Rename non_ir_ref to non_ir_ref_regular
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
2571583a 2 Copyright (C) 1996-2017 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
30
31#include "elf/alpha.h"
32
33#define ALPHAECOFF
34
35#define NO_COFF_RELOCS
36#define NO_COFF_SYMBOLS
37#define NO_COFF_LINENOS
38
fe8bc63d 39/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
40#include "coff/internal.h"
41#include "coff/sym.h"
42#include "coff/symconst.h"
43#include "coff/ecoff.h"
44#include "coff/alpha.h"
45#include "aout/ar.h"
46#include "libcoff.h"
47#include "libecoff.h"
48#define ECOFF_64
49#include "ecoffswap.h"
50
6ec7057a
RH
51\f
52/* Instruction data for plt generation and relaxation. */
53
54#define OP_LDA 0x08
55#define OP_LDAH 0x09
56#define OP_LDQ 0x29
57#define OP_BR 0x30
58#define OP_BSR 0x34
59
60#define INSN_LDA (OP_LDA << 26)
61#define INSN_LDAH (OP_LDAH << 26)
62#define INSN_LDQ (OP_LDQ << 26)
63#define INSN_BR (OP_BR << 26)
64
65#define INSN_ADDQ 0x40000400
66#define INSN_RDUNIQ 0x0000009e
67#define INSN_SUBQ 0x40000520
68#define INSN_S4SUBQ 0x40000560
69#define INSN_UNOP 0x2ffe0000
70
71#define INSN_JSR 0x68004000
72#define INSN_JMP 0x68000000
73#define INSN_JSR_MASK 0xfc00c000
74
75#define INSN_A(I,A) (I | (A << 21))
76#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
77#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
78#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
79#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
80
81/* PLT/GOT Stuff */
82
83/* Set by ld emulation. Putting this into the link_info or hash structure
84 is simply working too hard. */
85#ifdef USE_SECUREPLT
86bfd_boolean elf64_alpha_use_secureplt = TRUE;
87#else
88bfd_boolean elf64_alpha_use_secureplt = FALSE;
89#endif
90
91#define OLD_PLT_HEADER_SIZE 32
92#define OLD_PLT_ENTRY_SIZE 12
93#define NEW_PLT_HEADER_SIZE 36
94#define NEW_PLT_ENTRY_SIZE 4
95
96#define PLT_HEADER_SIZE \
97 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
98#define PLT_ENTRY_SIZE \
99 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
100
101#define MAX_GOT_SIZE (64*1024)
102
103#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 104\f
21d799b5
NC
105
106/* Used to implement multiple .got subsections. */
107struct alpha_elf_got_entry
108{
109 struct alpha_elf_got_entry *next;
110
111 /* Which .got subsection? */
112 bfd *gotobj;
113
114 /* The addend in effect for this entry. */
115 bfd_vma addend;
116
117 /* The .got offset for this entry. */
118 int got_offset;
119
120 /* The .plt offset for this entry. */
121 int plt_offset;
122
123 /* How many references to this entry? */
124 int use_count;
125
126 /* The relocation type of this entry. */
127 unsigned char reloc_type;
128
129 /* How a LITERAL is used. */
130 unsigned char flags;
131
132 /* Have we initialized the dynamic relocation for this entry? */
133 unsigned char reloc_done;
134
135 /* Have we adjusted this entry for SEC_MERGE? */
136 unsigned char reloc_xlated;
137};
138
139struct alpha_elf_reloc_entry
140{
141 struct alpha_elf_reloc_entry *next;
142
143 /* Which .reloc section? */
144 asection *srel;
145
146 /* What kind of relocation? */
147 unsigned int rtype;
148
149 /* Is this against read-only section? */
150 unsigned int reltext : 1;
151
152 /* How many did we find? */
153 unsigned long count;
154};
155
252b5132
RH
156struct alpha_elf_link_hash_entry
157{
158 struct elf_link_hash_entry root;
159
160 /* External symbol information. */
161 EXTR esym;
162
163 /* Cumulative flags for all the .got entries. */
164 int flags;
165
9e756d64 166 /* Contexts in which a literal was referenced. */
8288a39e
RH
167#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
168#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
169#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
170#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
171#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
172#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
173#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
174#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
175#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 176
252b5132 177 /* Used to implement multiple .got subsections. */
21d799b5 178 struct alpha_elf_got_entry *got_entries;
252b5132 179
571fe01f 180 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 181 of relocation sections. */
21d799b5 182 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
183};
184
185/* Alpha ELF linker hash table. */
186
187struct alpha_elf_link_hash_table
188{
189 struct elf_link_hash_table root;
190
191 /* The head of a list of .got subsections linked through
192 alpha_elf_tdata(abfd)->got_link_next. */
193 bfd *got_list;
4a828aab
RH
194
195 /* The most recent relax pass that we've seen. The GOTs
196 should be regenerated if this doesn't match. */
197 int relax_trip;
252b5132
RH
198};
199
200/* Look up an entry in a Alpha ELF linker hash table. */
201
202#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
203 ((struct alpha_elf_link_hash_entry *) \
204 elf_link_hash_lookup (&(table)->root, (string), (create), \
205 (copy), (follow)))
206
207/* Traverse a Alpha ELF linker hash table. */
208
209#define alpha_elf_link_hash_traverse(table, func, info) \
210 (elf_link_hash_traverse \
211 (&(table)->root, \
2c3fc389 212 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
213 (info)))
214
215/* Get the Alpha ELF linker hash table from a link_info structure. */
216
217#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
218 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
219 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
220
221/* Get the object's symbols as our own entry type. */
222
223#define alpha_elf_sym_hashes(abfd) \
224 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
225
68ffbac6 226/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
227 generic version in that we never need to consider function pointer
228 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
229 address is ever taken. */
252b5132 230
986a241f 231static inline bfd_boolean
a7519a3c
RH
232alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
233 struct bfd_link_info *info)
8fb35fed 234{
986a241f 235 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 236}
252b5132
RH
237
238/* Create an entry in a Alpha ELF linker hash table. */
239
240static struct bfd_hash_entry *
a7519a3c
RH
241elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
242 struct bfd_hash_table *table,
243 const char *string)
252b5132
RH
244{
245 struct alpha_elf_link_hash_entry *ret =
246 (struct alpha_elf_link_hash_entry *) entry;
247
248 /* Allocate the structure if it has not already been allocated by a
249 subclass. */
250 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
251 ret = ((struct alpha_elf_link_hash_entry *)
252 bfd_hash_allocate (table,
253 sizeof (struct alpha_elf_link_hash_entry)));
254 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
255 return (struct bfd_hash_entry *) ret;
256
257 /* Call the allocation method of the superclass. */
258 ret = ((struct alpha_elf_link_hash_entry *)
259 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
260 table, string));
261 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
262 {
263 /* Set local fields. */
264 memset (&ret->esym, 0, sizeof (EXTR));
265 /* We use -2 as a marker to indicate that the information has
266 not been set. -1 means there is no associated ifd. */
267 ret->esym.ifd = -2;
268 ret->flags = 0;
269 ret->got_entries = NULL;
270 ret->reloc_entries = NULL;
271 }
272
273 return (struct bfd_hash_entry *) ret;
274}
275
276/* Create a Alpha ELF linker hash table. */
277
278static struct bfd_link_hash_table *
a7519a3c 279elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
280{
281 struct alpha_elf_link_hash_table *ret;
dc810e39 282 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 283
e2d34d7d 284 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
285 if (ret == (struct alpha_elf_link_hash_table *) NULL)
286 return NULL;
287
66eb6687
AM
288 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
289 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
290 sizeof (struct alpha_elf_link_hash_entry),
291 ALPHA_ELF_DATA))
252b5132 292 {
e2d34d7d 293 free (ret);
252b5132
RH
294 return NULL;
295 }
296
297 return &ret->root.root;
298}
299\f
698600e4
AM
300/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
301 routine in order to handle the ECOFF debugging information. */
302
303struct alpha_elf_find_line
304{
305 struct ecoff_debug_info d;
306 struct ecoff_find_line i;
307};
308
252b5132
RH
309/* We have some private fields hanging off of the elf_tdata structure. */
310
311struct alpha_elf_obj_tdata
312{
313 struct elf_obj_tdata root;
314
315 /* For every input file, these are the got entries for that object's
316 local symbols. */
317 struct alpha_elf_got_entry ** local_got_entries;
318
319 /* For every input file, this is the object that owns the got that
320 this input file uses. */
321 bfd *gotobj;
322
323 /* For every got, this is a linked list through the objects using this got */
324 bfd *in_got_link_next;
325
326 /* For every got, this is a link to the next got subsegment. */
327 bfd *got_link_next;
328
329 /* For every got, this is the section. */
330 asection *got;
331
3765b1be
RH
332 /* For every got, this is it's total number of words. */
333 int total_got_size;
252b5132 334
3765b1be 335 /* For every got, this is the sum of the number of words required
252b5132 336 to hold all of the member object's local got. */
3765b1be 337 int local_got_size;
698600e4
AM
338
339 /* Used by elf64_alpha_find_nearest_line entry point. */
340 struct alpha_elf_find_line *find_line_info;
341
252b5132
RH
342};
343
344#define alpha_elf_tdata(abfd) \
345 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
346
0ffa91dd
NC
347#define is_alpha_elf(bfd) \
348 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
349 && elf_tdata (bfd) != NULL \
4dfe6ac6 350 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 351
b34976b6 352static bfd_boolean
a7519a3c 353elf64_alpha_mkobject (bfd *abfd)
252b5132 354{
0ffa91dd 355 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 356 ALPHA_ELF_DATA);
252b5132
RH
357}
358
b34976b6 359static bfd_boolean
a7519a3c 360elf64_alpha_object_p (bfd *abfd)
252b5132 361{
252b5132
RH
362 /* Set the right machine number for an Alpha ELF file. */
363 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
364}
365\f
a7519a3c
RH
366/* A relocation function which doesn't do anything. */
367
368static bfd_reloc_status_type
369elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
370 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 371 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
372 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
373{
374 if (output_bfd)
375 reloc->address += sec->output_offset;
376 return bfd_reloc_ok;
377}
378
379/* A relocation function used for an unsupported reloc. */
380
381static bfd_reloc_status_type
382elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
383 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 384 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
385 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
386{
387 if (output_bfd)
388 reloc->address += sec->output_offset;
389 return bfd_reloc_notsupported;
390}
391
392/* Do the work of the GPDISP relocation. */
393
394static bfd_reloc_status_type
395elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
396 bfd_byte *p_lda)
397{
398 bfd_reloc_status_type ret = bfd_reloc_ok;
399 bfd_vma addend;
400 unsigned long i_ldah, i_lda;
401
402 i_ldah = bfd_get_32 (abfd, p_ldah);
403 i_lda = bfd_get_32 (abfd, p_lda);
404
405 /* Complain if the instructions are not correct. */
406 if (((i_ldah >> 26) & 0x3f) != 0x09
407 || ((i_lda >> 26) & 0x3f) != 0x08)
408 ret = bfd_reloc_dangerous;
409
410 /* Extract the user-supplied offset, mirroring the sign extensions
411 that the instructions perform. */
412 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
413 addend = (addend ^ 0x80008000) - 0x80008000;
414
415 gpdisp += addend;
416
417 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
418 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
419 ret = bfd_reloc_overflow;
420
421 /* compensate for the sign extension again. */
422 i_ldah = ((i_ldah & 0xffff0000)
423 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
424 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
425
426 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
427 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
428
429 return ret;
430}
431
432/* The special function for the GPDISP reloc. */
433
434static bfd_reloc_status_type
435elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 436 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
437 asection *input_section, bfd *output_bfd,
438 char **err_msg)
439{
440 bfd_reloc_status_type ret;
441 bfd_vma gp, relocation;
442 bfd_vma high_address;
443 bfd_byte *p_ldah, *p_lda;
444
445 /* Don't do anything if we're not doing a final link. */
446 if (output_bfd)
447 {
448 reloc_entry->address += input_section->output_offset;
449 return bfd_reloc_ok;
450 }
451
452 high_address = bfd_get_section_limit (abfd, input_section);
453 if (reloc_entry->address > high_address
454 || reloc_entry->address + reloc_entry->addend > high_address)
455 return bfd_reloc_outofrange;
456
457 /* The gp used in the portion of the output object to which this
458 input object belongs is cached on the input bfd. */
459 gp = _bfd_get_gp_value (abfd);
460
461 relocation = (input_section->output_section->vma
462 + input_section->output_offset
463 + reloc_entry->address);
464
465 p_ldah = (bfd_byte *) data + reloc_entry->address;
466 p_lda = p_ldah + reloc_entry->addend;
467
468 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
469
470 /* Complain if the instructions are not correct. */
471 if (ret == bfd_reloc_dangerous)
472 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
473
474 return ret;
475}
476
252b5132
RH
477/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
478 from smaller values. Start with zero, widen, *then* decrement. */
479#define MINUS_ONE (((bfd_vma)0) - 1)
480
21d799b5 481
dfe57ca0 482#define SKIP_HOWTO(N) \
21d799b5 483 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 484
252b5132
RH
485static reloc_howto_type elf64_alpha_howto_table[] =
486{
487 HOWTO (R_ALPHA_NONE, /* type */
488 0, /* rightshift */
6346d5ca
AM
489 3, /* size (0 = byte, 1 = short, 2 = long) */
490 0, /* bitsize */
b34976b6 491 TRUE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_dont, /* complain_on_overflow */
494 elf64_alpha_reloc_nil, /* special_function */
495 "NONE", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 0, /* src_mask */
498 0, /* dst_mask */
b34976b6 499 TRUE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit reference to a symbol. */
502 HOWTO (R_ALPHA_REFLONG, /* type */
503 0, /* rightshift */
504 2, /* size (0 = byte, 1 = short, 2 = long) */
505 32, /* bitsize */
b34976b6 506 FALSE, /* pc_relative */
252b5132
RH
507 0, /* bitpos */
508 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 509 bfd_elf_generic_reloc, /* special_function */
252b5132 510 "REFLONG", /* name */
b34976b6 511 FALSE, /* partial_inplace */
252b5132
RH
512 0xffffffff, /* src_mask */
513 0xffffffff, /* dst_mask */
b34976b6 514 FALSE), /* pcrel_offset */
252b5132
RH
515
516 /* A 64 bit reference to a symbol. */
517 HOWTO (R_ALPHA_REFQUAD, /* type */
518 0, /* rightshift */
519 4, /* size (0 = byte, 1 = short, 2 = long) */
520 64, /* bitsize */
b34976b6 521 FALSE, /* pc_relative */
252b5132
RH
522 0, /* bitpos */
523 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 524 bfd_elf_generic_reloc, /* special_function */
252b5132 525 "REFQUAD", /* name */
b34976b6 526 FALSE, /* partial_inplace */
252b5132
RH
527 MINUS_ONE, /* src_mask */
528 MINUS_ONE, /* dst_mask */
b34976b6 529 FALSE), /* pcrel_offset */
252b5132
RH
530
531 /* A 32 bit GP relative offset. This is just like REFLONG except
532 that when the value is used the value of the gp register will be
533 added in. */
534 HOWTO (R_ALPHA_GPREL32, /* type */
535 0, /* rightshift */
536 2, /* size (0 = byte, 1 = short, 2 = long) */
537 32, /* bitsize */
b34976b6 538 FALSE, /* pc_relative */
252b5132
RH
539 0, /* bitpos */
540 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 541 bfd_elf_generic_reloc, /* special_function */
252b5132 542 "GPREL32", /* name */
b34976b6 543 FALSE, /* partial_inplace */
252b5132
RH
544 0xffffffff, /* src_mask */
545 0xffffffff, /* dst_mask */
b34976b6 546 FALSE), /* pcrel_offset */
252b5132
RH
547
548 /* Used for an instruction that refers to memory off the GP register. */
549 HOWTO (R_ALPHA_LITERAL, /* type */
550 0, /* rightshift */
dfe57ca0 551 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 552 16, /* bitsize */
b34976b6 553 FALSE, /* pc_relative */
252b5132
RH
554 0, /* bitpos */
555 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 556 bfd_elf_generic_reloc, /* special_function */
252b5132 557 "ELF_LITERAL", /* name */
b34976b6 558 FALSE, /* partial_inplace */
252b5132
RH
559 0xffff, /* src_mask */
560 0xffff, /* dst_mask */
b34976b6 561 FALSE), /* pcrel_offset */
252b5132
RH
562
563 /* This reloc only appears immediately following an ELF_LITERAL reloc.
564 It identifies a use of the literal. The symbol index is special:
565 1 means the literal address is in the base register of a memory
566 format instruction; 2 means the literal address is in the byte
567 offset register of a byte-manipulation instruction; 3 means the
568 literal address is in the target register of a jsr instruction.
569 This does not actually do any relocation. */
570 HOWTO (R_ALPHA_LITUSE, /* type */
571 0, /* rightshift */
dfe57ca0 572 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 573 32, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_nil, /* special_function */
578 "LITUSE", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0, /* src_mask */
581 0, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
252b5132
RH
583
584 /* Load the gp register. This is always used for a ldah instruction
585 which loads the upper 16 bits of the gp register. The symbol
586 index of the GPDISP instruction is an offset in bytes to the lda
587 instruction that loads the lower 16 bits. The value to use for
588 the relocation is the difference between the GP value and the
589 current location; the load will always be done against a register
590 holding the current address.
