 - info->tsec->output_offset);
252b5132 3171
a7519a3c
RH
3172 /* Look for a GPDISP reloc. */
3173 gpdisp = (elf64_alpha_find_reloc_at_ofs
3174 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3175
a7519a3c
RH
3176 if (!gpdisp || gpdisp->r_addend != 4)
3177 {
3178 if (tsec_free)
3179 free (tsec_free);
3180 return 0;
252b5132 3181 }
a7519a3c 3182 if (tsec_free)
07d6d2b8 3183 free (tsec_free);
252b5132
RH
3184 }
3185
a7519a3c
RH
3186 /* We've now determined that we can skip an initial gp load. Verify
3187 that the call and the target use the same gp. */
f13a99db 3188 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3189 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3190 return 0;
252b5132 3191
a7519a3c
RH
3192 return symval + 8;
3193}
252b5132 3194
a7519a3c
RH
3195static bfd_boolean
3196elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3197 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3198{
d1c109de
RH
3199 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3200 int flags;
a7519a3c
RH
3201 bfd_signed_vma disp;
3202 bfd_boolean fits16;
3203 bfd_boolean fits32;
3204 bfd_boolean lit_reused = FALSE;
3205 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3206 bfd_boolean changed_contents;
3207 bfd_boolean changed_relocs;
3208 bfd_byte *contents = info->contents;
3209 bfd *abfd = info->abfd;
3210 bfd_vma sec_output_vma;
a7519a3c 3211 unsigned int lit_insn;
d1c109de 3212 int relax_pass;
252b5132 3213
d1c109de 3214 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3215 if (lit_insn >> 26 != OP_LDQ)
3216 {
4eca0228 3217 _bfd_error_handler
695344c0 3218 /* xgettext:c-format */
2dcf00ce 3219 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3220 "%s relocation against unexpected insn"),
3221 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3222 return TRUE;
3223 }
252b5132 3224
a7519a3c
RH
3225 /* Can't relax dynamic symbols. */
3226 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3227 return TRUE;
3228
d1c109de
RH
3229 changed_contents = info->changed_contents;
3230 changed_relocs = info->changed_relocs;
3231 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3232 relax_pass = info->link_info->relax_pass;
3233
a7519a3c 3234 /* Summarize how this particular LITERAL is used. */
d1c109de 3235 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3236 {
d1c109de 3237 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3238 break;
d1c109de
RH
3239 if (erel->r_addend <= 6)
3240 flags |= 1 << erel->r_addend;
a7519a3c 3241 }
252b5132 3242
a7519a3c
RH
3243 /* A little preparation for the loop... */
3244 disp = symval - info->gp;
252b5132 3245
d1c109de 3246 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3247 {
d1c109de 3248 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3249 unsigned int insn;
3250 int insn_disp;
3251 bfd_signed_vma xdisp;
d1c109de 3252 Elf_Internal_Rela nrel;
252b5132 3253
d1c109de 3254 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3255
a7519a3c
RH
3256 switch (urel->r_addend)
3257 {
3258 case LITUSE_ALPHA_ADDR:
3259 default:
3260 /* This type is really just a placeholder to note that all
3261 uses cannot be optimized, but to still allow some. */
3262 all_optimized = FALSE;
3263 break;
252b5132 3264
a7519a3c 3265 case LITUSE_ALPHA_BASE:
d1c109de
RH
3266 /* We may only create GPREL relocs during the second pass. */
3267 if (relax_pass == 0)
3268 {
3269 all_optimized = FALSE;
3270 break;
3271 }
3272
a7519a3c 3273 /* We can always optimize 16-bit displacements. */
252b5132 3274
a7519a3c
RH
3275 /* Extract the displacement from the instruction, sign-extending
3276 it if necessary, then test whether it is within 16 or 32 bits
3277 displacement from GP. */
3278 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3279
3280 xdisp = disp + insn_disp;
3281 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3282 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3283 && xdisp < 0x7fff8000);
3284
3285 if (fits16)
3286 {
3287 /* Take the op code and dest from this insn, take the base
3288 register from the literal insn. Leave the offset alone. */
3289 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3290 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3291 changed_contents = TRUE;
3292
3293 nrel = *urel;
3294 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3295 R_ALPHA_GPREL16);
3296 nrel.r_addend = irel->r_addend;
3297
3298 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3299 break the LITERAL+LITUSE chain. */
d1c109de 3300 if (urel < --erel)
07d6d2b8 3301 *urel-- = *erel;
d1c109de
RH
3302 *erel = nrel;
3303 changed_relocs = TRUE;
252b5132 3304 }
252b5132 3305
a7519a3c
RH
3306 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3307 else if (fits32 && !(flags & ~6))
3308 {
3309 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3310
a7519a3c
RH
3311 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3312 R_ALPHA_GPRELHIGH);
3313 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3314 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3315 lit_reused = TRUE;
d1c109de 3316 changed_contents = TRUE;
252b5132 3317
07d6d2b8
AM
3318 /* Since all relocs must be optimized, don't bother swapping
3319 this relocation to the end. */
a7519a3c
RH
3320 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3321 R_ALPHA_GPRELLOW);
3322 urel->r_addend = irel->r_addend;
d1c109de 3323 changed_relocs = TRUE;
a7519a3c
RH
3324 }
3325 else
3326 all_optimized = FALSE;
3327 break;
252b5132 3328
a7519a3c
RH
3329 case LITUSE_ALPHA_BYTOFF:
3330 /* We can always optimize byte instructions. */
252b5132 3331
a7519a3c
RH
3332 /* FIXME: sanity check the insn for byte op. Check that the
3333 literal dest reg is indeed Rb in the byte insn. */
252b5132 3334
a7519a3c
RH
3335 insn &= ~ (unsigned) 0x001ff000;
3336 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3337 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3338 changed_contents = TRUE;
3339
3340 nrel = *urel;
3341 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3342 nrel.r_addend = 0;
3343
3344 /* As we adjust, move the reloc to the end so that we don't
3345 break the LITERAL+LITUSE chain. */
3346 if (urel < --erel)
3347 *urel-- = *erel;
3348 *erel = nrel;
3349 changed_relocs = TRUE;
a7519a3c 3350 break;
252b5132 3351
a7519a3c
RH
3352 case LITUSE_ALPHA_JSR:
3353 case LITUSE_ALPHA_TLSGD:
3354 case LITUSE_ALPHA_TLSLDM:
8288a39e 3355 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3356 {
a7519a3c
RH
3357 bfd_vma optdest, org;
3358 bfd_signed_vma odisp;
252b5132 3359
a7519a3c
RH
3360 /* For undefined weak symbols, we're mostly interested in getting
3361 rid of the got entry whenever possible, so optimize this to a
3362 use of the zero register. */
3363 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3364 {
3365 insn |= 31 << 16;
d1c109de 3366 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3367
d1c109de 3368 changed_contents = TRUE;
a7519a3c
RH
3369 break;
3370 }
252b5132 3371
a7519a3c
RH
3372 /* If not zero, place to jump without needing pv. */
3373 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3374 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3375 odisp = (optdest ? optdest : symval) - org;
252b5132 3376
a7519a3c
RH
3377 if (odisp >= -0x400000 && odisp < 0x400000)
3378 {
3379 Elf_Internal_Rela *xrel;
252b5132 3380
a7519a3c
RH
3381 /* Preserve branch prediction call stack when possible. */
3382 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3383 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3384 else
3385 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3386 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3387 changed_contents = TRUE;
252b5132 3388
d1c109de
RH
3389 nrel = *urel;
3390 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3391 R_ALPHA_BRADDR);
3392 nrel.r_addend = irel->r_addend;
252b5132 3393
a7519a3c 3394 if (optdest)
d1c109de 3395 nrel.r_addend += optdest - symval;
a7519a3c
RH
3396 else
3397 all_optimized = FALSE;
252b5132 3398
a7519a3c
RH
3399 /* Kill any HINT reloc that might exist for this insn. */
3400 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3401 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3402 R_ALPHA_HINT));
3403 if (xrel)
3404 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3405
d1c109de
RH
3406 /* As we adjust, move the reloc to the end so that we don't
3407 break the LITERAL+LITUSE chain. */
3408 if (urel < --erel)
3409 *urel-- = *erel;
3410 *erel = nrel;
3411
a7519a3c
RH
3412 info->changed_relocs = TRUE;
3413 }
3414 else
3415 all_optimized = FALSE;
252b5132 3416
a7519a3c
RH
3417 /* Even if the target is not in range for a direct branch,
3418 if we share a GP, we can eliminate the gp reload. */
3419 if (optdest)
3420 {
3421 Elf_Internal_Rela *gpdisp
3422 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3423 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3424 R_ALPHA_GPDISP));
3425 if (gpdisp)
3426 {
d1c109de 3427 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3428 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3429 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3430 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3431
a7519a3c
RH
3432 /* Verify that the instruction is "ldah $29,0($26)".
3433 Consider a function that ends in a noreturn call,
3434 and that the next function begins with an ldgp,
3435 and that by accident there is no padding between.