591
592 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
593 any offset is present in the instructions, it is an offset from
594 the register to the ldah instruction. This lets us avoid any
595 stupid hackery like inventing a gp value to do partial relocation
596 against. Also unlike ECOFF, we do the whole relocation off of
597 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
598 space consuming bit, that, since all the information was present
599 in the GPDISP_HI16 reloc. */
600 HOWTO (R_ALPHA_GPDISP, /* type */
601 16, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 16, /* bitsize */
b34976b6 604 FALSE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 elf64_alpha_reloc_gpdisp, /* special_function */
608 "GPDISP", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0xffff, /* src_mask */
611 0xffff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* A 21 bit branch. */
615 HOWTO (R_ALPHA_BRADDR, /* type */
616 2, /* rightshift */
617 2, /* size (0 = byte, 1 = short, 2 = long) */
618 21, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 622 bfd_elf_generic_reloc, /* special_function */
252b5132 623 "BRADDR", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0x1fffff, /* src_mask */
626 0x1fffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* A hint for a jump to a register. */
630 HOWTO (R_ALPHA_HINT, /* type */
631 2, /* rightshift */
dfe57ca0 632 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 633 14, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 637 bfd_elf_generic_reloc, /* special_function */
252b5132 638 "HINT", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0x3fff, /* src_mask */
641 0x3fff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* 16 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL16, /* type */
646 0, /* rightshift */
647 1, /* size (0 = byte, 1 = short, 2 = long) */
648 16, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 652 bfd_elf_generic_reloc, /* special_function */
252b5132 653 "SREL16", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 0xffff, /* src_mask */
656 0xffff, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132
RH
658
659 /* 32 bit PC relative offset. */
660 HOWTO (R_ALPHA_SREL32, /* type */
661 0, /* rightshift */
662 2, /* size (0 = byte, 1 = short, 2 = long) */
663 32, /* bitsize */
b34976b6 664 TRUE, /* pc_relative */
252b5132
RH
665 0, /* bitpos */
666 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 667 bfd_elf_generic_reloc, /* special_function */
252b5132 668 "SREL32", /* name */
b34976b6 669 FALSE, /* partial_inplace */
252b5132
RH
670 0xffffffff, /* src_mask */
671 0xffffffff, /* dst_mask */
b34976b6 672 TRUE), /* pcrel_offset */
252b5132
RH
673
674 /* A 64 bit PC relative offset. */
675 HOWTO (R_ALPHA_SREL64, /* type */
676 0, /* rightshift */
677 4, /* size (0 = byte, 1 = short, 2 = long) */
678 64, /* bitsize */
b34976b6 679 TRUE, /* pc_relative */
252b5132
RH
680 0, /* bitpos */
681 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 682 bfd_elf_generic_reloc, /* special_function */
252b5132 683 "SREL64", /* name */
b34976b6 684 FALSE, /* partial_inplace */
252b5132
RH
685 MINUS_ONE, /* src_mask */
686 MINUS_ONE, /* dst_mask */
b34976b6 687 TRUE), /* pcrel_offset */
252b5132 688
dfe57ca0
RH
689 /* Skip 12 - 16; deprecated ECOFF relocs. */
690 SKIP_HOWTO (12),
691 SKIP_HOWTO (13),
692 SKIP_HOWTO (14),
693 SKIP_HOWTO (15),
694 SKIP_HOWTO (16),
252b5132
RH
695
696 /* The high 16 bits of the displacement from GP to the target. */
697 HOWTO (R_ALPHA_GPRELHIGH,
698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 704 bfd_elf_generic_reloc, /* special_function */
252b5132 705 "GPRELHIGH", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132
RH
710
711 /* The low 16 bits of the displacement from GP to the target. */
712 HOWTO (R_ALPHA_GPRELLOW,
713 0, /* rightshift */
dfe57ca0 714 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 715 16, /* bitsize */
b34976b6 716 FALSE, /* pc_relative */
252b5132
RH
717 0, /* bitpos */
718 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 719 bfd_elf_generic_reloc, /* special_function */
252b5132 720 "GPRELLOW", /* name */
b34976b6 721 FALSE, /* partial_inplace */
252b5132
RH
722 0xffff, /* src_mask */
723 0xffff, /* dst_mask */
b34976b6 724 FALSE), /* pcrel_offset */
252b5132
RH
725
726 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 727 HOWTO (R_ALPHA_GPREL16,
252b5132 728 0, /* rightshift */
dfe57ca0 729 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 730 16, /* bitsize */
b34976b6 731 FALSE, /* pc_relative */
252b5132
RH
732 0, /* bitpos */
733 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 734 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 735 "GPREL16", /* name */
b34976b6 736 FALSE, /* partial_inplace */
252b5132
RH
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
b34976b6 739 FALSE), /* pcrel_offset */
252b5132 740
dfe57ca0
RH
741 /* Skip 20 - 23; deprecated ECOFF relocs. */
742 SKIP_HOWTO (20),
743 SKIP_HOWTO (21),
744 SKIP_HOWTO (22),
745 SKIP_HOWTO (23),
252b5132 746
fe8bc63d 747 /* Misc ELF relocations. */
252b5132
RH
748
749 /* A dynamic relocation to copy the target into our .dynbss section. */
750 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
751 is present because every other ELF has one, but should not be used
752 because .dynbss is an ugly thing. */
753 HOWTO (R_ALPHA_COPY,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "COPY",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation for a .got entry. */
768 HOWTO (R_ALPHA_GLOB_DAT,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "GLOB_DAT",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
252b5132
RH
781
782 /* A dynamic relocation for a .plt entry. */
783 HOWTO (R_ALPHA_JMP_SLOT,
784 0,
785 0,
786 0,
b34976b6 787 FALSE,
252b5132
RH
788 0,
789 complain_overflow_dont,
790 bfd_elf_generic_reloc,
791 "JMP_SLOT",
b34976b6 792 FALSE,
252b5132
RH
793 0,
794 0,
b34976b6 795 TRUE),
252b5132
RH
796
797 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
798 HOWTO (R_ALPHA_RELATIVE,
799 0,
800 0,
801 0,
b34976b6 802 FALSE,
252b5132
RH
803 0,
804 complain_overflow_dont,
805 bfd_elf_generic_reloc,
806 "RELATIVE",
b34976b6 807 FALSE,
252b5132
RH
808 0,
809 0,
b34976b6 810 TRUE),
7793f4d0
RH
811
812 /* A 21 bit branch that adjusts for gp loads. */
813 HOWTO (R_ALPHA_BRSGP, /* type */
814 2, /* rightshift */
815 2, /* size (0 = byte, 1 = short, 2 = long) */
816 21, /* bitsize */
b34976b6 817 TRUE, /* pc_relative */
7793f4d0
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 820 bfd_elf_generic_reloc, /* special_function */
7793f4d0 821 "BRSGP", /* name */
b34976b6 822 FALSE, /* partial_inplace */
7793f4d0
RH
823 0x1fffff, /* src_mask */
824 0x1fffff, /* dst_mask */
b34976b6 825 TRUE), /* pcrel_offset */
3765b1be
RH
826
827 /* Creates a tls_index for the symbol in the got. */
828 HOWTO (R_ALPHA_TLSGD, /* type */
829 0, /* rightshift */
830 1, /* size (0 = byte, 1 = short, 2 = long) */
831 16, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 835 bfd_elf_generic_reloc, /* special_function */
3765b1be 836 "TLSGD", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 0xffff, /* src_mask */
839 0xffff, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a tls_index for the (current) module in the got. */
843 HOWTO (R_ALPHA_TLSLDM, /* type */
844 0, /* rightshift */
845 1, /* size (0 = byte, 1 = short, 2 = long) */
846 16, /* bitsize */
b34976b6 847 FALSE, /* pc_relative */
3765b1be
RH
848 0, /* bitpos */
849 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 850 bfd_elf_generic_reloc, /* special_function */
3765b1be 851 "TLSLDM", /* name */
b34976b6 852 FALSE, /* partial_inplace */
3765b1be
RH
853 0xffff, /* src_mask */
854 0xffff, /* dst_mask */
b34976b6 855 FALSE), /* pcrel_offset */
3765b1be
RH
856
857 /* A dynamic relocation for a DTP module entry. */
858 HOWTO (R_ALPHA_DTPMOD64, /* type */
859 0, /* rightshift */
860 4, /* size (0 = byte, 1 = short, 2 = long) */
861 64, /* bitsize */
b34976b6 862 FALSE, /* pc_relative */
3765b1be
RH
863 0, /* bitpos */
864 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 865 bfd_elf_generic_reloc, /* special_function */
3765b1be 866 "DTPMOD64", /* name */
b34976b6 867 FALSE, /* partial_inplace */
3765b1be
RH
868 MINUS_ONE, /* src_mask */
869 MINUS_ONE, /* dst_mask */
b34976b6 870 FALSE), /* pcrel_offset */
3765b1be
RH
871
872 /* Creates a 64-bit offset in the got for the displacement
873 from DTP to the target. */
874 HOWTO (R_ALPHA_GOTDTPREL, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 881 bfd_elf_generic_reloc, /* special_function */
3765b1be 882 "GOTDTPREL", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* A dynamic relocation for a displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPREL64, /* type */
890 0, /* rightshift */
891 4, /* size (0 = byte, 1 = short, 2 = long) */
892 64, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 896 bfd_elf_generic_reloc, /* special_function */
3765b1be 897 "DTPREL64", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 MINUS_ONE, /* src_mask */
900 MINUS_ONE, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* The high 16 bits of the displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPRELHI, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 911 bfd_elf_generic_reloc, /* special_function */
3765b1be 912 "DTPRELHI", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* The low 16 bits of the displacement from DTP to the target. */
919 HOWTO (R_ALPHA_DTPRELLO, /* type */
920 0, /* rightshift */
921 1, /* size (0 = byte, 1 = short, 2 = long) */
922 16, /* bitsize */
b34976b6 923 FALSE, /* pc_relative */
3765b1be
RH
924 0, /* bitpos */
925 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 926 bfd_elf_generic_reloc, /* special_function */
3765b1be 927 "DTPRELLO", /* name */
b34976b6 928 FALSE, /* partial_inplace */
3765b1be
RH
929 0xffff, /* src_mask */
930 0xffff, /* dst_mask */
b34976b6 931 FALSE), /* pcrel_offset */
3765b1be
RH
932
933 /* A 16-bit displacement from DTP to the target. */
934 HOWTO (R_ALPHA_DTPREL16, /* type */
935 0, /* rightshift */
936 1, /* size (0 = byte, 1 = short, 2 = long) */
937 16, /* bitsize */
b34976b6 938 FALSE, /* pc_relative */
3765b1be
RH
939 0, /* bitpos */
940 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 941 bfd_elf_generic_reloc, /* special_function */
3765b1be 942 "DTPREL16", /* name */
b34976b6 943 FALSE, /* partial_inplace */
3765b1be
RH
944 0xffff, /* src_mask */
945 0xffff, /* dst_mask */
b34976b6 946 FALSE), /* pcrel_offset */
3765b1be
RH
947
948 /* Creates a 64-bit offset in the got for the displacement
949 from TP to the target. */
950 HOWTO (R_ALPHA_GOTTPREL, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 957 bfd_elf_generic_reloc, /* special_function */
3765b1be 958 "GOTTPREL", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* A dynamic relocation for a displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPREL64, /* type */
966 0, /* rightshift */
967 4, /* size (0 = byte, 1 = short, 2 = long) */
968 64, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 972 bfd_elf_generic_reloc, /* special_function */
3765b1be 973 "TPREL64", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 MINUS_ONE, /* src_mask */
976 MINUS_ONE, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* The high 16 bits of the displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPRELHI, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 987 bfd_elf_generic_reloc, /* special_function */
3765b1be 988 "TPRELHI", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
3765b1be
RH
993
994 /* The low 16 bits of the displacement from TP to the target. */
995 HOWTO (R_ALPHA_TPRELLO, /* type */
996 0, /* rightshift */
997 1, /* size (0 = byte, 1 = short, 2 = long) */
998 16, /* bitsize */
b34976b6 999 FALSE, /* pc_relative */
3765b1be
RH
1000 0, /* bitpos */
1001 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1002 bfd_elf_generic_reloc, /* special_function */
3765b1be 1003 "TPRELLO", /* name */
b34976b6 1004 FALSE, /* partial_inplace */
3765b1be
RH
1005 0xffff, /* src_mask */
1006 0xffff, /* dst_mask */
b34976b6 1007 FALSE), /* pcrel_offset */
3765b1be
RH
1008
1009 /* A 16-bit displacement from TP to the target. */
1010 HOWTO (R_ALPHA_TPREL16, /* type */
1011 0, /* rightshift */
1012 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 16, /* bitsize */
b34976b6 1014 FALSE, /* pc_relative */
3765b1be
RH
1015 0, /* bitpos */
1016 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1017 bfd_elf_generic_reloc, /* special_function */
3765b1be 1018 "TPREL16", /* name */
b34976b6 1019 FALSE, /* partial_inplace */
3765b1be
RH
1020 0xffff, /* src_mask */
1021 0xffff, /* dst_mask */
b34976b6 1022 FALSE), /* pcrel_offset */
252b5132
RH
1023};
1024
252b5132
RH
1025/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1026
1027struct elf_reloc_map
1028{
1029 bfd_reloc_code_real_type bfd_reloc_val;
1030 int elf_reloc_val;
1031};
1032
1033static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1034{
dfe57ca0
RH
1035 {BFD_RELOC_NONE, R_ALPHA_NONE},
1036 {BFD_RELOC_32, R_ALPHA_REFLONG},
1037 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1038 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1040 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1041 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1042 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1043 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1044 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1045 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1046 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1047 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1048 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1049 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1050 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1051 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1052 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1053 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1054 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1055 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1056 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1057 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1058 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1059 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1060 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1061 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1062 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1063 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1064 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1065};
1066
1067/* Given a BFD reloc type, return a HOWTO structure. */
1068
1069static reloc_howto_type *
a7519a3c
RH
1070elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1071 bfd_reloc_code_real_type code)
252b5132
RH
1072{
1073 const struct elf_reloc_map *i, *e;
1074 i = e = elf64_alpha_reloc_map;
1075 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1076 for (; i != e; ++i)
1077 {
1078 if (i->bfd_reloc_val == code)
1079 return &elf64_alpha_howto_table[i->elf_reloc_val];
1080 }
1081 return 0;
1082}
1083
157090f7
AM
1084static reloc_howto_type *
1085elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1086 const char *r_name)
1087{
1088 unsigned int i;
1089
1090 for (i = 0;
1091 i < (sizeof (elf64_alpha_howto_table)
1092 / sizeof (elf64_alpha_howto_table[0]));
1093 i++)
1094 if (elf64_alpha_howto_table[i].name != NULL
1095 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1096 return &elf64_alpha_howto_table[i];
1097
1098 return NULL;
1099}
1100
252b5132
RH
1101/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1102
1103static void
a7519a3c
RH
1104elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1105 Elf_Internal_Rela *dst)
252b5132 1106{
a7519a3c 1107 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1108
1109 if (r_type >= R_ALPHA_max)
1110 {
695344c0 1111 /* xgettext:c-format */
4eca0228
AM
1112 _bfd_error_handler (_("%B: unrecognised Alpha reloc number: %d"),
1113 abfd, r_type);
cd21f5da
NC
1114 bfd_set_error (bfd_error_bad_value);
1115 r_type = R_ALPHA_NONE;
1116 }
252b5132
RH
1117 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1118}
3765b1be
RH
1119
1120/* These two relocations create a two-word entry in the got. */
1121#define alpha_got_entry_size(r_type) \
1122 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1123
1124/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1125#define alpha_get_dtprel_base(info) \
1126 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1127
1128/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1129 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1130#define alpha_get_tprel_base(info) \
1131 (elf_hash_table (info)->tls_sec->vma \
1132 - align_power ((bfd_vma) 16, \
1133 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1134\f
a7519a3c
RH
1135/* Handle an Alpha specific section when reading an object file. This
1136 is called when bfd_section_from_shdr finds a section with an unknown
1137 type.
1138 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1139 how to. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
a7519a3c
RH
1170 if (! bfd_set_section_flags (abfd, newsect,
1171 (bfd_get_section_flags (abfd, newsect)
1172 | SEC_DEBUGGING)))
1173 return FALSE;
252b5132 1174 }
a7519a3c
RH
1175
1176 return TRUE;
252b5132
RH
1177}
1178
a7519a3c
RH
1179/* Convert Alpha specific section flags to bfd internal section flags. */
1180
b34976b6 1181static bfd_boolean
a7519a3c 1182elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1183{
a7519a3c
RH
1184 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1185 *flags |= SEC_SMALL_DATA;
252b5132 1186
a7519a3c
RH
1187 return TRUE;
1188}
252b5132 1189
a7519a3c
RH
1190/* Set the correct type for an Alpha ELF section. We do this by the
1191 section name, which is a hack, but ought to work. */
9e756d64 1192
a7519a3c
RH
1193static bfd_boolean
1194elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1195{
1196 register const char *name;
1197
1198 name = bfd_get_section_name (abfd, sec);
1199
1200 if (strcmp (name, ".mdebug") == 0)
252b5132 1201 {
a7519a3c
RH
1202 hdr->sh_type = SHT_ALPHA_DEBUG;
1203 /* In a shared object on Irix 5.3, the .mdebug section has an
1204 entsize of 0. FIXME: Does this matter? */
1205 if ((abfd->flags & DYNAMIC) != 0 )
1206 hdr->sh_entsize = 0;
1207 else
1208 hdr->sh_entsize = 1;
252b5132 1209 }
a7519a3c
RH
1210 else if ((sec->flags & SEC_SMALL_DATA)
1211 || strcmp (name, ".sdata") == 0
1212 || strcmp (name, ".sbss") == 0
1213 || strcmp (name, ".lit4") == 0
1214 || strcmp (name, ".lit8") == 0)
1215 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1216
a7519a3c
RH
1217 return TRUE;
1218}
252b5132 1219
a7519a3c
RH
1220/* Hook called by the linker routine which adds symbols from an object
1221 file. We use it to put .comm items in .sbss, and not .bss. */
1222
1223static bfd_boolean
1224elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1225 Elf_Internal_Sym *sym,
1226 const char **namep ATTRIBUTE_UNUSED,
1227 flagword *flagsp ATTRIBUTE_UNUSED,
1228 asection **secp, bfd_vma *valp)
1229{
1230 if (sym->st_shndx == SHN_COMMON
0e1862bb 1231 && !bfd_link_relocatable (info)
a7519a3c 1232 && sym->st_size <= elf_gp_size (abfd))
252b5132 1233 {
a7519a3c
RH
1234 /* Common symbols less than or equal to -G nn bytes are
1235 automatically put into .sbss. */
ffcb7aff 1236
a7519a3c 1237 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1238
a7519a3c 1239 if (scomm == NULL)
252b5132 1240 {
a7519a3c
RH
1241 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1242 (SEC_ALLOC
1243 | SEC_IS_COMMON
1244 | SEC_LINKER_CREATED));
1245 if (scomm == NULL)
1246 return FALSE;
1247 }
ffcb7aff 1248
a7519a3c
RH
1249 *secp = scomm;
1250 *valp = sym->st_size;
1251 }
ffcb7aff 1252
a7519a3c
RH
1253 return TRUE;
1254}
252b5132 1255
a7519a3c 1256/* Create the .got section. */
252b5132 1257
a7519a3c
RH
1258static bfd_boolean
1259elf64_alpha_create_got_section (bfd *abfd,
1260 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1261{
85d162e6 1262 flagword flags;
a7519a3c 1263 asection *s;
252b5132 1264
0ffa91dd
NC
1265 if (! is_alpha_elf (abfd))
1266 return FALSE;
1267
85d162e6
AM
1268 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1269 | SEC_LINKER_CREATED);
1270 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1271 if (s == NULL
1272 || !bfd_set_section_alignment (abfd, s, 3))
1273 return FALSE;
252b5132 1274
a7519a3c 1275 alpha_elf_tdata (abfd)->got = s;
252b5132 1276
85d162e6
AM
1277 /* Make sure the object's gotobj is set to itself so that we default
1278 to every object with its own .got. We'll merge .gots later once
1279 we've collected each object's info. */
1280 alpha_elf_tdata (abfd)->gotobj = abfd;
1281
a7519a3c
RH
1282 return TRUE;
1283}
252b5132 1284
a7519a3c 1285/* Create all the dynamic sections. */
252b5132 1286
a7519a3c
RH
1287static bfd_boolean
1288elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1289{
1290 asection *s;
85d162e6 1291 flagword flags;
a7519a3c 1292 struct elf_link_hash_entry *h;
252b5132 1293
0ffa91dd
NC
1294 if (! is_alpha_elf (abfd))
1295 return FALSE;
1296
a7519a3c 1297 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1298
85d162e6
AM
1299 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1300 | SEC_LINKER_CREATED
1301 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1302 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1303 elf_hash_table (info)->splt = s;
6ec7057a 1304 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1305 return FALSE;
252b5132 1306
a7519a3c
RH
1307 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1308 .plt section. */
7325306f
RS
1309 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1310 "_PROCEDURE_LINKAGE_TABLE_");
1311 elf_hash_table (info)->hplt = h;
1312 if (h == NULL)
a7519a3c 1313 return FALSE;
d6ad34f6 1314
85d162e6
AM
1315 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1316 | SEC_LINKER_CREATED | SEC_READONLY);
1317 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1318 elf_hash_table (info)->srelplt = s;
6ec7057a 1319 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1320 return FALSE;
252b5132 1321
6ec7057a
RH
1322 if (elf64_alpha_use_secureplt)
1323 {
85d162e6
AM
1324 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1325 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1326 elf_hash_table (info)->sgotplt = s;
6ec7057a
RH
1327 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1328 return FALSE;
1329 }
1330
a7519a3c
RH
1331 /* We may or may not have created a .got section for this object, but
1332 we definitely havn't done the rest of the work. */
1cd6895c 1333
85d162e6
AM
1334 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1335 {
1336 if (!elf64_alpha_create_got_section (abfd, info))
1337 return FALSE;
1338 }
1cd6895c 1339
85d162e6
AM
1340 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1341 | SEC_LINKER_CREATED | SEC_READONLY);
1342 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1343 elf_hash_table (info)->srelgot = s;
a7519a3c
RH
1344 if (s == NULL
1345 || !bfd_set_section_alignment (abfd, s, 3))
1346 return FALSE;
252b5132 1347
a7519a3c
RH
1348 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1349 dynobj's .got section. We don't do this in the linker script
1350 because we don't want to define the symbol if we are not creating
1351 a global offset table. */
d98685ac
AM
1352 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1353 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1354 elf_hash_table (info)->hgot = h;
d98685ac
AM
1355 if (h == NULL)
1356 return FALSE;
252b5132 1357
a7519a3c 1358 return TRUE;
252b5132 1359}
a7519a3c
RH
1360\f
1361/* Read ECOFF debugging information from a .mdebug section into a
1362 ecoff_debug_info structure. */
252b5132 1363
a7519a3c
RH
1364static bfd_boolean
1365elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1366 struct ecoff_debug_info *debug)
252b5132 1367{
a7519a3c
RH
1368 HDRR *symhdr;
1369 const struct ecoff_debug_swap *swap;
1370 char *ext_hdr = NULL;
252b5132 1371
a7519a3c
RH
1372 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1373 memset (debug, 0, sizeof (*debug));
252b5132 1374
a7519a3c
RH
1375 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1376 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1377 goto error_return;
252b5132 1378
a7519a3c
RH
1379 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1380 swap->external_hdr_size))
1381 goto error_return;
252b5132 1382
a7519a3c
RH
1383 symhdr = &debug->symbolic_header;
1384 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1385
a7519a3c
RH
1386 /* The symbolic header contains absolute file offsets and sizes to
1387 read. */
1388#define READ(ptr, offset, count, size, type) \
1389 if (symhdr->count == 0) \
1390 debug->ptr = NULL; \
1391 else \
1392 { \
1393 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1394 debug->ptr = (type) bfd_malloc (amt); \
1395 if (debug->ptr == NULL) \
1396 goto error_return; \
1397 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1398 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1399 goto error_return; \
1400 }
fe8bc63d 1401
a7519a3c 1402 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1403 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1404 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1405 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1406 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1407 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1408 union aux_ext *);
1409 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1410 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1411 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1412 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1413 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1414#undef READ
252b5132 1415
a7519a3c 1416 debug->fdr = NULL;
252b5132 1417
a7519a3c 1418 return TRUE;
252b5132 1419
a7519a3c
RH
1420 error_return:
1421 if (ext_hdr != NULL)
1422 free (ext_hdr);
1423 if (debug->line != NULL)
1424 free (debug->line);
1425 if (debug->external_dnr != NULL)
1426 free (debug->external_dnr);
1427 if (debug->external_pdr != NULL)
1428 free (debug->external_pdr);
1429 if (debug->external_sym != NULL)
1430 free (debug->external_sym);
1431 if (debug->external_opt != NULL)
1432 free (debug->external_opt);
1433 if (debug->external_aux != NULL)
1434 free (debug->external_aux);
1435 if (debug->ss != NULL)
1436 free (debug->ss);
1437 if (debug->ssext != NULL)
1438 free (debug->ssext);
1439 if (debug->external_fdr != NULL)
1440 free (debug->external_fdr);
1441 if (debug->external_rfd != NULL)
1442 free (debug->external_rfd);
1443 if (debug->external_ext != NULL)
1444 free (debug->external_ext);
1445 return FALSE;
252b5132
RH
1446}
1447
a7519a3c
RH
1448/* Alpha ELF local labels start with '$'. */
1449
b34976b6 1450static bfd_boolean
a7519a3c 1451elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1452{
a7519a3c
RH
1453 return name[0] == '$';
1454}
9e756d64 1455
a7519a3c 1456static bfd_boolean
fb167eb2
AM
1457elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1458 asection *section, bfd_vma offset,
1459 const char **filename_ptr,
a7519a3c 1460 const char **functionname_ptr,
fb167eb2
AM
1461 unsigned int *line_ptr,
1462 unsigned int *discriminator_ptr)
a7519a3c
RH
1463{
1464 asection *msec;
252b5132 1465
fb167eb2 1466 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1467 filename_ptr, functionname_ptr,
fb167eb2
AM
1468 line_ptr, discriminator_ptr,
1469 dwarf_debug_sections, 0,
a7519a3c 1470 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1471 return TRUE;
9e756d64 1472
a7519a3c
RH
1473 msec = bfd_get_section_by_name (abfd, ".mdebug");
1474 if (msec != NULL)
1bbc9cec 1475 {
a7519a3c 1476 flagword origflags;
698600e4 1477 struct alpha_elf_find_line *fi;
a7519a3c
RH
1478 const struct ecoff_debug_swap * const swap =
1479 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1480
a7519a3c
RH
1481 /* If we are called during a link, alpha_elf_final_link may have
1482 cleared the SEC_HAS_CONTENTS field. We force it back on here
1483 if appropriate (which it normally will be). */
1484 origflags = msec->flags;
1485 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1486 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1487
698600e4 1488 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1489 if (fi == NULL)
1490 {
1491 bfd_size_type external_fdr_size;
1492 char *fraw_src;
1493 char *fraw_end;
1494 struct fdr *fdr_ptr;
698600e4 1495 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1496
698600e4 1497 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1498 if (fi == NULL)
1499 {
1500 msec->flags = origflags;
1501 return FALSE;
1502 }
9e756d64 1503
a7519a3c
RH
1504 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1505 {
1506 msec->flags = origflags;
1507 return FALSE;
1508 }
9e756d64 1509
a7519a3c
RH
1510 /* Swap in the FDR information. */
1511 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1512 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1513 if (fi->d.fdr == NULL)
1514 {
1515 msec->flags = origflags;
1516 return FALSE;
1517 }
1518 external_fdr_size = swap->external_fdr_size;
1519 fdr_ptr = fi->d.fdr;
1520 fraw_src = (char *) fi->d.external_fdr;
1521 fraw_end = (fraw_src
1522 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1523 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1524 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1525
698600e4 1526 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1527
a7519a3c
RH
1528 /* Note that we don't bother to ever free this information.
1529 find_nearest_line is either called all the time, as in
1530 objdump -l, so the information should be saved, or it is
1531 rarely called, as in ld error messages, so the memory
1532 wasted is unimportant. Still, it would probably be a
1533 good idea for free_cached_info to throw it away. */
1534 }
9e756d64 1535
a7519a3c
RH
1536 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1537 &fi->i, filename_ptr, functionname_ptr,
1538 line_ptr))
1539 {
1540 msec->flags = origflags;
1541 return TRUE;
1542 }
9e756d64 1543
a7519a3c 1544 msec->flags = origflags;
9e756d64 1545 }
9e756d64 1546
a7519a3c 1547 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1548
fb167eb2 1549 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1550 filename_ptr, functionname_ptr,
fb167eb2 1551 line_ptr, discriminator_ptr);
9e756d64 1552}
a7519a3c
RH
1553\f
1554/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1555
a7519a3c 1556struct extsym_info
9e756d64 1557{
a7519a3c
RH
1558 bfd *abfd;
1559 struct bfd_link_info *info;
1560 struct ecoff_debug_info *debug;
1561 const struct ecoff_debug_swap *swap;
1562 bfd_boolean failed;
1563};
9e756d64 1564
a7519a3c 1565static bfd_boolean
2c3fc389 1566elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1567{
1568 struct extsym_info *einfo = (struct extsym_info *) data;
1569 bfd_boolean strip;
1570 asection *sec, *output_section;
9e756d64 1571
a7519a3c
RH
1572 if (h->root.indx == -2)
1573 strip = FALSE;
1574 else if ((h->root.def_dynamic
1575 || h->root.ref_dynamic
1576 || h->root.root.type == bfd_link_hash_new)
1577 && !h->root.def_regular
1578 && !h->root.ref_regular)
1579 strip = TRUE;
1580 else if (einfo->info->strip == strip_all
1581 || (einfo->info->strip == strip_some
1582 && bfd_hash_lookup (einfo->info->keep_hash,
1583 h->root.root.root.string,
1584 FALSE, FALSE) == NULL))
1585 strip = TRUE;
1586 else
1587 strip = FALSE;
9e756d64 1588
a7519a3c 1589 if (strip)
b34976b6 1590 return TRUE;
9e756d64 1591
a7519a3c 1592 if (h->esym.ifd == -2)
9e756d64 1593 {
a7519a3c
RH
1594 h->esym.jmptbl = 0;
1595 h->esym.cobol_main = 0;
1596 h->esym.weakext = 0;
1597 h->esym.reserved = 0;
1598 h->esym.ifd = ifdNil;
1599 h->esym.asym.value = 0;
1600 h->esym.asym.st = stGlobal;
9e756d64 1601
a7519a3c
RH
1602 if (h->root.root.type != bfd_link_hash_defined
1603 && h->root.root.type != bfd_link_hash_defweak)
1604 h->esym.asym.sc = scAbs;
1605 else
1606 {
1607 const char *name;
9e756d64 1608
a7519a3c
RH
1609 sec = h->root.root.u.def.section;
1610 output_section = sec->output_section;
9e756d64 1611
a7519a3c
RH
1612 /* When making a shared library and symbol h is the one from
1613 the another shared library, OUTPUT_SECTION may be null. */
1614 if (output_section == NULL)
1615 h->esym.asym.sc = scUndefined;
1616 else
1617 {
1618 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1619
a7519a3c
RH
1620 if (strcmp (name, ".text") == 0)
1621 h->esym.asym.sc = scText;
1622 else if (strcmp (name, ".data") == 0)
1623 h->esym.asym.sc = scData;
1624 else if (strcmp (name, ".sdata") == 0)
1625 h->esym.asym.sc = scSData;
1626 else if (strcmp (name, ".rodata") == 0
1627 || strcmp (name, ".rdata") == 0)
1628 h->esym.asym.sc = scRData;
1629 else if (strcmp (name, ".bss") == 0)
1630 h->esym.asym.sc = scBss;
1631 else if (strcmp (name, ".sbss") == 0)
1632 h->esym.asym.sc = scSBss;
1633 else if (strcmp (name, ".init") == 0)
1634 h->esym.asym.sc = scInit;
1635 else if (strcmp (name, ".fini") == 0)
1636 h->esym.asym.sc = scFini;
1637 else
1638 h->esym.asym.sc = scAbs;
1639 }
1640 }
9e756d64 1641
a7519a3c
RH
1642 h->esym.asym.reserved = 0;
1643 h->esym.asym.index = indexNil;
1644 }
9e756d64 1645
a7519a3c
RH
1646 if (h->root.root.type == bfd_link_hash_common)
1647 h->esym.asym.value = h->root.root.u.c.size;
1648 else if (h->root.root.type == bfd_link_hash_defined
1649 || h->root.root.type == bfd_link_hash_defweak)
1650 {
1651 if (h->esym.asym.sc == scCommon)
1652 h->esym.asym.sc = scBss;
1653 else if (h->esym.asym.sc == scSCommon)
1654 h->esym.asym.sc = scSBss;
9e756d64 1655
a7519a3c
RH
1656 sec = h->root.root.u.def.section;
1657 output_section = sec->output_section;
1658 if (output_section != NULL)
1659 h->esym.asym.value = (h->root.root.u.def.value
1660 + sec->output_offset
1661 + output_section->vma);
1662 else
1663 h->esym.asym.value = 0;
1664 }
9e756d64 1665
a7519a3c
RH
1666 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1667 h->root.root.root.string,
1668 &h->esym))
1669 {
1670 einfo->failed = TRUE;
1671 return FALSE;
9e756d64
RH
1672 }
1673
a7519a3c
RH
1674 return TRUE;
1675}
1676\f
1677/* Search for and possibly create a got entry. */
9e756d64 1678
a7519a3c
RH
1679static struct alpha_elf_got_entry *
1680get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1681 unsigned long r_type, unsigned long r_symndx,
1682 bfd_vma r_addend)
1683{
1684 struct alpha_elf_got_entry *gotent;
1685 struct alpha_elf_got_entry **slot;
9e756d64 1686
a7519a3c
RH
1687 if (h)
1688 slot = &h->got_entries;
1689 else
1690 {
1691 /* This is a local .got entry -- record for merge. */
9e756d64 1692
a7519a3c 1693 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1694
a7519a3c
RH
1695 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1696 if (!local_got_entries)
1697 {
1698 bfd_size_type size;
1699 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1700
a7519a3c
RH
1701 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1702 size = symtab_hdr->sh_info;
1703 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1704
a7519a3c
RH
1705 local_got_entries
1706 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1707 if (!local_got_entries)
1708 return NULL;
1709
1710 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1711 }
1712
1713 slot = &local_got_entries[r_symndx];
9e756d64
RH
1714 }
1715
a7519a3c
RH
1716 for (gotent = *slot; gotent ; gotent = gotent->next)
1717 if (gotent->gotobj == abfd
1718 && gotent->reloc_type == r_type
1719 && gotent->addend == r_addend)
1720 break;
1721
1722 if (!gotent)
9e756d64 1723 {
a7519a3c
RH
1724 int entry_size;
1725 bfd_size_type amt;
9e756d64 1726
a7519a3c
RH
1727 amt = sizeof (struct alpha_elf_got_entry);
1728 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1729 if (!gotent)
1730 return NULL;
9e756d64 1731
a7519a3c
RH
1732 gotent->gotobj = abfd;
1733 gotent->addend = r_addend;
1734 gotent->got_offset = -1;
6ec7057a 1735 gotent->plt_offset = -1;
a7519a3c
RH
1736 gotent->use_count = 1;
1737 gotent->reloc_type = r_type;
1738 gotent->reloc_done = 0;
1739 gotent->reloc_xlated = 0;
9e756d64 1740
a7519a3c
RH
1741 gotent->next = *slot;
1742 *slot = gotent;
9e756d64 1743
a7519a3c
RH
1744 entry_size = alpha_got_entry_size (r_type);
1745 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1746 if (!h)
1747 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1748 }
a7519a3c
RH
1749 else
1750 gotent->use_count += 1;
9e756d64 1751
a7519a3c 1752 return gotent;
9e756d64
RH
1753}
1754
6ec7057a
RH
1755static bfd_boolean
1756elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1757{
1758 return ((ah->root.type == STT_FUNC
1759 || ah->root.root.type == bfd_link_hash_undefweak
1760 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1761 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1762 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1763}
1764
6fc5bb57
AM
1765/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1766 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1767 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1768 relocs to be sorted. */
1769
1770static bfd_boolean
1771elf64_alpha_sort_relocs_p (asection *sec)
1772{
1773 return (sec->flags & SEC_CODE) == 0;
1774}
1775
1776
a7519a3c
RH
1777/* Handle dynamic relocations when doing an Alpha ELF link. */
1778
b34976b6 1779static bfd_boolean
a7519a3c
RH
1780elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1781 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1782{
a7519a3c
RH
1783 bfd *dynobj;
1784 asection *sreloc;
252b5132 1785 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1786 struct alpha_elf_link_hash_entry **sym_hashes;
1787 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1788 bfd_size_type amt;
252b5132 1789
0e1862bb 1790 if (bfd_link_relocatable (info))
a7519a3c 1791 return TRUE;
252b5132 1792
a7519a3c
RH
1793 /* Don't do anything special with non-loaded, non-alloced sections.
1794 In particular, any relocs in such sections should not affect GOT
1795 and PLT reference counting (ie. we don't allow them to create GOT
1796 or PLT entries), there's no possibility or desire to optimize TLS
1797 relocs, and there's not much point in propagating relocs to shared
1798 libs that the dynamic linker won't relocate. */
1799 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1800 return TRUE;
252b5132 1801
0ffa91dd
NC
1802 BFD_ASSERT (is_alpha_elf (abfd));
1803
1804 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1805 if (dynobj == NULL)
0ffa91dd 1806 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1807
a7519a3c 1808 sreloc = NULL;
0ffa91dd
NC
1809 symtab_hdr = &elf_symtab_hdr (abfd);
1810 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1811
1812 relend = relocs + sec->reloc_count;
1813 for (rel = relocs; rel < relend; ++rel)
1814 {
1815 enum {
1816 NEED_GOT = 1,
1817 NEED_GOT_ENTRY = 2,
1818 NEED_DYNREL = 4
1819 };
1820
1821 unsigned long r_symndx, r_type;
1822 struct alpha_elf_link_hash_entry *h;
1823 unsigned int gotent_flags;
1824 bfd_boolean maybe_dynamic;
1825 unsigned int need;
1826 bfd_vma addend;
1827
1828 r_symndx = ELF64_R_SYM (rel->r_info);
1829 if (r_symndx < symtab_hdr->sh_info)
1830 h = NULL;
1831 else
1832 {
1833 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1834
a7519a3c
RH
1835 while (h->root.root.type == bfd_link_hash_indirect
1836 || h->root.root.type == bfd_link_hash_warning)
1837 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1838
81fbe831
AM
1839 /* PR15323, ref flags aren't set for references in the same
1840 object. */
bc4e12de 1841 h->root.root.non_ir_ref_regular = 1;
a7519a3c
RH
1842 h->root.ref_regular = 1;
1843 }
252b5132 1844
a7519a3c
RH
1845 /* We can only get preliminary data on whether a symbol is
1846 locally or externally defined, as not all of the input files
1847 have yet been processed. Do something with what we know, as
1848 this may help reduce memory usage and processing time later. */
1849 maybe_dynamic = FALSE;
0e1862bb 1850 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1851 && (!info->symbolic
1852 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1853 || !h->root.def_regular
1854 || h->root.root.type == bfd_link_hash_defweak))
1855 maybe_dynamic = TRUE;
252b5132 1856
a7519a3c
RH
1857 need = 0;
1858 gotent_flags = 0;
1859 r_type = ELF64_R_TYPE (rel->r_info);
1860 addend = rel->r_addend;
9e756d64 1861
9e756d64
RH
1862 switch (r_type)
1863 {
1864 case R_ALPHA_LITERAL:
a7519a3c
RH
1865 need = NEED_GOT | NEED_GOT_ENTRY;
1866
1867 /* Remember how this literal is used from its LITUSEs.
1868 This will be important when it comes to decide if we can
1869 create a .plt entry for a function symbol. */
1870 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1871 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1872 gotent_flags |= 1 << rel->r_addend;
1873 --rel;
1874
1875 /* No LITUSEs -- presumably the address is used somehow. */
1876 if (gotent_flags == 0)
1877 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1878 break;
1879
1880 case R_ALPHA_GPDISP:
1881 case R_ALPHA_GPREL16:
1882 case R_ALPHA_GPREL32:
9e756d64
RH
1883 case R_ALPHA_GPRELHIGH:
1884 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1885 case R_ALPHA_BRSGP:
1886 need = NEED_GOT;
1887 break;
1888
1889 case R_ALPHA_REFLONG:
1890 case R_ALPHA_REFQUAD:
0e1862bb 1891 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1892 need = NEED_DYNREL;
cc03ec80
RH
1893 break;
1894
9e756d64 1895 case R_ALPHA_TLSLDM:
cc03ec80 1896 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1897 reloc to the STN_UNDEF (0) symbol so that they all match. */
1898 r_symndx = STN_UNDEF;
a7519a3c
RH
1899 h = 0;
1900 maybe_dynamic = FALSE;
1901 /* FALLTHRU */
1902
1903 case R_ALPHA_TLSGD:
1904 case R_ALPHA_GOTDTPREL:
1905 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1906 break;
cc03ec80 1907
a7519a3c
RH
1908 case R_ALPHA_GOTTPREL:
1909 need = NEED_GOT | NEED_GOT_ENTRY;
1910 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1911 if (bfd_link_pic (info))
a7519a3c
RH
1912 info->flags |= DF_STATIC_TLS;
1913 break;
1914
1915 case R_ALPHA_TPREL64:
3cbc1e5e 1916 if (bfd_link_dll (info))
e366eeae
RH
1917 {
1918 info->flags |= DF_STATIC_TLS;
1919 need = NEED_DYNREL;
1920 }
1921 else if (maybe_dynamic)
a7519a3c 1922 need = NEED_DYNREL;
a7519a3c 1923 break;
252b5132
RH
1924 }
1925
a7519a3c 1926 if (need & NEED_GOT)
252b5132 1927 {
85d162e6 1928 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1929 {
a7519a3c
RH
1930 if (!elf64_alpha_create_got_section (abfd, info))
1931 return FALSE;
c328dc3f 1932 }
252b5132 1933 }
252b5132 1934
a7519a3c
RH
1935 if (need & NEED_GOT_ENTRY)
1936 {
1937 struct alpha_elf_got_entry *gotent;
252b5132 1938
a7519a3c
RH
1939 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1940 if (!gotent)
1941 return FALSE;
4a67a098 1942
a7519a3c 1943 if (gotent_flags)
cc03ec80 1944 {
a7519a3c
RH
1945 gotent->flags |= gotent_flags;
1946 if (h)
1947 {
1948 gotent_flags |= h->flags;
1949 h->flags = gotent_flags;
4a67a098 1950
a7519a3c 1951 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1952 /* ??? It appears that we won't make it into
1953 adjust_dynamic_symbol for symbols that remain
1954 totally undefined. Copying this check here means
1955 we can create a plt entry for them too. */
1956 h->root.needs_plt
1957 = (maybe_dynamic && elf64_alpha_want_plt (h));
1958 }
a7519a3c 1959 }
252b5132
RH
1960 }
1961
a7519a3c 1962 if (need & NEED_DYNREL)
9e756d64 1963 {
a7519a3c
RH
1964 /* We need to create the section here now whether we eventually
1965 use it or not so that it gets mapped to an output section by
83bac4b0 1966 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1967 if (sreloc == NULL)
9e756d64 1968 {
83bac4b0
NC
1969 sreloc = _bfd_elf_make_dynamic_reloc_section
1970 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1971
a7519a3c 1972 if (sreloc == NULL)
83bac4b0 1973 return FALSE;
9e756d64 1974 }
252b5132 1975
a7519a3c
RH
1976 if (h)
1977 {
1978 /* Since we havn't seen all of the input symbols yet, we
1979 don't know whether we'll actually need a dynamic relocation
1980 entry for this reloc. So make a record of it. Once we
1981 find out if this thing needs dynamic relocation we'll
1982 expand the relocation sections by the appropriate amount. */
9e756d64 1983
a7519a3c 1984 struct alpha_elf_reloc_entry *rent;
9e756d64 1985
a7519a3c
RH
1986 for (rent = h->reloc_entries; rent; rent = rent->next)
1987 if (rent->rtype == r_type && rent->srel == sreloc)
1988 break;
252b5132 1989
a7519a3c
RH
1990 if (!rent)
1991 {
1992 amt = sizeof (struct alpha_elf_reloc_entry);
1993 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1994 if (!rent)
1995 return FALSE;
252b5132 1996
a7519a3c
RH
1997 rent->srel = sreloc;
1998 rent->rtype = r_type;
1999 rent->count = 1;
2000 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 2001
a7519a3c
RH
2002 rent->next = h->reloc_entries;
2003 h->reloc_entries = rent;
2004 }
2005 else
2006 rent->count++;
2007 }
0e1862bb 2008 else if (bfd_link_pic (info))
a7519a3c
RH
2009 {
2010 /* If this is a shared library, and the section is to be
2011 loaded into memory, we need a RELATIVE reloc. */
2012 sreloc->size += sizeof (Elf64_External_Rela);
2013 if (sec->flags & SEC_READONLY)
2014 info->flags |= DF_TEXTREL;
2015 }
252b5132
RH
2016 }
2017 }
2018
b34976b6 2019 return TRUE;
252b5132 2020}
252b5132 2021
e117360e
RH
2022/* Return the section that should be marked against GC for a given
2023 relocation. */
2024
2025static asection *
2026elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2027 Elf_Internal_Rela *rel,
2028 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2029{
2030 /* These relocations don't really reference a symbol. Instead we store
2031 extra data in their addend slot. Ignore the symbol. */
2032 switch (ELF64_R_TYPE (rel->r_info))
2033 {
2034 case R_ALPHA_LITUSE:
2035 case R_ALPHA_GPDISP:
2036 case R_ALPHA_HINT:
2037 return NULL;
2038 }
2039
2040 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2041}
2042
2043/* Update the got entry reference counts for the section being removed. */
2044
2045static bfd_boolean
2046elf64_alpha_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
2047 asection *sec, const Elf_Internal_Rela *relocs)
2048{
2049 Elf_Internal_Shdr *symtab_hdr;
2050 struct alpha_elf_link_hash_entry **sym_hashes;
2051 const Elf_Internal_Rela *rel, *relend;
2052
0e1862bb 2053 if (bfd_link_relocatable (info))
e117360e
RH
2054 return TRUE;
2055
2056 symtab_hdr = &elf_symtab_hdr (abfd);
2057 sym_hashes = alpha_elf_sym_hashes (abfd);
2058
2059 relend = relocs + sec->reloc_count;
2060 for (rel = relocs; rel < relend; rel++)
2061 {
2062 unsigned long r_symndx, r_type;
2063 struct alpha_elf_link_hash_entry *h = NULL;
2064 struct alpha_elf_got_entry *gotent;
2065
2066 r_symndx = ELF64_R_SYM (rel->r_info);
2067 if (r_symndx >= symtab_hdr->sh_info)
2068 {
2069 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2070 while (h->root.root.type == bfd_link_hash_indirect
2071 || h->root.root.type == bfd_link_hash_warning)
2072 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
2073 }
2074
2075 r_type = ELF64_R_TYPE (rel->r_info);
2076 switch (r_type)
2077 {
2078 case R_ALPHA_LITERAL:
2079 /* ??? Ignore re-computation of gotent_flags. We're not
2080 carrying a use-count for each bit in that mask. */
2081
2082 case R_ALPHA_TLSGD:
2083 case R_ALPHA_GOTDTPREL:
2084 case R_ALPHA_GOTTPREL:
2085 /* Fetch the got entry from the tables. */
2086 gotent = get_got_entry (abfd, h, r_type, r_symndx, rel->r_addend);
2087
2088 /* The got entry *must* exist, since we should have created it
2089 before during check_relocs. Also note that get_got_entry
2090 assumed this was going to be another use, and so incremented
2091 the use count again. Thus the use count must be at least the
2092 one real use and the "use" we just added. */
2093 if (gotent == NULL || gotent->use_count < 2)
2094 {
2095 abort ();
2096 return FALSE;
2097 }
2098 gotent->use_count -= 2;
2099 break;
2100
2101 default:
2102 break;
2103 }
2104 }
2105
2106 return TRUE;
2107}
2108
a7519a3c
RH
2109/* Adjust a symbol defined by a dynamic object and referenced by a
2110 regular object. The current definition is in some section of the
2111 dynamic object, but we're not including those sections. We have to
2112 change the definition to something the rest of the link can
2113 understand. */
252b5132 2114
b34976b6 2115static bfd_boolean
a7519a3c
RH
2116elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2117 struct elf_link_hash_entry *h)
252b5132 2118{
a7519a3c
RH
2119 bfd *dynobj;
2120 asection *s;
2121 struct alpha_elf_link_hash_entry *ah;
252b5132 2122
a7519a3c
RH
2123 dynobj = elf_hash_table(info)->dynobj;
2124 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2125
a7519a3c 2126 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2127 about whether this symbol should get a .plt entry. Irritatingly, it
2128 is common for folk to leave undefined symbols in shared libraries,
2129 and they still expect lazy binding; accept undefined symbols in lieu
2130 of STT_FUNC. */
2131 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2132 {
6ec7057a 2133 h->needs_plt = TRUE;
252b5132 2134
ce558b89 2135 s = elf_hash_table(info)->splt;
a7519a3c
RH
2136 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2137 return FALSE;
204692d7 2138
6ec7057a
RH
2139 /* We need one plt entry per got subsection. Delay allocation of
2140 the actual plt entries until size_plt_section, called from
2141 size_dynamic_sections or during relaxation. */
252b5132 2142
a7519a3c
RH
2143 return TRUE;
2144 }
2145 else
6ec7057a 2146 h->needs_plt = FALSE;
252b5132 2147
a7519a3c
RH
2148 /* If this is a weak symbol, and there is a real definition, the
2149 processor independent code will have arranged for us to see the
2150 real definition first, and we can just use the same value. */
2151 if (h->u.weakdef != NULL)
252b5132 2152 {
a7519a3c
RH
2153 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2154 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2155 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2156 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2157 return TRUE;
252b5132 2158 }
a7519a3c
RH
2159
2160 /* This is a reference to a symbol defined by a dynamic object which
2161 is not a function. The Alpha, since it uses .got entries for all
2162 symbols even in regular objects, does not need the hackery of a
2163 .dynbss section and COPY dynamic relocations. */
252b5132 2164
b34976b6 2165 return TRUE;
252b5132
RH
2166}
2167
747ffa7b
AM
2168/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2169
2170static void
2171elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2172 const Elf_Internal_Sym *isym,
2173 bfd_boolean definition,
2174 bfd_boolean dynamic)
2175{
2176 if (!dynamic && definition)
2177 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2178 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2179}
2180
a7519a3c
RH
2181/* Symbol versioning can create new symbols, and make our old symbols
2182 indirect to the new ones. Consolidate the got and reloc information
2183 in these situations. */
252b5132 2184
48f4b4f5
RH
2185static void
2186elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2187 struct elf_link_hash_entry *dir,
2188 struct elf_link_hash_entry *ind)
252b5132 2189{
48f4b4f5
RH
2190 struct alpha_elf_link_hash_entry *hi
2191 = (struct alpha_elf_link_hash_entry *) ind;
2192 struct alpha_elf_link_hash_entry *hs
2193 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2194
48f4b4f5
RH
2195 /* Do the merging in the superclass. */
2196 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2197
a7519a3c 2198 /* Merge the flags. Whee. */
a7519a3c
RH
2199 hs->flags |= hi->flags;
2200
48f4b4f5
RH
2201 /* ??? It's unclear to me what's really supposed to happen when
2202 "merging" defweak and defined symbols, given that we don't
2203 actually throw away the defweak. This more-or-less copies
2204 the logic related to got and plt entries in the superclass. */
2205 if (ind->root.type != bfd_link_hash_indirect)
2206 return;
2207
a7519a3c
RH
2208 /* Merge the .got entries. Cannibalize the old symbol's list in
2209 doing so, since we don't need it anymore. */
2210
2211 if (hs->got_entries == NULL)
2212 hs->got_entries = hi->got_entries;
2213 else
2214 {
2215 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2216
2217 gsh = hs->got_entries;
2218 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2219 {
a7519a3c
RH
2220 gin = gi->next;
2221 for (gs = gsh; gs ; gs = gs->next)
2222 if (gi->gotobj == gs->gotobj
2223 && gi->reloc_type == gs->reloc_type
2224 && gi->addend == gs->addend)
2225 {
68994ca2 2226 gs->use_count += gi->use_count;
a7519a3c
RH
2227 goto got_found;
2228 }
2229 gi->next = hs->got_entries;
2230 hs->got_entries = gi;
2231 got_found:;
252b5132 2232 }
a7519a3c
RH
2233 }
2234 hi->got_entries = NULL;
252b5132 2235
a7519a3c
RH
2236 /* And similar for the reloc entries. */
2237
2238 if (hs->reloc_entries == NULL)