3436 In that case the insn would use $27 as the base. */
3437 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3438 {
d1c109de
RH
3439 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3440 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3441
a7519a3c 3442 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3443 changed_contents = TRUE;
3444 changed_relocs = TRUE;
a7519a3c
RH
3445 }
3446 }
3447 }
3448 }
3449 break;
252b5132 3450 }
252b5132
RH
3451 }
3452
d1c109de
RH
3453 /* If we reused the literal instruction, we must have optimized all. */
3454 BFD_ASSERT(!lit_reused || all_optimized);
3455
a7519a3c
RH
3456 /* If all cases were optimized, we can reduce the use count on this
3457 got entry by one, possibly eliminating it. */
3458 if (all_optimized)
252b5132 3459 {
a7519a3c 3460 if (--info->gotent->use_count == 0)
252b5132 3461 {
a7519a3c
RH
3462 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3463 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3464 if (!info->h)
3465 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3466 }
a7519a3c
RH
3467
3468 /* If the literal instruction is no longer needed (it may have been
3469 reused. We can eliminate it. */
3470 /* ??? For now, I don't want to deal with compacting the section,
3471 so just nop it out. */
3472 if (!lit_reused)
252b5132 3473 {
a7519a3c 3474 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3475 changed_relocs = TRUE;
252b5132 3476
d1c109de
RH
3477 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3478 changed_contents = TRUE;
a7519a3c 3479 }
a7519a3c 3480 }
d1c109de
RH
3481
3482 info->changed_contents = changed_contents;
3483 info->changed_relocs = changed_relocs;
3484
3485 if (all_optimized || relax_pass == 0)
3486 return TRUE;
3487 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3488}
3489
b34976b6 3490static bfd_boolean
a7519a3c
RH
3491elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3492 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3493{
a7519a3c 3494 bfd_byte *pos[5];
891caa9b 3495 unsigned int insn, tlsgd_reg;
a7519a3c 3496 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3497 bfd_boolean dynamic, use_gottprel;
a7519a3c 3498 unsigned long new_symndx;
f44f99a5 3499
a7519a3c 3500 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3501
a7519a3c
RH
3502 /* If a TLS symbol is accessed using IE at least once, there is no point
3503 to use dynamic model for it. */
3504 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3505 ;
f44f99a5 3506
a7519a3c
RH
3507 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3508 then we might as well relax to IE. */
0e1862bb 3509 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3510 && (info->link_info->flags & DF_STATIC_TLS))
3511 ;
f44f99a5 3512
a7519a3c 3513 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3514 else if (bfd_link_pic (info->link_info))
a7519a3c 3515 return TRUE;
f44f99a5 3516
a7519a3c
RH
3517 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3518 the matching LITUSE_TLS relocations. */
3519 if (irel + 2 >= info->relend)
3520 return TRUE;
3521 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3522 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3523 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3524 return TRUE;
f44f99a5 3525
a7519a3c
RH
3526 /* There must be a GPDISP relocation positioned immediately after the
3527 LITUSE relocation. */
3528 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3529 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3530 if (!gpdisp)
b34976b6 3531 return TRUE;
f44f99a5 3532
a7519a3c
RH
3533 pos[0] = info->contents + irel[0].r_offset;
3534 pos[1] = info->contents + irel[1].r_offset;
3535 pos[2] = info->contents + irel[2].r_offset;
3536 pos[3] = info->contents + gpdisp->r_offset;
3537 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3538
7dbf3b76
RH
3539 /* Beware of the compiler hoisting part of the sequence out a loop
3540 and adjusting the destination register for the TLSGD insn. If this
3541 happens, there will be a move into $16 before the JSR insn, so only
3542 transformations of the first insn pair should use this register. */
3543 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3544 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3545
a7519a3c
RH
3546 /* Generally, the positions are not allowed to be out of order, lest the
3547 modified insn sequence have different register lifetimes. We can make
3548 an exception when pos 1 is adjacent to pos 0. */
3549 if (pos[1] + 4 == pos[0])
f44f99a5 3550 {
a7519a3c
RH
3551 bfd_byte *tmp = pos[0];
3552 pos[0] = pos[1];
3553 pos[1] = tmp;
f44f99a5 3554 }
a7519a3c
RH
3555 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3556 return TRUE;
cc03ec80 3557
a7519a3c
RH
3558 /* Reduce the use count on the LITERAL relocation. Do this before we
3559 smash the symndx when we adjust the relocations below. */
3560 {
3561 struct alpha_elf_got_entry *lit_gotent;
3562 struct alpha_elf_link_hash_entry *lit_h;
3563 unsigned long indx;
f44f99a5 3564
a7519a3c
RH
3565 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3566 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3567 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3568
a7519a3c
RH
3569 while (lit_h->root.root.type == bfd_link_hash_indirect
3570 || lit_h->root.root.type == bfd_link_hash_warning)
3571 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3572
a7519a3c
RH
3573 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3574 lit_gotent = lit_gotent->next)
3575 if (lit_gotent->gotobj == info->gotobj
3576 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3577 && lit_gotent->addend == irel[1].r_addend)
3578 break;
3579 BFD_ASSERT (lit_gotent);
252b5132 3580
a7519a3c
RH
3581 if (--lit_gotent->use_count == 0)
3582 {
3583 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3584 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3585 }
3586 }
252b5132 3587
a7519a3c 3588 /* Change
252b5132 3589
a7519a3c
RH
3590 lda $16,x($gp) !tlsgd!1
3591 ldq $27,__tls_get_addr($gp) !literal!1
3592 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3593 ldah $29,0($26) !gpdisp!2
3594 lda $29,0($29) !gpdisp!2
3595 to
3596 ldq $16,x($gp) !gottprel
3597 unop
3598 call_pal rduniq
3599 addq $16,$0,$0
3600 unop
3601 or the first pair to
3602 lda $16,x($gp) !tprel
3603 unop
3604 or
3605 ldah $16,x($gp) !tprelhi
3606 lda $16,x($16) !tprello
3607
3608 as appropriate. */
3609
3610 use_gottprel = FALSE;
cf35638d 3611 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3612
9a757e4d
RM
3613 /* Some compilers warn about a Boolean-looking expression being
3614 used in a switch. The explicit cast silences them. */
0e1862bb 3615 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3616 {
a7519a3c
RH
3617 case 1:
3618 {
3619 bfd_vma tp_base;
3620 bfd_signed_vma disp;
252b5132 3621
a7519a3c
RH
3622 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3623 tp_base = alpha_get_tprel_base (info->link_info);
3624 disp = symval - tp_base;
252b5132 3625
a7519a3c
RH
3626 if (disp >= -0x8000 && disp < 0x8000)
3627 {
891caa9b 3628 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3629 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3630 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3631
a7519a3c
RH
3632 irel[0].r_offset = pos[0] - info->contents;
3633 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3634 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3635 break;
3636 }
3637 else if (disp >= -(bfd_signed_vma) 0x80000000
3638 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3639 && pos[0] + 4 == pos[1])
a7519a3c 3640 {
891caa9b 3641 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3642 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3643 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3644 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3645
a7519a3c
RH
3646 irel[0].r_offset = pos[0] - info->contents;
3647 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3648 irel[1].r_offset = pos[1] - info->contents;
3649 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3650 break;
3651 }
3652 }
3653 /* FALLTHRU */
3765b1be 3654
3765b1be 3655 default:
a7519a3c
RH
3656 use_gottprel = TRUE;
3657
891caa9b 3658 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3659 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3660 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3661
3662 irel[0].r_offset = pos[0] - info->contents;
3663 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3664 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3665 break;
3765b1be 3666 }
3765b1be 3667
a7519a3c 3668 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3669
a7519a3c
RH
3670 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3671 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3672
a7519a3c 3673 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3674
a7519a3c
RH
3675 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3676 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3677
a7519a3c
RH
3678 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3679 irel[2].r_offset, R_ALPHA_HINT);
3680 if (hint)
3681 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3682
a7519a3c
RH
3683 info->changed_contents = TRUE;
3684 info->changed_relocs = TRUE;
d6ad34f6 3685
a7519a3c
RH
3686 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3687 if (--info->gotent->use_count == 0)
3765b1be 3688 {
a7519a3c
RH
3689 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3690 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3691 if (!info->h)
3692 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3693 }
252b5132 3694
a7519a3c
RH
3695 /* If we've switched to a GOTTPREL relocation, increment the reference
3696 count on that got entry. */
3697 if (use_gottprel)
f44f99a5 3698 {
a7519a3c 3699 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3700
a7519a3c
RH
3701 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3702 tprel_gotent = tprel_gotent->next)
3703 if (tprel_gotent->gotobj == info->gotobj
3704 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3705 && tprel_gotent->addend == irel->r_addend)
3706 break;
3707 if (tprel_gotent)
3708 tprel_gotent->use_count++;
3709 else
f44f99a5 3710 {
a7519a3c
RH
3711 if (info->gotent->use_count == 0)
3712 tprel_gotent = info->gotent;
3713 else
3714 {
3715 tprel_gotent = (struct alpha_elf_got_entry *)
3716 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3717 if (!tprel_gotent)
3718 return FALSE;
f44f99a5 3719
a7519a3c
RH
3720 tprel_gotent->next = *info->first_gotent;
3721 *info->first_gotent = tprel_gotent;
f44f99a5 3722
a7519a3c
RH
3723 tprel_gotent->gotobj = info->gotobj;
3724 tprel_gotent->addend = irel->r_addend;
3725 tprel_gotent->got_offset = -1;
3726 tprel_gotent->reloc_done = 0;
3727 tprel_gotent->reloc_xlated = 0;
3728 }
f44f99a5 3729
a7519a3c
RH
3730 tprel_gotent->use_count = 1;
3731 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3732 }
f44f99a5 3733 }
f44f99a5 3734
b34976b6 3735 return TRUE;
f44f99a5
RH
3736}
3737
b34976b6 3738static bfd_boolean
a7519a3c