2239 hs->reloc_entries = hi->reloc_entries;
2240 else
2241 {
2242 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2243
2244 rsh = hs->reloc_entries;
2245 for (ri = hi->reloc_entries; ri ; ri = rin)
2246 {
2247 rin = ri->next;
2248 for (rs = rsh; rs ; rs = rs->next)
2249 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2250 {
2251 rs->count += ri->count;
2252 goto found_reloc;
2253 }
2254 ri->next = hs->reloc_entries;
2255 hs->reloc_entries = ri;
2256 found_reloc:;
2257 }
252b5132 2258 }
a7519a3c 2259 hi->reloc_entries = NULL;
252b5132
RH
2260}
2261
a7519a3c 2262/* Is it possible to merge two object file's .got tables? */
252b5132 2263
b34976b6 2264static bfd_boolean
a7519a3c 2265elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2266{
a7519a3c
RH
2267 int total = alpha_elf_tdata (a)->total_got_size;
2268 bfd *bsub;
252b5132 2269
a7519a3c
RH
2270 /* Trivial quick fallout test. */
2271 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2272 return TRUE;
252b5132 2273
a7519a3c
RH
2274 /* By their nature, local .got entries cannot be merged. */
2275 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2276 return FALSE;
252b5132 2277
a7519a3c
RH
2278 /* Failing the common trivial comparison, we must effectively
2279 perform the merge. Not actually performing the merge means that
2280 we don't have to store undo information in case we fail. */
2281 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2282 {
2283 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2284 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2285 int i, n;
2286
2287 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2288 for (i = 0; i < n; ++i)
2289 {
2290 struct alpha_elf_got_entry *ae, *be;
2291 struct alpha_elf_link_hash_entry *h;
2292
2293 h = hashes[i];
2294 while (h->root.root.type == bfd_link_hash_indirect
2295 || h->root.root.type == bfd_link_hash_warning)
2296 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2297
2298 for (be = h->got_entries; be ; be = be->next)
2299 {
2300 if (be->use_count == 0)
2301 continue;
2302 if (be->gotobj != b)
2303 continue;
2304
2305 for (ae = h->got_entries; ae ; ae = ae->next)
2306 if (ae->gotobj == a
2307 && ae->reloc_type == be->reloc_type
2308 && ae->addend == be->addend)
2309 goto global_found;
2310
2311 total += alpha_got_entry_size (be->reloc_type);
2312 if (total > MAX_GOT_SIZE)
2313 return FALSE;
2314 global_found:;
2315 }
2316 }
2317 }
252b5132 2318
b34976b6 2319 return TRUE;
252b5132
RH
2320}
2321
a7519a3c 2322/* Actually merge two .got tables. */
252b5132 2323
a7519a3c
RH
2324static void
2325elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2326{
a7519a3c
RH
2327 int total = alpha_elf_tdata (a)->total_got_size;
2328 bfd *bsub;
252b5132 2329
a7519a3c
RH
2330 /* Remember local expansion. */
2331 {
2332 int e = alpha_elf_tdata (b)->local_got_size;
2333 total += e;
2334 alpha_elf_tdata (a)->local_got_size += e;
2335 }
252b5132 2336
a7519a3c
RH
2337 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2338 {
2339 struct alpha_elf_got_entry **local_got_entries;
2340 struct alpha_elf_link_hash_entry **hashes;
2341 Elf_Internal_Shdr *symtab_hdr;
2342 int i, n;
252b5132 2343
a7519a3c
RH
2344 /* Let the local .got entries know they are part of a new subsegment. */
2345 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2346 if (local_got_entries)
2347 {
2348 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2349 for (i = 0; i < n; ++i)
2350 {
2351 struct alpha_elf_got_entry *ent;
2352 for (ent = local_got_entries[i]; ent; ent = ent->next)
2353 ent->gotobj = a;
2354 }
2355 }
252b5132 2356
a7519a3c
RH
2357 /* Merge the global .got entries. */
2358 hashes = alpha_elf_sym_hashes (bsub);
2359 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2360
a7519a3c
RH
2361 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2362 for (i = 0; i < n; ++i)
2363 {
2364 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2365 struct alpha_elf_link_hash_entry *h;
252b5132 2366
a7519a3c
RH
2367 h = hashes[i];
2368 while (h->root.root.type == bfd_link_hash_indirect
2369 || h->root.root.type == bfd_link_hash_warning)
2370 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2371
a7519a3c
RH
2372 pbe = start = &h->got_entries;
2373 while ((be = *pbe) != NULL)
2374 {
2375 if (be->use_count == 0)
2376 {
2377 *pbe = be->next;
2378 memset (be, 0xa5, sizeof (*be));
2379 goto kill;
2380 }
2381 if (be->gotobj != b)
2382 goto next;
2383
2384 for (ae = *start; ae ; ae = ae->next)
2385 if (ae->gotobj == a
2386 && ae->reloc_type == be->reloc_type
2387 && ae->addend == be->addend)
2388 {
2389 ae->flags |= be->flags;
2390 ae->use_count += be->use_count;
2391 *pbe = be->next;
2392 memset (be, 0xa5, sizeof (*be));
2393 goto kill;
2394 }
2395 be->gotobj = a;
2396 total += alpha_got_entry_size (be->reloc_type);
252b5132 2397
a7519a3c
RH
2398 next:;
2399 pbe = &be->next;
2400 kill:;
2401 }
2402 }
252b5132 2403
a7519a3c
RH
2404 alpha_elf_tdata (bsub)->gotobj = a;
2405 }
2406 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2407
a7519a3c
RH
2408 /* Merge the two in_got chains. */
2409 {
2410 bfd *next;
252b5132 2411
a7519a3c
RH
2412 bsub = a;
2413 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2414 bsub = next;
252b5132 2415
a7519a3c
RH
2416 alpha_elf_tdata (bsub)->in_got_link_next = b;
2417 }
252b5132 2418}
a7519a3c
RH
2419
2420/* Calculate the offsets for the got entries. */
252b5132 2421
b34976b6 2422static bfd_boolean
a7519a3c 2423elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2424 void * arg ATTRIBUTE_UNUSED)
252b5132 2425{
a7519a3c 2426 struct alpha_elf_got_entry *gotent;
252b5132 2427
a7519a3c
RH
2428 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2429 if (gotent->use_count > 0)
2430 {
2431 struct alpha_elf_obj_tdata *td;
2432 bfd_size_type *plge;
252b5132 2433
a7519a3c 2434 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2435 plge = &td->got->size;
2436 gotent->got_offset = *plge;
2437 *plge += alpha_got_entry_size (gotent->reloc_type);
2438 }
252b5132 2439
6ec7057a 2440 return TRUE;
a7519a3c 2441}
252b5132 2442
a7519a3c
RH
2443static void
2444elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2445{
4dfe6ac6
NC
2446 bfd *i, *got_list;
2447 struct alpha_elf_link_hash_table * htab;
2448
2449 htab = alpha_elf_hash_table (info);
2450 if (htab == NULL)
2451 return;
2452 got_list = htab->got_list;
252b5132 2453
a7519a3c
RH
2454 /* First, zero out the .got sizes, as we may be recalculating the
2455 .got after optimizing it. */
2456 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2457 alpha_elf_tdata(i)->got->size = 0;
252b5132 2458
a7519a3c 2459 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2460 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2461 elf64_alpha_calc_got_offsets_for_symbol,
2462 NULL);
252b5132 2463
a7519a3c
RH
2464 /* Finally, fill in the offsets for the local entries. */
2465 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2466 {
2467 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2468 bfd *j;
252b5132 2469
a7519a3c
RH
2470 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2471 {
2472 struct alpha_elf_got_entry **local_got_entries, *gotent;
2473 int k, n;
252b5132 2474
a7519a3c
RH
2475 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2476 if (!local_got_entries)
2477 continue;
252b5132 2478
a7519a3c
RH
2479 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2480 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2481 if (gotent->use_count > 0)
2482 {
2483 gotent->got_offset = got_offset;
2484 got_offset += alpha_got_entry_size (gotent->reloc_type);
2485 }
2486 }
252b5132 2487
a7519a3c
RH
2488 alpha_elf_tdata(i)->got->size = got_offset;
2489 }
2490}
252b5132 2491
a7519a3c 2492/* Constructs the gots. */
252b5132 2493
b34976b6 2494static bfd_boolean
d1c109de
RH
2495elf64_alpha_size_got_sections (struct bfd_link_info *info,
2496 bfd_boolean may_merge)
252b5132 2497{
a7519a3c 2498 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2499 struct alpha_elf_link_hash_table * htab;
252b5132 2500
4dfe6ac6
NC
2501 htab = alpha_elf_hash_table (info);
2502 if (htab == NULL)
2503 return FALSE;
2504 got_list = htab->got_list;
95404643 2505
a7519a3c
RH
2506 /* On the first time through, pretend we have an existing got list
2507 consisting of all of the input files. */
2508 if (got_list == NULL)
252b5132 2509 {
c72f2fb2 2510 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2511 {
0ffa91dd
NC
2512 bfd *this_got;
2513
2514 if (! is_alpha_elf (i))
2515 continue;
2516
2517 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2518 if (this_got == NULL)
2519 continue;
252b5132 2520
a7519a3c
RH
2521 /* We are assuming no merging has yet occurred. */
2522 BFD_ASSERT (this_got == i);
252b5132 2523
a7519a3c 2524 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2525 {
a7519a3c 2526 /* Yikes! A single object file has too many entries. */
4eca0228 2527 _bfd_error_handler
695344c0 2528 /* xgettext:c-format */
a7519a3c
RH
2529 (_("%B: .got subsegment exceeds 64K (size %d)"),
2530 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2531 return FALSE;
252b5132 2532 }
252b5132 2533
a7519a3c
RH
2534 if (got_list == NULL)
2535 got_list = this_got;
2536 else
2537 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2538 cur_got_obj = this_got;
252b5132
RH
2539 }
2540
a7519a3c
RH
2541 /* Strange degenerate case of no got references. */
2542 if (got_list == NULL)
2543 return TRUE;
2544
4dfe6ac6 2545 htab->got_list = got_list;
a7519a3c
RH
2546 }
2547
2548 cur_got_obj = got_list;
0ffa91dd
NC
2549 if (cur_got_obj == NULL)
2550 return FALSE;
2551
d1c109de 2552 if (may_merge)
a7519a3c 2553 {
d1c109de
RH
2554 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2555 while (i != NULL)
252b5132 2556 {
d1c109de
RH
2557 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2558 {
2559 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2560
d1c109de
RH
2561 alpha_elf_tdata(i)->got->size = 0;
2562 i = alpha_elf_tdata(i)->got_link_next;
2563 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2564 }
2565 else
2566 {
2567 cur_got_obj = i;
2568 i = alpha_elf_tdata(i)->got_link_next;
2569 }
a7519a3c 2570 }
252b5132
RH
2571 }
2572
a7519a3c
RH
2573 /* Once the gots have been merged, fill in the got offsets for
2574 everything therein. */
4a828aab 2575 elf64_alpha_calc_got_offsets (info);
252b5132 2576
a7519a3c 2577 return TRUE;
252b5132 2578}
252b5132 2579
b34976b6 2580static bfd_boolean
2c3fc389
NC
2581elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2582 void * data)
252b5132 2583{
a7519a3c
RH
2584 asection *splt = (asection *) data;
2585 struct alpha_elf_got_entry *gotent;
6ec7057a 2586 bfd_boolean saw_one = FALSE;
252b5132 2587
a7519a3c
RH
2588 /* If we didn't need an entry before, we still don't. */
2589 if (!h->root.needs_plt)
2590 return TRUE;
e92d460e 2591
6ec7057a 2592 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2593 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2594 if (gotent->reloc_type == R_ALPHA_LITERAL
2595 && gotent->use_count > 0)
6ec7057a
RH
2596 {
2597 if (splt->size == 0)
2598 splt->size = PLT_HEADER_SIZE;
2599 gotent->plt_offset = splt->size;
2600 splt->size += PLT_ENTRY_SIZE;
2601 saw_one = TRUE;
2602 }
a7519a3c 2603
6ec7057a
RH
2604 /* If there weren't any, there's no longer a need for the PLT entry. */
2605 if (!saw_one)
2606 h->root.needs_plt = FALSE;
a7519a3c
RH
2607
2608 return TRUE;
2609}
2610
4a828aab
RH
2611/* Called from relax_section to rebuild the PLT in light of potential changes
2612 in the function's status. */
a7519a3c 2613
4a828aab 2614static void
a7519a3c
RH
2615elf64_alpha_size_plt_section (struct bfd_link_info *info)
2616{
6ec7057a 2617 asection *splt, *spltrel, *sgotplt;
a7519a3c 2618 unsigned long entries;
4dfe6ac6
NC
2619 struct alpha_elf_link_hash_table * htab;
2620
2621 htab = alpha_elf_hash_table (info);
2622 if (htab == NULL)
2623 return;
a7519a3c 2624
ce558b89 2625 splt = elf_hash_table(info)->splt;
a7519a3c 2626 if (splt == NULL)
4a828aab 2627 return;
252b5132 2628
a7519a3c 2629 splt->size = 0;
252b5132 2630
4dfe6ac6 2631 alpha_elf_link_hash_traverse (htab,
a7519a3c 2632 elf64_alpha_size_plt_section_1, splt);
e92d460e 2633
a7519a3c 2634 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2635 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2636 entries = 0;
a7519a3c 2637 if (splt->size)
6ec7057a
RH
2638 {
2639 if (elf64_alpha_use_secureplt)
2640 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2641 else
2642 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2643 }
a7519a3c 2644 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2645
6ec7057a
RH
2646 /* When using the secureplt, we need two words somewhere in the data
2647 segment for the dynamic linker to tell us where to go. This is the
2648 entire contents of the .got.plt section. */
2649 if (elf64_alpha_use_secureplt)
2650 {
ce558b89 2651 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2652 sgotplt->size = entries ? 16 : 0;
2653 }
a7519a3c 2654}
e92d460e 2655
a7519a3c
RH
2656static bfd_boolean
2657elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2658 struct bfd_link_info *info)
2659{
2660 bfd *i;
4dfe6ac6 2661 struct alpha_elf_link_hash_table * htab;
252b5132 2662
0e1862bb 2663 if (bfd_link_relocatable (info))
a7519a3c 2664 return TRUE;
252b5132 2665
4dfe6ac6
NC
2666 htab = alpha_elf_hash_table (info);
2667 if (htab == NULL)
2668 return FALSE;
2669
d1c109de 2670 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2671 return FALSE;
252b5132 2672
a7519a3c 2673 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2674 i = htab->got_list;
a7519a3c 2675 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2676 {
a7519a3c
RH
2677 asection *s = alpha_elf_tdata(i)->got;
2678 if (s->size > 0)
2679 {
2680 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2681 if (s->contents == NULL)
2682 return FALSE;
2683 }
252b5132
RH
2684 }
2685
b34976b6 2686 return TRUE;
252b5132 2687}
3765b1be 2688
a7519a3c 2689/* The number of dynamic relocations required by a static relocation. */
3765b1be 2690
a7519a3c 2691static int
e366eeae 2692alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2693{
2694 switch (r_type)
3765b1be 2695 {
a7519a3c
RH
2696 /* May appear in GOT entries. */
2697 case R_ALPHA_TLSGD:
2698 return (dynamic ? 2 : shared ? 1 : 0);
2699 case R_ALPHA_TLSLDM:
2700 return shared;
2701 case R_ALPHA_LITERAL:
a7519a3c 2702 return dynamic || shared;
e366eeae
RH
2703 case R_ALPHA_GOTTPREL:
2704 return dynamic || (shared && !pie);
a7519a3c
RH
2705 case R_ALPHA_GOTDTPREL:
2706 return dynamic;
3765b1be 2707
a7519a3c
RH
2708 /* May appear in data sections. */
2709 case R_ALPHA_REFLONG:
2710 case R_ALPHA_REFQUAD:
a7519a3c 2711 return dynamic || shared;
e366eeae
RH
2712 case R_ALPHA_TPREL64:
2713 return dynamic || (shared && !pie);
3765b1be 2714
a7519a3c
RH
2715 /* Everything else is illegal. We'll issue an error during
2716 relocate_section. */
2717 default:
2718 return 0;
2719 }
2720}
3765b1be 2721
a7519a3c 2722/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2723
a7519a3c
RH
2724static bfd_boolean
2725elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2726 struct bfd_link_info *info)
2727{
2728 bfd_boolean dynamic;
2729 struct alpha_elf_reloc_entry *relent;
2730 unsigned long entries;
3765b1be 2731
a7519a3c
RH
2732 /* If the symbol was defined as a common symbol in a regular object
2733 file, and there was no definition in any dynamic object, then the
2734 linker will have allocated space for the symbol in a common
2735 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2736 set. This is done for dynamic symbols in
2737 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2738 symbols, somehow. */
2739 if (!h->root.def_regular
2740 && h->root.ref_regular
2741 && !h->root.def_dynamic
2742 && (h->root.root.type == bfd_link_hash_defined
2743 || h->root.root.type == bfd_link_hash_defweak)
2744 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2745 h->root.def_regular = 1;
3765b1be 2746
a7519a3c
RH
2747 /* If the symbol is dynamic, we'll need all the relocations in their
2748 natural form. If this is a shared object, and it has been forced
2749 local, we'll need the same number of RELATIVE relocations. */
2750 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2751
a7519a3c
RH
2752 /* If the symbol is a hidden undefined weak, then we never have any
2753 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2754 based on bfd_link_pic (info). */
a7519a3c
RH
2755 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2756 return TRUE;
2757
2758 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2759 {
a7519a3c 2760 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2761 bfd_link_pic (info),
2762 bfd_link_pie (info));
a7519a3c
RH
2763 if (entries)
2764 {
2765 relent->srel->size +=
2766 entries * sizeof (Elf64_External_Rela) * relent->count;
2767 if (relent->reltext)
2768 info->flags |= DT_TEXTREL;
2769 }
2770 }
3765b1be 2771
a7519a3c
RH
2772 return TRUE;
2773}
3765b1be 2774
a7519a3c
RH
2775/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2776 global symbols. */
3765b1be 2777
a7519a3c
RH
2778static bfd_boolean
2779elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2780 struct bfd_link_info *info)
2781{
2782 bfd_boolean dynamic;
2783 struct alpha_elf_got_entry *gotent;
2784 unsigned long entries;
3765b1be 2785
6ec7057a
RH
2786 /* If we're using a plt for this symbol, then all of its relocations
2787 for its got entries go into .rela.plt. */
2788 if (h->root.needs_plt)
2789 return TRUE;
2790
a7519a3c
RH
2791 /* If the symbol is dynamic, we'll need all the relocations in their
2792 natural form. If this is a shared object, and it has been forced
2793 local, we'll need the same number of RELATIVE relocations. */
2794 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2795
2796 /* If the symbol is a hidden undefined weak, then we never have any
2797 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2798 based on bfd_link_pic (info). */
a7519a3c
RH
2799 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2800 return TRUE;
2801
2802 entries = 0;
2803 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2804 if (gotent->use_count > 0)
e366eeae 2805 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2806 bfd_link_pic (info),
2807 bfd_link_pie (info));
a7519a3c 2808
a7519a3c
RH
2809 if (entries > 0)
2810 {
ce558b89 2811 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2812 BFD_ASSERT (srel != NULL);
2813 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2814 }
3765b1be 2815
a7519a3c 2816 return TRUE;
3765b1be
RH
2817}
2818
a7519a3c 2819/* Set the sizes of the dynamic relocation sections. */
252b5132 2820
4a828aab 2821static void
a7519a3c 2822elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2823{
a7519a3c 2824 unsigned long entries;
ce558b89 2825 bfd *i;
a7519a3c 2826 asection *srel;
4dfe6ac6
NC
2827 struct alpha_elf_link_hash_table * htab;
2828
2829 htab = alpha_elf_hash_table (info);
2830 if (htab == NULL)
2831 return;
252b5132 2832
a7519a3c
RH
2833 /* Shared libraries often require RELATIVE relocs, and some relocs
2834 require attention for the main application as well. */
252b5132 2835
a7519a3c 2836 entries = 0;
4dfe6ac6 2837 for (i = htab->got_list;
a7519a3c
RH
2838 i ; i = alpha_elf_tdata(i)->got_link_next)
2839 {
2840 bfd *j;
3241278a 2841
a7519a3c
RH
2842 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2843 {
2844 struct alpha_elf_got_entry **local_got_entries, *gotent;
2845 int k, n;
252b5132 2846
a7519a3c
RH
2847 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2848 if (!local_got_entries)
2849 continue;
252b5132 2850
a7519a3c
RH
2851 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2852 for (gotent = local_got_entries[k];
2853 gotent ; gotent = gotent->next)
2854 if (gotent->use_count > 0)
2855 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2856 (gotent->reloc_type, 0, bfd_link_pic (info),
2857 bfd_link_pie (info)));
a7519a3c
RH
2858 }
2859 }
3765b1be 2860
ce558b89 2861 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2862 if (!srel)
2863 {
2864 BFD_ASSERT (entries == 0);
4a828aab 2865 return;
a7519a3c
RH
2866 }
2867 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2868
a7519a3c 2869 /* Now do the non-local symbols. */
4dfe6ac6 2870 alpha_elf_link_hash_traverse (htab,
a7519a3c 2871 elf64_alpha_size_rela_got_1, info);
a7519a3c 2872}
252b5132 2873
a7519a3c 2874/* Set the sizes of the dynamic sections. */
3765b1be 2875
a7519a3c
RH
2876static bfd_boolean
2877elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2878 struct bfd_link_info *info)
2879{
2880 bfd *dynobj;
2881 asection *s;
24f1a751 2882 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2883 struct alpha_elf_link_hash_table * htab;
2884
2885 htab = alpha_elf_hash_table (info);
2886 if (htab == NULL)
2887 return FALSE;
3765b1be 2888
a7519a3c
RH
2889 dynobj = elf_hash_table(info)->dynobj;
2890 BFD_ASSERT(dynobj != NULL);
252b5132 2891
a7519a3c
RH
2892 if (elf_hash_table (info)->dynamic_sections_created)
2893 {
2894 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2895 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2896 {
3d4d4302 2897 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2898 BFD_ASSERT (s != NULL);
2899 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2900 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2901 }
3765b1be 2902
a7519a3c
RH
2903 /* Now that we've seen all of the input files, we can decide which
2904 symbols need dynamic relocation entries and which don't. We've
2905 collected information in check_relocs that we can now apply to
2906 size the dynamic relocation sections. */
4dfe6ac6 2907 alpha_elf_link_hash_traverse (htab,
a7519a3c 2908 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2909
a7519a3c 2910 elf64_alpha_size_rela_got_section (info);
6ec7057a 2911 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2912 }
2913 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2914
a7519a3c
RH
2915 /* The check_relocs and adjust_dynamic_symbol entry points have
2916 determined the sizes of the various dynamic sections. Allocate
2917 memory for them. */
2918 relplt = FALSE;
24f1a751 2919 relocs = FALSE;
a7519a3c
RH
2920 for (s = dynobj->sections; s != NULL; s = s->next)
2921 {
2922 const char *name;
3765b1be 2923
a7519a3c
RH
2924 if (!(s->flags & SEC_LINKER_CREATED))
2925 continue;
cc03ec80 2926
a7519a3c
RH
2927 /* It's OK to base decisions on the section name, because none
2928 of the dynobj section names depend upon the input files. */
2929 name = bfd_get_section_name (dynobj, s);
3765b1be 2930
0112cd26 2931 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2932 {
c456f082 2933 if (s->size != 0)
a7519a3c 2934 {
c456f082 2935 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2936 relplt = TRUE;
24f1a751
AM
2937 else
2938 relocs = TRUE;
252b5132 2939
a7519a3c
RH
2940 /* We use the reloc_count field as a counter if we need
2941 to copy relocs into the output file. */
2942 s->reloc_count = 0;
252b5132 2943 }
3765b1be 2944 }
0112cd26 2945 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2946 && strcmp (name, ".plt") != 0
2947 && strcmp (name, ".dynbss") != 0)
3765b1be 2948 {
a7519a3c
RH
2949 /* It's not one of our dynamic sections, so don't allocate space. */
2950 continue;
2951 }
252b5132 2952
c456f082
AM
2953 if (s->size == 0)
2954 {
2955 /* If we don't need this section, strip it from the output file.
2956 This is to handle .rela.bss and .rela.plt. We must create it
2957 in create_dynamic_sections, because it must be created before
2958 the linker maps input sections to output sections. The
2959 linker does that before adjust_dynamic_symbol is called, and
2960 it is that function which decides whether anything needs to
2961 go into these sections. */
6452a567
RH
2962 if (!CONST_STRNEQ (name, ".got"))
2963 s->flags |= SEC_EXCLUDE;
c456f082
AM
2964 }
2965 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2966 {
2967 /* Allocate memory for the section contents. */
2968 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2969 if (s->contents == NULL)
b34976b6 2970 return FALSE;
a7519a3c
RH
2971 }
2972 }
3765b1be 2973
a7519a3c
RH
2974 if (elf_hash_table (info)->dynamic_sections_created)
2975 {
2976 /* Add some entries to the .dynamic section. We fill in the
2977 values later, in elf64_alpha_finish_dynamic_sections, but we
2978 must add the entries now so that we get the correct size for
2979 the .dynamic section. The DT_DEBUG entry is filled in by the
2980 dynamic linker and used by the debugger. */
2981#define add_dynamic_entry(TAG, VAL) \
2982 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2983
0e1862bb 2984 if (bfd_link_executable (info))
a7519a3c
RH
2985 {
2986 if (!add_dynamic_entry (DT_DEBUG, 0))
2987 return FALSE;
3765b1be
RH
2988 }
2989
a7519a3c 2990 if (relplt)
3765b1be 2991 {
a7519a3c
RH
2992 if (!add_dynamic_entry (DT_PLTGOT, 0)
2993 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2994 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2995 || !add_dynamic_entry (DT_JMPREL, 0))
2996 return FALSE;
6ec7057a
RH
2997
2998 if (elf64_alpha_use_secureplt
2999 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
3000 return FALSE;
a7519a3c 3001 }
252b5132 3002
24f1a751 3003 if (relocs)
a7519a3c 3004 {
24f1a751
AM
3005 if (!add_dynamic_entry (DT_RELA, 0)
3006 || !add_dynamic_entry (DT_RELASZ, 0)
3007 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 3008 return FALSE;
24f1a751
AM
3009
3010 if (info->flags & DF_TEXTREL)
3011 {
3012 if (!add_dynamic_entry (DT_TEXTREL, 0))
3013 return FALSE;
3014 }
252b5132
RH
3015 }
3016 }
a7519a3c 3017#undef add_dynamic_entry
252b5132 3018
b34976b6 3019 return TRUE;
252b5132 3020}
a7519a3c
RH
3021\f
3022/* These functions do relaxation for Alpha ELF.
252b5132 3023
a7519a3c
RH
3024 Currently I'm only handling what I can do with existing compiler
3025 and assembler support, which means no instructions are removed,
3026 though some may be nopped. At this time GCC does not emit enough
3027 information to do all of the relaxing that is possible. It will
3028 take some not small amount of work for that to happen.
252b5132 3029
a7519a3c
RH
3030 There are a couple of interesting papers that I once read on this
3031 subject, that I cannot find references to at the moment, that
3032 related to Alpha in particular. They are by David Wall, then of
3033 DEC WRL. */
252b5132 3034
a7519a3c
RH
3035struct alpha_relax_info
3036{
3037 bfd *abfd;
3038 asection *sec;
3039 bfd_byte *contents;
3040 Elf_Internal_Shdr *symtab_hdr;
3041 Elf_Internal_Rela *relocs, *relend;
3042 struct bfd_link_info *link_info;
3043 bfd_vma gp;
3044 bfd *gotobj;
3045 asection *tsec;
3046 struct alpha_elf_link_hash_entry *h;
3047 struct alpha_elf_got_entry **first_gotent;
3048 struct alpha_elf_got_entry *gotent;
3049 bfd_boolean changed_contents;
3050 bfd_boolean changed_relocs;
3051 unsigned char other;
3052};
252b5132 3053
a7519a3c
RH
3054static Elf_Internal_Rela *
3055elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
3056 Elf_Internal_Rela *relend,
3057 bfd_vma offset, int type)
3058{
3059 while (rel < relend)
252b5132 3060 {
a7519a3c
RH
3061 if (rel->r_offset == offset
3062 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3063 return rel;
3064 ++rel;
3065 }
3066 return NULL;
3067}
252b5132 3068
a7519a3c
RH
3069static bfd_boolean
3070elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3071 Elf_Internal_Rela *irel, unsigned long r_type)
3072{
3073 unsigned int insn;
3074 bfd_signed_vma disp;
252b5132 3075
a7519a3c
RH
3076 /* Get the instruction. */
3077 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3078
a7519a3c
RH
3079 if (insn >> 26 != OP_LDQ)
3080 {
3081 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3082 _bfd_error_handler
695344c0
NC
3083 /* xgettext:c-format */
3084 (_("%B: %A+0x%lx: warning: %s relocation against unexpected insn"),
4eca0228
AM
3085 info->abfd, info->sec,
3086 (unsigned long) irel->r_offset, howto->name);
a7519a3c
RH
3087 return TRUE;
3088 }
252b5132 3089
a7519a3c
RH
3090 /* Can't relax dynamic symbols. */
3091 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3092 return TRUE;
252b5132 3093
a7519a3c 3094 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3095 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3096 && bfd_link_dll (info->link_info))
a7519a3c 3097 return TRUE;
252b5132 3098
a7519a3c
RH
3099 if (r_type == R_ALPHA_LITERAL)
3100 {
3101 /* Look for nice constant addresses. This includes the not-uncommon
3102 special case of 0 for undefweak symbols. */
3103 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3104 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3105 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3106 {
3107 disp = 0;
3108 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3109 insn |= (symval & 0xffff);
3110 r_type = R_ALPHA_NONE;
3111 }
3112 else
3113 {
d1c109de
RH
3114 /* We may only create GPREL relocs during the second pass. */
3115 if (info->link_info->relax_pass == 0)
3116 return TRUE;
3117
a7519a3c
RH
3118 disp = symval - info->gp;
3119 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3120 r_type = R_ALPHA_GPREL16;
3121 }
252b5132
RH
3122 }
3123 else
252b5132 3124 {
a7519a3c 3125 bfd_vma dtp_base, tp_base;
252b5132 3126
a7519a3c
RH
3127 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3128 dtp_base = alpha_get_dtprel_base (info->link_info);
3129 tp_base = alpha_get_tprel_base (info->link_info);
3130 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3131
a7519a3c 3132 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3133
a7519a3c
RH
3134 switch (r_type)
3135 {
3136 case R_ALPHA_GOTDTPREL:
3137 r_type = R_ALPHA_DTPREL16;
3138 break;
3139 case R_ALPHA_GOTTPREL:
3140 r_type = R_ALPHA_TPREL16;
3141 break;
3142 default:
3143 BFD_ASSERT (0);
3144 return FALSE;
3145 }
3146 }
252b5132 3147
a7519a3c 3148 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3149 return TRUE;
252b5132 3150
a7519a3c
RH
3151 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3152 info->changed_contents = TRUE;
252b5132 3153
a7519a3c
RH
3154 /* Reduce the use count on this got entry by one, possibly
3155 eliminating it. */
3156 if (--info->gotent->use_count == 0)
252b5132 3157 {
a7519a3c
RH
3158 int sz = alpha_got_entry_size (r_type);
3159 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3160 if (!info->h)
3161 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3162 }
252b5132 3163
a7519a3c
RH
3164 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3165 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3166 info->changed_relocs = TRUE;
3167
3168 /* ??? Search forward through this basic block looking for insns
3169 that use the target register. Stop after an insn modifying the
3170 register is seen, or after a branch or call.
252b5132 3171
a7519a3c
RH
3172 Any such memory load insn may be substituted by a load directly
3173 off the GP. This allows the memory load insn to be issued before
3174 the calculated GP register would otherwise be ready.
252b5132 3175
a7519a3c
RH
3176 Any such jsr insn can be replaced by a bsr if it is in range.
3177
3178 This would mean that we'd have to _add_ relocations, the pain of
3179 which gives one pause. */
252b5132 3180
b34976b6 3181 return TRUE;
252b5132
RH
3182}
3183
a7519a3c
RH
3184static bfd_vma
3185elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3186{
a7519a3c
RH
3187 /* If the function has the same gp, and we can identify that the
3188 function does not use its function pointer, we can eliminate the
3189 address load. */
252b5132 3190
a7519a3c
RH
3191 /* If the symbol is marked NOPV, we are being told the function never
3192 needs its procedure value. */
3193 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3194 return symval;
252b5132 3195
a7519a3c
RH
3196 /* If the symbol is marked STD_GP, we are being told the function does
3197 a normal ldgp in the first two words. */
3198 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3199 ;
252b5132 3200
a7519a3c
RH
3201 /* Otherwise, we may be able to identify a GP load in the first two
3202 words, which we can then skip. */
3203 else
252b5132 3204 {
a7519a3c
RH
3205 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3206 bfd_vma ofs;
252b5132 3207
a7519a3c
RH
3208 /* Load the relocations from the section that the target symbol is in. */
3209 if (info->sec == info->tsec)
252b5132 3210 {
a7519a3c
RH
3211 tsec_relocs = info->relocs;
3212 tsec_relend = info->relend;
3213 tsec_free = NULL;
3214 }
3215 else
3216 {
3217 tsec_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3218 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3219 (Elf_Internal_Rela *) NULL,
3220 info->link_info->keep_memory));
3221 if (tsec_relocs == NULL)
3222 return 0;
3223 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3224 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3225 ? NULL
3226 : tsec_relocs);
a7519a3c 3227 }
252b5132 3228
a7519a3c
RH
3229 /* Recover the symbol's offset within the section. */
3230 ofs = (symval - info->tsec->output_section->vma
3231 - info->tsec->output_offset);
252b5132 3232
a7519a3c
RH
3233 /* Look for a GPDISP reloc. */
3234 gpdisp = (elf64_alpha_find_reloc_at_ofs
3235 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3236
a7519a3c
RH
3237 if (!gpdisp || gpdisp->r_addend != 4)
3238 {
3239 if (tsec_free)
3240 free (tsec_free);
3241 return 0;
252b5132 3242 }
a7519a3c
RH
3243 if (tsec_free)
3244 free (tsec_free);
252b5132
RH
3245 }
3246
a7519a3c
RH
3247 /* We've now determined that we can skip an initial gp load. Verify
3248 that the call and the target use the same gp. */
f13a99db 3249 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3250 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3251 return 0;
252b5132 3252
a7519a3c
RH
3253 return symval + 8;
3254}
252b5132 3255
a7519a3c
RH
3256static bfd_boolean
3257elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3258 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3259{
d1c109de
RH
3260 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3261 int flags;
a7519a3c
RH
3262 bfd_signed_vma disp;
3263 bfd_boolean fits16;
3264 bfd_boolean fits32;
3265 bfd_boolean lit_reused = FALSE;
3266 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3267 bfd_boolean changed_contents;
3268 bfd_boolean changed_relocs;
3269 bfd_byte *contents = info->contents;
3270 bfd *abfd = info->abfd;
3271 bfd_vma sec_output_vma;
a7519a3c 3272 unsigned int lit_insn;
d1c109de 3273 int relax_pass;
252b5132 3274
d1c109de 3275 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3276 if (lit_insn >> 26 != OP_LDQ)
3277 {
4eca0228 3278 _bfd_error_handler
695344c0
NC
3279 /* xgettext:c-format */
3280 (_("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn"),
4eca0228
AM
3281 abfd, info->sec,
3282 (unsigned long) irel->r_offset);
a7519a3c
RH
3283 return TRUE;
3284 }
252b5132 3285
a7519a3c
RH
3286 /* Can't relax dynamic symbols. */
3287 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3288 return TRUE;
3289
d1c109de
RH
3290 changed_contents = info->changed_contents;
3291 changed_relocs = info->changed_relocs;
3292 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3293 relax_pass = info->link_info->relax_pass;
3294
a7519a3c 3295 /* Summarize how this particular LITERAL is used. */
d1c109de 3296 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3297 {
d1c109de 3298 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3299 break;
d1c109de
RH
3300 if (erel->r_addend <= 6)
3301 flags |= 1 << erel->r_addend;
a7519a3c 3302 }
252b5132 3303
a7519a3c
RH
3304 /* A little preparation for the loop... */
3305 disp = symval - info->gp;
252b5132 3306
d1c109de 3307 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3308 {
d1c109de 3309 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3310 unsigned int insn;
3311 int insn_disp;
3312 bfd_signed_vma xdisp;
d1c109de 3313 Elf_Internal_Rela nrel;
252b5132 3314
d1c109de 3315 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3316
a7519a3c
RH
3317 switch (urel->r_addend)
3318 {
3319 case LITUSE_ALPHA_ADDR:
3320 default:
3321 /* This type is really just a placeholder to note that all
3322 uses cannot be optimized, but to still allow some. */
3323 all_optimized = FALSE;
3324 break;
252b5132 3325
a7519a3c 3326 case LITUSE_ALPHA_BASE:
d1c109de
RH
3327 /* We may only create GPREL relocs during the second pass. */
3328 if (relax_pass == 0)
3329 {
3330 all_optimized = FALSE;
3331 break;
3332 }
3333
a7519a3c 3334 /* We can always optimize 16-bit displacements. */
252b5132 3335
a7519a3c
RH
3336 /* Extract the displacement from the instruction, sign-extending
3337 it if necessary, then test whether it is within 16 or 32 bits
3338 displacement from GP. */
3339 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3340
3341 xdisp = disp + insn_disp;
3342 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3343 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3344 && xdisp < 0x7fff8000);
3345
3346 if (fits16)
3347 {
3348 /* Take the op code and dest from this insn, take the base
3349 register from the literal insn. Leave the offset alone. */
3350 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3351 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3352 changed_contents = TRUE;
3353
3354 nrel = *urel;
3355 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3356 R_ALPHA_GPREL16);
3357 nrel.r_addend = irel->r_addend;
3358
3359 /* As we adjust, move the reloc to the end so that we don't
3360 break the LITERAL+LITUSE chain. */
3361 if (urel < --erel)
3362 *urel-- = *erel;
3363 *erel = nrel;
3364 changed_relocs = TRUE;
252b5132 3365 }
252b5132 3366
a7519a3c
RH
3367 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3368 else if (fits32 && !(flags & ~6))
3369 {
3370 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3371
a7519a3c
RH
3372 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3373 R_ALPHA_GPRELHIGH);
3374 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3375 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3376 lit_reused = TRUE;
d1c109de 3377 changed_contents = TRUE;
252b5132 3378
d1c109de
RH
3379 /* Since all relocs must be optimized, don't bother swapping
3380 this relocation to the end. */
a7519a3c
RH
3381 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3382 R_ALPHA_GPRELLOW);
3383 urel->r_addend = irel->r_addend;
d1c109de 3384 changed_relocs = TRUE;
a7519a3c
RH
3385 }
3386 else
3387 all_optimized = FALSE;
3388 break;
252b5132 3389
a7519a3c
RH
3390 case LITUSE_ALPHA_BYTOFF:
3391 /* We can always optimize byte instructions. */
252b5132 3392
a7519a3c
RH
3393 /* FIXME: sanity check the insn for byte op. Check that the
3394 literal dest reg is indeed Rb in the byte insn. */
252b5132 3395
a7519a3c
RH
3396 insn &= ~ (unsigned) 0x001ff000;
3397 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3398 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3399 changed_contents = TRUE;
3400
3401 nrel = *urel;
3402 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3403 nrel.r_addend = 0;
3404
3405 /* As we adjust, move the reloc to the end so that we don't
3406 break the LITERAL+LITUSE chain. */
3407 if (urel < --erel)
3408 *urel-- = *erel;
3409 *erel = nrel;
3410 changed_relocs = TRUE;
a7519a3c 3411 break;
252b5132 3412
a7519a3c
RH
3413 case LITUSE_ALPHA_JSR:
3414 case LITUSE_ALPHA_TLSGD:
3415 case LITUSE_ALPHA_TLSLDM:
8288a39e 3416 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3417 {
a7519a3c
RH
3418 bfd_vma optdest, org;
3419 bfd_signed_vma odisp;
252b5132 3420
a7519a3c
RH
3421 /* For undefined weak symbols, we're mostly interested in getting
3422 rid of the got entry whenever possible, so optimize this to a
3423 use of the zero register. */
3424 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3425 {
3426 insn |= 31 << 16;
d1c109de 3427 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3428
d1c109de 3429 changed_contents = TRUE;
a7519a3c
RH
3430 break;
3431 }
252b5132 3432
a7519a3c
RH
3433 /* If not zero, place to jump without needing pv. */
3434 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3435 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3436 odisp = (optdest ? optdest : symval) - org;
252b5132 3437
a7519a3c
RH
3438 if (odisp >= -0x400000 && odisp < 0x400000)
3439 {
3440 Elf_Internal_Rela *xrel;
252b5132 3441
a7519a3c
RH
3442 /* Preserve branch prediction call stack when possible. */
3443 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3444 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3445 else
3446 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3447 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3448 changed_contents = TRUE;
252b5132 3449
d1c109de
RH
3450 nrel = *urel;
3451 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3452 R_ALPHA_BRADDR);
3453 nrel.r_addend = irel->r_addend;
252b5132 3454
a7519a3c 3455 if (optdest)
d1c109de 3456 nrel.r_addend += optdest - symval;
a7519a3c
RH
3457 else
3458 all_optimized = FALSE;
252b5132 3459
a7519a3c
RH
3460 /* Kill any HINT reloc that might exist for this insn. */
3461 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3462 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3463 R_ALPHA_HINT));
3464 if (xrel)
3465 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3466
d1c109de
RH
3467 /* As we adjust, move the reloc to the end so that we don't
3468 break the LITERAL+LITUSE chain. */
3469 if (urel < --erel)
3470 *urel-- = *erel;
3471 *erel = nrel;
3472
a7519a3c
RH
3473 info->changed_relocs = TRUE;
3474 }
3475 else
3476 all_optimized = FALSE;
252b5132 3477
a7519a3c
RH
3478 /* Even if the target is not in range for a direct branch,
3479 if we share a GP, we can eliminate the gp reload. */
3480 if (optdest)
3481 {
3482 Elf_Internal_Rela *gpdisp
3483 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3484 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3485 R_ALPHA_GPDISP));
3486 if (gpdisp)
3487 {
d1c109de 3488 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3489 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3490 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3491 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3492
a7519a3c
RH
3493 /* Verify that the instruction is "ldah $29,0($26)".
3494 Consider a function that ends in a noreturn call,
3495 and that the next function begins with an ldgp,
3496 and that by accident there is no padding between.