RH
3739elf64_alpha_relax_section (bfd *abfd, asection *sec,
3740 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3741{
a7519a3c
RH
3742 Elf_Internal_Shdr *symtab_hdr;
3743 Elf_Internal_Rela *internal_relocs;
3744 Elf_Internal_Rela *irel, *irelend;
3745 Elf_Internal_Sym *isymbuf = NULL;
3746 struct alpha_elf_got_entry **local_got_entries;
3747 struct alpha_relax_info info;
4dfe6ac6 3748 struct alpha_elf_link_hash_table * htab;
d1c109de 3749 int relax_pass;
4dfe6ac6
NC
3750
3751 htab = alpha_elf_hash_table (link_info);
3752 if (htab == NULL)
3753 return FALSE;
f44f99a5 3754
4a828aab 3755 /* There's nothing to change, yet. */
a7519a3c 3756 *again = FALSE;
f44f99a5 3757
0e1862bb 3758 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3759 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3760 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3761 || sec->reloc_count == 0)
d6ad34f6
RH
3762 return TRUE;
3763
0ffa91dd 3764 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3765 relax_pass = link_info->relax_pass;
0ffa91dd 3766
4a828aab 3767 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3768 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3769 {
4dfe6ac6 3770 htab->relax_trip = link_info->relax_trip;
4a828aab 3771
d1c109de 3772 /* This should never fail after the initial round, since the only error
07d6d2b8 3773 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3774 may only merge got sections during the first pass. If we merge
3775 sections after we've created GPREL relocs, the GP for the merged
3776 section backs up which may put the relocs out of range. */
3777 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3778 abort ();
3779 if (elf_hash_table (link_info)->dynamic_sections_created)
3780 {
3781 elf64_alpha_size_plt_section (link_info);
3782 elf64_alpha_size_rela_got_section (link_info);
3783 }
3784 }
3785
0ffa91dd 3786 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3787 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3788
a7519a3c
RH
3789 /* Load the relocations for this section. */
3790 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3791 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3792 link_info->keep_memory));
3793 if (internal_relocs == NULL)
3794 return FALSE;
252b5132 3795
a7519a3c
RH
3796 memset(&info, 0, sizeof (info));
3797 info.abfd = abfd;
3798 info.sec = sec;
3799 info.link_info = link_info;
3800 info.symtab_hdr = symtab_hdr;
3801 info.relocs = internal_relocs;
3802 info.relend = irelend = internal_relocs + sec->reloc_count;
3803
3804 /* Find the GP for this object. Do not store the result back via
3805 _bfd_set_gp_value, since this could change again before final. */
3806 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3807 if (info.gotobj)
3765b1be 3808 {
a7519a3c
RH
3809 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3810 info.gp = (sgot->output_section->vma
3811 + sgot->output_offset
3812 + 0x8000);
252b5132
RH
3813 }
3814
a7519a3c
RH
3815 /* Get the section contents. */
3816 if (elf_section_data (sec)->this_hdr.contents != NULL)
3817 info.contents = elf_section_data (sec)->this_hdr.contents;
3818 else
3819 {
3820 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3821 goto error_return;
3822 }
252b5132 3823
a7519a3c
RH
3824 for (irel = internal_relocs; irel < irelend; irel++)
3825 {
3826 bfd_vma symval;
3827 struct alpha_elf_got_entry *gotent;
3828 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3829 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3830
3831 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3832 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3833 {
3834 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3835 if (relax_pass != 0)
3836 continue;
3837 if (r_type == R_ALPHA_TLSLDM)
3838 {
3839 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3840 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3841 r_symndx = STN_UNDEF;
3842 }
3843 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3844 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3845 && r_type != R_ALPHA_TLSGD)
3846 continue;
a7519a3c
RH
3847 }
3848
3849 /* Get the value of the symbol referred to by the reloc. */
3850 if (r_symndx < symtab_hdr->sh_info)
3851 {
3852 /* A local symbol. */
3853 Elf_Internal_Sym *isym;
3854
3855 /* Read this BFD's local symbols. */
3856 if (isymbuf == NULL)
3857 {
3858 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3859 if (isymbuf == NULL)
3860 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3861 symtab_hdr->sh_info, 0,
3862 NULL, NULL, NULL);
3863 if (isymbuf == NULL)
3864 goto error_return;
3865 }
252b5132 3866
a7519a3c 3867 isym = isymbuf + r_symndx;
252b5132 3868
a7519a3c
RH
3869 /* Given the symbol for a TLSLDM reloc is ignored, this also
3870 means forcing the symbol value to the tp base. */
3871 if (r_type == R_ALPHA_TLSLDM)
3872 {
3873 info.tsec = bfd_abs_section_ptr;
3874 symval = alpha_get_tprel_base (info.link_info);
3875 }
3876 else
3877 {
3878 symval = isym->st_value;
3879 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3880 continue;
a7519a3c 3881 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3882 info.tsec = bfd_abs_section_ptr;
a7519a3c 3883 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3884 info.tsec = bfd_com_section_ptr;
a7519a3c 3885 else
07d6d2b8 3886 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3887 }
252b5132 3888
a7519a3c
RH
3889 info.h = NULL;
3890 info.other = isym->st_other;
3891 if (local_got_entries)
3892 info.first_gotent = &local_got_entries[r_symndx];
3893 else
3894 {
3895 info.first_gotent = &info.gotent;
3896 info.gotent = NULL;
3897 }
252b5132 3898 }
a7519a3c
RH
3899 else
3900 {
3901 unsigned long indx;
3902 struct alpha_elf_link_hash_entry *h;
252b5132 3903
a7519a3c
RH
3904 indx = r_symndx - symtab_hdr->sh_info;
3905 h = alpha_elf_sym_hashes (abfd)[indx];
3906 BFD_ASSERT (h != NULL);
252b5132 3907
a7519a3c
RH
3908 while (h->root.root.type == bfd_link_hash_indirect
3909 || h->root.root.type == bfd_link_hash_warning)
3910 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3911
a7519a3c
RH
3912 /* If the symbol is undefined, we can't do anything with it. */
3913 if (h->root.root.type == bfd_link_hash_undefined)
3914 continue;
252b5132 3915
a7519a3c
RH
3916 /* If the symbol isn't defined in the current module,
3917 again we can't do anything. */
3918 if (h->root.root.type == bfd_link_hash_undefweak)
3919 {
3920 info.tsec = bfd_abs_section_ptr;
3921 symval = 0;
3922 }
3923 else if (!h->root.def_regular)
3924 {
3925 /* Except for TLSGD relocs, which can sometimes be
3926 relaxed to GOTTPREL relocs. */
3927 if (r_type != R_ALPHA_TLSGD)
3928 continue;
3929 info.tsec = bfd_abs_section_ptr;
3930 symval = 0;
3931 }
3932 else
3933 {
3934 info.tsec = h->root.root.u.def.section;
3935 symval = h->root.root.u.def.value;
3936 }
252b5132 3937
a7519a3c
RH
3938 info.h = h;
3939 info.other = h->root.other;
3940 info.first_gotent = &h->got_entries;
3941 }
252b5132 3942
a7519a3c
RH
3943 /* Search for the got entry to be used by this relocation. */
3944 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3945 if (gotent->gotobj == info.gotobj
3946 && gotent->reloc_type == r_type
3947 && gotent->addend == irel->r_addend)
3948 break;
3949 info.gotent = gotent;
252b5132 3950
a7519a3c
RH
3951 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3952 symval += irel->r_addend;
252b5132 3953
a7519a3c 3954 switch (r_type)
252b5132 3955 {
a7519a3c
RH
3956 case R_ALPHA_LITERAL:
3957 BFD_ASSERT(info.gotent != NULL);
252b5132 3958
a7519a3c
RH
3959 /* If there exist LITUSE relocations immediately following, this
3960 opens up all sorts of interesting optimizations, because we
3961 now know every location that this address load is used. */
3962 if (irel+1 < irelend
3963 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3964 {
a7519a3c
RH
3965 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3966 goto error_return;
252b5132 3967 }
a7519a3c
RH
3968 else
3969 {
3970 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3971 goto error_return;
3972 }
3973 break;
252b5132 3974
a7519a3c
RH
3975 case R_ALPHA_GOTDTPREL:
3976 case R_ALPHA_GOTTPREL:
3977 BFD_ASSERT(info.gotent != NULL);
3978 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3979 goto error_return;
3980 break;
3981
3982 case R_ALPHA_TLSGD:
3983 case R_ALPHA_TLSLDM:
3984 BFD_ASSERT(info.gotent != NULL);
3985 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3986 r_type == R_ALPHA_TLSGD))
3987 goto error_return;
3988 break;
252b5132
RH
3989 }
3990 }
3991
a7519a3c
RH
3992 if (isymbuf != NULL
3993 && symtab_hdr->contents != (unsigned char *) isymbuf)
3994 {
3995 if (!link_info->keep_memory)
3996 free (isymbuf);
3997 else
252b5132 3998 {
a7519a3c
RH
3999 /* Cache the symbols for elf_link_input_bfd. */
4000 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 4001 }
a7519a3c 4002 }
252b5132 4003
a7519a3c
RH
4004 if (info.contents != NULL
4005 && elf_section_data (sec)->this_hdr.contents != info.contents)
4006 {
4007 if (!info.changed_contents && !link_info->keep_memory)
4008 free (info.contents);
4009 else
252b5132 4010 {
a7519a3c
RH
4011 /* Cache the section contents for elf_link_input_bfd. */
4012 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4013 }
a7519a3c 4014 }
252b5132 4015
a7519a3c
RH
4016 if (elf_section_data (sec)->relocs != internal_relocs)
4017 {
4018 if (!info.changed_relocs)
4019 free (internal_relocs);
4020 else
4021 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4022 }
a7519a3c
RH
4023
4024 *again = info.changed_contents || info.changed_relocs;
252b5132 4025
b34976b6 4026 return TRUE;
252b5132 4027
a7519a3c
RH
4028 error_return:
4029 if (isymbuf != NULL
4030 && symtab_hdr->contents != (unsigned char *) isymbuf)
4031 free (isymbuf);
4032 if (info.contents != NULL
4033 && elf_section_data (sec)->this_hdr.contents != info.contents)
4034 free (info.contents);
4035 if (internal_relocs != NULL
4036 && elf_section_data (sec)->relocs != internal_relocs)
4037 free (internal_relocs);
4038 return FALSE;
4039}
4040\f
1bbc9cec
RH
4041/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4042 into the next available slot in SREL. */
4043
4044static void
a7519a3c
RH
4045elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4046 asection *sec, asection *srel, bfd_vma offset,
4047 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4048{
4049 Elf_Internal_Rela outrel;
4050 bfd_byte *loc;
4051
4052 BFD_ASSERT (srel != NULL);
4053
4054 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4055 outrel.r_addend = addend;
4056
4057 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4058 if ((offset | 1) != (bfd_vma) -1)
4059 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4060 else
4061 memset (&outrel, 0, sizeof (outrel));
4062
4063 loc = srel->contents;
4064 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4065 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4066 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4067}
4068
4a67a098
RH
4069/* Relocate an Alpha ELF section for a relocatable link.