3497 In that case the insn would use $27 as the base. */
3498 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3499 {
d1c109de
RH
3500 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3501 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3502
a7519a3c 3503 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3504 changed_contents = TRUE;
3505 changed_relocs = TRUE;
a7519a3c
RH
3506 }
3507 }
3508 }
3509 }
3510 break;
252b5132 3511 }
252b5132
RH
3512 }
3513
d1c109de
RH
3514 /* If we reused the literal instruction, we must have optimized all. */
3515 BFD_ASSERT(!lit_reused || all_optimized);
3516
a7519a3c
RH
3517 /* If all cases were optimized, we can reduce the use count on this
3518 got entry by one, possibly eliminating it. */
3519 if (all_optimized)
252b5132 3520 {
a7519a3c 3521 if (--info->gotent->use_count == 0)
252b5132 3522 {
a7519a3c
RH
3523 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3524 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3525 if (!info->h)
3526 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3527 }
a7519a3c
RH
3528
3529 /* If the literal instruction is no longer needed (it may have been
3530 reused. We can eliminate it. */
3531 /* ??? For now, I don't want to deal with compacting the section,
3532 so just nop it out. */
3533 if (!lit_reused)
252b5132 3534 {
a7519a3c 3535 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3536 changed_relocs = TRUE;
252b5132 3537
d1c109de
RH
3538 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3539 changed_contents = TRUE;
a7519a3c 3540 }
a7519a3c 3541 }
d1c109de
RH
3542
3543 info->changed_contents = changed_contents;
3544 info->changed_relocs = changed_relocs;
3545
3546 if (all_optimized || relax_pass == 0)
3547 return TRUE;
3548 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3549}
3550
b34976b6 3551static bfd_boolean
a7519a3c
RH
3552elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3553 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3554{
a7519a3c 3555 bfd_byte *pos[5];
891caa9b 3556 unsigned int insn, tlsgd_reg;
a7519a3c 3557 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3558 bfd_boolean dynamic, use_gottprel;
a7519a3c 3559 unsigned long new_symndx;
f44f99a5 3560
a7519a3c 3561 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3562
a7519a3c
RH
3563 /* If a TLS symbol is accessed using IE at least once, there is no point
3564 to use dynamic model for it. */
3565 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3566 ;
f44f99a5 3567
a7519a3c
RH
3568 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3569 then we might as well relax to IE. */
0e1862bb 3570 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3571 && (info->link_info->flags & DF_STATIC_TLS))
3572 ;
f44f99a5 3573
a7519a3c 3574 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3575 else if (bfd_link_pic (info->link_info))
a7519a3c 3576 return TRUE;
f44f99a5 3577
a7519a3c
RH
3578 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3579 the matching LITUSE_TLS relocations. */
3580 if (irel + 2 >= info->relend)
3581 return TRUE;
3582 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3583 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3584 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3585 return TRUE;
f44f99a5 3586
a7519a3c
RH
3587 /* There must be a GPDISP relocation positioned immediately after the
3588 LITUSE relocation. */
3589 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3590 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3591 if (!gpdisp)
b34976b6 3592 return TRUE;
f44f99a5 3593
a7519a3c
RH
3594 pos[0] = info->contents + irel[0].r_offset;
3595 pos[1] = info->contents + irel[1].r_offset;
3596 pos[2] = info->contents + irel[2].r_offset;
3597 pos[3] = info->contents + gpdisp->r_offset;
3598 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3599
7dbf3b76
RH
3600 /* Beware of the compiler hoisting part of the sequence out a loop
3601 and adjusting the destination register for the TLSGD insn. If this
3602 happens, there will be a move into $16 before the JSR insn, so only
3603 transformations of the first insn pair should use this register. */
3604 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3605 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3606
a7519a3c
RH
3607 /* Generally, the positions are not allowed to be out of order, lest the
3608 modified insn sequence have different register lifetimes. We can make
3609 an exception when pos 1 is adjacent to pos 0. */
3610 if (pos[1] + 4 == pos[0])
f44f99a5 3611 {
a7519a3c
RH
3612 bfd_byte *tmp = pos[0];
3613 pos[0] = pos[1];
3614 pos[1] = tmp;
f44f99a5 3615 }
a7519a3c
RH
3616 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3617 return TRUE;
cc03ec80 3618
a7519a3c
RH
3619 /* Reduce the use count on the LITERAL relocation. Do this before we
3620 smash the symndx when we adjust the relocations below. */
3621 {
3622 struct alpha_elf_got_entry *lit_gotent;
3623 struct alpha_elf_link_hash_entry *lit_h;
3624 unsigned long indx;
f44f99a5 3625
a7519a3c
RH
3626 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3627 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3628 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3629
a7519a3c
RH
3630 while (lit_h->root.root.type == bfd_link_hash_indirect
3631 || lit_h->root.root.type == bfd_link_hash_warning)
3632 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3633
a7519a3c
RH
3634 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3635 lit_gotent = lit_gotent->next)
3636 if (lit_gotent->gotobj == info->gotobj
3637 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3638 && lit_gotent->addend == irel[1].r_addend)
3639 break;
3640 BFD_ASSERT (lit_gotent);
252b5132 3641
a7519a3c
RH
3642 if (--lit_gotent->use_count == 0)
3643 {
3644 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3645 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3646 }
3647 }
252b5132 3648
a7519a3c 3649 /* Change
252b5132 3650
a7519a3c
RH
3651 lda $16,x($gp) !tlsgd!1
3652 ldq $27,__tls_get_addr($gp) !literal!1
3653 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3654 ldah $29,0($26) !gpdisp!2
3655 lda $29,0($29) !gpdisp!2
3656 to
3657 ldq $16,x($gp) !gottprel
3658 unop
3659 call_pal rduniq
3660 addq $16,$0,$0
3661 unop
3662 or the first pair to
3663 lda $16,x($gp) !tprel
3664 unop
3665 or
3666 ldah $16,x($gp) !tprelhi
3667 lda $16,x($16) !tprello
3668
3669 as appropriate. */
3670
3671 use_gottprel = FALSE;
cf35638d 3672 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3673
9a757e4d
RM
3674 /* Some compilers warn about a Boolean-looking expression being
3675 used in a switch. The explicit cast silences them. */
0e1862bb 3676 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3677 {
a7519a3c
RH
3678 case 1:
3679 {
3680 bfd_vma tp_base;
3681 bfd_signed_vma disp;
252b5132 3682
a7519a3c
RH
3683 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3684 tp_base = alpha_get_tprel_base (info->link_info);
3685 disp = symval - tp_base;
252b5132 3686
a7519a3c
RH
3687 if (disp >= -0x8000 && disp < 0x8000)
3688 {
891caa9b 3689 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3690 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3691 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3692
a7519a3c
RH
3693 irel[0].r_offset = pos[0] - info->contents;
3694 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3695 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3696 break;
3697 }
3698 else if (disp >= -(bfd_signed_vma) 0x80000000
3699 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3700 && pos[0] + 4 == pos[1])
a7519a3c 3701 {
891caa9b 3702 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3703 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3704 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3705 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3706
a7519a3c
RH
3707 irel[0].r_offset = pos[0] - info->contents;
3708 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3709 irel[1].r_offset = pos[1] - info->contents;
3710 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3711 break;
3712 }
3713 }
3714 /* FALLTHRU */
3765b1be 3715
3765b1be 3716 default:
a7519a3c
RH
3717 use_gottprel = TRUE;
3718
891caa9b 3719 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3720 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3721 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3722
3723 irel[0].r_offset = pos[0] - info->contents;
3724 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3725 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3726 break;
3765b1be 3727 }
3765b1be 3728
a7519a3c 3729 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3730
a7519a3c
RH
3731 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3732 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3733
a7519a3c 3734 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3735
a7519a3c
RH
3736 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3737 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3738
a7519a3c
RH
3739 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3740 irel[2].r_offset, R_ALPHA_HINT);
3741 if (hint)
3742 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3743
a7519a3c
RH
3744 info->changed_contents = TRUE;
3745 info->changed_relocs = TRUE;
d6ad34f6 3746
a7519a3c
RH
3747 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3748 if (--info->gotent->use_count == 0)
3765b1be 3749 {
a7519a3c
RH
3750 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3751 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3752 if (!info->h)
3753 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3754 }
252b5132 3755
a7519a3c
RH
3756 /* If we've switched to a GOTTPREL relocation, increment the reference
3757 count on that got entry. */
3758 if (use_gottprel)
f44f99a5 3759 {
a7519a3c 3760 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3761
a7519a3c
RH
3762 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3763 tprel_gotent = tprel_gotent->next)
3764 if (tprel_gotent->gotobj == info->gotobj
3765 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3766 && tprel_gotent->addend == irel->r_addend)
3767 break;
3768 if (tprel_gotent)
3769 tprel_gotent->use_count++;
3770 else
f44f99a5 3771 {
a7519a3c
RH
3772 if (info->gotent->use_count == 0)
3773 tprel_gotent = info->gotent;
3774 else
3775 {
3776 tprel_gotent = (struct alpha_elf_got_entry *)
3777 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3778 if (!tprel_gotent)
3779 return FALSE;
f44f99a5 3780
a7519a3c
RH
3781 tprel_gotent->next = *info->first_gotent;
3782 *info->first_gotent = tprel_gotent;
f44f99a5 3783
a7519a3c
RH
3784 tprel_gotent->gotobj = info->gotobj;
3785 tprel_gotent->addend = irel->r_addend;
3786 tprel_gotent->got_offset = -1;
3787 tprel_gotent->reloc_done = 0;
3788 tprel_gotent->reloc_xlated = 0;
3789 }
f44f99a5 3790
a7519a3c
RH
3791 tprel_gotent->use_count = 1;
3792 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3793 }
f44f99a5 3794 }
f44f99a5 3795
b34976b6 3796 return TRUE;
f44f99a5
RH
3797}
3798
b34976b6 3799static bfd_boolean
a7519a3c
RH
3800elf64_alpha_relax_section (bfd *abfd, asection *sec,
3801 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3802{
a7519a3c
RH
3803 Elf_Internal_Shdr *symtab_hdr;
3804 Elf_Internal_Rela *internal_relocs;
3805 Elf_Internal_Rela *irel, *irelend;
3806 Elf_Internal_Sym *isymbuf = NULL;
3807 struct alpha_elf_got_entry **local_got_entries;
3808 struct alpha_relax_info info;
4dfe6ac6 3809 struct alpha_elf_link_hash_table * htab;
d1c109de 3810 int relax_pass;
4dfe6ac6
NC
3811
3812 htab = alpha_elf_hash_table (link_info);
3813 if (htab == NULL)
3814 return FALSE;
f44f99a5 3815
4a828aab 3816 /* There's nothing to change, yet. */
a7519a3c 3817 *again = FALSE;
f44f99a5 3818
0e1862bb 3819 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3820 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3821 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3822 || sec->reloc_count == 0)
d6ad34f6
RH
3823 return TRUE;
3824
0ffa91dd 3825 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3826 relax_pass = link_info->relax_pass;
0ffa91dd 3827
4a828aab 3828 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3829 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3830 {
4dfe6ac6 3831 htab->relax_trip = link_info->relax_trip;
4a828aab 3832
d1c109de
RH
3833 /* This should never fail after the initial round, since the only error
3834 is GOT overflow, and relaxation only shrinks the table. However, we
3835 may only merge got sections during the first pass. If we merge
3836 sections after we've created GPREL relocs, the GP for the merged
3837 section backs up which may put the relocs out of range. */
3838 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3839 abort ();
3840 if (elf_hash_table (link_info)->dynamic_sections_created)
3841 {
3842 elf64_alpha_size_plt_section (link_info);
3843 elf64_alpha_size_rela_got_section (link_info);
3844 }
3845 }
3846
0ffa91dd 3847 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3848 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3849
a7519a3c
RH
3850 /* Load the relocations for this section. */
3851 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3852 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3853 link_info->keep_memory));
3854 if (internal_relocs == NULL)
3855 return FALSE;
252b5132 3856
a7519a3c
RH
3857 memset(&info, 0, sizeof (info));
3858 info.abfd = abfd;
3859 info.sec = sec;
3860 info.link_info = link_info;
3861 info.symtab_hdr = symtab_hdr;
3862 info.relocs = internal_relocs;
3863 info.relend = irelend = internal_relocs + sec->reloc_count;
3864
3865 /* Find the GP for this object. Do not store the result back via
3866 _bfd_set_gp_value, since this could change again before final. */
3867 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3868 if (info.gotobj)
3765b1be 3869 {
a7519a3c
RH
3870 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3871 info.gp = (sgot->output_section->vma
3872 + sgot->output_offset
3873 + 0x8000);
252b5132
RH
3874 }
3875
a7519a3c
RH
3876 /* Get the section contents. */
3877 if (elf_section_data (sec)->this_hdr.contents != NULL)
3878 info.contents = elf_section_data (sec)->this_hdr.contents;
3879 else
3880 {
3881 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3882 goto error_return;
3883 }
252b5132 3884
a7519a3c
RH
3885 for (irel = internal_relocs; irel < irelend; irel++)
3886 {
3887 bfd_vma symval;
3888 struct alpha_elf_got_entry *gotent;
3889 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3890 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3891
3892 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de
RH
3893 if (r_type != R_ALPHA_LITERAL)
3894 {
3895 /* We complete everything except LITERAL in the first pass. */
3896 if (relax_pass != 0)
3897 continue;
3898 if (r_type == R_ALPHA_TLSLDM)
3899 {
3900 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3901 reloc to the STN_UNDEF (0) symbol so that they all match. */
3902 r_symndx = STN_UNDEF;
3903 }
3904 else if (r_type != R_ALPHA_GOTDTPREL
3905 && r_type != R_ALPHA_GOTTPREL
3906 && r_type != R_ALPHA_TLSGD)
3907 continue;
a7519a3c
RH
3908 }
3909
3910 /* Get the value of the symbol referred to by the reloc. */
3911 if (r_symndx < symtab_hdr->sh_info)
3912 {
3913 /* A local symbol. */
3914 Elf_Internal_Sym *isym;
3915
3916 /* Read this BFD's local symbols. */
3917 if (isymbuf == NULL)
3918 {
3919 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3920 if (isymbuf == NULL)
3921 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3922 symtab_hdr->sh_info, 0,
3923 NULL, NULL, NULL);
3924 if (isymbuf == NULL)
3925 goto error_return;
3926 }
252b5132 3927
a7519a3c 3928 isym = isymbuf + r_symndx;
252b5132 3929
a7519a3c
RH
3930 /* Given the symbol for a TLSLDM reloc is ignored, this also
3931 means forcing the symbol value to the tp base. */
3932 if (r_type == R_ALPHA_TLSLDM)
3933 {
3934 info.tsec = bfd_abs_section_ptr;
3935 symval = alpha_get_tprel_base (info.link_info);
3936 }
3937 else
3938 {
3939 symval = isym->st_value;
3940 if (isym->st_shndx == SHN_UNDEF)
3941 continue;
3942 else if (isym->st_shndx == SHN_ABS)
3943 info.tsec = bfd_abs_section_ptr;
3944 else if (isym->st_shndx == SHN_COMMON)
3945 info.tsec = bfd_com_section_ptr;
3946 else
3947 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3948 }
252b5132 3949
a7519a3c
RH
3950 info.h = NULL;
3951 info.other = isym->st_other;
3952 if (local_got_entries)
3953 info.first_gotent = &local_got_entries[r_symndx];
3954 else
3955 {
3956 info.first_gotent = &info.gotent;
3957 info.gotent = NULL;
3958 }
252b5132 3959 }
a7519a3c
RH
3960 else
3961 {
3962 unsigned long indx;
3963 struct alpha_elf_link_hash_entry *h;
252b5132 3964
a7519a3c
RH
3965 indx = r_symndx - symtab_hdr->sh_info;
3966 h = alpha_elf_sym_hashes (abfd)[indx];
3967 BFD_ASSERT (h != NULL);
252b5132 3968
a7519a3c
RH
3969 while (h->root.root.type == bfd_link_hash_indirect
3970 || h->root.root.type == bfd_link_hash_warning)
3971 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3972
a7519a3c
RH
3973 /* If the symbol is undefined, we can't do anything with it. */
3974 if (h->root.root.type == bfd_link_hash_undefined)
3975 continue;
252b5132 3976
a7519a3c
RH
3977 /* If the symbol isn't defined in the current module,
3978 again we can't do anything. */
3979 if (h->root.root.type == bfd_link_hash_undefweak)
3980 {
3981 info.tsec = bfd_abs_section_ptr;
3982 symval = 0;
3983 }
3984 else if (!h->root.def_regular)
3985 {
3986 /* Except for TLSGD relocs, which can sometimes be
3987 relaxed to GOTTPREL relocs. */
3988 if (r_type != R_ALPHA_TLSGD)
3989 continue;
3990 info.tsec = bfd_abs_section_ptr;
3991 symval = 0;
3992 }
3993 else
3994 {
3995 info.tsec = h->root.root.u.def.section;
3996 symval = h->root.root.u.def.value;
3997 }
252b5132 3998
a7519a3c
RH
3999 info.h = h;
4000 info.other = h->root.other;
4001 info.first_gotent = &h->got_entries;
4002 }
252b5132 4003
a7519a3c
RH
4004 /* Search for the got entry to be used by this relocation. */
4005 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
4006 if (gotent->gotobj == info.gotobj
4007 && gotent->reloc_type == r_type
4008 && gotent->addend == irel->r_addend)
4009 break;
4010 info.gotent = gotent;
252b5132 4011
a7519a3c
RH
4012 symval += info.tsec->output_section->vma + info.tsec->output_offset;
4013 symval += irel->r_addend;
252b5132 4014
a7519a3c 4015 switch (r_type)
252b5132 4016 {
a7519a3c
RH
4017 case R_ALPHA_LITERAL:
4018 BFD_ASSERT(info.gotent != NULL);
252b5132 4019
a7519a3c
RH
4020 /* If there exist LITUSE relocations immediately following, this
4021 opens up all sorts of interesting optimizations, because we
4022 now know every location that this address load is used. */
4023 if (irel+1 < irelend
4024 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 4025 {
a7519a3c
RH
4026 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
4027 goto error_return;
252b5132 4028 }
a7519a3c
RH
4029 else
4030 {
4031 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
4032 goto error_return;
4033 }
4034 break;
252b5132 4035
a7519a3c
RH
4036 case R_ALPHA_GOTDTPREL:
4037 case R_ALPHA_GOTTPREL:
4038 BFD_ASSERT(info.gotent != NULL);
4039 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
4040 goto error_return;
4041 break;
4042
4043 case R_ALPHA_TLSGD:
4044 case R_ALPHA_TLSLDM:
4045 BFD_ASSERT(info.gotent != NULL);
4046 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
4047 r_type == R_ALPHA_TLSGD))
4048 goto error_return;
4049 break;
252b5132
RH
4050 }
4051 }
4052
a7519a3c
RH
4053 if (isymbuf != NULL
4054 && symtab_hdr->contents != (unsigned char *) isymbuf)
4055 {
4056 if (!link_info->keep_memory)
4057 free (isymbuf);
4058 else
252b5132 4059 {
a7519a3c
RH
4060 /* Cache the symbols for elf_link_input_bfd. */
4061 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 4062 }
a7519a3c 4063 }
252b5132 4064
a7519a3c
RH
4065 if (info.contents != NULL
4066 && elf_section_data (sec)->this_hdr.contents != info.contents)
4067 {
4068 if (!info.changed_contents && !link_info->keep_memory)
4069 free (info.contents);
4070 else
252b5132 4071 {
a7519a3c
RH
4072 /* Cache the section contents for elf_link_input_bfd. */
4073 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4074 }
a7519a3c 4075 }
252b5132 4076
a7519a3c
RH
4077 if (elf_section_data (sec)->relocs != internal_relocs)
4078 {
4079 if (!info.changed_relocs)
4080 free (internal_relocs);
4081 else
4082 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4083 }
a7519a3c
RH
4084
4085 *again = info.changed_contents || info.changed_relocs;
252b5132 4086
b34976b6 4087 return TRUE;
252b5132 4088
a7519a3c
RH
4089 error_return:
4090 if (isymbuf != NULL
4091 && symtab_hdr->contents != (unsigned char *) isymbuf)
4092 free (isymbuf);
4093 if (info.contents != NULL
4094 && elf_section_data (sec)->this_hdr.contents != info.contents)
4095 free (info.contents);
4096 if (internal_relocs != NULL
4097 && elf_section_data (sec)->relocs != internal_relocs)
4098 free (internal_relocs);
4099 return FALSE;
4100}
4101\f
1bbc9cec
RH
4102/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4103 into the next available slot in SREL. */
4104
4105static void
a7519a3c
RH
4106elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4107 asection *sec, asection *srel, bfd_vma offset,
4108 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4109{
4110 Elf_Internal_Rela outrel;
4111 bfd_byte *loc;
4112
4113 BFD_ASSERT (srel != NULL);
4114
4115 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4116 outrel.r_addend = addend;
4117
4118 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4119 if ((offset | 1) != (bfd_vma) -1)
4120 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4121 else
4122 memset (&outrel, 0, sizeof (outrel));
4123
4124 loc = srel->contents;
4125 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4126 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4127 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4128}
4129
4a67a098
RH
4130/* Relocate an Alpha ELF section for a relocatable link.
4131
4132 We don't have to change anything unless the reloc is against a section
4133 symbol, in which case we have to adjust according to where the section
4134 symbol winds up in the output section. */
4135
b34976b6 4136static bfd_boolean
a7519a3c
RH
4137elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4138 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4139 bfd *input_bfd, asection *input_section,
4140 bfd_byte *contents ATTRIBUTE_UNUSED,
4141 Elf_Internal_Rela *relocs,
4142 Elf_Internal_Sym *local_syms,
4143 asection **local_sections)
4a67a098
RH
4144{
4145 unsigned long symtab_hdr_sh_info;
4146 Elf_Internal_Rela *rel;
4147 Elf_Internal_Rela *relend;
ab96bf03 4148 struct elf_link_hash_entry **sym_hashes;
b34976b6 4149 bfd_boolean ret_val = TRUE;
4a67a098 4150
0ffa91dd 4151 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4152 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4153
4154 relend = relocs + input_section->reloc_count;
4155 for (rel = relocs; rel < relend; rel++)
4156 {
4157 unsigned long r_symndx;
4158 Elf_Internal_Sym *sym;
4159 asection *sec;
4160 unsigned long r_type;
4161
ab96bf03 4162 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4163 if (r_type >= R_ALPHA_max)
4164 {
4eca0228 4165 _bfd_error_handler
695344c0 4166 /* xgettext:c-format */
d003868e
AM
4167 (_("%B: unknown relocation type %d"),
4168 input_bfd, (int) r_type);
4a67a098 4169 bfd_set_error (bfd_error_bad_value);
b34976b6 4170 ret_val = FALSE;
4a67a098
RH
4171 continue;
4172 }
4173
4a67a098
RH
4174 /* The symbol associated with GPDISP and LITUSE is
4175 immaterial. Only the addend is significant. */
4176 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4177 continue;
4178
ab96bf03 4179 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4180 if (r_symndx < symtab_hdr_sh_info)
4181 {
4182 sym = local_syms + r_symndx;
ab96bf03 4183 sec = local_sections[r_symndx];
4a67a098 4184 }
ab96bf03
AM
4185 else
4186 {
4187 struct elf_link_hash_entry *h;
4188
4189 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4190
4191 while (h->root.type == bfd_link_hash_indirect
4192 || h->root.type == bfd_link_hash_warning)
4193 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4194
4195 if (h->root.type != bfd_link_hash_defined
4196 && h->root.type != bfd_link_hash_defweak)
4197 continue;
4198
4199 sym = NULL;
4200 sec = h->root.u.def.section;
4201 }
4202
dbaa2011 4203 if (sec != NULL && discarded_section (sec))
e4067dbb 4204 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4205 rel, 1, relend,
4206 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4207 contents);
ab96bf03
AM
4208
4209 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4210 rel->r_addend += sec->output_offset;
4a67a098
RH
4211 }
4212
4213 return ret_val;
4214}
4215
252b5132
RH
4216/* Relocate an Alpha ELF section. */
4217
b34976b6 4218static bfd_boolean
a7519a3c
RH
4219elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4220 bfd *input_bfd, asection *input_section,
4221 bfd_byte *contents, Elf_Internal_Rela *relocs,
4222 Elf_Internal_Sym *local_syms,
4223 asection **local_sections)
252b5132 4224{
4a67a098 4225 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4226 Elf_Internal_Rela *rel;
4227 Elf_Internal_Rela *relend;
4a67a098
RH
4228 asection *sgot, *srel, *srelgot;
4229 bfd *dynobj, *gotobj;
4230 bfd_vma gp, tp_base, dtp_base;
4231 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4232 bfd_boolean ret_val;
252b5132 4233
0ffa91dd 4234 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4235
4a67a098 4236 /* Handle relocatable links with a smaller loop. */
0e1862bb 4237 if (bfd_link_relocatable (info))
4a67a098
RH
4238 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4239 input_section, contents, relocs,
4240 local_syms, local_sections);
4241
4242 /* This is a final link. */
4243
b34976b6 4244 ret_val = TRUE;
252b5132 4245
0ffa91dd 4246 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4247
4a67a098 4248 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4249 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4250
3241278a
RH
4251 if (input_section->flags & SEC_ALLOC)
4252 {
4253 const char *section_name;
4254 section_name = (bfd_elf_string_from_elf_section
4255 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4256 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4257 BFD_ASSERT(section_name != NULL);
3d4d4302 4258 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4259 }
4260 else
4261 srel = NULL;
3765b1be 4262
4a67a098
RH
4263 /* Find the gp value for this input bfd. */
4264 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4265 if (gotobj)
4266 {
4267 sgot = alpha_elf_tdata (gotobj)->got;
4268 gp = _bfd_get_gp_value (gotobj);
4269 if (gp == 0)
252b5132 4270 {
4a67a098
RH
4271 gp = (sgot->output_section->vma
4272 + sgot->output_offset
4273 + 0x8000);
4274 _bfd_set_gp_value (gotobj, gp);
4275 }
4276 }
4277 else
4278 {
4279 sgot = NULL;
4280 gp = 0;
4281 }
3765b1be 4282
4a67a098
RH
4283 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4284
e1918d23 4285 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4286 {
e1918d23
AM
4287 dtp_base = alpha_get_dtprel_base (info);
4288 tp_base = alpha_get_tprel_base (info);
252b5132 4289 }
4a67a098
RH
4290 else
4291 dtp_base = tp_base = 0;
252b5132 4292
252b5132 4293 relend = relocs + input_section->reloc_count;
4a67a098 4294 for (rel = relocs; rel < relend; rel++)
252b5132 4295 {
4a67a098 4296 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4297 struct alpha_elf_got_entry *gotent;
4298 bfd_reloc_status_type r;
252b5132
RH
4299 reloc_howto_type *howto;
4300 unsigned long r_symndx;
4a67a098
RH
4301 Elf_Internal_Sym *sym = NULL;
4302 asection *sec = NULL;
3765b1be 4303 bfd_vma value;
dc810e39 4304 bfd_vma addend;
b34976b6 4305 bfd_boolean dynamic_symbol_p;
1d5316ab 4306 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4307 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4308 unsigned long r_type;
252b5132
RH
4309
4310 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4311 if (r_type >= R_ALPHA_max)
252b5132 4312 {
4eca0228 4313 _bfd_error_handler
695344c0 4314 /* xgettext:c-format */
d003868e
AM
4315 (_("%B: unknown relocation type %d"),
4316 input_bfd, (int) r_type);
252b5132 4317 bfd_set_error (bfd_error_bad_value);
b34976b6 4318 ret_val = FALSE;
3765b1be 4319 continue;
252b5132 4320 }
252b5132 4321
3765b1be 4322 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4323 r_symndx = ELF64_R_SYM(rel->r_info);
4324
cc03ec80 4325 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4326 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4327 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4328 r_symndx = STN_UNDEF;
cc03ec80 4329
252b5132
RH
4330 if (r_symndx < symtab_hdr->sh_info)
4331 {
8517fae7 4332 asection *msec;
252b5132
RH
4333 sym = local_syms + r_symndx;
4334 sec = local_sections[r_symndx];
8517fae7
AM
4335 msec = sec;
4336 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4337
cf35638d 4338 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4339 this is hackery from relax_section. Force the value to
f915360b 4340 be the tls module base. */
cf35638d 4341 if (r_symndx == STN_UNDEF
cc03ec80
RH
4342 && (r_type == R_ALPHA_TLSLDM
4343 || r_type == R_ALPHA_GOTTPREL
4344 || r_type == R_ALPHA_TPREL64
4345 || r_type == R_ALPHA_TPRELHI
4346 || r_type == R_ALPHA_TPRELLO
4347 || r_type == R_ALPHA_TPREL16))
f915360b 4348 value = dtp_base;
cc03ec80 4349
4a67a098
RH
4350 if (local_got_entries)
4351 gotent = local_got_entries[r_symndx];
4352 else
4353 gotent = NULL;
3765b1be
RH
4354
4355 /* Need to adjust local GOT entries' addends for SEC_MERGE
4356 unless it has been done already. */
4357 if ((sec->flags & SEC_MERGE)
048d873d 4358 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4359 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4360 && gotent
4361 && !gotent->reloc_xlated)
3765b1be
RH
4362 {
4363 struct alpha_elf_got_entry *ent;
3765b1be
RH
4364
4365 for (ent = gotent; ent; ent = ent->next)
4366 {
4367 ent->reloc_xlated = 1;
4368 if (ent->use_count == 0)
4369 continue;
4370 msec = sec;
4371 ent->addend =
4372 _bfd_merged_section_offset (output_bfd, &msec,
4373 elf_section_data (sec)->
4374 sec_info,
753731ee 4375 sym->st_value + ent->addend);
3765b1be
RH
4376 ent->addend -= sym->st_value;
4377 ent->addend += msec->output_section->vma
4378 + msec->output_offset
4379 - sec->output_section->vma
4380 - sec->output_offset;
4381 }
4382 }
4383
b34976b6 4384 dynamic_symbol_p = FALSE;
252b5132
RH
4385 }
4386 else
4387 {
62d887d4 4388 bfd_boolean warned, ignored;
560e09e9 4389 struct elf_link_hash_entry *hh;
b2a8e766
AM
4390 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4391
4392 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4393 r_symndx, symtab_hdr, sym_hashes,
4394 hh, sec, value,
62d887d4 4395 unresolved_reloc, warned, ignored);
560e09e9
NC
4396
4397 if (warned)
4398 continue;
252b5132 4399
560e09e9
NC
4400 if (value == 0
4401 && ! unresolved_reloc
4402 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4403 undef_weak_ref = TRUE;
3765b1be 4404
560e09e9 4405 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4406 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4407 gotent = h->got_entries;
252b5132 4408 }
3765b1be 4409
dbaa2011 4410 if (sec != NULL && discarded_section (sec))
e4067dbb 4411 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4412 rel, 1, relend, howto, 0, contents);
ab96bf03 4413
252b5132 4414 addend = rel->r_addend;
3765b1be
RH
4415 value += addend;
4416
4417 /* Search for the proper got entry. */
4418 for (; gotent ; gotent = gotent->next)
4419 if (gotent->gotobj == gotobj
4420 && gotent->reloc_type == r_type
4421 && gotent->addend == addend)
4422 break;
252b5132
RH
4423
4424 switch (r_type)
4425 {
4426 case R_ALPHA_GPDISP:
4427 {
4428 bfd_byte *p_ldah, *p_lda;
4429
4430 BFD_ASSERT(gp != 0);
4431
3765b1be
RH
4432 value = (input_section->output_section->vma
4433 + input_section->output_offset
4434 + rel->r_offset);
252b5132 4435
3765b1be 4436 p_ldah = contents + rel->r_offset;
252b5132
RH
4437 p_lda = p_ldah + rel->r_addend;
4438
3765b1be 4439 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4440 p_ldah, p_lda);
4441 }
4442 break;
4443
252b5132 4444 case R_ALPHA_LITERAL:
3765b1be
RH
4445 BFD_ASSERT(sgot != NULL);
4446 BFD_ASSERT(gp != 0);
4447 BFD_ASSERT(gotent != NULL);
4448 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4449
3765b1be
RH
4450 if (!gotent->reloc_done)
4451 {
4452 gotent->reloc_done = 1;
252b5132 4453
3765b1be
RH
4454 bfd_put_64 (output_bfd, value,
4455 sgot->contents + gotent->got_offset);
252b5132 4456
3765b1be
RH
4457 /* If the symbol has been forced local, output a
4458 RELATIVE reloc, otherwise it will be handled in
4459 finish_dynamic_symbol. */
0e1862bb
L
4460 if (bfd_link_pic (info)
4461 && !dynamic_symbol_p
4462 && !undef_weak_ref)
1bbc9cec
RH
4463 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4464 gotent->got_offset, 0,
4465 R_ALPHA_RELATIVE, value);
3765b1be 4466 }
252b5132 4467
3765b1be
RH
4468 value = (sgot->output_section->vma
4469 + sgot->output_offset
4470 + gotent->got_offset);
4471 value -= gp;
252b5132
RH
4472 goto default_reloc;
4473
4474 case R_ALPHA_GPREL32:
ec1659c8 4475 case R_ALPHA_GPREL16:
252b5132 4476 case R_ALPHA_GPRELLOW:
3765b1be 4477 if (dynamic_symbol_p)
f16fbd61 4478 {
4eca0228 4479 _bfd_error_handler
695344c0 4480 /* xgettext:c-format */
d003868e
AM
4481 (_("%B: gp-relative relocation against dynamic symbol %s"),
4482 input_bfd, h->root.root.root.string);
b34976b6 4483 ret_val = FALSE;
f16fbd61 4484 }
252b5132 4485 BFD_ASSERT(gp != 0);
3765b1be 4486 value -= gp;
252b5132
RH
4487 goto default_reloc;
4488
4489 case R_ALPHA_GPRELHIGH:
3765b1be 4490 if (dynamic_symbol_p)
f16fbd61 4491 {
4eca0228 4492 _bfd_error_handler
695344c0 4493 /* xgettext:c-format */
d003868e
AM
4494 (_("%B: gp-relative relocation against dynamic symbol %s"),
4495 input_bfd, h->root.root.root.string);
b34976b6 4496 ret_val = FALSE;
f16fbd61 4497 }
252b5132 4498 BFD_ASSERT(gp != 0);
3765b1be
RH
4499 value -= gp;
4500 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4501 goto default_reloc;
4502
252b5132 4503 case R_ALPHA_HINT:
f94952df
RH
4504 /* A call to a dynamic symbol is definitely out of range of
4505 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4506 if (dynamic_symbol_p)
f94952df
RH
4507 {
4508 r = bfd_reloc_ok;
4509 break;
4510 }
3765b1be
RH
4511 /* The regular PC-relative stuff measures from the start of
4512 the instruction rather than the end. */
4513 value -= 4;
4514 goto default_reloc;
f94952df
RH
4515
4516 case R_ALPHA_BRADDR:
3765b1be
RH
4517 if (dynamic_symbol_p)
4518 {
4eca0228 4519 _bfd_error_handler
695344c0 4520 /* xgettext:c-format */
d003868e
AM
4521 (_("%B: pc-relative relocation against dynamic symbol %s"),
4522 input_bfd, h->root.root.root.string);
b34976b6 4523 ret_val = FALSE;
3765b1be 4524 }
252b5132
RH
4525 /* The regular PC-relative stuff measures from the start of
4526 the instruction rather than the end. */
3765b1be 4527 value -= 4;
252b5132
RH
4528 goto default_reloc;
4529
7793f4d0
RH
4530 case R_ALPHA_BRSGP:
4531 {
4532 int other;
4533 const char *name;
4534
4535 /* The regular PC-relative stuff measures from the start of
4536 the instruction rather than the end. */
3765b1be 4537 value -= 4;
7793f4d0 4538
ccf00ab6
RH
4539 /* The source and destination gp must be the same. Note that
4540 the source will always have an assigned gp, since we forced
4541 one in check_relocs, but that the destination may not, as
cedb70c5 4542 it might not have had any relocations at all. Also take
ccf00ab6
RH
4543 care not to crash if H is an undefined symbol. */
4544 if (h != NULL && sec != NULL
4545 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4546 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4547 {
4eca0228 4548 _bfd_error_handler
695344c0 4549 /* xgettext:c-format */
d003868e
AM
4550 (_("%B: change in gp: BRSGP %s"),
4551 input_bfd, h->root.root.root.string);
b34976b6 4552 ret_val = FALSE;
7793f4d0
RH
4553 }
4554
4555 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4556 if (h != NULL)
4557 other = h->root.other;
4558 else
4559 other = sym->st_other;
4560 switch (other & STO_ALPHA_STD_GPLOAD)
4561 {
4562 case STO_ALPHA_NOPV:
4563 break;
4564 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4565 value += 8;
7793f4d0
RH
4566 break;
4567 default:
4568 if (h != NULL)
4569 name = h->root.root.root.string;
4570 else
4571 {
4572 name = (bfd_elf_string_from_elf_section
4573 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4574 if (name == NULL)
4575 name = _("<unknown>");
4576 else if (name[0] == 0)
4577 name = bfd_section_name (input_bfd, sec);
4578 }
4eca0228 4579 _bfd_error_handler
695344c0 4580 /* xgettext:c-format */
d003868e
AM
4581 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4582 input_bfd, name);
b34976b6 4583 ret_val = FALSE;
7793f4d0
RH
4584 break;
4585 }
4586
4587 goto default_reloc;
4588 }
4589
252b5132
RH
4590 case R_ALPHA_REFLONG:
4591 case R_ALPHA_REFQUAD:
3765b1be
RH
4592 case R_ALPHA_DTPREL64:
4593 case R_ALPHA_TPREL64:
252b5132 4594 {
1bbc9cec
RH
4595 long dynindx, dyntype = r_type;
4596 bfd_vma dynaddend;
252b5132
RH
4597
4598 /* Careful here to remember RELATIVE relocations for global
4599 variables for symbolic shared objects. */
4600
3765b1be 4601 if (dynamic_symbol_p)
252b5132
RH
4602 {
4603 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4604 dynindx = h->root.dynindx;
4605 dynaddend = addend;
3765b1be
RH
4606 addend = 0, value = 0;
4607 }
4608 else if (r_type == R_ALPHA_DTPREL64)
4609 {
e1918d23 4610 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4611 value -= dtp_base;
4612 goto default_reloc;
4613 }
4614 else if (r_type == R_ALPHA_TPREL64)
4615 {
e1918d23 4616 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4617 if (!bfd_link_dll (info))
1bbc9cec
RH
4618 {
4619 value -= tp_base;
4620 goto default_reloc;
4621 }
4622 dynindx = 0;
4623 dynaddend = value - dtp_base;
252b5132 4624 }
0e1862bb 4625 else if (bfd_link_pic (info)
cf35638d 4626 && r_symndx != STN_UNDEF
d6ad34f6 4627 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4628 && !undef_weak_ref
4629 && !(unresolved_reloc
4630 && (_bfd_elf_section_offset (output_bfd, info,
4631 input_section,
4632 rel->r_offset)
4633 == (bfd_vma) -1)))
252b5132 4634 {
3765b1be
RH
4635 if (r_type == R_ALPHA_REFLONG)
4636 {
4eca0228 4637 _bfd_error_handler
695344c0 4638 /* xgettext:c-format */
d003868e
AM
4639 (_("%B: unhandled dynamic relocation against %s"),
4640 input_bfd,
3765b1be 4641 h->root.root.root.string);
b34976b6 4642 ret_val = FALSE;
3765b1be 4643 }
1bbc9cec
RH
4644 dynindx = 0;
4645 dyntype = R_ALPHA_RELATIVE;
4646 dynaddend = value;
252b5132
RH
4647 }
4648 else
4649 goto default_reloc;
4650
3241278a
RH
4651 if (input_section->flags & SEC_ALLOC)
4652 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4653 srel, rel->r_offset, dynindx,
4654 dyntype, dynaddend);
252b5132
RH
4655 }
4656 goto default_reloc;
4657
3765b1be 4658 case R_ALPHA_SREL16:
84de6048
RH
4659 case R_ALPHA_SREL32:
4660 case R_ALPHA_SREL64:
3765b1be
RH
4661 if (dynamic_symbol_p)
4662 {
4eca0228 4663 _bfd_error_handler
695344c0 4664 /* xgettext:c-format */
d003868e
AM
4665 (_("%B: pc-relative relocation against dynamic symbol %s"),
4666 input_bfd, h->root.root.root.string);
b34976b6 4667 ret_val = FALSE;
3765b1be 4668 }
3cbc1e5e 4669 else if (bfd_link_pic (info)
0e1862bb 4670 && undef_weak_ref)
d6ad34f6 4671 {
4eca0228 4672 _bfd_error_handler
695344c0 4673 /* xgettext:c-format */
d6ad34f6
RH
4674 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4675 input_bfd, h->root.root.root.string);
4676 ret_val = FALSE;
4677 }
4678
3765b1be 4679
84de6048
RH
4680 /* ??? .eh_frame references to discarded sections will be smashed
4681 to relocations against SHN_UNDEF. The .eh_frame format allows
4682 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4683 if (r_symndx == STN_UNDEF
4684 || (unresolved_reloc
4685 && _bfd_elf_section_offset (output_bfd, info,
4686 input_section,
4687 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4688 howto = (elf64_alpha_howto_table
4689 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4690 goto default_reloc;
4691
3765b1be
RH
4692 case R_ALPHA_TLSLDM:
4693 /* Ignore the symbol for the relocation. The result is always
4694 the current module. */
4695 dynamic_symbol_p = 0;
4696 /* FALLTHRU */
4697
4698 case R_ALPHA_TLSGD:
4699 if (!gotent->reloc_done)
4700 {
4701 gotent->reloc_done = 1;
4702
4703 /* Note that the module index for the main program is 1. */
0e1862bb
L
4704 bfd_put_64 (output_bfd,
4705 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4706 sgot->contents + gotent->got_offset);
4707
4708 /* If the symbol has been forced local, output a
4709 DTPMOD64 reloc, otherwise it will be handled in
4710 finish_dynamic_symbol. */
0e1862bb 4711 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4712 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4713 gotent->got_offset, 0,
4714 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4715
4716 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4717 value = 0;
4718 else
4719 {
e1918d23 4720 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4721 value -= dtp_base;
4722 }
4723 bfd_put_64 (output_bfd, value,
4724 sgot->contents + gotent->got_offset + 8);
4725 }
4726
4727 value = (sgot->output_section->vma
4728 + sgot->output_offset
4729 + gotent->got_offset);
4730 value -= gp;
4731 goto default_reloc;
4732
4733 case R_ALPHA_DTPRELHI:
4734 case R_ALPHA_DTPRELLO:
4735 case R_ALPHA_DTPREL16:
4736 if (dynamic_symbol_p)
4737 {
4eca0228 4738 _bfd_error_handler
695344c0 4739 /* xgettext:c-format */
d003868e
AM
4740 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4741 input_bfd, h->root.root.root.string);
b34976b6 4742 ret_val = FALSE;
3765b1be 4743 }
e1918d23 4744 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4745 value -= dtp_base;
9e756d64
RH
4746 if (r_type == R_ALPHA_DTPRELHI)
4747 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4748 goto default_reloc;
4749
4750 case R_ALPHA_TPRELHI:
4751 case R_ALPHA_TPRELLO:
4752 case R_ALPHA_TPREL16:
3cbc1e5e 4753 if (bfd_link_dll (info))
9e756d64 4754 {
4eca0228 4755 _bfd_error_handler
695344c0 4756 /* xgettext:c-format */
d003868e
AM
4757 (_("%B: TLS local exec code cannot be linked into shared objects"),
4758 input_bfd);
b34976b6 4759 ret_val = FALSE;
9e756d64
RH
4760 }
4761 else if (dynamic_symbol_p)
3765b1be 4762 {
4eca0228 4763 _bfd_error_handler
695344c0 4764 /* xgettext:c-format */
d003868e
AM
4765 (_("%B: tp-relative relocation against dynamic symbol %s"),
4766 input_bfd, h->root.root.root.string);
b34976b6 4767 ret_val = FALSE;
3765b1be 4768 }
e1918d23 4769 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4770 value -= tp_base;
9e756d64
RH
4771 if (r_type == R_ALPHA_TPRELHI)
4772 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4773 goto default_reloc;
4774
4775 case R_ALPHA_GOTDTPREL:
4776 case R_ALPHA_GOTTPREL:
4777 BFD_ASSERT(sgot != NULL);
4778 BFD_ASSERT(gp != 0);
4779 BFD_ASSERT(gotent != NULL);
4780 BFD_ASSERT(gotent->use_count >= 1);
4781
4782 if (!gotent->reloc_done)
4783 {
4784 gotent->reloc_done = 1;
4785
4786 if (dynamic_symbol_p)
4787 value = 0;
4788 else
4789 {
e1918d23 4790 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4791 if (r_type == R_ALPHA_GOTDTPREL)
4792 value -= dtp_base;
0e1862bb 4793 else if (!bfd_link_pic (info))
1bbc9cec
RH
4794 value -= tp_base;
4795 else
4796 {
4797 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4798 gotent->got_offset, 0,
4799 R_ALPHA_TPREL64,
4800 value - dtp_base);
4801 value = 0;
4802 }
3765b1be
RH
4803 }
4804 bfd_put_64 (output_bfd, value,
4805 sgot->contents + gotent->got_offset);
4806 }
4807
4808 value = (sgot->output_section->vma
4809 + sgot->output_offset
4810 + gotent->got_offset);
4811 value -= gp;
4812 goto default_reloc;
4813
252b5132
RH
4814 default:
4815 default_reloc:
4816 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4817 contents, rel->r_offset, value, 0);
252b5132
RH
4818 break;
4819 }
4820
4821 switch (r)
4822 {
4823 case bfd_reloc_ok:
4824 break;
4825
4826 case bfd_reloc_overflow:
4827 {
4828 const char *name;
4829
ed4de5e2
JJ
4830 /* Don't warn if the overflow is due to pc relative reloc
4831 against discarded section. Section optimization code should
4832 handle it. */
4833
4834 if (r_symndx < symtab_hdr->sh_info
4835 && sec != NULL && howto->pc_relative
dbaa2011 4836 && discarded_section (sec))
ed4de5e2
JJ
4837 break;
4838
252b5132 4839 if (h != NULL)
dfeffb9f 4840 name = NULL;
252b5132
RH
4841 else
4842 {
4843 name = (bfd_elf_string_from_elf_section
4844 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4845 if (name == NULL)
b34976b6 4846 return FALSE;
252b5132
RH
4847 if (*name == '\0')
4848 name = bfd_section_name (input_bfd, sec);
4849 }
1a72702b
AM
4850 (*info->callbacks->reloc_overflow)
4851 (info, (h ? &h->root.root : NULL), name, howto->name,
4852 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4853 }
4854 break;
4855
4856 default:
4857 case bfd_reloc_outofrange:
4858 abort ();
4859 }
4860 }
4861
f16fbd61 4862 return ret_val;
252b5132
RH
4863}
4864
4865/* Finish up dynamic symbol handling. We set the contents of various
4866 dynamic sections here. */
4867
b34976b6 4868static bfd_boolean
a7519a3c
RH
4869elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4870 struct elf_link_hash_entry *h,
4871 Elf_Internal_Sym *sym)
252b5132 4872{
6ec7057a 4873 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4874
6ec7057a 4875 if (h->needs_plt)
252b5132
RH
4876 {
4877 /* Fill in the .plt entry for this symbol. */
4878 asection *splt, *sgot, *srel;
4879 Elf_Internal_Rela outrel;
947216bf 4880 bfd_byte *loc;
252b5132
RH
4881 bfd_vma got_addr, plt_addr;
4882 bfd_vma plt_index;
4883 struct alpha_elf_got_entry *gotent;
4884
4885 BFD_ASSERT (h->dynindx != -1);
4886
ce558b89 4887 splt = elf_hash_table (info)->splt;
252b5132 4888 BFD_ASSERT (splt != NULL);
ce558b89 4889 srel = elf_hash_table (info)->srelplt;
252b5132 4890 BFD_ASSERT (srel != NULL);
252b5132 4891
6ec7057a
RH
4892 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4893 if (gotent->reloc_type == R_ALPHA_LITERAL
4894 && gotent->use_count > 0)
4895 {
4896 unsigned int insn;
4897 int disp;
252b5132 4898
6ec7057a
RH
4899 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4900 BFD_ASSERT (sgot != NULL);
252b5132 4901
6ec7057a
RH
4902 BFD_ASSERT (gotent->got_offset != -1);
4903 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4904
6ec7057a
RH
4905 got_addr = (sgot->output_section->vma
4906 + sgot->output_offset
4907 + gotent->got_offset);
4908 plt_addr = (splt->output_section->vma
4909 + splt->output_offset
4910 + gotent->plt_offset);
252b5132 4911
6ec7057a 4912 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4913
6ec7057a
RH
4914 /* Fill in the entry in the procedure linkage table. */
4915 if (elf64_alpha_use_secureplt)
4916 {
4917 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4918 insn = INSN_AD (INSN_BR, 31, disp);
4919 bfd_put_32 (output_bfd, insn,
4920 splt->contents + gotent->plt_offset);
252b5132 4921
6ec7057a
RH
4922 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4923 / NEW_PLT_ENTRY_SIZE);
4924 }
4925 else
4926 {
4927 disp = -(gotent->plt_offset + 4);
4928 insn = INSN_AD (INSN_BR, 28, disp);
4929 bfd_put_32 (output_bfd, insn,
4930 splt->contents + gotent->plt_offset);
4931 bfd_put_32 (output_bfd, INSN_UNOP,
4932 splt->contents + gotent->plt_offset + 4);
4933 bfd_put_32 (output_bfd, INSN_UNOP,
4934 splt->contents + gotent->plt_offset + 8);
4935
4936 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4937 / OLD_PLT_ENTRY_SIZE);
4938 }
252b5132 4939
6ec7057a
RH
4940 /* Fill in the entry in the .rela.plt section. */
4941 outrel.r_offset = got_addr;
4942 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4943 outrel.r_addend = 0;
252b5132 4944
6ec7057a
RH
4945 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4946 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4947
6ec7057a
RH
4948 /* Fill in the entry in the .got. */
4949 bfd_put_64 (output_bfd, plt_addr,
4950 sgot->contents + gotent->got_offset);
4951 }
252b5132
RH
4952 }
4953 else if (alpha_elf_dynamic_symbol_p (h, info))
4954 {
4955 /* Fill in the dynamic relocations for this symbol's .got entries. */
4956 asection *srel;
252b5132
RH
4957 struct alpha_elf_got_entry *gotent;
4958
ce558b89 4959 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4960 BFD_ASSERT (srel != NULL);
4961
252b5132
RH
4962 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4963 gotent != NULL;
4964 gotent = gotent->next)
4965 {
f44f99a5 4966 asection *sgot;
1bbc9cec 4967 long r_type;
3765b1be 4968
f44f99a5
RH
4969 if (gotent->use_count == 0)
4970 continue;
4971
4972 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4973
4974 r_type = gotent->reloc_type;
4975 switch (r_type)
4976 {
4977 case R_ALPHA_LITERAL:
4978 r_type = R_ALPHA_GLOB_DAT;
4979 break;
4980 case R_ALPHA_TLSGD:
4981 r_type = R_ALPHA_DTPMOD64;
4982 break;
4983 case R_ALPHA_GOTDTPREL:
4984 r_type = R_ALPHA_DTPREL64;
4985 break;
4986 case R_ALPHA_GOTTPREL:
4987 r_type = R_ALPHA_TPREL64;
4988 break;
4989 case R_ALPHA_TLSLDM:
4990 default:
4991 abort ();
4992 }
4993
68ffbac6 4994 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4995 gotent->got_offset, h->dynindx,
4996 r_type, gotent->addend);
3765b1be
RH
4997
4998 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4999 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
5000 gotent->got_offset + 8, h->dynindx,
5001 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
5002 }
5003 }
5004
5005 /* Mark some specially defined symbols as absolute. */
9637f6ef 5006 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
5007 || h == elf_hash_table (info)->hgot
5008 || h == elf_hash_table (info)->hplt)
252b5132
RH
5009 sym->st_shndx = SHN_ABS;
5010
b34976b6 5011 return TRUE;
252b5132
RH
5012}
5013
5014/* Finish up the dynamic sections. */
5015
b34976b6 5016static bfd_boolean
a7519a3c
RH
5017elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
5018 struct bfd_link_info *info)
252b5132
RH
5019{
5020 bfd *dynobj;
5021 asection *sdyn;
5022
5023 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 5024 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
5025
5026 if (elf_hash_table (info)->dynamic_sections_created)
5027 {
6ec7057a 5028 asection *splt, *sgotplt, *srelaplt;
252b5132 5029 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 5030 bfd_vma plt_vma, gotplt_vma;
252b5132 5031
ce558b89
AM
5032 splt = elf_hash_table (info)->splt;
5033 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
5034 BFD_ASSERT (splt != NULL && sdyn != NULL);
5035
6ec7057a
RH
5036 plt_vma = splt->output_section->vma + splt->output_offset;
5037
5038 gotplt_vma = 0;
5039 if (elf64_alpha_use_secureplt)
5040 {
ce558b89 5041 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
5042 BFD_ASSERT (sgotplt != NULL);
5043 if (sgotplt->size > 0)
5044 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
5045 }
5046
252b5132 5047 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 5048 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
5049 for (; dyncon < dynconend; dyncon++)
5050 {
5051 Elf_Internal_Dyn dyn;
252b5132
RH
5052
5053 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
5054
5055 switch (dyn.d_tag)
5056 {
5057 case DT_PLTGOT:
6ec7057a
RH
5058 dyn.d_un.d_ptr
5059 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
5060 break;
252b5132 5061 case DT_PLTRELSZ:
6ec7057a
RH
5062 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5063 break;
252b5132 5064 case DT_JMPREL:
4ade44b7
AM
5065 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
5066 + srelaplt->output_offset) : 0;
6ec7057a 5067 break;
252b5132
RH
5068 }
5069
5070 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5071 }
5072
6ec7057a 5073 /* Initialize the plt header. */
eea6121a 5074 if (splt->size > 0)
252b5132 5075 {
6ec7057a
RH
5076 unsigned int insn;
5077 int ofs;
5078
5079 if (elf64_alpha_use_secureplt)
5080 {
5081 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5082
5083 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5084 bfd_put_32 (output_bfd, insn, splt->contents);
5085
5086 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5087 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5088
5089 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5090 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5091
5092 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5093 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5094
5095 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5096 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5097
5098 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5099 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5100
5101 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5102 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5103
5104 insn = INSN_AB (INSN_JMP, 31, 27);
5105 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5106
5107 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5108 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5109 }
5110 else
5111 {
5112 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5113 bfd_put_32 (output_bfd, insn, splt->contents);
5114
5115 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5116 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5117
5118 insn = INSN_UNOP;
5119 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5120
5121 insn = INSN_AB (INSN_JMP, 27, 27);
5122 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5123
5124 /* The next two words will be filled in by ld.so. */
5125 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5126 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5127 }
252b5132 5128
eecdbe52 5129 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5130 }
5131 }
5132
b34976b6 5133 return TRUE;
252b5132
RH
5134}
5135
96e2734b
RH
5136/* We need to use a special link routine to handle the .mdebug section.