4070
4071 We don't have to change anything unless the reloc is against a section
4072 symbol, in which case we have to adjust according to where the section
4073 symbol winds up in the output section. */
4074
b34976b6 4075static bfd_boolean
a7519a3c
RH
4076elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4077 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4078 bfd *input_bfd, asection *input_section,
4079 bfd_byte *contents ATTRIBUTE_UNUSED,
4080 Elf_Internal_Rela *relocs,
4081 Elf_Internal_Sym *local_syms,
4082 asection **local_sections)
4a67a098
RH
4083{
4084 unsigned long symtab_hdr_sh_info;
4085 Elf_Internal_Rela *rel;
4086 Elf_Internal_Rela *relend;
ab96bf03 4087 struct elf_link_hash_entry **sym_hashes;
b34976b6 4088 bfd_boolean ret_val = TRUE;
4a67a098 4089
0ffa91dd 4090 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4091 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4092
4093 relend = relocs + input_section->reloc_count;
4094 for (rel = relocs; rel < relend; rel++)
4095 {
4096 unsigned long r_symndx;
4097 Elf_Internal_Sym *sym;
4098 asection *sec;
4099 unsigned long r_type;
4100
ab96bf03 4101 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4102 if (r_type >= R_ALPHA_max)
4103 {
4eca0228 4104 _bfd_error_handler
695344c0 4105 /* xgettext:c-format */
0aa13fee 4106 (_("%pB: unsupported relocation type %#x"),
d003868e 4107 input_bfd, (int) r_type);
4a67a098 4108 bfd_set_error (bfd_error_bad_value);
b34976b6 4109 ret_val = FALSE;
4a67a098
RH
4110 continue;
4111 }
4112
4a67a098
RH
4113 /* The symbol associated with GPDISP and LITUSE is
4114 immaterial. Only the addend is significant. */
4115 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4116 continue;
4117
ab96bf03 4118 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4119 if (r_symndx < symtab_hdr_sh_info)
4120 {
4121 sym = local_syms + r_symndx;
ab96bf03 4122 sec = local_sections[r_symndx];
4a67a098 4123 }
ab96bf03
AM
4124 else
4125 {
4126 struct elf_link_hash_entry *h;
4127
4128 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4129
4130 while (h->root.type == bfd_link_hash_indirect
4131 || h->root.type == bfd_link_hash_warning)
4132 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4133
4134 if (h->root.type != bfd_link_hash_defined
4135 && h->root.type != bfd_link_hash_defweak)
4136 continue;
4137
4138 sym = NULL;
4139 sec = h->root.u.def.section;
4140 }
4141
dbaa2011 4142 if (sec != NULL && discarded_section (sec))
e4067dbb 4143 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4144 rel, 1, relend,
4145 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4146 contents);
ab96bf03
AM
4147
4148 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4149 rel->r_addend += sec->output_offset;
4a67a098
RH
4150 }
4151
4152 return ret_val;
4153}
4154
252b5132
RH
4155/* Relocate an Alpha ELF section. */
4156
b34976b6 4157static bfd_boolean
a7519a3c
RH
4158elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4159 bfd *input_bfd, asection *input_section,
4160 bfd_byte *contents, Elf_Internal_Rela *relocs,
4161 Elf_Internal_Sym *local_syms,
4162 asection **local_sections)
252b5132 4163{
4a67a098 4164 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4165 Elf_Internal_Rela *rel;
4166 Elf_Internal_Rela *relend;
4a67a098
RH
4167 asection *sgot, *srel, *srelgot;
4168 bfd *dynobj, *gotobj;
4169 bfd_vma gp, tp_base, dtp_base;
4170 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4171 bfd_boolean ret_val;
252b5132 4172
0ffa91dd 4173 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4174
4a67a098 4175 /* Handle relocatable links with a smaller loop. */
0e1862bb 4176 if (bfd_link_relocatable (info))
4a67a098
RH
4177 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4178 input_section, contents, relocs,
4179 local_syms, local_sections);
4180
4181 /* This is a final link. */
4182
b34976b6 4183 ret_val = TRUE;
252b5132 4184
0ffa91dd 4185 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4186
4a67a098 4187 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4188 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4189
3241278a
RH
4190 if (input_section->flags & SEC_ALLOC)
4191 {
4192 const char *section_name;
4193 section_name = (bfd_elf_string_from_elf_section
4194 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4195 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4196 BFD_ASSERT(section_name != NULL);
3d4d4302 4197 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4198 }
4199 else
4200 srel = NULL;
3765b1be 4201
4a67a098
RH
4202 /* Find the gp value for this input bfd. */
4203 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4204 if (gotobj)
4205 {
4206 sgot = alpha_elf_tdata (gotobj)->got;
4207 gp = _bfd_get_gp_value (gotobj);
4208 if (gp == 0)
252b5132 4209 {
4a67a098
RH
4210 gp = (sgot->output_section->vma
4211 + sgot->output_offset
4212 + 0x8000);
4213 _bfd_set_gp_value (gotobj, gp);
4214 }
4215 }
4216 else
4217 {
4218 sgot = NULL;
4219 gp = 0;
4220 }
3765b1be 4221
4a67a098
RH
4222 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4223
e1918d23 4224 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4225 {
e1918d23
AM
4226 dtp_base = alpha_get_dtprel_base (info);
4227 tp_base = alpha_get_tprel_base (info);
252b5132 4228 }
4a67a098
RH
4229 else
4230 dtp_base = tp_base = 0;
252b5132 4231
252b5132 4232 relend = relocs + input_section->reloc_count;
4a67a098 4233 for (rel = relocs; rel < relend; rel++)
252b5132 4234 {
4a67a098 4235 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4236 struct alpha_elf_got_entry *gotent;
4237 bfd_reloc_status_type r;
252b5132
RH
4238 reloc_howto_type *howto;
4239 unsigned long r_symndx;
4a67a098
RH
4240 Elf_Internal_Sym *sym = NULL;
4241 asection *sec = NULL;
3765b1be 4242 bfd_vma value;
dc810e39 4243 bfd_vma addend;
b34976b6 4244 bfd_boolean dynamic_symbol_p;
1d5316ab 4245 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4246 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4247 unsigned long r_type;
252b5132
RH
4248
4249 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4250 if (r_type >= R_ALPHA_max)
252b5132 4251 {
4eca0228 4252 _bfd_error_handler
695344c0 4253 /* xgettext:c-format */
0aa13fee 4254 (_("%pB: unsupported relocation type %#x"),
d003868e 4255 input_bfd, (int) r_type);
252b5132 4256 bfd_set_error (bfd_error_bad_value);
b34976b6 4257 ret_val = FALSE;
3765b1be 4258 continue;
252b5132 4259 }
252b5132 4260
3765b1be 4261 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4262 r_symndx = ELF64_R_SYM(rel->r_info);
4263
cc03ec80 4264 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4265 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4266 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4267 r_symndx = STN_UNDEF;
cc03ec80 4268
252b5132
RH
4269 if (r_symndx < symtab_hdr->sh_info)
4270 {
8517fae7 4271 asection *msec;
252b5132
RH
4272 sym = local_syms + r_symndx;
4273 sec = local_sections[r_symndx];
8517fae7
AM
4274 msec = sec;
4275 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4276
cf35638d 4277 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4278 this is hackery from relax_section. Force the value to
f915360b 4279 be the tls module base. */
cf35638d 4280 if (r_symndx == STN_UNDEF
cc03ec80
RH
4281 && (r_type == R_ALPHA_TLSLDM
4282 || r_type == R_ALPHA_GOTTPREL
4283 || r_type == R_ALPHA_TPREL64
4284 || r_type == R_ALPHA_TPRELHI
4285 || r_type == R_ALPHA_TPRELLO
4286 || r_type == R_ALPHA_TPREL16))
f915360b 4287 value = dtp_base;
cc03ec80 4288
4a67a098
RH
4289 if (local_got_entries)
4290 gotent = local_got_entries[r_symndx];
4291 else
4292 gotent = NULL;
3765b1be
RH
4293
4294 /* Need to adjust local GOT entries' addends for SEC_MERGE
4295 unless it has been done already. */
4296 if ((sec->flags & SEC_MERGE)
048d873d 4297 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4298 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4299 && gotent
4300 && !gotent->reloc_xlated)
3765b1be
RH
4301 {
4302 struct alpha_elf_got_entry *ent;
3765b1be
RH
4303
4304 for (ent = gotent; ent; ent = ent->next)
4305 {
4306 ent->reloc_xlated = 1;
4307 if (ent->use_count == 0)
4308 continue;
4309 msec = sec;
4310 ent->addend =
4311 _bfd_merged_section_offset (output_bfd, &msec,
4312 elf_section_data (sec)->
4313 sec_info,
753731ee 4314 sym->st_value + ent->addend);
3765b1be
RH
4315 ent->addend -= sym->st_value;
4316 ent->addend += msec->output_section->vma
4317 + msec->output_offset
4318 - sec->output_section->vma
4319 - sec->output_offset;
4320 }
4321 }
4322
b34976b6 4323 dynamic_symbol_p = FALSE;
252b5132
RH
4324 }
4325 else
4326 {
62d887d4 4327 bfd_boolean warned, ignored;
560e09e9 4328 struct elf_link_hash_entry *hh;
b2a8e766
AM
4329 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4330
4331 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4332 r_symndx, symtab_hdr, sym_hashes,
4333 hh, sec, value,
62d887d4 4334 unresolved_reloc, warned, ignored);
560e09e9
NC
4335
4336 if (warned)
4337 continue;
252b5132 4338
560e09e9
NC
4339 if (value == 0
4340 && ! unresolved_reloc
4341 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4342 undef_weak_ref = TRUE;
3765b1be 4343
560e09e9 4344 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4345 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4346 gotent = h->got_entries;
252b5132 4347 }
3765b1be 4348
dbaa2011 4349 if (sec != NULL && discarded_section (sec))
e4067dbb 4350 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4351 rel, 1, relend, howto, 0, contents);
ab96bf03 4352
252b5132 4353 addend = rel->r_addend;
3765b1be
RH
4354 value += addend;
4355
4356 /* Search for the proper got entry. */
4357 for (; gotent ; gotent = gotent->next)
4358 if (gotent->gotobj == gotobj
4359 && gotent->reloc_type == r_type
4360 && gotent->addend == addend)
4361 break;
252b5132
RH
4362
4363 switch (r_type)
4364 {
4365 case R_ALPHA_GPDISP:
4366 {
4367 bfd_byte *p_ldah, *p_lda;
4368
4369 BFD_ASSERT(gp != 0);
4370
3765b1be
RH
4371 value = (input_section->output_section->vma
4372 + input_section->output_offset
4373 + rel->r_offset);
252b5132 4374
3765b1be 4375 p_ldah = contents + rel->r_offset;
252b5132
RH
4376 p_lda = p_ldah + rel->r_addend;
4377
3765b1be 4378 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4379 p_ldah, p_lda);
4380 }
4381 break;
4382
252b5132 4383 case R_ALPHA_LITERAL:
3765b1be
RH
4384 BFD_ASSERT(sgot != NULL);
4385 BFD_ASSERT(gp != 0);
4386 BFD_ASSERT(gotent != NULL);
4387 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4388
3765b1be
RH
4389 if (!gotent->reloc_done)
4390 {
4391 gotent->reloc_done = 1;
252b5132 4392
3765b1be
RH
4393 bfd_put_64 (output_bfd, value,
4394 sgot->contents + gotent->got_offset);
252b5132 4395