5137 We need to merge all instances of these sections together, not write
5138 them all out sequentially. */
252b5132 5139
b34976b6 5140static bfd_boolean
a7519a3c 5141elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5142{
5143 asection *o;
5144 struct bfd_link_order *p;
96e2734b 5145 asection *mdebug_sec;
252b5132
RH
5146 struct ecoff_debug_info debug;
5147 const struct ecoff_debug_swap *swap
5148 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5149 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5150 void * mdebug_handle = NULL;
5151 struct alpha_elf_link_hash_table * htab;
5152
5153 htab = alpha_elf_hash_table (info);
5154 if (htab == NULL)
5155 return FALSE;
252b5132 5156
96e2734b 5157 /* Go through the sections and collect the mdebug information. */
252b5132 5158 mdebug_sec = NULL;
252b5132
RH
5159 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5160 {
252b5132
RH
5161 if (strcmp (o->name, ".mdebug") == 0)
5162 {
5163 struct extsym_info einfo;
5164
5165 /* We have found the .mdebug section in the output file.
5166 Look through all the link_orders comprising it and merge
5167 the information together. */
5168 symhdr->magic = swap->sym_magic;
5169 /* FIXME: What should the version stamp be? */
5170 symhdr->vstamp = 0;
5171 symhdr->ilineMax = 0;
5172 symhdr->cbLine = 0;
5173 symhdr->idnMax = 0;
5174 symhdr->ipdMax = 0;
5175 symhdr->isymMax = 0;
5176 symhdr->ioptMax = 0;
5177 symhdr->iauxMax = 0;
5178 symhdr->issMax = 0;
5179 symhdr->issExtMax = 0;
5180 symhdr->ifdMax = 0;
5181 symhdr->crfd = 0;
5182 symhdr->iextMax = 0;
5183
5184 /* We accumulate the debugging information itself in the
5185 debug_info structure. */
5186 debug.line = NULL;
5187 debug.external_dnr = NULL;
5188 debug.external_pdr = NULL;
5189 debug.external_sym = NULL;
5190 debug.external_opt = NULL;
5191 debug.external_aux = NULL;
5192 debug.ss = NULL;
5193 debug.ssext = debug.ssext_end = NULL;
5194 debug.external_fdr = NULL;
5195 debug.external_rfd = NULL;
5196 debug.external_ext = debug.external_ext_end = NULL;
5197
5198 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5199 if (mdebug_handle == NULL)
b34976b6 5200 return FALSE;
252b5132
RH
5201
5202 if (1)
5203 {
5204 asection *s;
5205 EXTR esym;
52b9d213 5206 bfd_vma last = 0;
252b5132
RH
5207 unsigned int i;
5208 static const char * const name[] =
5209 {
5210 ".text", ".init", ".fini", ".data",
5211 ".rodata", ".sdata", ".sbss", ".bss"
5212 };
5213 static const int sc[] = { scText, scInit, scFini, scData,
5214 scRData, scSData, scSBss, scBss };
5215
5216 esym.jmptbl = 0;
5217 esym.cobol_main = 0;
5218 esym.weakext = 0;
5219 esym.reserved = 0;
5220 esym.ifd = ifdNil;
5221 esym.asym.iss = issNil;
5222 esym.asym.st = stLocal;
5223 esym.asym.reserved = 0;
5224 esym.asym.index = indexNil;
5225 for (i = 0; i < 8; i++)
5226 {
5227 esym.asym.sc = sc[i];
5228 s = bfd_get_section_by_name (abfd, name[i]);
5229 if (s != NULL)
5230 {
5231 esym.asym.value = s->vma;
eea6121a 5232 last = s->vma + s->size;
252b5132
RH
5233 }
5234 else
5235 esym.asym.value = last;
5236
5237 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5238 name[i], &esym))
b34976b6 5239 return FALSE;
252b5132
RH
5240 }
5241 }
5242
8423293d 5243 for (p = o->map_head.link_order;
252b5132
RH
5244 p != (struct bfd_link_order *) NULL;
5245 p = p->next)
5246 {
5247 asection *input_section;
5248 bfd *input_bfd;
5249 const struct ecoff_debug_swap *input_swap;
5250 struct ecoff_debug_info input_debug;
5251 char *eraw_src;
5252 char *eraw_end;
5253
5254 if (p->type != bfd_indirect_link_order)
5255 {
fd96f80f 5256 if (p->type == bfd_data_link_order)
252b5132
RH
5257 continue;
5258 abort ();
5259 }
5260
5261 input_section = p->u.indirect.section;
5262 input_bfd = input_section->owner;
5263
0ffa91dd
NC
5264 if (! is_alpha_elf (input_bfd))
5265 /* I don't know what a non ALPHA ELF bfd would be
5266 doing with a .mdebug section, but I don't really
5267 want to deal with it. */
5268 continue;
252b5132
RH
5269
5270 input_swap = (get_elf_backend_data (input_bfd)
5271 ->elf_backend_ecoff_debug_swap);
5272
eea6121a 5273 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5274
5275 /* The ECOFF linking code expects that we have already
5276 read in the debugging information and set up an
5277 ecoff_debug_info structure, so we do that now. */
5278 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5279 &input_debug))
b34976b6 5280 return FALSE;
252b5132
RH
5281
5282 if (! (bfd_ecoff_debug_accumulate
5283 (mdebug_handle, abfd, &debug, swap, input_bfd,
5284 &input_debug, input_swap, info)))
b34976b6 5285 return FALSE;
252b5132
RH
5286
5287 /* Loop through the external symbols. For each one with
5288 interesting information, try to find the symbol in
5289 the linker global hash table and save the information
5290 for the output external symbols. */
21d799b5 5291 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5292 eraw_end = (eraw_src
5293 + (input_debug.symbolic_header.iextMax
5294 * input_swap->external_ext_size));
5295 for (;
5296 eraw_src < eraw_end;
5297 eraw_src += input_swap->external_ext_size)
5298 {
5299 EXTR ext;
5300 const char *name;
5301 struct alpha_elf_link_hash_entry *h;
5302
2c3fc389 5303 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5304 if (ext.asym.sc == scNil
5305 || ext.asym.sc == scUndefined
5306 || ext.asym.sc == scSUndefined)
5307 continue;
5308
5309 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5310 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5311 if (h == NULL || h->esym.ifd != -2)
5312 continue;
5313
5314 if (ext.ifd != -1)
5315 {
5316 BFD_ASSERT (ext.ifd
5317 < input_debug.symbolic_header.ifdMax);
5318 ext.ifd = input_debug.ifdmap[ext.ifd];
5319 }
5320
5321 h->esym = ext;
5322 }
5323
5324 /* Free up the information we just read. */
5325 free (input_debug.line);
5326 free (input_debug.external_dnr);
5327 free (input_debug.external_pdr);
5328 free (input_debug.external_sym);
5329 free (input_debug.external_opt);
5330 free (input_debug.external_aux);
5331 free (input_debug.ss);
5332 free (input_debug.ssext);
5333 free (input_debug.external_fdr);
5334 free (input_debug.external_rfd);
5335 free (input_debug.external_ext);
5336
5337 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5338 elf_link_input_bfd ignores this section. */
5339 input_section->flags &=~ SEC_HAS_CONTENTS;
5340 }
5341
252b5132
RH
5342 /* Build the external symbol information. */
5343 einfo.abfd = abfd;
5344 einfo.info = info;
5345 einfo.debug = &debug;
5346 einfo.swap = swap;
b34976b6 5347 einfo.failed = FALSE;
252b5132
RH
5348 elf_link_hash_traverse (elf_hash_table (info),
5349 elf64_alpha_output_extsym,
2c3fc389 5350 &einfo);
252b5132 5351 if (einfo.failed)
b34976b6 5352 return FALSE;
252b5132
RH
5353
5354 /* Set the size of the .mdebug section. */
eea6121a 5355 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5356
5357 /* Skip this section later on (I don't think this currently
5358 matters, but someday it might). */
8423293d 5359 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5360
5361 mdebug_sec = o;
5362 }
252b5132
RH
5363 }
5364
5365 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5366 if (! bfd_elf_final_link (abfd, info))
b34976b6 5367 return FALSE;
252b5132
RH
5368
5369 /* Now write out the computed sections. */
5370
5371 /* The .got subsections... */
5372 {
5373 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5374 for (i = htab->got_list;
252b5132
RH
5375 i != NULL;
5376 i = alpha_elf_tdata(i)->got_link_next)
5377 {
5378 asection *sgot;
5379
5380 /* elf_bfd_final_link already did everything in dynobj. */
5381 if (i == dynobj)
5382 continue;
5383
5384 sgot = alpha_elf_tdata(i)->got;
5385 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5386 sgot->contents,
5387 (file_ptr) sgot->output_offset,
eea6121a 5388 sgot->size))
b34976b6 5389 return FALSE;
252b5132
RH
5390 }
5391 }
5392
252b5132
RH
5393 if (mdebug_sec != (asection *) NULL)
5394 {
5395 BFD_ASSERT (abfd->output_has_begun);
5396 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5397 swap, info,
5398 mdebug_sec->filepos))
b34976b6 5399 return FALSE;
252b5132
RH
5400
5401 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5402 }
5403
b34976b6 5404 return TRUE;
252b5132 5405}
fcfbdf31
JJ
5406
5407static enum elf_reloc_type_class
7e612e98
AM
5408elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5409 const asection *rel_sec ATTRIBUTE_UNUSED,
5410 const Elf_Internal_Rela *rela)
fcfbdf31 5411{
f51e552e 5412 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5413 {
5414 case R_ALPHA_RELATIVE:
5415 return reloc_class_relative;
5416 case R_ALPHA_JMP_SLOT:
5417 return reloc_class_plt;
5418 case R_ALPHA_COPY:
5419 return reloc_class_copy;
5420 default:
5421 return reloc_class_normal;
5422 }
5423}
252b5132 5424\f
b35d266b 5425static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5426{
0112cd26
NC
5427 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5428 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5429 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5430};
5431
252b5132
RH
5432/* ECOFF swapping routines. These are used when dealing with the
5433 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5434 from elf32-mips.c. */
252b5132
RH
5435static const struct ecoff_debug_swap
5436elf64_alpha_ecoff_debug_swap =
5437{
5438 /* Symbol table magic number. */
5439 magicSym2,
5440 /* Alignment of debugging information. E.g., 4. */
5441 8,
5442 /* Sizes of external symbolic information. */
5443 sizeof (struct hdr_ext),
5444 sizeof (struct dnr_ext),
5445 sizeof (struct pdr_ext),
5446 sizeof (struct sym_ext),
5447 sizeof (struct opt_ext),
5448 sizeof (struct fdr_ext),
5449 sizeof (struct rfd_ext),
5450 sizeof (struct ext_ext),
5451 /* Functions to swap in external symbolic data. */
5452 ecoff_swap_hdr_in,
5453 ecoff_swap_dnr_in,
5454 ecoff_swap_pdr_in,
5455 ecoff_swap_sym_in,
5456 ecoff_swap_opt_in,
5457 ecoff_swap_fdr_in,
5458 ecoff_swap_rfd_in,
5459 ecoff_swap_ext_in,
5460 _bfd_ecoff_swap_tir_in,
5461 _bfd_ecoff_swap_rndx_in,
5462 /* Functions to swap out external symbolic data. */
5463 ecoff_swap_hdr_out,
5464 ecoff_swap_dnr_out,
5465 ecoff_swap_pdr_out,
5466 ecoff_swap_sym_out,
5467 ecoff_swap_opt_out,
5468 ecoff_swap_fdr_out,
5469 ecoff_swap_rfd_out,
5470 ecoff_swap_ext_out,
5471 _bfd_ecoff_swap_tir_out,
5472 _bfd_ecoff_swap_rndx_out,
5473 /* Function to read in symbolic data. */
5474 elf64_alpha_read_ecoff_info
5475};
5476\f
70bcb145
JW
5477/* Use a non-standard hash bucket size of 8. */
5478
562ace6b 5479static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5480{
5481 sizeof (Elf64_External_Ehdr),
5482 sizeof (Elf64_External_Phdr),
5483 sizeof (Elf64_External_Shdr),
5484 sizeof (Elf64_External_Rel),
5485 sizeof (Elf64_External_Rela),
5486 sizeof (Elf64_External_Sym),
5487 sizeof (Elf64_External_Dyn),
5488 sizeof (Elf_External_Note),
5489 8,
5490 1,
45d6a902 5491 64, 3,
70bcb145
JW
5492 ELFCLASS64, EV_CURRENT,
5493 bfd_elf64_write_out_phdrs,
5494 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5495 bfd_elf64_checksum_contents,
70bcb145 5496 bfd_elf64_write_relocs,
73ff0d56 5497 bfd_elf64_swap_symbol_in,
70bcb145
JW
5498 bfd_elf64_swap_symbol_out,
5499 bfd_elf64_slurp_reloc_table,
5500 bfd_elf64_slurp_symbol_table,
5501 bfd_elf64_swap_dyn_in,
5502 bfd_elf64_swap_dyn_out,
947216bf
AM
5503 bfd_elf64_swap_reloc_in,
5504 bfd_elf64_swap_reloc_out,
5505 bfd_elf64_swap_reloca_in,
5506 bfd_elf64_swap_reloca_out
70bcb145
JW
5507};
5508
6d00b590 5509#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5510#define TARGET_LITTLE_NAME "elf64-alpha"
5511#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5512#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5513#define ELF_MACHINE_CODE EM_ALPHA
5514#define ELF_MAXPAGESIZE 0x10000
24718e3b 5515#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5516
5517#define bfd_elf64_bfd_link_hash_table_create \
5518 elf64_alpha_bfd_link_hash_table_create
5519
5520#define bfd_elf64_bfd_reloc_type_lookup \
5521 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5522#define bfd_elf64_bfd_reloc_name_lookup \
5523 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5524#define elf_info_to_howto \
5525 elf64_alpha_info_to_howto
5526
5527#define bfd_elf64_mkobject \
5528 elf64_alpha_mkobject
5529#define elf_backend_object_p \
5530 elf64_alpha_object_p
5531
5532#define elf_backend_section_from_shdr \
5533 elf64_alpha_section_from_shdr
204692d7
RH
5534#define elf_backend_section_flags \
5535 elf64_alpha_section_flags
252b5132
RH
5536#define elf_backend_fake_sections \
5537 elf64_alpha_fake_sections
5538
5539#define bfd_elf64_bfd_is_local_label_name \
5540 elf64_alpha_is_local_label_name
5541#define bfd_elf64_find_nearest_line \
5542 elf64_alpha_find_nearest_line
5543#define bfd_elf64_bfd_relax_section \
5544 elf64_alpha_relax_section
5545
5546#define elf_backend_add_symbol_hook \
5547 elf64_alpha_add_symbol_hook
13285a1b
AM
5548#define elf_backend_relocs_compatible \
5549 _bfd_elf_relocs_compatible
6fc5bb57
AM
5550#define elf_backend_sort_relocs_p \
5551 elf64_alpha_sort_relocs_p
252b5132
RH
5552#define elf_backend_check_relocs \
5553 elf64_alpha_check_relocs
5554#define elf_backend_create_dynamic_sections \
5555 elf64_alpha_create_dynamic_sections
5556#define elf_backend_adjust_dynamic_symbol \
5557 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5558#define elf_backend_merge_symbol_attribute \
5559 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5560#define elf_backend_copy_indirect_symbol \
5561 elf64_alpha_copy_indirect_symbol
252b5132
RH
5562#define elf_backend_always_size_sections \
5563 elf64_alpha_always_size_sections
5564#define elf_backend_size_dynamic_sections \
5565 elf64_alpha_size_dynamic_sections
74541ad4
AM
5566#define elf_backend_omit_section_dynsym \
5567 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
252b5132
RH
5568#define elf_backend_relocate_section \
5569 elf64_alpha_relocate_section
5570#define elf_backend_finish_dynamic_symbol \
5571 elf64_alpha_finish_dynamic_symbol
5572#define elf_backend_finish_dynamic_sections \
5573 elf64_alpha_finish_dynamic_sections
5574#define bfd_elf64_bfd_final_link \
5575 elf64_alpha_final_link
fcfbdf31
JJ
5576#define elf_backend_reloc_type_class \
5577 elf64_alpha_reloc_type_class
252b5132 5578
e117360e
RH
5579#define elf_backend_can_gc_sections 1
5580#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5581#define elf_backend_gc_sweep_hook elf64_alpha_gc_sweep_hook
5582
252b5132
RH
5583#define elf_backend_ecoff_debug_swap \
5584 &elf64_alpha_ecoff_debug_swap
5585
70bcb145
JW
5586#define elf_backend_size_info \
5587 alpha_elf_size_info
5588
29ef7005
L
5589#define elf_backend_special_sections \
5590 elf64_alpha_special_sections
2f89ff8d 5591
38b1a46c 5592/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5593#define elf_backend_want_got_plt 0
5594#define elf_backend_plt_readonly 0
5595#define elf_backend_want_plt_sym 1
5596#define elf_backend_got_header_size 0
64f52338 5597#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5598
5599#include "elf64-target.h"
2238051f
RH
5600\f
5601/* FreeBSD support. */
5602
5603#undef TARGET_LITTLE_SYM
6d00b590 5604#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5605#undef TARGET_LITTLE_NAME
5606#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5607#undef ELF_OSABI
5608#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5609
5610/* The kernel recognizes executables as valid only if they carry a
5611 "FreeBSD" label in the ELF header. So we put this label on all
5612 executables and (for simplicity) also all other object files. */
5613
2238051f 5614static void
a7519a3c
RH
5615elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5616 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5617{
5618 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5619
5620 i_ehdrp = elf_elfheader (abfd);
5621
5622 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5623 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5624#ifdef OLD_FREEBSD_ABI_LABEL
5625 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5626 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5627#endif
5628}
5629
5630#undef elf_backend_post_process_headers
5631#define elf_backend_post_process_headers \
5632 elf64_alpha_fbsd_post_process_headers
5633
571fe01f 5634#undef elf64_bed
2238051f
RH
5635#define elf64_bed elf64_alpha_fbsd_bed
5636
5637#include "elf64-target.h"
This page took 1.525159 seconds and 4 git commands to generate.