3765b1be
RH
4396 /* If the symbol has been forced local, output a
4397 RELATIVE reloc, otherwise it will be handled in
4398 finish_dynamic_symbol. */
0e1862bb
L
4399 if (bfd_link_pic (info)
4400 && !dynamic_symbol_p
4401 && !undef_weak_ref)
1bbc9cec
RH
4402 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4403 gotent->got_offset, 0,
4404 R_ALPHA_RELATIVE, value);
3765b1be 4405 }
252b5132 4406
3765b1be
RH
4407 value = (sgot->output_section->vma
4408 + sgot->output_offset
4409 + gotent->got_offset);
4410 value -= gp;
252b5132
RH
4411 goto default_reloc;
4412
4413 case R_ALPHA_GPREL32:
ec1659c8 4414 case R_ALPHA_GPREL16:
252b5132 4415 case R_ALPHA_GPRELLOW:
3765b1be 4416 if (dynamic_symbol_p)
07d6d2b8 4417 {
4eca0228 4418 _bfd_error_handler
695344c0 4419 /* xgettext:c-format */
871b3ab2 4420 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4421 input_bfd, h->root.root.root.string);
4422 ret_val = FALSE;
4423 }
252b5132 4424 BFD_ASSERT(gp != 0);
3765b1be 4425 value -= gp;
252b5132
RH
4426 goto default_reloc;
4427
4428 case R_ALPHA_GPRELHIGH:
3765b1be 4429 if (dynamic_symbol_p)
07d6d2b8 4430 {
4eca0228 4431 _bfd_error_handler
695344c0 4432 /* xgettext:c-format */
871b3ab2 4433 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4434 input_bfd, h->root.root.root.string);
4435 ret_val = FALSE;
4436 }
252b5132 4437 BFD_ASSERT(gp != 0);
3765b1be
RH
4438 value -= gp;
4439 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4440 goto default_reloc;
4441
252b5132 4442 case R_ALPHA_HINT:
f94952df
RH
4443 /* A call to a dynamic symbol is definitely out of range of
4444 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4445 if (dynamic_symbol_p)
f94952df
RH
4446 {
4447 r = bfd_reloc_ok;
4448 break;
4449 }
3765b1be
RH
4450 /* The regular PC-relative stuff measures from the start of
4451 the instruction rather than the end. */
4452 value -= 4;
4453 goto default_reloc;
f94952df
RH
4454
4455 case R_ALPHA_BRADDR:
3765b1be 4456 if (dynamic_symbol_p)
07d6d2b8 4457 {
4eca0228 4458 _bfd_error_handler
695344c0 4459 /* xgettext:c-format */
871b3ab2 4460 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4461 input_bfd, h->root.root.root.string);
4462 ret_val = FALSE;
4463 }
252b5132
RH
4464 /* The regular PC-relative stuff measures from the start of
4465 the instruction rather than the end. */
3765b1be 4466 value -= 4;
252b5132
RH
4467 goto default_reloc;
4468
7793f4d0
RH
4469 case R_ALPHA_BRSGP:
4470 {
4471 int other;
4472 const char *name;
4473
4474 /* The regular PC-relative stuff measures from the start of
4475 the instruction rather than the end. */
3765b1be 4476 value -= 4;
7793f4d0 4477
ccf00ab6
RH
4478 /* The source and destination gp must be the same. Note that
4479 the source will always have an assigned gp, since we forced
4480 one in check_relocs, but that the destination may not, as
cedb70c5 4481 it might not have had any relocations at all. Also take
ccf00ab6
RH
4482 care not to crash if H is an undefined symbol. */
4483 if (h != NULL && sec != NULL
4484 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4485 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4486 {
4eca0228 4487 _bfd_error_handler
695344c0 4488 /* xgettext:c-format */
871b3ab2 4489 (_("%pB: change in gp: BRSGP %s"),
d003868e 4490 input_bfd, h->root.root.root.string);
b34976b6 4491 ret_val = FALSE;
7793f4d0
RH
4492 }
4493
4494 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4495 if (h != NULL)
4496 other = h->root.other;
4497 else
4498 other = sym->st_other;
4499 switch (other & STO_ALPHA_STD_GPLOAD)
4500 {
4501 case STO_ALPHA_NOPV:
07d6d2b8 4502 break;
7793f4d0 4503 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4504 value += 8;
7793f4d0
RH
4505 break;
4506 default:
4507 if (h != NULL)
4508 name = h->root.root.root.string;
4509 else
4510 {
4511 name = (bfd_elf_string_from_elf_section
4512 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4513 if (name == NULL)
4514 name = _("<unknown>");
4515 else if (name[0] == 0)
fd361982 4516 name = bfd_section_name (sec);
7793f4d0 4517 }
4eca0228 4518 _bfd_error_handler
695344c0 4519 /* xgettext:c-format */
871b3ab2 4520 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4521 input_bfd, name);
b34976b6 4522 ret_val = FALSE;
7793f4d0
RH
4523 break;
4524 }
4525
4526 goto default_reloc;
4527 }
4528
252b5132
RH
4529 case R_ALPHA_REFLONG:
4530 case R_ALPHA_REFQUAD:
3765b1be
RH
4531 case R_ALPHA_DTPREL64:
4532 case R_ALPHA_TPREL64:
252b5132 4533 {
1bbc9cec
RH
4534 long dynindx, dyntype = r_type;
4535 bfd_vma dynaddend;
252b5132
RH
4536
4537 /* Careful here to remember RELATIVE relocations for global
4538 variables for symbolic shared objects. */
4539
3765b1be 4540 if (dynamic_symbol_p)
252b5132
RH
4541 {
4542 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4543 dynindx = h->root.dynindx;
4544 dynaddend = addend;
3765b1be
RH
4545 addend = 0, value = 0;
4546 }
4547 else if (r_type == R_ALPHA_DTPREL64)
4548 {
e1918d23 4549 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4550 value -= dtp_base;
4551 goto default_reloc;
4552 }
4553 else if (r_type == R_ALPHA_TPREL64)
4554 {
e1918d23 4555 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4556 if (!bfd_link_dll (info))
1bbc9cec
RH
4557 {
4558 value -= tp_base;
4559 goto default_reloc;
4560 }
4561 dynindx = 0;
4562 dynaddend = value - dtp_base;
252b5132 4563 }
0e1862bb 4564 else if (bfd_link_pic (info)
cf35638d 4565 && r_symndx != STN_UNDEF
d6ad34f6 4566 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4567 && !undef_weak_ref
4568 && !(unresolved_reloc
4569 && (_bfd_elf_section_offset (output_bfd, info,
4570 input_section,
4571 rel->r_offset)
4572 == (bfd_vma) -1)))
252b5132 4573 {
3765b1be
RH
4574 if (r_type == R_ALPHA_REFLONG)
4575 {
4eca0228 4576 _bfd_error_handler
695344c0 4577 /* xgettext:c-format */
871b3ab2 4578 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4579 input_bfd,
3765b1be 4580 h->root.root.root.string);
b34976b6 4581 ret_val = FALSE;
3765b1be 4582 }
1bbc9cec
RH
4583 dynindx = 0;
4584 dyntype = R_ALPHA_RELATIVE;
4585 dynaddend = value;
252b5132
RH
4586 }
4587 else
4588 goto default_reloc;
4589
3241278a
RH
4590 if (input_section->flags & SEC_ALLOC)
4591 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4592 srel, rel->r_offset, dynindx,
4593 dyntype, dynaddend);
252b5132
RH
4594 }
4595 goto default_reloc;
4596
3765b1be 4597 case R_ALPHA_SREL16:
84de6048
RH
4598 case R_ALPHA_SREL32:
4599 case R_ALPHA_SREL64:
3765b1be 4600 if (dynamic_symbol_p)
07d6d2b8 4601 {
4eca0228 4602 _bfd_error_handler
695344c0 4603 /* xgettext:c-format */
871b3ab2 4604 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4605 input_bfd, h->root.root.root.string);
4606 ret_val = FALSE;
4607 }
3cbc1e5e 4608 else if (bfd_link_pic (info)
0e1862bb 4609 && undef_weak_ref)
07d6d2b8 4610 {
4eca0228 4611 _bfd_error_handler
695344c0 4612 /* xgettext:c-format */
871b3ab2 4613 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4614 input_bfd, h->root.root.root.string);
4615 ret_val = FALSE;
4616 }
d6ad34f6 4617
3765b1be 4618
84de6048
RH
4619 /* ??? .eh_frame references to discarded sections will be smashed
4620 to relocations against SHN_UNDEF. The .eh_frame format allows
4621 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4622 if (r_symndx == STN_UNDEF
4623 || (unresolved_reloc
4624 && _bfd_elf_section_offset (output_bfd, info,
4625 input_section,
4626 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4627 howto = (elf64_alpha_howto_table
4628 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4629 goto default_reloc;
4630
3765b1be
RH
4631 case R_ALPHA_TLSLDM:
4632 /* Ignore the symbol for the relocation. The result is always
4633 the current module. */
4634 dynamic_symbol_p = 0;
4635 /* FALLTHRU */
4636
4637 case R_ALPHA_TLSGD:
4638 if (!gotent->reloc_done)
4639 {
4640 gotent->reloc_done = 1;
4641
4642 /* Note that the module index for the main program is 1. */
0e1862bb
L
4643 bfd_put_64 (output_bfd,
4644 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4645 sgot->contents + gotent->got_offset);
4646
4647 /* If the symbol has been forced local, output a
4648 DTPMOD64 reloc, otherwise it will be handled in
4649 finish_dynamic_symbol. */
0e1862bb 4650 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4651 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4652 gotent->got_offset, 0,
4653 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4654
4655 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4656 value = 0;
4657 else
4658 {
e1918d23 4659 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4660 value -= dtp_base;
3765b1be
RH
4661 }
4662 bfd_put_64 (output_bfd, value,
4663 sgot->contents + gotent->got_offset + 8);
4664 }
4665
4666 value = (sgot->output_section->vma
4667 + sgot->output_offset
4668 + gotent->got_offset);
4669 value -= gp;
4670 goto default_reloc;
4671
4672 case R_ALPHA_DTPRELHI:
4673 case R_ALPHA_DTPRELLO:
4674 case R_ALPHA_DTPREL16:
4675 if (dynamic_symbol_p)
07d6d2b8 4676 {
4eca0228 4677 _bfd_error_handler
695344c0 4678 /* xgettext:c-format */
871b3ab2 4679 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4680 input_bfd, h->root.root.root.string);
4681 ret_val = FALSE;
4682 }
e1918d23 4683 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4684 value -= dtp_base;
9e756d64
RH
4685 if (r_type == R_ALPHA_DTPRELHI)
4686 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4687 goto default_reloc;
4688
4689 case R_ALPHA_TPRELHI:
4690 case R_ALPHA_TPRELLO:
4691 case R_ALPHA_TPREL16:
3cbc1e5e 4692 if (bfd_link_dll (info))
9e756d64 4693 {
4eca0228 4694 _bfd_error_handler
695344c0 4695 /* xgettext:c-format */
871b3ab2 4696 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4697 input_bfd);
07d6d2b8 4698 ret_val = FALSE;
9e756d64
RH
4699 }
4700 else if (dynamic_symbol_p)
07d6d2b8 4701 {
4eca0228 4702 _bfd_error_handler
695344c0 4703 /* xgettext:c-format */
871b3ab2 4704 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4705 input_bfd, h->root.root.root.string);
4706 ret_val = FALSE;
4707 }
e1918d23 4708 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4709 value -= tp_base;
9e756d64
RH
4710 if (r_type == R_ALPHA_TPRELHI)
4711 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4712 goto default_reloc;
4713
4714 case R_ALPHA_GOTDTPREL:
4715 case R_ALPHA_GOTTPREL:
4716 BFD_ASSERT(sgot != NULL);
4717 BFD_ASSERT(gp != 0);
4718 BFD_ASSERT(gotent != NULL);
4719 BFD_ASSERT(gotent->use_count >= 1);
4720
4721 if (!gotent->reloc_done)
4722 {
4723 gotent->reloc_done = 1;
4724
4725 if (dynamic_symbol_p)
4726 value = 0;
4727 else
4728 {
e1918d23 4729 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4730 if (r_type == R_ALPHA_GOTDTPREL)
4731 value -= dtp_base;
28fbeab8 4732 else if (bfd_link_executable (info))
1bbc9cec
RH
4733 value -= tp_base;
4734 else
4735 {
4736 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4737 gotent->got_offset, 0,
4738 R_ALPHA_TPREL64,
4739 value - dtp_base);
4740 value = 0;
4741 }
3765b1be
RH
4742 }
4743 bfd_put_64 (output_bfd, value,
4744 sgot->contents + gotent->got_offset);
4745 }
4746
4747 value = (sgot->output_section->vma
4748 + sgot->output_offset
4749 + gotent->got_offset);
4750 value -= gp;
4751 goto default_reloc;
4752
252b5132
RH
4753 default:
4754 default_reloc:
4755 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4756 contents, rel->r_offset, value, 0);
252b5132
RH
4757 break;
4758 }
4759
4760 switch (r)
4761 {
4762 case bfd_reloc_ok:
4763 break;
4764
4765 case bfd_reloc_overflow:
4766 {
4767 const char *name;
4768
ed4de5e2
JJ
4769 /* Don't warn if the overflow is due to pc relative reloc
4770 against discarded section. Section optimization code should
4771 handle it. */
4772
4773 if (r_symndx < symtab_hdr->sh_info
4774 && sec != NULL && howto->pc_relative
dbaa2011 4775 && discarded_section (sec))
ed4de5e2
JJ
4776 break;
4777
252b5132 4778 if (h != NULL)
dfeffb9f 4779 name = NULL;
252b5132
RH
4780 else
4781 {
4782 name = (bfd_elf_string_from_elf_section
4783 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4784 if (name == NULL)
b34976b6 4785 return FALSE;
252b5132 4786 if (*name == '\0')
fd361982 4787 name = bfd_section_name (sec);
252b5132 4788 }
1a72702b
AM
4789 (*info->callbacks->reloc_overflow)
4790 (info, (h ? &h->root.root : NULL), name, howto->name,
4791 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4792 }
4793 break;
4794
4795 default:
4796 case bfd_reloc_outofrange:
4797 abort ();
4798 }
4799 }
4800
f16fbd61 4801 return ret_val;
252b5132
RH
4802}
4803
4804/* Finish up dynamic symbol handling. We set the contents of various
4805 dynamic sections here. */
4806
b34976b6 4807static bfd_boolean
a7519a3c
RH
4808elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4809 struct elf_link_hash_entry *h,
4810 Elf_Internal_Sym *sym)
252b5132 4811{
6ec7057a 4812 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4813
6ec7057a 4814 if (h->needs_plt)
252b5132
RH
4815 {
4816 /* Fill in the .plt entry for this symbol. */
4817 asection *splt, *sgot, *srel;
4818 Elf_Internal_Rela outrel;
947216bf 4819 bfd_byte *loc;
252b5132
RH
4820 bfd_vma got_addr, plt_addr;
4821 bfd_vma plt_index;
4822 struct alpha_elf_got_entry *gotent;
4823
4824 BFD_ASSERT (h->dynindx != -1);
4825
ce558b89 4826 splt = elf_hash_table (info)->splt;
252b5132 4827 BFD_ASSERT (splt != NULL);
ce558b89 4828 srel = elf_hash_table (info)->srelplt;
252b5132 4829 BFD_ASSERT (srel != NULL);
252b5132 4830
6ec7057a
RH
4831 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4832 if (gotent->reloc_type == R_ALPHA_LITERAL
4833 && gotent->use_count > 0)
4834 {
4835 unsigned int insn;
4836 int disp;
252b5132 4837
6ec7057a
RH
4838 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4839 BFD_ASSERT (sgot != NULL);
252b5132 4840
6ec7057a
RH
4841 BFD_ASSERT (gotent->got_offset != -1);
4842 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4843
6ec7057a
RH
4844 got_addr = (sgot->output_section->vma
4845 + sgot->output_offset
4846 + gotent->got_offset);
4847 plt_addr = (splt->output_section->vma
4848 + splt->output_offset
4849 + gotent->plt_offset);
252b5132 4850
6ec7057a 4851 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4852
6ec7057a
RH
4853 /* Fill in the entry in the procedure linkage table. */
4854 if (elf64_alpha_use_secureplt)
4855 {
4856 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4857 insn = INSN_AD (INSN_BR, 31, disp);
4858 bfd_put_32 (output_bfd, insn,
4859 splt->contents + gotent->plt_offset);
252b5132 4860
6ec7057a
RH
4861 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4862 / NEW_PLT_ENTRY_SIZE);
4863 }
4864 else
4865 {
4866 disp = -(gotent->plt_offset + 4);
4867 insn = INSN_AD (INSN_BR, 28, disp);
4868 bfd_put_32 (output_bfd, insn,
4869 splt->contents + gotent->plt_offset);
4870 bfd_put_32 (output_bfd, INSN_UNOP,
4871 splt->contents + gotent->plt_offset + 4);
4872 bfd_put_32 (output_bfd, INSN_UNOP,
4873 splt->contents + gotent->plt_offset + 8);
4874
4875 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4876 / OLD_PLT_ENTRY_SIZE);
4877 }
252b5132 4878
6ec7057a
RH
4879 /* Fill in the entry in the .rela.plt section. */
4880 outrel.r_offset = got_addr;
4881 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4882 outrel.r_addend = 0;
252b5132 4883
6ec7057a
RH
4884 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4885 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4886
6ec7057a
RH
4887 /* Fill in the entry in the .got. */
4888 bfd_put_64 (output_bfd, plt_addr,
4889 sgot->contents + gotent->got_offset);
4890 }
252b5132
RH
4891 }
4892 else if (alpha_elf_dynamic_symbol_p (h, info))
4893 {
4894 /* Fill in the dynamic relocations for this symbol's .got entries. */
4895 asection *srel;
252b5132
RH
4896 struct alpha_elf_got_entry *gotent;
4897
ce558b89 4898 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4899 BFD_ASSERT (srel != NULL);
4900
252b5132
RH
4901 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4902 gotent != NULL;
4903 gotent = gotent->next)
4904 {
f44f99a5 4905 asection *sgot;
1bbc9cec 4906 long r_type;
3765b1be 4907
f44f99a5
RH
4908 if (gotent->use_count == 0)
4909 continue;
4910
4911 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4912
4913 r_type = gotent->reloc_type;
4914 switch (r_type)
4915 {
4916 case R_ALPHA_LITERAL:
4917 r_type = R_ALPHA_GLOB_DAT;
4918 break;
4919 case R_ALPHA_TLSGD:
4920 r_type = R_ALPHA_DTPMOD64;
4921 break;
4922 case R_ALPHA_GOTDTPREL:
4923 r_type = R_ALPHA_DTPREL64;
4924 break;
4925 case R_ALPHA_GOTTPREL:
4926 r_type = R_ALPHA_TPREL64;
4927 break;
4928 case R_ALPHA_TLSLDM:
4929 default:
4930 abort ();
4931 }
4932
68ffbac6 4933 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4934 gotent->got_offset, h->dynindx,
4935 r_type, gotent->addend);
3765b1be
RH
4936
4937 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4938 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4939 gotent->got_offset + 8, h->dynindx,
4940 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4941 }
4942 }
4943
4944 /* Mark some specially defined symbols as absolute. */
9637f6ef 4945 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4946 || h == elf_hash_table (info)->hgot
4947 || h == elf_hash_table (info)->hplt)
252b5132
RH
4948 sym->st_shndx = SHN_ABS;
4949
b34976b6 4950 return TRUE;
252b5132
RH
4951}
4952
4953/* Finish up the dynamic sections. */
4954
b34976b6 4955static bfd_boolean
a7519a3c
RH
4956elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4957 struct bfd_link_info *info)
252b5132
RH
4958{
4959 bfd *dynobj;
4960 asection *sdyn;
4961
4962 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4963 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4964
4965 if (elf_hash_table (info)->dynamic_sections_created)
4966 {
6ec7057a 4967 asection *splt, *sgotplt, *srelaplt;
252b5132 4968 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4969 bfd_vma plt_vma, gotplt_vma;
252b5132 4970
ce558b89
AM
4971 splt = elf_hash_table (info)->splt;
4972 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4973 BFD_ASSERT (splt != NULL && sdyn != NULL);
4974
6ec7057a
RH
4975 plt_vma = splt->output_section->vma + splt->output_offset;
4976
4977 gotplt_vma = 0;
4978 if (elf64_alpha_use_secureplt)
4979 {
ce558b89 4980 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4981 BFD_ASSERT (sgotplt != NULL);
4982 if (sgotplt->size > 0)
4983 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4984 }
4985
252b5132 4986 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4987 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4988 for (; dyncon < dynconend; dyncon++)
4989 {
4990 Elf_Internal_Dyn dyn;
252b5132
RH
4991
4992 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4993
4994 switch (dyn.d_tag)
4995 {
4996 case DT_PLTGOT:
6ec7057a
RH
4997 dyn.d_un.d_ptr
4998 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4999 break;
252b5132 5000 case DT_PLTRELSZ:
6ec7057a
RH
5001 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5002 break;
252b5132 5003 case DT_JMPREL:
4ade44b7
AM
5004 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
5005 + srelaplt->output_offset) : 0;
6ec7057a 5006 break;
252b5132
RH
5007 }
5008
5009 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5010 }
5011
6ec7057a 5012 /* Initialize the plt header. */
eea6121a 5013 if (splt->size > 0)
252b5132 5014 {
6ec7057a
RH
5015 unsigned int insn;
5016 int ofs;
5017
5018 if (elf64_alpha_use_secureplt)
5019 {
5020 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5021
5022 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5023 bfd_put_32 (output_bfd, insn, splt->contents);
5024
5025 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5026 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5027
5028 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5029 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5030
5031 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5032 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5033
5034 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5035 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5036
5037 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5038 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5039
5040 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5041 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5042
5043 insn = INSN_AB (INSN_JMP, 31, 27);
5044 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5045
5046 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5047 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5048 }
5049 else
5050 {
5051 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5052 bfd_put_32 (output_bfd, insn, splt->contents);
5053
5054 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5055 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5056
5057 insn = INSN_UNOP;
5058 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5059
5060 insn = INSN_AB (INSN_JMP, 27, 27);
5061 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5062
5063 /* The next two words will be filled in by ld.so. */
5064 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5065 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5066 }
252b5132 5067
eecdbe52 5068 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5069 }
5070 }
5071
b34976b6 5072 return TRUE;
252b5132
RH
5073}
5074
96e2734b
RH
5075/* We need to use a special link routine to handle the .mdebug section.
5076 We need to merge all instances of these sections together, not write
5077 them all out sequentially. */
252b5132 5078
b34976b6 5079static bfd_boolean
a7519a3c 5080elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5081{
5082 asection *o;
5083 struct bfd_link_order *p;
96e2734b 5084 asection *mdebug_sec;
252b5132
RH
5085 struct ecoff_debug_info debug;
5086 const struct ecoff_debug_swap *swap
5087 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5088 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5089 void * mdebug_handle = NULL;
5090 struct alpha_elf_link_hash_table * htab;
5091
5092 htab = alpha_elf_hash_table (info);
5093 if (htab == NULL)
5094 return FALSE;
252b5132 5095
96e2734b 5096 /* Go through the sections and collect the mdebug information. */
252b5132 5097 mdebug_sec = NULL;
252b5132
RH
5098 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5099 {
252b5132
RH
5100 if (strcmp (o->name, ".mdebug") == 0)
5101 {
5102 struct extsym_info einfo;
5103
5104 /* We have found the .mdebug section in the output file.
5105 Look through all the link_orders comprising it and merge
5106 the information together. */
5107 symhdr->magic = swap->sym_magic;
5108 /* FIXME: What should the version stamp be? */
5109 symhdr->vstamp = 0;
5110 symhdr->ilineMax = 0;
5111 symhdr->cbLine = 0;
5112 symhdr->idnMax = 0;
5113 symhdr->ipdMax = 0;
5114 symhdr->isymMax = 0;
5115 symhdr->ioptMax = 0;
5116 symhdr->iauxMax = 0;
5117 symhdr->issMax = 0;
5118 symhdr->issExtMax = 0;
5119 symhdr->ifdMax = 0;
5120 symhdr->crfd = 0;
5121 symhdr->iextMax = 0;
5122
5123 /* We accumulate the debugging information itself in the
5124 debug_info structure. */
5125 debug.line = NULL;
5126 debug.external_dnr = NULL;
5127 debug.external_pdr = NULL;
5128 debug.external_sym = NULL;
5129 debug.external_opt = NULL;
5130 debug.external_aux = NULL;
5131 debug.ss = NULL;
5132 debug.ssext = debug.ssext_end = NULL;
5133 debug.external_fdr = NULL;
5134 debug.external_rfd = NULL;
5135 debug.external_ext = debug.external_ext_end = NULL;
5136
5137 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5138 if (mdebug_handle == NULL)
b34976b6 5139 return FALSE;
252b5132
RH
5140
5141 if (1)
5142 {
5143 asection *s;
5144 EXTR esym;
52b9d213 5145 bfd_vma last = 0;
252b5132
RH
5146 unsigned int i;
5147 static const char * const name[] =
5148 {
5149 ".text", ".init", ".fini", ".data",
5150 ".rodata", ".sdata", ".sbss", ".bss"
5151 };
5152 static const int sc[] = { scText, scInit, scFini, scData,
5153 scRData, scSData, scSBss, scBss };
5154
5155 esym.jmptbl = 0;
5156 esym.cobol_main = 0;
5157 esym.weakext = 0;
5158 esym.reserved = 0;
5159 esym.ifd = ifdNil;
5160 esym.asym.iss = issNil;
5161 esym.asym.st = stLocal;
5162 esym.asym.reserved = 0;
5163 esym.asym.index = indexNil;
5164 for (i = 0; i < 8; i++)
5165 {
5166 esym.asym.sc = sc[i];
5167 s = bfd_get_section_by_name (abfd, name[i]);
5168 if (s != NULL)
5169 {
5170 esym.asym.value = s->vma;
eea6121a 5171 last = s->vma + s->size;
252b5132
RH
5172 }
5173 else
5174 esym.asym.value = last;
5175
5176 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5177 name[i], &esym))
b34976b6 5178 return FALSE;
252b5132
RH
5179 }
5180 }
5181
8423293d 5182 for (p = o->map_head.link_order;
252b5132
RH
5183 p != (struct bfd_link_order *) NULL;
5184 p = p->next)
5185 {
5186 asection *input_section;
5187 bfd *input_bfd;
5188 const struct ecoff_debug_swap *input_swap;
5189 struct ecoff_debug_info input_debug;
5190 char *eraw_src;
5191 char *eraw_end;
5192
5193 if (p->type != bfd_indirect_link_order)
5194 {
fd96f80f 5195 if (p->type == bfd_data_link_order)
252b5132
RH
5196 continue;
5197 abort ();
5198 }
5199
5200 input_section = p->u.indirect.section;
5201 input_bfd = input_section->owner;
5202
0ffa91dd
NC
5203 if (! is_alpha_elf (input_bfd))
5204 /* I don't know what a non ALPHA ELF bfd would be
5205 doing with a .mdebug section, but I don't really
5206 want to deal with it. */
5207 continue;
252b5132
RH
5208
5209 input_swap = (get_elf_backend_data (input_bfd)
5210 ->elf_backend_ecoff_debug_swap);
5211
eea6121a 5212 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5213
5214 /* The ECOFF linking code expects that we have already
5215 read in the debugging information and set up an
5216 ecoff_debug_info structure, so we do that now. */
5217 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5218 &input_debug))
b34976b6 5219 return FALSE;
252b5132
RH
5220
5221 if (! (bfd_ecoff_debug_accumulate
5222 (mdebug_handle, abfd, &debug, swap, input_bfd,
5223 &input_debug, input_swap, info)))
b34976b6 5224 return FALSE;
252b5132
RH
5225
5226 /* Loop through the external symbols. For each one with
5227 interesting information, try to find the symbol in
5228 the linker global hash table and save the information
5229 for the output external symbols. */
21d799b5 5230 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5231 eraw_end = (eraw_src
5232 + (input_debug.symbolic_header.iextMax
5233 * input_swap->external_ext_size));
5234 for (;
5235 eraw_src < eraw_end;
5236 eraw_src += input_swap->external_ext_size)
5237 {
5238 EXTR ext;
5239 const char *name;
5240 struct alpha_elf_link_hash_entry *h;
5241
2c3fc389 5242 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5243 if (ext.asym.sc == scNil
5244 || ext.asym.sc == scUndefined
5245 || ext.asym.sc == scSUndefined)
5246 continue;
5247
5248 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5249 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5250 if (h == NULL || h->esym.ifd != -2)
5251 continue;
5252
5253 if (ext.ifd != -1)
5254 {
5255 BFD_ASSERT (ext.ifd
5256 < input_debug.symbolic_header.ifdMax);
5257 ext.ifd = input_debug.ifdmap[ext.ifd];
5258 }
5259
5260 h->esym = ext;
5261 }
5262
5263 /* Free up the information we just read. */
5264 free (input_debug.line);
5265 free (input_debug.external_dnr);
5266 free (input_debug.external_pdr);
5267 free (input_debug.external_sym);
5268 free (input_debug.external_opt);
5269 free (input_debug.external_aux);
5270 free (input_debug.ss);
5271 free (input_debug.ssext);
5272 free (input_debug.external_fdr);
5273 free (input_debug.external_rfd);
5274 free (input_debug.external_ext);
5275
5276 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5277 elf_link_input_bfd ignores this section. */
5278 input_section->flags &=~ SEC_HAS_CONTENTS;
5279 }
5280
252b5132
RH
5281 /* Build the external symbol information. */
5282 einfo.abfd = abfd;
5283 einfo.info = info;
5284 einfo.debug = &debug;
5285 einfo.swap = swap;
b34976b6 5286 einfo.failed = FALSE;
252b5132
RH
5287 elf_link_hash_traverse (elf_hash_table (info),
5288 elf64_alpha_output_extsym,
2c3fc389 5289 &einfo);
252b5132 5290 if (einfo.failed)
b34976b6 5291 return FALSE;
252b5132
RH
5292
5293 /* Set the size of the .mdebug section. */
eea6121a 5294 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5295
5296 /* Skip this section later on (I don't think this currently
5297 matters, but someday it might). */
8423293d 5298 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5299
5300 mdebug_sec = o;
5301 }
252b5132
RH
5302 }
5303
5304 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5305 if (! bfd_elf_final_link (abfd, info))
b34976b6 5306 return FALSE;
252b5132
RH
5307
5308 /* Now write out the computed sections. */
5309
5310 /* The .got subsections... */
5311 {
5312 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5313 for (i = htab->got_list;
252b5132
RH
5314 i != NULL;
5315 i = alpha_elf_tdata(i)->got_link_next)
5316 {
5317 asection *sgot;
5318
5319 /* elf_bfd_final_link already did everything in dynobj. */
5320 if (i == dynobj)
5321 continue;
5322
5323 sgot = alpha_elf_tdata(i)->got;
5324 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5325 sgot->contents,
5326 (file_ptr) sgot->output_offset,
eea6121a 5327 sgot->size))
b34976b6 5328 return FALSE;
252b5132
RH
5329 }
5330 }
5331
252b5132
RH
5332 if (mdebug_sec != (asection *) NULL)
5333 {
5334 BFD_ASSERT (abfd->output_has_begun);
5335 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5336 swap, info,
5337 mdebug_sec->filepos))
b34976b6 5338 return FALSE;
252b5132
RH
5339
5340 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5341 }
5342
b34976b6 5343 return TRUE;
252b5132 5344}
fcfbdf31
JJ
5345
5346static enum elf_reloc_type_class
7e612e98
AM
5347elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5348 const asection *rel_sec ATTRIBUTE_UNUSED,
5349 const Elf_Internal_Rela *rela)
fcfbdf31 5350{
f51e552e 5351 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5352 {
5353 case R_ALPHA_RELATIVE:
5354 return reloc_class_relative;
5355 case R_ALPHA_JMP_SLOT:
5356 return reloc_class_plt;
5357 case R_ALPHA_COPY:
5358 return reloc_class_copy;
5359 default:
5360 return reloc_class_normal;
5361 }
5362}
252b5132 5363\f
b35d266b 5364static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5365{
07d6d2b8 5366 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5367 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5368 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5369};
5370
252b5132
RH
5371/* ECOFF swapping routines. These are used when dealing with the
5372 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5373 from elf32-mips.c. */
252b5132
RH
5374static const struct ecoff_debug_swap
5375elf64_alpha_ecoff_debug_swap =
5376{
5377 /* Symbol table magic number. */
5378 magicSym2,
5379 /* Alignment of debugging information. E.g., 4. */
5380 8,
5381 /* Sizes of external symbolic information. */
5382 sizeof (struct hdr_ext),
5383 sizeof (struct dnr_ext),
5384 sizeof (struct pdr_ext),
5385 sizeof (struct sym_ext),
5386 sizeof (struct opt_ext),
5387 sizeof (struct fdr_ext),
5388 sizeof (struct rfd_ext),
5389 sizeof (struct ext_ext),
5390 /* Functions to swap in external symbolic data. */
5391 ecoff_swap_hdr_in,
5392 ecoff_swap_dnr_in,
5393 ecoff_swap_pdr_in,
5394 ecoff_swap_sym_in,
5395 ecoff_swap_opt_in,
5396 ecoff_swap_fdr_in,
5397 ecoff_swap_rfd_in,
5398 ecoff_swap_ext_in,
5399 _bfd_ecoff_swap_tir_in,
5400 _bfd_ecoff_swap_rndx_in,
5401 /* Functions to swap out external symbolic data. */
5402 ecoff_swap_hdr_out,
5403 ecoff_swap_dnr_out,
5404 ecoff_swap_pdr_out,
5405 ecoff_swap_sym_out,
5406 ecoff_swap_opt_out,
5407 ecoff_swap_fdr_out,
5408 ecoff_swap_rfd_out,
5409 ecoff_swap_ext_out,
5410 _bfd_ecoff_swap_tir_out,
5411 _bfd_ecoff_swap_rndx_out,
5412 /* Function to read in symbolic data. */
5413 elf64_alpha_read_ecoff_info
5414};
5415\f
70bcb145
JW
5416/* Use a non-standard hash bucket size of 8. */
5417
562ace6b 5418static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5419{
5420 sizeof (Elf64_External_Ehdr),
5421 sizeof (Elf64_External_Phdr),
5422 sizeof (Elf64_External_Shdr),
5423 sizeof (Elf64_External_Rel),
5424 sizeof (Elf64_External_Rela),
5425 sizeof (Elf64_External_Sym),
5426 sizeof (Elf64_External_Dyn),
5427 sizeof (Elf_External_Note),
5428 8,
5429 1,
45d6a902 5430 64, 3,
70bcb145
JW
5431 ELFCLASS64, EV_CURRENT,
5432 bfd_elf64_write_out_phdrs,
5433 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5434 bfd_elf64_checksum_contents,
70bcb145 5435 bfd_elf64_write_relocs,
73ff0d56 5436 bfd_elf64_swap_symbol_in,
70bcb145
JW
5437 bfd_elf64_swap_symbol_out,
5438 bfd_elf64_slurp_reloc_table,
5439 bfd_elf64_slurp_symbol_table,
5440 bfd_elf64_swap_dyn_in,
5441 bfd_elf64_swap_dyn_out,
947216bf
AM
5442 bfd_elf64_swap_reloc_in,
5443 bfd_elf64_swap_reloc_out,
5444 bfd_elf64_swap_reloca_in,
5445 bfd_elf64_swap_reloca_out
70bcb145
JW
5446};
5447
6d00b590 5448#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5449#define TARGET_LITTLE_NAME "elf64-alpha"
5450#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5451#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5452#define ELF_MACHINE_CODE EM_ALPHA
5453#define ELF_MAXPAGESIZE 0x10000
24718e3b 5454#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5455
5456#define bfd_elf64_bfd_link_hash_table_create \
5457 elf64_alpha_bfd_link_hash_table_create
5458
5459#define bfd_elf64_bfd_reloc_type_lookup \
5460 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5461#define bfd_elf64_bfd_reloc_name_lookup \
5462 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5463#define elf_info_to_howto \
5464 elf64_alpha_info_to_howto
5465
5466#define bfd_elf64_mkobject \
5467 elf64_alpha_mkobject
5468#define elf_backend_object_p \
5469 elf64_alpha_object_p
5470
5471#define elf_backend_section_from_shdr \
5472 elf64_alpha_section_from_shdr
204692d7
RH
5473#define elf_backend_section_flags \
5474 elf64_alpha_section_flags
252b5132
RH
5475#define elf_backend_fake_sections \
5476 elf64_alpha_fake_sections
5477
5478#define bfd_elf64_bfd_is_local_label_name \
5479 elf64_alpha_is_local_label_name
5480#define bfd_elf64_find_nearest_line \
5481 elf64_alpha_find_nearest_line
5482#define bfd_elf64_bfd_relax_section \
5483 elf64_alpha_relax_section
5484
5485#define elf_backend_add_symbol_hook \
5486 elf64_alpha_add_symbol_hook
13285a1b
AM
5487#define elf_backend_relocs_compatible \
5488 _bfd_elf_relocs_compatible
6fc5bb57
AM
5489#define elf_backend_sort_relocs_p \
5490 elf64_alpha_sort_relocs_p
252b5132
RH
5491#define elf_backend_check_relocs \
5492 elf64_alpha_check_relocs
5493#define elf_backend_create_dynamic_sections \
5494 elf64_alpha_create_dynamic_sections
5495#define elf_backend_adjust_dynamic_symbol \
5496 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5497#define elf_backend_merge_symbol_attribute \
5498 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5499#define elf_backend_copy_indirect_symbol \
5500 elf64_alpha_copy_indirect_symbol
252b5132
RH
5501#define elf_backend_always_size_sections \
5502 elf64_alpha_always_size_sections
5503#define elf_backend_size_dynamic_sections \
5504 elf64_alpha_size_dynamic_sections
74541ad4 5505#define elf_backend_omit_section_dynsym \
d00dd7dc 5506 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5507#define elf_backend_relocate_section \
5508 elf64_alpha_relocate_section
5509#define elf_backend_finish_dynamic_symbol \
5510 elf64_alpha_finish_dynamic_symbol
5511#define elf_backend_finish_dynamic_sections \
5512 elf64_alpha_finish_dynamic_sections
5513#define bfd_elf64_bfd_final_link \
5514 elf64_alpha_final_link
fcfbdf31
JJ
5515#define elf_backend_reloc_type_class \
5516 elf64_alpha_reloc_type_class
252b5132 5517
e117360e
RH
5518#define elf_backend_can_gc_sections 1
5519#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5520
252b5132
RH
5521#define elf_backend_ecoff_debug_swap \
5522 &elf64_alpha_ecoff_debug_swap
5523
70bcb145
JW
5524#define elf_backend_size_info \
5525 alpha_elf_size_info
5526
29ef7005
L
5527#define elf_backend_special_sections \
5528 elf64_alpha_special_sections
2f89ff8d 5529
38b1a46c 5530/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5531#define elf_backend_want_got_plt 0
5532#define elf_backend_plt_readonly 0
5533#define elf_backend_want_plt_sym 1
5534#define elf_backend_got_header_size 0
64f52338 5535#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5536
5537#include "elf64-target.h"
2238051f
RH
5538\f
5539/* FreeBSD support. */
5540
5541#undef TARGET_LITTLE_SYM
6d00b590 5542#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5543#undef TARGET_LITTLE_NAME
5544#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5545#undef ELF_OSABI
5546#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5547
5548/* The kernel recognizes executables as valid only if they carry a
5549 "FreeBSD" label in the ELF header. So we put this label on all
5550 executables and (for simplicity) also all other object files. */
5551
ed7e9d0b
AM
5552static bfd_boolean
5553elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5554{
5555 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5556
ed7e9d0b
AM
5557 if (!_bfd_elf_init_file_header (abfd, info))
5558 return FALSE;
5559
2238051f
RH
5560 i_ehdrp = elf_elfheader (abfd);
5561
5562 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5563 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5564#ifdef OLD_FREEBSD_ABI_LABEL
5565 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5566 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5567#endif
ed7e9d0b 5568 return TRUE;
2238051f
RH
5569}
5570
ed7e9d0b
AM
5571#undef elf_backend_init_file_header
5572#define elf_backend_init_file_header \
5573 elf64_alpha_fbsd_init_file_header
2238051f 5574
571fe01f 5575#undef elf64_bed
2238051f
RH
5576#define elf64_bed elf64_alpha_fbsd_bed
5577
5578#include "elf64-target.h"
This page took 1.738998 seconds and 4 git commands to generate.